CN112654045A - Wireless network security protection method, mobile terminal and computer readable storage medium - Google Patents
Wireless network security protection method, mobile terminal and computer readable storage medium Download PDFInfo
- Publication number
- CN112654045A CN112654045A CN202011464440.4A CN202011464440A CN112654045A CN 112654045 A CN112654045 A CN 112654045A CN 202011464440 A CN202011464440 A CN 202011464440A CN 112654045 A CN112654045 A CN 112654045A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- network
- information
- mobile terminal
- protection method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The application provides a wireless network safety protection method, which is applied to a mobile terminal and comprises the following steps: acquiring network information of a wireless network to be connected, and judging whether the wireless network to be connected belongs to a white list or not based on the network information; when the wireless network to be connected belongs to the white list and the wireless network switch is in the on state, controlling the mobile terminal to access the wireless network to be connected; when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information; and when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected. The application also provides a mobile terminal and a computer readable storage medium. This way, the security of the wireless network usage can be guaranteed.
Description
Technical Field
The present application relates to the field of wireless network technologies, and in particular, to a wireless network security protection method, a mobile terminal, and a computer-readable storage medium.
Background
At present, a user can use a mobile terminal (such as a mobile phone) to surf the internet through a wireless network (WIFI), and great convenience is brought to the user. The wireless network switch of the mobile terminal is normally always turned on by default. When the wireless network switch is always kept in an open state, the mobile terminal can be actively connected with some public wireless networks without passwords in public places, and payment activities or login application activities and the like are carried out at the moment, personal address lists, position information and other personal information can be leaked, and the passwords can be stolen. Meanwhile, or after a public wireless network without a password is connected in a public place, some users can use the mobile phone only by inputting a mobile phone number to acquire an authentication code, and further, the users can use the mobile phone only after browsing advertisements or playing a video, so that the time of the users is greatly wasted.
If the wireless network switch is turned off in public places, but the places are switched to home, users generally cannot turn on or think of turning on the wireless network switch in time, and under the condition that the current 5G network is popularized, a large amount of data traffic can be consumed in a short time, so that a certain degree of loss is caused to the users.
Disclosure of Invention
The present application mainly aims to provide a wireless network security protection method, a mobile terminal and a computer-readable storage medium, which can improve the security of a wireless network and the convenience of a user.
In order to achieve the above object, the present application provides a wireless network security protection method, which is applied to a mobile terminal, and the wireless network security protection method includes:
acquiring network information of a wireless network to be connected, and judging whether the wireless network to be connected belongs to a white list or not based on the network information;
when the wireless network to be connected belongs to the white list and a wireless network switch is in an on state, controlling the mobile terminal to access the wireless network to be connected;
when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information;
and when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected.
Optionally, the wireless network security protection method further includes:
acquiring historical network information of a wireless network which is historically accessed by the mobile terminal, and classifying the historically accessed wireless network according to the historical network information;
configuring corresponding weight for each type of wireless network, and calculating the trust score of each type of wireless network based on the weight;
ranking the wireless networks based on the trust scores;
the historical network information comprises a network name, a network address, password information and position data.
Optionally, after the step of ranking the wireless networks based on the trust score, the method further includes:
and adding the wireless networks sequenced before the preset position to the white list.
Optionally, the network information includes a first MAC address, and the wireless network security protection method further includes:
acquiring a second MAC address of each wireless network in the white list;
comparing the first MAC address with each second MAC address;
and when the first MAC address is the same as one of the second MAC addresses, judging that the wireless network to be connected belongs to the white list.
Optionally, the wireless network security protection method further includes:
acquiring first position information of each wireless network in the white list and second position information of the mobile terminal;
comparing the second location information with each of the first location information;
and when the difference value between the second position information and one of the first position information is smaller than a preset threshold value and the wireless network switch is in a closed state, outputting the output prompt information to prompt a user to access a wireless network corresponding to the first position information of which the difference value between the second position information and the first position information is smaller than the preset threshold value.
Optionally, the network information includes a network signal strength, and the wireless network security protection method further includes:
judging whether the network signal intensity is greater than a preset intensity;
and when the network signal intensity is greater than the preset intensity, judging that the wireless network to be connected meets the preset condition.
Optionally, when the network signal strength is greater than the preset strength, the step of determining that the wireless network to be connected satisfies the preset condition includes:
and when the network signal intensity is greater than the preset intensity and the mobile network of the mobile terminal is in an open state, judging that the wireless network to be connected meets the preset condition.
Optionally, the wireless network security protection method further includes:
when the network information contains a preset link, adding the wireless network to be connected to a blacklist;
the preset link comprises an advertisement link and a link for acquiring basic information of the user.
The present application further provides a mobile terminal, the mobile terminal including: a touch screen; a processor; and the memory is connected with the processor and comprises a control instruction, and when the processor reads the control instruction, the memory controls the mobile terminal to realize the wireless network safety protection method.
The present application also provides a computer-readable storage medium having one or more programs executed by one or more processors to implement the above wireless network security protection method.
According to the wireless network safety protection method, the mobile terminal and the computer readable storage medium, firstly, network information of a wireless network to be connected is obtained, and whether the wireless network to be connected belongs to a white list is judged based on the network information; secondly, when the wireless network to be connected belongs to the white list and a wireless network switch is in an on state, controlling the mobile terminal to access the wireless network to be connected; when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information; and finally, when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected, so that when the wireless network to be connected belongs to the white list and the wireless network switch is in an on state, the mobile terminal can be directly accessed to the wireless network to be connected, the use safety of the wireless network is improved, and when the wireless network to be connected belongs to the white list, the wireless network switch is in an off state and the wireless network to be connected meets the preset condition, outputting prompt information to prompt the user to access the wireless network to be connected, and the use convenience of the user is improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present application;
FIG. 2 is a schematic diagram of a communication network system of the mobile terminal shown in FIG. 1;
fig. 3 is a flowchart of a wireless network security protection method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The various components of the mobile terminal 100 are described in detail below with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, the present invention provides various embodiments of the method.
Fig. 3 is a flowchart of an embodiment of a wireless network security protection method provided in the present application. Once the method of this embodiment is triggered by the user, the process in this embodiment is automatically executed by the mobile terminal 100, where each step may be executed sequentially according to the sequence in the flowchart, or may be executed simultaneously according to a plurality of steps in an actual situation, which is not limited herein. The wireless network security protection method provided by the application comprises the following steps:
step S310, network information of a wireless network to be connected is obtained, and whether the wireless network to be connected belongs to a white list is judged based on the network information;
step S330, when the wireless network to be connected belongs to the white list and the wireless network switch is in the on state, controlling the mobile terminal 100 to access the wireless network to be connected;
step S350, when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information;
step S370, when the wireless network to be connected meets the preset condition, outputting a prompt message to prompt a user to access the wireless network to be connected.
Through the above embodiment, when the wireless network to be connected belongs to the white list and the wireless network switch is in the on state, the mobile terminal 100 may directly access the wireless network to be connected, so as to improve the security of the use of the wireless network, and when the wireless network to be connected belongs to the white list, the wireless network switch is in the off state and the wireless network to be connected satisfies the preset condition, the prompt information may be output to prompt the user that the user may access the wireless network to be connected, so as to improve the convenience of the use of the user.
The above steps will be specifically described with reference to specific examples.
In step S310, network information of a wireless network to be connected is obtained, and whether the wireless network to be connected belongs to a white list is determined based on the network information.
In this embodiment, the network information may include the first MAC address, the network signal strength, the IP address, and the like, which is not limited herein. The wireless networks in the white list may be networks with higher security, and the white list may be set in advance.
In this embodiment, the wireless network security protection method further includes:
step S3101, obtaining historical network information of the historically accessed wireless networks of the mobile terminal 100, and classifying the historically accessed wireless networks according to the historical network information;
step S3102, configuring corresponding weight for each type of wireless network, and calculating the trust score of each type of wireless network based on the weight;
step S3103, ranking the wireless networks based on the trust scores;
the historical network information includes a network name, a network address (e.g., a MAC address), password information, and location data.
In this embodiment, the historical network information may include a network name, a network address, password information, location data, and the like, which is not limited herein.
In this embodiment, the mobile terminal 100 may record network information of an accessed wireless network in real time, such as a network name, a network address, password information, location data, and the like, so that historical network information of a wireless network historically accessed by the mobile terminal 100 in a preset time period may be directly obtained later as needed, the historically accessed wireless network may be classified according to the network name, the network address, the password information, and the location data in the historical network information, corresponding weights are configured for each type of wireless network, a trust score of each type of wireless network is calculated by using an optimization algorithm based on the weights, the wireless networks may be sorted in a descending order or an ascending order based on the trust score, and preferably sorted in a descending order to form a sorting table.
In this embodiment, the preset time period may be set by a user in a customized manner, for example, one month, two months, one year, and the like. The mobile terminal 100 may set completely different or partially the same or completely the same weight for each type of wireless network, respectively.
For example, the mobile terminal 100 may divide the wireless network into three types according to the network name, the network address, the password information, and the location data in the historical network information, where the first type is a wireless network without a password, the second type is a wireless network that needs to be verified, and the third type is a commonly used wireless network. The mobile terminal 100 may configure corresponding weights for three types of wireless networks, for example, configure a weight 0.1 for a wireless network without a password, configure a weight 0.2 for a wireless network to be verified, configure a weight 0.7 for a commonly used wireless network, then calculate a trust score of each type of the wireless network, and rank the wireless networks based on the trust scores.
In this embodiment, after the step of ranking the wireless networks based on the trust scores, the method further includes:
step S3104, adding the wireless networks sorted before the preset position to the white list.
In this embodiment, the preset position may be set by default by the system, or may be set by user-defined. The preset position may be a 5 th bit, a 7 th bit, etc. in the row table.
In this embodiment, after the wireless networks are sorted in a descending order to form a sorting table, the mobile terminal 100 may add the wireless networks sorted before a preset position to the white list. And taking the preset position as the 5 th bit in the ranking table as an example, adding all the wireless networks with the trust scores ranked at the top 5 bits to the white list. It is to be understood that the user may also modify the white list at any time through the setting unit of the mobile terminal 100, for example, delete or add a new wireless network.
In this embodiment, the wireless network security protection method further includes:
step S3105, obtaining a second MAC address of each wireless network in the white list;
step S3106, comparing the first MAC address with each of the second MAC addresses;
step S3107, when the first MAC address is the same as one of the second MAC addresses, determining that the wireless network to be connected belongs to the white list.
In this embodiment, the mobile terminal 100 may obtain a first MAC address of the wireless network to be connected and a second MAC address of each wireless network in the white list, compare the first MAC address with each second MAC address, determine that the wireless network to be connected belongs to the white list when the first MAC address is the same as one of the second MAC addresses, and determine that the wireless network to be connected does not belong to the white list when the first MAC address is not the same as all of the second MAC addresses.
In step S330, when the wireless network to be connected belongs to the white list and the wireless network switch is in the on state, the mobile terminal 100 is controlled to access the wireless network to be connected.
In this embodiment, when the wireless network to be connected belongs to the white list and the wireless network switch is in the on state, the mobile terminal 100 is controlled to access the wireless network to be connected, so that when the security level of the wireless network to be connected is higher and the wireless network switch is in the on state, the connection is directly performed, and the convenience of the user is also ensured while the security of the wireless network is ensured.
In step S350, when the wireless network to be connected belongs to the white list and the wireless network switch is in the off state, it is determined whether the wireless network to be connected satisfies a preset condition based on the network information.
In this embodiment, when the wireless network to be connected belongs to the white list and the wireless network switch is in the off state, the mobile terminal 100 may determine whether the wireless network to be connected satisfies a preset condition based on the network information.
In this embodiment, the network information includes network signal strength, and the wireless network security protection method further includes:
step S3501, determining whether the network signal strength is greater than a preset strength;
step S3502, when the network signal strength is greater than the preset strength, determining that the wireless network to be connected satisfies the preset condition.
In this embodiment, the preset condition may be that the network signal strength is greater than the preset strength. The preset strength can be the lowest strength at which the internet surfing behavior can be performed after the internet is connected, and the larger the network signal strength is, the better the wireless network signal is, and the smoother the internet surfing is. The preset intensity may be set in advance.
In this embodiment, when the wireless network to be connected belongs to the white list and the wireless network switch is in the off state, the mobile terminal 100 may obtain the network signal strength of the wireless network to be connected, compare the network signal strength with the preset strength, and determine that the wireless network to be connected satisfies the preset condition when the network signal strength is greater than the preset strength.
In this embodiment, the step of determining that the wireless network to be connected satisfies the preset condition when the network signal strength is greater than the preset strength includes:
and when the network signal strength is greater than the preset strength and the mobile network of the mobile terminal 100 is in an open state, determining that the wireless network to be connected meets the preset condition.
In this embodiment, the preset condition may be that the network signal strength is greater than the preset strength and the mobile network of the mobile terminal 100 is in an on state.
In step S370, when the wireless network to be connected satisfies the preset condition, a prompt message is output to prompt a user to access the wireless network to be connected.
In this embodiment, the prompt message may be a text message and/or a voice message. The prompt message may include information such as the name of the wireless network to be connected.
In this embodiment, when the network signal strength is greater than the preset strength, the mobile terminal 100 may output a prompt message to prompt the user to access the wireless network to be connected. When the network signal strength is greater than the preset strength and the mobile network of the mobile terminal 100 is in an on state, the mobile terminal 100 may also output a prompt message to prompt the user to access the wireless network to be connected, thereby saving data traffic.
In this embodiment, the wireless network security protection method further includes:
step S3701, obtaining first location information of each wireless network in the white list and second location information of the mobile terminal 100;
step 3702, comparing the second location information with each of the first location information;
step 3703, when the difference between the second position information and one of the first position information is smaller than a preset threshold and the wireless network switch is in the off state, outputting the output prompt information to prompt the user to access the wireless network corresponding to the first position information whose difference between the second position information and the first position information is smaller than the preset threshold.
In this embodiment, the preset threshold may refer to a maximum distance from the wireless network, and the preset threshold may be set in advance, for example, 1 meter, 2 meters, and the like, and is not limited herein.
In this embodiment, the first location information of each wireless network in the white list and the second location information of the mobile terminal 100, that is, the current location of the user, may be obtained, and the second location information is compared with each first location information, and when a difference between the second location information and one of the first location information is smaller than a preset threshold, that is, the current location of the user is close to one of the wireless networks in the white list and the wireless network switch is in an off state, the mobile terminal 100 may output the output prompt information to prompt the user to access the wireless network corresponding to the first location information whose difference with the second location information is smaller than the preset threshold.
In other embodiments, when the difference between the second location information and one of the first location information is smaller than a preset threshold, the wireless network switch is in the off state, and the mobile network of the mobile terminal 100 is in the on state, the output prompt information may be output to prompt the user that the wireless network corresponding to the first location information whose difference between the second location information is smaller than the preset threshold may be accessed, so as to save data traffic and improve user experience.
In this embodiment, the wireless network security protection method further includes:
step 3704, when the network information includes a preset link, adding the wireless network to be connected to a blacklist;
the preset link comprises an advertisement link and a link for acquiring basic information of the user.
In this embodiment, the wireless networks in the blacklist may be wireless networks with low security that do not suggest a connection. The blacklist may be set in advance, and after the blacklist is set, a user may modify the blacklist at any time through a setting unit of the mobile terminal 100, for example, delete or add a new wireless network.
In this embodiment, when the network information includes a preset link, such as an advertisement link and a link for acquiring basic information of a user, the mobile terminal 100 may add the wireless network to be connected to a blacklist to ensure security of wireless network usage.
In other embodiments, when the wireless network to be connected needs to perform a series of verification operations or obtain important information of a user, the mobile terminal 100 may also add the wireless network to be connected to the blacklist.
By the embodiment, the network information of the wireless network to be connected is firstly acquired, and whether the wireless network to be connected belongs to the white list is judged based on the network information; secondly, when the wireless network to be connected belongs to the white list and the wireless network switch is in an on state, controlling the mobile terminal 100 to access the wireless network to be connected; when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information; and finally, when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected, so that when the wireless network to be connected belongs to the white list and the wireless network switch is in an on state, the mobile terminal 100 can be directly accessed to the wireless network to be connected, the use safety of the wireless network is improved, and when the wireless network to be connected belongs to the white list, the wireless network switch is in an off state and the wireless network to be connected meets the preset condition, outputting prompt information to prompt the user to access the wireless network to be connected, so that the use convenience of the user is improved.
Fig. 4 is a schematic structural component diagram of a mobile terminal 100 according to an embodiment of the present application, where the mobile terminal 100 includes: a touch panel 1071; a processor 110; the memory 109 is connected to the processor 110, the memory 109 contains a control instruction, and when the processor 110 reads the control instruction, the mobile terminal 100 is controlled to implement the following steps:
acquiring network information of a wireless network to be connected, and judging whether the wireless network to be connected belongs to a white list or not based on the network information; when the wireless network to be connected belongs to the white list and the wireless network switch is in an on state, controlling the mobile terminal 100 to access the wireless network to be connected; when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information; and when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected.
Optionally, the method further comprises:
acquiring historical network information of a wireless network which is historically accessed by the mobile terminal 100, and classifying the historically accessed wireless network according to the historical network information;
configuring corresponding weight for each type of wireless network, and calculating the trust score of each type of wireless network based on the weight;
ranking the wireless networks based on the trust scores;
the historical network information comprises a network name, a network address, password information and position data.
Optionally, after the step of ranking the wireless networks based on the trust score, the method further includes:
and adding the wireless networks sequenced before the preset position to the white list.
Optionally, the network information includes a first MAC address, and the wireless network security protection method further includes:
acquiring a second MAC address of each wireless network in the white list;
comparing the first MAC address with each second MAC address;
and when the first MAC address is the same as one of the second MAC addresses, judging that the wireless network to be connected belongs to the white list.
Optionally, the method further comprises:
acquiring first location information of each wireless network in the white list and second location information of the mobile terminal 100;
comparing the second location information with each of the first location information;
and when the difference value between the second position information and one of the first position information is smaller than a preset threshold value and the wireless network switch is in a closed state, outputting the output prompt information to prompt a user to access a wireless network corresponding to the first position information of which the difference value between the second position information and the first position information is smaller than the preset threshold value.
Optionally, the network information includes a network signal strength, and the wireless network security protection method further includes:
judging whether the network signal intensity is greater than a preset intensity;
and when the network signal intensity is greater than the preset intensity, judging that the wireless network to be connected meets the preset condition.
Optionally, when the network signal strength is greater than the preset strength, the step of determining that the wireless network to be connected satisfies the preset condition includes:
and when the network signal strength is greater than the preset strength and the mobile network of the mobile terminal 100 is in an open state, determining that the wireless network to be connected meets the preset condition.
Optionally, the method further comprises:
when the network information contains a preset link, adding the wireless network to be connected to a blacklist;
the preset link comprises an advertisement link and a link for acquiring basic information of the user.
Through the mobile terminal 100, firstly, network information of a wireless network to be connected is obtained, and whether the wireless network to be connected belongs to a white list is judged based on the network information; secondly, when the wireless network to be connected belongs to the white list and the wireless network switch is in an on state, controlling the mobile terminal 100 to access the wireless network to be connected; when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information; and finally, when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected, so that when the wireless network to be connected belongs to the white list and the wireless network switch is in an on state, the mobile terminal 100 can be directly accessed to the wireless network to be connected, the use safety of the wireless network is improved, and when the wireless network to be connected belongs to the white list, the wireless network switch is in an off state and the wireless network to be connected meets the preset condition, outputting prompt information to prompt the user to access the wireless network to be connected, so that the use convenience of the user is improved.
Embodiments of the present application also provide a computer-readable storage medium having one or more programs, where the one or more programs are executed by one or more processors to implement the following steps:
acquiring network information of a wireless network to be connected, and judging whether the wireless network to be connected belongs to a white list or not based on the network information; when the wireless network to be connected belongs to the white list and a wireless network switch is in an on state, controlling the mobile terminal to access the wireless network to be connected; when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information; and when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected.
Optionally, the method further comprises:
acquiring historical network information of a wireless network which is historically accessed by the mobile terminal, and classifying the historically accessed wireless network according to the historical network information;
configuring corresponding weight for each type of wireless network, and calculating the trust score of each type of wireless network based on the weight;
ranking the wireless networks based on the trust scores;
the historical network information comprises a network name, a network address, password information and position data.
Optionally, after the step of ranking the wireless networks based on the trust score, the method further includes:
and adding the wireless networks sequenced before the preset position to the white list.
Optionally, the network information includes a first MAC address, and the wireless network security protection method further includes:
acquiring a second MAC address of each wireless network in the white list;
comparing the first MAC address with each second MAC address;
and when the first MAC address is the same as one of the second MAC addresses, judging that the wireless network to be connected belongs to the white list.
Optionally, the method further comprises:
acquiring first position information of each wireless network in the white list and second position information of the mobile terminal;
comparing the second location information with each of the first location information;
and when the difference value between the second position information and one of the first position information is smaller than a preset threshold value and the wireless network switch is in a closed state, outputting the output prompt information to prompt a user to access a wireless network corresponding to the first position information of which the difference value between the second position information and the first position information is smaller than the preset threshold value.
Optionally, the network information includes a network signal strength, and the wireless network security protection method further includes:
judging whether the network signal intensity is greater than a preset intensity;
and when the network signal intensity is greater than the preset intensity, judging that the wireless network to be connected meets the preset condition.
Optionally, when the network signal strength is greater than the preset strength, the step of determining that the wireless network to be connected satisfies the preset condition includes:
and when the network signal intensity is greater than the preset intensity and the mobile network of the mobile terminal is in an open state, judging that the wireless network to be connected meets the preset condition.
Optionally, the method further comprises:
when the network information contains a preset link, adding the wireless network to be connected to a blacklist;
the preset link comprises an advertisement link and a link for acquiring basic information of the user.
Through the computer readable storage medium, firstly, network information of a wireless network to be connected is obtained, and whether the wireless network to be connected belongs to a white list is judged based on the network information; secondly, when the wireless network to be connected belongs to the white list and a wireless network switch is in an on state, controlling the mobile terminal to access the wireless network to be connected; when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information; and finally, when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected, so that when the wireless network to be connected belongs to the white list and the wireless network switch is in an on state, the mobile terminal can be directly accessed to the wireless network to be connected, the use safety of the wireless network is improved, and when the wireless network to be connected belongs to the white list, the wireless network switch is in an off state and the wireless network to be connected meets the preset condition, outputting prompt information to prompt the user to access the wireless network to be connected, and the use convenience of the user is improved.
The embodiment of the application also provides a computer readable storage medium. The computer-readable storage medium herein stores one or more programs. Among other things, computer-readable storage media may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
The corresponding technical features in the above embodiments may be used with each other without causing contradiction in the schemes or without being implementable.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (10)
1. A wireless network security protection method is applied to a mobile terminal, and is characterized by comprising the following steps:
acquiring network information of a wireless network to be connected, and judging whether the wireless network to be connected belongs to a white list or not based on the network information;
when the wireless network to be connected belongs to the white list and a wireless network switch is in an on state, controlling the mobile terminal to access the wireless network to be connected;
when the wireless network to be connected belongs to the white list and the wireless network switch is in a closed state, judging whether the wireless network to be connected meets a preset condition or not based on the network information;
and when the wireless network to be connected meets the preset condition, outputting prompt information to prompt a user to access the wireless network to be connected.
2. The wireless network security protection method of claim 1, wherein the wireless network security protection method further comprises:
acquiring historical network information of a wireless network which is historically accessed by the mobile terminal, and classifying the historically accessed wireless network according to the historical network information;
configuring corresponding weight for each type of wireless network, and calculating the trust score of each type of wireless network based on the weight;
ranking the wireless networks based on the trust scores;
the historical network information comprises a network name, a network address, password information and position data.
3. The wireless network security protection method of claim 2, wherein the step of ranking the wireless networks based on the trust scores further comprises, after the step of:
and adding the wireless networks sequenced before the preset position to the white list.
4. The wireless network security protection method of claim 1, wherein the network information comprises a first MAC address, the wireless network security protection method further comprising:
acquiring a second MAC address of each wireless network in the white list;
comparing the first MAC address with each second MAC address;
and when the first MAC address is the same as one of the second MAC addresses, judging that the wireless network to be connected belongs to the white list.
5. The wireless network security protection method of claim 1, wherein the wireless network security protection method further comprises:
acquiring first position information of each wireless network in the white list and second position information of the mobile terminal;
comparing the second location information with each of the first location information;
and when the difference value between the second position information and one of the first position information is smaller than a preset threshold value and the wireless network switch is in a closed state, outputting the output prompt information to prompt a user to access a wireless network corresponding to the first position information of which the difference value between the second position information and the first position information is smaller than the preset threshold value.
6. The wireless network security protection method of claim 1, wherein the network information comprises network signal strength, the wireless network security protection method further comprising:
judging whether the network signal intensity is greater than a preset intensity;
and when the network signal intensity is greater than the preset intensity, judging that the wireless network to be connected meets the preset condition.
7. The wireless network security protection method of claim 6, wherein the step of determining that the wireless network to be connected satisfies the preset condition when the network signal strength is greater than the preset strength comprises:
and when the network signal intensity is greater than the preset intensity and the mobile network of the mobile terminal is in an open state, judging that the wireless network to be connected meets the preset condition.
8. The wireless network security protection method of claim 1, wherein the wireless network security protection method further comprises:
when the network information contains a preset link, adding the wireless network to be connected to a blacklist;
the preset link comprises an advertisement link and a link for acquiring basic information of the user.
9. A mobile terminal, characterized in that the mobile terminal comprises:
a touch screen;
a processor; and
a memory connected to the processor, the memory containing control instructions, and when the processor reads the control instructions, the memory controlling the mobile terminal to implement the wireless network security protection method according to any one of claims 1 to 8.
10. A computer-readable storage medium having one or more programs stored thereon for execution by one or more processors to perform the method of wireless network security of any of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011464440.4A CN112654045A (en) | 2020-12-14 | 2020-12-14 | Wireless network security protection method, mobile terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011464440.4A CN112654045A (en) | 2020-12-14 | 2020-12-14 | Wireless network security protection method, mobile terminal and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112654045A true CN112654045A (en) | 2021-04-13 |
Family
ID=75353875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011464440.4A Pending CN112654045A (en) | 2020-12-14 | 2020-12-14 | Wireless network security protection method, mobile terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112654045A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114125845A (en) * | 2021-10-21 | 2022-03-01 | 深圳中科德能科技有限公司 | Automatic networking method and device for intelligent equipment based on Internet of things |
CN114531712A (en) * | 2022-02-23 | 2022-05-24 | 北京小米移动软件有限公司 | Wireless communication method and apparatus, mobile terminal, and non-transitory readable storage medium |
-
2020
- 2020-12-14 CN CN202011464440.4A patent/CN112654045A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114125845A (en) * | 2021-10-21 | 2022-03-01 | 深圳中科德能科技有限公司 | Automatic networking method and device for intelligent equipment based on Internet of things |
CN114125845B (en) * | 2021-10-21 | 2024-01-16 | 深圳中科德能科技有限公司 | Intelligent equipment automatic networking method and device based on Internet of things |
CN114531712A (en) * | 2022-02-23 | 2022-05-24 | 北京小米移动软件有限公司 | Wireless communication method and apparatus, mobile terminal, and non-transitory readable storage medium |
CN114531712B (en) * | 2022-02-23 | 2024-02-06 | 北京小米移动软件有限公司 | Wireless communication method and device, mobile terminal and non-transitory readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108391025B (en) | Network access management method, mobile terminal and computer readable storage medium | |
CN112004173B (en) | Bluetooth headset switching method, mobile terminal and computer readable storage medium | |
CN107340833B (en) | Terminal temperature control method, terminal and computer readable storage medium | |
CN109618316B (en) | Network sharing method, mobile terminal and storage medium | |
CN109800602B (en) | Privacy protection method, mobile terminal and computer readable storage medium | |
CN109005574B (en) | Cell selection method, mobile terminal and computer readable storage medium | |
CN107506163B (en) | Method for adjusting screen display, terminal and computer readable storage medium | |
CN108600325B (en) | Push content determining method, server and computer readable storage medium | |
CN112399215A (en) | Screen projection parameter regulation and control method and device and computer readable storage medium | |
CN112162870A (en) | File processing operation method, mobile terminal and storage medium | |
CN108111986A (en) | A kind of conversion method of notification message, terminal and computer readable storage medium | |
CN112612598A (en) | Anti-addiction method, mobile terminal and computer-readable storage medium | |
CN112654045A (en) | Wireless network security protection method, mobile terminal and computer readable storage medium | |
CN110381202B (en) | Display adjustment method, mobile terminal and computer-readable storage medium | |
CN107466081B (en) | Wireless switching method and terminal | |
CN112770279B (en) | Network sharing method, mobile terminal and computer readable storage medium | |
CN112130728B (en) | Icon display method of folding screen and related device | |
CN112667339B (en) | Screen refresh rate setting method, terminal and computer readable medium | |
CN112888084A (en) | Full-band communication method and device and mobile terminal | |
CN108543306B (en) | Game brightness control method and device and computer readable storage medium | |
CN108183833B (en) | Response processing method and device and computer readable storage medium | |
CN107609180B (en) | Screening method, terminal and storage medium | |
CN112105013B (en) | Method for managing device network mode, mobile terminal and computer readable storage medium | |
CN109587345B (en) | Abnormal application prompting method, mobile terminal and computer readable storage medium | |
CN113676971A (en) | Network state regulation and control method, equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |