CN116321161B - Method and device for detecting safety protection level of target environment - Google Patents

Method and device for detecting safety protection level of target environment Download PDF

Info

Publication number
CN116321161B
CN116321161B CN202211690810.5A CN202211690810A CN116321161B CN 116321161 B CN116321161 B CN 116321161B CN 202211690810 A CN202211690810 A CN 202211690810A CN 116321161 B CN116321161 B CN 116321161B
Authority
CN
China
Prior art keywords
wireless network
attack
level
wifi wireless
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211690810.5A
Other languages
Chinese (zh)
Other versions
CN116321161A (en
Inventor
黄国栋
王抑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Lepeng Information Technology Co ltd
Original Assignee
Guangzhou Lepeng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Lepeng Information Technology Co ltd filed Critical Guangzhou Lepeng Information Technology Co ltd
Priority to CN202211690810.5A priority Critical patent/CN116321161B/en
Publication of CN116321161A publication Critical patent/CN116321161A/en
Application granted granted Critical
Publication of CN116321161B publication Critical patent/CN116321161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the invention relates to the technical field of network security, and discloses a method for detecting the security protection level of a target environment, which comprises the following steps: receiving a network access request of an intelligent terminal based on a specific target environment; performing security detection on the wifi wireless network environment to determine the security protection level of the current target environment; if the safety protection level reaches the set value, sending connection information to the corresponding intelligent terminal so that the intelligent terminal can be accessed to the corresponding wifi wireless network, and if the safety protection level does not reach the set value, sending alarm information to the corresponding intelligent terminal. The detection method of the safety protection level of the target environment in the embodiment of the invention determines whether the target environment is safe or not by carrying out safety detection on the wireless network environment to be accessed, and reminds a user of carrying out wireless connection when determining that the safety level exceeds the set level; by the method, the safety of wireless network communication is greatly improved, and the personal information safety of users is ensured.

Description

Method and device for detecting safety protection level of target environment
Technical Field
The invention relates to the technical field of network security, in particular to a method and a device for detecting the security protection level of a target environment.
Background
At present, the method is hijacked and monitored by a hacker, and then the personal data, bank account and network payment account password of the user are stolen through analysis software, so that the fund is stolen and brushed; the user is further greatly damaged economically, the existing common practice is that the payment operation is carried out through the mobile phone network rather than the public network, but certain inconvenience is caused to the user; and the user is required to pay attention to the network state of the mobile phone continuously, so that the user has a certain payment risk. Therefore, designing a solution capable of detecting the protection level of the target environment to increase the transaction security of the user is a technical problem to be solved by those skilled in the art.
Disclosure of Invention
Aiming at the defects, the embodiment of the invention discloses a detection method for the safety protection level of a target environment, which can realize accurate reminding of a user by predetermining the safety condition of a wifi wireless network, thereby greatly improving the safety of payment of the user through the wireless network.
The first aspect of the embodiment of the invention discloses a method for detecting the safety protection level of a target environment, which comprises the following steps:
Receiving a network access request of an intelligent terminal based on a specific target environment, wherein the target environment is a wifi wireless network environment, and the network access request comprises a physical address of a wifi wireless network of a specified SSID searched by a mobile terminal;
performing security detection on the wifi wireless network environment to determine the security protection level of the current target environment, wherein the security protection level is obtained through the following steps: matching the obtained physical address with the protection data stored in the security database to determine the security protection level associated with the physical address; or, sending a security attack instruction to the corresponding wifi wireless network to perform network attack operation so as to obtain an attack result, and determining the security protection level of the corresponding wifi wireless network according to the attack result;
if the security protection level reaches the set value, sending connection information to the corresponding intelligent terminal so that the intelligent terminal can be connected to the corresponding wifi wireless network, and if the security protection level does not reach the set value, sending alarm information to the corresponding intelligent terminal so as to remind a user that the wifi wireless network has danger.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the protection data stored in the security database includes a historical physical address and a security protection level, where the historical physical address corresponds to the security protection level one to one;
After the security attack instruction is sent to the corresponding wifi wireless network to perform network attack operation to obtain an attack result, and the security protection level of the corresponding wifi wireless network is determined according to the attack result, the method comprises the following steps:
invoking an uplink intelligent contract running at the blockchain system to perform a chaining operation on the security protection level, the physical address of the wifi wireless network and the product serial number of the intelligent terminal so as to store the security protection level, the physical address of the wifi wireless network and the product serial number of the intelligent terminal into the blockchain system; wherein the intelligent contract is a contract program running on the blockchain system.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, after the performing security detection on the wifi wireless network environment to determine a security protection level of the current target environment, the method further includes:
acquiring a plurality of data packets in a communication link of the wifi wireless network within a set time;
acquiring a wifi flow value of a set type from the data packets, if the wifi flow value exceeds a flow threshold, determining that the wifi wireless network is currently attacked by password cracking, and carrying out alarm reminding on the wifi wireless network;
Acquiring wireless access point information and data packet sequence information of each data packet from the plurality of data packets, acquiring data packet sequence number difference values of the wireless access point at different moments according to the wireless access point information and the data packet sequence information, and if the difference values are larger than a preset difference value, determining that WIFI is currently attacked by fishing, and alarming and reminding the WIFI.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the detection method further includes:
receiving position information associated with a wireless access point and an SSID associated with the wireless access point according to interaction conditions of the intelligent terminal and the wireless access point;
determining whether a corresponding SSID exists in a pre-stored relation mapping table or not, wherein the relation mapping table comprises the mapping relation between position information and SSID; if yes, carrying out safety detection on the wifi wireless network environment to determine the safety protection level of the current target environment;
if not, when the security protection level reaches a set value, updating the relation mapping table according to the SSID and the position information of the wireless access point.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, after the sending connection information to the corresponding intelligent terminal so that the intelligent terminal accesses the corresponding wifi wireless network, the method further includes:
When the intelligent terminal detects that the user performs the payment operation, the information generated by the payment operation is encrypted.
In an optional implementation manner, in a first aspect of the embodiment of the present invention, the sending a security attack instruction to a corresponding wifi wireless network to perform a network attack operation to obtain an attack result includes:
sending a first-level attack instruction to a corresponding wifi wireless network to perform network attack operation so as to obtain a first-level attack result, wherein the first-level attack instruction comprises a plurality of replay attack instructions, a denial of server attack instruction, a brute force cracking instruction and a phishing attack instruction;
sending a secondary attack instruction to a corresponding wifi wireless network to perform network attack operation so as to obtain a secondary attack result, wherein the secondary attack instruction comprises a plurality of MOTS attack instructions, KRACK attack instructions and edge relay attack instructions;
and obtaining an attack result according to the primary attack result and the secondary attack result.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the determining, according to the attack result, a security protection level of a corresponding wifi wireless network includes:
when the first-level attack results are that all attacks are successful, determining first-level security protection of the corresponding wifi wireless network;
When the first-level attack result is that part of attacks are successful, determining the second-level security protection of the corresponding wifi wireless network;
when the primary attack result is that all attacks fail and the secondary attack result is that all attacks succeed, determining three-level security protection of the corresponding wifi wireless network;
when the primary attack result is that all attacks fail and the secondary attack result is that part of attacks succeed, determining four-level security protection of the corresponding wifi wireless network;
and when the primary attack result is all attack failure and the secondary attack result is all attack failure, determining five-level security protection of the corresponding wifi wireless network.
A second aspect of the embodiments of the present invention discloses a system for detecting a target environmental safety protection level, including:
and a receiving module: the method comprises the steps that a network access request of an intelligent terminal based on a specific target environment is received, wherein the target environment is a wifi wireless network environment, and the network access request comprises a physical address of a wifi wireless network of a specific SSID searched by a mobile terminal;
and a safety detection module: the method is used for carrying out safety detection on the wifi wireless network environment to determine the safety protection level of the current target environment, wherein the safety protection level is obtained through the following steps: matching the obtained physical address with the protection data stored in the security database to determine the security protection level associated with the physical address; or, sending a security attack instruction to the corresponding wifi wireless network to perform network attack operation so as to obtain an attack result, and determining the security protection level of the corresponding wifi wireless network according to the attack result;
And a judging module: and if the safety protection level does not reach the set value, sending alarm information to the corresponding intelligent terminal to remind a user that the wifi wireless network is dangerous.
A third aspect of an embodiment of the present invention discloses an electronic device, including: a memory storing executable program code; a processor coupled to the memory; the processor invokes the executable program code stored in the memory to perform the method for detecting the security protection level of the target environment disclosed in the first aspect of the embodiment of the present invention.
A fourth aspect of the embodiment of the present invention discloses a computer-readable storage medium storing a computer program, where the computer program causes a computer to execute the method for detecting the safety protection level of the target environment disclosed in the first aspect of the embodiment of the present invention.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
the detection method of the safety protection level of the target environment in the embodiment of the invention determines whether the target environment is safe or not by carrying out safety detection on the wireless network environment to be accessed, and reminds a user of carrying out wireless connection when determining that the safety level exceeds the set level; by the method, the safety of wireless network communication is greatly improved, and the personal information safety of users is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for detecting a target environmental safety protection level according to an embodiment of the present invention;
FIG. 2 is a flow chart of a current network state determination disclosed in an embodiment of the present invention;
FIG. 3 is a schematic flow chart of a relationship mapping table update disclosed in an embodiment of the present invention;
FIG. 4 is a schematic flow diagram of a multi-level attack disclosed in an embodiment of the present invention;
FIG. 5 is a flow chart of a security level determination disclosed in an embodiment of the present invention;
fig. 6 is a schematic flow chart of an information transmission authentication method based on a multiple encryption mechanism according to an embodiment of the present invention;
FIG. 7 is a schematic flow chart of encrypted authentication image acquisition according to an embodiment of the present invention;
FIG. 8 is a schematic flow chart of pixel point location variation according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of a decryption key acquisition flow disclosed in an embodiment of the present invention;
FIG. 10 is a schematic flow diagram of multi-dimensional authentication as disclosed in an embodiment of the present invention;
FIG. 11 is a schematic structural diagram of a device for detecting a safety protection level of a target environment according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that the terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present invention are used for distinguishing between different objects and not necessarily for describing a particular sequential or chronological order. The terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
The existing common practice is that the payment operation is carried out through the network of the mobile phone rather than the public network as much as possible, but certain inconvenience is caused to the user; and the user is required to pay attention to the network state of the mobile phone continuously, so that the user has a certain payment risk. Based on the above, the embodiment of the invention discloses a detection method, a detection device, an electronic device and a storage medium for the safety protection level of a target environment, which are used for determining whether the target environment is safe or not through carrying out safety detection on a wireless network environment to be accessed, and reminding a user of carrying out wireless connection when the safety level exceeds a set level; by the method, the safety of wireless network communication is greatly improved, and the personal information safety of users is ensured.
Example 1
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for detecting a target environmental safety protection level according to an embodiment of the invention. The execution main body of the method described in the embodiment of the invention is an execution main body composed of software or/and hardware, and the execution main body can receive related information in a wired or/and wireless mode and can send a certain instruction. Of course, it may also have certain processing and storage functions. The execution body may control a plurality of devices, such as a remote physical server or cloud server and related software, or may be a local host or server and related software that performs related operations on a device that is located somewhere, etc. In some scenarios, multiple storage devices may also be controlled, which may be located in the same location or in different locations than the devices. As shown in fig. 1, the method for detecting the safety protection level based on the target environment comprises the following steps:
S101: receiving a network access request of an intelligent terminal based on a specific target environment, wherein the target environment is a wifi wireless network environment, and the network access request comprises a physical address of a wifi wireless network of a specified SSID searched by a mobile terminal;
the method mainly comprises the steps of determining wireless network information to be connected by a user, wherein when the user enters a wireless network environment, wireless network connection is needed in general; the user can select specific wifi to connect according to the searched wireless network information, and when the user connects, the physical address of the wifi wireless network of the appointed ssid can be obtained.
S102: performing security detection on the wifi wireless network environment to determine the security protection level of the current target environment, wherein the security protection level is obtained through the following steps: matching the obtained physical address with the protection data stored in the security database to determine the security protection level associated with the physical address; or, sending a security attack instruction to the corresponding wifi wireless network to perform network attack operation so as to obtain an attack result, and determining the security protection level of the corresponding wifi wireless network according to the attack result;
The method mainly comprises the steps of determining whether the current wifi network environment is safe or not, and performing specific safety monitoring in two ways, wherein the first step is to directly match the current wifi network environment with physical addresses and the like stored in a database for determination, the data in the safety database are historical safety databases, and the corresponding safety level is determined and maintained by detecting the wifi wireless networks in all places; because wifi is ubiquitous, the wifi safety database here is generally directed at public wifi, and wifi data in places such as malls, hotels, airports or restaurants generally exist in the wifi, and personal wifi is generally private and does not need to be detected safely. Therefore, the virtual key for safety monitoring can be set at the intelligent terminal to perform active safety detection, and the mode can enable the user to operate more conveniently. The second is to use an active security attack, because in the implementation, especially in the early implementation stage, there is not enough data stored, which makes it necessary to use some security detection means to perform security detection, where the security detection is to simulate only some network attack behavior and not perform substantial attack.
More preferably, fig. 4 is a schematic flow chart of a multi-level attack disclosed in the embodiment of the present invention, as shown in fig. 4, the sending a security attack instruction to a corresponding wifi wireless network to perform a network attack operation to obtain an attack result, including:
s102a: sending a first-level attack instruction to a corresponding wifi wireless network to perform network attack operation so as to obtain a first-level attack result, wherein the first-level attack instruction comprises a plurality of replay attack instructions, a denial of server attack instruction, a brute force cracking instruction and a phishing attack instruction;
s102b: sending a secondary attack instruction to a corresponding wifi wireless network to perform network attack operation so as to obtain a secondary attack result, wherein the secondary attack instruction comprises a plurality of MOTS attack instructions, KRACK attack instructions and edge relay attack instructions;
s102c: and obtaining an attack result according to the primary attack result and the secondary attack result.
In the embodiment of the invention, the security protection level of the wifi network environment is determined by performing multi-level attack, wherein the primary attack instruction is mainly a conventional attack mode, wherein replay attack is mainly that an a computer intercepts a message in the process of sending the message to a b computer host, and then sends the message to the b host in the process of invading, so that the b host mistakenly considers the c host as an a host for sending the message, and directly sends the message which is originally needed to be sent to the a host to the c host. And the attacker of the host c can enter the server of the host b and the wireless local area network through the message, intercept and obtain a lot of data packets, send the data packet to the party that receives the data repeatedly, thus cause the phenomenon of network blocking. The attack technology of the denial server in the embodiment of the invention can cause serious influence on the wireless wifi system, and the principle of the attack is to search wireless wifi data frames without encryption or to crack an encryption key, so that an attacker performs forgery processing on the attack frames, sends frames canceling identity verification to the inside of the wireless wifi system, and causes the terminal to be converted into a state without authentication. If an attacker continuously broadcasts cancellation verification frames to the inside of the network, the terminal cannot be well connected with the wireless access point.
The wireless wifi brute force cracking is an attack paradigm which is frequently generated at present, and an attacker can continuously try to log in a wireless wifi system through a password dictionary, for example, a wireless wifi master key and the like are adopted to log in the system; mode of authentication through WPA-PSK.
In the application process of the phishing attack, the user information is mainly stolen or the network credentials of the user are stolen, and in general, the phishing attack needs to be matched with other types of attack technologies to achieve the purpose of the phishing attack. For example, in the Wi-Fiphicher phishing attack technology, in the process of attacking the wireless network, the attack of a man-in-the-middle is firstly carried out through EvilTwaitAttack technical measures, and then all user Http requests are redirected, so that the user can access the phishing page by utilizing the wireless network system.
In general, if a wireless network attacker has acquired communication information of a related terminal and a wireless access point, the wireless network attacker can randomly receive and issue data packets of 802.11MAC level through special equipment, can quickly find that a user sends out various sensitive operations such as DNS requests, and then sends out a fake DNS response packet, so that the user can access fake IP at the terminal.
The KRACK attack instruction is also called a key reloading attack technology, and the key reloading attack technology is based on WPA2, wherein the basic attack principle is that in the process of carrying out WPA2 attack, the corresponding attack purpose is achieved through four-way handshake in 802.11, and meanwhile, the negotiation verification of PTK session keys is carried out by the aid of the four-way handshake of a user terminal part and a wireless access point part.
In order to prevent the WPA2 replay attack, a corresponding sequence number is set in the side relay attack instruction in general, and the wireless access point can only receive a data packet with a larger sequence number than the previous sequence number in an effective control manner, but an attacker may also acquire the data packet received by the wireless access point by utilizing the characteristics, change the sequence number of the transmitted data packet, and finally make the wireless access point unable to receive the normal data packet for a long time. Verifying the security of the corresponding target environment in the multi-level attack combination mode; when a specific wireless network can resist various secondary attacks, the security coefficient is higher, and the protection level is good. In addition to the superposition between the above-mentioned attacks, the level of security protection can be determined in combination based on the time of cracking.
More preferably, fig. 5 is a schematic flow chart of security protection level determination disclosed in the embodiment of the present invention, as shown in fig. 5, where the determining, according to the attack result, the security protection level of the corresponding wifi wireless network includes:
s102d: when the first-level attack results are that all attacks are successful, determining first-level security protection of the corresponding wifi wireless network;
S102: when the first-level attack result is that part of attacks are successful, determining the second-level security protection of the corresponding wifi wireless network; most preferably, when the wifi can resist the fishing attack, the wifi can be determined to have certain guarantee for guaranteeing the security of the user internet information, so that the wifi can be determined to be a secondary security protection; as being unable to withstand phishing attacks is of greater importance to users of the general access network.
S102f: when the primary attack result is that all attacks fail and the secondary attack result is that all attacks succeed, determining three-level security protection of the corresponding wifi wireless network;
s102g: when the primary attack result is that all attacks fail and the secondary attack result is that part of attacks succeed, determining four-level security protection of the corresponding wifi wireless network;
s102h: and when the primary attack result is all attack failure and the secondary attack result is all attack failure, determining five-level security protection of the corresponding wifi wireless network.
By adopting the setting of the multi-level security protection level, a user can clearly know the security protection condition of the network environment to be accessed currently, and then the user can determine whether to carry out communication connection according to the actual condition.
More preferably, the protection data stored in the security database comprises a historical physical address and a security protection level, wherein the historical physical address corresponds to the security protection level one by one;
after the security attack instruction is sent to the corresponding wifi wireless network to perform network attack operation to obtain an attack result, and the security protection level of the corresponding wifi wireless network is determined according to the attack result, the method comprises the following steps:
invoking an uplink intelligent contract running at the blockchain system to perform a chaining operation on the security protection level, the physical address of the wifi wireless network and the product serial number of the intelligent terminal so as to store the security protection level, the physical address of the wifi wireless network and the product serial number of the intelligent terminal into the blockchain system; wherein the intelligent contract is a contract program running on the blockchain system.
Because the network attack is an active behavior, the attack behavior is managed, so that the attack behavior needs to be recorded, and the blockchain record is carried out by adopting a mode of an uplink intelligent contract, when the attack behavior is started by a corresponding user, the attack behavior is subjected to the uplink operation, so that the attack record can be better realized, and the follow-up attack tracing is facilitated. And when setting is performed, for example, within a week, a specific network can only limit the simulation attack to be performed once, so that the use safety of a user can be ensured, and a network provider can be assisted to perform network optimization. And the block chain is adopted to ensure the safety of the whole recording process, and the later tracing is also convenient.
More preferably, fig. 2 is a schematic flow chart of determining a current network state according to the embodiment of the present invention, as shown in fig. 2, after the performing security detection on the wifi wireless network environment to determine a security protection level of a current target environment, the method further includes:
s1021: acquiring a plurality of data packets in a communication link of the wifi wireless network within a set time;
s1022: acquiring a wifi flow value of a set type from the data packets, if the wifi flow value exceeds a flow threshold, determining that the wifi wireless network is currently attacked by password cracking, and carrying out alarm reminding on the wifi wireless network;
s1023: acquiring wireless access point information and data packet sequence information of each data packet from the plurality of data packets, acquiring data packet sequence number difference values of the wireless access point at different moments according to the wireless access point information and the data packet sequence information, and if the difference values are larger than a preset difference value, determining that WIFI is currently attacked by fishing, and alarming and reminding the WIFI.
The step mainly comprises the step of acquiring data once when the security level is directly acquired from the system, wherein whether the current network is in an attacked state or not can be better monitored through the flow, and when the current network is detected to be in the attacked state, a user is reminded.
S103: if the security protection level reaches the set value, sending connection information to the corresponding intelligent terminal so that the intelligent terminal can be connected to the corresponding wifi wireless network, and if the security protection level does not reach the set value, sending alarm information to the corresponding intelligent terminal so as to remind a user that the wifi wireless network has danger.
Since the security level has been determined in step S102, then the security level may be determined, for example, the preset value of the security level may be set to 3, and only when the security level reaches 3 or more levels, the connection information is sent to the user terminal to remind the user to connect, but when the security level of the wifi wireless network is low, the user terminal is reminded of the danger.
More preferably, fig. 3 is a schematic flow chart of updating a relationship mapping table disclosed in the embodiment of the present invention, and as shown in fig. 3, the detection method further includes:
s104: receiving position information associated with a wireless access point and an SSID associated with the wireless access point according to interaction conditions of the intelligent terminal and the wireless access point;
s105: determining whether a corresponding SSID exists in a pre-stored relation mapping table or not, wherein the relation mapping table comprises the mapping relation between position information and SSID; if yes, carrying out safety detection on the wifi wireless network environment to determine the safety protection level of the current target environment;
S106: if not, when the security protection level reaches a set value, updating the relation mapping table according to the SSID and the position information of the wireless access point.
The ssid referred to in the embodiment of the present invention is a service set identifier, which is an identifier of a WLAN network and is used to distinguish different WLAN networks. The ssid includes two types, bssite and esid, bssite is generally not perceived by the end user and is primarily used for management and maintenance; essild is the ssid we refer to generally. When a user accesses a network, the network name is identified according to the ssids, and an administrator can divide a wireless local area network into a plurality of sub-networks needing independent identity verification by configuring different ssids. Therefore, the user surfing experience can be optimized by reasonably setting the ssid, and the flexibility and the safety of the WLAN network are enhanced. The 802.11 protocol standard specifies that the smallest unit of a wireless local area network is a basic service set BSS, representing the coverage area of a wireless access point AP. Each BSS has a basic service set identifier BSSID. The BSSID is effectively the MAC address (48 bits) of the AP radio.
The method has the advantages that the ssid mapping table is updated based on the position information, camouflage network screening can be better achieved based on the position information, for example, when the official wifi of the camouflage airport appears near the airport, abnormal conditions of corresponding position areas can be better found based on the position information and combined with mac addresses and historical network data, and further the user is provided with the intention of not needing to connect errors.
More preferably, after the sending connection information to the corresponding intelligent terminal to enable the intelligent terminal to access the corresponding wifi wireless network, the method further includes:
when the intelligent terminal detects that the user performs the payment operation, the information generated by the payment operation is encrypted. The information security can be better realized by encrypting the payment information.
The detection method of the safety protection level of the target environment in the embodiment of the invention determines whether the target environment is safe or not by carrying out safety detection on the wireless network environment to be accessed, and reminds a user of carrying out wireless connection when determining that the safety level exceeds the set level; by the method, the safety of wireless network communication is greatly improved, and the personal information safety of users is ensured.
Example two
Referring to fig. 6, fig. 6 is a flow chart of an information transmission authentication method based on a multiple encryption mechanism according to an embodiment of the invention. The execution main body of the method described in the embodiment of the invention is an execution main body composed of software or/and hardware, and the execution main body can receive related information in a wired or/and wireless mode and can send a certain instruction. Of course, it may also have certain processing and storage functions. The execution body may control a plurality of devices, such as a remote physical server or cloud server and related software, or may be a local host or server and related software that performs related operations on a device that is located somewhere, etc. In some scenarios, multiple storage devices may also be controlled, which may be located in the same location or in different locations than the devices. As shown in fig. 6, the information transmission authentication method based on the multiple encryption mechanism includes the following steps:
S201: receiving authentication image information of a target area transmitted by an intelligent terminal and SSID information selected by the intelligent terminal, wherein the authentication image information is obtained through the acquisition of the intelligent terminal, and the authentication image information is encrypted authentication image information;
the step of obtaining through the intelligent terminal can be obtained through obtaining an image shot by the intelligent terminal, and the step of obtaining through obtaining an image stored in an album of the intelligent terminal. For example, in the coverage area of an enterprise wireless network, a network provider can set corresponding images in a specific area in advance, for example, set the authentication images in each working area of the enterprise or set corresponding images at staff computers so that a user can conveniently access the wireless network, and for open areas such as restaurants, the authentication images can also be set at corresponding positions, and the offline images are acquired; the on-line authentication mode can greatly improve the safety of the whole implementation. In the implementation, the image is not a conventional photo, but image information processed by an encryption algorithm, and the encrypted image has certain confusion and is not easy to find when the image is updated. If the user is still connected by providing an image before scanning, it may be logged or a corresponding wireless network provider may be alerted to the message.
More preferably, fig. 7 is a schematic flow chart of obtaining an encrypted authentication image according to an embodiment of the present invention, and as shown in fig. 7, the encrypted authentication image is obtained by:
s2011: receiving a reference comparison image provided by a user, and acquiring a pixel point gray value and a pixel point position in the reference comparison image;
s2012: changing the position of each pixel point in the reference comparison image according to a position conversion algorithm to obtain an encryption authentication image; and the transformation parameter set and the iteration times in the position change algorithm are configured.
The method mainly comprises the steps of carrying out position scrambling on each pixel point in an image, so that the original image is not easy to be directly identified; the image itself is a two-dimensional matrix, and the image encryption technology based on matrix transformation rearranges the pixel positions of the original image, so that the information presented by the original image disappears, and the purpose of encryption is achieved. By giving parameter values, and the number of iterations, the positional transformation can achieve positional scrambling of the image. One iteration, namely one encryption, is to warp the image once according to a certain rule, and the more the number of iterations is, the more complex the warp is; image encryption is also achieved.
More preferably, fig. 8 is a schematic flow chart of a pixel position change disclosed in the embodiment of the present invention, as shown in fig. 8, the receiving a reference comparison image provided by a user, and obtaining a pixel gray value and a pixel position in the reference comparison image, including:
s2011a: receiving a reference comparison image provided by a user;
s2011b: performing blocking operation on the reference comparison image to obtain a comparison block subjected to image segmentation;
s2011c: storing and recording the number of the divided comparison blocks and the gray values and the positions of the pixel points in each comparison block; the position transformation algorithm comprises a position transformation formula, wherein the position transformation formula is as follows:
wherein F is x And F y For reference comparison of the abscissa and ordinate of the image, F' x 、F′ y 、F″ x And F' y Is the abscissa and ordinate of the transformed image; b is the number of comparison blocks after division, a 1 、b 1 、a i And b i To transform parameter sets, k 1 And k 2 For the position coordinates of the original image, N1 and N2 are the iteration times, and N is the pixel size of the reference comparison image.
When the method is implemented, the image can be partitioned, then data scrambling is carried out on each pixel point in different partitions, and through the improvement, a good encryption effect can be achieved through one iteration without multiple iterations. However, since the original image is segmented, the parameter values a and b of each segment are different, which brings about the need of numerous parameters for encryption; this also makes the overall cracking more difficult.
Although better encryption can be realized by a blocking mode, the data volume of parameters is greatly increased by the mode, and the difficulty of the parameters is greatly increased when the parameters are stored, because the parameters a and b can be calculated by adopting a chaotic algorithm when the parameters are embodied, and the transformation parameter set is calculated by the following steps:
receiving a substitute parameter set input by a user;
and carrying out random calculation on the alternative parameter set by using a secret key and a chaotic algorithm to obtain random sequence data, and taking the random sequence data as a transformation parameter set.
In the embodiment of the invention, four-dimensional chaotic mapping is introduced for implementation, as shown in a chaotic mapping formula, m, n, p, q is a parameter, and different chaotic sequences can be obtained by adjusting m, n, p, q parameter values. The purpose of image encryption is achieved by utilizing apparent irregularity of the chaotic sequence. The specific chaotic mapping formula is as follows:
x′ 1 =mx 1 -b 1 x 2 x 3 x 4 ;x′ 2 =nx 2 -b 2 x 1 x 3 x 4
x′ 3 =px 3 -b 3 x 1 x 2 x 4 ;x′ 4 =qx 4 -b 4 x 1 x 2 x 4
by obtaining the random sequence data, the random sequence data can then be used as data in a transformation parameter set in an image scrambling algorithm.
More preferably, the encrypted authentication image is obtained by the following steps:
Receiving a reference comparison image provided by a user, and carrying out graying treatment on the reference comparison image to obtain a gray value of each pixel point;
coding each pixel point according to a preset gray coding rule to obtain coded image data;
performing exclusive OR calculation on a first row of pixel points and a last row of pixel points in the encoded image data to obtain first update data, and performing data update operation on the first row of pixel points based on the first update data;
performing exclusive OR calculation on the updated first row of pixel point data and the last row of pixel points to obtain second updated data, and performing data updating operation on the last row of pixel points based on the second updated data;
performing exclusive OR calculation on the second row of pixel points and the second last row of pixel points in the encoded image data to obtain third updated data, and performing data updating operation on the second row of pixel points based on the third updated data;
performing exclusive OR calculation on the updated second row of pixel point data and the second-to-last row of pixel points to obtain fourth updated data, and performing data updating operation on the second-to-last row of pixel points based on the fourth updated data; until the updating of the pixel point data of all the rows is completed; when implementing, traversing all images in the above manner
And taking the updated image as an encryption authentication image.
The pixel value of a general image can be expressed by 8bit binary numbers, for example, A, T, G and C in DNA coding can be adopted to represent corresponding binary numbers 00, 01, 11 and 10; in this way, 8 different encoding schemes can be provided, A, T, G and C can be respectively arranged and combined with binary numbers 00, 01, 11 and 10 to form different encoding rules, and then multiple image encryption can be performed by the encoding rules. This encryption method based on gray values can make the security level of the whole image higher. In the specific implementation, the encryption method can be completed by adopting the combination of the plurality of encryption modes, so that more various encryption can be realized conveniently.
S202: resolving the encrypted authentication image information by adopting an image resolving algorithm to obtain resolved image information;
more preferably, fig. 9 is a schematic diagram of a decryption key obtaining flow disclosed in the embodiment of the present invention, as shown in fig. 9, after receiving the authentication image information of the target area transmitted by the intelligent terminal and the SSID information selected by the intelligent terminal, the decryption key obtaining flow further includes:
s2021: receiving digital combination information input by a user;
S2022: determining a corresponding decryption key according to the digital combination information;
the step of resolving the encrypted authentication image information by using an image resolving algorithm to obtain resolved image information includes:
and analyzing the encrypted authentication image information according to the decryption key and an image analysis algorithm to obtain analysis image information. When the above-described combined encryption scheme is adopted, it is necessary to know the first predetermined parameters such as m, n, p, q, and when the above-described parameters are known, the image decryption can be performed.
S203: searching an original comparison image associated with the SSID information in a database according to the SSID information, reminding a user of authentication failure if the corresponding original comparison image is not found, and extracting the original comparison image if the corresponding original comparison image is not found;
because the corresponding encrypted image is required to be set in advance, the image can be directly associated with the ssid when the implementation is carried out; this invokes the corresponding original matching image based on the information associated with the ssid. Even when the method is implemented, the method can be implemented by adopting a combination mode, such as adopting the combination of an encrypted image and a non-encrypted image, wherein the encrypted image can be encrypted in the mode, the non-encrypted image is an image of a corresponding enterprise employee, and if the image is an enterprise wifi, the enterprise employee image can be collected to be compared with the existing database to finish verification; if the combination verification is carried out, the restaurant wifi can acquire restaurant employee images to complete the combination verification.
S204: and comparing the similarity between the original comparison image and the analysis image information, if the similarity between the original comparison image and the analysis image information reaches a set value, determining that verification is passed, and reminding a user of carrying out wireless communication connection.
When the similarity between the analyzed image and the original image reaches a set value, the verification can be confirmed to be completed; thereby realizing wireless communication connection.
More preferably, fig. 10 is a schematic flow diagram of multi-dimensional authentication disclosed in the embodiment of the present invention, and as shown in fig. 10, the information transmission authentication method further includes:
s200a: responding to login request information input by an intelligent terminal to acquire network connection information at the intelligent terminal and identity information stored in the intelligent terminal;
s200b: retrieving personal information associated with the corresponding user according to the identity information; wherein the personal information includes home network information and employee location information;
s200c: determining all historical wireless connection records of corresponding intelligent terminals according to the network connection information and mac address information of all surrounding wireless access points based on the network connection information; determining the current position information of the user based on the signal connection strength relationship between mac address information of all wireless access points and the intelligent terminal;
S200d: and carrying out data matching on the home network information and all the historical wireless connection records to determine whether the home network connection record exists in the corresponding intelligent terminal, if so, carrying out matching according to the current position information and the employee position information, and if the matching is successful, carrying out communication connection.
Specifically, various authentication modes are superimposed here, particularly when wifi is performed in an enterprise, identity information of a user to be connected to a wireless network can be determined by calling the identity information stored in advance at an intelligent terminal of the enterprise, and then the corresponding authentication is completed by matching personal information of the corresponding user with the user information to be connected currently. When wifi hotspot scanning information acquired by the user terminal during positioning is received, a wifi data set { W i } included in the wifi hotspot scanning information is extracted, corresponding position information to be connected is determined through the wifi data set, and then the employee position is determined, wherein the employee position can be the seat position of an employee or the current position of the employee obtained through an enterprise internal camera, and corresponding verification is completed through a comprehensive comparison mode.
The information transmission authentication method based on the multiple encryption mechanism in the embodiment of the invention uses the encrypted image as a pre-authentication mode of wireless connection by analyzing the encrypted image, and when the image identification is passed, the authentication is determined to be completed; the security of the wireless communication network is greatly improved by adopting an on-line and off-line combined authentication mode.
Example III
Referring to fig. 11, fig. 11 is a schematic structural diagram of a detection device for a target environmental safety protection level according to an embodiment of the invention. As shown in fig. 11, the detection device for the target environmental safety protection level may include:
the receiving module 21: the method comprises the steps that a network access request of an intelligent terminal based on a specific target environment is received, wherein the target environment is a wifi wireless network environment, and the network access request comprises a physical address of a wifi wireless network of a specific SSID searched by a mobile terminal;
the security detection module 22: the method is used for carrying out safety detection on the wifi wireless network environment to determine the safety protection level of the current target environment, wherein the safety protection level is obtained through the following steps: matching the obtained physical address with the protection data stored in the security database to determine the security protection level associated with the physical address; or, sending a security attack instruction to the corresponding wifi wireless network to perform network attack operation so as to obtain an attack result, and determining the security protection level of the corresponding wifi wireless network according to the attack result;
The judgment module 23: and if the safety protection level does not reach the set value, sending alarm information to the corresponding intelligent terminal to remind a user that the wifi wireless network is dangerous.
The detection method of the safety protection level of the target environment in the embodiment of the invention determines whether the target environment is safe or not by carrying out safety detection on the wireless network environment to be accessed, and reminds a user of carrying out wireless connection when determining that the safety level exceeds the set level; by the method, the safety of wireless network communication is greatly improved, and the personal information safety of users is ensured.
Example III
Referring to fig. 12, fig. 12 is a schematic structural diagram of an electronic device according to an embodiment of the invention. The electronic device may be a computer, a server, or the like, and of course, may also be an intelligent device such as a mobile phone, a tablet computer, a monitor terminal, or the like, and an image acquisition device having a processing function. As shown in fig. 12, the electronic device may include:
a memory 510 storing executable program code;
A processor 520 coupled to the memory 510;
wherein processor 520 invokes executable program code stored in memory 510 to perform some or all of the steps in the method for detecting a target environmental safety level in embodiment one.
An embodiment of the present invention discloses a computer-readable storage medium storing a computer program, wherein the computer program causes a computer to execute some or all of the steps in the method for detecting a target environmental safety protection level in the first embodiment.
The embodiment of the invention also discloses a computer program product, wherein when the computer program product runs on a computer, the computer is caused to execute part or all of the steps in the method for detecting the target environmental safety protection level in the first embodiment.
The embodiment of the invention also discloses an application release platform, wherein the application release platform is used for releasing a computer program product, and the computer is caused to execute part or all of the steps in the method for detecting the target environment safety protection level in the first embodiment when the computer program product runs on the computer.
In various embodiments of the present invention, it should be understood that the size of the sequence numbers of the processes does not mean that the execution sequence of the processes is necessarily sequential, and the execution sequence of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer-accessible memory. Based on this understanding, the technical solution of the present invention, or a part contributing to the prior art or all or part of the technical solution, may be embodied in the form of a software product stored in a memory, comprising several requests for a computer device (which may be a personal computer, a server or a network device, etc., in particular may be a processor in a computer device) to execute some or all of the steps of the method according to the embodiments of the present invention.
In the embodiments provided herein, it should be understood that "B corresponding to a" means that B is associated with a, from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also determine B from a and/or other information.
Those of ordinary skill in the art will appreciate that some or all of the steps of the various methods of the described embodiments may be implemented by hardware associated with a program that may be stored in a computer-readable storage medium, including Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), erasable programmable Read-Only Memory (Erasable Programmable Read-Only Memory, EPROM), one-time programmable Read-Only Memory (OTPROM), electrically erasable programmable Read-Only Memory (EEPROM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM), or other optical disk Memory, magnetic disk Memory, tape Memory, or any other medium capable of being used to carry or store data that is readable by a computer.
The above describes the detection method, device, electronic equipment and storage medium of the target environmental safety protection level disclosed in the embodiment of the present invention in detail, and specific examples are applied to illustrate the principle and implementation of the present invention, and the description of the above embodiments is only used to help understand the method and core idea of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (9)

1. A method for detecting a level of safety protection of a target environment, comprising:
receiving authentication image information of a target area transmitted by an intelligent terminal and SSID information selected by the intelligent terminal, wherein the authentication image information is obtained through the acquisition of the intelligent terminal, and the authentication image information is an encrypted authentication image;
analyzing the encrypted authentication image by adopting an image analysis algorithm to obtain analysis image information;
searching an original comparison image associated with the SSID information in a database according to the SSID information, reminding a user of authentication failure if the corresponding original comparison image is not found, and extracting the original comparison image if the corresponding original comparison image is found;
Comparing the similarity between the original comparison image and the analysis image information, if the similarity between the original comparison image and the analysis image information reaches a set value, determining that verification is passed, and reminding a user of carrying out wireless communication connection;
receiving a network access request of an intelligent terminal based on a specific target environment, wherein the target environment is a wifi wireless network environment, and the network access request comprises a physical address of a wifi wireless network of a specified SSID searched by a mobile terminal;
and carrying out safety detection on the wifi wireless network environment to determine the safety protection level of the current target environment, wherein the safety protection level is obtained through the following steps: matching the obtained physical address with the protection data stored in the security database to determine the security protection level associated with the physical address; or, sending a security attack instruction to the corresponding wifi wireless network to perform network attack operation so as to obtain an attack result, and determining the security protection level of the corresponding wifi wireless network according to the attack result; the protection data stored in the security database comprises historical physical addresses and security protection levels, wherein the historical physical addresses and the security protection levels are in one-to-one correspondence;
Invoking an uplink intelligent contract running at the blockchain system to perform a chaining operation on the security protection level, the physical address of the wifi wireless network and the product serial number of the intelligent terminal so as to store the security protection level, the physical address of the wifi wireless network and the product serial number of the intelligent terminal into the blockchain system; wherein the intelligent contract is a contract program running on the blockchain system;
if the security protection level reaches the set value, sending connection information to the corresponding intelligent terminal so that the intelligent terminal can be connected to the corresponding wifi wireless network, and if the security protection level does not reach the set value, sending alarm information to the corresponding intelligent terminal so as to remind a user that the wifi wireless network has danger.
2. The method for detecting the security level of the target environment according to claim 1, further comprising, after the performing security detection on the wifi wireless network environment to determine the security level of the current target environment:
acquiring a plurality of data packets in a communication link of the wifi wireless network within a set time;
acquiring a wifi flow value of a set type from the data packets, if the wifi flow value exceeds a flow threshold, determining that the wifi wireless network is currently attacked by password cracking, and carrying out alarm reminding on the wifi wireless network;
Acquiring wireless access point information and data packet sequence information of each data packet from the plurality of data packets, acquiring data packet sequence number difference values of the wireless access point at different moments according to the wireless access point information and the data packet sequence information, and if the difference values are larger than a preset difference value, determining that WIFI is currently attacked by fishing, and alarming and reminding the WIFI.
3. The method of detecting a level of environmental safety protection of a subject as in claim 1, further comprising:
receiving position information associated with a wireless access point and an SSID associated with the wireless access point according to interaction conditions of the intelligent terminal and the wireless access point;
determining whether a corresponding SSID exists in a pre-stored relation mapping table or not, wherein the relation mapping table comprises the mapping relation between position information and SSID; if yes, carrying out safety detection on the wifi wireless network environment to determine the safety protection level of the current target environment;
if not, when the security protection level reaches a set value, updating the relation mapping table according to the SSID and the position information of the wireless access point.
4. The method for detecting the target environmental security level according to claim 1, further comprising, after the sending of the connection information to the corresponding intelligent terminal to enable the intelligent terminal to access the corresponding wifi wireless network:
When the intelligent terminal detects that the user performs the payment operation, the information generated by the payment operation is encrypted.
5. The method for detecting the security protection level of the target environment according to claim 1, wherein the sending the security attack instruction to the corresponding wifi wireless network to perform the network attack operation to obtain the attack result comprises:
sending a first-level attack instruction to a corresponding wifi wireless network to perform network attack operation so as to obtain a first-level attack result, wherein the first-level attack instruction comprises a plurality of replay attack instructions, a denial of server attack instruction, a brute force cracking instruction and a phishing attack instruction;
sending a secondary attack instruction to a corresponding wifi wireless network to perform network attack operation so as to obtain a secondary attack result, wherein the secondary attack instruction comprises a plurality of MOTS attack instructions, KRACK attack instructions and edge relay attack instructions;
and obtaining an attack result according to the primary attack result and the secondary attack result.
6. The method for detecting the security protection level of the target environment according to claim 5, wherein the determining the security protection level of the corresponding wifi wireless network according to the attack result comprises:
When the first-level attack results are that all attacks are successful, determining first-level security protection of the corresponding wifi wireless network;
when the first-level attack result is that part of attacks are successful, determining the second-level security protection of the corresponding wifi wireless network;
when the primary attack result is that all attacks fail and the secondary attack result is that all attacks succeed, determining three-level security protection of the corresponding wifi wireless network;
when the primary attack result is that all attacks fail and the secondary attack result is that part of attacks succeed, determining four-level security protection of the corresponding wifi wireless network;
and when the primary attack result is all attack failure and the secondary attack result is all attack failure, determining five-level security protection of the corresponding wifi wireless network.
7. A system for detecting a level of safety protection of a target environment, comprising:
receiving authentication image information of a target area transmitted by an intelligent terminal and SSID information selected by the intelligent terminal, wherein the authentication image information is obtained through the acquisition of the intelligent terminal, and the authentication image information is an encrypted authentication image;
analyzing the encrypted authentication image by adopting an image analysis algorithm to obtain analysis image information;
Searching an original comparison image associated with the SSID information in a database according to the SSID information, reminding a user of authentication failure if the corresponding original comparison image is not found, and extracting the original comparison image if the corresponding original comparison image is found;
comparing the similarity between the original comparison image and the analysis image information, if the similarity between the original comparison image and the analysis image information reaches a set value, determining that verification is passed, and reminding a user of carrying out wireless communication connection;
and a receiving module: the method comprises the steps that a network access request of an intelligent terminal based on a specific target environment is received, wherein the target environment is a wifi wireless network environment, and the network access request comprises a physical address of a wifi wireless network of a specific SSID searched by a mobile terminal;
and a safety detection module: the method is used for carrying out safety detection on the wifi wireless network environment to determine the safety protection level of the current target environment, wherein the safety protection level is obtained through the following steps: matching the obtained physical address with the protection data stored in the security database to determine the security protection level associated with the physical address; or, sending a security attack instruction to the corresponding wifi wireless network to perform network attack operation so as to obtain an attack result, and determining the security protection level of the corresponding wifi wireless network according to the attack result; the protection data stored in the security database comprises historical physical addresses and security protection levels, wherein the historical physical addresses and the security protection levels are in one-to-one correspondence;
Invoking an uplink intelligent contract running at the blockchain system to perform a chaining operation on the security protection level, the physical address of the wifi wireless network and the product serial number of the intelligent terminal so as to store the security protection level, the physical address of the wifi wireless network and the product serial number of the intelligent terminal into the blockchain system; wherein the intelligent contract is a contract program running on the blockchain system;
and a judging module: and if the safety protection level does not reach the set value, sending alarm information to the corresponding intelligent terminal to remind a user that the wifi wireless network is dangerous.
8. An electronic device, comprising: a memory storing executable program code; a processor coupled to the memory; the processor invokes the executable program code stored in the memory for performing the method of detecting a target environmental safety protection level of any one of claims 1 to 6.
9. A computer-readable storage medium storing a computer program, wherein the computer program causes a computer to execute the method of detecting a target environmental safety protection level according to any one of claims 1 to 6.
CN202211690810.5A 2022-12-26 2022-12-26 Method and device for detecting safety protection level of target environment Active CN116321161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211690810.5A CN116321161B (en) 2022-12-26 2022-12-26 Method and device for detecting safety protection level of target environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211690810.5A CN116321161B (en) 2022-12-26 2022-12-26 Method and device for detecting safety protection level of target environment

Publications (2)

Publication Number Publication Date
CN116321161A CN116321161A (en) 2023-06-23
CN116321161B true CN116321161B (en) 2024-01-19

Family

ID=86782311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211690810.5A Active CN116321161B (en) 2022-12-26 2022-12-26 Method and device for detecting safety protection level of target environment

Country Status (1)

Country Link
CN (1) CN116321161B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107347184A (en) * 2017-06-30 2017-11-14 北京奇虎科技有限公司 The detection of WIFI connection status, display methods and device, server and terminal device
CN108834147A (en) * 2018-08-21 2018-11-16 中国平安人寿保险股份有限公司 Examine WiFi cipher safety method, apparatus, computer equipment and storage medium
KR20190033757A (en) * 2017-09-22 2019-04-01 (주)노르마 Analysis method and system of Security Vulnerability of wireless network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107347184A (en) * 2017-06-30 2017-11-14 北京奇虎科技有限公司 The detection of WIFI connection status, display methods and device, server and terminal device
KR20190033757A (en) * 2017-09-22 2019-04-01 (주)노르마 Analysis method and system of Security Vulnerability of wireless network
CN108834147A (en) * 2018-08-21 2018-11-16 中国平安人寿保险股份有限公司 Examine WiFi cipher safety method, apparatus, computer equipment and storage medium

Also Published As

Publication number Publication date
CN116321161A (en) 2023-06-23

Similar Documents

Publication Publication Date Title
CN110324287B (en) Access authentication method, device and server
US10110585B2 (en) Multi-party authentication in a zero-trust distributed system
CN105939326B (en) Method and device for processing message
KR101048509B1 (en) Method and apparatus for detecting civil attack node using location information and hash chain in ubiquitous sensor network
CN105141594B (en) Password retrieving method and device
CN110808836A (en) Network authentication attack prediction method and system
US20200053076A1 (en) Encryption parameter selection
US10542434B2 (en) Evaluating as to whether or not a wireless terminal is authorized
CN112822176B (en) Remote APP identity authentication method
KR101316059B1 (en) Apparatus for verifying certificate and method thereof, and recording medium storing program for executing method of the same in computer
CN114051247A (en) Method and equipment for detecting security of wireless network
CN116321161B (en) Method and device for detecting safety protection level of target environment
US9698983B2 (en) Method and apparatus for disabling algorithms in a device
CN116249111B (en) Information transmission authentication method and device based on multiple encryption mechanisms
CN109495889B (en) Heterogeneous mobile network access control method based on mutual trust mechanism
CN105100030B (en) Access control method, system and device
KR102332037B1 (en) Enhanced operator authentication system and method in scada control network
WO2022051463A1 (en) Dynamic privacy-preserving application authentication
Nambiar et al. Wireless intrusion detection based on different clustering approaches
CN109803255B (en) Mobile data information safety communication system and method for digital workshop
Jain et al. A literature review on machine learning for cyber security issues
Singh et al. Lightweight cryptography approach for multifactor authentication in internet of things
US20240089268A1 (en) Detecting malicious behavior from handshake protocols using machine learning
Senthil Mahesh et al. Implicit spatio-temporal based hybrid recommendation model to discover malicious wireless access points
CN117216802B (en) Database security authentication method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant