CN106302315A - A kind of wireless network that improves accesses the method for safety, device and mobile terminal - Google Patents
A kind of wireless network that improves accesses the method for safety, device and mobile terminal Download PDFInfo
- Publication number
- CN106302315A CN106302315A CN201510248968.0A CN201510248968A CN106302315A CN 106302315 A CN106302315 A CN 106302315A CN 201510248968 A CN201510248968 A CN 201510248968A CN 106302315 A CN106302315 A CN 106302315A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- security level
- currently accessed
- security
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of method improving wireless network access safety, the method includes: judge whether the wireless network being currently accessed is secure network;If the wireless network being currently accessed described in is secure network, then the level of security arranging mobile terminal is the first level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described first level of security is less than described second level of security;Afterwards, current wireless network is accessed with set level of security.The embodiment of the present invention further simultaneously discloses a kind of wireless network that improves and accesses device and the mobile terminal of safety.
Description
Technical Field
The present invention relates to wireless network access security technologies, and in particular, to a method, an apparatus, and a mobile terminal for improving wireless network access security.
Background
At present, wireless network access technologies are increasingly popularized, for example, public free WiFi hotspots are increasing, but while wireless network access brings convenience to life of people, leakage of personal information and loss of personal property are security problems. In an insecure network environment, some software can automatically synchronize personal privacy data of a mobile terminal such as an address book, a short message and a call record on a mobile phone, and some software can download and install applications in the background. In the prior art, no one has proposed a technical scheme for automatically setting the security level based on the wireless network access environment.
Disclosure of Invention
In order to solve the foregoing technical problems, embodiments of the present invention are intended to provide a method, an apparatus, and a mobile terminal for improving wireless network access security, which can flexibly adjust a security level according to a wireless network environment where a user is located.
The technical scheme of the invention is realized as follows:
the embodiment of the invention provides a method for improving the access security of a wireless network, which comprises the following steps:
judging whether the currently accessed wireless network is a secure network;
if the currently accessed wireless network is a secure network, setting the security level of the mobile terminal as a first security level; otherwise, setting the security level of the mobile terminal as a second security level; the first security level is lower than the second security level;
and accessing the current wireless network at the set security level.
In the foregoing scheme, the setting the security level of the mobile terminal to the second security level includes:
setting the access right of the pre-marked data to one of the following two rights: forbidden or requiring interrogation;
and/or setting the authority of the application to one of the following two authorities: forbidden or requiring interrogation.
In the foregoing solution, the setting the security level of the mobile terminal to be the first security level includes:
the access rights of the pre-marked data are set to allowed and the rights of the application are set to allowed.
In the foregoing solution, the determining whether the currently accessed wireless network is a secure network includes:
judging whether the currently accessed wireless network is in one or more pre-marked wireless networks or not, if so, determining that the currently accessed wireless network is a safe network; otherwise, the currently accessed wireless network is not a secure network.
The embodiment of the invention also provides a device for improving the access security of the wireless network, which comprises: the system comprises a judgment module, a security level setting module and an access module; wherein,
the judging module is used for judging whether the currently accessed wireless network is a safe network;
the security level setting module is used for setting the security level of the mobile terminal as a first security level when the currently accessed wireless network is a secure network; the security level setting module is further configured to set the security level of the mobile terminal to a second security level when the currently accessed wireless network is not a secure network; the first security level is lower than the second security level;
and the access module is used for accessing the current wireless network with the set security level.
In the foregoing solution, the security level setting module is configured to set, when the currently accessed wireless network is not a secure network, the access right of the pre-marked data to one of the following two rights: forbidden or requiring interrogation;
and/or, when the currently accessed wireless network is not a secure network, setting the authority of the application to one of the following two authorities: forbidden or requiring interrogation.
In the foregoing scheme, the security level setting module is configured to set the access right of the pre-marked data as allowed and set the right of the application as allowed when the currently accessed wireless network is a secure network.
In the above scheme, the determining module is configured to determine whether the currently accessed wireless network is in one or more pre-marked wireless networks, and if the currently accessed wireless network is in one or more pre-marked wireless networks, the currently accessed wireless network is a secure network; otherwise, the currently accessed wireless network is not a secure network.
The embodiment of the invention also provides a mobile terminal which comprises any one of the devices for improving the access security of the wireless network.
According to the method, the device and the mobile terminal for improving the wireless network access security, provided by the embodiment of the invention, the wireless network environment where the mobile terminal is located is judged, and then the security level of the mobile terminal is adaptively adjusted according to the wireless network environment where the mobile terminal is located so as to ensure the security of user data in the mobile terminal.
Drawings
Fig. 1 is a flowchart of a method for improving security of wireless network access according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for improving security of wireless network access according to a first embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for improving security of wireless network access according to a second embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for improving security of wireless network access according to a third embodiment of the present invention;
FIG. 5 is a flowchart illustrating a fourth embodiment of a method for improving security of wireless network access;
fig. 6 is a schematic structural diagram of an apparatus for improving security of wireless network access according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
In various embodiments of the present invention, the wireless network includes, but is not limited to, a Wifi network. Fig. 1 is a flowchart of a method for improving wireless network access security according to an embodiment of the present invention, as shown in fig. 1, the method includes:
step 100: and judging whether the currently accessed wireless network is a safe network.
The implementation method of the step comprises the following steps: the user has previously identified on the mobile terminal one or more wireless networks, which are typically considered secure networks by the user, such as Wifi networks in the office or home. When a user accesses a wireless network, a mobile terminal to which the user belongs can judge whether the currently accessed wireless network is in one or more pre-marked wireless networks, and if the currently accessed wireless network is in the one or more pre-marked wireless networks, the currently accessed wireless network is judged to be a safe network; otherwise, if the currently accessed wireless network is not in the one or more wireless networks marked in advance, judging that the currently accessed wireless network is not the safe network.
Step 101: if the accessed wireless network is a secure network, setting the security level of the mobile terminal to be a first security level; otherwise, setting the security level of the mobile terminal as a second security level; the first security level is lower than the second security level.
In this step, setting the security level of the mobile terminal to the first security level includes:
the access rights of the pre-marked data are set to allowed and the rights of the application are set to allowed. Here, after the access authority of the pre-marked data is set to be allowed, the user can access the pre-marked data; after the permission of the application is set to be allowed, the external program and the background program can execute the operation of the related permission, such as reading the current position, reading the contact person and the like.
In this step, setting the security level of the mobile terminal to the second security level includes:
setting access rights of pre-marked data and/or setting rights of applications; setting access rights of the pre-marked data includes: the access right of the pre-marked data is set to one of the following two rights: forbidden or requiring interrogation; setting the authority of the application includes: the authority of the application is set to one of the following two authorities: forbidden or requiring interrogation; when the application authority is set to be forbidden, the external program and the background program can not execute the operation of the related authority, such as reading the current position, reading the contact person and the like, when the application authority is set to be inquired, the external program and the background program execute the operation of the related authority, need inquire the user, and can execute the operation of the related authority only after the permission of the user is obtained.
Step 102: and accessing the current wireless network at the set security level.
Specifically, the method comprises the following steps: when the security level of the mobile terminal is set to be a first security level, accessing a current wireless network according to the first security level; and when the security level of the mobile terminal is set to be a second security level, accessing the current wireless network with the second security level.
The present invention will be described in detail with reference to specific examples.
Fig. 2 is a flowchart of a first embodiment of a method for improving wireless network access security according to the present invention, as shown in fig. 2, the flowchart includes:
step 200: data is pre-marked on the mobile terminal and one or more wireless networks are identified.
In particular, the pre-tagged data generally refers to data that requires enhanced access control in an unsecure wireless network environment, such as but not limited to text messages, contacts, location information, pictures, video, sensitive material, and some important files. The above-identified wireless network generally refers to a wireless network that a user considers safe, for example, a Wifi network in an office or home, etc.
Step 201: when the current accessed wireless network changes, judging whether the newly accessed wireless network is a safe network, if not, turning to the step 202, otherwise, turning to the step 203.
In this step, when the currently accessed wireless network is not changed, the security level of the mobile terminal is kept unchanged, and whether the accessed wireless network is changed or not is continuously monitored.
Here, when the currently accessed wireless network is changed, if the newly accessed wireless network is in the one or more wireless networks previously identified, the newly accessed wireless network is a secure network, otherwise, when the newly accessed wireless network is not in the one or more wireless networks previously identified, for example, when the newly accessed wireless network is a strange Wifi network or a public Wifi network, the newly accessed wireless network is considered not to be the secure network.
Step 202: setting the security level of the mobile terminal to be a second security level according to the following modes: setting the access authority of the pre-marked data as forbidden and keeping the authority of the application unchanged; and accessing the current wireless network at the second security level and recording the current wireless network.
Here, after the access right of the pre-marked data is set to be prohibited, the external program or the daemon cannot access the pre-marked data, so that personal data of the user can be effectively protected, and the security of the user data in the non-secure network environment is enhanced. It should be noted that, when the application right is kept unchanged, the current application right is kept consistent with the application right set in the last time of accessing the wireless network.
Step 203: setting the security level of the mobile terminal to be a first security level according to the following modes: setting the access authority of the pre-marked data as allowed and the authority of the application as allowed; and accessing the current wireless network at the first security level and recording the currently accessed wireless network.
In this step, since the newly accessed wireless network is a secure network, after the access right and the application right of the pre-marked data are both set as allowed, the user can conveniently access the data and read the data related to the application right.
Fig. 3 is a flowchart of a second embodiment of the method for improving wireless network access security of the present invention, as shown in fig. 3, the flowchart includes:
step 300 to step 301 are completely consistent with step 200 to step 201, and are not described herein again.
Step 302: setting the security level of the mobile terminal to be a second security level according to the following modes: setting the access authority of the pre-marked data as forbidden and setting the authority of the application as forbidden or required to be inquired; and accessing the current wireless network at the second security level and recording the current wireless network.
Here, after the access right of the pre-marked data is set to be prohibited, the external program or the daemon cannot access the pre-marked data, so that personal data of the user can be effectively protected, and the security of the user data in the non-secure network environment is enhanced.
In this step, after the permission of the application is set to be forbidden, the external program and the background program cannot execute the operation of the related permission, such as reading the current position, reading the contact person, and the like; after the application authority is set to be inquired, when the external program and the background program execute the related authority operation, inquiring the user, and only after the user agrees, the related operation can be carried out; it can be seen that the setting of the authority of the application in this step can effectively protect the sensitive data of the user from being illegally read, and the like, thereby improving the security of the mobile terminal.
Step 303: setting the security level of the mobile terminal to be a first security level according to the following modes: setting the access authority of the pre-marked data as allowed and the authority of the application as allowed; and accessing the current wireless network at the first security level and recording the currently accessed wireless network.
In this step, since the newly accessed wireless network is a secure network, after the access right of the pre-marked data and the right of the application are both set as allowed, the user can conveniently perform operations of data access and related rights of the application.
Fig. 4 is a flowchart of a third embodiment of a method for improving wireless network access security according to the present invention, as shown in fig. 4, the flowchart includes:
steps 400 to 401 are completely identical to steps 200 to 201, and are not described herein again.
Step 402: setting the security level of the mobile terminal to be a second security level according to the following modes: setting the access authority of the pre-marked data to be inquired and setting the authority of the application to be forbidden or to be inquired; and accessing the current wireless network at the second security level and recording the current wireless network.
After the access authority of the pre-marked data is set to be required to be inquired, when an external program or a background program needs to access the pre-marked data, inquiring a user, and accessing the pre-marked data only after the user agrees; at this time, the access authority of the pre-marked data can be flexibly mastered by the user, and the user experience is improved while the data security is maintained.
In this step, after the permission of the application is set to be forbidden, the external program and the background program cannot execute the operation of the related permission, such as reading the current position, reading the contact person, and the like; after the application authority is set to be inquired, when the external program and the background program execute the related authority operation, inquiring the user, and only after the user agrees, the related operation can be carried out; it can be seen that the setting of the authority of the application in this step can effectively protect the sensitive data of the user from being illegally read, and the like, thereby improving the security of the mobile terminal.
Step 403: setting the security level of the mobile terminal to be a first security level according to the following modes: setting the access authority of the pre-marked data as allowed and the authority of the application as allowed; and accessing the current wireless network at the first security level and recording the currently accessed wireless network.
In this step, since the newly accessed wireless network is a secure network, after the access right of the pre-marked data and the right of the application are both set as allowed, the user can conveniently perform operations of data access and related rights of the application.
Fig. 5 is a flowchart of a fourth embodiment of the method for improving wireless network access security of the present invention, as shown in fig. 5, the flowchart includes:
steps 500 to 501 are identical to steps 200 to 201, and are not described herein again.
Step 502: setting the security level of the mobile terminal to be a second security level according to the following modes: setting the access authority of the data marked in advance and the read-write authority of the data marked in advance as required to be inquired, and setting the authority of the application as forbidden or required to be inquired; and accessing the current wireless network at the second security level and recording the current wireless network.
After the access authority of the pre-marked data is set to be required to be inquired, when an external program or a background program needs to access the pre-marked data, inquiring a user, and accessing the pre-marked data only after the user agrees; and simultaneously, after the user agrees, the external program or the background program can continuously inquire the read-write permission of the pre-marked data, the read-write permission of the pre-marked data is divided into read-only and read-write, and when the read-only permission of the pre-marked data is obtained, the pre-marked data can be read but cannot be modified. When the read-write right of the data marked in advance is obtained, the data marked in advance can be read, and the data marked in advance can be modified. Therefore, the access authority and the read-write authority of the pre-marked data can be flexibly mastered by the user, and the user experience is improved while the data security is maintained.
In this step, after the permission of the application is set to be forbidden, the external program and the background program cannot execute the operation of the related permission, such as reading the current position, reading the contact person, and the like; after the application authority is set to be inquired, when the external program and the background program execute the related authority operation, inquiring the user, and only after the user agrees, the related operation can be carried out; it can be seen that the setting of the authority of the application in this step can effectively protect the sensitive data of the user from being illegally read, and the like, thereby improving the security of the mobile terminal.
Step 503: setting the security level of the mobile terminal to be a first security level according to the following modes: setting the access authority of the pre-marked data as allowed and the authority of the application as allowed; and accessing the current wireless network at the first security level and recording the currently accessed wireless network.
In this step, since the newly accessed wireless network is a secure network, after the access right of the pre-marked data and the right of the application are both set as allowed, the user can conveniently perform operations of data access and related rights of the application.
In various embodiments of the method for improving the wireless network access security, the security level can be automatically adjusted according to the wireless network environment of the mobile terminal, the security of user data can be ensured, and the method has the characteristics of flexibility and reliability.
For the method according to the embodiment of the present invention, an apparatus for improving wireless network access security is further provided in the embodiment of the present invention, fig. 6 is a schematic view of a composition structure of the apparatus for improving wireless network access security according to the embodiment of the present invention, and as shown in fig. 6, the apparatus includes a determining module 600 and a security level setting module 601; wherein,
the determining module 600 is configured to determine whether a currently accessed wireless network is a secure network.
A security level setting module 601, configured to set a security level of the mobile terminal to a first security level when the currently accessed wireless network is a secure network; the security level setting module 601 is further configured to set the security level of the mobile terminal to a second security level when the currently accessed wireless network is not a secure network; the first security level is lower than the second security level.
And an accessing module 602, configured to access the current wireless network at the set security level.
The determining module 600 is specifically configured to determine whether the currently accessed network is in one or more pre-selected wireless networks, and if the currently accessed network is in one or more pre-selected wireless networks, the currently accessed wireless network is a secure network; otherwise, the currently accessed wireless network is not a secure network.
The security level setting module 601 is specifically configured to set an access right of pre-marked data as allowed and set an authority of an application as allowed when the currently accessed wireless network is a secure network; the security level setting module 601 is specifically configured to set the access right of the pre-marked data to one of the following two rights when the currently accessed wireless network is not a secure network: forbidden or requiring interrogation;
and/or, when the currently accessed wireless network is not a secure network, setting the authority of the application to one of the following two authorities: forbidden or requiring interrogation.
In practical applications, the determining module 600 and the security level setting module 601 can be implemented by a Central Processing Unit (CPU), a MicroProcessor Unit (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like located in the mobile terminal.
The embodiment of the invention also provides a mobile terminal which comprises the device for improving the wireless network access security. The mobile terminal can be realized on a mobile phone and wearable equipment.
The device for improving the wireless network access security and the mobile terminal can automatically adjust the security level according to the wireless network environment of the mobile terminal, can ensure the security of user data, and has the characteristics of flexibility and reliability.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (9)
1. A method for improving wireless network access security, the method comprising:
judging whether the currently accessed wireless network is a secure network;
if the currently accessed wireless network is a secure network, setting the security level of the mobile terminal as a first security level; otherwise, setting the security level of the mobile terminal as a second security level; the first security level is lower than the second security level;
and accessing the current wireless network at the set security level.
2. The method according to claim 1, wherein setting the security level of the mobile terminal to the second security level comprises:
setting the access right of the pre-marked data to one of the following two rights: forbidden or requiring interrogation;
and/or setting the authority of the application to one of the following two authorities: forbidden or requiring interrogation.
3. The method according to claim 2, wherein the setting the security level of the mobile terminal to the first security level comprises:
the access rights of the pre-marked data are set to allowed and the rights of the application are set to allowed.
4. The method of any one of claims 1 to 3, wherein the determining whether the currently accessed wireless network is a secure network comprises:
judging whether the currently accessed wireless network is in one or more pre-marked wireless networks or not, if so, determining that the currently accessed wireless network is a safe network; otherwise, the currently accessed wireless network is not a secure network.
5. An apparatus for improving wireless network access security, the apparatus comprising: the system comprises a judgment module, a security level setting module and an access module; wherein,
the judging module is used for judging whether the currently accessed wireless network is a safe network;
the security level setting module is used for setting the security level of the mobile terminal as a first security level when the currently accessed wireless network is a secure network; the security level setting module is further configured to set the security level of the mobile terminal to a second security level when the currently accessed wireless network is not a secure network; the first security level is lower than the second security level;
and the access module is used for accessing the current wireless network with the set security level.
6. The apparatus of claim 5, wherein the security level setting module is configured to set the access right of the pre-marked data to one of the following two rights when the currently accessed wireless network is not a secure network: forbidden or requiring interrogation;
and/or, when the currently accessed wireless network is not a secure network, setting the authority of the application to one of the following two authorities: forbidden or requiring interrogation.
7. The apparatus of claim 6, wherein the security level setting module is configured to set the access right of the pre-marked data as allowed and set the right of the application as allowed when the currently accessed wireless network is a secure network.
8. The apparatus according to any one of claims 5 to 7, wherein the determining module is configured to determine whether the currently accessed wireless network is in the one or more pre-identified wireless networks, and if the currently accessed wireless network is in the one or more pre-identified wireless networks, the currently accessed wireless network is a secure network; otherwise, the currently accessed wireless network is not a secure network.
9. A mobile terminal, characterized in that it comprises the means for improving the security of wireless network access according to any of claims 5 to 8.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510248968.0A CN106302315A (en) | 2015-05-15 | 2015-05-15 | A kind of wireless network that improves accesses the method for safety, device and mobile terminal |
PCT/CN2016/075067 WO2016184213A1 (en) | 2015-05-15 | 2016-03-01 | Method and apparatus for improving access security of wireless network and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510248968.0A CN106302315A (en) | 2015-05-15 | 2015-05-15 | A kind of wireless network that improves accesses the method for safety, device and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106302315A true CN106302315A (en) | 2017-01-04 |
Family
ID=57319388
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510248968.0A Pending CN106302315A (en) | 2015-05-15 | 2015-05-15 | A kind of wireless network that improves accesses the method for safety, device and mobile terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106302315A (en) |
WO (1) | WO2016184213A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106937248A (en) * | 2017-01-25 | 2017-07-07 | 北京奇虎科技有限公司 | A kind of document handling method of mobile terminal, device and mobile terminal |
CN108337679A (en) * | 2018-03-13 | 2018-07-27 | 徐磊 | A method of it improving wireless network and accesses safety |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104053154A (en) * | 2014-06-16 | 2014-09-17 | 福建星网锐捷网络有限公司 | Wireless network access control method and device and access point device |
CN104506561A (en) * | 2015-01-13 | 2015-04-08 | 深圳市中兴移动通信有限公司 | Terminal data access control method and device |
CN104539439A (en) * | 2015-01-12 | 2015-04-22 | 中国联合网络通信集团有限公司 | Data transmission method and terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7269260B2 (en) * | 2001-12-26 | 2007-09-11 | Kabushiki Kaisha Toshiba | Communication system, wireless communication apparatus, and communication method |
CN104301117B (en) * | 2014-10-22 | 2017-11-28 | 中国联合网络通信集团有限公司 | Identity verify method and device |
-
2015
- 2015-05-15 CN CN201510248968.0A patent/CN106302315A/en active Pending
-
2016
- 2016-03-01 WO PCT/CN2016/075067 patent/WO2016184213A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104053154A (en) * | 2014-06-16 | 2014-09-17 | 福建星网锐捷网络有限公司 | Wireless network access control method and device and access point device |
CN104539439A (en) * | 2015-01-12 | 2015-04-22 | 中国联合网络通信集团有限公司 | Data transmission method and terminal |
CN104506561A (en) * | 2015-01-13 | 2015-04-08 | 深圳市中兴移动通信有限公司 | Terminal data access control method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106937248A (en) * | 2017-01-25 | 2017-07-07 | 北京奇虎科技有限公司 | A kind of document handling method of mobile terminal, device and mobile terminal |
CN106937248B (en) * | 2017-01-25 | 2019-09-17 | 北京安云世纪科技有限公司 | A kind of document handling method of mobile terminal, device and mobile terminal |
CN108337679A (en) * | 2018-03-13 | 2018-07-27 | 徐磊 | A method of it improving wireless network and accesses safety |
Also Published As
Publication number | Publication date |
---|---|
WO2016184213A1 (en) | 2016-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20150050913A1 (en) | Method and device for preventing recording during a conversation | |
WO2015180690A1 (en) | Method and device for reading verification information | |
CN103514000B (en) | Browser plug-in installation method and device | |
CN112287372B (en) | Method and apparatus for protecting clipboard privacy | |
CN105912353B (en) | Application program packaging method and device | |
EP3089068A1 (en) | Application program management method, device, terminal, and computer storage medium | |
CN104239140A (en) | Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal | |
CN105512576A (en) | Method for secure storage of data and electronic equipment | |
CN106326018B (en) | Data access method and terminal | |
CN105528553A (en) | A method and a device for secure sharing of data and a terminal | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CN102509054A (en) | Mobile terminal and application program control method for mobile terminal | |
CN103455520A (en) | Method and device for accessing Android database | |
CN103246834A (en) | Control method and electronic device | |
US10210337B2 (en) | Information rights management using discrete data containerization | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
US20160330239A1 (en) | Hacking prevention system for mobile terminal and method therefor | |
WO2015176531A1 (en) | Terminal data writing and reading methods and devices | |
KR20130101633A (en) | Apparatus and method for playing contents in portable electronic device | |
CN102810139A (en) | Secure data operation method and communication terminal | |
CN109861979B (en) | Program processing method, electronic device, and computer-readable storage medium | |
CN104601341A (en) | Broadcast intercepting method and device | |
CN106302315A (en) | A kind of wireless network that improves accesses the method for safety, device and mobile terminal | |
WO2015154469A1 (en) | Database operation method and device | |
CN103177224A (en) | Data protection method and device used for terminal external storage card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170104 |
|
WD01 | Invention patent application deemed withdrawn after publication |