WO2016061965A1 - wifi处理方法、系统及终端 - Google Patents
wifi处理方法、系统及终端 Download PDFInfo
- Publication number
- WO2016061965A1 WO2016061965A1 PCT/CN2015/073128 CN2015073128W WO2016061965A1 WO 2016061965 A1 WO2016061965 A1 WO 2016061965A1 CN 2015073128 W CN2015073128 W CN 2015073128W WO 2016061965 A1 WO2016061965 A1 WO 2016061965A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wifi
- wifi signal
- list
- run
- classified
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the present invention relates to the field of communications, and in particular, to a wifi processing method, system, and terminal.
- the invention provides a wifi processing method, system and terminal, so as to at least solve the problem that the access of the wifi signal in the related art easily leads to the leakage of personal private information.
- a wifi processing method including: classifying a searched wifi signal according to a preset classification rule; and running an application according to the classified wifi signal.
- classifying the searched wifi signals according to a preset classification rule comprises: classifying the searched wifi signals into a safe list or an unsafe list according to a preset classification rule.
- running the application according to the classified wifi signal comprises: running an application whose privacy level exceeds a first predetermined level in a wifi signal of the security list; and running an application whose privacy level is lower than a second predetermined level in the unsafe List of wifi signals.
- the method further includes: modifying the classified wifi signal; and running the application according to the modified wifi signal.
- the preset classification rule is whether a password access is required.
- a wifi processing system including: a classification module, configured to classify the searched wifi signals according to a preset classification rule; and the first operation module is configured to run the application according to the classified wifi signal. .
- the classification module comprises: a classification unit configured to classify the searched wifi signals into a safe list or an unsafe list according to a preset classification rule.
- the first running module includes: a first running unit, configured to run an application whose degree of privacy exceeds a first predetermined level in a wifi signal of the security list; and the second running unit is set to have a low degree of privacy The application at the second predetermined level runs in the wifi signal of the unsafe list.
- the system further includes: a modification module configured to modify the classified wifi signal; and a second operation module configured to run the application according to the modified wifi signal.
- a terminal comprising at least one of the above systems.
- the searched wifi signal is classified according to a preset classification rule; the application is run according to the classified wifi signal, which solves the problem that the access of the wifi signal in the related technology easily leads to the leakage of personal private information, thereby reducing the problem.
- the effect of personal privacy information disclosure is provided.
- FIG. 1 is a flowchart of a wifi processing method according to an embodiment of the present invention.
- FIG. 2 is a block diagram of a wifi processing system in accordance with an embodiment of the present invention.
- FIG. 3 is a block diagram 1 of a wifi processing system in accordance with a preferred embodiment of the present invention.
- FIG. 4 is a block diagram 2 of a wifi processing system in accordance with a preferred embodiment of the present invention.
- FIG. 5 is a block diagram 3 of a wifi processing system in accordance with a preferred embodiment of the present invention.
- FIG. 6 is a flowchart 1 of a wifi processing method according to a preferred embodiment of the present invention.
- FIG. 7 is a second flowchart of a wifi processing method in accordance with a preferred embodiment of the present invention.
- FIG. 8 is a diagram of a terminal interface with a wifi processing system in accordance with a preferred embodiment of the present invention.
- the embodiment of the invention provides a classification method and system based on a mobile phone wifi signal, and the terminal provides a classification list based on the wifi signal, including a security list and an unsafe list.
- the smart terminal searches for a nearby wifi signal, the signal is classified, and the classification rule adopts whether or not a password is required to be accessed by default.
- a highly secure wlan network requires the user to enter a password to access, while some networks with lower security do not require password access.
- the end user can manually adjust the classification rules or add a wifi signal that is considered safe to the safe list.
- the end user configures the application software that is allowed to run for each list.
- some applications involving private information such as banking software, stock software, office software, etc.
- Some software that does not involve private information such as game software, entertainment software allows to run under a wifi signal in a safe list or an unsafe list. If the user wants to run software involving private information under an unsafe wifi signal, the terminal needs to remind the user that there may be a security risk and need to be handled with caution.
- FIG. 1 is a flowchart of a wifi processing method according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
- Step S102 classifying the searched wifi signals according to a preset classification rule
- Step S104 running the application according to the classified wifi signal.
- the terminal searches for nearby wifi signals, classifies the searched wifi signals according to preset classification rules, and runs applications according to the classified wifi signals, for example, the wifi signals are classified as safe or unsafe, and the terminal is involved.
- the wifi is insecure, limiting the terminal to run a privately-private application, and solving the problem that the access of the wifi signal in the related art easily leads to the leakage of personal private information, thereby reducing the effect of personal private information leakage.
- classifying the searched wifi signals according to a preset classification rule comprises: classifying the searched wifi signals into a safe list or an unsafe list according to a preset classification rule.
- running the application according to the classified wifi signal includes: running an application whose privacy level exceeds the first predetermined level in the wifi signal of the security list; and running the application whose privacy level is lower than the second predetermined level in the unsafe
- the wifi signal in the list improves the protection of the user's private information and improves the user experience.
- the diagnosis may modify the classified wifi signal according to the user's operation, for example, when the user is in an unsafe list.
- the wifi signal is transferred to the safe list, the terminal performs corresponding processing, and the application is run according to the modified wifi signal, that is, the restriction on the application in the previously unsafe list will no longer limit the application under the modified wifi signal. , effectively improve the flexibility and improve the user experience.
- the foregoing predetermined classification rule is whether password access is required.
- a wifi processing system is provided, which is used to implement the above-described embodiments and preferred embodiments, and has not been described again.
- the term "module” may implement a combination of software and/or hardware of a predetermined function.
- the systems described in the following embodiments are preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
- FIG. 2 is a block diagram of a wifi processing system according to an embodiment of the present invention. As shown in FIG. 2, the system includes a classification module 22 and a first operation module 24. The following briefly describes each module.
- the classification module 22 is configured to classify the searched wifi signals according to a preset classification rule
- the first running module 24 is configured to run the application according to the classified wifi signal.
- the classification module 22 includes:
- the classification unit 32 is configured to classify the searched wifi signals into a safe list or an unsafe list according to a preset classification rule.
- the first operating module 24 includes:
- the first running unit 42 is configured to run an application whose privacy level exceeds the first predetermined level in the wifi signal of the security list;
- the second running unit 44 is configured to run the application whose privacy level is lower than the second predetermined level in the wifi signal of the unsafe list.
- FIG. 5 is a block diagram 3 of a wifi processing system according to a preferred embodiment of the present invention. As shown in FIG. 5, the system further includes:
- the modifying module 52 is configured to modify the classified wifi signal
- the second running module 54 is configured to run the application according to the modified wifi signal.
- Another aspect of an embodiment of the present invention provides a terminal including at least one of the above systems.
- a method and system for classifying a mobile phone wifi signal specifically includes: the terminal automatically searches for nearby wifi signals, and classifies the searched wifi signals according to a default classification rule.
- the classification rule defaults to whether password access is required.
- the terminal allows the user to manually modify the classification rule. After the modification, the terminal reclassifies the wifi signal according to the modified classification rule.
- the terminal allows the user to manually adjust the searched wifi signal.
- the user can add a wifi signal that is considered safe (not meeting the classification rules) to the safe list.
- the user configures the allowed application software for the wifi list. By default, some applications involving private information are only allowed to run on the secure wifi list. Some applications that do not involve private information can run on all wifi lists. When a user wants to run an application that involves private information under an unsafe wifi signal, the terminal needs to remind the user that there may be a security risk and requires careful operation.
- the terminal automatically confirms which packet it belongs to based on the searched wifi signal, and whether the packet is secure. It then confirms which software is allowed to run under the wifi signal, and which software is not allowed or recommended. Under the unsafe wifi signal, if the user wants to run some application software involving private information, the terminal needs to remind the user that there may be a security risk and need to be handled with caution.
- FIG. 6 is a flowchart 1 of a wifi processing method according to a preferred embodiment of the present invention. As shown in FIG. 6, the process includes the following steps:
- Step S602 the terminal searches for a nearby wifi signal, wherein the terminal can automatically search for nearby wifi signals according to the signal strength, and initially classify the wifi signals according to a default classification rule.
- the default classification rule is whether the wifi signal requires password access;
- Step S604 it is determined whether the wifi signal requires password access, if the determination result is no, step S606 is performed, and if the determination result is yes, step S608 is performed;
- Step S606 dividing the wifi signal into an unsafe wifi signal list
- Step S608 dividing the wifi signal into a secure wifi signal list
- Step S610 it is determined whether the classification rule needs to be modified, if the determination result is no, step S614 is performed, and if the determination result is yes, step S612 is performed;
- Step S612 the wifi signal is classified according to the user-defined new rule, and then step S614 is performed;
- Step S614 it is determined whether the user needs to manually adjust the wifi signal, if the determination result is yes, step S616 is performed, if the determination result is no, step S618 is performed;
- Step S616 the user re-adjusts the wifi signal according to the individual's will;
- Step S618, the user is required to configure the application software that is allowed to run for the wifi list;
- step S620 the configuration is completed.
- the terminal allows the user to modify the wifi signal classification rule by itself. After modifying the rule, the terminal classifies the wifi signal according to the latest rule. The terminal allows the user to adjust the wifi signal by himself.
- the user configures the application software that is allowed to run for the wifi list. By default, some applications that involve private information are only allowed to run on the secure wifi list. Some applications that do not involve private information can run on all wifi lists.
- FIG. 7 is a second flowchart of a wifi processing method according to a preferred embodiment of the present invention. As shown in FIG. 7, the process includes the following steps:
- Step S702 the user attempts to run the application software related to privacy under an unsafe wifi signal
- Step S704 the terminal prompts the user that there is a security risk
- Step S706 it is determined whether to continue to use, if the determination result is yes, step S708 is performed, if the determination result is no, step S710 is performed;
- Step S708 invoking a high-level encryption algorithm (MD5) to encrypt the data packet;
- step S710 the application is closed.
- FIG. 8 is a terminal interface diagram of a wifi processing system according to a preferred embodiment of the present invention.
- the wifi signal list is displayed, and the currently connected wifi signal is used.
- the connected wifi signal is displayed safely/unsafely, as shown in Figure 8.
- the secure wifi list and the unsafe wifi list are displayed separately.
- the application software with higher privacy can be run, and the runnable application software configured in the unsafe wifi list is mostly not Personal personal information, such as general entertainment software.
- modules or steps of the present invention can be implemented by a general computing system, which can be concentrated on a single computing system or distributed in a network composed of multiple computing systems. Alternatively, they may be implemented by program code executable by the computing system so that they may be stored in the storage system by the computing system and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
本发明公开了一种wifi处理方法、系统及终端,其中,该方法包括:将搜索到的wifi信号按照预设的分类规则进行分类;依据分类的wifi信号运行应用。通过本发明,解决了相关技术中wifi信号的接入容易导致个人私密信息泄露的问题,进而降低了个人私密信息泄露的效果。
Description
本发明涉及通信领域,具体而言,涉及一种wifi处理方法、系统及终端。
目前,一些公共场合,例如:机场,高铁站,餐厅,咖啡厅等越来越多的提供免费wifi信号供用户使用。为了节省数据流量费用,大部分智能终端用户习惯设置wlan功能和移动网络功能同时开启,一旦进入有wifi信号的区域,终端会自动切换到wifi信号。正是利用这个漏洞,一些不法分子在公共场合,利用智能终端作为热点,提供不需要密码接入的wifi信号,在用户不知情的情况下,终端会自动连接上一些不安全的wifi信号,从而使不法分子有可乘之机,利用一些特定的抓包工具,截取网络数据包,窃取他人的私密信息。
目前大部分智能终端一旦开启wlan功能,会根据信号强度自动搜索附近的wifi信号并连接。用户常常在这种不安全的wifi信号下使用一些涉及私密信息的软件,如银行软件、炒股软件、办公软件,导致自己的私密信息泄露。
针对相关技术中wifi信号的接入容易导致个人私密信息泄露的问题,目前尚未提出有效的解决方案。
发明内容
本发明提供了一种wifi处理方法、系统及终端,以至少解决相关技术中wifi信号的接入容易导致个人私密信息泄露的问题。
根据本发明的一个方面,提供了一种wifi处理方法,包括:将搜索到的wifi信号按照预设的分类规则进行分类;依据分类的wifi信号运行应用。
优选地,将搜索到的wifi信号按照预设的分类规则进行分类包括:将搜索到的wifi信号按照预设的分类规则分类到安全列表或不安全列表中。
优选地,依据分类的wifi信号运行应用包括:将私密程度超过第一预定等级的应用运行在所述安全列表的wifi信号中;将私密程度低于第二预定等级的应用运行在所述不安全列表的wifi信号中。
优选地,在将搜索到的wifi信号按照预设的分类规则进行分类之后,还包括:对分类后的wifi信号进行修改;依据修改后的wifi信号运行应用。
优选地,所述预设的分类规则为是否需要密码接入。
发明的另一方面,提供了一种wifi处理系统,包括:分类模块,设置为将搜索到的wifi信号按照预设的分类规则进行分类;第一运行模块,设置为依据分类的wifi信号运行应用。
优选地,所述分类模块包括:分类单元,设置为将搜索到的wifi信号按照预设的分类规则分类到安全列表或不安全列表中。
优选地,所述第一运行模块包括:第一运行单元,设置为将私密程度超过第一预定等级的应用运行在所述安全列表的wifi信号中;第二运行单元,设置为将私密程度低于第二预定等级的应用运行在所述不安全列表的wifi信号中。
优选地,所述系统还包括:修改模块,设置为对分类后的wifi信号进行修改;第二运行模块,设置为依据修改后的wifi信号运行应用。
发明的另一方面,提供了一种终端,至少包括上述系统之一。
通过本发明,采用将搜索到的wifi信号按照预设的分类规则进行分类;依据分类的wifi信号运行应用,解决了相关技术中wifi信号的接入容易导致个人私密信息泄露的问题,进而降低了个人私密信息泄露的效果。
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是根据本发明实施例的wifi处理方法的流程图;
图2是根据本发明实施例的wifi处理系统的框图;
图3是根据本发明优选实施例的wifi处理系统的框图一;
图4是根据本发明优选实施例的wifi处理系统的框图二;
图5是根据本发明优选实施例的wifi处理系统的框图三;
图6是根据本发明优选实施例的wifi处理方法的流程图一;
图7是根据本发明优选实施例的wifi处理方法的流程图二;
图8是根据本发明优选实施例的具有wifi处理系统的终端界面图。
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
本发明实施例提供了一种基于手机wifi信号的分类方法和系统,终端提供一个基于wifi信号的分类列表,包括安全列表和不安全列表。当智能终端搜索到附近的wifi信号时,会将信号进行分类,分类规则默认采取是否需要密码接入。一般安全性较高的wlan网络,需要用户必须输入密码接入,而一些安全性较低的网络,则不需要密码接入。终端用户可以手动调整分类规则或将某一个认为安全的wifi信号加入到安全列表中。终端用户为每个列表配置允许运行的应用软件,例如:一些涉及私密信息的应用软件,如银行软件,股票软件,办公软件等,只允许运行在移动网络或在安全列表中的wifi信号下。一些不涉及私密信息的软件,如游戏软件,娱乐软件允许运行在安全列表或不安全列表中的wifi信号下。如用户要在某个不安全的wifi信号下运行涉及私密信息的软件,则终端需要提醒用户,可能存在安全风险,需要谨慎操作。
下面对本实施例中提供的wifi处理方法进行说明,图1是根据本发明实施例的wifi处理方法的流程图,如图1所示,该流程包括如下步骤:
步骤S102,将搜索到的wifi信号按照预设的分类规则进行分类;
步骤S104,依据分类的wifi信号运行应用。
通过上述步骤,终端对附近的wifi信号进行搜索,将搜索到的wifi信号按照预设的分类规则进行分类,依据分类的wifi信号运行应用,例如将wifi信号分为安全或不安全,终端在介入的wifi为不安全的情况下,限制终端运行私密度较高的应用,解决了相关技术中wifi信号的接入容易导致个人私密信息泄露的问题,进而降低了个人私密信息泄露的效果。
优选地,将搜索到的wifi信号按照预设的分类规则进行分类包括:将搜索到的wifi信号按照预设的分类规则分类到安全列表或不安全列表中。
上述实施例中,依据分类的wifi信号运行应用包括:将私密程度超过第一预定等级的应用运行在该安全列表的wifi信号中;将私密程度低于第二预定等级的应用运行在该不安全列表的wifi信号中,从而提高了对用户私密信息的保护,提高了用户的体验。
作为一种优选的实施方式,在将搜索到的wifi信号按照预设的分类规则进行分类之后,诊断可以根据用户的操作对分类后的wifi信号进行修改,例如,当用户将处于不安全列表中的wifi信号转移到安全列表中,终端做相应的处理,并依据修改后的wifi信号运行应用,即对之前处于不安全列表中应用的限制将不再对修改后的wifi信号下的应用进行限制,有效的提高了灵活度,提高了用户的体验。
优选地,上述预设的分类规则为是否需要密码接入。
发明的另一方面,提供了一种wifi处理系统,该系统用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的系统较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图2是根据本发明实施例的wifi处理系统的框图,如图2所示,该系统包括:分类模块22和第一运行模块24,下面对各个模块进行简要说明。
分类模块22,设置为将搜索到的wifi信号按照预设的分类规则进行分类;
第一运行模块24,设置为依据分类的wifi信号运行应用。
图3是根据本发明优选实施例的wifi处理系统的框图一,如图3所示,该分类模块22包括:
分类单元32,设置为将搜索到的wifi信号按照预设的分类规则分类到安全列表或不安全列表中。
图4是根据本发明优选实施例的wifi处理系统的框图二,如图4所示,该第一运行模块24包括:
第一运行单元42,设置为将私密程度超过第一预定等级的应用运行在该安全列表的wifi信号中;
第二运行单元44,设置为将私密程度低于第二预定等级的应用运行在该不安全列表的wifi信号中。
图5是根据本发明优选实施例的wifi处理系统的框图三,如图5所示,该系统还包括:
修改模块52,设置为对分类后的wifi信号进行修改;
第二运行模块54,设置为依据修改后的wifi信号运行应用。
本发明实施例的另一方面,还提供了一种终端,至少包括上述系统之一。
下面结合优选实施方式对本发明实施例进行进一步说明。
本发明实施例中的一种基于手机wifi信号的分类方法和系统,具体包括:终端自动搜索附近的wifi信号,并将搜索到的wifi信号按照默认的分类规则进行分类。分类规则默认为是否需要密码接入。终端允许用户手动修改分类规则,修改后,终端按照修改后的分类规则重新对wifi信号进行分类。终端允许用户手动调整搜索到的wifi信号。用户可以将认为安全的wifi信号(不符合分类规则)加入到安全列表中。用户为wifi列表配置允许运行的应用软件,默认情况下,一些涉及私密信息的应用软件只允许运行在安全wifi列表中。一些不涉及私密信息的应用软件可以运行在所有wifi列表中。当用户要在某个不安全的wifi信号下运行涉及私密信息的应用软件时,终端需要提醒用户,可能存在安全风险,需要谨慎操作。
通过上述基于wifi信号进行安全分类的方法和系统,特别是在公共场合,终端会自动根据搜索到的wifi信号,确认其属于哪一个分组,该分组是否安全。继而确认在该wifi信号下允许运行哪些软件,不允许或不建议运行哪些软件。在不安全的wifi信号下,若用户要运行一些涉及私密信息的应用软件,终端需要提醒用户,可能存在安全风险,需要谨慎操作。
基于上述基于手机wifi信号的安全分类方法和系统,为使本发明的目的、技术方案及优点更加清楚、明确,下面结合具体实施方式并举例对上述方案做进一步的详细描述。
基于本发明实施例提供的上述基于手机wifi信号的安全分类方法,图6是根据本发明优选实施例的wifi处理方法的流程图一,如图6所示,该流程包括如下步骤:
步骤S602,终端搜索附近的wifi信号,其中,终端可以根据信号强度自动搜索附近的wifi信号,并根据默认的分类规则将wifi信号进行初始分类。默认的分类规则是该wifi信号是否需要密码接入;
步骤S604,判断该wifi信号是否需要密码接入,在判断结果为否的情况下,执行步骤S606,在判断结果为是的情况下,执行步骤S608;
步骤S606,将该wifi信号划分至不安全的wifi信号列表中;
步骤S608,将该wifi信号划分至安全的wifi信号列表中;
步骤S610,判断是否需要修改分类规则,在判断结果为否的情况下,执行步骤S614,在判断结果为是的情况下,执行步骤S612;
步骤S612,按用户自定义的新规则对wifi信号进行分类,接下来执行步骤S614;
步骤S614,判断用户是否需要手动调整wifi信号,在判断结果为是的情况下,执行步骤S616,在判断结果为否的情况下,执行步骤S618;
步骤S616,用户按个人意愿重新调整wifi信号;
步骤S618,要求用户为wifi列表配置允许运行的应用软件;
步骤S620,配置完毕。
作为优选的实施方式,终端允许用户自行修改wifi信号分类规则,修改规则后,终端按最新的规则对wifi信号进行分类。终端允许用户自行调整wifi信号。用户为wifi列表配置允许运行的应用软件。默认情况下,一些涉及私密信息的应用软件只允许运行在安全wifi列表中。一些不涉及私密信息的应用软件可以运行在所有wifi列表中。
若用户要在某个不安全的wifi信号下运行涉及私密信息的应用软件时,终端需要提醒用户,可能存在安全风险,需要谨慎操作。图7是根据本发明优选实施例的wifi处理方法的流程图二,如图7所示,该流程包括如下步骤:
步骤S702,用户在某个不安全的wifi信号下试图运行涉及隐私的应用软件;
步骤S704,终端提示用户存在安全风险;
步骤S706,判断是否继续使用,在判断结果为是的情况下,执行步骤S708,在判断结果为否的情况下,执行步骤S710;
步骤S708,调用高等级的加密算法(MD5)对数据包进行加密;
步骤S710,应用程序关闭。
图8是根据本发明优选实施例的具有wifi处理系统的终端界面图,如图8所示,用户在终端界面开启wlan功能后呈现wifi信号列表,以及当前已连接的wifi信号,当然可以将当前连接的wifi信号是安全/不安全显示出来,如图8所示。在终端界面上将安全wifi列表与不安全wifi列表分列进行显示,在安全wifi列表下,可以运行私密度较高的应用软件,而在不安全wifi列表中配置的可运行应用软件大部分不涉及个人私密信息,如一般娱乐软件等。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算系统来实现,它们可以集中在单个的计算系统上,或者分布在多个计算系统所组成的网络上,可选地,它们可以用计算系统可执行的程序代码来实现,从而,可以将它们存储在存储系统中由计算系统来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
通过上述实施例及优选实施方式,解决了相关技术中wifi信号的接入容易导致个人私密信息泄露的问题,进而降低了个人私密信息泄露的效果。
Claims (10)
- 一种wifi处理方法,包括:将搜索到的wifi信号按照预设的分类规则进行分类;依据分类的wifi信号运行应用。
- 根据权利要求1所述的方法,其中,将搜索到的wifi信号按照预设的分类规则进行分类包括:将搜索到的wifi信号按照预设的分类规则分类到安全列表或不安全列表中。
- 根据权利要求2所述的方法,其中,依据分类的wifi信号运行应用包括:将私密程度超过第一预定等级的应用运行在所述安全列表的wifi信号中;将私密程度低于第二预定等级的应用运行在所述不安全列表的wifi信号中。
- 根据权利要求3所述的方法,其中,在将搜索到的wifi信号按照预设的分类规则进行分类之后,还包括:对分类后的wifi信号进行修改;依据修改后的wifi信号运行应用。
- 根据权利要求1-4中任一项所述的方法,其中,所述预设的分类规则为是否需要密码接入。
- 一种wifi处理系统,包括:分类模块,设置为将搜索到的wifi信号按照预设的分类规则进行分类;第一运行模块,设置为依据分类的wifi信号运行应用。
- 根据权利要求6所述的系统,其中,所述分类模块包括:分类单元,设置为将搜索到的wifi信号按照预设的分类规则分类到安全列表或不安全列表中。
- 根据权利要求7所述的系统,其中,所述第一运行模块包括:第一运行单元,设置为将私密程度超过第一预定等级的应用运行在所述安全列表的wifi信号中;第二运行单元,设置为将私密程度低于第二预定等级的应用运行在所述不安全列表的wifi信号中。
- 根据权利要求8所述的系统,其中,所述系统还包括:修改模块,设置为对分类后的wifi信号进行修改;第二运行模块,设置为依据修改后的wifi信号运行应用。
- 一种终端,至少包括权利要求6-9中任一项所述的系统。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410568573.4 | 2014-10-22 | ||
CN201410568573.4A CN105592448A (zh) | 2014-10-22 | 2014-10-22 | wifi处理方法、系统及终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016061965A1 true WO2016061965A1 (zh) | 2016-04-28 |
Family
ID=55760147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/073128 WO2016061965A1 (zh) | 2014-10-22 | 2015-02-15 | wifi处理方法、系统及终端 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105592448A (zh) |
WO (1) | WO2016061965A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114565059A (zh) * | 2022-03-17 | 2022-05-31 | 杭州云深科技有限公司 | 一种wifi标签的确定方法、电子设备及可读存储介质 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106713614A (zh) * | 2016-11-14 | 2017-05-24 | 上海斐讯数据通信技术有限公司 | 一种通过监测局域网选择性锁定应用程序的方法和终端 |
CN108156598B (zh) * | 2017-12-28 | 2021-10-22 | Tcl移动通信科技(宁波)有限公司 | 移动终端及wifi切换时应用控制方法、及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101079741A (zh) * | 2007-06-29 | 2007-11-28 | 杭州华三通信技术有限公司 | 接入点,接入控制器以及监控非法接入的方法 |
CN104025635A (zh) * | 2011-10-17 | 2014-09-03 | 迈克菲公司 | 移动风险评估 |
US20140273949A1 (en) * | 2013-03-13 | 2014-09-18 | Qualcomm Incorporated | Method and apparatus for wireless device countermeasures against malicious infrastructure |
-
2014
- 2014-10-22 CN CN201410568573.4A patent/CN105592448A/zh active Pending
-
2015
- 2015-02-15 WO PCT/CN2015/073128 patent/WO2016061965A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101079741A (zh) * | 2007-06-29 | 2007-11-28 | 杭州华三通信技术有限公司 | 接入点,接入控制器以及监控非法接入的方法 |
CN104025635A (zh) * | 2011-10-17 | 2014-09-03 | 迈克菲公司 | 移动风险评估 |
US20140273949A1 (en) * | 2013-03-13 | 2014-09-18 | Qualcomm Incorporated | Method and apparatus for wireless device countermeasures against malicious infrastructure |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114565059A (zh) * | 2022-03-17 | 2022-05-31 | 杭州云深科技有限公司 | 一种wifi标签的确定方法、电子设备及可读存储介质 |
CN114565059B (zh) * | 2022-03-17 | 2024-09-17 | 杭州云深科技有限公司 | 一种wifi标签的确定方法、电子设备及可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN105592448A (zh) | 2016-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10666635B2 (en) | Adaptive authentication systems and methods | |
US10594708B2 (en) | Providing security in a communication network | |
ES2881103T3 (es) | Método de conexión de red, terminal de punto de acceso y terminal de gestión | |
US9215005B2 (en) | Social cloud application-mediated mobile data hotspot sharing | |
US9743450B2 (en) | Learned dual band WiFi network association method | |
US11063934B2 (en) | Information pushing method, server, sharer client and third-party client | |
US9654981B2 (en) | Data integrity for proximity-based communication | |
US20100074112A1 (en) | Network traffic monitoring devices and monitoring systems, and associated methods | |
US9615257B2 (en) | Data integrity for proximity-based communication | |
CN104870068B (zh) | 一种接入网络的方法及路由器 | |
US10437978B2 (en) | Enhancing security of a mobile device based on location or proximity to another device | |
CN105101192A (zh) | 一种WiFi接入方法及装置 | |
WO2016061965A1 (zh) | wifi处理方法、系统及终端 | |
US11678261B2 (en) | Distributed wireless communication access security | |
US20140181909A1 (en) | System and method for secured access management | |
US9088982B2 (en) | Beacon frame data transmission rate adjustment | |
US10437979B2 (en) | Enhancing security of a mobile device based on location or proximity to another device | |
US9742769B2 (en) | Method and system for determining trusted wireless access points | |
CN108738015B (zh) | 网络安全保护方法、设备及系统 | |
US11552986B1 (en) | Cyber-security framework for application of virtual features | |
US9014634B2 (en) | Social network based Wi-Fi connectivity | |
CN106559779B (zh) | 一种数据传输方法、装置以及系统 | |
CN114189865B (zh) | 通信网络中的网络攻击防护方法、计算机装置和存储介质 | |
US9173103B2 (en) | Signal security for wireless access point | |
Padma et al. | Mobile Cloud Computing: Issues from a Security Perspective |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15852573 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15852573 Country of ref document: EP Kind code of ref document: A1 |