WO2017166639A1 - 一种无线网络安全管理方法、装置和电子设备 - Google Patents
一种无线网络安全管理方法、装置和电子设备 Download PDFInfo
- Publication number
- WO2017166639A1 WO2017166639A1 PCT/CN2016/096917 CN2016096917W WO2017166639A1 WO 2017166639 A1 WO2017166639 A1 WO 2017166639A1 CN 2016096917 W CN2016096917 W CN 2016096917W WO 2017166639 A1 WO2017166639 A1 WO 2017166639A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- account information
- wireless network
- security
- unsecured
- unsafe
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
Definitions
- the present invention relates to the field of network security, and in particular, to a wireless network security management method, apparatus, and electronic device.
- Mobile wireless networks include both global voice and data networks that allow users to establish long-range wireless connectivity, as well as infrared and RF technologies optimized for short-range wireless connectivity.
- the wireless networks of mainstream applications are divided into wireless networks (such as 4G, 3G or GPRS) and wireless LANs (WiFi, Bluetooth, hotspots) implemented by public mobile communication networks.
- the wireless network can be constructed anytime and anywhere through a wireless router.
- the wireless router can be regarded as a transponder to forward the broadband network signal from the wall in the home to the nearby wireless network device (laptop, wifi-enabled mobile phone, Tablet and all WIFI-enabled devices.
- wireless LAN With the popularity of wireless LAN technology, more and more occasions provide free wifi services, such as restaurants, shopping malls, playgrounds, office buildings, etc., but because of the different security levels of different wireless networks, so in a large number In the wireless network, some wireless networks have a higher security level. It can be used with confidence. In some cases, the wireless network should be kept secret when using it because of its low security level. Even some wireless networks are set up for maliciously obtaining other people's information. These wireless networks should be avoided. Currently, some users set up to automatically connect to the wireless network in order to save traffic. Although some users have encountered information disclosure when using these wireless networks, but because others do not understand the situation, they will again leak personal information through these insecure wireless networks, setting up property damage.
- the technical problem to be solved by the present invention is to overcome the defects of the insecure wireless network and the leakage of user information in the prior art.
- the present invention provides a wireless network security management method, including the following steps:
- the method further includes connecting the wireless network if the account information does not exist in the unsecured account information.
- the method further includes: if the account information does not exist in the unsecured account information, detecting a security level of the wireless network, and when the security level is greater than a preset threshold, connecting the wireless network Network.
- the step of establishing unsecured account information is also included.
- the step of establishing unsafe account information includes:
- the account information of the wireless network whose ratio of the unsafe identifier is greater than the preset ratio is added to the unsecured account information.
- the method further includes acquiring account information of the wireless network manually added by the user, and adding the account information to the unsecured account information.
- the invention provides a wireless network security management device, comprising:
- An account information obtaining unit configured to obtain account information of the searched wireless network
- a searching unit configured to search for account information of the wireless network in the preset unsafe account information
- a determining unit configured to determine whether the account information exists in the unsafe account information
- Rejecting the connection unit for rejecting the connection to the wireless network when the account information exists in the unsecured account information.
- the method further includes a first connecting unit, if the unsafe account information does not exist
- the account information is connected to the wireless network.
- the second connecting unit is further configured to: if the account information does not exist in the unsecured account information, detect a security level of the wireless network, and when the security level is greater than a preset threshold, connect the wireless network .
- an unsecure account establishing unit is further included for establishing unsafe account information.
- Embodiments of the invention further disclose an electronic device comprising at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor The instructions are executed by the at least one processor to enable the at least one processor to search for a surrounding wireless network; obtain account information of the searched wireless network; look up the predetermined unsafe account information Account information of the wireless network; determining whether the account information exists in the unsafe account information, and if so, refusing to connect to the wireless network.
- the wireless network may be connected if the account information does not exist in the unsecured account information.
- the security level of the wireless network is detected, and when the security level is greater than a preset threshold, the wireless network is connected.
- the establishing the unsecure account information comprises: acquiring a user pair a security identifier of the account information of each wireless network, where the security identifier includes at least a security identifier and an unsecure identifier; adding account information of the wireless network whose ratio of the unsecure identifier is greater than a preset ratio to the unsecured account information .
- the present invention also discloses a non-volatile computer storage medium, wherein the storage medium stores computer-executable instructions that, when executed by an electronic device, enable the electronic device to: search for surrounding wireless networks Obtaining the account information of the searched wireless network; searching for the account information of the wireless network in the preset unsafe account information; determining whether the account information exists in the unsafe account information, and if yes, rejecting the connection to the wireless The internet.
- the foregoing storage medium further comprising connecting the wireless network if the account information does not exist in the unsecured account information.
- the foregoing storage medium further comprising: detecting the security level of the wireless network if the account information does not exist in the unsecured account information, and connecting the wireless network when the security level is greater than a preset threshold.
- the above storage medium further comprising the step of establishing unsecure account information.
- the step of establishing the unsecure account information includes: obtaining a security identifier of the account information of the user for each wireless network, where the security degree identifier includes at least a security identifier and an unsafe identifier; The account information of the wireless network whose ratio of the security identifier is greater than the preset ratio is added to the unsecured account information.
- the embodiment of the invention further provides a computer program product, the computer program product package A computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform any of the methods described above.
- the wireless network security management method provided by the present invention firstly searches for a surrounding wireless network, and then obtains the account information of the searched wireless network, and then searches for the account information of the wireless network in the preset unsafe account information. And determining whether the account information exists in the unsafe account information, and if yes, rejecting the connection to the wireless network.
- the unsafe account information in advance, when it is detected that the current wireless network belongs to the unsafe account information, it is not connected, and the security of the connected wireless network can be improved by using the scheme, so that the current wireless network can be effectively avoided.
- the wireless network when the wireless network is automatically connected, the problem of wireless network security cannot be distinguished, and the function of automatically identifying the secure wireless network is realized, and the security performance when the wireless network is used is improved.
- the wireless network security management method provided by the present invention further includes detecting a security level of the wireless network, and connecting the wireless network when the security level is greater than a preset threshold.
- the solution can further improve the security level of the wireless network. Although it does not belong to the unsafe account information, it also needs the security level of the wireless network to a certain extent, and avoids the problem of information leakage caused by the use of the wireless network with poor security level.
- the wireless network security management method provided by the present invention further includes the steps of establishing unsecured account information, establishing an unsecure account by obtaining security evaluations of a plurality of users on the wireless network, and setting an unsecure account through user input. Make the information of the unsafe account more complete.
- FIG. 1 is a flowchart of a wireless network security management method according to Embodiment 1 of the present invention.
- FIG. 2 is a structural block diagram of a wireless network security management apparatus according to Embodiment 1 of the present invention.
- FIG. 3 is a schematic structural diagram of hardware of an electronic device according to an embodiment of the present invention.
- installation In the description of the present invention, it should be noted that the terms “installation”, “connected”, and “connected” are to be understood broadly, and, for example, may be fixed connections, unless explicitly stated and defined otherwise. It can also be a detachable connection, or an integral connection; it can be a mechanical connection or an electrical connection; it can be directly connected, or can be indirectly connected through an intermediate medium, or can be internal communication between two components, and can be a wireless connection. It can also be a wired connection.
- the specific meaning of the above terms in the present invention can be understood in a specific case by those skilled in the art.
- a wireless network security management method is provided, which is used for a wireless network connection of a mobile terminal device, such as a mobile terminal, an ipad, a tablet computer, and the like, and the wireless network may be a wifi, a Bluetooth, a hotspot, or the like.
- the wireless network security management method includes the following steps:
- S1 search for the surrounding wireless network.
- the mobile terminal device When the mobile terminal device enters the area covered by the wireless network, it can search for signals of the wireless network, such as searching for a wifi signal.
- the unsafe account information is similar to the wifi blacklist, in which the account name of the unsafe wifi is recorded. Find whether the current wireless account XXX belongs to the blacklist in the blacklist.
- step S4 Determine whether the account information exists in the unsafe account information, and search through Determining whether the current wireless network account belongs to the previously set unsafe account, if yes, executing step S5, otherwise performing step S6.
- the security information of the wireless network may be detected if the account information does not exist in the unsafe account information, and the wireless connection is performed when the security level is greater than a preset threshold.
- the internet In this step, it is a further judgment on the wireless network account that does not belong to the unsecured account.
- the security level here can be determined according to the complexity of the password, whether the wireless network account belongs to the public network or the individual, and if the password is relatively advanced, it is considered safe.
- the degree meets the requirements. If it is a social public network, it can also be considered that the degree of security meets the requirements. If it is a personal network, it is considered to be inconsistent with the requirements.
- the solution can further improve the security level of the wireless network. Although it does not belong to the unsafe account information, it also needs the security level of the wireless network to a certain extent, and avoids the problem of information leakage caused by the use of the wireless network with poor security level.
- the program includes the steps to establish unsafe account information.
- the step of establishing unsafe account information may include:
- the account information of the wireless network whose ratio of the unsafe identifier is greater than the preset ratio is added to the unsecured account information.
- the account information of the wireless network manually added by the user may be further obtained, and the account information is added to the unsafe account information.
- an unsafe account is established by obtaining a plurality of users' security evaluations of the wireless network, and an unsafe account can also be set by the user's input, so that the information of the unsafe account is more complete.
- a wireless network security management apparatus including:
- Search unit 01 for searching for surrounding wireless networks
- An account information obtaining unit 02 configured to acquire account information of the searched wireless network
- the searching unit 03 is configured to search for account information of the wireless network in the preset unsafe account information
- the determining unit 04 is configured to determine whether the account information exists in the unsecured account information
- the reject connection unit 05 is configured to refuse to connect to the wireless network when the account information exists in the unsecured account information.
- the first connection unit 06 is further configured to connect to the wireless network if the account information does not exist in the unsecured account information.
- the second connecting unit is further configured to: if the account information does not exist in the unsecured account information, detect a security level of the wireless network, and when the security level is greater than a preset threshold, connect The wireless network.
- an unsecure account establishing unit is also included for establishing unsafe account information.
- an embodiment of the present invention further discloses an electronic device including at least one processor 810; and a memory 800 communicably connected to the at least one processor 810; wherein the memory 800 is stored An instruction executed by the at least one processor 810, the instructions being executed by the at least one processor 810 to enable the at least one processor 810 to search for a surrounding wireless network; to obtain account information of the searched wireless network Searching for the account information of the wireless network in the preset unsafe account information; determining whether the account information exists in the unsafe account information, and if so, refusing to connect to the wireless network.
- the electronic device also An input device 830 and an output device 840 are provided that are electrically coupled to the memory 800 and the processor, the electrical connections preferably being connected by a bus.
- the electronic device of the embodiment is further configured to connect to the wireless network if the account information does not exist in the unsecured account information.
- the electronic device of the embodiment is further configured to detect a security level of the wireless network if the account information does not exist in the unsecured account information, and connect the wireless network when the security level is greater than a preset threshold. .
- the electronic device of this embodiment preferably, is also capable of establishing unsecured account information.
- the establishing the unsafe account information includes: obtaining a security identifier of the account information of each wireless network by the user, where the security identifier includes at least a security identifier and an unsafe identifier; The account information of the wireless network whose ratio of the security identifier is greater than the preset ratio is added to the unsecured account information.
- Embodiments of the present invention also disclose a non-volatile computer storage medium, wherein the storage medium stores computer-executable instructions that, when executed by an electronic device, enable an electronic device to search for surrounding wireless Obtaining the account information of the searched wireless network; searching for the account information of the wireless network in the preset unsafe account information; determining whether the account information exists in the unsafe account information, and if yes, rejecting the connection wireless network.
- the storage medium of this embodiment is preferably further capable of not storing the unsecured account information.
- the wireless network is connected.
- the storage medium of the embodiment may be configured to detect the security level of the wireless network if the account information does not exist in the unsecured account information, and connect the wireless network when the security level is greater than a preset threshold. .
- the storage medium of the embodiment preferably, is also capable of establishing unsecured account information.
- the step of establishing the unsecure account information includes: obtaining a security identifier of the account information of each wireless network by the user, where the security identifier includes at least a security identifier and an unsafe identifier. Adding the account information of the wireless network whose ratio of the unsafe identification is greater than the preset ratio to the unsafe account information.
- Embodiments of the present invention also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions, when the program instructions are executed by a computer
- the computer is caused to perform the method described in the above embodiments.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明涉及网络安全领域,具体涉及无线网络安全管理方法、装置和电子设备,该方法包括首先,搜索周围的无线网络,然后获取搜索到的无线网络的账户信息,之后在在预先设置的不安全账户信息中查找所述无线网络的账户信息,判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。该方案中,通过预先设置不安全账户信息,当检测到当前的无线网路属于不安全的账户信息时,则不连接,通过该方案可以提高连接的无线网络的安全性,这样可以有效避免现有技术中自动连接无线网络时无法区分无线网络安全性的问题,实现了自动识别安全的无线网络的功能,提高了无线网络使用时的安全性能。
Description
交叉引用
本申请要求在2016年03月28日提交中国专利局、申请号为201610183478.1、发明名称为“一种无线网络安全管理方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及网络安全领域,具体涉及一种无线网络安全管理方法、装置和电子设备。
随着信息技术的发现,移动网络技术的应用越来越普及。移动无线网络既包括允许用户建立远距离无线连接的全球语音和数据网络,也包括为近距离无线连接进行优化的红外线技术及射频技术。主流应用的无线网络分为通过公众移动通信网实现的无线网络(如4G,3G或GPRS)和无线局域网(WiFi、蓝牙、热点)两种方式。此外,还可以通过无线路由器随时随地构架无线网络,无线路由器可以看作一个转发器,将家中墙上接出的宽带网络信号通过天线转发给附近的无线网络设备(笔记本电脑、支持wifi的手机、平板以及所有带有WIFI功能的设备。
随着无线局域网技术的普及,越来越多的场合提供有免费的wifi服务,如餐厅、商场、游乐场、写字楼等等,但是由于不同的无线网在设置时安全程度不同,因此在数量众多的无线网络中,有的无线网络安全级别较高,
可以放心使用,而有些场合的无线网络由于安全级别较低,在使用时要注意保密,甚至有些无线网络就是出于恶意获取他人信息而设置的,这些无线网络应该避免使用。目前,有些用户为了节约流量,设置为无线网络自动连接。虽然有些用户在使用这些无线网络时遭遇过信息透露的情况,但是由于其他人不了解情况,还会再次通过这些不安全的无线网络泄露个人信息,设置造成财产损失。
发明内容
本发明要解决的技术问题在于克服现有技术中存在不安全的无线网络、泄露用户信息的缺陷。
为此,本发明提供一种无线网络安全管理方法,包括如下步骤:
搜索周围的无线网络;
获取搜索到的无线网络的账户信息;
在预先设置的不安全账户信息中查找所述无线网络的账户信息;
判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。
优选地,还包括若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
优选地,还包括若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网
络。
优选地,还包括建立不安全账户信息的步骤。
优选地,所述建立不安全账户信息的步骤,包括:
获取用户对每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;
将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
优选地,还包括获取用户手动添加的无线网络的账户信息,将所述账户信息添加到所述不安全账户信息中。
本发明提供一种无线网络安全管理装置,包括:
搜索单元,用于搜索周围的无线网络;
账户信息获取单元,用于获取搜索到的无线网络的账户信息;
查找单元,用于在预先设置的不安全账户信息中查找所述无线网络的账户信息;
判断单元,用于判断所述不安全账户信息中是否存在所述账户信息;
拒绝连接单元,用于当所述不安全账户信息中存在所述账户信息时,拒绝连接该无线网络。
优选地,还包括第一连接单元,用于若所述不安全账户信息中不存在
所述账户信息,则连接所述无线网络。
优选地,还包括第二连接单元,用于若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
优选地,还包括不安全账户建立单元,用于建立不安全账户信息。
本发明实施例又公开了一种电子设备,包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够搜索周围的无线网络;获取搜索到的无线网络的账户信息;在预先设置的不安全账户信息中查找所述无线网络的账户信息;判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。
上述的电子设备,其中,还能够若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
上述的电子设备,其中,还能够若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
上述的电子设备,其中,还能够建立不安全账户信息的步骤。
上述的电子设备,其中,所述建立不安全账户信息包括:获取用户对
每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
本发明还公开了一种非易失性计算机存储介质,其中,所述存储介质存储有计算机可执行指令,所述计算机可执行指令当由电子设备执行时使得电子设备能够:搜索周围的无线网络;获取搜索到的无线网络的账户信息;在预先设置的不安全账户信息中查找所述无线网络的账户信息;判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。
上述的存储介质,其中,还包括若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
上述的存储介质,其中,还包括若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
上述的存储介质,其中,还包括建立不安全账户信息的步骤。
上述的存储介质,其中,所述建立不安全账户信息的步骤,包括:获取用户对每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
本发明实施例还提供了一种计算机程序产品,所述计算机程序产品包
括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述任一所述的方法。
本发明技术方案,具有如下优点:
1.本发明提供的无线网络安全管理方法,首先,搜索周围的无线网络,然后获取搜索到的无线网络的账户信息,之后在在预先设置的不安全账户信息中查找所述无线网络的账户信息,判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。该方案中,通过预先设置不安全账户信息,当检测到当前的无线网路属于不安全的账户信息时,则不连接,通过该方案可以提高连接的无线网络的安全性,这样可以有效避免现有技术中自动连接无线网络时无法区分无线网络安全性的问题,实现了自动识别安全的无线网络的功能,提高了无线网络使用时的安全性能。
2.本发明提供的无线网络安全管理方法,还包括检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。该方案能够进一步提高无线网络的安全程度,虽然不属于不安全账户信息,但还需要该无线网络的安全程度达到一定程度才可以,避免安全级别差的无线网络使用时导致的信息泄露的问题。
3.本发明提供的无线网络安全管理方法,还包括建立不安全账户信息的步骤,通过获取众多用户对无线网络的安全评价来建立不安全账户,还可以通过用户的输入来设置不安全账户,使得不安全账户的信息更加齐全。
为了更清楚地说明本发明具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例1中无线网络安全管理方法的一个流程图;
图2为本发明实施例1中无线网络安全管理装置的一个结构框图;
图3为本发明实施例中电子设备的硬件结构示意图。
下面将结合附图对本发明的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
在本发明的描述中,需要说明的是,术语“中心”、“上”、“下”、“左”、“右”、“竖直”、“水平”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。此外,术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性。
在本发明的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,
也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,还可以是两个元件内部的连通,可以是无线连接,也可以是有线连接。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本发明中的具体含义。
此外,下面所描述的本发明不同实施方式中所涉及的技术特征只要彼此之间未构成冲突就可以相互结合。
实施例1
本实施例中提供一种无线网络安全管理方法,用于移动终端设备的无线网络连接,如用于手机、ipad、平板电脑等连接移动终端,该无线网络可以是wifi、蓝牙、热点等已有的无线网络形式,该无线网络安全管理方法包括如下步骤:
S1、搜索周围的无线网络。当移动终端设备进入无线网络覆盖的区域内时,能够搜索到该无线网路的信号,如搜索到一个wifi信号。
S2、获取搜索到的无线网络的账户信息。搜索到该wifi信号后,可以获得该wifi信号的账户名如XXX。
S3、在预先设置的不安全账户信息中查找所述无线网络的账户信息。
由于预先建立了不安全账户信息,此处的不安全账户信息类似wifi黑名单,其中记录的是不安全的wifi的账户名。在该黑名单中查找当前无线账户XXX是否属于该黑名单中。
S4、判断所述不安全账户信息中是否存在所述账户信息,通过查找来
判断当前的无线网络的账户是否属于之前设置的不安全账户,如果是则执行步骤S5,否则执行步骤S6.
S5、若是则拒绝连接该无线网络。此时,则不会主动连接该不安全的账户,而是通过拒绝的方式来确保用户信息的安全。
S6、若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。此时,认为当前的账户不属于黑名单中,则可以连接。
该方案中,通过预先设置不安全账户信息,当检测到当前的无线网路属于不安全的账户信息时,则不连接,通过该方案可以提高连接的无线网络的安全性,这样可以有效避免现有技术中自动连接无线网络时无法区分无线网络安全性的问题,实现了自动识别安全的无线网络的功能,提高了无线网络使用时的安全性能。
作为S6另外的一种实现方式,还可以设置为若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。该步骤中,是对不属于不安全账户的无线网络账户的进一步判断,此处的安全程度可以根据密码的复杂度、无线网络账户属于公共网络还是个人等情况来判定,如果密码比较高级认为安全程度符合要求,如果是社会公众网络,也可以认为安全程度满足要求,如果是个人的网络,则认为不符合要求。
该方案能够进一步提高无线网络的安全程度,虽然不属于不安全账户信息,但还需要该无线网络的安全程度达到一定程度才可以,避免安全级别差的无线网络使用时导致的信息泄露的问题。
此外,该方案中还包括建立不安全账户信息的步骤。所述建立不安全账户信息的步骤,可以包括:
首先,获取用户对每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;
其次,将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
此外,在上述基础上,还可以进一步获取用户手动添加的无线网络的账户信息,将所述账户信息添加到所述不安全账户信息中。
这样,通过获取众多用户对无线网络的安全评价来建立不安全账户,还可以通过用户的输入来设置不安全账户,使得不安全账户的信息更加齐全
实施例2:
本实施例中提供一种无线网络安全管理装置,包括:
搜索单元01,用于搜索周围的无线网络;
账户信息获取单元02,用于获取搜索到的无线网络的账户信息;
查找单元03,用于在预先设置的不安全账户信息中查找所述无线网络的账户信息;
判断单元04,用于判断所述不安全账户信息中是否存在所述账户信息;
拒绝连接单元05,用于当所述不安全账户信息中存在所述账户信息时,拒绝连接该无线网络。
此外,还包括第一连接单元06,用于若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
作为可以替换的实施方案,还包括第二连接单元,用于若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
此外,还包括不安全账户建立单元,用于建立不安全账户信息。
这样可以有效避免现有技术中自动连接无线网络时无法区分无线网络安全性的问题,实现了自动识别安全的无线网络的功能,提高了无线网络使用时的安全性能。
实施例3
如图3所示,本发明实施例又公开了一种电子设备,包括至少一个处理器810;以及,与所述至少一个处理器810通信连接的存储器800;其中,所述存储器800存储有可被所述至少一个处理器810执行的指令,所述指令被所述至少一个处理器810执行,以使所述至少一个处理器810能够搜索周围的无线网络;获取搜索到的无线网络的账户信息;在预先设置的不安全账户信息中查找所述无线网络的账户信息;判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。所述电子设备还
包括与所述存储器800和所述处理器电连接的输入装置830和输出装置840,所述电连接优选为通过总线连接。
本实施例的电子设备,优选地,还能够若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
本实施例的电子设备,优选地,还能够若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
本实施例的电子设备,优选地,还能够建立不安全账户信息的步骤。
本实施例的电子设备,优选地,所述建立不安全账户信息包括:获取用户对每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
实施例4
本发明实施例还公开了一种非易失性计算机存储介质,其中,所述存储介质存储有计算机可执行指令,所述计算机可执行指令当由电子设备执行时使得电子设备能够搜索周围的无线网络;获取搜索到的无线网络的账户信息;在预先设置的不安全账户信息中查找所述无线网络的账户信息;判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。
本实施例的存储介质,优选地,还能够若所述不安全账户信息中不存
在所述账户信息,则连接所述无线网络。
本实施例的存储介质,优选地,还能够若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
本实施例的存储介质,优选地,还能够建立不安全账户信息的步骤。
本实施例的存储介质,优选地,所述建立不安全账户信息的步骤,包括:获取用户对每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
实施例5
本发明实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述实施例所述的方法。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中
的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,上述实施例仅仅是为清楚地说明所作的举例,而并非对实施方式的限定。对于所属领域的普通技术人员来说,在上述说明的基础上还可以做出其它不同形式的变化或变动。这里无需也无法对所有的实施方式予以穷举。而由此所引伸出的显而易见的变化或变动仍处于本发明创造的保护范围之中。
Claims (21)
- 一种无线网络安全管理方法,其特征在于,包括如下步骤:搜索周围的无线网络;获取搜索到的无线网络的账户信息;在预先设置的不安全账户信息中查找所述无线网络的账户信息;判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。
- 根据权利要求1所述的无线网络安全管理方法,其特征在于,还包括若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
- 根据权利要求1所述的无线网络安全管理方法,其特征在于,还包括若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
- 根据权利要求1所述的无线网络安全管理方法,其特征在于,还包括建立不安全账户信息的步骤。
- 根据权利要求4所述的无线网络安全管理方法,其特征在于,所述建立不安全账户信息的步骤,包括:获取用户对每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
- 根据权利要求5所述的无线网络安全管理方法,其特征在于,还包括获取用户手动添加的无线网络的账户信息,将所述账户信息添加到所述不安全账户信息中。
- 一种无线网络安全管理装置,其特征在于,包括:搜索单元,用于搜索周围的无线网络;账户信息获取单元,用于获取搜索到的无线网络的账户信息;查找单元,用于在预先设置的不安全账户信息中查找所述无线网络的账户信息;判断单元,用于判断所述不安全账户信息中是否存在所述账户信息;拒绝连接单元,用于当所述不安全账户信息中存在所述账户信息时,拒绝连接该无线网络。
- 根据权利要求7所述的无线网络安全管理装置,其特征在于,还包括第一连接单元,用于若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
- 根据权利要求7所述的无线网络安全管理装置,其特征在于,还包括第二连接单元,用于若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线 网络。
- 根据权利要求7所述的无线网络安全管理装置,其特征在于,还包括不安全账户建立单元,用于建立不安全账户信息。
- 一种电子设备,其特征在于包括至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够搜索周围的无线网络;获取搜索到的无线网络的账户信息;在预先设置的不安全账户信息中查找所述无线网络的账户信息;判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。
- 根据权利要求11所述的电子设备,其特征在于,还能够若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
- 根据权利要求11所述的电子设备,其特征在于,还能够若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
- 根据权利要求11所述的电子设备,其特征在于,还能够建立不安全账户信息。
- 根据权利要求14所述的电子设备,其特征在于,所述建立不安全账户信息包括:获取用户对每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
- 一种非易失性计算机存储介质,其特征在于:所述存储介质存储有计算机可执行指令,所述计算机可执行指令当由电子设备执行时使得电子设备能够:搜索周围的无线网络;获取搜索到的无线网络的账户信息;在预先设置的不安全账户信息中查找所述无线网络的账户信息;判断所述不安全账户信息中是否存在所述账户信息,若是则拒绝连接该无线网络。
- 根据权利要求16所述的存储介质,其特征在于,还能够若所述不安全账户信息中不存在所述账户信息,则连接所述无线网络。
- 根据权利要求16所述的存储介质,其特征在于,还能够若所述不安全账户信息中不存在所述账户信息,则检测该无线网络的安全程度,当安全程度大于预设阈值时,连接所述无线网络。
- 根据权利要求16所述的存储介质,其特征在于,还能够建立不安全账户信息。
- 根据权利要求19所述的存储介质,其特征在于,所述建立不安全账户信息包括:获取用户对每个无线网络的账户信息的安全度标识,所述安全度标识至少包括安全标识和不安全标识;将不安全标识所占比值大于预设比值的无线网络的账户信息添加到不安全账户信息中。
- 一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,其特征在于,当所述程序指令被计算机执行时,使所述计算机执行上述任一权利要求所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610183478.1A CN105828331A (zh) | 2016-03-28 | 2016-03-28 | 一种无线网络安全管理方法及装置 |
CN201610183478.1 | 2016-03-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017166639A1 true WO2017166639A1 (zh) | 2017-10-05 |
Family
ID=56523766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/096917 WO2017166639A1 (zh) | 2016-03-28 | 2016-08-26 | 一种无线网络安全管理方法、装置和电子设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105828331A (zh) |
WO (1) | WO2017166639A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112543493A (zh) * | 2019-09-20 | 2021-03-23 | 青岛海信移动通信技术股份有限公司 | 一种wifi连接方法、终端及计算机存储介质 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105828331A (zh) * | 2016-03-28 | 2016-08-03 | 乐视控股(北京)有限公司 | 一种无线网络安全管理方法及装置 |
CN106412913A (zh) * | 2016-10-13 | 2017-02-15 | 西安瀚炬网络科技有限公司 | 一种无线网络的扫描分析方法及系统 |
CN116828474B (zh) * | 2023-08-30 | 2023-11-14 | 北京绿色苹果技术有限公司 | 一种基于环境安全的WiFi实施方法、系统和介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103561404A (zh) * | 2013-10-22 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | 一种接入网络的方法及装置 |
CN104540134A (zh) * | 2014-12-03 | 2015-04-22 | 北京奇虎科技有限公司 | 无线访问节点检测方法、无线网络检测系统和服务器 |
CN105828331A (zh) * | 2016-03-28 | 2016-08-03 | 乐视控股(北京)有限公司 | 一种无线网络安全管理方法及装置 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102577261A (zh) * | 2009-07-31 | 2012-07-11 | 惠普发展公司,有限责任合伙企业 | 用于检测欺骗无线接入点的方法 |
CN103167488B (zh) * | 2013-03-25 | 2016-07-06 | 北京奇虎科技有限公司 | 对Wi-Fi信号进行提示的方法及装置 |
CN104735727B (zh) * | 2013-12-24 | 2019-02-22 | 中国移动通信集团辽宁有限公司 | 一种基于信号检测的无线局域网分流方法及装置 |
CN204559890U (zh) * | 2015-04-23 | 2015-08-12 | 广州市嘉鸿信息技术有限公司 | 一种移动通信终端 |
CN104883680B (zh) * | 2015-05-15 | 2019-08-30 | 深圳市立鳌科技有限公司 | 一种数据保护方法以及用户端 |
CN104902481B (zh) * | 2015-06-30 | 2019-05-21 | 北京奇虎科技有限公司 | 一种可以免流量的安全接管方法 |
-
2016
- 2016-03-28 CN CN201610183478.1A patent/CN105828331A/zh active Pending
- 2016-08-26 WO PCT/CN2016/096917 patent/WO2017166639A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103561404A (zh) * | 2013-10-22 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | 一种接入网络的方法及装置 |
CN104540134A (zh) * | 2014-12-03 | 2015-04-22 | 北京奇虎科技有限公司 | 无线访问节点检测方法、无线网络检测系统和服务器 |
CN105828331A (zh) * | 2016-03-28 | 2016-08-03 | 乐视控股(北京)有限公司 | 一种无线网络安全管理方法及装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112543493A (zh) * | 2019-09-20 | 2021-03-23 | 青岛海信移动通信技术股份有限公司 | 一种wifi连接方法、终端及计算机存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN105828331A (zh) | 2016-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230099038A1 (en) | Method and apparatus for registering wireless device in wireless communication system | |
JP5985767B2 (ja) | 近接場通信を用いたピア・ツー・ピアWi−Fiレンジングのための方法および装置 | |
JP6416409B2 (ja) | アクセスポイントステアリング | |
US20190245840A1 (en) | Wireless Network Access | |
KR101727873B1 (ko) | 피어 기반 인증 | |
US8769003B2 (en) | Method for proximity determination between mobile peers while maintaining privacy | |
US10063546B2 (en) | Network access control method and apparatus | |
WO2017166639A1 (zh) | 一种无线网络安全管理方法、装置和电子设备 | |
US9894630B2 (en) | ADSS enabled global roaming system | |
US20140066043A1 (en) | Automating actions within a phone network based upon scanned wireless signals | |
WO2016202294A1 (zh) | 一种网络接入方法及移动终端 | |
US8954035B2 (en) | Wi-Fi authentication by proxy | |
EP3804362B1 (en) | Device-based access point association and tracking of physical addresses | |
WO2017166704A1 (zh) | 一种网络连接方法、装置和电子设备 | |
EP2993928B1 (en) | Device selection to establish a wireless communication | |
WO2014086252A1 (zh) | 关联设备的方法、装置及系统 | |
WO2014090052A1 (zh) | 无线网络接入的控制方法及装置 | |
CN104486816A (zh) | Wifi终端设备在多接入点中的快速自动扫描方法 | |
WO2016095105A1 (zh) | 一种唤醒无线保真网络的方法和终端 | |
WO2015018346A1 (zh) | 一种信息处理方法及装置 | |
CN106937289B (zh) | 一种网络接入方法及电子设备 | |
US10880858B2 (en) | Access point association and tracking of physical addresses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16896409 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16896409 Country of ref document: EP Kind code of ref document: A1 |