WO2017107966A1 - 基于局域网的无线热点控制方法和装置 - Google Patents
基于局域网的无线热点控制方法和装置 Download PDFInfo
- Publication number
- WO2017107966A1 WO2017107966A1 PCT/CN2016/111624 CN2016111624W WO2017107966A1 WO 2017107966 A1 WO2017107966 A1 WO 2017107966A1 CN 2016111624 W CN2016111624 W CN 2016111624W WO 2017107966 A1 WO2017107966 A1 WO 2017107966A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wireless hotspot
- user terminal
- creating
- terminal
- wireless
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/18—Management of setup rejection or failure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to the field of local area network technologies, and in particular, to a local area network-based wireless hotspot control method and apparatus.
- a wireless hotspot is a place where a WLAN (Wireless Local Area Networks) is connected to an Internet (Internet) service in a public place.
- the above public places may be internal to large enterprises, or may be cafes, airports, stations, business hotels, colleges, and large exhibition halls.
- users can access the Internet by using devices such as laptops with built-in or external wireless network cards. Therefore, wireless hotspots provide great convenience for users' network access.
- wireless hotspots also provide information security issues while providing convenience. For example, for a local area network such as a corporate network, if an enterprise employee establishes a wireless hotspot through a laptop computer, other terminal devices can access the local area network by connecting the wireless hotspot, which may cause data leakage of the enterprise and bring economic loss to the enterprise. In addition, if another terminal device connected to the wireless hotspot carries a malicious program, the malicious program is likely to attack the local area network through the connection of the wireless hotspot, which brings great security risks to the enterprise.
- the present invention has been made in order to provide a LAN-based wireless hotspot control method and apparatus that overcomes the above problems or at least partially solves the above problems.
- a local area network-based wireless hotspot control method includes:
- a wireless hotspot control apparatus for a local area network including:
- a monitoring module configured to obtain a wireless hotspot control policy corresponding to the user terminal when the operation of creating the wireless hotspot is detected; wherein the wireless hotspot control policy is provided by the control terminal in the local area network;
- the intercepting module is configured to intercept the operation of creating the wireless hotspot when the wireless hotspot control policy corresponding to the user terminal is disabled.
- a computer program comprising computer readable code, when said computer readable code is run on a computing device, causing said computing device to perform said local area network based wireless hotspot Control Method.
- a computer readable medium wherein the computer program is stored.
- a method and a device for controlling a wireless hotspot based on a local area network when monitoring the operation of creating a wireless hotspot, acquiring a wireless hotspot control policy corresponding to the user terminal, and a wireless hotspot control policy corresponding to the user terminal When it is forbidden, the operation of creating a wireless hotspot is intercepted, so that the operation of creating a wireless hotspot in the user terminal may be failed.
- the embodiment of the present invention can control the operation of creating a wireless hotspot in the user terminal according to the wireless hotspot control policy provided by the control terminal. For example, by setting the wireless hotspot control policy corresponding to the user terminal to be prohibited, the user terminal can be configured to perform the creation of the wireless hotspot. The operation causes the user terminal to fail to create a wireless hotspot, thereby improving the security of the local area network.
- FIG. 1 is a flow chart showing the steps of a local area network-based wireless hotspot control method according to an embodiment of the present invention
- FIG. 2 is a flow chart showing the steps of a local area network-based wireless hotspot control method according to an embodiment of the present invention
- FIG. 3 is a flow chart showing the steps of a local area network-based wireless hotspot control method according to an embodiment of the present invention
- FIG. 4 is a block diagram showing the structure of a local area network-based wireless hotspot control device according to an embodiment of the present invention
- Figure 5 shows schematically a block diagram of a computing device for performing the method according to the invention
- Fig. 6 schematically shows a storage unit for holding or carrying program code implementing the method according to the invention. .
- FIG. 1 is a flow chart showing the steps of a method for controlling a wireless hotspot based on a local area network according to an embodiment of the present invention, which may specifically include the following steps:
- step 101 when the operation of creating a wireless hotspot is detected, the wireless hotspot control policy corresponding to the user terminal is obtained, where the wireless hotspot control policy is provided by the control terminal in the local area network;
- Step 102 When the wireless hotspot control policy corresponding to the user terminal is disabled, the operation of creating a wireless hotspot is intercepted.
- a user terminal refers to a terminal device having a network card that can be set as a wireless hotspot, such as a desktop computer, a notebook computer, etc., the terminal device You can connect to the local area network by wire, or you can connect to the local area network wirelessly.
- the network card that can be set as the wireless hotspot may specifically be a wireless network card built in the terminal device or a USB wireless network card that can be set as a wireless hotspot.
- the control terminal can be used to provide a wireless hotspot control policy. For example, you can set which user terminals are prohibited/allowed to create wireless hotspots, etc., to prevent data leakage or intrusion of malicious programs in the local area network.
- the wireless hotspot control policy may be set to prohibit wireless hotspots from being created by all user terminals in the local area network, for example, by monitoring user terminals in the local area network, once If it is found that the user terminal is performing an operation attempting to create a wireless hotspot, the operation of creating the wireless hotspot is intercepted, so that the user terminal fails to create a wireless hotspot.
- a corresponding wireless hotspot control policy may also be formulated according to the nature of work of various departments within the enterprise. For example, because the staff of the R&D department often comes into contact with the core technical data of the enterprise, in order to prevent the leakage of the core technology of the company, the wireless hotspot control strategy corresponding to the user terminal of the R&D department can be set as prohibited. The administrative staff usually does not touch the core technology inside the enterprise. Therefore, the wireless hotspot control policy of the user terminal of the administrative department can be set as permitted.
- the security scan result from each user terminal in the local area network may be periodically collected by the control terminal, and the security level of each user terminal is determined by analyzing the security scan result of each user terminal. For a user terminal with a higher security level, the corresponding wireless hotspot control policy can be set to allow, and for a user terminal with a lower security level, the corresponding wireless hotspot control policy is disabled.
- the wireless hotspot control policy can be updated accordingly.
- the user terminal and the control terminal can communicate with each other through a standard protocol or a proprietary protocol.
- the private protocol has the advantages of high security and high security. It can be understood that the embodiment of the present invention is between the user terminal and the control terminal.
- the specific communication method is not limited.
- the user controlling the terminal may be an advanced user with certain network security knowledge, such as a network administrator. Therefore, the user controlling the terminal can flexibly formulate the corresponding wireless hotspot control according to the current security requirements and actual conditions of the local area network. Strategy to improve the security of the LAN.
- a monitoring module may be configured on the user terminal for monitoring whether an operation of creating a wireless hotspot is performed on the user terminal.
- the wireless hotspot control policy corresponding to the user terminal may be read from the control terminal in the local area network; and the user terminal is set according to the control terminal.
- the corresponding control operation is performed. Specifically, when the wireless hotspot control policy corresponding to the user terminal is disabled, the user terminal is intercepted to perform an operation of creating a wireless hotspot.
- the method for acquiring the wireless hotspot control policy is not limited.
- the wireless hotspot control policy may be stored in the control terminal, and the user terminal queries the corresponding wireless hotspot control policy through the local area network access control terminal, or controls.
- the terminal can send the foregoing wireless hotspot control policy to the user terminal, so that the user terminal can perform local query.
- the foregoing method may further include:
- the operation of creating the wireless hotspot is allowed to continue.
- the control terminal may formulate a corresponding wireless hotspot control policy for each user terminal, and send the corresponding wireless hotspot control policy to the corresponding user terminal.
- the wireless hotspot control policy may be represented by a mapping table, where the mapping table may include a terminal identifier of the user terminal and a mapping relationship of the corresponding wireless hotspot control policy. Referring to Table 1, a wireless device of the present invention is shown. A specific indication of the mapping table corresponding to the hotspot control policy.
- Terminal identification Wireless hotspot control strategy 00-01-02-03-04-05 allow 00-01-02-03-04-06 Prohibited
- the terminal identifier is a MAC (Media Access Control) address of the user terminal. It can be understood that, in practical applications, the present invention does not limit the terminal identifier, for example, the user terminal may also be used. IP address, etc.
- the prompt information may be displayed on the display interface to notify the user that the current terminal device prohibits the operation of creating the wireless hotspot.
- the wireless hotspot control policy corresponding to the user terminal is obtained, and when the wireless hotspot control policy corresponding to the user terminal is disabled, the creation is blocked.
- the operation of the wireless hotspot so that the operation of creating a wireless hotspot in the user terminal may fail.
- the embodiment of the present invention can control the operation of creating a wireless hotspot in the user terminal according to the wireless hotspot control policy provided by the control terminal. For example, by setting the wireless hotspot control policy corresponding to the user terminal to be prohibited, the user terminal can be configured to perform the creation of the wireless hotspot.
- the operation causes the user terminal to fail to create a wireless hotspot, thereby improving the security of the local area network.
- FIG. 2 a flow chart of steps of a method for controlling a wireless hotspot based on a local area network according to an embodiment of the present invention is shown.
- Step 201 When monitoring an operation of creating a service set identifier corresponding to the wireless hotspot, determining that the user terminal is performing an operation of creating a wireless hotspot;
- Step 202 Obtain a wireless hotspot control policy corresponding to the user terminal, where the wireless hotspot control policy is provided by a control terminal in the local area network;
- Step 203 When the wireless hotspot control policy corresponding to the user terminal is disabled, returning the failure information to the caller of the application programming interface that invokes the creation of the service set identifier, so that the operation of the user terminal to create the service set identifier fails;
- the service set identifier has a corresponding relationship with the wireless hotspot.
- the Service Set Identifier is wireless access. Point (AP) or the wireless router's logo character. Each created wireless hotspot has a unique SSID corresponding to it.
- the SSID is mainly used to distinguish different wireless networks. It can be composed of up to 32 characters. It is a wireless access ID card. As long as the wireless network card of the electronic device supports the scanning function, it is easy to access the wireless hotspot through the SSID.
- an event of creating a service set identifier in a user terminal may be monitored by a background process, for example, an operation of manually configuring an SSID by a user, or an operation of automatically creating an SSID by a process in a user terminal.
- the monitoring process can be implemented in a variety of ways.
- the broadcast message sent by the operating system of the user terminal can be monitored, and the event of creating the service set identifier is learned by filtering the broadcast message of the system. That is, the background process can judge each broadcast system message, and if the message type is an event that creates a service set identifier, the event can be intercepted.
- an API (Application Programming Interface) hook function of the user terminal operating system may be used to monitor an event that creates a service set identifier.
- the background function is used to provide the hook function, and the calling function that originally created the service set identification operation is switched to the hook function (usually by modifying the function entry address), so that the hook function can obtain the created SSID name, etc. Information, completes the listener for creating a service set identity event.
- the operation of creating the service set identifier in the above two manners is only used as an application example of the present invention.
- the present invention does not limit the manner of monitoring the operation of creating a service set identifier, and may be at the application layer. Monitoring can also be monitored at the driver level.
- the embodiment of the present invention implements the process of monitoring the operation of creating a wireless hotspot by monitoring the operation of creating the service set identifier, and the operation of creating the service set identifier corresponding to the wireless hotspot is monitored, and the wireless hotspot control policy corresponding to the user terminal is When it is forbidden, the caller of the application programming interface that invokes the creation of the service set identifier returns a failure information, so that the operation of the user terminal to create the service set identifier fails, and the operation of the user terminal to create the wireless hotspot fails.
- an initial step of creating a wireless hotspot may be found in the bottom layer, that is, a step of creating an SSID, and the operation of creating a wireless hotspot may be controlled according to a wireless hotspot control policy provided by the control terminal, so that the operation can be interrupted as early as possible. Create wireless hotspot operations to ensure the security of your LAN.
- FIG. 3 a flow chart of steps of a method for controlling a wireless hotspot based on a local area network according to an embodiment of the present invention is shown, which may specifically include the following steps:
- step 301 when the operation of creating a wireless hotspot is detected, the wireless hotspot control policy corresponding to the user terminal is obtained, where the wireless hotspot control policy is provided by the control terminal in the local area network;
- Step 302 When the wireless hotspot control policy corresponding to the user terminal is allowed, the operation of creating the wireless hotspot is allowed to continue;
- Step 303 After the operation of creating the wireless hotspot is completed, save the connection record corresponding to the wireless hotspot; wherein the connection record includes at least one of the following information: a user terminal that creates the wireless hotspot a terminal identifier, a terminal identifier corresponding to the user terminal that connects the wireless hotspot, and a hotspot identifier of the wireless hotspot;
- Step 304 Upload a connection record corresponding to the wireless hotspot to the control terminal.
- connection record corresponding to a wireless hotspot of the present invention is shown.
- Hotspot2 Create a wireless hotspot terminal Terminal connected to a wireless hotspot Hot spot 00-01-02-03-04-05 00-01-02-03-04-07 Hotspot1 00-01-02-03-04-06 00-01-02-03-04-08 Hotspot2
- connection record corresponding to the wireless hotspot can be recorded, and the connection record is uploaded to the control terminal in the local area network, so that the administrator of the local area network can query the user terminal through the control terminal.
- the wireless hotspot and the connection information, the connection record corresponding to the wireless hotspot may include a terminal identifier corresponding to the user terminal that creates the wireless hotspot, a terminal identifier corresponding to the user terminal that connects the wireless hotspot, and a hotspot identifier of the wireless hotspot.
- connection record it can be known that the user terminal in the enterprise creates a wireless connection, and which user terminals are connected to the wireless connection, and can locate the user terminal according to the terminal identifier of the user terminal, so as to perform the user terminal.
- Control for example, can disconnect the user terminal's local area network to prevent the leakage of important files or malicious programs, so that early detection and prevention of events that may cause losses or security threats to the enterprise can occur.
- Hotspot control strategy may perform behavior analysis on the user terminal according to the received connection record corresponding to the wireless hotspot created by the user terminal in the local area network, and find that the user terminal has a suspicious behavior, for example, The user terminal A creates a wireless hotspot, but the terminal identifier corresponding to the user terminal B connected to the wireless hotspot is an unknown identifier. If the control terminal does not record information, the user terminal B may bring the external terminal device inside the enterprise for the enterprise personnel.
- the local area network connection of the user terminal A may be disconnected, and the wireless hotspot control policy corresponding to the user terminal A is updated to be prohibited to prevent leakage of important files or malicious programs. Invasion.
- FIG. 4 a structural block diagram of a local area network-based wireless hotspot control apparatus according to an embodiment of the present invention is shown, which may specifically include the following modules:
- the monitoring module 401 is configured to: when detecting the operation of creating a wireless hotspot, obtain a wireless hotspot control policy corresponding to the user terminal; wherein the wireless hotspot control policy is provided by the control terminal in the local area network; and
- the intercepting module 402 is configured to intercept the operation of creating a wireless hotspot when the wireless hotspot control policy corresponding to the user terminal is disabled.
- the monitoring module is specifically configured to determine, when the operation of creating a service set identifier corresponding to the wireless hotspot is detected, that the user terminal is performing an operation of creating a wireless hotspot.
- the intercepting module is specifically configured to: when the wireless hotspot control policy corresponding to the user terminal is disabled, return to the caller of the application programming interface that creates the service set identifier.
- the failure information is such that the operation of the user terminal to create the service set identifier fails; wherein the service set identifier has a corresponding relationship with the wireless hotspot.
- the apparatus may further include:
- the enabling module is configured to allow the operation of creating the wireless hotspot to continue to be performed when the wireless hotspot control policy corresponding to the user terminal is allowed.
- the apparatus may further include:
- a recording module configured to save a connection record corresponding to the wireless hotspot after the operation of creating the wireless hotspot is completed; wherein the connection record includes at least one of the following information: a terminal identifier corresponding to the user terminal of the wireless hotspot, a terminal identifier corresponding to the user terminal connected to the wireless hotspot, and a hotspot identifier of the wireless hotspot;
- an uploading module configured to upload a connection record corresponding to the wireless hotspot to the control terminal.
- the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
- the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
- a microprocessor or digital signal processor may be used in practice to implement some or some of some or all of the components of a local area network based wireless hotspot control method and apparatus in accordance with embodiments of the present invention. All features.
- the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
- a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
- Figure 5 illustrates a computing device that can implement a local area network based wireless hotspot control method in accordance with the present invention.
- the computing device conventionally includes a processor 510 and a computer program product or computer readable medium in the form of a memory 520.
- the memory 520 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
- Memory 520 has a memory space 530 for program code 531 for performing any of the method steps described above.
- storage space 530 for program code may include various program code 531 for implementing various steps in the above methods, respectively.
- the program code can be read from or written to one or more computer program products.
- These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
- Such computer program products are typically portable or fixed storage units as described with reference to FIG.
- the storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 520 in the computing device of FIG.
- the program code can be compressed, for example, in an appropriate form.
- the storage unit includes computer readable code 531', i.e., may be, for example, such as 510
- the code read by the processor that, when executed by the computing device, causes the computing device to perform various steps in the methods described above.
- modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
- the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
- any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
- Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
一种基于局域网的无线热点控制方法和装置,其中的方法具体包括:在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控制终端所提供;在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作。本发明实施例能够拦截用户终端中执行创建无线热点的操作,使得用户终端创建无线热点失败,从而可以提高局域网的安全性。
Description
本申请要求在2015年12月24日提交中国专利局、申请号为201510991478.X、发明名称为“基于局域网的无线热点控制方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及局域网技术领域,特别是涉及一种基于局域网的无线热点控制方法和装置。
随着网络技术的迅猛发展,无线热点(Hotspot)的应用也越来越广泛。无线热点是在公共场所提供WLAN(Wireless Local Area Networks,无线局域网)接入Internet(因特网)服务的地点。上述公共场所可以是大型企业内部,也可以是咖啡馆、机场、车站、商务酒店、高等院校、大型展览会馆等。在无线热点覆盖的公共场所,用户可以通过使用装有内置或外置无线网卡的笔记本电脑等设备来实现对Internet的接入,因此无线热点为用户的网络接入提供了极大的便利。
然而,无线热点在提供便利的同时也带来了信息安全的问题。例如对于企业网等局域网而言,如果企业员工通过笔记本电脑建立无线热点,其它终端设备则可以通过连接该无线热点接入局域网,有可能造成企业的数据泄露,为企业带来经济损失。此外,如果连接该无线热点的其它终端设备携带有恶意程序,则恶意程序很有可能通过该无线热点的连接对局域网进行攻击,为企业带来极大的安全隐患。
发明内容
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的一种基于局域网的无线热点控制方法和装置。
依据本发明的一个方面,提供了一种基于局域网的无线热点控制方法,
包括:
在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控制终端所提供;
在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作。
根据本发明的另一方面,提供了一种于局域网的无线热点控制装置,包括:
监测模块,用于在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控制终端所提供;及
拦截模块,用于在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作。
根据本发明的又一个方面,提供了一种计算机程序,其包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行所述的基于局域网的无线热点控制方法。
根据本发明的再一个方面,提供了一种计算机可读介质,其中存储了所述的计算机程序。
根据本发明实施例的一种基于局域网的无线热点控制方法和装置,在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略,在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作,从而可以使得所述用户终端中创建无线热点的操作失败。本发明实施例可以按照控制终端提供的无线热点控制策略对用户终端中创建无线热点的操作进行控制,例如通过设置用户终端对应的无线热点控制策略为禁止,可以拦截该用户终端中执行创建无线热点的操作,使得该用户终端创建无线热点失败,从而可以提高局域网的安全性。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
通过阅读下文可选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出可选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了根据本发明一个实施例的一种基于局域网的无线热点控制方法的步骤流程图;
图2示出了根据本发明一个实施例的一种基于局域网的无线热点控制方法的步骤流程图;
图3示出了根据本发明一个实施例的一种基于局域网的无线热点控制方法的步骤流程图;以及
图4示出了根据本发明一个实施例的一种基于局域网的无线热点控制装置的结构框图;
图5示意性地示出了用于执行根据本发明的方法的计算设备的框图;
图6示意性地示出了用于保持或者携带实现根据本发明的方法的程序代码的存储单元。。
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
参照图1,示出了根据本发明一个实施例的一种基于局域网的无线热点控制方法的步骤流程图,具体可以包括如下步骤:
步骤101、在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控制终端所提供;
步骤102、在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作。
本发明实施例可以应用于企业网、政府网、校园网等局域网中;在上述局域网中,用户终端指具有可设置为无线热点的网卡的终端设备,例如台式电脑,笔记本电脑等,该终端设备可以有线方式连接局域网络,也可以无线方式连接局域网络。其中,可设置为无线热点的网卡具体可以是终端设备内置的无线网卡或者是可设置为无线热点的USB无线网卡。所述控制终端可用于提供无线热点控制策略,例如可以设置禁止/允许哪些用户终端创建无线热点等,以防止局域网内数据泄露或者恶意程序的入侵。
在本发明的一种应用示例中,为了保证局域网的安全性,可以设置所述无线热点控制策略为禁止局域网内的所有用户终端创建无线热点,例如,通过对局域网内的用户终端进行监测,一旦发现存在用户终端正在执行尝试创建无线热点的操作,则拦截该创建无线热点的操作,以使该用户终端创建无线热点失败。
在本发明的另一种应用示例中,还可以根据企业内各部门的工作性质制定对应的无线热点控制策略。例如,由于研发部门的工作人员经常接触到企业内部的核心技术数据,为了防止公司的核心技术外泄,可以设置研发部门的用户终端对应的无线热点控制策略为禁止。而行政部门的工作人员通常不接触企业内部的核心技术,因此,可以设置行政部门的用户终端的无线热点控制策略为允许。
在本发明的又一种应用示例中,还可以通过控制终端周期性地收集来自局域网内各用户终端的安全扫描结果,通过对各用户终端的安全扫描结果进行分析,确定各用户终端的安全级别,对于安全级别较高的用户终端可以设置对应的无线热点控制策略为允许,而对于安全级别较低的用户终端设置对应的无线热点控制策略为禁止。通过周期性的收集来自局域网内各用户终端的安全扫描结果,在用户终端的安全级别发生变化时,可以对无线热点控制策略进行相应的更新。
可以理解,上述制定无线热点控制策略的方式仅作为本发明的应用示例,在实际应用中,本领域技术人员可以根据实际需要灵活制定无线热点控制策略。
其中,上述用户终端和上述控制终端之间可以通过标准协议或者私有协议进行通信,其中,私有协议具有封闭性和安全性高的优点;可以理解,本发明实施例对于用户终端和控制终端之间的具体通信方式不加以限制。
在实际应用中,控制终端的用户可以是网络管理员等具有一定的网络安全知识的高级用户,因此,控制终端的用户可以根据局域网的当前安全需求和实际情况,灵活地制定相应的无线热点控制策略,以提高局域网的安全性。
在本发明实施例中,在用户终端上可以设置有监测模块,用于监测用户终端上是否有创建无线热点的操作。在监测到用户终端上有执行创建无线热点的操作时,则可以从所述局域网内的控制终端读取所述用户终端对应的无线热点控制策略;根据所述控制终端中设置的所述用户终端对用的无线热点控制策略,执行对应的控制操作。具体地,在所述用户终端对应的无线热点控制策略为禁止时,拦截所述用户终端执行创建无线热点的操作。
可以理解,本发明对于上述无线热点控制策略的获取方式不加以限制,例如,可以将无线热点控制策略存储在控制终端,用户终端通过局域网访问控制终端在线查询对应的无线热点控制策略,或者,控制终端可以将上述无线热点控制策略下发至用户终端,以使用户终端可以在本地进行查询。
在本发明的一种可选实施例中,上述方法还可以包括:
在所述用户终端对应的无线热点控制策略为允许时,允许继续执行所述创建无线热点的操作。
在本发明的一种应用示例中,控制终端可以为每个用户终端制定对应的无线热点控制策略,并通过企业局域网下发到对应的用户终端。其中,无线热点控制策略可以通过一张映射表来表示,在该映射表中可以包括用户终端的终端标识以及对应无线热点控制策略的映射关系,参照表1,示出了本发明的一种无线热点控制策略对应的映射表的具体示意。
表1
终端标识 | 无线热点控制策略 |
00-01-02-03-04-05 | 允许 |
00-01-02-03-04-06 | 禁止 |
00-01-02-03-04-07 | 禁止 |
00-01-02-03-04-08 | 允许 |
在上述表1中,终端标识采用的是用户终端的MAC(Media Access Control,媒体访问控制)地址,可以理解,在实际应用中,本发明对于终端标识不加以限制,例如还可以采用用户终端的IP地址等。
在具体应用中,在拦截所述用户终端执行创建无线热点的操作之后,还可以在显示界面显示提示信息,以告知用户当前的终端设备禁止执行创建无线热点的操作。
综上,在本发明实施例中,在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略,在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作,从而可以使得所述用户终端中创建无线热点的操作失败。本发明实施例可以按照控制终端提供的无线热点控制策略对用户终端中创建无线热点的操作进行控制,例如通过设置用户终端对应的无线热点控制策略为禁止,可以拦截该用户终端中执行创建无线热点的操作,使得该用户终端创建无线热点失败,从而可以提高局域网的安全性。
参照图2,示出了根据本发明一个实施例的一种基于局域网的无线热点控制方法的步骤流程图,具体可以包括如下步骤:
步骤201、在监测到创建无线热点对应的服务集标识的操作时,确定所述用户终端正在执行创建无线热点的操作;
步骤202、获取所述用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控制终端所提供;
步骤203、在所述用户终端对应的无线热点控制策略为禁止时,向调用创建服务集标识的应用编程接口的调用方返回失败信息,以使所述用户终端创建服务集标识的操作失败;其中,所述服务集标识与所述无线热点具有对应关系。
在具体应用中,服务集标识(Service Set Identifier,SSID)是无线接入
点(Access Point,AP)或无线路由器的标志字符。每个创建的无线热点都有一个与之对应的唯一的SSID,SSID主要用来区分不同的无线网络,最多可以由32个字符组成,它是无线接入的身份证。只要电子设备的无线网卡支持扫描功能,就能很轻松的通过SSID接入无线热点。
在本发明实施例中,可以通过一个后台进程对用户终端中创建服务集标识的事件进行监测,例如监测用户通过手动配置SSID的操作,或者用户终端中通过进程自动创建SSID的操作等。具体地,可以通过多种方式实现该监测过程。例如,可以监听用户终端操作系统发出的广播消息,通过对系统广播消息的过滤,获知创建服务集标识的事件。也即,后台进程可以对每一个广播的系统消息进行判断,如果消息类型为创建服务集标识的事件,则可以对该事件进行拦截。
或者,也可以利用用户终端操作系统的API(Application Programming Interface,应用程序编程接口)钩子函数,对创建服务集标识的事件进行监听。在本发明实施例中,利用后台进程提供钩子函数,并将系统原本创建服务集标识操作的调用函数转向钩子函数(通常通过修改函数入口地址实现),这样钩子函数就能够获得创建的SSID名称等信息,完成对创建服务集标识事件的监听。
可以理解,通过上述两种方式监测创建服务集标识的操作仅作为本发明的一种应用示例,在实际应用中,本发明对创建服务集标识操作的监测方式不加以限制,既可以在应用层监测,也可以在驱动层进行监测。
本发明实施例通过对创建服务集标识的操作进行监测,来实现监测创建无线热点操作的过程,在监测到创建无线热点对应的服务集标识的操作,并且所在用户终端对应的无线热点控制策略为禁止时,向调用创建服务集标识的应用编程接口的调用方返回失败信息,以使所述用户终端创建服务集标识的操作失败,进而使得用户终端创建无线热点的操作失败。本发明实施例可以在底层发现创建无线热点的初始步骤,即创建SSID的步骤,此时即可根据控制终端提供的无线热点控制策略对该创建无线热点的操作进行控制,从而可以尽早地中断该创建无线热点的操作,以及时保证局域网的安全性。
参照图3,示出了根据本发明一个实施例的一种基于局域网的无线热点控制方法的步骤流程图,具体可以包括如下步骤:
步骤301、在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控制终端所提供;
步骤302、在所述用户终端对应的无线热点控制策略为允许时,允许继续执行所述创建无线热点的操作;
步骤303、在所述创建无线热点的操作完成之后,保存所述无线热点对应的连接记录;其中,所述连接记录中包括如下信息中的至少一种:创建所述无线热点的用户终端对应的终端标识、连接所述无线热点的用户终端对应的终端标识、以及无线热点的热点标识;
步骤304、将所述无线热点对应的连接记录上传至所述控制终端。
参照表2,示出了本发明的一种无线热点对应的连接记录的具体示意。
表2
创建无线热点的终端 | 连接无线热点的终端 | 热点标识 |
00-01-02-03-04-05 | 00-01-02-03-04-07 | Hotspot1 |
00-01-02-03-04-06 | 00-01-02-03-04-08 | Hotspot2 |
本发明实施例在创建无线热点的操作完成之后,可以记录该无线热点对应的连接记录,并将该连接记录上传至局域网内的控制终端,以使局域网的管理员可以通过控制终端查询用户终端的无线热点和连接信息,由于该无线热点对应的连接记录中可以包括创建所述无线热点的用户终端对应的终端标识、连接所述无线热点的用户终端对应的终端标识、以及无线热点的热点标识,因此,通过该连接记录可以得知企业内部那台用户终端创建了无线连接,以及哪些用户终端连接了该无线连接,并且可以根据用户终端的终端标识定位到该用户终端,以对该用户终端进行管控,例如可以断开该用户终端的局域网连接以防止重要文件外泄或者恶意程序的入侵,从而可以及早发现并阻止可能会给企业带来损失或者安全威胁的事件发生。
进一步地,还可以根据该无线热点对应的连接记录制定更加合理的无线
热点控制策略。具体地,控制终端可以根据接收到的来自局域网内用户终端创建的无线热点对应的连接记录,对用户终端进行行为分析,在发现用户终端存在可疑行为时,例如,通过连接记录得知企业内某台用户终端A创建了无线热点,但连接该无线热点的用户终端B对应的终端标识为未知标识,在控制终端没有记录信息,则用户终端B可能为企业人员带入企业内部的外来终端设备,为了防止用户终端A向用户终端B传输企业内的重要文件,可以断开用户终端A的局域网连接,并且将用户终端A对应的无线热点控制策略更新为禁止,以防止重要文件外泄或者恶意程序的入侵。
参照图4,示出了根据本发明一个实施例的一种基于局域网的无线热点控制装置的结构框图,具体可以包括如下模块:
监测模块401,用于在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控制终端所提供;及
拦截模块402,用于在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作。
在本发明的一种可选实施例中,所述监测模块,具体用于在监测到创建无线热点对应的服务集标识的操作时,确定所述用户终端正在执行创建无线热点的操作。
在本发明的另一种可选实施例中,所述拦截模块,具体用于在所述用户终端对应的无线热点控制策略为禁止时,向调用创建服务集标识的应用编程接口的调用方返回失败信息,以使所述用户终端创建服务集标识的操作失败;其中,所述服务集标识与所述无线热点具有对应关系。
在本发明的又一种可选实施例中,所述装置还可以包括:
允许模块,用于在所述用户终端对应的无线热点控制策略为允许时,允许继续执行所述创建无线热点的操作。
在本发明的再一种优选实施例中,所述装置还可以包括:
记录模块,用于在所述创建无线热点的操作完成之后,保存所述无线热点对应的连接记录;其中,所述连接记录中包括如下信息中的至少一种:创
建所述无线热点的用户终端对应的终端标识、连接所述无线热点的用户终端对应的终端标识、以及无线热点的热点标识;
上传模块,用于将所述无线热点对应的连接记录上传至所述控制终端。
对于装置实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的基于局域网的无线热点控制方法和装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
例如,图5示出了可以实现根据本发明的基于局域网的无线热点控制方法的计算设备。该计算设备传统上包括处理器510和以存储器520形式的计算机程序产品或者计算机可读介质。存储器520可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器520具有用于执行上述方法中的任何方法步骤的程序代码531的存储空间530。例如,用于程序代码的存储空间530可以包括分别用于实现上面的方法中的各种步骤的各个程序代码531。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图6所述的便携式或者固定存储单元。该存储单元可以具有与图5的计算设备中的存储器520类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括计算机可读代码531’,即可以由例如诸如510之类的处
理器读取的代码,这些代码当由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其
它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包括”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。
Claims (12)
- 一种基于局域网的无线热点控制方法,包括:在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控制终端所提供;在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作。
- 如权利要求1所述的方法,其特征在于,通过如下步骤监测创建无线热点的操作:在监测到创建无线热点对应的服务集标识的操作时,确定所述用户终端正在执行创建无线热点的操作。
- 如权利要求2所述的方法,其特征在于,所述在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作的步骤,包括:在所述用户终端对应的无线热点控制策略为禁止时,向调用创建服务集标识的应用编程接口的调用方返回失败信息,以使所述用户终端创建服务集标识的操作失败;其中,所述服务集标识与所述无线热点具有对应关系。
- 如权利要求1所述的方法,其特征在于,所述方法还包括:在所述用户终端对应的无线热点控制策略为允许时,允许继续执行所述创建无线热点的操作。
- 如权利要求4所述的方法,其特征在于,所述方法还包括:在所述创建无线热点的操作完成之后,保存所述无线热点对应的连接记录;其中,所述连接记录中包括如下信息中的至少一种:创建所述无线热点的用户终端对应的终端标识、连接所述无线热点的用户终端对应的终端标识、以及无线热点的热点标识;将所述无线热点对应的连接记录上传至所述控制终端。
- 一种基于局域网的无线热点控制装置,包括:监测模块,用于在监测到创建无线热点的操作时,获取所在用户终端对应的无线热点控制策略;其中,所述无线热点控制策略为所述局域网中的控 制终端所提供;及拦截模块,用于在所述用户终端对应的无线热点控制策略为禁止时,拦截所述创建无线热点的操作。
- 如权利要求6所述的装置,其特征在于,所述监测模块,具体用于在监测到创建无线热点对应的服务集标识的操作时,确定所述用户终端正在执行创建无线热点的操作。
- 如权利要求7所述的装置,其特征在于,所述拦截模块,具体用于在所述用户终端对应的无线热点控制策略为禁止时,向调用创建服务集标识的应用编程接口的调用方返回失败信息,以使所述用户终端创建服务集标识的操作失败;其中,所述服务集标识与所述无线热点具有对应关系。
- 如权利要求6所述的装置,其特征在于,所述装置还包括:允许模块,用于在所述用户终端对应的无线热点控制策略为允许时,允许继续执行所述创建无线热点的操作。
- 如权利要求9所述的装置,其特征在于,所述装置还包括:记录模块,用于在所述创建无线热点的操作完成之后,保存所述无线热点对应的连接记录;其中,所述连接记录中包括如下信息中的至少一种:创建所述无线热点的用户终端对应的终端标识、连接所述无线热点的用户终端对应的终端标识、以及无线热点的热点标识;上传模块,用于将所述无线热点对应的连接记录上传至所述控制终端。
- 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求1-5中的任一个所述的基于局域网的无线热点控制方法。
- 一种计算机可读介质,其中存储了如权利要求11所述的计算机程序。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510991478.XA CN105682095A (zh) | 2015-12-24 | 2015-12-24 | 基于局域网的无线热点控制方法和装置 |
CN201510991478.X | 2015-12-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017107966A1 true WO2017107966A1 (zh) | 2017-06-29 |
Family
ID=56297667
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/111624 WO2017107966A1 (zh) | 2015-12-24 | 2016-12-23 | 基于局域网的无线热点控制方法和装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105682095A (zh) |
WO (1) | WO2017107966A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105682095A (zh) * | 2015-12-24 | 2016-06-15 | 北京奇虎科技有限公司 | 基于局域网的无线热点控制方法和装置 |
CN108668336A (zh) * | 2018-06-01 | 2018-10-16 | 中国联合网络通信集团有限公司 | 无线热点管理方法、装置、终端及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120030351A1 (en) * | 2010-07-29 | 2012-02-02 | Pfu Limited | Management server, communication cutoff device and information processing system |
CN103260262A (zh) * | 2013-05-30 | 2013-08-21 | 北京奇虎科技有限公司 | 实现自动创建无线热点的方法、装置和系统 |
CN103619018A (zh) * | 2013-11-21 | 2014-03-05 | 北京奇虎科技有限公司 | 一种无线网络访问权限的检测方法,装置及路由器 |
CN103929798A (zh) * | 2013-01-14 | 2014-07-16 | 中兴通讯股份有限公司 | 无线通讯热点创建和连接方法、热点创建端及热点连接端 |
CN104540183A (zh) * | 2014-12-03 | 2015-04-22 | 北京奇虎科技有限公司 | 一种无线热点的控制方法和装置 |
CN105682095A (zh) * | 2015-12-24 | 2016-06-15 | 北京奇虎科技有限公司 | 基于局域网的无线热点控制方法和装置 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100433899C (zh) * | 2004-12-28 | 2008-11-12 | 华为技术有限公司 | 一种保证移动通信系统数据业务安全的方法及系统 |
CN102932329B (zh) * | 2012-09-26 | 2016-03-30 | 北京奇虎科技有限公司 | 一种对程序的行为进行拦截的方法、装置和客户端设备 |
CN103810031B (zh) * | 2014-02-26 | 2017-05-10 | 珠海市君天电子科技有限公司 | 一种管理无线网共享软件的方法和装置 |
EP3869766B1 (en) * | 2014-05-31 | 2022-09-28 | Huawei Technologies Co., Ltd. | Network connection method, hotspot terminal and management terminal |
CN104602192A (zh) * | 2015-02-03 | 2015-05-06 | 巫立斌 | 一种移动终端的远程控制方法 |
CN104869569A (zh) * | 2015-03-31 | 2015-08-26 | 小米科技有限责任公司 | 应用程序的网络权限控制方法及装置 |
-
2015
- 2015-12-24 CN CN201510991478.XA patent/CN105682095A/zh active Pending
-
2016
- 2016-12-23 WO PCT/CN2016/111624 patent/WO2017107966A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120030351A1 (en) * | 2010-07-29 | 2012-02-02 | Pfu Limited | Management server, communication cutoff device and information processing system |
CN103929798A (zh) * | 2013-01-14 | 2014-07-16 | 中兴通讯股份有限公司 | 无线通讯热点创建和连接方法、热点创建端及热点连接端 |
CN103260262A (zh) * | 2013-05-30 | 2013-08-21 | 北京奇虎科技有限公司 | 实现自动创建无线热点的方法、装置和系统 |
CN103619018A (zh) * | 2013-11-21 | 2014-03-05 | 北京奇虎科技有限公司 | 一种无线网络访问权限的检测方法,装置及路由器 |
CN104540183A (zh) * | 2014-12-03 | 2015-04-22 | 北京奇虎科技有限公司 | 一种无线热点的控制方法和装置 |
CN105682095A (zh) * | 2015-12-24 | 2016-06-15 | 北京奇虎科技有限公司 | 基于局域网的无线热点控制方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
CN105682095A (zh) | 2016-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11089476B2 (en) | Network access control method and apparatus | |
US11057948B2 (en) | Method and apparatus for connecting to wireless access point | |
WO2016101729A1 (zh) | 无线网络接入的方法、装置及系统 | |
KR101109317B1 (ko) | 무선 통신망에서 비접속 클라이언트들과 로그 액세스포인트들의 협력적 위치 파악 | |
US9730075B1 (en) | Systems and methods for detecting illegitimate devices on wireless networks | |
WO2016086763A1 (zh) | 无线访问节点检测方法、无线网络检测系统和服务器 | |
WO2016000589A1 (en) | Method, system and apparatus for automatically connecting to wlan | |
US20150040194A1 (en) | Monitoring of smart mobile devices in the wireless access networks | |
US8782745B2 (en) | Detection of unauthorized wireless access points | |
CN103843380B (zh) | 用于监视未经授权接入点的监视系统、监视服务器、方法和程序 | |
CN102014459B (zh) | 无线接入控制方法和装置 | |
US20140201808A1 (en) | Network system, mobile communication device and program | |
US10015768B1 (en) | Systems and methods for locating unrecognized computing devices | |
WO2016090920A1 (zh) | 实现共享wlan管理的方法、系统及wlan共享注册服务器 | |
US20130340046A1 (en) | Wireless network client-authentication system and wireless network connection method thereof | |
WO2018113728A1 (zh) | 公共WiFi钓鱼风险的检测方法和装置 | |
US11240136B2 (en) | Determining attributes using captured network probe data in a wireless communications system | |
US11363017B2 (en) | Smart home network security through blockchain | |
US9153120B1 (en) | Systems and methods for locating lost devices | |
WO2017107966A1 (zh) | 基于局域网的无线热点控制方法和装置 | |
US10383031B2 (en) | Zone-based network device monitoring using a distributed wireless network | |
WO2018113732A1 (zh) | Dns全流量劫持风险的检测方法和装置 | |
US20190037524A1 (en) | Network Device Navigation Using A Distributed Wireless Network | |
US9913201B1 (en) | Systems and methods for detecting potentially illegitimate wireless access points | |
CN113438712A (zh) | 一种无线连接方法及设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16877776 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16877776 Country of ref document: EP Kind code of ref document: A1 |