WO2022100209A1 - 数据处理方法、装置、存储介质、终端及网络接入点设备 - Google Patents

数据处理方法、装置、存储介质、终端及网络接入点设备 Download PDF

Info

Publication number
WO2022100209A1
WO2022100209A1 PCT/CN2021/115404 CN2021115404W WO2022100209A1 WO 2022100209 A1 WO2022100209 A1 WO 2022100209A1 CN 2021115404 W CN2021115404 W CN 2021115404W WO 2022100209 A1 WO2022100209 A1 WO 2022100209A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
access point
terminal
network access
point device
Prior art date
Application number
PCT/CN2021/115404
Other languages
English (en)
French (fr)
Inventor
刘伟
彭昊
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2022100209A1 publication Critical patent/WO2022100209A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications

Definitions

  • the present application belongs to the field of communication technologies, and in particular, relates to a data processing method, apparatus, storage medium, terminal and network access point device.
  • terminals Users often need to use a terminal to access the network.
  • the network security of terminals is getting more and more attention from users. For example, when terminals are connected to public Wi-Fi hotspots, there is a risk of being attacked by the network.
  • the security detection capabilities of terminals such as smart phones and tablet computers are weak, and they are prone to security risks.
  • Embodiments of the present application provide a data processing method, apparatus, storage medium, terminal, and network access point device, which can improve the data security of the terminal.
  • an embodiment of the present application provides a data processing method, which is applied to a terminal, including:
  • an embodiment of the present application provides a data processing method, which is applied to a network access point device, including:
  • an embodiment of the present application provides a data processing apparatus, applied to a terminal, including:
  • a generation module is used to add a preset identifier to the data
  • a first sending module configured to send the data to a network access point device connected to the terminal, so that the network access point device performs security detection on the data according to the preset identifier
  • the first receiving module is configured to receive prompt information from the network access point device, where the prompt information is used to prompt the security detection result of the data.
  • an embodiment of the present application provides a data processing apparatus, which is applied to a network access point device, including:
  • a second receiving module for receiving data from the terminal
  • a detection module configured to perform security detection on the data if it is detected that the data has a preset identifier
  • the second sending module is configured to send the security detection result of the data to the terminal.
  • an embodiment of the present application provides a storage medium on which a computer program is stored, and when the computer program is executed on a computer, the computer is made to execute the data processing method provided in the first aspect of the embodiment of the present application. process, or cause the computer to execute the process in the data processing method provided by the second aspect of the embodiments of the present application.
  • an embodiment of the present application further provides a terminal, including a memory and a processor, and the processor invokes a computer program stored in the memory to execute the data processing method provided in the first aspect of the embodiment of the present application. process.
  • an embodiment of the present application provides a network access point device, including a memory and a processor, and the processor executes the data provided by the second aspect of the embodiment of the present application by calling a computer program stored in the memory Process in a method.
  • FIG. 1 is a first schematic flowchart of a data processing method provided by an embodiment of the present application.
  • FIG. 2 is a second schematic flowchart of the data processing method provided by the embodiment of the present application.
  • FIG. 3 is a third schematic flowchart of the data processing method provided by the embodiment of the present application.
  • 4 to 6 are schematic diagrams of scenarios of a data processing method provided by an embodiment of the present application.
  • FIG. 7 is a fourth schematic flowchart of the data processing method provided by the embodiment of the present application.
  • FIG. 8 is a first structural schematic diagram of a data processing apparatus provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of a second structure of a data processing apparatus provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 11 is another schematic structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a network access point device provided by an embodiment of the present application.
  • An embodiment of the present application provides a data processing method, applied to a terminal, including:
  • the method further includes:
  • the network access point device When connecting to the network access point device, if it is determined that the network access point device can perform security detection on the received data, the information used as the preset identifier is acquired.
  • the information used as the preset identifier includes a value of a service type field.
  • the method further includes:
  • the adding a preset identifier to the data includes: if the security level of the data is higher than the preset level, adding a preset identifier to the data.
  • the obtaining the security level of the data includes:
  • the security level of the application is determined as the security level of the data.
  • the embodiment of the present application also provides a data processing method, which is applied to a network access point device, including:
  • the method further includes:
  • the data is discarded.
  • the embodiment of the present application also provides a data processing apparatus, which is applied to a terminal, including:
  • a generation module is used to add a preset identifier to the data
  • a first sending module configured to send the data to a network access point device connected to the terminal, so that the network access point device performs security detection on the data according to the preset identifier
  • the first receiving module is configured to receive prompt information from the network access point device, where the prompt information is used to prompt the security detection result of the data.
  • the generating module may also be used for:
  • the network access point device When connecting to the network access point device, if it is determined that the network access point device can perform security detection on the received data, the information used as the preset identifier is acquired.
  • the generating module may be further configured to: acquire the security level of the data; if the security level of the data is higher than a preset level, add a preset identifier to the data .
  • the embodiment of the present application also provides a data processing apparatus, which is applied to a network access point device, including:
  • a second receiving module for receiving data from the terminal
  • a detection module configured to perform security detection on the data if it is detected that the data has a preset identifier
  • the second sending module is configured to send the security detection result of the data to the terminal.
  • the second sending module may be further configured to: if it is detected that the data is unsafe, discard the data.
  • An embodiment of the present application further provides a terminal, including a memory and a processor, wherein the processor invokes a computer program stored in the memory to execute:
  • the processor may further execute: when connecting to the network access point device, if it is determined that the network access point device can perform security detection on the received data , the information used as the preset identifier is obtained.
  • the information used as the preset identifier includes a value of a service type field.
  • the processor may also execute:
  • a preset identifier is added to the data.
  • the processor when the processor acquires the security level of the data, the processor may execute:
  • the security level of the application is determined as the security level of the data.
  • An embodiment of the present application further provides a network access point device, including a memory and a processor, wherein the processor executes by calling a computer program stored in the memory:
  • the processor may further perform: if it is detected that the data is unsafe, discard the data.
  • FIG. 1 is a first schematic flowchart of a data processing method provided by an embodiment of the present application. It can be understood that, the execution body of the embodiment of the present application may be a terminal such as a smart phone or a tablet computer.
  • terminals Users often need to use a terminal to access the network.
  • the network security of terminals is getting more and more attention from users. For example, when terminals are connected to public Wi-Fi hotspots, there is a risk of being attacked by the network.
  • the security detection capabilities of terminals such as smart phones and tablet computers are weak, and they are prone to security risks. For example, if there is a computer virus on the terminal, the data sent by the terminal to the network may be hijacked by the computer virus, thereby causing information leakage.
  • the terminal may add a preset identifier to data that needs to be sent to the network.
  • the terminal may be a device without a security detection capability. For example, no security detection software such as antivirus software is installed on the terminal.
  • the terminal can send the data to the network access point device connected to the terminal, so that the network access point device can This data is checked for security.
  • the network access point device may be a device such as a Wi-Fi access point (Access Point, AP).
  • the network access point device may be a device with security detection capability, for example, the network access point device may be a device installed with antivirus software.
  • the network access point device is a device that provides network access services for terminals, that is, the terminal is connected to the network through the network access point device.
  • the data sent by the terminal to the network will first be sent to the network access point device, and then the network access point device will send the data to the network.
  • the data fed back by the network to the terminal is also first received by the network access point device, and then sent to the terminal by the network access point device.
  • the network access point device After receiving the data sent by the terminal, the network access point device can detect whether the data carries a preset identifier.
  • the network access point device can perform security detection on the data, so as to detect whether the data carries viruses, Trojan horses, or the like. If it is detected that the data carries viruses, Trojan horses, etc., it means that the data is unsafe data. In this case, the network access point device may send prompt information to the terminal, where the prompt information may be used to prompt the terminal that the data it sends is not secure. If it is detected that the data is safe data, the network access point device can send the data to the network, and send prompt information to the terminal, where the prompt information can be used to prompt the terminal that the data it sends is safe.
  • the network access point device may not perform security detection on the data, and send the data to the network.
  • the terminal may receive prompt information from the network access point device, and the prompt information may be used to prompt the security detection result of the data with the preset identifier sent by the terminal.
  • the network access point device may send prompt information to the terminal.
  • the terminal can receive the prompt information from the network access point device, and the prompt information can be used to prompt the terminal that the data with the preset identifier sent by it is not safe, so that the terminal and its users can know that the data sent is not safe.
  • Security data requires security detection on the terminal.
  • the network access point device may send prompt information to the terminal.
  • the terminal may then receive prompt information from the network access point device, where the prompt information may be used to prompt the terminal that the data with the preset identifier sent by the terminal is safe.
  • the terminal after adding a preset identifier to the data, the terminal can send the data to the network access point device connected to the terminal, so that the network access point device can be based on the preset identifier. Perform security checks on this data. Afterwards, the terminal may receive prompt information from the network access point device, where the prompt information may be used to prompt the security detection result of the data with the preset identifier sent by the terminal. Because the embodiment of the present application can use the security detection capability of the network access point device to perform security detection on the data of the terminal, and feed back the security detection result to the terminal. Therefore, the embodiments of the present application can improve the data security of the terminal.
  • FIG. 2 is a schematic flowchart of a second data processing method provided by an embodiment of the present application.
  • the data processing method can be applied to a terminal.
  • the terminal When connecting to a network access point device, if it is determined that the network access point device can perform security detection on the received data, the terminal acquires information used as a preset identifier.
  • the terminal when a terminal is connected to a network access point device, the terminal can communicate and negotiate with the network access point device to determine whether the network access point device can perform security detection on the received data, and whether the network access point device can perform security detection on the network access point device.
  • the terminal can acquire information used as a preset identifier.
  • the network access point device may be a device such as a wireless access point of a Wi-Fi network.
  • the terminal may determine whether the network access point device has the ability to perform security detection on received data through communication negotiation with the network access point device. For example, if the terminal and the network access point device use a DHCP message for communication and negotiation, the network access point device can write the information of whether it has the ability to perform security detection on the received data into the DHCP message, and the terminal is in the DHCP message. After receiving the DHCP message sent by the network access point device, the DHCP message can be parsed to know whether the network access point device has the ability to perform security detection on the received data.
  • an optional parameter field (Options) of the DHCP message may be used to indicate whether the network access point device has the capability to perform security detection on the received data. For example, when the value of the optional parameter field (Options) of the DHCP message is 1, it may indicate that the network access point device has the capability of performing security detection on the received data. When the value of the optional parameter field (Options) of the DHCP message is 0, it may indicate that the network access point device does not have the ability to perform security detection on the received data.
  • fields in other types of packets may also be used to carry information about whether the network access point device has the capability to perform security detection on the received data.
  • the extension field in the 802.11 protocol packet can be used to indicate whether the network access point device has the capability of performing security detection on the received data, and so on.
  • the information used as the preset identifier may include a value of a type of service (Type Of Service, TOS) field.
  • Type Of Service TOS
  • the information used as the preset identifier may be specified by the network access point device.
  • the information used as the preset identifier may be pre-stored in the network access point device. Then, when connecting to the network access point device, the terminal can negotiate with the network access point device to determine whether the network access point device can perform security detection on the received data, and the network access point When the device can perform security detection on the received data, the terminal acquires information used as a preset identifier from the network access point device. Alternatively, when the information to be used as the preset identifier needs to be delivered to the terminal, the network access point device may instantly generate information to be used as the preset identifier and send it to the terminal for use.
  • the information used as the preset identifier may also be generated through negotiation between the network access point device and the terminal. For example, when connecting to a network access point device, the terminal may negotiate with the network access point device to determine whether the network access point device can perform security detection on the received data, and the network access point When the device can perform security detection on the received data, the terminal can negotiate with the network access point device for information used as a preset identifier, and so on.
  • the manner of generating the information used as the preset identifier in real time or through negotiation can prevent the information used as the preset identifier from being fixed, thereby further improving data security.
  • the terminal adds a preset identifier to the data.
  • the terminal determines that the network access point device has the capability of performing security detection on the received data.
  • the terminal can first obtain the security level of the data. After that, the terminal can detect whether the security level of the data is higher than the preset level.
  • the security level of the data can be obtained by:
  • the terminal determines the application that generated the data
  • the terminal obtains the security level preset for the application
  • the terminal determines the security level of the application as the security level of the data.
  • the terminal may first determine the application program that generates the data. For example, game data is generated by game application A, payment data is generated by mobile banking application B, and so on. Afterwards, the terminal may acquire the security level preset for the application, and determine the security level of the application as the security level of the data.
  • the security level pre-set for the mobile banking application B by the terminal is Level 1
  • the security level of the data generated by the mobile banking application B is also Level 1.
  • the security level preset for the instant messaging application C by the terminal is Level 2
  • the security level of the data generated by the instant messaging application C is also Level 2.
  • the security level pre-set by the terminal for the online video playback application D is level 3, then the security level of the data generated by the online video playback application D is also level 3, and so on.
  • the security levels of the first, second and third levels can be lowered in turn.
  • the data can be considered to be data that needs to be protected.
  • the data belongs to the data of payment information. Since the payment information involves the user's bank account, payment password and other information, it is necessary to protect this type of data safely.
  • the terminal may add a preset identifier to the data. For example, the terminal can add the TOS value agreed with the network access point device to the data. After that, go to step 204 .
  • the terminal can directly send the data to the network access point device.
  • the network access point device After receiving the data, the network access point device can directly send the data to the network.
  • the terminal sends the data to the network access point device, so that the network access point device performs security detection on the data according to the preset identifier.
  • the terminal may send the data to which the preset identifier has been added to the network access point device.
  • the network access point device After receiving the data sent by the terminal, the network access point device can detect whether the data contains a preset identifier.
  • the network access point device can perform security detection on the data. For example, the network access point device may invoke its own security scanning software to perform security scanning on the data, and the like.
  • the network access point device can send the data to the network and feed back the security detection result of the data to the terminal.
  • the network access point device detects through security scanning that the data that the terminal needs to send to the network is unsafe data, for example, it detects that there are malicious programs such as computer viruses and Trojan horses in the data, then the network access point device can send feedback to the terminal.
  • the data sent by it is the information of unsafe data.
  • the network access point device can directly send the data to the network.
  • the terminal receives prompt information from the network access point device, where the prompt information is used to prompt the security detection result of the data.
  • the terminal may receive prompt information from the network access point device, and the prompt information may be used to prompt the security detection result of the data with the preset identifier sent by the terminal.
  • the network access point device When the network access point device detects that the data sent by the terminal is not safe, the network access point device can feed back this information to the terminal. Then, the terminal can receive prompt information from the network access point device, and the prompt information can be used to prompt the terminal that the data with the preset identifier sent by it is not safe, so that the terminal and its users can know that the data sent is not safe For security data, security testing of the terminal is required.
  • the network access point device may send prompt information to the terminal.
  • the terminal may then receive prompt information from the network access point device, where the prompt information may be used to prompt the terminal that the data with the preset identifier sent by the terminal is safe.
  • FIG. 3 is a schematic flowchart of a third type of data processing method provided by an embodiment of the present application.
  • the data processing method can be applied to a network access point device.
  • the network access point device may receive data from the terminal that needs to be sent to the network.
  • the network access point device After receiving the data, the network access point device can detect whether the data has a preset identifier.
  • the network access point device may not perform security detection on the data, and send the data to the network.
  • the network access point device may perform security detection on the data.
  • the network access point device can invoke its own security scanning software to perform security scanning on the data.
  • the network access point device may feed back the security detection result of the data to the terminal.
  • the network access point device when the network access point device detects that the data with the preset identifier that the terminal needs to send to the network is unsafe data, the network access point device can send prompt information to the terminal, and the prompt information can be used to prompt the terminal.
  • the data with the preset identifier sent by the terminal is not safe.
  • the network access point device may discard the data without sending it to the network.
  • the network access point device may send the data to the network.
  • the network access point device may send prompt information to the terminal, where the prompt information may be used to prompt the terminal that the data with the preset identifier sent by the terminal is safe.
  • FIG. 4 to FIG. 6 are schematic diagrams of scenarios of the data processing method provided by the embodiments of the present application.
  • the mobile terminal is connected to a Wi-Fi access point.
  • the mobile terminal conducts communication negotiation with the Wi-Fi access point, and determines that the Wi-Fi access point can perform security detection on the received data. And, the mobile terminal acquires the information used as the preset identifier from the Wi-Fi access point.
  • a payment application in a mobile terminal generates a piece of data that needs to be sent to a server on the network for processing.
  • the mobile terminal can add a preset identifier to this data. After adding a preset identifier to the data, the mobile terminal can send the data to the Wi-Fi access point, as shown in FIG. 4 .
  • the Wi-Fi access point After receiving the data sent by the mobile terminal, the Wi-Fi access point can detect whether the data has a preset identifier.
  • the Wi-Fi access point detects that the data has a preset identifier.
  • the Wi-Fi access point can call its own security scanning software to perform security scanning on the data, and obtain the security scanning result.
  • the Wi-Fi access point can send the data to the network, as shown in Figure 5.
  • the Wi-Fi access point may also send prompt information to the mobile terminal, where the prompt information may be used to prompt the mobile terminal that the data with the preset identifier sent by the mobile terminal is safe.
  • the Wi-Fi access point can send prompt information to the mobile terminal, and the prompt information can be used to prompt the mobile terminal that the data with the preset identifier sent by it is unsafe, And prompt the mobile terminal to perform a security self-check, as shown in FIG. 6 .
  • the Wi-Fi access point If the Wi-Fi access point detects that the data sent by the mobile terminal does not have a preset identifier, the Wi-Fi access point can directly send the data to the network.
  • FIG. 7 A schematic flowchart corresponding to the foregoing embodiment may be shown in FIG. 7 .
  • FIG. 8 is a schematic structural diagram of a data processing apparatus provided by an embodiment of the present application.
  • the data processing apparatus can be applied to a terminal.
  • the data processing apparatus 400 may include: a generating module 401 , a first sending module 402 , and a first receiving module 403 .
  • the generating module 401 is used to add a preset identifier to the data.
  • the first sending module 402 is configured to send the data to a network access point device connected to the terminal, so that the network access point device can perform security detection on the data according to the preset identifier.
  • the first receiving module 403 is configured to receive prompt information from the network access point device, where the prompt information is used to prompt the security detection result of the data.
  • the generating module 401 can also be used to:
  • the information used as the preset identifier includes a value of a service type field.
  • the generating module 401 may be further configured to: acquire the security level of the data; if the security level of the data is higher than a preset level, add a preset identifier to the data.
  • the generating module 401 may be further configured to: determine an application program that generates the data; acquire a security level preset for the application program; determine the security level of the application program as The security level of the data.
  • FIG. 9 is a schematic structural diagram of a data processing apparatus provided by an embodiment of the present application.
  • the data processing apparatus can be applied to a network access point device.
  • the data processing apparatus 500 may include: a second receiving module 501 , a detecting module 502 , and a second sending module 503 .
  • the second receiving module 501 is configured to receive data from the terminal.
  • the detection module 502 is configured to perform security detection on the data if it is detected that the data has a preset identifier.
  • the second sending module 503 is configured to send the security detection result of the data to the terminal.
  • the second sending module 503 may also be configured to: if it is detected that the data is unsafe, discard the data.
  • Embodiments of the present application provide a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed on a computer, the computer is caused to execute the process in the data processing method provided by this embodiment.
  • An embodiment of the present application further provides a terminal, including a memory and a processor, where the processor is configured to execute the process in the data processing method provided by the present embodiment by invoking a computer program stored in the memory.
  • the above-mentioned terminal may be a terminal device such as a tablet computer or a smart phone.
  • FIG. 10 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • the terminal 600 may include components such as a display screen 601, a memory 602, a processor 603, and the like. Those skilled in the art can understand that the terminal structure shown in FIG. 10 does not constitute a limitation on the terminal, and may include more or less components than shown, or combine some components, or arrange different components.
  • the display screen 601 may be used to display information such as images, text, and the like.
  • Memory 602 may be used to store applications and data.
  • the application program stored in the memory 602 contains executable code.
  • Applications can be composed of various functional modules.
  • the processor 603 executes various functional applications and data processing by executing the application programs stored in the memory 602 .
  • the processor 603 is the control center of the terminal, uses various interfaces and lines to connect various parts of the entire terminal, and executes various functions of the terminal by running or executing the application program stored in the memory 602 and calling the data stored in the memory 602. function and process data for overall monitoring of the terminal.
  • the processor 603 in the terminal loads the executable code corresponding to the process of one or more application programs into the memory 602 according to the following instructions, and the processor 603 executes and stores it in the memory 602 application in , which executes:
  • the terminal 600 may include components such as a display screen 601, a memory 602, a processor 603, a battery 604, a speaker 605, a microphone 606, and the like.
  • the display screen 601 may be used to display information such as images, text, and the like.
  • Memory 602 may be used to store applications and data.
  • the application program stored in the memory 602 contains executable code.
  • Applications can be composed of various functional modules.
  • the processor 603 executes various functional applications and data processing by executing the application programs stored in the memory 602 .
  • the processor 603 is the control center of the terminal, uses various interfaces and lines to connect various parts of the entire terminal, and executes various functions of the terminal by running or executing the application program stored in the memory 602 and calling the data stored in the memory 602. function and process data for overall monitoring of the terminal.
  • the battery 604 can be used to provide power support for various components and modules of the terminal, so as to ensure the normal operation of the various components and modules.
  • Speaker 605 may be used to play sound signals.
  • the microphone 606 can be used to collect sound signals in the surrounding environment, for example, to collect user voice and the like.
  • the processor 603 in the terminal loads the executable code corresponding to the process of one or more application programs into the memory 602 according to the following instructions, and the processor 603 executes and stores it in the memory 602 application in , which executes:
  • the processor 603 may further execute: when connecting to the network access point device, if it is determined that the network access point device can perform security detection on the received data, obtain the information for as the information of the preset identification.
  • the information used as the preset identifier includes a value of a service type field.
  • the processor 603 may further execute: acquiring the security level of the data; if the security level of the data is higher than a preset level, adding a preset identifier to the data.
  • the processor 603 executes: when acquiring the security level of the data, it may execute: determining an application that generates the data; acquiring a security level preset for the application; The security level of the application is determined as the security level of the data.
  • An embodiment of the present application further provides a network access point device, including a memory and a processor, where the processor is configured to execute the process in the data processing method provided by this embodiment by calling a computer program stored in the memory.
  • the network access point device 700 may include components such as a memory 701, a processor 702, and the like.
  • a memory 701 such as a DDR4 memory 701
  • a processor 702 such as a DDR4 memory 702
  • the structure of the electronic device shown in FIG. 12 does not constitute a limitation on the electronic device, and may include more or less components than the one shown, or combine some components, or arrange different components.
  • Memory 701 may be used to store applications and data.
  • the application program stored in the memory 701 includes executable code.
  • Applications can be composed of various functional modules.
  • the processor 702 executes various functional applications and data processing by executing the application programs stored in the memory 701 .
  • the processor 702 is the control center of the electronic device, uses various interfaces and lines to connect various parts of the entire electronic device, and executes the electronic device by running or executing the application program stored in the memory 701 and calling the data stored in the memory 701.
  • the various functions and processing data of the device are used to monitor the electronic equipment as a whole.
  • the processor 702 in the electronic device loads the executable code corresponding to the process of one or more application programs into the memory 701 according to the following instructions, and the processor 702 executes the execution and stores it in the memory application in 701, thus executing:
  • the processor 703 may further execute: if it is detected that the data is unsafe, discard the data.
  • the data processing apparatus provided in the embodiments of the present application and the data processing methods in the above embodiments belong to the same concept, and any method provided in the data processing method embodiments can be executed on the data processing apparatus.
  • the implementation process is detailed in the data processing method embodiment, which is not repeated here.
  • the computer program can be stored in a computer-readable storage medium, such as a memory, and executed by at least one processor, and the execution process can include the flow of the embodiment of the data processing method .
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM, Read Only Memory), a random access memory (RAM, Random Access Memory), and the like.
  • each functional module may be integrated in one processing chip, or each module may exist physically alone, or two or more modules may be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. If the integrated module is implemented in the form of a software function module and sold or used as an independent product, it can also be stored in a computer-readable storage medium, such as a read-only memory, a magnetic disk or an optical disk, etc. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种数据处理方法、装置、存储介质、终端及网络接入点设备。该数据处理方法可以包括:为数据添加预设标识;将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。

Description

数据处理方法、装置、存储介质、终端及网络接入点设备
本申请要求于2020年11月13日提交中国专利局,申请号为202011272856.6、发明名称为“数据处理方法、装置、存储介质、终端及网络接入点设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请属于通信技术领域,尤其涉及一种数据处理方法、装置、存储介质、终端及网络接入点设备。
背景技术
用户经常需要使用终端访问网络。目前,终端的网络安全越来越受用户重视,比如在终端连接到公共Wi-Fi热点时,存在被网络攻击的风险。然而,诸如智能手机、平板电脑等终端的安全检测能力较弱,容易存在安全隐患。
发明内容
本申请实施例提供一种数据处理方法、装置、存储介质、终端及网络接入点设备,可以提高终端的数据安全性。
第一方面,本申请实施例提供一种数据处理方法,应用于终端,包括:
为数据添加预设标识;
将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
第二方面,本申请实施例提供一种数据处理方法,应用于网络接入点设备,包括:
从终端处接收数据;
若检测到所述数据具有预设标识,则对所述数据进行安全检测;
将所述数据的安全检测结果发送给所述终端
第三方面,本申请实施例提供一种数据处理装置,应用于终端,包括:
生成模块,用于为数据添加预设标识;
第一发送模块,用于将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
第一接收模块,用于从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
第四方面,本申请实施例提供一种数据处理装置,应用于网络接入点设备,包括:
第二接收模块,用于从终端处接收数据;
检测模块,用于若检测到所述数据具有预设标识,则对所述数据进行安全检测;
第二发送模块,用于将所述数据的安全检测结果发送给所述终端。
第五方面,本申请实施例提供一种存储介质,其上存储有计算机程序,当所述计算机 程序在计算机上执行时,使得所述计算机执行本申请实施例第一方面提供的数据处理方法中的流程,或者使得所述计算机执行本申请实施例第二方面提供的数据处理方法中的流程。
第六方面,本申请实施例还提供一种终端,包括存储器,处理器,所述处理器通过调用所述存储器中存储的计算机程序,以执行本申请实施例第一方面提供的数据处理方法中的流程。
第七方面,本申请实施例提供一种网络接入点设备,包括存储器,处理器,所述处理器通过调用所述存储器中存储的计算机程序,以执行本申请实施例第二方面提供的数据处理方法中的流程。
附图说明
图1是本申请实施例提供的数据处理方法的第一种流程示意图。
图2是本申请实施例提供的数据处理方法的第二种流程示意图。
图3是本申请实施例提供的数据处理方法的第三种流程示意图。
图4至图6是本申请实施例提供的数据处理方法的场景示意图。
图7是本申请实施例提供的数据处理方法的第四种流程示意图。
图8是本申请实施例提供的数据处理装置的第一种结构示意图。
图9是本申请实施例提供的数据处理装置的第二种结构示意图。
图10是本申请实施例提供的终端的结构示意图。
图11是本申请实施例提供的终端的另一结构示意图。
图12是本申请实施例提供的网络接入点设备的结构示意图。
具体实施方式
请参照图示,其中相同的组件符号代表相同的组件,本申请的原理是以实施在一适当的运算环境中来举例说明。以下的说明是基于所例示的本申请具体实施例,其不应被视为限制本申请未在此详述的其它具体实施例。
本申请实施例提供一种数据处理方法,应用于终端,包括:
为数据添加预设标识;
将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
本申请的一种可选实施例中,所述方法还包括:
当连接到所述网络接入点设备时,若确定出所述网络接入点设备能够对接收到的数据进行安全检测,则获取用于作为所述预设标识的信息。
本申请的一种可选实施例中,所述用于作为所述预设标识的信息包括服务类型字段的值。
本申请的一种可选实施例中,所述方法还包括:
获取所述数据的安全等级;
所述为数据添加预设标识,包括:若所述数据的安全等级高于预设等级,则为所述数据添加预设标识。
本申请的一种可选实施例中,所述获取所述数据的安全等级,包括:
确定出生成所述数据的应用程序;
获取为所述应用程序预先设定的安全等级;
将所述应用程序的安全等级确定为所述数据的安全等级。
本申请实施例还提供一种数据处理方法,应用于网络接入点设备,包括:
从终端处接收数据;
若检测到所述数据具有预设标识,则对所述数据进行安全检测;
将所述数据的安全检测结果发送给所述终端。
本申请的一种可选实施例中,所述方法还包括:
若检测出所述数据不安全,则对所述数据进行丢弃处理。
本申请实施例还提供一种数据处理装置,应用于终端,包括:
生成模块,用于为数据添加预设标识;
第一发送模块,用于将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
第一接收模块,用于从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
本申请的一种可选实施例中,所述生成模块还可以用于:
当连接到所述网络接入点设备时,若确定出所述网络接入点设备能够对接收到的数据进行安全检测,则获取用于作为所述预设标识的信息。
本申请的一种可选实施例中,所述生成模块还可以用于:获取所述数据的安全等级;若所述数据的安全等级高于预设等级,则为所述数据添加预设标识。
本申请实施例还提供一种数据处理装置,应用于网络接入点设备,包括:
第二接收模块,用于从终端处接收数据;
检测模块,用于若检测到所述数据具有预设标识,则对所述数据进行安全检测;
第二发送模块,用于将所述数据的安全检测结果发送给所述终端。
本申请的一种可选实施例中,所述第二发送模块还可以用于:若检测出所述数据不安全,则对所述数据进行丢弃处理。
本申请实施例还提供一种终端,包括存储器,处理器,其中,所述处理器通过调用所述存储器中存储的计算机程序,以执行:
为数据添加预设标识;
将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
本申请的一种可选实施例中,所述处理器还可以执行:当连接到所述网络接入点设备 时,若确定出所述网络接入点设备能够对接收到的数据进行安全检测,则获取用于作为所述预设标识的信息。
本申请的一种可选实施例中,所述用于作为所述预设标识的信息包括服务类型字段的值。
本申请的一种可选实施例中,所述处理器还可以执行:
获取所述数据的安全等级;
若所述数据的安全等级高于预设等级,则为所述数据添加预设标识。
本申请的一种可选实施例中,所述处理器在所述获取所述数据的安全等级时,可以执行:
确定出生成所述数据的应用程序;
获取为所述应用程序预先设定的安全等级;
将所述应用程序的安全等级确定为所述数据的安全等级。
本申请实施例还提供一种网络接入点设备,包括存储器,处理器,其中,所述处理器通过调用所述存储器中存储的计算机程序,以执行:
从终端处接收数据;
若检测到所述数据具有预设标识,则对所述数据进行安全检测;
将所述数据的安全检测结果发送给所述终端。
本申请的一种可选实施例中,所述处理器还可以执行:若检测出所述数据不安全,则对所述数据进行丢弃处理。
请参阅图1,图1是本申请实施例提供的数据处理方法的第一种流程示意图。可以理解的是,本申请实施例的执行主体可以是诸如智能手机或平板电脑等的终端。
本申请实施例提供的流程可以包括:
101、为数据添加预设标识。
用户经常需要使用终端访问网络。目前,终端的网络安全越来越受用户重视,比如在终端连接到公共Wi-Fi热点时,存在被网络攻击的风险。然而,诸如智能手机、平板电脑等终端的安全检测能力较弱,容易存在安全隐患。比如,如果终端上存在计算机病毒,那么终端发送到网络的数据可能被计算机病毒劫持,从而造成信息泄密。
在本申请实施例中,比如,终端可以为需要发送到网络的数据添加预设标识。其中,在本申请实施例中,终端可以是不具有安全检测能力的设备。比如,该终端上没有安装诸如杀毒软件等安全检测软件。
102、将数据发送至终端连接的网络接入点设备,以使该网络接入点设备根据预设标识对该数据进行安全检测。
比如,在为需要发送到网络的数据添加了预设标识后,终端可以将该数据发送至与该终端连接的网络接入点设备,以使该网络接入点设备可以根据该预设标识对该数据进行安全检测。其中,网络接入点设备可以是Wi-Fi接入点(AccessPoint,AP)等设备。并且,网络接入点设备可以是具有安全检测能力的设备,例如该网络接入点设备可以是安装有杀毒软件的设备。
可以理解的是,网络接入点设备是为终端提供网络接入服务的设备,即终端是通过网 络接入点设备连接到网络的。终端发送到网络的数据会先发送至网络接入点设备,再由网络接入点设备将该数据发送到网络。网络反馈给终端的数据也是先由网络接入点设备接收,再由网络接入点设备发送至终端。
在接收到终端发送过来的数据后,网络接入点设备可以检测该数据是否携带有预设标识。
如果检测到该数据携带有预设标识,那么网络接入点设备可以对该数据进行安全检测,从而检测该数据是否携带有病毒、木马等。如果检测到该数据携带有病毒、木马等,那么表示该数据为不安全的数据。在这种情况下,网络接入点设备可以向终端发送提示信息,该提示信息可以用于提示该终端其发送的数据不安全。如果检测到该数据为安全的数据,那么网络接入点设备可以将该数据向外发送至网络,并向终端发送提示信息,该提示信息可以用于提示该终端其发送的数据安全。
如果检测到该数据没有携带预设标识,那么网络接入点设备可以不对该数据进行安全检测,并将该数据发送到网络。
103、从网络接入点设备处接收提示信息,该提示信息用于提示数据的安全检测结果。
比如,终端可以从网络接入点设备处接收提示信息,该提示信息可以用于提示终端发送的具有预设标识的数据的安全检测结果。
例如,网络接入点设备检测到终端发送的数据携带有病毒、木马等恶意程序,那么该网络接入点设备可以向终端发送提示信息。终端则可以从网络接入点设备处接收到该提示信息,该提示信息可以用于提示终端其发送的具有预设标识的数据不安全,从而使终端及其用户可以了解到发送的数据为不安全数据,需要对终端进行安全检测。
又如,网络接入点设备检测到终端发送的具有预设标识的数据为安全数据,那么网络接入点设备可以向终端发送提示信息。终端则可以从网络接入点设备处接收到提示信息,该提示信息可以用于提示该终端其发送的具有预设标识的数据安全。
可以理解的是,本申请实施例中,终端可以在为数据添加预设标识后将该数据发送至该终端连接的网络接入点设备,以使该网络接入点设备可以基于该预设标识对该数据进行安全检测。之后,终端可以从网络接入点设备处接收提示信息,该提示信息可以用于提示终端发送的具有预设标识的数据的安全检测结果。由于本申请实施例可以利用网络接入点设备的安全检测能力为终端的数据进行安全检测,并将安全检测结果反馈给终端。因此,本申请实施例可以提高终端的数据安全性。
请参阅图2,图2为本申请实施例提供的数据处理方法的第二种流程示意图。该数据处理方法可以应用于终端。
本申请实施例提供的数据处理方法的流程可以包括:
201、当连接到网络接入点设备时,若确定出该网络接入点设备能够对接收到的数据进行安全检测,则终端获取用于作为预设标识的信息。
比如,当终端连接到网络接入点设备时,该终端可以与该网络接入点设备进行通信协商,以确定该网络接入点设备是否能够对接收到的数据进行安全检测,以及在该网络接入点设备能够对接收到的数据进行安全检测时,终端可以获取用于作为预设标识的信息。其中,网络接入点设备可以是诸如Wi-Fi网络的无线接入点等设备。
比如,终端可以在与网络接入点设备建立连接时,通过与该网络接入点设备的通信协商从而确定该网络接入点设备是否具有对接收到的数据进行安全检测的能力。例如,终端与网络接入点设备使用DHCP报文进行通信协商,那么网络接入点设备可以将其是否具有对接收到的数据进行安全检测的能力这一信息写入DHCP报文中,终端在接收到网络接入点设备发送过来的DHCP报文后,可以通过解析该DHCP报文从而得知网络接入点设备是否具有对接收到的数据进行安全检测的能力。在一种实施方式中,可以使用DHCP报文的可选参数字段(Options)来标示网络接入点设备是否具有对接收到的数据进行安全检测的能力。例如,DHCP报文的可选参数字段(Options)的值为1时可以表示网络接入点设备具有对接收到的数据进行安全检测的能力。DHCP报文的可选参数字段(Options)的值为0时可以表示网络接入点设备不具有对接收到的数据进行安全检测的能力。
在其他实施方式中,还可以使用其它类型的报文中的字段来携带网络接入点设备是否具有对接收到的数据进行安全检测的能力这一信息。比如,可以使用802.11协议报文中的扩展字段来标示网络接入点设备是否具有对接收到的数据进行安全检测的能力,等等。
在本申请实施例中,用于作为预设标识的信息可以包括服务类型(Type Of Service,TOS)字段的值。
在一种实施方式中,用于作为预设标识的信息可以由网络接入点设备指定。比如,用于作为预设标识的信息可以预先存储在网络接入点设备中。那么,当连接到网络接入点设备时,终端可以与该网络接入点设备进行协商,以确定该网络接入点设备是否能够对接收到的数据进行安全检测,以及在该网络接入点设备能够对接收到的数据进行安全检测时,该终端从该网络接入点设备处获取用于作为预设标识的信息。或者,当需要向终端下发用于作为预设标识的信息时,网络接入点设备可以即时生成一个用于作为预设标识的信息并发送给终端使用。
在另一种实施方式中,用于作为预设标识的信息也可以是由网络接入点设备和终端协商生成的。比如,当连接到网络接入点设备时,终端可以与该网络接入点设备进行协商,以确定该网络接入点设备是否能够对接收到的数据进行安全检测,以及在该网络接入点设备能够对接收到的数据进行安全检测时,该终端可以与该网络接入点设备处协商用于作为预设标识的信息,等等。
可以理解的是,即时或协商生成用于作为预设标识的信息的方式,可以使得用于作为预设标识的信息不会是固定不变的,从而进一步提高数据安全性。
202、终端获取数据的安全等级。
203、若数据的安全等级高于预设等级,则终端为该数据添加预设标识。
比如,通过与网络接入点设备的通信协商,终端确定出该网络接入点设备具有对接收到的数据进行安全检测的能力。在这种情况下,当需要发送数据时,终端可以先获取该数据的安全等级。之后,终端可以检测该数据的安全等级是否高于预设等级。
在一种实施方式中,可以通过如下方式来获取数据的安全等级:
终端确定出生成数据的应用程序;
终端获取为该应用程序预先设定的安全等级;
终端将该应用程序的安全等级确定为该数据的安全等级。
比如,终端可以先确定出生成该数据的应用程序。例如,游戏数据是由游戏应用A生成的,支付数据是由手机银行应用B生成的,等等。之后,终端可以获取为该应用程序预先设定的安全等级,并将该应用程序的安全等级确定为该数据的安全等级。
例如,终端预先为手机银行应用B设定的安全等级为一级,那么由手机银行应用B生成的数据的安全等级也为一级。终端预先为即时通信应用C设定的安全等级为二级,那么由即时通信应用C生成的数据的安全等级也为二级。终端预先为在线视频播放应用D设定的安全等级为三级,那么由在线视频播放应用D生成的数据的安全等级也为三级,等等。其中,一级、二级、三级的安全等级可以依次降低。
如果检测到该数据的安全等级高于预设等级,那么可以认为该数据为需要进行安全保护的数据。比如,该数据属于支付信息的数据,由于支付信息涉及到用户的银行账户、支付密码等信息,因此需要对这类数据进行安全保护。在这种情况下,终端可以将为该数据添加预设标识。例如,终端可以为该数据添加与网络接入点设备约定好的TOS值。之后,进入204的步骤。
如果检测到该数据的安全等级不高于预设等级,那么可以认为该数据为普通数据,可以不进行安全保护。在这种情况下,终端可以直接将该数据发送给网络接入点设备。网络接入点设备在接收到该数据后,可以直接将该数据发送到网络。
204、终端将数据发送至网络接入点设备,以使该网络接入点设备根据预设标识对该数据进行安全检测。
比如,在为需要发送到网络的数据添加了预设标识后,终端可以将已添加预设标识的数据发送至网络接入点设备。
网络接入点设备在接收到终端发送过来的数据后,可以检测该数据中是否包含预设标识。
如果检测到该数据中包含预设标识,那么网络接入点设备可以对该数据进行安全检测。例如,网络接入点设备可以调用自身的安全扫描软件对该数据进行安全扫描等。
若网络接入点设备通过安全扫描检测到终端需要发送到网络的数据为安全的数据,那么网络接入点设备可以将该数据发送到网络,并向终端反馈数据的安全检测结果。
若网络接入点设备通过安全扫描检测到终端需要发送到网络的数据为不安全的数据,例如检测到该数据中存在诸如计算机病毒、木马等恶意程序,那么网络接入点设备可以向终端反馈其发送的数据为不安全数据的信息。
如果检测到该数据中不包含预设标识,那么网络接入点设备可以直接将该数据发送到网络。
205、终端从网络接入点设备处接收提示信息,该提示信息用于提示数据的安全检测结果。
比如,终端可以从网络接入点设备处接收提示信息,该提示信息可以用于提示终端发送的具有预设标识的数据的安全检测结果。
网络接入点设备检测到终端发送的数据不安全,那么网络接入点设备可以向终端反馈这一信息。那么,终端可以从网络接入点设备处接收到提示信息,该提示信息可以用于提示终端其发送的具有预设标识的数据不安全,从而使终端及其用户可以了解到发送的数据 为不安全数据,需要对终端进行安全检测等。
又如,网络接入点设备检测到终端发送的具有预设标识的数据为安全数据,那么网络接入点设备可以向终端发送提示信息。终端则可以从网络接入点设备处接收到提示信息,该提示信息可以用于提示该终端其发送的具有预设标识的数据安全。
请参阅图3,图3为本申请实施例提供的数据处理方法的第三种流程示意图。该数据处理方法可以应用于网络接入点设备。
本申请实施例提供的数据处理方法的流程可以包括:
301、从终端处接收数据。
比如,在终端接入到网络接入点设备后,该网络接入点设备可以从该终端处接收需要发送到网络的数据。
在接收到该数据后,网络接入点设备可以检测该数据是否具有预设标识。
如果检测到该数据具有预设标识,那么进入302的流程。
如果检测到该数据没有预设标识,那么网络接入点设备可以不对该数据进行安全检测,并将该数据发送到网络。
302、若检测到数据具有预设标识,则对该数据进行安全检测。
比如,网络接入点设备检测到终端发送的数据具有预设标识,那么该网络接入点设备可以对该数据进行安全检测。例如,网络接入点设备可以调用自身的安全扫描软件对该数据进行安全扫描。
303、将数据的安全检测结果发送给终端。
比如,在对终端发送过来的具有预设标识的数据进行安全检测后,网络接入点设备可以将该数据的安全检测结果反馈给终端。
例如,网络接入点设备检测到终端需要发送到网络的具有预设标识的数据为不安全的数据,那么该网络接入点设备可以向该终端发送提示信息,该提示信息可以用于提示该终端其发送的具有预设标识的数据不安全。
在一种实施方式中,如果网络接入点设备检测到终端发送过来的数据为不安全数据,那么该网络接入点设备可以对该数据进行丢弃处理,而不会发送到网络。
又如,网络接入点设备检测到终端需要发送到网络的具有预设标识的数据为安全的数据,那么该网络接入点设备可以将该数据发送至网络。并且,网络接入点设备可以向该终端发送提示信息,该提示信息可以用于提示该终端其发送的具有预设标识的数据安全。
请参阅图4至图6,图4至图6为本申请实施例提供的数据处理方法的场景示意图。
比如,移动终端连接到了Wi-Fi接入点。在建立连接的过程中,移动终端与Wi-Fi接入点进行了通信协商,并确定出该Wi-Fi接入点能够对接收到的数据进行安全检测。并且,移动终端从Wi-Fi接入点处获取到用于作为预设标识的信息。
例如,移动终端中的支付类应用生成了一条数据,该数据需要发送到网络上的服务器进行处理。在这种情况下,由于支付类应用的数据往往涉及到用户的银行账号和支付密码,因此移动终端可以为这条数据添加预设标识。在为数据添加预设标识后,移动终端可以将该数据发送到Wi-Fi接入点,如图4所示。
在接收到移动终端发送过来的数据后,Wi-Fi接入点可以检测该数据中是否具有预设 标识。
例如,Wi-Fi接入点检测到该数据具有预设标识。在这种情况下,Wi-Fi接入点可以调用自身的安全扫描软件对该数据进行安全扫描,得到安全扫描结果。
如果安全扫描结果反映出该数据为安全数据,那么Wi-Fi接入点可以将该数据发送到网络,如图5所示。可选的,Wi-Fi接入点也可以向移动终端发送提示信息,该提示信息可以用于提示该移动终端其发送的具有预设标识的数据安全。
如果安全扫描结果反映出该数据为不安全数据,那么Wi-Fi接入点可以向移动终端发送提示信息,该提示信息可以用于提示该移动终端其发送的具有预设标识的数据不安全,并提示该移动终端进行安全自检,如图6所示。
如果Wi-Fi接入点检测到移动终端发送的数据不具有预设标识,那么Wi-Fi接入点可以直接将该数据发送到网络。
上述实施例对应的流程示意图可以如图7所示。
请参阅图8,图8为本申请实施例提供的数据处理装置的结构示意图。该数据处理装置可以应用于终端。数据处理装置400可以包括:生成模块401,第一发送模块402,第一接收模块403。
生成模块401,用于为数据添加预设标识。
第一发送模块402,用于将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测。
第一接收模块403,用于从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
在一种实施方式中,所述生成模块401还可以用于:
当连接到所述网络接入点设备时,若确定出所述网络接入点设备能够对接收到的数据进行安全检测,则获取用于作为所述预设标识的信息。
在一种实施方式中,所述用于作为所述预设标识的信息包括服务类型字段的值。
在一种实施方式中,所述生成模块401还可以用于:获取所述数据的安全等级;若所述数据的安全等级高于预设等级,则为所述数据添加预设标识。
在一种实施方式中,所述生成模块401还可以用于:确定出生成所述数据的应用程序;获取为所述应用程序预先设定的安全等级;将所述应用程序的安全等级确定为所述数据的安全等级。
请参阅图9,图9为本申请实施例提供的数据处理装置的结构示意图。该数据处理装置可以应用于网络接入点设备。数据处理装置500可以包括:第二接收模块501,检测模块502,第二发送模块503。
第二接收模块501,用于从终端处接收数据。
检测模块502,用于若检测到所述数据具有预设标识,则对所述数据进行安全检测。
第二发送模块503,用于将所述数据的安全检测结果发送给所述终端。
在一种实施方式中,所述第二发送模块503还可以用于:若检测出所述数据不安全,则对所述数据进行丢弃处理。
本申请实施例提供一种计算机可读的存储介质,其上存储有计算机程序,当所述计算 机程序在计算机上执行时,使得所述计算机执行如本实施例提供的数据处理方法中的流程。
本申请实施例还提供一种终端,包括存储器,处理器,所述处理器通过调用所述存储器中存储的计算机程序,用于执行本实施例提供的数据处理方法中的流程。
例如,上述终端可以是诸如平板电脑或者智能手机等终端设备。请参阅图10,图10为本申请实施例提供的终端的结构示意图。
该终端600可以包括显示屏601、存储器602、处理器603等部件。本领域技术人员可以理解,图10中示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
显示屏601可以用于显示诸如图像、文字等信息。
存储器602可用于存储应用程序和数据。存储器602存储的应用程序中包含有可执行代码。应用程序可以组成各种功能模块。处理器603通过运行存储在存储器602的应用程序,从而执行各种功能应用以及数据处理。
处理器603是终端的控制中心,利用各种接口和线路连接整个终端的各个部分,通过运行或执行存储在存储器602内的应用程序,以及调用存储在存储器602内的数据,执行终端的各种功能和处理数据,从而对终端进行整体监控。
在本实施例中,终端中的处理器603会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行代码加载到存储器602中,并由处理器603来运行存储在存储器602中的应用程序,从而执行:
为数据添加预设标识;
将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
请参阅图11,终端600可以包括显示屏601、存储器602、处理器603、电池604、扬声器605、麦克风606等部件。
显示屏601可以用于显示诸如图像、文字等信息。
存储器602可用于存储应用程序和数据。存储器602存储的应用程序中包含有可执行代码。应用程序可以组成各种功能模块。处理器603通过运行存储在存储器602的应用程序,从而执行各种功能应用以及数据处理。
处理器603是终端的控制中心,利用各种接口和线路连接整个终端的各个部分,通过运行或执行存储在存储器602内的应用程序,以及调用存储在存储器602内的数据,执行终端的各种功能和处理数据,从而对终端进行整体监控。
电池604可用于为终端的各个部件和模块提供电力支持,从而保证各个部件和模块的正常运行。
扬声器605可以用于播放声音信号。
麦克风606可以用于采集周围环境中的声音信号,例如采集用户语音等。
在本实施例中,终端中的处理器603会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行代码加载到存储器602中,并由处理器603来运行存储在存储器602 中的应用程序,从而执行:
为数据添加预设标识;
将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
在一种实施方式中,处理器603还可以执行:当连接到所述网络接入点设备时,若确定出所述网络接入点设备能够对接收到的数据进行安全检测,则获取用于作为所述预设标识的信息。
在一种实施方式中,所述用于作为所述预设标识的信息包括服务类型字段的值。
在一种实施方式中,处理器603还可以执行:获取所述数据的安全等级;若所述数据的安全等级高于预设等级,则为所述数据添加预设标识。
在一种实施方式中,处理器603执行:所述获取所述数据的安全等级时,可以执行:确定出生成所述数据的应用程序;获取为所述应用程序预先设定的安全等级;将所述应用程序的安全等级确定为所述数据的安全等级。
本申请实施例还提供一种网络接入点设备,包括存储器,处理器,所述处理器通过调用所述存储器中存储的计算机程序,用于执行本实施例提供的数据处理方法中的流程。
请参阅图12,网络接入点设备700可以包括存储器701、处理器702等部件。本领域技术人员可以理解,图12中示出的电子设备结构并不构成对电子设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
存储器701可用于存储应用程序和数据。存储器701存储的应用程序中包含有可执行代码。应用程序可以组成各种功能模块。处理器702通过运行存储在存储器701的应用程序,从而执行各种功能应用以及数据处理。
处理器702是电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或执行存储在存储器701内的应用程序,以及调用存储在存储器701内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。
在本实施例中,电子设备中的处理器702会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行代码加载到存储器701中,并由处理器702来运行存储在存储器701中的应用程序,从而执行:
从终端处接收数据;
若检测到所述数据具有预设标识,则对所述数据进行安全检测;
将所述数据的安全检测结果发送给所述终端。
在一种实施方式中,所述处理器703还可以执行:若检测出所述数据不安全,则对所述数据进行丢弃处理。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见上文针对数据处理方法的详细描述,此处不再赘述。
本申请实施例提供的所述数据处理装置与上文实施例中的数据处理方法属于同一构思,在所述数据处理装置上可以运行所述数据处理方法实施例中提供的任一方法,其具体 实现过程详见所述数据处理方法实施例,此处不再赘述。
需要说明的是,对本申请实施例所述数据处理方法而言,本领域普通技术人员可以理解实现本申请实施例所述数据处理方法的全部或部分流程,是可以通过计算机程序来控制相关的硬件来完成,所述计算机程序可存储于一计算机可读取存储介质中,如存储在存储器中,并被至少一个处理器执行,在执行过程中可包括如所述数据处理方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)等。
对本申请实施例的所述数据处理装置而言,其各功能模块可以集成在一个处理芯片中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中,所述存储介质譬如为只读存储器,磁盘或光盘等。
以上对本申请实施例所提供的一种数据处理方法、装置、存储介质以及电子设备进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (20)

  1. 一种数据处理方法,应用于终端,其中,包括:
    为数据添加预设标识;
    将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
    从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
  2. 根据权利要求1所述的数据处理方法,其中,所述方法还包括:
    当连接到所述网络接入点设备时,若确定出所述网络接入点设备能够对接收到的数据进行安全检测,则获取用于作为所述预设标识的信息。
  3. 根据权利要求2所述的数据处理方法,其中,所述用于作为所述预设标识的信息包括服务类型字段的值。
  4. 根据权利要求1所述的数据处理方法,其中,所述方法还包括:
    获取所述数据的安全等级;
    所述为数据添加预设标识,包括:若所述数据的安全等级高于预设等级,则为所述数据添加预设标识。
  5. 根据权利要求4所述的数据处理方法,其中,所述获取所述数据的安全等级,包括:
    确定出生成所述数据的应用程序;
    获取为所述应用程序预先设定的安全等级;
    将所述应用程序的安全等级确定为所述数据的安全等级。
  6. 一种数据处理方法,应用于网络接入点设备,其中,包括:
    从终端处接收数据;
    若检测到所述数据具有预设标识,则对所述数据进行安全检测;
    将所述数据的安全检测结果发送给所述终端。
  7. 根据权利要求6所述的数据处理方法,其中,所述方法还包括:
    若检测出所述数据不安全,则对所述数据进行丢弃处理。
  8. 一种数据处理装置,应用于终端,其中,包括:
    生成模块,用于为数据添加预设标识;
    第一发送模块,用于将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
    第一接收模块,用于从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
  9. 根据权利要求8所述的数据处理装置,其中,所述生成模块还可以用于:
    当连接到所述网络接入点设备时,若确定出所述网络接入点设备能够对接收到的数据进行安全检测,则获取用于作为所述预设标识的信息。
  10. 根据权利要求9所述的数据处理装置,其中,所述生成模块还可以用于:获取所述数据的安全等级;若所述数据的安全等级高于预设等级,则为所述数据添加预设标识。
  11. 一种数据处理装置,应用于网络接入点设备,其中,包括:
    第二接收模块,用于从终端处接收数据;
    检测模块,用于若检测到所述数据具有预设标识,则对所述数据进行安全检测;
    第二发送模块,用于将所述数据的安全检测结果发送给所述终端。
  12. 根据权利要求11所述的数据处理装置,其中,所述第二发送模块还可以用于:若检测出所述数据不安全,则对所述数据进行丢弃处理。
  13. 一种计算机可读的存储介质,其上存储有计算机程序,其中,当所述计算机程序在计算机上执行时,使得所述计算机执行如权利要求1至5中任一项所述的方法,或者使得所述计算机执行如权利要求6至7中任一项所述的方法。
  14. 一种终端,包括存储器,处理器,其中,所述处理器通过调用所述存储器中存储的计算机程序,以执行:
    为数据添加预设标识;
    将所述数据发送至所述终端连接的网络接入点设备,以使所述网络接入点设备根据所述预设标识对所述数据进行安全检测;
    从所述网络接入点设备处接收提示信息,所述提示信息用于提示所述数据的安全检测结果。
  15. 根据权利要求14所述的终端,其中,所述处理器还可以执行:当连接到所述网络接入点设备时,若确定出所述网络接入点设备能够对接收到的数据进行安全检测,则获取用于作为所述预设标识的信息。
  16. 根据权利要求15所述的终端,其中,所述用于作为所述预设标识的信息包括服务类型字段的值。
  17. 根据权利要求14所述的终端,其中,所述处理器还可以执行:
    获取所述数据的安全等级;
    若所述数据的安全等级高于预设等级,则为所述数据添加预设标识。
  18. 根据权利要求17所述的终端,其中,所述处理器在所述获取所述数据的安全等级时,可以执行:
    确定出生成所述数据的应用程序;
    获取为所述应用程序预先设定的安全等级;
    将所述应用程序的安全等级确定为所述数据的安全等级。
  19. 一种网络接入点设备,包括存储器,处理器,其中,所述处理器通过调用所述存储器中存储的计算机程序,以执行:
    从终端处接收数据;
    若检测到所述数据具有预设标识,则对所述数据进行安全检测;
    将所述数据的安全检测结果发送给所述终端。
  20. 根据权利要求19所述的网络接入点设备,其中,所述处理器还可以执行:若检测出所述数据不安全,则对所述数据进行丢弃处理。
PCT/CN2021/115404 2020-11-13 2021-08-30 数据处理方法、装置、存储介质、终端及网络接入点设备 WO2022100209A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011272856.6A CN112291788B (zh) 2020-11-13 2020-11-13 数据处理方法、装置、存储介质、终端及网络接入点设备
CN202011272856.6 2020-11-13

Publications (1)

Publication Number Publication Date
WO2022100209A1 true WO2022100209A1 (zh) 2022-05-19

Family

ID=74398885

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/115404 WO2022100209A1 (zh) 2020-11-13 2021-08-30 数据处理方法、装置、存储介质、终端及网络接入点设备

Country Status (2)

Country Link
CN (1) CN112291788B (zh)
WO (1) WO2022100209A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112291788B (zh) * 2020-11-13 2023-01-10 Oppo广东移动通信有限公司 数据处理方法、装置、存储介质、终端及网络接入点设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717653A (zh) * 2015-03-12 2015-06-17 惠州Tcl移动通信有限公司 一种移动终端的网络连接控制方法及系统
CN105072045A (zh) * 2015-08-10 2015-11-18 济南大学 一种具有恶意软件网络行为发现能力的无线路由器
CN105187395A (zh) * 2015-08-10 2015-12-23 济南大学 基于接入路由器进行恶意软件网络行为检测的方法及系统
US20190174319A1 (en) * 2017-12-01 2019-06-06 Seven Networks, Llc Detection and identification of potentially harmful applications based on detection and analysis of malware/spyware indicators
CN112291788A (zh) * 2020-11-13 2021-01-29 Oppo广东移动通信有限公司 数据处理方法、装置、存储介质、终端及网络接入点设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2709651C (en) * 2010-06-07 2011-11-29 Guest Tek Interactive Entertainment Ltd. Hospitality media system operated by mobile device
CN106503556A (zh) * 2016-10-25 2017-03-15 广东欧珀移动通信有限公司 数据存储的方法、装置及系统
CN110035437B (zh) * 2018-01-11 2021-02-23 电信科学技术研究院 一种用户面数据安全保护方法及装置
CN110710187B (zh) * 2018-05-30 2022-01-07 Oppo广东移动通信有限公司 用于流量检测的方法和设备以及计算机可读存储介质
CN111666567A (zh) * 2020-06-30 2020-09-15 腾讯科技(深圳)有限公司 恶意修改应用程序的检测方法、装置、计算机程序和介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717653A (zh) * 2015-03-12 2015-06-17 惠州Tcl移动通信有限公司 一种移动终端的网络连接控制方法及系统
CN105072045A (zh) * 2015-08-10 2015-11-18 济南大学 一种具有恶意软件网络行为发现能力的无线路由器
CN105187395A (zh) * 2015-08-10 2015-12-23 济南大学 基于接入路由器进行恶意软件网络行为检测的方法及系统
US20190174319A1 (en) * 2017-12-01 2019-06-06 Seven Networks, Llc Detection and identification of potentially harmful applications based on detection and analysis of malware/spyware indicators
CN112291788A (zh) * 2020-11-13 2021-01-29 Oppo广东移动通信有限公司 数据处理方法、装置、存储介质、终端及网络接入点设备

Also Published As

Publication number Publication date
CN112291788A (zh) 2021-01-29
CN112291788B (zh) 2023-01-10

Similar Documents

Publication Publication Date Title
JP6715887B2 (ja) ユーザのコンピュータ装置への攻撃に対抗するシステムおよび方法
US9477534B2 (en) Inter-extension messaging
JP5899324B2 (ja) 盗聴アクティビティを検出するための方法及び端末デバイス
US8910285B2 (en) Methods and systems for reciprocal generation of watch-lists and malware signatures
WO2015007231A1 (zh) 一种恶意url的鉴定方法及装置
CN109951765B (zh) 提供安全音频输出的电子设备
US10080139B2 (en) Information sending method and apparatus, terminal device, and system
CN107317796A (zh) 一种安全认证的方法及终端
WO2022100209A1 (zh) 数据处理方法、装置、存储介质、终端及网络接入点设备
US20090046708A1 (en) Methods And Systems For Transmitting A Data Attribute From An Authenticated System
US11228910B2 (en) Mobile communication device and method of determining security status thereof
US9143510B2 (en) Secure identification of intranet network
US20210312446A1 (en) Detecting malware by monitoring client-side memory stacks
CN111447612A (zh) 用于安全验证的移动终端和服务器端
US10893072B2 (en) Using cloned accounts to track attacks on user accounts
RU2697926C1 (ru) Система и способ противодействия атаке на вычислительные устройства пользователей
US9805180B2 (en) Message sender authentication
Anwar et al. Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs
CN114070634B (zh) 一种基于smtp协议的窃密行为检测方法、装置及电子设备
CN114598524B (zh) 检测代理工具的方法、装置、设备以及存储介质
US20230394151A1 (en) Protected qr code scanner using operational system override
CN117768895A (zh) 一种网络提示方法、装置、存储介质、产品及电子设备
CN115348261A (zh) 基于5g的云端可信数据处理方法、装置、终端及存储介质
CN117640167A (zh) 安全防护方法、装置、存储介质、程序产品及电子设备
Ortega et al. A novel approach to Trojan horse detection in mobile phones messaging and bluetooth services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21890738

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21890738

Country of ref document: EP

Kind code of ref document: A1