Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below with reference to the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
It will be explained in detail the determination method of network environment provided by the embodiments of the present application below.
It is the flow diagram of the determination method of network environment provided by the embodiments of the present application, this method packet referring to Fig. 1
It includes:
S101, the network environment for monitoring itself.
In the embodiment of the present application, the network environment of the terminal itself is each network that terminal is scanned in a certain position
Provided network access environment.The network may include the free wireless network for needing to authenticate and do not need certification.
Since the network of different location building is different (i.e. network identity is different), the network environment that heterogeneous networks provide can also
It can be different.So the network environment that each network, each network that a certain position, the position are arranged provide uniquely corresponds to.Such as 1 institute of table
Show.
Position |
Each network identity |
Network environment |
Position A |
a1、a2、a3 |
Network environment 1 |
Position B |
b1、b2、b3 |
Network environment 2 |
Table 1
As shown in Table 1, position A is provided with the network that network identity is respectively a1, a2 and a3, these three networks mention for user
Network environment 1 is supplied.Position B is provided with the network that network identity is respectively b1, b2 and b3, these three networks provide for user
Network environment 2.
Therefore, in the embodiment of the present application, the network environment of terminal monitoring itself, specifically includes: terminal monitoring itself
Position, as current location;Or the network identity for each network that Current Scan arrives is monitored, as current network identification.
Terminal can specifically be supervised in real time when monitoring itself current location by the location information for receiving come self aligning system
The current location of itself is surveyed, for example, terminal can come from global positioning system (Globle Positioning by receiving
System, GPS) or base station location information, using the location information as itself current location.
Wherein, network identity described in the embodiment of the present application can be the services set mark of the corresponding wireless router of each network
Know (Service Set Identifier, SSID).
Whether the network environment that S102, judgement monitor meets preset risk conditions, if so, step S103 is executed, it is no
Then, step S104 is executed.
In the embodiment of the present application, the risk conditions are to be determined and provided to terminal by server.Specifically, clothes
Business device obtains the attribute information for the risk case that terminal reports, and risk conditions is determined according to the attribute information, by the risk conditions
It is sent to terminal.Terminal then saves the risk conditions received.
Server can be according to the default risk position of risk case, default risk network identity, default risk environment mark
Or the attribute informations such as preset signal strength, determine different risk conditions.
Specifically, server can obtain the generation position for the risk case that terminal reports, using the generation position as default
Risk position.
Server determines the first risk conditions are as follows: the position that terminal monitoring arrives is default risk position.
When server can obtain the risk case generation that terminal reports, the network identity of the network of access, by the network mark
Know as default risk network identity.
Server determines the second risk conditions are as follows: includes at least one default risk net in the network identity that terminal scans
Network mark.
The first risk conditions determined and the second risk conditions are sent to terminal by server.
When terminal monitors current location (network environment) of itself by step S101, judge the current location whether be
Default risk position (whether meeting the first risk conditions), if so, determining that the network environment of itself is dangerous, otherwise, it determines should
Network environment safety.Alternatively, judgement is current when terminal is scanned by step S101 to each current network identification (network environment)
Whether comprising default risk network identity (whether meeting the second risk conditions) in network identity, if so, determining the network of itself
Environment is dangerous, otherwise, it determines the network environment is safe.
For example, it is assumed that steal-number event (risk case), in position A, terminal is in the network identity of the position A network accessed
a1.Server is using position A as default risk position, using network identity a1 as default risk network identity.
The first risk conditions of server settings are as follows: the position of terminal is position A;Set the second risk conditions are as follows: terminal is swept
It include a1 in the network identity retouched.
Assuming that user enters market M1, and monitors to be currently located at position A, determine that position A is default risk position, thus
It can determine that A corresponding network environment in position is dangerous.Alternatively, if terminal scanned in the M1 of market to network identity be a1, a2 and
The network of a3, it is determined that the network identity a1 scanned is default risk network identity, to can determine that network identity is a1, a2
Network environment corresponding with a3 is dangerous.
In the embodiment of the present application, server determines above-mentioned default risk position and default risk network identity, specifically may be used
It realizes in the following way.
In the multiple risk cases reported at the terminal, server can will correspond to each risk thing of same risk network identity
The generation position of part, as a default risk position.Further, in each generation position for corresponding to same risk network identity
In setting, it can will be located at the generation position in set distance (such as 2km) range, as a default risk position.
S103, determine that current network environment is dangerous.
When terminal determines that itself network environment meets preset first risk conditions by step S102, itself is determined
Network environment it is dangerous.
S104, current network environment safety is determined.
When terminal determines that itself network environment is unsatisfactory for preset first risk conditions by step S102, determine from
The network environment safety of body.
In method shown in Fig. 1, the network environment of terminal monitoring itself, and it is default to judge whether the network environment meets
Risk conditions, if so, determining that the network environment is dangerous, otherwise, it determines the network environment is safe.In this way, in working as
User in preceding network environment could be aware that whether the network environment is safe, and generally all will not easily access terminal uneasy
In full network environment, in this way, can effectively avoid user do not know itself network environment whether safety in the case where, will be whole
It terminates into risk network, and then the safety of user information can be effectively improved.
In view of the accuracy in practical application scene, carrying out the location information of self aligning system is lower, location information is corresponding
Current location region it is larger, therefore, terminal by the current location determine the network environment that is presently in whether safety
The accuracy of (that is, whether there is risk) is lower.
In addition, attacker often changes the network identity (letter of the risk network of itself building in practical application scene
Claim risk network identity).If the risk network identity after change is not in default risk network identity, terminal can not just be determined
Current network environment is dangerous.Therefore, terminal by risk network identity determine the network environment that is presently in whether safety
Accuracy is relatively low.
In order to improve terminal determine the network environment that is presently in whether An Quan accuracy, in the embodiment of the present application,
When terminal passes through network identity (network environment) of the step S101 scanning to current each network, it can determine whether that the network environment of itself is
It is no to meet third risk conditions.
The third risk conditions can be determined and provided to terminal by server.It is reported specifically, server can obtain terminal
Risk case when occurring its scan but the network identity of network that does not access, using each network identity as default risk
Environmental labels.
Server determines third risk conditions are as follows: the quantity for the default risk environment mark that terminal scans is preset with all
The ratio of the quantity of risk environment mark is greater than the first preset threshold.
The third risk conditions are sent to terminal by server.
When terminal is scanned by step S101 to current each network identity (network environment), judge that terminal scan presets
The ratio of the quantity of the quantity of risk environment mark and all default risk environment marks is greater than the first preset threshold and (judges net
Whether network environment meets third risk conditions), if so, determining that current network environment is dangerous, otherwise, it determines current network environment
Safety.
Specifically, terminal determines the quantity of current network identification in default risk environment mark, as the first quantity,
The quantity that default risk environment is identified judges whether the first quantity and the ratio of the second quantity are greater than first as the second quantity
Preset threshold, if so, determine that the network environment meets third risk conditions, so that it is determined that current network environment is dangerous, otherwise,
Determine that the network environment is unsatisfactory for third risk conditions, so that it is determined that current network environment is safe.
For example, it is assumed that steal-number event (risk case) occurs, when steal-number event occurs, to access the net of network in position A
Network is identified as a1, terminal position A sweep to but the network identity of network that does not access be a2, a3, a4, a5, server is then
Using network identity a1 as default risk network identity, and using network identity a2, a3, a4, a5 as default risk environment mark
Know.
Server settings third risk conditions are as follows: the quantity of default risk environment that terminal scans mark, and it is all pre-
If the ratio of the quantity 4 of risk environment mark is greater than the first preset threshold.
If terminal scanned in the M1 of market to network identity be a1 ', a2, a3, a4, a5 when, terminal is in default risk environment
It identifies in a2, a3, a4, a5, determines to include this 4 network identities of current network identification a2, a3, a4, a5, that is, determine default risk
The first quantity in environmental labels comprising current network identification is 4.Terminal also determines the second of all default risk environment marks
Quantity is 4.Assuming that the first preset threshold is 0.8, terminal determines that the ratio (4/4=1) of the first quantity and the second quantity is greater than the
One preset threshold (0.8) then can determine that the network environment of itself meets third risk conditions, to can determine current network environment
It is dangerous.
In this way, terminal can also be according to the net even if the network identity a1 of the network itself constructed is changed to a1 ' by attacker
Other network identities a2, a3, a4, a5 in network environment in addition to network identity a1 determine that the network environment is dangerous, from
And can effectively improve terminal determine the network environment that is presently in whether An Quan accuracy.
In order to further increase terminal determine the network environment that is presently in whether An Quan accuracy, in the application implementation
In example, terminal also can determine whether the network environment of itself is full after the network environment for determining itself meets third risk conditions
The 4th risk conditions of foot.
4th risk conditions can also be determined and provided to terminal by server.Specifically, the risk case that terminal reports
Attribute information further include: each default risk environment that terminal reports identifies corresponding signal strength.
The default risk environment can be identified corresponding signal strength and be used as preset signal strength by server, and determination the
Four risk conditions are as follows: the default risk environment that terminal scans identifies corresponding signal strength and the default risk environment mark pair
The difference for the preset signal strength answered is less than the second preset threshold.
The 4th risk conditions that server determines this are sent to terminal.
Terminal is after the network environment for determining itself meets third risk conditions, further includes: acquisition Current Scan arrives each
The signal strength of network, as current signal strength, for each current network identification for including in default risk environment mark,
According to the corresponding preset signal strength of the current network identification of preservation, the corresponding current signal strength of the current network identification is judged
And whether the difference of preset signal strength is less than the second preset threshold, if so, determining that the network environment of itself meets the 4th risk
Condition, thus can determine that current network environment is dangerous, otherwise, it determines the network environment of itself is unsatisfactory for the 4th risk conditions,
So that it is determined that current network environment is safe.
For example, it is assumed that steal-number event (risk case) occurs, when steal-number event occurs, to access the net of network in position A
Network is identified as a1, terminal position A sweep to but the network identity of network that does not access be respectively a2, a3, a4, a5, network
Identifying the corresponding signal strength of a2, a3, a4, a5 is respectively 20dbm, 25dbm, 30dbm, 35dbm.Server is by the network identity
A1 is identified as default risk network identity using network identity a2, a3, a4, a5 as default risk environment, by signal strength
20dbm, 25dbm, 30dbm, 35dbm are respectively as the corresponding preset signal strength of a2, a3, a4, a5.
When terminal scanned in the M1 of market to network identity be a1 ', a2 and a3 when, each network identity got is right respectively
The current signal strength answered is 15dbm, 14dbm, 18dbm.Obviously, in the network identity that terminal scans, a2 and a3 are default
Risk environment mark.The corresponding preset signal strength of default risk environment mark a2 and a3 and current letter that terminal scans
Number intensity is as shown in table 2.
Network identity |
Preset signal strength (dbm) |
Current signal strength (dbm) |
a2 |
20 |
14 |
a3 |
25 |
18 |
Table 2
As shown in Table 2, the corresponding preset signal strength of a2 is 20dbm, and current signal strength 14dbm, a3 is corresponding pre-
If signal strength is 25dbm, current signal strength 18dbm.
Assuming that the second preset threshold is 10dbm, after terminal gets the current signal strength of current network identification, according to
Table 2 determines the exhausted of the difference for the corresponding preset signal strength of default risk environment mark a2 and current signal strength that Current Scan arrives
It is 6dbm to value, the absolute value of the difference of the corresponding preset signal strength of a3 and current signal strength is 7dbm.For a2 and a3, eventually
End can determine the difference (6dbm or 7dbm) of preset signal strength and current signal strength less than the second preset threshold (10dbm), from
And it can determine the network environment of itself and meet the 4th risk conditions.
In this way, terminal passes through the signal strength of the network scanned, can further determine that whether the network environment of itself is full
The 4th risk conditions of foot, thus can further improve terminal determine the network environment that is presently in whether An Quan accuracy.
Certainly, the determination method of network environment provided by the embodiments of the present application, the network environment that terminal can be current in determination
When meeting one of condition in the first risk conditions, the second risk conditions, third risk conditions and the 4th risk conditions, or
Person determines current network environment safety, which is not described herein again when meeting therein at least two or full terms.
Further, terminal can issue the user with warning information when the network environment for determining itself is dangerous, to mention
Showing user's present position, there are risk networks.
Terminal, specifically can be by modes such as output icon, text, voice or vibrations, to user when issuing warning information
Issue warning information.
Certainly, terminal can also issue the user with prompt information when the network environment for determining itself is safe, to prompt to use
Family current network environment safety.
In view of in practical application scene, when terminal is in, there are the network environments of risk, but do not access the network
When risk network in environment, if terminal issues the user with warning information, this can not only make troubles to user, but also waste money
Source.
Therefore, in the embodiment of the present application, determined when terminal by step S102 Current Scan to network identity in wrap
Containing default risk network identity, so that it is determined that when the network environment of itself is dangerous, method shown in FIG. 1 further include: monitoring is certainly
Whether body currently presets the corresponding network of risk network identity (i.e. risk network) to this and has sent access request, if so, can
Warning information is issued the user with, prompts user's stopping that terminal is accessed the risk network in time and does not otherwise issue the user with early warning
Information.
The above are the determination methods of network environment provided by the embodiments of the present application, are based on same thinking, and the application is implemented
Example additionally provides a kind of determining device of network environment, as shown in Figures 2 and 3.
Referring to fig. 2, the determining device of network environment provided by the embodiments of the present application, comprising:
Monitoring modular 21, for monitoring itself network environment;
Judgment module 22, for judging whether the network environment meets preset risk conditions;
Determining module 23, for determining institute when judgment module judges that the network environment meets preset risk conditions
It is dangerous to state network environment, and when judgment module judges that the network environment is unsatisfactory for preset risk conditions, determines institute
State network environment safety.
Optionally, the monitoring modular 21 is specifically used for: monitoring the current location of itself;
The judgment module 22 is specifically used for: judging whether the current location is default risk position;
The determining module 23 is specifically used for: when the current location is default risk position, determining the network rings
Border meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset risk conditions.
Optionally, the monitoring modular 21 is specifically used for: the mark for each network that monitoring Current Scan arrives, as current net
Network mark;
Whether the judgment module 22 is specifically used for: judging in current network identification comprising at least one default risk network
Mark;
The determining module 23 is specifically used for: when including at least one default risk network mark in the current network identification
When knowledge, it is determined that the network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset wind
Dangerous condition.
Optionally, described device further include:
Warning module 24, for monitoring itself to have sent access to the corresponding network of the default risk network identity
When request, warning information is issued.
Optionally, the monitoring modular 21 is specifically used for: the mark for each network that Current Scan arrives is obtained, as current net
Network mark;
The judgment module 22 is specifically used for: in default risk environment mark, determining the quantity of current network identification, makees
For the first quantity;Using the quantity of the default risk environment mark as the second quantity;And judge first quantity and institute
Whether the ratio for stating the second quantity is greater than the first preset threshold;
The determining module 23 is specifically used for: presetting when the ratio of first quantity and second quantity is greater than first
When threshold value, determine that the network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset wind
Dangerous condition.
Optionally, the monitoring modular 21 is specifically used for: the signal strength of each network that Current Scan arrives is obtained, as working as
Front signal intensity;
The determining module 23 is specifically used for: for default risk environment mark in include each current network identification,
According to the corresponding preset signal strength of the current network identification of preservation, the corresponding current demand signal of the current network identification is determined
Intensity and the difference of the preset signal strength are less than the second preset threshold.
Optionally, described device further include:
Warning module 24, for issuing warning information when the determining module 23 determines that the network environment is dangerous.
Referring to Fig. 3, the determining device of network environment provided by the embodiments of the present application, comprising:
Module 31 is obtained, for obtaining the attribute information for the risk case that terminal reports;
Determining module 32, for determining risk conditions according to the attribute information;
Sending module 33 makes the terminal monitor the terminal for the risk conditions to be sent to terminal
It when network environment meets the risk conditions, determines that the network environment is dangerous, and monitors that the network environment is discontented
When the preset risk conditions of foot, the network environment safety is determined.
Optionally, the module 31 that obtains is specifically used for: the generation position for the risk case that terminal reports is obtained, as pre-
If risk position;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: the position of terminal is the default risk position
It sets.
Optionally, the module 31 that obtains is specifically used for: obtaining accessed network when the risk case that terminal reports occurs
Corresponding network identity, as default risk network identity;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: includes in the network identity that terminal scans
At least one described default risk network identity.
Optionally, the module 31 that obtains is specifically used for: obtain when the risk case that reports of terminal occurs it is that it is scanned,
But the network identity for the network not accessed is identified as default risk environment;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: the default risk environment mark that terminal scans
The ratio of the quantity of the quantity of knowledge and all default risk environment marks is greater than the first preset threshold.
Optionally, the attribute information of the risk case, further includes: each default risk environment mark that terminal reports corresponds to
Signal strength;
The determining module 32 is specifically used for, and the default risk environment is identified corresponding signal strength as default letter
Number intensity;Determine the risk conditions are as follows: the default risk environment that terminal scans identifies corresponding signal strength and this is default
Risk environment identifies the difference of corresponding preset signal strength less than the second preset threshold.
In conclusion network environment provided by the embodiments of the present application determines method, the network environment of terminal monitoring itself, and
Judge whether the network environment meets preset risk conditions, if so, determining that the network environment is dangerous, otherwise, it determines institute
State network environment safety.In this way, the user in current network environment could be aware that whether the network environment is safe, and one
As all terminal will not be accessed in unsafe network environment easily, in this way, can effectively avoid user in the net for not knowing itself
Network environment accesses risk network whether in the case where safety, by terminal, and then can effectively improve the safety of user information.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element
There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art,
Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement,
Improve etc., it should be included within the scope of the claims of this application.