CN114339734A - Wireless communication network data sharing method and device based on mobile equipment - Google Patents

Wireless communication network data sharing method and device based on mobile equipment Download PDF

Info

Publication number
CN114339734A
CN114339734A CN202210209365.XA CN202210209365A CN114339734A CN 114339734 A CN114339734 A CN 114339734A CN 202210209365 A CN202210209365 A CN 202210209365A CN 114339734 A CN114339734 A CN 114339734A
Authority
CN
China
Prior art keywords
data
shared
mobile device
sharing
violation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210209365.XA
Other languages
Chinese (zh)
Inventor
饶世玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hengxuntong Electronics Co ltd
Original Assignee
Shenzhen Hengxuntong Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hengxuntong Electronics Co ltd filed Critical Shenzhen Hengxuntong Electronics Co ltd
Priority to CN202210209365.XA priority Critical patent/CN114339734A/en
Publication of CN114339734A publication Critical patent/CN114339734A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a wireless communication network data sharing method and device based on mobile equipment, which are applied to the field of wireless communication; obtaining a sharing request of a mobile device to be shared; allowing the mobile equipment needing to be shared to be connected, and identifying the mobile equipment needing to be shared; the identification is specifically used for judging whether the mobile equipment is trusted or not; monitoring the process of data sharing, and judging whether preset violation data exist in the shared data; wherein the violation data comprises being a trade secret, a military secret; if yes, acquiring all violation data in the shared data, and judging whether the shared data needs to be removed according to the scores corresponding to the violation data; if so, interrupting the connection of the mobile device to limit the sharing behavior of the mobile device.

Description

Wireless communication network data sharing method and device based on mobile equipment
Technical Field
The present invention relates to the field of wireless communications, and in particular, to a method and an apparatus for sharing data in a wireless communication network based on a mobile device.
Background
The mobile device or the mobile communication terminal refers to a computer device that can be used in mobile, and broadly includes a mobile phone, a notebook, a tablet computer, a POS machine, and even a vehicle-mounted computer. But most often refer to cell phones or smart phones and tablets with multiple application functions. With the development of networks and technologies towards increasingly broader bands, the mobile communications industry will move towards a true mobile information age. On the other hand, with the rapid development of integrated circuit technology, the processing power of mobile devices has already possessed strong processing power, and mobile devices are changing from simple telephony tools to integrated information processing platforms. This has also increased broader development space for the mobile device, and there is the risk in the data traffic sharing process between the mobile device, and data traffic sharing process is easy to be maliciously cracked by third party software, influences normal data traffic sharing process, causes harmful effects to the user of mobile device and experiences.
For example, the published invention CN201711102960.9 proposes a data traffic sharing method, a mobile device, and a storage apparatus. The method comprises the following steps: the first mobile equipment detects second mobile equipment within a preset range; the first mobile equipment judges whether the trust equipment list of the first mobile equipment comprises the detected second mobile equipment; and if the trusted device list comprises the second mobile device, the first mobile device establishes communication connection with the second mobile device so as to realize data traffic sharing to the second mobile device. Through the mode, the method and the device can improve the safety of the mobile equipment in the data flow sharing process.
However, in the process of sharing based on the wireless communication network, it is still impossible to prevent a person from maliciously utilizing the mobile device to share illegal or illegal data, and even if the data traffic sharing process cannot be maliciously cracked, the illegal or illegal data can still be shared out, so that lawbreakers can utilize the mobile device to be free from control outside the law.
Disclosure of Invention
The invention aims to solve the problem of illegal and illegal data transmission by utilizing mobile equipment, and provides a wireless communication network data sharing method and device based on the mobile equipment.
The invention adopts the following technical means for solving the technical problems:
the invention provides a wireless communication network data sharing method based on mobile equipment, which comprises the following steps:
obtaining a sharing request of a mobile device to be shared;
allowing the mobile equipment needing to be shared to be connected, and identifying the mobile equipment needing to be shared; the identification is specifically used for judging whether the mobile equipment is trusted or not;
monitoring the process of data sharing, and judging whether preset violation data exist in the shared data; wherein the violation data comprises being a trade secret, a military secret;
if yes, acquiring all violation data in the shared data, and judging whether the shared data needs to be removed according to the scores corresponding to the violation data;
if so, interrupting the connection of the mobile device to limit the sharing behavior of the mobile device.
Further, allowing the mobile device to be shared to connect, before the step of identifying the mobile device to be shared, the method includes:
collecting the connection number of the mobile equipment, and judging whether the mobile equipment is ever trusted equipment; the trusted device is specifically a connected non-violation device;
if so, allowing the mobile equipment to connect;
if not, detecting a data connection source of the mobile equipment; including but not limited to other mobile devices.
Further, if not, after the step of detecting the data connection source of the mobile device, the method includes:
judging whether a preset malicious data format exists in the mobile equipment or not; the malicious data format is specifically a data format of public third-party malicious software;
if yes, moving the mobile equipment out of the shared space; and if not, allowing the mobile equipment to be connected and keeping observing the mobile equipment.
Further, the step of monitoring the data sharing process and judging whether preset violation data exists in the shared data includes:
judging whether keywords exist in the shared data or not; the keywords include but are not limited to words or data that are not publicized outside;
if yes, the shared data is secret data which cannot be disclosed; if not, the shared data is reserved and observed.
Further, after the step of obtaining the sharing request of the mobile device to be shared, the method includes:
acquiring an IP address of a mobile device for sharing;
wirelessly connecting the mobile device to be shared with the sharing mobile device based on the IP address;
and closing the connection channel of the sharing mobile equipment until the sharing data is completely shared.
Further, if yes, all the illegal data in the shared data are obtained, and whether the shared data need to be removed or not is judged according to the score corresponding to the illegal data, wherein the step comprises the following steps:
obtaining a score corresponding to violation data;
adding all the scores to obtain a violation total score, and judging whether the violation total score is larger than a preset maximum violation score;
if so, the shared data is illegal data; if not, the shared data is non-violation data.
Further, if yes, the shared data is violation data; if not, the step of the shared data being non-violation data comprises:
detecting whether preset privacy data exist in the non-violation data; the private data includes, but is not limited to, personal private data, business financial data, or legal data;
if so, processing the non-violation data by violation data; if not, the non-violation data is shared normally.
Further, the step of monitoring the data sharing process and judging whether preset violation data exists in the shared data comprises the following steps:
monitoring data circulation of mobile equipment to be shared in real time, and judging whether the mobile equipment has illegal behaviors or not; the violation behavior is specifically a behavior of revealing shared data;
if so, temporarily disconnecting the connection of the mobile equipment; and if not, keeping observing the mobile equipment.
Further, if yes, temporarily disconnecting the connection of the mobile device; if not, the step of keeping observing the mobile device comprises:
requesting the mobile equipment needing to be shared to interrupt data circulation with other mobile equipment;
detecting whether the mobile equipment needing sharing transmits sharing data to other mobile equipment;
if yes, the connection with the mobile equipment needing to be shared is cut off urgently; and if not, keeping observing the mobile equipment needing sharing.
The invention also provides a wireless communication network data sharing device based on the mobile equipment, which comprises:
the first acquisition module is used for acquiring a sharing request of the mobile equipment needing to be shared;
the first identification module is used for allowing the mobile equipment needing to be shared to be connected and identifying the mobile equipment needing to be shared; the identification is specifically used for judging whether the mobile equipment is trusted or not;
the first judgment module is used for monitoring the data sharing process and judging whether preset violation data exist in the shared data or not; wherein the violation data is a trade secret, a military secret;
the second judgment module is used for acquiring all the violation data in the shared data if the shared data is the violation data, and judging whether the shared data needs to be removed according to the score corresponding to the violation data;
a first execution module, configured to interrupt the connection of the mobile device if needed, so as to limit a sharing behavior of the mobile device.
The invention provides a wireless communication network data sharing method and a wireless communication network data sharing device based on mobile equipment, which have the following beneficial effects:
according to the method and the device, whether malicious data formats and illegal data exist in the process of sharing data is detected to avoid that secret data is leaked by malicious software or that illegal data is shared by mobile equipment maliciously by someone in the process of sharing data, so that the situation that lawless persons are not controlled in the limp-home law is effectively avoided, and the situation that the illegal data is shared by the mobile equipment is reduced.
Drawings
FIG. 1 is a flowchart illustrating an embodiment of a data sharing method for a mobile-based wireless communication network according to the present invention;
fig. 2 is a block diagram of an embodiment of a data sharing apparatus for a mobile-based wireless communication network according to the present invention.
Detailed Description
It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be considered as limiting thereof, since the objects, features and advantages thereof will be further described with reference to the accompanying drawings.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a method for sharing data in a wireless communication network based on a mobile device according to an embodiment of the present invention includes:
s1: obtaining a sharing request of a mobile device to be shared;
s2: allowing the mobile equipment needing to be shared to be connected, and identifying the mobile equipment needing to be shared; the identification is specifically used for judging whether the mobile equipment is trusted or not;
s3: monitoring the process of data sharing, and judging whether preset violation data exist in the shared data; wherein the violation data comprises being a trade secret, a military secret;
s4: if yes, acquiring all violation data in the shared data, and judging whether the shared data needs to be removed according to the scores corresponding to the violation data;
s5: if so, interrupting the connection of the mobile device to limit the sharing behavior of the mobile device.
In this embodiment, after the step S1 of obtaining the sharing request of the mobile device to be shared, the method includes obtaining an IP address of the mobile device to be shared, wirelessly connecting the mobile device to be shared with the mobile device to be shared based on the IP address, and closing a connection channel of the mobile device to be shared until the shared data is completed; allowing the mobile device to be shared to connect, wherein the step S2 of identifying the mobile device to be shared includes acquiring a connection number of the mobile device, and determining whether the mobile device is a trusted device, which is specifically a connected non-violation device, if so, allowing the mobile device to connect, and if not, detecting a data connection source of the mobile device; monitoring a data sharing process, and judging whether preset illegal data exist in shared data or not in step S3, wherein the step S3 comprises the steps of judging whether a preset malicious data format exists in the mobile equipment or not, wherein the malicious data format is specifically a data format of public third-party malicious software, if so, moving the mobile equipment out of a shared space, and if not, keeping observing the mobile equipment; if yes, acquiring all violation data in the shared data, and judging whether the shared data needs to be removed according to the scores corresponding to the violation data in step S4.
In this embodiment, the step of allowing the mobile device to be shared to connect, before the step S2 of identifying the mobile device to be shared, includes:
s201: collecting the connection number of the mobile equipment, and judging whether the mobile equipment is ever trusted equipment; the trusted device is specifically a connected non-violation device;
s202: if so, allowing the mobile equipment to connect;
s203: if not, detecting a data connection source of the mobile equipment; including but not limited to other mobile devices.
In this embodiment, a connection number of a mobile device requesting connection is collected, and whether the connection number of the mobile device exists is searched based on a database to determine whether the mobile device is a trusted device; for example, if the connection number of the mobile device is searched in the database and the mobile device is connected to the mobile device once and the data record of the connection of the mobile device is not interrupted forcibly, the mobile device is a non-violation record user and trusts the mobile device; for example, if the connection number of the mobile device is not searched in the database, detecting whether the mobile device is simultaneously connected with other data connection sources; if the mobile device is connected to other data connection sources, such as a mobile phone, a notebook computer and the like, the connection request of the mobile device is rejected, and if the mobile device is not connected to other data connection sources, the connection request of the mobile device is approved.
In this embodiment, if not, after the step S203 of detecting the data connection source of the mobile device, the method includes:
s2031: judging whether a preset malicious data format exists in the mobile equipment or not; the malicious data format is specifically a data format of public third-party malicious software;
s2032: if yes, moving the mobile equipment out of the shared space; and if not, allowing the mobile equipment to be connected and keeping observing the mobile equipment.
In this embodiment, after allowing a mobile device to be shared to connect, detecting the mobile device, and determining whether a malicious data format, such as a trojan that has tampered with the data format, exists in the mobile device; for example, if a trojan with a tampered data format is detected in the mobile device, the mobile device is directly removed from the shared space; for example, if a trojan with a tampered data format is not detected in the mobile device, the observation is kept for the mobile device until the sharing process for the mobile device is finished.
In this embodiment, the step S3 of monitoring the data sharing process and determining whether there is preset violation data in the shared data includes:
s31: judging whether keywords exist in the shared data or not; the keywords include but are not limited to words or data that are not publicized outside;
s32: if yes, the shared data is secret data which cannot be disclosed; if not, the shared data is reserved and observed.
In the embodiment, shared data in the sharing process of the mobile equipment is detected, and keywords contained in the data are detected to judge whether the shared data is private data; for example, if the word eye of "secret agreement" is detected in the shared data, it can be determined that the shared data relates to secret data, such as commercial secret, national secret, etc., and if the shared data is secret data that cannot be disclosed, the continuous sharing of the data is stopped; for example, if a word eye that can be determined as confidential data is not detected in the shared data, the data is continuously shared while monitoring until the sharing process of the mobile device is finished.
In this embodiment, after the step S1 of acquiring the sharing request of the mobile device to be shared, the method includes:
s101: acquiring an IP address of a mobile device for sharing;
s102: wirelessly connecting the mobile device to be shared with the sharing mobile device based on the IP address;
s103: and closing the connection channel of the sharing mobile equipment until the sharing data is completely shared.
In this embodiment, the acquired IP address of the mobile device to be shared is added to the mobile device to be shared, the mobile device to be shared is connected to the mobile device to be shared, after the connection is completed, the channel of the mobile device to be shared connected to the IP address is closed, so as to ensure that the process of sharing data is not interrupted by the entry of other mobile devices, until the process of sharing data is completed, and after the mobile device to be shared exits from the connection channel of the mobile device to be shared, other mobile devices can connect to the mobile device to be shared through the IP address of the mobile device to be shared.
In this embodiment, if yes, the step S4 of acquiring all the violation data in the shared data, and determining whether the shared data needs to be removed according to the score corresponding to the violation data includes:
s41: obtaining a score corresponding to violation data;
s42: adding all the scores to obtain a violation total score, and judging whether the violation total score is larger than a preset maximum violation score;
s43: if so, the shared data is illegal data; if not, the shared data is non-violation data.
In this embodiment, under the condition that it is known that the shared mobile device has the violation factor, obtaining a score corresponding to the violation factor of the mobile device, comparing the score with a preset maximum violation score, and determining whether the violation score of the mobile device is greater than the preset maximum violation score; for example, the mobile device detects too many illegal data words in the process of sharing data, if many different data sensitive words occur, "forbid outward transmission", "keep confidentiality" or "do not get leaked", when the scores corresponding to the data sensitive words are added up to be larger than a preset illegal score, the data being shared by the mobile device is judged to be illegal data, and the sharing progress of the data is stopped immediately; for example, although the mobile device is detected to have illegal data words in the process of sharing data, if the score corresponding to the total illegal data words does not exceed the preset illegal score, the data being shared by the mobile device is judged to be non-illegal data, and the process of monitoring data sharing is kept until the data sharing is completed.
In this embodiment, if yes, the shared data is violation data; if not, step S43, in which the shared data is non-illegal data, includes:
s431: detecting whether preset privacy data exist in the non-violation data; the private data includes, but is not limited to, personal private data, business financial data, or legal data;
s432: if so, processing the non-violation data by violation data; if not, the non-violation data is shared normally.
In this embodiment, under the condition that it is known that the shared mobile device has violation factors and the violation score is not greater than the preset violation score, detecting whether the violation data of the mobile device contains preset privacy data to determine whether the mobile device needs to be processed in a violation manner although the violation score does not exceed the preset score; for example, detecting that the illegal data of the mobile equipment has personal information such as privacy personal data of 'identity card number', 'bank card password' and the like, processing the shared data by the illegal data, even if the corresponding value of the illegal word eye of the shared data does not exceed the preset illegal value; for example, if it is detected that the illegal data of the mobile device does not contain data information with personal privacy, the shared data is determined to be non-illegal data, and the process of monitoring data sharing is kept until the data sharing is completed.
In this embodiment, before the step S3 of monitoring the data sharing process and determining whether there is preset violation data in the shared data, the method includes:
s301: monitoring data circulation of mobile equipment to be shared in real time, and judging whether the mobile equipment has illegal behaviors or not; the violation behavior is specifically a behavior of revealing shared data;
s302: if so, temporarily disconnecting the connection of the mobile equipment; and if not, keeping observing the mobile equipment.
In this embodiment, the data flow of the mobile device is monitored to determine whether the mobile device is monitored by other mobile devices in the data sharing process so as to steal the shared data; for example, if the mobile device is detected to be connected with other mobile devices in the data sharing process of the mobile device, the data sharing process with the mobile device is immediately stopped, and the connection with the mobile device is temporarily disconnected, so that the confidentiality and the security of data are ensured; for example, if the mobile device is not detected to have a connection with other mobile devices during the data sharing process of the mobile device, the mobile device is kept to be observed until the data sharing of the mobile device is completed.
In this embodiment, if yes, the connection of the mobile device is temporarily disconnected; if not, the step S302 of keeping observing the mobile device includes:
s3021: requesting the mobile equipment needing to be shared to interrupt data circulation with other mobile equipment;
s3022: detecting whether the mobile equipment needing sharing transmits sharing data to other mobile equipment;
if yes, the connection with the mobile equipment needing to be shared is cut off urgently; and if not, keeping observing the mobile equipment needing sharing.
In this embodiment, when it is known that the shared mobile device has a midway connection with another mobile device, the mobile device is requested to actively interrupt the connection with the other mobile device to avoid the loss of the secret of the shared data to the other mobile device, and after the request, whether the mobile device is connected with the other mobile device is detected again; for example, if it is detected again that the mobile device is connected to other mobile devices, the connection with the mobile device is directly cut off to avoid the continuous loss of the shared data; e.g., again detecting that the mobile device is not connected to other mobile devices, the mobile device remains observed until the data sharing process is complete.
Referring to fig. 2, a mobile device based wireless communication network data sharing apparatus according to an embodiment of the present invention includes:
a first obtaining module 10, configured to obtain a sharing request of a mobile device to be shared;
a first identification module 20, configured to allow the mobile device to be shared to connect, and identify the mobile device to be shared; the identification is specifically used for judging whether the mobile equipment is trusted or not;
the first judging module 30 is configured to monitor a data sharing process, and judge whether preset violation data exists in shared data; wherein the violation data is a trade secret, a military secret;
a second judging module 40, configured to, if yes, obtain all the violation data in the shared data, and judge whether the shared data needs to be removed according to a score corresponding to the violation data;
a first executing module 50, configured to interrupt the connection of the mobile device if necessary, so as to limit the sharing behavior of the mobile device.
In this embodiment, the first obtaining module 10 obtains a sharing request of a mobile device to be shared, obtains an IP address of the mobile device to be shared, wirelessly connects the mobile device to be shared with the mobile device to be shared based on the IP address, and closes a connection channel of the mobile device to be shared until the shared data is completely shared; the first identification module 20 allows the mobile device to be shared to connect, identifies the mobile device to be shared, collects a connection number of the mobile device, and determines whether the mobile device is a trusted device, wherein the trusted device is specifically a connected non-violation device; the first judging module 30 monitors the data sharing process, judges whether preset illegal data exist in the shared data, and judges whether a preset malicious data format exists in the mobile device, wherein the malicious data format is specifically a data format of public third-party malicious software, if so, the mobile device is moved out of the shared space, and if not, the mobile device is kept to be observed; if the rule-breaking data is the non-rule-breaking data, the second judging module 40 acquires all the rule-breaking data in the shared data, judges whether the shared data needs to be removed according to the scores corresponding to the rule-breaking data, acquires the scores corresponding to the rule-breaking data, adds all the scores to obtain a rule-breaking total score, and judges whether the rule-breaking total score is larger than a preset maximum rule-breaking score, if so, the shared data is the rule-breaking data, and if not, the shared data is the non-rule-breaking data; the first execution module 50 interrupts the connection of the mobile device if necessary to limit the sharing behavior of the mobile device.
In this embodiment, the method further includes:
the third judgment module is used for collecting the connection number of the mobile equipment and judging whether the mobile equipment is trusted equipment; the trusted device is specifically a connected non-violation device;
a second execution module, configured to allow the mobile device to connect if the connection is successful;
a third execution module, configured to detect a data connection source of the mobile device if the mobile device is not connected to the mobile device; including but not limited to other mobile devices.
In this embodiment, a connection number of a mobile device requesting connection is collected, and whether the connection number of the mobile device exists is searched based on a database to determine whether the mobile device is a trusted device; for example, if the connection number of the mobile device is searched in the database and the mobile device is connected to the mobile device once and the data record of the connection of the mobile device is not interrupted forcibly, the mobile device is a non-violation record user and trusts the mobile device; for example, if the connection number of the mobile device is not searched in the database, detecting whether the mobile device is simultaneously connected with other data connection sources; if the mobile device is connected to other data connection sources, such as a mobile phone, a notebook computer and the like, the connection request of the mobile device is rejected, and if the mobile device is not connected to other data connection sources, the connection request of the mobile device is approved.
In this embodiment, the third executing module further includes:
the first judging unit is used for judging whether a preset malicious data format exists in the mobile equipment or not; the malicious data format is specifically a data format of public third-party malicious software;
a first execution unit, configured to move the mobile device out of a shared space if the mobile device is in the shared space; and if not, allowing the mobile equipment to be connected and keeping observing the mobile equipment.
In this embodiment, after allowing a mobile device to be shared to connect, detecting the mobile device, and determining whether a malicious data format, such as a trojan that has tampered with the data format, exists in the mobile device; for example, if a trojan with a tampered data format is detected in the mobile device, the mobile device is directly removed from the shared space; for example, if a trojan with a tampered data format is not detected in the mobile device, the observation is kept for the mobile device until the sharing process for the mobile device is finished.
In this embodiment, the first determining module further includes:
a second judging unit, configured to judge whether a keyword exists in the shared data; the keywords include but are not limited to words or data that are not publicized outside;
a second execution unit, configured to, if yes, determine that the shared data is secret data that is not publicly available; if not, the shared data is reserved and observed.
In the embodiment, shared data in the sharing process of the mobile equipment is detected, and keywords contained in the data are detected to judge whether the shared data is private data; for example, if the word eye of "secret agreement" is detected in the shared data, it can be determined that the shared data relates to secret data, such as commercial secret, national secret, etc., and if the shared data is secret data that cannot be disclosed, the continuous sharing of the data is stopped; for example, if a word eye that can be determined as confidential data is not detected in the shared data, the data is continuously shared while monitoring until the sharing process of the mobile device is finished.
In this embodiment, the method further includes:
the second acquisition module is used for acquiring the IP address of the shared mobile equipment;
the first connection module is used for wirelessly connecting the mobile equipment needing to be shared with the mobile equipment conducting sharing based on the IP address;
and the first closing module is used for closing the connection channel of the shared mobile equipment until the shared data is completely shared.
In this embodiment, the acquired IP address of the mobile device to be shared is added to the mobile device to be shared, the mobile device to be shared is connected to the mobile device to be shared, after the connection is completed, the channel of the mobile device to be shared connected to the IP address is closed, so as to ensure that the process of sharing data is not interrupted by the entry of other mobile devices, until the process of sharing data is completed, and after the mobile device to be shared exits from the connection channel of the mobile device to be shared, other mobile devices can connect to the mobile device to be shared through the IP address of the mobile device to be shared.
In this embodiment, the second determining module further includes:
the first acquisition unit is used for acquiring a score corresponding to the violation data;
the third judgment unit is used for summing all the scores to obtain a violation total score and judging whether the violation total score is larger than a preset maximum violation score;
a third execution unit, configured to, if yes, determine that the shared data is violation data; if not, the shared data is non-violation data.
In this embodiment, under the condition that it is known that the shared mobile device has the violation factor, obtaining a score corresponding to the violation factor of the mobile device, comparing the score with a preset maximum violation score, and determining whether the violation score of the mobile device is greater than the preset maximum violation score; for example, the mobile device detects too many illegal data words in the process of sharing data, if many different data sensitive words occur, "forbid outward transmission", "keep confidentiality" or "do not get leaked", when the scores corresponding to the data sensitive words are added up to be larger than a preset illegal score, the data being shared by the mobile device is judged to be illegal data, and the sharing progress of the data is stopped immediately; for example, although the mobile device is detected to have illegal data words in the process of sharing data, if the score corresponding to the total illegal data words does not exceed the preset illegal score, the data being shared by the mobile device is judged to be non-illegal data, and the process of monitoring data sharing is kept until the data sharing is completed.
In this embodiment, the third execution unit further includes:
the first judgment subunit is used for detecting whether preset privacy data exist in the non-violation data; the private data includes, but is not limited to, personal private data, business financial data, or legal data;
the first execution subunit is used for processing the non-violation data by the violation data if the non-violation data is processed by the violation data; if not, the non-violation data is shared normally.
In this embodiment, under the condition that it is known that the shared mobile device has violation factors and the violation score is not greater than the preset violation score, detecting whether the violation data of the mobile device contains preset privacy data to determine whether the mobile device needs to be processed in a violation manner although the violation score does not exceed the preset score; for example, detecting that the illegal data of the mobile equipment has personal information such as privacy personal data of 'identity card number', 'bank card password' and the like, processing the shared data by the illegal data, even if the corresponding value of the illegal word eye of the shared data does not exceed the preset illegal value; for example, if it is detected that the illegal data of the mobile device does not contain data information with personal privacy, the shared data is determined to be non-illegal data, and the process of monitoring data sharing is kept until the data sharing is completed.
In this embodiment, the first determining module further includes:
the fourth judging unit is used for monitoring the data circulation of the mobile equipment to be shared in real time and judging whether the mobile equipment has illegal behaviors or not; the violation behavior is specifically a behavior of revealing shared data;
a fourth executing unit, configured to temporarily disconnect the connection of the mobile device if the connection is established; and if not, keeping observing the mobile equipment.
In this embodiment, the data flow of the mobile device is monitored to determine whether the mobile device is monitored by other mobile devices in the data sharing process so as to steal the shared data; for example, if the mobile device is detected to be connected with other mobile devices in the data sharing process of the mobile device, the data sharing process with the mobile device is immediately stopped, and the connection with the mobile device is temporarily disconnected, so that the confidentiality and the security of data are ensured; for example, if the mobile device is not detected to have a connection with other mobile devices during the data sharing process of the mobile device, the mobile device is kept to be observed until the data sharing of the mobile device is completed.
In this embodiment, the fourth execution unit further includes:
the first request subunit is used for requesting the mobile equipment needing to be shared to interrupt data flow with other mobile equipment;
a second determining subunit, configured to detect whether the mobile device that needs to be shared transmits shared data to the other mobile devices;
the second execution subunit is used for emergently disconnecting the connection with the mobile equipment needing to be shared if the mobile equipment needs to be shared; and if not, keeping observing the mobile equipment needing sharing.
In this embodiment, when it is known that the shared mobile device has a midway connection with another mobile device, the mobile device is requested to actively interrupt the connection with the other mobile device to avoid the loss of the secret of the shared data to the other mobile device, and after the request, whether the mobile device is connected with the other mobile device is detected again; for example, if it is detected again that the mobile device is connected to other mobile devices, the connection with the mobile device is directly cut off to avoid the continuous loss of the shared data; e.g., again detecting that the mobile device is not connected to other mobile devices, the mobile device remains observed until the data sharing process is complete.

Claims (10)

1. A method for sharing data in a wireless communication network based on a mobile device, comprising the steps of:
obtaining a sharing request of a mobile device to be shared;
allowing the mobile equipment needing to be shared to be connected, and identifying the mobile equipment needing to be shared; the identification is specifically used for judging whether the mobile equipment is trusted or not;
monitoring the process of data sharing, and judging whether preset violation data exist in the shared data; wherein the violation data comprises being a trade secret, a military secret;
if yes, acquiring all violation data in the shared data, and judging whether the shared data needs to be removed according to the scores corresponding to the violation data;
if so, interrupting the connection of the mobile device to limit the sharing behavior of the mobile device.
2. The method for sharing data in a wireless communication network based on mobile devices according to claim 1, wherein said step of allowing said mobile device to be shared to connect to identify said mobile device to be shared comprises:
collecting the connection number of the mobile equipment, and judging whether the mobile equipment is ever trusted equipment; the trusted device is specifically a connected non-violation device;
if so, allowing the mobile equipment to connect;
if not, detecting a data connection source of the mobile equipment; the data connection source includes other mobile devices.
3. The method of claim 2, wherein the step of detecting the data connection source of the mobile device if no comprises:
judging whether a preset malicious data format exists in the mobile equipment or not; the malicious data format is specifically a data format of public third-party malicious software;
if yes, moving the mobile equipment out of the shared space; and if not, allowing the mobile equipment to be connected and keeping observing the mobile equipment.
4. The method for sharing data in a wireless communication network based on a mobile device according to claim 1, wherein the step of monitoring the data sharing and determining whether there is preset violation data in the shared data includes:
judging whether keywords exist in the shared data or not; the keywords include but are not limited to words or data that are not publicized outside;
if yes, the shared data is secret data which cannot be disclosed; if not, the shared data is reserved and observed.
5. The method for sharing data in a wireless communication network based on mobile devices according to claim 1, wherein the step of obtaining the request for sharing of the mobile device to be shared comprises:
acquiring an IP address of a mobile device for sharing;
wirelessly connecting the mobile device to be shared with the sharing mobile device based on the IP address;
and closing the connection channel of the sharing mobile equipment until the sharing data is completely shared.
6. The method for sharing data in a wireless communication network based on a mobile device according to claim 1, wherein if yes, obtaining all the illegal data in the shared data, and determining whether the shared data needs to be removed according to a score corresponding to the illegal data includes:
obtaining a score corresponding to violation data;
adding all the scores to obtain a violation total score, and judging whether the violation total score is larger than a preset maximum violation score;
if so, the shared data is illegal data; if not, the shared data is non-violation data.
7. The method of claim 6, wherein if the data is illegal, the shared data is illegal; if not, the step of the shared data being non-violation data comprises:
detecting whether preset privacy data exist in the non-violation data; the private data includes, but is not limited to, personal private data, business financial data, or legal data;
if so, processing the non-violation data by violation data; if not, the non-violation data is shared normally.
8. The method for sharing data in a wireless communication network based on a mobile device according to claim 1, wherein the step of monitoring the data sharing process and determining whether preset violation data exists in the shared data before the step of determining whether preset violation data exists in the shared data includes:
monitoring data circulation of mobile equipment to be shared in real time, and judging whether the mobile equipment has illegal behaviors or not; the violation behavior is specifically a behavior of revealing shared data;
if so, temporarily disconnecting the connection of the mobile equipment; and if not, keeping observing the mobile equipment.
9. The method of claim 8, wherein if so, temporarily disconnecting the mobile device; if not, the step of keeping observing the mobile device comprises:
requesting the mobile equipment needing to be shared to interrupt data circulation with other mobile equipment;
detecting whether the mobile equipment needing sharing transmits sharing data to other mobile equipment;
if yes, the connection with the mobile equipment needing to be shared is cut off urgently; and if not, keeping observing the mobile equipment needing sharing.
10. An apparatus for data sharing in a wireless communication network based on a mobile device, comprising:
the first acquisition module is used for acquiring a sharing request of the mobile equipment needing to be shared;
the first identification module is used for allowing the mobile equipment needing to be shared to be connected and identifying the mobile equipment needing to be shared; the identification is specifically used for judging whether the mobile equipment is trusted or not;
the first judgment module is used for monitoring the data sharing process and judging whether preset violation data exist in the shared data or not; wherein the violation data comprises being a trade secret, a military secret;
the second judgment module is used for acquiring all the violation data in the shared data if the shared data is the violation data, and judging whether the shared data needs to be removed according to the score corresponding to the violation data;
a first execution module, configured to interrupt the connection of the mobile device if needed, so as to limit a sharing behavior of the mobile device.
CN202210209365.XA 2022-03-04 2022-03-04 Wireless communication network data sharing method and device based on mobile equipment Pending CN114339734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210209365.XA CN114339734A (en) 2022-03-04 2022-03-04 Wireless communication network data sharing method and device based on mobile equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210209365.XA CN114339734A (en) 2022-03-04 2022-03-04 Wireless communication network data sharing method and device based on mobile equipment

Publications (1)

Publication Number Publication Date
CN114339734A true CN114339734A (en) 2022-04-12

Family

ID=81030011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210209365.XA Pending CN114339734A (en) 2022-03-04 2022-03-04 Wireless communication network data sharing method and device based on mobile equipment

Country Status (1)

Country Link
CN (1) CN114339734A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704930A (en) * 2017-09-25 2018-02-16 阿里巴巴集团控股有限公司 Modeling method, device, system and electronic equipment based on shared data
CN109413087A (en) * 2018-11-16 2019-03-01 京东城市(南京)科技有限公司 Data sharing method, device, digital gateway and computer readable storage medium
CN109495487A (en) * 2018-12-03 2019-03-19 杭州数梦工场科技有限公司 Manage the method and device of data
CN110020553A (en) * 2019-04-12 2019-07-16 山东浪潮云信息技术有限公司 A kind of method and system for protecting sensitive data
CN110175327A (en) * 2019-05-11 2019-08-27 复旦大学 A kind of data privacy quantitative estimation method based on privacy information detection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704930A (en) * 2017-09-25 2018-02-16 阿里巴巴集团控股有限公司 Modeling method, device, system and electronic equipment based on shared data
CN109413087A (en) * 2018-11-16 2019-03-01 京东城市(南京)科技有限公司 Data sharing method, device, digital gateway and computer readable storage medium
CN109495487A (en) * 2018-12-03 2019-03-19 杭州数梦工场科技有限公司 Manage the method and device of data
CN110020553A (en) * 2019-04-12 2019-07-16 山东浪潮云信息技术有限公司 A kind of method and system for protecting sensitive data
CN110175327A (en) * 2019-05-11 2019-08-27 复旦大学 A kind of data privacy quantitative estimation method based on privacy information detection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高枫等: "数据共享应用中的隐私保护方法", 《东南大学学报(自然科学版)》 *

Similar Documents

Publication Publication Date Title
US10375116B2 (en) System and method to provide server control for access to mobile client data
CN110113167B (en) Information protection method and system of intelligent terminal and readable storage medium
US8997181B2 (en) Assessing the security state of a mobile communications device
CN105447406A (en) Method and apparatus for accessing storage space
CN112468995B (en) Searchable encryption privacy protection method and system based on Internet of vehicles
JP2008541273A5 (en)
KR100745044B1 (en) Apparatus and method for protecting access of phishing site
CN101257678A (en) Method, terminal and system for realizing mobile terminal software safe detection
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
CN111274046A (en) Service call validity detection method and device, computer equipment and computer storage medium
CN106488394A (en) A kind of method and device of equipment connection
CN114021184A (en) Data management method and device, electronic equipment and storage medium
CN109861947B (en) Network hijacking processing method and device and electronic equipment
CN115277143A (en) Data secure transmission method, device, equipment and storage medium
CN108900595B (en) Method, device and equipment for accessing data of cloud storage server and computing medium
CN114339734A (en) Wireless communication network data sharing method and device based on mobile equipment
CN107995616A (en) The processing method and device of user behavior data
CN111064731B (en) Identification method and identification device for access authority of browser request and terminal
CN116246745A (en) High-security storage database system based on medical data
CN113807856A (en) Resource transfer method, device and equipment
RU2818860C1 (en) Method of preventing leakage of confidential data when using telecommunication communication networks
CN116401651B (en) Information storage safety protection method, system and storage medium
CN115022004B (en) Data processing method, device and server
CN111242770B (en) Risk equipment identification method and device, electronic equipment and readable storage medium
CN115174070A (en) Method and device for processing personal information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220412