WO2018045755A1 - 一种wifi网络下的数据传输方法及装置、计算机存储介质 - Google Patents
一种wifi网络下的数据传输方法及装置、计算机存储介质 Download PDFInfo
- Publication number
- WO2018045755A1 WO2018045755A1 PCT/CN2017/081015 CN2017081015W WO2018045755A1 WO 2018045755 A1 WO2018045755 A1 WO 2018045755A1 CN 2017081015 W CN2017081015 W CN 2017081015W WO 2018045755 A1 WO2018045755 A1 WO 2018045755A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- wifi network
- credibility
- content
- currently
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/67—Risk-dependent, e.g. selecting a security level depending on risk profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/24—Reselection being triggered by specific parameters
- H04W36/30—Reselection being triggered by specific parameters by measured or perceived connection quality data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Definitions
- the present disclosure relates to the field of communications technologies, and in particular, to a data transmission method and apparatus under a WIFI network, and a computer storage medium.
- IP Internet Protocol
- the present disclosure provides a data transmission method and device under the WIFI network, and a computer storage medium, which solves the problem that when information data needs to be transmitted through the WIFI network, There may be a problem with the disclosure of information data.
- an embodiment of the present disclosure provides a data transmission method in a WIFI network, which is applied to a mobile terminal, and the method includes:
- the currently accessed WIFI network is switched to the network of the terminal operator to transmit the information data.
- the step of detecting the environment information that the mobile terminal is currently located includes:
- the step of detecting the environment information that the mobile terminal is currently located includes:
- the step of determining, according to the environment information, the credibility information when the mobile terminal transmits information through the currently accessed WIFI network includes:
- the method further includes:
- the step of detecting the content of the information data that needs to be transmitted through the currently accessed WIFI network includes:
- the predetermined information content includes user personal information, user login information, and bank account information.
- the method further includes:
- the embodiment of the present disclosure further provides a data transmission device in a WIFI network, which is applied to a mobile terminal, and the device includes:
- An identification module configured to detect environment information currently in which the mobile terminal is located
- the processing module is configured to determine, according to the environment information, credibility information when the mobile terminal transmits information through the currently accessed WIFI network;
- a detecting module configured to: when the credibility information reaches a preset condition, the detecting needs to pass The content of the currently transmitted WIFI network transmission information data;
- the transmission module is configured to switch the currently accessed WIFI network to the network of the terminal operator to transmit the information data if the content of the information data to be transmitted through the currently accessed WIFI network meets the predetermined information content.
- the identifying module includes:
- the first parsing unit is configured to parse the service set identifier of the currently accessed WIFI network, and obtain the first parsing information
- a first acquiring unit configured to acquire a first keyword in the first parsing information
- the first identifying unit is configured to determine, according to the first keyword, environment information that the mobile terminal is currently located.
- the identifying module includes:
- the second parsing unit is configured to parse the service set identifiers of all currently accessible WIFI networks, and obtain second parsing information corresponding to the service set identifiers of each accessible WIFI network;
- a second acquiring unit configured to acquire a second keyword in each of the second parsing information
- the second identifying unit is configured to determine, according to the second keyword, environment information that the mobile terminal is currently located.
- the processing module includes:
- the first matching unit is configured to match the environment information with the credibility matching table of the preset environment information to obtain a first credibility value of the environment information;
- the first processing unit is configured to determine a second credibility value of the currently accessed WIFI network according to the number of connections of the currently accessed WIFI network by the mobile terminal in the preset time period;
- the second processing unit is configured to determine, according to the first credibility value and the second credibility value, credibility information when the mobile terminal transmits information through the currently accessed WIFI network.
- the device further includes:
- a determining module configured to: when the credibility value in the credibility information is less than a preset credibility value Then, it is determined that the credibility information reaches a preset condition.
- the detecting module includes:
- a third acquiring unit configured to acquire content that needs to transmit information data through a currently accessed WIFI network
- a second matching unit configured to match the information data with the predetermined information content, and when the matching is successful, determining that the content of the information data that needs to be transmitted through the currently accessed WIFI network conforms to the predetermined information content;
- the predetermined information content includes user personal information, user login information, and bank account information.
- the device further includes:
- the switching module is configured to switch the network of the currently connected terminal operator to the previously accessed WIFI network.
- the unit and the switching module can be implemented by using a central processing unit (CPU), a digital signal processor (DSP), or a field-programmable gate array (FPGA). .
- Embodiments of the present disclosure also provide a computer storage medium in which computer executable instructions are stored, the computer executable instructions being configured to perform a data transmission method under the WIFI network.
- the environment information currently in the mobile terminal is detected, and the corresponding credibility judgment is made on the current environment information.
- the reliability is lower than the preset credibility value, it is further detected whether the information data currently needed to be transmitted is sensitive information. If it is sensitive information, it will be The previously accessed WIFI network is switched to the operator's network for information data transmission. This ensures the protection of personal information in an untrusted or complex WIFI environment. After the completion of the transmission of the information data, the switch to the previous WIFI network connection ensures that after the completion of the transmission of the information data, the WIFI network connection can be quickly switched, and the operation of the WIFI network connection does not need to be performed again.
- FIG. 1 is a flowchart of a data transmission method in a WIFI network according to an embodiment of the present disclosure
- FIG. 2 is a flowchart of detecting environment information currently in a mobile terminal according to an embodiment of the present disclosure
- FIG. 3 is a flowchart of another environment for detecting a current location of a mobile terminal according to an embodiment of the present disclosure
- FIG. 4 is a flowchart of determining credibility information when transmitting information under a currently accessed WIFI network according to an embodiment of the present disclosure
- FIG. 5 is a flowchart of detecting content that needs to transmit information data through a currently accessed WIFI network according to an embodiment of the present disclosure
- FIG. 6 is a structural block diagram of a data transmission apparatus in a WIFI network according to an embodiment of the present disclosure.
- an embodiment of the present disclosure provides a data transmission method in a WIFI network, which is applied to a mobile terminal, and the method includes:
- the environment information includes geographic location information currently in which the mobile terminal is located and/or current access network state information of the mobile terminal.
- the geographical location information includes the shopping mall environment, residential places and office places.
- the network status information includes the network status of the access operator and the network status of the access non-operator.
- the credibility information may be determined according to the credibility value of the preset geographical location information, the number of connections of the currently accessed WIFI network in the preset time period, network status information, and the like.
- the currently accessed WIFI network is switched to the network of the terminal operator to transmit the information data.
- the currently accessed WIFI network when detecting that the content of the information data that needs to be transmitted currently contains the predetermined information content, the currently accessed WIFI network is switched to the network of the terminal operator to transmit the information data.
- the predetermined information content includes: a user's bank account number, an ID card number, a contact information, and other user names and passwords.
- the step of detecting the environment information that the mobile terminal is currently located includes:
- the manner of parsing the service set identifier of the WIFI network Be explained.
- a service set identifier containing a Chinese name a method of directly extracting a Chinese keyword is adopted.
- the store name can be directly extracted as the first keyword.
- the service set identifier containing the letter name can be parsed according to the letter in Chinese, and the Chinese pinyin is translated into the Chinese name and the first keyword is obtained.
- the store name directly represented by the English name can be used as the first keyword.
- the first keyword is a keyword that represents environment information in which the mobile terminal is currently located. For example, if the first analytical information is parsed as the name of a clothing brand, the clothing brand name is extracted as the first keyword. According to the first keyword, the environment information that the current mobile terminal is located may be determined to be a shopping mall environment.
- S203 Determine, according to the first keyword, environment information that the mobile terminal is currently located.
- the manner of determining the environment information that the mobile terminal is currently located may be that the first keyword is matched with the determination table of the preset environment information, and the preset environment information corresponding to the first keyword is determined in the determination table.
- Environmental information as the current environmental information of the mobile terminal.
- the step of detecting the environment information that the mobile terminal is currently located includes:
- the corresponding environment information cannot be determined, and the current WIFI network can be accessed through all the currently accessible WIFI networks.
- the service set identifier is parsed, and the second keyword in the second parsing information corresponding to the service set identifier of each accessible WIFI network is obtained. According to multiple second levels The key determines the environment information in which the mobile terminal is currently located.
- the second keyword corresponding to the preset number of WIFI networks may be filtered according to the highest to low signal strength of the currently accessible WIFI network.
- the second keyword is matched with the determination table of the preset environment information, and the environment information corresponding to the second keyword is used as the environment information currently in the mobile terminal.
- the service set identifier of the non-operator network may be parsed only and/or the preset number of WIFI networks may be filtered according to the highest to low signal strength. Analyze processing.
- GPS global location system
- the step of determining, according to the environment information, the credibility information when the mobile terminal transmits information through the currently accessed WIFI network includes:
- the first credibility value of the public environment information (for example, the shopping mall environment, the hotel environment, etc.) may be set to a low value (for example, set to 1) ), set the first credibility value of the residential environment information to a high value (for example, set to 10).
- the first credibility value setting may be correspondingly increased according to an increase in the number of connections of the same WIFI network connected to the same environment information.
- the first credibility value of the initial reset of the public environment information is 1.
- S402. Determine a second credibility value of the currently accessed WIFI network according to the number of connections of the currently accessed WIFI network by the mobile terminal in the preset time period.
- the second credibility value of the unconnected WIFI network is set to 1, and the second credibility value setting is correspondingly increased according to the increase of the number of connections (for example, detecting the current WIFI network)
- the number of connections for the network is 5, and the second confidence value is set to 3).
- the second credibility value can also be preset for a specific WIFI network. For example, the preset second credibility value of the currently accessed WIFI network is 10, and the second credibility value determined according to the number of connections is 1, and the average value of the two is determined to determine the currently accessed WIFI network.
- the second confidence value is 5.5.
- the average credibility value of the first credibility value and the second credibility value is calculated according to a preset weighting algorithm, as credibility information when the mobile terminal transmits information through the currently accessed WIFI network. .
- the method further includes:
- the credibility value in the credibility information is compared with the preset credibility value. If the currently accessed WIFI network credibility value is 6, it is determined that the currently accessed WIFI network is not A secure network (a network that transmits information data containing predetermined information content is not recommended); if the credibility value is 10, it is determined that the currently accessed WIFI network is a secure network.
- the preset credibility value may be determined according to a preset information content level, an application level, and the like.
- setting of preset information content level the first level includes related information data such as bank account number and personal property; the second level includes relevant information data such as personal address, contact information, work unit, etc.; the third level includes user login Information and related information data.
- Setting the default credibility value of the instant messaging software, the website related to the user login information, etc. without involving the user funds and the bank account information is set between 5-8, and the preset trustworthy involving the user funds and bank account information will be involved.
- the value is set to be greater than 8, and the embodiment of the present disclosure is not limited thereto.
- the detection needs to pass the current access.
- the steps of the WIFI network to transmit the content of the information data include:
- S502 Match the information data with the predetermined information content, and when the matching is successful, determine that the content of the information data that needs to be transmitted through the currently accessed WIFI network meets the predetermined information content;
- the predetermined information content includes: personal information of the user (eg, identity card information, address, contact information, etc.), user login information, and bank account information.
- the predetermined information content is stored in the terminal in cipher text.
- the data transmission detecting thread is established to detect the content of the information data input by the user.
- the content of the information data that the user needs to transmit is analyzed.
- the currently accessed WIFI network is switched to the network of the terminal operator. Transmission of information data.
- the transmission of information data is controlled by the data transmission layer, that is, before the WIFI network needs to be encapsulated and transmitted through the data, the content of the information is compared, and then the information data is transmitted, and then passed.
- the data transmission layer that is, before the WIFI network needs to be encapsulated and transmitted through the data, the content of the information is compared, and then the information data is transmitted, and then passed.
- the high-security webpages such as the application related to the preset information content and the network protocol in the browser are first monitored (only for applications and inputs involving network services). Add a monitor to monitor the progress of each application and add pre-made lists of sensitive words (eg, bank account information, user personal information, and user login information).
- an input detection thread is established to acquire information data input by the user in the application in real time.
- the input detection thread acquires keywords (user login information, etc.) in the pre-made list of sensitive words by detecting the content of the application home page.
- keywords user login information, etc.
- the first step is to input the username and password.
- the currently accessed WIFI network is switched to the network of the terminal operator. The transmission of the information data is performed.
- the data content on the webpage such as the network protocol is detected by the detection thread.
- the content of the information data input by the user is determined.
- the email website can be detected according to the user's settings.
- the input data content can be detected in a key manner.
- the user is detected in the user name and password column, the current The accessed WIFI network is switched to the network of the terminal operator to transmit the information data.
- the context content is detected by the detecting thread, and when the keyword in the sensitive word pre-made list is detected in the context content, the currently accessed WIFI network is switched to the network of the terminal operator to perform the The transmission of content. For example, when judging the bank account number, the ID number, and the like in the context content, it is detected whether the obtained content is a string of numbers, and the subsequent long string data is detected.
- the user name, password, and the like in the user login information are determined by fuzzy matching in the context content, and the transmission range can be narrowed by the data mining algorithm.
- the credibility value of the WIFI network in the public environment is set to a low value, that is, the WIFI network in the public environment is an untrusted network.
- the credibility value reconnected to the current WIFI network is reset to 1 each time. Restarting the detection of the banking application and the mailbox login in the terminal.
- the currently accessed WIFI network is switched to the terminal operator's network for the information.
- the transmission of data Set up a mapping table here, through the mapping table to set up applications and inputs that need to be highlighted, such as banking applications, browsers, instant messaging software and other applications and sensitive word prefabricated lists.
- the content of the information to be transmitted relates to these in the mapping table In the case of content, the transmission of the information data is performed through the network of the terminal operator.
- the network of the terminal operator to be switched to is added as an additional WIFI network to the currently accessible WIFI network list.
- the initial value of the credibility value of the additional WIFI network is set to 0.
- the credibility value of the additional WIFI network is set to 10 to form a double data. Transmission channel.
- the data transmission channel is selected by determining whether the content of the information data to be transmitted conforms to the predetermined information content, and the data transmission priority needs to be set by software control.
- the additional WIFI network only the information data determined to be in conformity with the predetermined information content is transmitted without increasing the data burden of the user. After the information data transmission is completed, the credibility value of the additional WIFI network is set to 0, and the previous WIFI network connection is switched to ensure that after the completion of the transmission of the information data, the WIFI network connection can be quickly switched, without re-running. WIFI network connection operation.
- the method further includes:
- the network of the terminal operator that needs to be handed over is added as an additional WIFI network, and is currently accessible.
- the initial value of the credibility value of the additional WIFI network is set to 0.
- the credibility value of the additional WIFI network is set to 10 to form a double data. Transmission channel.
- the data transmission channel is selected by determining whether the content of the information data to be transmitted conforms to the predetermined information content, and the data transmission priority needs to be set by software control.
- the additional WIFI network only the information data determined to be in conformity with the predetermined information content is transmitted without increasing the data burden of the user. After the information data transmission is completed, the credibility value of the additional WIFI network is set. If it is 0, switch to the previous WIFI network connection to ensure that after the completion of the transmission of information data, you can quickly switch to the WIFI network connection without re-operation of the WIFI network.
- the embodiment of the present disclosure further provides a data transmission device in a WIFI network, which is applied to a mobile terminal, and the device includes:
- the identification module 61 is configured to detect environment information currently in which the mobile terminal is located;
- the environment information includes geographic location information currently in which the mobile terminal is located and/or current access network state information of the mobile terminal.
- the geographical location information includes the shopping mall environment, residential places and office places.
- the network status information includes the network status of the access operator and the network status of the access non-operator.
- the processing module 62 is configured to determine, according to the environment information, credibility information when the mobile terminal transmits information through the currently accessed WIFI network;
- the credibility information may be determined according to the credibility value of the preset geographical location information, the number of connections of the currently accessed WIFI network in the preset time period, network status information, and the like.
- the detecting module 63 is configured to detect, when the credibility information reaches a preset condition, content that needs to transmit information data through the currently accessed WIFI network;
- the detecting module 63 when detecting that the content of the information data that needs to be transmitted currently contains the predetermined information content, the detecting module 63 sends the content of the information data that needs to be transmitted to the transmission module 64 for transmission.
- the predetermined information content includes: a user's bank account number, an ID card number, a contact information, and other user names and passwords.
- the transmission module 64 is configured to switch the currently accessed WIFI network to the network of the terminal operator to transmit the information data if the content of the information data to be transmitted through the currently accessed WIFI network meets the predetermined information content.
- the transmission module 64 receives the content of the information data sent by the detection module 63, and switches the currently accessed WIFI network to the network of the terminal operator to transmit the information data.
- the credibility value of the currently accessed WIFI network is lower than the preset credibility value, the solution avoids the user's personal information data leakage.
- the identifying module 61 includes:
- the first parsing unit 610 is configured to parse the service set identifier of the currently accessed WIFI network, and obtain the first parsing information
- a shopping mall environment is taken as an example to describe a manner of parsing a service set identifier of a WIFI network.
- a method of directly extracting a Chinese keyword is adopted for the service set identifier named after the store name.
- the store name can be directly extracted as the first keyword.
- the service set identifier containing the letter name can be parsed according to the letter in Chinese, and the Chinese pinyin is translated into the Chinese name and the first keyword is obtained.
- the store name directly represented by the English name can be used as the first keyword.
- the first obtaining unit 611 is configured to acquire a first keyword in the first parsing information
- the first keyword is a keyword that represents environment information in which the mobile terminal is currently located. For example, if the first analytical information is parsed as the name of a clothing brand, the clothing brand name is extracted as the first keyword. According to the first keyword, the environment information that the current mobile terminal is located may be determined to be a shopping mall environment.
- the first identifying unit 612 is configured to determine, according to the first keyword, environment information that the mobile terminal is currently located.
- the first identifying unit 612 may be configured to match the first keyword with the determination table of the preset environment information, and use the environment information in the determination table of the preset environment information corresponding to the first keyword as The current environment information of the mobile terminal.
- the identifying module 61 includes:
- the second parsing unit 613 is configured to parse the service set identifiers of all currently accessible WIFI networks, and obtain a second parsing letter corresponding to the service set identifier of each accessible WIFI network. interest;
- the second obtaining unit 614 is configured to acquire a second keyword in each of the second parsing information
- the second identifying unit 615 is configured to determine, according to the second keyword, environment information that the mobile terminal is currently located.
- the second parsing unit 613 for the case that only the service set identifier of the currently accessed WIFI network is obtained and the first keyword is obtained, the corresponding environment information cannot be determined, and all the current connections can be obtained by the second parsing unit 613.
- the service set identifier of the incoming WIFI network is parsed, and the second keyword in the second parsing information corresponding to the service set identifier of each accessible WIFI network is obtained by the second obtaining unit 614.
- the second identification unit 615 determines the environment information in which the mobile terminal is currently located according to the plurality of second keywords.
- the second keyword corresponding to the preset number of WIFI networks may be filtered according to the highest to low signal strength of the currently accessible WIFI network.
- the second keyword is matched with the determination table of the preset environment information, and the environment information corresponding to the second keyword is used as the environment information currently in the mobile terminal.
- the service set identifier of the non-operator network may be parsed only and/or the preset number of WIFI networks may be filtered according to the highest to low signal strength. Analyze processing.
- GPS global location system
- the processing module 62 includes:
- the first matching unit 620 is configured to match the environment information with the credibility matching table of the preset environment information to obtain a first credibility value of the environment information;
- the first credibility value of the public environment information may be set to a low value (for example: Set to 1) to set the first confidence value of the residential environment information to a high value (for example, set to 10).
- the first credibility value setting may be correspondingly increased according to an increase in the number of connections of the same WIFI network connected to the same environment information.
- the first credibility value of the initial reset of the public environment information is 1.
- the first processing unit 621 is configured to determine a second credibility value of the currently accessed WIFI network according to the number of connections of the currently accessed WIFI network by the mobile terminal in the preset time period;
- the second credibility value of the unconnected WIFI network is set to one.
- the second credibility value setting is correspondingly increased (for example, detecting the number of connections of the current WIFI network is 5, and setting the second credibility value to 3).
- the second credibility value can also be preset for a specific WIFI network. For example, the preset second credibility value of the currently accessed WIFI network is 10, and the second credibility value determined according to the number of connections is 1, and the average value of the two is determined to determine the currently accessed WIFI network.
- the second confidence value is 5.5.
- the second processing unit 622 is configured to determine, according to the first credibility value and the second credibility value, credibility information when the mobile terminal transmits information through the currently accessed WIFI network.
- the second processing unit 622 may calculate, according to a preset weighting algorithm, an average credibility value of the first credibility value and the second credibility value, as the mobile terminal transmits through the currently accessed WIFI network. Credibility information when information.
- the device further includes:
- the determining module 65 is configured to determine that the credibility information reaches a preset condition when the credibility value in the credibility information is less than the preset credibility value.
- the determining module 65 compares the credibility value in the credibility information with the preset credibility value (for example, the preset credibility value is set to 8), if the currently accessed WIFI network If the credibility value is 6, it is determined that the currently accessed WIFI network is an unsecure network (it is not recommended to transmit the information data including the predetermined information content); if the credibility value is 10, the current access is determined.
- the WIFI network is a secure network.
- the preset credibility value may be determined according to a preset information content level, an application level, and the like.
- setting of preset information content level the first level includes related information data such as bank account number and personal property; the second level includes relevant information data such as personal address, contact information, work unit, etc.; the third level includes user login Information and related information data.
- Setting the default credibility value of the instant messaging software, the website related to the user login information, etc. without involving the user funds and the bank account information is set between 5-8, and the preset trustworthy involving the user funds and bank account information will be involved.
- the value is set to be greater than 8, and the embodiment of the present disclosure is not limited thereto.
- the detecting module 63 includes:
- the third obtaining unit 630 is configured to acquire content that needs to transmit information data through the currently accessed WIFI network;
- the second matching unit 631 is configured to match the information data with the predetermined information content, and when the matching is successful, determine that the content of the information data that needs to be transmitted through the currently accessed WIFI network conforms to the predetermined information content;
- the predetermined information content includes: personal information of the user (eg, identity card information, address, contact information, etc.), user login information, and bank account information.
- the predetermined information content is stored in the terminal in cipher text.
- the detecting module 63 establishes a data transmission detecting thread to detect the content of the information data input by the user.
- the third obtaining unit 630 parses the content of the information data that the user needs to transmit.
- the transmission module 64 is transmitted through the transmission module 64.
- the currently accessed WIFI network is switched to the terminal operator's network for information data transmission.
- the transmission of information data is controlled by the data transmission layer, that is, before the WIFI network needs to be encapsulated and transmitted through the data, the content of the information is compared, and then the information data is transmitted, and then passed.
- Corresponding WIFI network or mobile data transmission Lose data Corresponding WIFI network or mobile data transmission Lose data.
- the detecting module 63 first monitors a high-security webpage such as an application related to the preset information content and a network protocol in the browser (only for the application related to the network service) And input), add a monitor, monitor the process generated by each application, and add pre-made list of sensitive words (such as: bank account information, user personal information and user login information, etc.).
- a high-security webpage such as an application related to the preset information content and a network protocol in the browser (only for the application related to the network service) And input)
- add a monitor monitor the process generated by each application, and add pre-made list of sensitive words (such as: bank account information, user personal information and user login information, etc.).
- an input detection thread is established to acquire information data input by the user in the application in real time.
- the input detection thread acquires keywords (user login information, etc.) in the pre-made list of sensitive words by detecting the content of the application home page.
- the data in the sensitive word pre-made list is determined by parsing whether the user inputs the data content in the subsequent input of the user login information.
- the first step is to input the username and password.
- the currently accessed WIFI network is switched to the network of the terminal operator. The transmission of the information data is performed.
- the data content on the webpage such as the network protocol is detected by the detection thread.
- the content of the information data input by the user is determined.
- the email website can be detected according to the user's settings.
- the input data content can be detected in a key manner.
- the user is detected in the user name and password column, the current The accessed WIFI network is switched to the network of the terminal operator to transmit the information data.
- the context content is detected by the detecting thread, and when the keyword in the sensitive word pre-made list is detected in the context content, the currently accessed WIFI network is switched to the network of the terminal operator to perform the The transmission of content. For example, when judging the bank account number, the ID number, and the like in the context content, it is detected whether the obtained content is a series of numbers, and the long string data in the following content is detected. User name in the user login information, The password and the like are determined in the context content by fuzzy matching, and the data transmission algorithm can be used to narrow the transmission range.
- the credibility value of the WIFI network in the public environment is set to a low value, that is, the WIFI network in the public environment is an untrusted network.
- the credibility value reconnected to the current WIFI network is reset to 1 each time. Restarting the detection of the banking application and the mailbox login in the terminal.
- the currently accessed WIFI network is switched to the terminal operator's network for the information.
- the transmission of data Set up a mapping table here, through the mapping table to set up applications and inputs that need to be highlighted, such as banking applications, browsers, instant messaging software and other applications and sensitive word prefabricated lists.
- the content of the information data to be transmitted relates to the content in the mapping table, the transmission of the information data is performed by the network of the terminal operator.
- the network of the terminal operator to be switched to is added as an additional WIFI network to the currently accessible WIFI network list.
- the initial value of the credibility value of the additional WIFI network is set to 0.
- the credibility value of the additional WIFI network is set to 10 to form a double data. Transmission channel.
- the data transmission channel is selected by determining whether the content of the information data to be transmitted conforms to the predetermined information content, and the data transmission priority needs to be set by software control.
- the additional WIFI network only the information data determined to be in conformity with the predetermined information content is transmitted without increasing the data burden of the user. After the information data transmission is completed, the credibility value of the additional WIFI network is set to 0, and the previous WIFI network connection is switched to ensure that after the completion of the transmission of the information data, the WIFI network connection can be quickly switched, without re-running. WIFI network connection operation.
- the device further includes:
- the switching module 66 is configured to switch the network of the currently connected terminal operator to the previously accessed WIFI network.
- the transmission module 64 switches the currently accessed WIFI network to the network of the terminal operator to transmit the information data
- the network of the terminal operator that needs to be switched to is added as an additional WIFI network to the current A list of accessible WIFI networks.
- the initial value of the credibility value of the additional WIFI network is set to 0.
- the credibility value of the additional WIFI network is set to 10 to form a double data. Transmission channel.
- the data transmission channel is selected by determining whether the content of the information data to be transmitted conforms to the predetermined information content, and the data transmission priority needs to be set by software control.
- the additional WIFI network only the information data determined to be in conformity with the predetermined information content is transmitted without increasing the data burden of the user.
- the credibility value of the additional WIFI network is set to 0, and the network of the currently connected operator is switched to the previous WIFI network connection by the switching module 66, so that after the completion of the transmission of the information data, You can quickly switch to a WIFI network connection without having to re-wire the WIFI network.
- Embodiments of the present disclosure also provide a computer storage medium in which computer executable instructions are stored, the computer executable instructions being configured to perform a data transmission method under the WIFI network.
- the environment information currently located by the mobile terminal is detected, and the corresponding credibility judgment is made on the current environment information.
- the reliability is lower than the preset credibility value, it is further detected whether the information data currently needed to be transmitted is sensitive information. If it is sensitive information, the currently accessed WIFI network is switched to the operator's network for information data transmission. This ensures the protection of personal information in an untrusted or complex WIFI environment. After completing the transmission of the information data, switch to the previous WIFI network connection to ensure the completion of the transmission of information data. After that, you can quickly switch to the WIFI network connection without the need to re-wire the WIFI network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本公开实施例公开了一种WIFI网络下的数据传输方法及装置、计算机存储介质,其中,所述方法包括:检测移动终端当前所处的环境信息;根据所述环境信息,确定移动终端通过当前接入的WIFI网络传输信息时的可信度信息;在所述可信度信息达到预设条件时,检测需要通过当前接入的WIFI网络传输信息数据的内容;若需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容时,则将当前接入的WIFI网络切换至终端运营商的网络进行所述信息数据的传输。
Description
相关申请的交叉引用
本申请基于申请号为201610820772.9、申请日为2016年09月12日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
本公开涉及通信技术领域,尤其涉及一种WIFI网络下的数据传输方法及装置、计算机存储介质。
当前在公共场合一些不安全WIFI网络下,对于用户账户密码等敏感信息的保护,都是通过提醒用户不要在这些不安全WIFI下应用敏感信息,以防止被他人盗取个人重要信息。这种信息保护的方式要求用户在公共环境下最好不通过WIFI接入网络,从而避免个人信息被泄露,造成用户失去了可能连接其他网络的应用机会。
在一些应用程序中也会通过网络之间互联的协议(IP,Internet Protocol)的检测,对用户数据进行保护。如果是用户IP发生变化,会提醒用户重新登陆,以保证用户的数据安全。但如果用户是在不安全的WIFI网络下,应用程序检测到需要重新登陆,则有可能造成用户数据的完全泄露。
发明内容
为了解决上述技术问题,本公开提供了一种WIFI网络下的数据传输方法及装置、计算机存储介质,解决了需要通过WIFI网络传输信息数据时,
可能存在信息数据泄露的问题。
为了实现上述目的,本公开实施例提供了一种WIFI网络下的数据传输方法,应用于移动终端,所述方法包括:
检测移动终端当前所处的环境信息;
根据所述环境信息,确定移动终端通过当前接入的WIFI网络传输信息时的可信度信息;
在所述可信度信息达到预设条件时,检测需要通过当前接入的WIFI网络传输信息数据的内容;
若需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容时,则将当前接入的WIFI网络切换至终端运营商的网络进行所述信息数据的传输。
可选地,本公开实施例中,所述检测移动终端当前所处的环境信息的步骤,包括:
对当前接入的WIFI网络的服务集标识进行解析,获得第一解析信息;
获取所述第一解析信息中的第一关键字;
根据所述第一关键字确定移动终端当前所处的环境信息。
可选地,本公开实施例中,所述检测移动终端当前所处的环境信息的步骤,包括:
对当前所有可接入的WIFI网络的服务集标识进行解析,获得每一可接入的WIFI网络的服务集标识对应的第二解析信息;
获取每一所述第二解析信息中的第二关键字;
根据所述第二关键字确定所述移动终端当前所处的环境信息。
可选地,本公开实施例中,根据所述环境信息,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息的步骤,包括:
将所述环境信息与预设环境信息的可信度匹配表进行匹配,得到所述
环境信息的第一可信度值;
根据预设时间段内移动终端连接当前接入的WIFI网络的连接次数,确定当前接入的WIFI网络的第二可信度值;
根据所述第一可信度值和所述第二可信度值,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息。
可选地,本公开实施例中,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息的步骤之后,还包括:
当所述可信度信息中的可信度值小于预设可信度值时,则确定所述可信度信息达到预设条件。
可选地,本公开实施例中,所述检测需要通过当前接入的WIFI网络传输信息数据的内容的步骤,包括:
获取需要通过当前接入的WIFI网络传输信息数据的内容;
将所述信息数据与预定信息内容相匹配,当匹配成功时,则确定需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容;
其中,所述预定信息内容包括用户个人信息、用户登录信息和银行帐号信息。
可选地,本公开实施例中,将当前接入的WIFI网络切换至终端运营商的网络进行信息数据的传输的步骤之后,还包括:
将当前连接的终端运营商的网络切换至先前接入的WIFI网络。
本公开实施例还提供了一种WIFI网络下的数据传输装置,应用于移动终端,所述装置包括:
识别模块,配置为检测移动终端当前所处的环境信息;
处理模块,配置为根据所述环境信息,确定移动终端通过当前接入的WIFI网络传输信息时的可信度信息;
检测模块,配置为在所述可信度信息达到预设条件时,检测需要通过
当前接入的WIFI网络传输信息数据的内容;
传输模块,配置为若需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容时,则将当前接入的WIFI网络切换至终端运营商的网络进行所述信息数据的传输。
可选地,本公开实施例中,所述识别模块包括:
第一解析单元,配置为对当前接入的WIFI网络的服务集标识进行解析,获得第一解析信息;
第一获取单元,配置为获取所述第一解析信息中的第一关键字;
第一识别单元,配置为根据所述第一关键字确定移动终端当前所处的环境信息。
可选地,本公开实施例中,所述识别模块包括:
第二解析单元,配置为对当前所有可接入的WIFI网络的服务集标识进行解析,获得每一可接入的WIFI网络的服务集标识对应的第二解析信息;
第二获取单元,配置为获取每一所述第二解析信息中的第二关键字;
第二识别单元,配置为根据所述第二关键字确定所述移动终端当前所处的环境信息。
可选地,本公开实施例中,所述处理模块包括:
第一匹配单元,配置为将所述环境信息与预设环境信息的可信度匹配表进行匹配,得到所述环境信息的第一可信度值;
第一处理单元,配置为根据预设时间段内移动终端连接当前接入的WIFI网络的连接次数,确定当前接入的WIFI网络的第二可信度值;
第二处理单元,配置为根据所述第一可信度值和所述第二可信度值,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息。
可选地,本公开实施例中,所述装置还包括:
判断模块,配置为当所述可信度信息中的可信度值小于预设可信度值
时,则确定所述可信度信息达到预设条件。
可选地,本公开实施例中,所述检测模块包括:
第三获取单元,配置为获取需要通过当前接入的WIFI网络传输信息数据的内容;
第二匹配单元,配置为将所述信息数据与预定信息内容相匹配,当匹配成功时,则确定需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容;
其中,所述预定信息内容包括用户个人信息、用户登录信息和银行帐号信息。
可选地,本公开实施例中,所述装置还包括:
切换模块,配置为将当前连接的终端运营商的网络切换至先前接入的WIFI网络。
所述识别模块、所述处理模块、所述检测模块、所述传输模块、所述第一解析单元、所述第一获取单元、所述第一识别单元、所述第二解析单元、所述第二获取单元、所述第二识别单元、所述第一匹配单元、所述第一处理单元、所述第二处理单元、所述判断模块、所述第三获取单元、所述第二匹配单元、所述切换模块在执行处理时,可以采用中央处理器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Singnal Processor)或可编程逻辑阵列(FPGA,Field-Programmable Gate Array)实现。
本公开实施例还提供了一种计算机存储介质,其中存储有计算机可执行指令,该计算机可执行指令配置执行上述WIFI网络下的数据传输方法。
本公开实施例的有益效果是:
上述方案中,通过检测移动终端当前所处环境信息,并对当前所处的环境信息作出对应的可信度判断。在可信度低于预设可信度值时,进一步检测当前需要传输的信息数据是否为敏感信息。如果是敏感信息,则将当
前接入的WIFI网络切换为运营商的网络进行信息数据的传输。从而保证了在不可信或者复杂的WIFI环境中对个人信息的保护。在完成信息数据的传输之后,切换为先前的WIFI网络连接,保证在完成信息数据的传输后,可以快速切换至WIFI网络连接,不需要重新进行WIFI网络连接的操作。
图1表示本公开实施例的一种WIFI网络下的数据传输方法的流程图;
图2表示本公开实施例的一种检测移动终端当前所处的环境信息的流程图;
图3表示本公开实施例的另一种检测移动终端当前所处的环境信息的流程图;
图4表示本公开实施例的一种确定在当前接入的WIFI网络下传输信息时的可信度信息的流程图;
图5表示本公开实施例的一种检测需要通过当前接入的WIFI网络传输信息数据的内容的流程图;
图6表示本公开实施例的一种WIFI网络下的数据传输装置的结构框图。
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
如图1所示,本公开的实施例提供了一种WIFI网络下的数据传输方法,应用于移动终端,所述方法包括:
S101、检测移动终端当前所处的环境信息;
该实施例中,环境信息包括移动终端当前所在的地理位置信息和/或移动终端当前接入网络状态信息。其中,地理位置信息包括商场环境、住宅场所和办公场所等。网络状态信息包括接入运营商的网络状态和接入非运营商的网络状态。
S102、根据所述环境信息,确定移动终端通过当前接入的WIFI网络传输信息时的可信度信息;
该实施例中,可信度信息可以是根据预设的地理位置信息的可信度值、预设时间段内连接当前接入的WIFI网络的连接次数、网络状态信息等确定。
S103、在所述可信度信息达到预设条件时,检测需要通过当前接入的WIFI网络传输信息数据的内容;
S104、若需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容时,则将当前接入的WIFI网络切换至终端运营商的网络进行所述信息数据的传输。
该实施例中,检测当前需要传输的信息数据的内容中包含预定信息内容时,将当前接入的WIFI网络切换至终端运营商的网络进行信息数据的传输。其中,该预定信息内容包括:用户的银行账号、身份证号码、联系方式和其他的用户名及密码等信息。该方案在当前接入的WIFI网络的可信度值低于预设可信度值时,避免了用户个人的信息数据泄露。
可选地,本公开实施例中,如图2所示,所述检测移动终端当前所处的环境信息的步骤,包括:
S201、对当前接入的WIFI网络的服务集标识进行解析,获得第一解析信息;
该实施例中,以商场环境为例,对解析WIFI网络的服务集标识的方式
进行说明。例如,对包含中文名称的服务集标识,采取直接提取中文关键字的方式。对于以店家名称命名的服务集标识,可以直接提取店家名称作为第一关键字。对包含字母名称的服务集标识,可以按照字母对照中文拼音的方式进行解析,将其中的中文拼音翻译成中文名称,并获取第一关键字。对包含英文名称的服务集标识,可以直接以英文名称表示的店家名称作为第一关键字。
S202、获取所述第一解析信息中的第一关键字;
该实施例中,第一关键字为表征移动终端当前所处的环境信息的关键字。例如:解析得到第一解析信息为某服装品牌的名称,则提取该服装品牌名称作为第一关键字。根据该第一关键字可以确定当前移动终端所处的环境信息为商场环境。
S203、根据所述第一关键字确定移动终端当前所处的环境信息。
该实施例中,确定移动终端当前所处的环境信息的方式,可以是将第一关键字与预设环境信息的判定表进行匹配,将第一关键字对应的预设环境信息的判定表中的环境信息,作为移动终端当前所处的环境信息。
可选地,本公开实施例中,如图3所示,所述检测移动终端当前所处的环境信息的步骤,包括:
S301、对当前所有可接入的WIFI网络的服务集标识进行解析,获得每一可接入的WIFI网络的服务集标识对应的第二解析信息;
S302、获取每一所述第二解析信息中的第二关键字;
S303、根据所述第二关键字确定所述移动终端当前所处的环境信息。
该实施例中,针对仅通过解析当前接入的WIFI网络的服务集标识并获取第一关键字的方式,不能确定对应的环境信息的情况,还可以通过对当前所有可接入的WIFI网络的服务集标识进行解析,获取每个可接入的WIFI网络的服务集标识对应的第二解析信息中的第二关键字。根据多个第二关
键字确定移动终端当前所处的环境信息。
具体的,可以按照当前可接入的WIFI网络的信号强度由高到低的顺序,筛选出预设数量的WIFI网络对应的第二关键字。按照筛选出的第二关键字与预设环境信息的判定表进行匹配,将数量最多的与第二关键字对应的环境信息,作为移动终端当前所处的环境信息。
此外,为了缩短对服务集标识的解析过程,可以仅针对非运营商的网络的服务集标识进行解析处理和/或优先按照信号强度由高到低的顺序筛选出预设数量的WIFI网络后,再进行解析处理。
值得说明的是,还可以通过全球定位系统(GPS)直接定位,获取移动终端当前所处的地理位置信息。
可选地,本公开实施例中,如图4所示,根据所述环境信息,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息的步骤,包括:
S401、将所述环境信息与预设环境信息的可信度匹配表进行匹配,得到所述环境信息的第一可信度值;
该实施例中,在预设环境信息的可信度匹配表中,可将公共环境信息(例如:商场环境、酒店环境等)的第一可信度值设置为低值(例如:设置为1),将住宅环境信息的第一可信度值设置为高值(例如:设置为10)。此外,还可以根据连接至同一环境信息中的同一WIFI网络的连接次数的增加,相应提高第一可信度值设置。但在确定当前接入的WIFI网络的环境信息为公共环境信息时,初始重置该公共环境信息的第一可信度值为1。
S402、根据预设时间段内移动终端连接当前接入的WIFI网络的连接次数,确定当前接入的WIFI网络的第二可信度值;
该实施例中,将未连接过的WIFI网络的第二可信度值设置为1,按照连接次数的增加,相应的提高第二可信度值设置(例如:检测当前WIFI网
络的连接次数为5,将第二可信度值设置为3)。此外,还可以针对特定的WIFI网络预设定第二可信度值。例如:当前接入的WIFI网络的预先设定的第二可信度值为10,按照连接次数确定的第二可信度值为1,则取两者平均值确定当前接入的WIFI网络的第二可信度值为5.5。
S403、根据所述第一可信度值和所述第二可信度值,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息。
该实施例中,按照预设加权算法,计算第一可信度值和第二可信度值的平均可信度值,作为移动终端通过当前接入的WIFI网络传输信息时的可信度信息。
可选地,本公开实施例中,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息的步骤之后,还包括:
当所述可信度信息中的可信度值小于预设可信度值时,则确定所述可信度信息达到预设条件。
该实施例中,将可信度信息中的可信度值与预设可信度值进行比较,若当前接入的WIFI网络可信度值为6,则判定当前接入的WIFI网络为不安全网络(不建议传输包含预定信息内容的信息数据的网络);若该可信度值为10,则判定当前接入的WIFI网络为安全网络。
具体的,预设可信度值可以按照预设信息内容等级、应用程序等级等来确定。例如:预设信息内容等级的设定:第一等级包括银行账号、个人财产等相关的信息数据;第二等级包括个人住址、联系方式、工作单位等相关的信息数据;第三等级包括用户登录信息等相关的信息数据。将即时通讯软件、涉及用户登录信息的网站等不涉及用户资金、银行账号信息的预设可信度值设置为5-8之间,将涉及不涉及用户资金、银行账号信息的预设可信度值设置为大于8,本公开实施例不以此为限。
可选地,本公开实施例中,如图5所示,所述检测需要通过当前接入
的WIFI网络传输信息数据的内容的步骤,包括:
S501、获取需要通过当前接入的WIFI网络传输信息数据的内容;
S502、将所述信息数据与预定信息内容相匹配,当匹配成功时,则确定需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容;
该实施例中,预定信息内容包括:用户个人信息(例如:身份证信息、住址、联系方式等)、用户登录信息和银行帐号信息等。预定信息内容以密文存储在终端中。
当可信度信息达到预设条件时,建立数据传输检测线程,检测用户输入的信息数据的内容。对用户需要传输的信息数据的内容进行解析,当确认需要通过当前接入的WIFI网络传输的信息数据的内容包含预设信息内容时,将当前接入的WIFI网络切换至终端运营商的网络进行信息数据的传输。
值得说明的是,信息数据的传输检测是通过在数据传输层进行控制的,即在WIFI网络需要通过数据进行封装传输之前,先进行信息数据内容的对比,再进行信息数据的传输,然后再通过对应的WIFI网络或者移动数据传输数据。
具体的,当可信度信息达到预设条件时,首先对涉及预设信息内容的应用程序和浏览器中的网络协议等高安全的网页进行监控(仅针对涉及网络业务的应用程序和输入),增加一个监控器,对每个应用程序产生的进程进行监控,并增加敏感词预制列表(例如:银行账号信息、用户个人信息和用户登录信息等)。
当检测到用户打开银行等高安全的应用程序时,建立一个输入检测线程,实时获取应用程序中的用户输入的信息数据。例如:该输入检测线程通过检测应用程序首页的内容,获取敏感词预制列表中的关键字(用户登录信息等)。通过解析用户是否在用户登录信息的后续输入中输入数据内容
来对该敏感词预制列表中的数据进行判定。例如:用户在进入银行的应用程序时,第一步的操作就是进行用户名和密码的输入,当确认在进行用户名和密码的输入时,则将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输。
在浏览器中,通过检测线程对网络协议等网页上的数据内容进行检测。当需要用户输入信息数据内容时,对用户输入的信息数据内容进行判定。例如:邮箱网站可以根据用户的设置进行检测,当用户在邮箱首页进行数据内容的输入时,可以对输入的数据内容进行重点检测,当检测到用户在用户名和密码栏进行操作时,则将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输。
在即时通信应用程序中,通过检测线程对上下文内容进行检测,当检测到上下文内容中包含敏感词预制列表中的关键字时,则将当前接入的WIFI网络切换至终端运营商的网络进行该内容的传输。例如:对上下文内容中的银行账号、身份证号等信息进行判定时,检测所得内容是否是一串数字,对此后的长串数据进行检测。用户登录信息中的用户名、密码等这些在上下文内容中,模糊匹配进行判定,可以通过数据挖掘算法缩小传输范围。
该实施例中,设定公共环境下WIFI网络的可信度值为低值,即公共环境下WIFI网络为不可信网络。当检测到移动终端处于公共环境时,将每次重新连接至当前WIFI网络的可信度值重置为1。重新启动对终端中的银行应用程序、邮箱登陆等信息进行检测,当检测到带有银行账号信息、密码等的关键字后,将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输。在这里设置一张映射表,通过映射表设置需要重点检测的应用程序和输入,例如:银行应用程序、浏览器、即时通信软件等应用程序以及敏感词预制列表。当待传输的信息数据内容涉及到映射表中的这些
内容时,通过终端运营商的网络进行该信息数据的传输。
在将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输时,将需要切换至的终端运营商的网络作为一个附加WIFI网络,添加到当前可接入的WIFI网络列表中。将该附加WIFI网络的可信度值的初始值设置为0,在需要切换至该附加WIFI网络进行信息数据的传输时,将该附加WIFI网络的可信度值设置为10,形成一个双数据传输通道。
通过判定待传输的信息数据的内容是否符合预定信息内容来选择数据传输的通道,这里需要通过软件控制的方式设置数据传输优先级。在该附加WIFI网络中,仅传输判定为符合预定信息内容的信息数据,不增加用户的数据负担。当信息数据传输完成后,将该附加WIFI网络的可信度值设置为0,切换至先前的WIFI网络连接,保证在完成信息数据的传输后,可以快速切换至WIFI网络连接,不需要重新进行WIFI网络连接的操作。
可选地,本公开实施例中,将当前接入的WIFI网络切换至终端运营商的网络进行信息数据的传输的步骤之后,还包括:
将当前连接的终端运营商的网络切换至先前接入的WIFI网络。
该实施例中,在将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输时,将需要切换至的终端运营商的网络作为一个附加WIFI网络,添加到当前可接入的WIFI网络列表中。将该附加WIFI网络的可信度值的初始值设置为0,在需要切换至该附加WIFI网络进行信息数据的传输时,将该附加WIFI网络的可信度值设置为10,形成一个双数据传输通道。
通过判定待传输的信息数据的内容是否符合预定信息内容来选择数据传输的通道,这里需要通过软件控制的方式设置数据传输优先级。在该附加WIFI网络中,仅传输判定为符合预定信息内容的信息数据,不增加用户的数据负担。当信息数据传输完成后,将该附加WIFI网络的可信度值设置
为0,切换至先前的WIFI网络连接,保证在完成信息数据的传输后,可以快速切换至WIFI网络连接,不需要重新进行WIFI网络连接的操作。
如图6所示,本公开实施例还提供了一种WIFI网络下的数据传输装置,应用于移动终端,所述装置包括:
识别模块61,配置为检测移动终端当前所处的环境信息;
该实施例中,环境信息包括移动终端当前所在的地理位置信息和/或移动终端当前接入网络状态信息。其中,地理位置信息包括商场环境、住宅场所和办公场所等。网络状态信息包括接入运营商的网络状态和接入非运营商的网络状态。
处理模块62,配置为根据所述环境信息,确定移动终端通过当前接入的WIFI网络传输信息时的可信度信息;
该实施例中,可信度信息可以是根据预设的地理位置信息的可信度值、预设时间段内连接当前接入的WIFI网络的连接次数、网络状态信息等确定。
检测模块63,配置为在所述可信度信息达到预设条件时,检测需要通过当前接入的WIFI网络传输信息数据的内容;
该实施例中,检测模块63在检测当前需要传输的信息数据的内容中包含预定信息内容时,将当前需要传输的信息数据的内容发送至传输模块64进行传输。其中,该预定信息内容包括:用户的银行账号、身份证号码、联系方式和其他的用户名及密码等信息。
传输模块64,配置为若需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容时,则将当前接入的WIFI网络切换至终端运营商的网络进行所述信息数据的传输。
该实施例中,传输模块64接收检测模块63发送的信息数据的内容,并将当前接入的WIFI网络切换至终端运营商的网络进行信息数据的传输。
该方案在当前接入的WIFI网络的可信度值低于预设可信度值时,避免了用户个人的信息数据泄露。
可选地,本公开实施例中,所述识别模块61包括:
第一解析单元610,配置为对当前接入的WIFI网络的服务集标识进行解析,获得第一解析信息;
该实施例中,以商场环境为例,对解析WIFI网络的服务集标识的方式进行说明。例如,对包含中文名称的服务集标识,采取直接提取中文关键字的方式。对于以店家名称命名的服务集标识,可以直接提取店家名称作为第一关键字。对包含字母名称的服务集标识,可以按照字母对照中文拼音的方式进行解析,将其中的中文拼音翻译成中文名称,并获取第一关键字。对包含英文名称的服务集标识,可以直接以英文名称表示的店家名称作为第一关键字。
第一获取单元611,配置为获取所述第一解析信息中的第一关键字;
该实施例中,第一关键字为表征移动终端当前所处的环境信息的关键字。例如:解析得到第一解析信息为某服装品牌的名称,则提取该服装品牌名称作为第一关键字。根据该第一关键字可以确定当前移动终端所处的环境信息为商场环境。
第一识别单元612,配置为根据所述第一关键字确定移动终端当前所处的环境信息。
该实施例中,第一识别单元612可以是将第一关键字与预设环境信息的判定表进行匹配,将与该第一关键字对应的预设环境信息的判定表中的环境信息,作为移动终端当前所处的环境信息。
可选地,本公开实施例中,所述识别模块61包括:
第二解析单元613,配置为对当前所有可接入的WIFI网络的服务集标识进行解析,获得每一可接入的WIFI网络的服务集标识对应的第二解析信
息;
第二获取单元614,配置为获取每一所述第二解析信息中的第二关键字;
第二识别单元615,配置为根据所述第二关键字确定所述移动终端当前所处的环境信息。
该实施例中,针对仅通过解析当前接入的WIFI网络的服务集标识并获取第一关键字的方式,不能确定对应的环境信息的情况,还可以通过第二解析单元613对当前所有可接入的WIFI网络的服务集标识进行解析,并通过第二获取单元614获取每个可接入的WIFI网络的服务集标识对应的第二解析信息中的第二关键字。第二识别单元615根据多个第二关键字确定移动终端当前所处的环境信息。
具体的,可以按照当前可接入的WIFI网络的信号强度由高到低的顺序,筛选出预设数量的WIFI网络对应的第二关键字。按照筛选出的第二关键字与预设环境信息的判定表进行匹配,将数量最多的与第二关键字对应的环境信息,作为移动终端当前所处的环境信息。
此外,为了缩短对服务集标识的解析过程,可以仅针对非运营商的网络的服务集标识进行解析处理和/或优先按照信号强度由高到低的顺序筛选出预设数量的WIFI网络后,再进行解析处理。
值得说明的是,还可以通过全球定位系统(GPS)直接定位,获取移动终端当前所处的地理位置信息。
可选地,本公开实施例中,所述处理模块62包括:
第一匹配单元620,配置为将所述环境信息与预设环境信息的可信度匹配表进行匹配,得到所述环境信息的第一可信度值;
该实施例中,在预设环境信息的可信度匹配表中,可将公共环境信息(例如:商场环境、酒店环境等)的第一可信度值设置为低值(例如:设
置为1),将住宅环境信息的第一可信度值设置为高值(例如:设置为10)。此外,还可以根据连接至同一环境信息中的同一WIFI网络的连接次数的增加,相应提高第一可信度值设置。但在确定当前接入的WIFI网络的环境信息为公共环境信息时,初始重置该公共环境信息的第一可信度值为1。
第一处理单元621,配置为根据预设时间段内移动终端连接当前接入的WIFI网络的连接次数,确定当前接入的WIFI网络的第二可信度值;
该实施例中,将未连接过的WIFI网络的第二可信度值设置为1。按照连接次数的增加,相应的提高第二可信度值设置(例如:检测当前WIFI网络的连接次数为5,将第二可信度值设置为3)。此外,还可以针对特定的WIFI网络预设定第二可信度值。例如:当前接入的WIFI网络的预先设定的第二可信度值为10,按照连接次数确定的第二可信度值为1,则取两者平均值确定当前接入的WIFI网络的第二可信度值为5.5。
第二处理单元622,配置为根据所述第一可信度值和所述第二可信度值,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息。
该实施例中,第二处理单元622可以是按照预设加权算法,计算第一可信度值和第二可信度值的平均可信度值,作为移动终端通过当前接入的WIFI网络传输信息时的可信度信息。
可选地,本公开实施例中,所述装置还包括:
判断模块65,配置为当所述可信度信息中的可信度值小于预设可信度值时,则确定所述可信度信息达到预设条件。
该实施例中,判断模块65是将可信度信息中的可信度值与预设可信度值(例如:预设可信度值设置为8)进行比较,若当前接入的WIFI网络可信度值为6,则判定当前接入的WIFI网络为不安全网络(不建议传输包含预定信息内容的信息数据的网络);若该可信度值为10,则判定当前接入的
WIFI网络为安全网络。
具体的,预设可信度值可以按照预设信息内容等级、应用程序等级等来确定。例如:预设信息内容等级的设定:第一等级包括银行账号、个人财产等相关的信息数据;第二等级包括个人住址、联系方式、工作单位等相关的信息数据;第三等级包括用户登录信息等相关的信息数据。将即时通讯软件、涉及用户登录信息的网站等不涉及用户资金、银行账号信息的预设可信度值设置为5-8之间,将涉及不涉及用户资金、银行账号信息的预设可信度值设置为大于8,本公开实施例不以此为限。
可选地,本公开实施例中,所述检测模块63包括:
第三获取单元630,配置为获取需要通过当前接入的WIFI网络传输信息数据的内容;
第二匹配单元631,配置为将所述信息数据与预定信息内容相匹配,当匹配成功时,则确定需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容;
该实施例中,预定信息内容包括:用户个人信息(例如:身份证信息、住址、联系方式等)、用户登录信息和银行帐号信息等。预定信息内容以密文存储在终端中。
当可信度信息达到预设条件时,检测模块63建立数据传输检测线程,检测用户输入的信息数据的内容。第三获取单元630对用户需要传输的信息数据的内容进行解析,当第二匹配单元631确认需要通过当前接入的WIFI网络传输的信息数据的内容包含预设信息内容时,则通过传输模块64将当前接入的WIFI网络切换至终端运营商的网络进行信息数据的传输。
值得说明的是,信息数据的传输检测是通过在数据传输层进行控制的,即在WIFI网络需要通过数据进行封装传输之前,先进行信息数据内容的对比,再进行信息数据的传输,然后再通过对应的WIFI网络或者移动数据传
输数据。
具体的,当可信度信息达到预设条件时,检测模块63首先对涉及预设信息内容的应用程序和浏览器中的网络协议等高安全的网页进行监控(仅针对涉及网络业务的应用程序和输入),增加一个监控器,对每个应用程序产生的进程进行监控,并增加敏感词预制列表(例如:银行账号信息、用户个人信息和用户登录信息等)。
当检测到用户打开银行等高安全的应用程序时,建立一个输入检测线程,实时获取应用程序中的用户输入的信息数据。例如:该输入检测线程通过检测应用程序首页的内容,获取敏感词预制列表中的关键字(用户登录信息等)。通过解析用户是否在用户登录信息的后续输入中输入数据内容来对该敏感词预制列表中的数据进行判定。例如:用户在进入银行的应用程序时,第一步的操作就是进行用户名和密码的输入,当确认在进行用户名和密码的输入时,则将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输。
在浏览器中,通过检测线程对网络协议等网页上的数据内容进行检测。当需要用户输入信息数据内容时,对用户输入的信息数据内容进行判定。例如:邮箱网站可以根据用户的设置进行检测,当用户在邮箱首页进行数据内容的输入时,可以对输入的数据内容进行重点检测,当检测到用户在用户名和密码栏进行操作时,则将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输。
在即时通信应用程序中,通过检测线程对上下文内容进行检测,当检测到上下文内容中包含敏感词预制列表中的关键字时,则将当前接入的WIFI网络切换至终端运营商的网络进行该内容的传输。例如:对上下文内容中的银行账号、身份证号等信息进行判定时,检测所得内容是否是一串数字,对此下文内容中的长串数据进行检测。用户登录信息中的用户名、
密码等这些在上下文内容中,模糊匹配进行判定,可以通过数据挖掘算法缩小传输范围。
该实施例中,设定公共环境下WIFI网络的可信度值为低值,即公共环境下WIFI网络为不可信网络。当检测到移动终端处于公共环境时,将每次重新连接至当前WIFI网络的可信度值重置为1。重新启动对终端中的银行应用程序、邮箱登陆等信息进行检测,当检测到带有银行账号信息、密码等的关键字后,将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输。在这里设置一张映射表,通过映射表设置需要重点检测的应用程序和输入,例如:银行应用程序、浏览器、即时通信软件等应用程序以及敏感词预制列表。当待传输的信息数据内容涉及到映射表中的这些内容时,通过终端运营商的网络进行该信息数据的传输。
在将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输时,将需要切换至的终端运营商的网络作为一个附加WIFI网络,添加到当前可接入的WIFI网络列表中。将该附加WIFI网络的可信度值的初始值设置为0,在需要切换至该附加WIFI网络进行信息数据的传输时,将该附加WIFI网络的可信度值设置为10,形成一个双数据传输通道。
通过判定待传输的信息数据的内容是否符合预定信息内容来选择数据传输的通道,这里需要通过软件控制的方式设置数据传输优先级。在该附加WIFI网络中,仅传输判定为符合预定信息内容的信息数据,不增加用户的数据负担。当信息数据传输完成后,将该附加WIFI网络的可信度值设置为0,切换至先前的WIFI网络连接,保证在完成信息数据的传输后,可以快速切换至WIFI网络连接,不需要重新进行WIFI网络连接的操作。
可选地,本公开实施例中,所述装置还包括:
切换模块66,配置为将当前连接的终端运营商的网络切换至先前接入的WIFI网络。
该实施例中,传输模块64在将当前接入的WIFI网络切换至终端运营商的网络进行该信息数据的传输时,将需要切换至的终端运营商的网络作为一个附加WIFI网络,添加到当前可接入的WIFI网络列表中。将该附加WIFI网络的可信度值的初始值设置为0,在需要切换至该附加WIFI网络进行信息数据的传输时,将该附加WIFI网络的可信度值设置为10,形成一个双数据传输通道。
通过判定待传输的信息数据的内容是否符合预定信息内容来选择数据传输的通道,这里需要通过软件控制的方式设置数据传输优先级。在该附加WIFI网络中,仅传输判定为符合预定信息内容的信息数据,不增加用户的数据负担。当信息数据传输完成后,将该附加WIFI网络的可信度值设置为0,通过切换模块66将当前连接的运营商的网络切换至先前的WIFI网络连接,保证在完成信息数据的传输后,可以快速切换至WIFI网络连接,不需要重新进行WIFI网络连接的操作。
本公开实施例还提供了一种计算机存储介质,其中存储有计算机可执行指令,该计算机可执行指令配置执行上述WIFI网络下的数据传输方法。
以上所述的是本公开的优选实施方式,应当指出对于本技术领域的普通人员来说,在不脱离本公开所述的原理前提下还可以作出若干改进和润饰,这些改进和润饰也在本公开的保护范围内。
采用本公开实施例,通过检测移动终端当前所处环境信息,并对当前所处的环境信息作出对应的可信度判断。在可信度低于预设可信度值时,进一步检测当前需要传输的信息数据是否为敏感信息。如果是敏感信息,则将当前接入的WIFI网络切换为运营商的网络进行信息数据的传输。从而保证了在不可信或者复杂的WIFI环境中对个人信息的保护。在完成信息数据的传输之后,切换为先前的WIFI网络连接,保证在完成信息数据的传输
后,可以快速切换至WIFI网络连接,不需要重新进行WIFI网络连接的操作。
Claims (15)
- 一种WIFI网络下的数据传输方法,所述方法包括:检测移动终端当前所处的环境信息;根据所述环境信息,确定移动终端通过当前接入的WIFI网络传输信息时的可信度信息;在所述可信度信息达到预设条件时,检测需要通过当前接入的WIFI网络传输信息数据的内容;若需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容时,则将当前接入的WIFI网络切换至终端运营商的网络进行所述信息数据的传输。
- 根据权利要求1所述的方法,其中,所述检测移动终端当前所处的环境信息的步骤,包括:对当前接入的WIFI网络的服务集标识进行解析,获得第一解析信息;获取所述第一解析信息中的第一关键字;根据所述第一关键字确定移动终端当前所处的环境信息。
- 根据权利要求1所述的方法,其中,所述检测移动终端当前所处的环境信息的步骤,包括:对当前所有可接入的WIFI网络的服务集标识进行解析,获得每一可接入的WIFI网络的服务集标识对应的第二解析信息;获取每一所述第二解析信息中的第二关键字;根据所述第二关键字确定所述移动终端当前所处的环境信息。
- 根据权利要求1所述的方法,其中,根据所述环境信息,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息的步骤,包括:将所述环境信息与预设环境信息的可信度匹配表进行匹配,得到所 述环境信息的第一可信度值;根据预设时间段内移动终端连接当前接入的WIFI网络的连接次数,确定当前接入的WIFI网络的第二可信度值;根据所述第一可信度值和所述第二可信度值,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息。
- 根据权利要求1所述的方法,其中,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息的步骤之后,还包括:当所述可信度信息中的可信度值小于预设可信度值时,则确定所述可信度信息达到预设条件。
- 根据权利要求1所述的方法,其中,所述检测需要通过当前接入的WIFI网络传输信息数据的内容的步骤,包括:获取需要通过当前接入的WIFI网络传输信息数据的内容;将所述信息数据与预定信息内容相匹配,当匹配成功时,则确定需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容;其中,所述预定信息内容包括用户个人信息、用户登录信息和银行帐号信息。
- 根据权利要求1所述的方法,其中,将当前接入的WIFI网络切换至终端运营商的网络进行信息数据的传输的步骤之后,还包括:将当前连接的终端运营商的网络切换至先前接入的WIFI网络。
- 一种WIFI网络下的数据传输装置,所述装置包括:识别模块,配置为检测移动终端当前所处的环境信息;处理模块,配置为根据所述环境信息,确定移动终端通过当前接入的WIFI网络传输信息时的可信度信息;检测模块,配置为在所述可信度信息达到预设条件时,检测需要通过当前接入的WIFI网络传输信息数据的内容;传输模块,配置为若需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容时,则将当前接入的WIFI网络切换至终端运营商的网络进行所述信息数据的传输。
- 根据权利要求8所述的装置,其中,所述识别模块包括:第一解析单元,配置为对当前接入的WIFI网络的服务集标识进行解析,获得第一解析信息;第一获取单元,配置为获取所述第一解析信息中的第一关键字;第一识别单元,配置为根据所述第一关键字确定移动终端当前所处的环境信息。
- 根据权利要求8所述的装置,其中,所述识别模块包括:第二解析单元,配置为对当前所有可接入的WIFI网络的服务集标识进行解析,获得每一可接入的WIFI网络的服务集标识对应的第二解析信息;第二获取单元,配置为获取每一所述第二解析信息中的第二关键字;第二识别单元,配置为根据所述第二关键字确定所述移动终端当前所处的环境信息。
- 根据权利要求8所述的装置,其中,所述处理模块包括:第一匹配单元,配置为将所述环境信息与预设环境信息的可信度匹配表进行匹配,得到所述环境信息的第一可信度值;第一处理单元,配置为根据预设时间段内移动终端连接当前接入的WIFI网络的连接次数,确定当前接入的WIFI网络的第二可信度值;第二处理单元,配置为根据所述第一可信度值和所述第二可信度值,确定所述移动终端通过当前接入的WIFI网络传输信息时的可信度信息。
- 根据权利要求8所述的装置,其中,所述装置还包括:判断模块,配置为当所述可信度信息中的可信度值小于预设可信度 值时,则确定所述可信度信息达到预设条件。
- 根据权利要求8所述的装置,其中,所述检测模块包括:第三获取单元,配置为获取需要通过当前接入的WIFI网络传输信息数据的内容;第二匹配单元,配置为将所述信息数据与预定信息内容相匹配,当匹配成功时,则确定需要通过当前接入的WIFI网络传输信息数据的内容符合预定信息内容;其中,所述预定信息内容包括用户个人信息、用户登录信息和银行帐号信息。
- 根据权利要求8所述的装置,其中,所述装置还包括:切换模块,配置为将当前连接的终端运营商的网络切换至先前接入的WIFI网络。
- 一种计算机存储介质,存储有计算机可执行指令,该计算机可执行指令配置执行上述权利要求1-7任一项所述的WIFI网络下的数据传输方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610820772.9A CN107820237B (zh) | 2016-09-12 | 2016-09-12 | 一种wifi网络下的数据传输方法及装置 |
CN201610820772.9 | 2016-09-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018045755A1 true WO2018045755A1 (zh) | 2018-03-15 |
Family
ID=61561313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/081015 WO2018045755A1 (zh) | 2016-09-12 | 2017-04-19 | 一种wifi网络下的数据传输方法及装置、计算机存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107820237B (zh) |
WO (1) | WO2018045755A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109115973A (zh) * | 2018-08-03 | 2019-01-01 | 成都清渟科技有限公司 | 一种净水监测终端、监测系统及其数据传输方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108174378B (zh) * | 2018-03-21 | 2021-08-20 | Oppo广东移动通信有限公司 | 号码识别方法、装置、终端及存储介质 |
CN109257729A (zh) * | 2018-09-19 | 2019-01-22 | Oppo广东移动通信有限公司 | 消息传输方法、装置、终端及存储介质 |
CN110519460A (zh) * | 2019-08-28 | 2019-11-29 | 北京风信科技有限公司 | 防止移动终端被定位的安全通信方法及移动终端 |
CN112449388B (zh) * | 2019-09-04 | 2024-09-24 | 中兴通讯股份有限公司 | 网络连接控制方法、装置、移动终端及存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101794486A (zh) * | 2010-02-02 | 2010-08-04 | 李东风 | 一种全新的可实现安全圈存圈提的电子转账方法 |
CN103368941A (zh) * | 2013-04-22 | 2013-10-23 | 北京奇虎科技有限公司 | 一种基于用户网络访问场景的防护的方法和装置 |
CN104821992A (zh) * | 2015-05-25 | 2015-08-05 | 广东欧珀移动通信有限公司 | 一种手机自动切换网络连接类型的方法及装置 |
CN105447702A (zh) * | 2015-11-12 | 2016-03-30 | 宁波萨瑞通讯有限公司 | 一种终端系统的网络安全支付方法 |
CN105873062A (zh) * | 2016-06-27 | 2016-08-17 | 联想(北京)有限公司 | 与无线通信网络建立网络连接的方法、装置和终端设备 |
CN106412903A (zh) * | 2016-11-28 | 2017-02-15 | 深圳天珑无线科技有限公司 | 移动终端数据传输方法和装置 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7099309B2 (en) * | 2003-10-10 | 2006-08-29 | Air-Bank Llc | Using a handheld communication device with a hot spot network |
EP2466850B1 (en) * | 2009-02-27 | 2013-05-29 | Research In Motion Limited | Systems and methods for facilitating conference calls using security tokens |
CN104869565A (zh) * | 2015-05-28 | 2015-08-26 | 魅族科技(中国)有限公司 | 一种通信信息访问方法及终端 |
CN104883294A (zh) * | 2015-05-28 | 2015-09-02 | 魅族科技(中国)有限公司 | 一种数据传输控制方法及装置 |
CN104902481B (zh) * | 2015-06-30 | 2019-05-21 | 北京奇虎科技有限公司 | 一种可以免流量的安全接管方法 |
CN105282735A (zh) * | 2015-09-01 | 2016-01-27 | 上海斐讯数据通信技术有限公司 | 基于移动终端联网使用的隐私保护方法和保护系统 |
CN105550591B (zh) * | 2015-12-10 | 2018-11-23 | 厦门美图移动科技有限公司 | 移动终端用户数据的安全防护装置以及方法 |
CN105430023A (zh) * | 2016-01-04 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | 一种保障信息安全的方法及装置 |
-
2016
- 2016-09-12 CN CN201610820772.9A patent/CN107820237B/zh active Active
-
2017
- 2017-04-19 WO PCT/CN2017/081015 patent/WO2018045755A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101794486A (zh) * | 2010-02-02 | 2010-08-04 | 李东风 | 一种全新的可实现安全圈存圈提的电子转账方法 |
CN103368941A (zh) * | 2013-04-22 | 2013-10-23 | 北京奇虎科技有限公司 | 一种基于用户网络访问场景的防护的方法和装置 |
CN104821992A (zh) * | 2015-05-25 | 2015-08-05 | 广东欧珀移动通信有限公司 | 一种手机自动切换网络连接类型的方法及装置 |
CN105447702A (zh) * | 2015-11-12 | 2016-03-30 | 宁波萨瑞通讯有限公司 | 一种终端系统的网络安全支付方法 |
CN105873062A (zh) * | 2016-06-27 | 2016-08-17 | 联想(北京)有限公司 | 与无线通信网络建立网络连接的方法、装置和终端设备 |
CN106412903A (zh) * | 2016-11-28 | 2017-02-15 | 深圳天珑无线科技有限公司 | 移动终端数据传输方法和装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109115973A (zh) * | 2018-08-03 | 2019-01-01 | 成都清渟科技有限公司 | 一种净水监测终端、监测系统及其数据传输方法 |
Also Published As
Publication number | Publication date |
---|---|
CN107820237B (zh) | 2020-11-20 |
CN107820237A (zh) | 2018-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018045755A1 (zh) | 一种wifi网络下的数据传输方法及装置、计算机存储介质 | |
US10673858B2 (en) | Centralized authentication for granting access to online services | |
US9942220B2 (en) | Preventing unauthorized account access using compromised login credentials | |
EP3044987B1 (en) | Method and system for verifying an account operation | |
US10070377B2 (en) | Method, system and apparatus for automatically connecting to WLAN | |
US9843602B2 (en) | Login failure sequence for detecting phishing | |
US8019995B2 (en) | Method and apparatus for preventing internet phishing attacks | |
CN104092542B (zh) | 一种账号登录方法、装置及系统 | |
US8893243B2 (en) | Method and system protecting against identity theft or replication abuse | |
US20150281239A1 (en) | Provision of access privileges to a user | |
US9374360B2 (en) | System and method for single-sign-on in virtual desktop infrastructure environment | |
WO2014154069A1 (zh) | 对Wi-Fi信号进行提示的方法及装置 | |
CN105430011A (zh) | 一种检测分布式拒绝服务攻击的方法和装置 | |
TW201741920A (zh) | 服務提供系統、服務提供方法、對照裝置、對照方法及電腦程式 | |
WO2015014215A1 (en) | Domain name resolution method, system and device | |
WO2015078247A1 (en) | Method, apparatus and terminal for monitoring phishing | |
US10474810B2 (en) | Controlling access to web resources | |
CN107548542B (zh) | 经强化完整性及安全性的用户认证方法 | |
CN113709136B (zh) | 一种访问请求验证方法和装置 | |
WO2015055013A1 (en) | Login system based on server, login server, and verification method thereof | |
US9787658B2 (en) | Login system based on server, login server, and verification method thereof | |
KR20150104667A (ko) | 인증 방법 | |
US20240364684A1 (en) | Authenticating users during and after suspicious voice calls and browsing | |
US9124615B2 (en) | Authentication of content provider web sites and applications via a mobile device identifier | |
JP6278934B2 (ja) | サーバ装置、サーバ装置の制御方法、及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17847929 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17847929 Country of ref document: EP Kind code of ref document: A1 |