[go: up one dir, main page]

CN105577466B - A kind of determination method and device of network environment - Google Patents

A kind of determination method and device of network environment Download PDF

Info

Publication number
CN105577466B
CN105577466B CN201410643984.5A CN201410643984A CN105577466B CN 105577466 B CN105577466 B CN 105577466B CN 201410643984 A CN201410643984 A CN 201410643984A CN 105577466 B CN105577466 B CN 105577466B
Authority
CN
China
Prior art keywords
risk
network
environment
terminal
network environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410643984.5A
Other languages
Chinese (zh)
Other versions
CN105577466A (en
Inventor
吕鲲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410643984.5A priority Critical patent/CN105577466B/en
Priority to CN201811507594.XA priority patent/CN109962826B/en
Publication of CN105577466A publication Critical patent/CN105577466A/en
Priority to HK16112216.5A priority patent/HK1224104A1/en
Application granted granted Critical
Publication of CN105577466B publication Critical patent/CN105577466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of determination method and devices of network environment, to improve the safety of user information.The determination method of the network environment, it include: the network environment of terminal monitoring itself, and judge whether the network environment meets preset risk conditions, if so, determine the network environment be it is unsafe, otherwise, determine that the network environment is safe, in this way, can effectively reduce a possibility that user accesses unsafe network, just so as to effectively improve the safety of user information.

Description

A kind of determination method and device of network environment
Technical field
This application involves computer internet technical field more particularly to a kind of determination method and devices of network environment.
Background technique
With the continuous development of Internet technology, more and more users get used to mentioning by wireless network acquisition server The various network services supplied.Meanwhile various public places also construct wireless network, the shared of wireless network are realized, with convenient User obtains service.
For example, the public places such as current most food and drink, lodging, amusement have provided wireless network for user.With Family can be scanned by terminal to multiple wireless networks, and terminal is accessed one of wireless network and obtains service.
But in multiple wireless networks for being scanned by terminal of user, it is understood that there may be the wireless network of attacker's building. Terminal once accesses the wireless network of attacker building, and attacker may illegally obtain the privacy information of user, this reduction The safety of user information.
For example, certain eating and drinking establishment and attacker are provided with wireless network, and the two wireless networks in the eating and drinking establishment Network identity is identical, for example, being the trade name of eating and drinking establishment.Scanning in the eating and drinking establishment to network identity as user is the eating and drinking establishment shop When the wireless network of name, it is likely that the wireless network that can provide attacker is mistakenly considered the wireless network of eating and drinking establishment's offer, and will Terminal accesses the wireless network of attacker offer, to obtain service.Attacker can be intercepted and captured by way of network data packet capturing The privacy information of user, this reduces the safeties of user information.
Summary of the invention
The embodiment of the present application provides a kind of determination method and device of network environment, to improve the safety of user information Property.
A kind of determination method of network environment provided by the embodiments of the present application, comprising:
Monitor the network environment of itself;
Judge whether the network environment meets preset risk conditions;
If so, determining that the network environment is dangerous;
Otherwise, it determines the network environment safety.
The determination method of another kind network environment provided by the embodiments of the present application, comprising:
Obtain the attribute information for the risk case that terminal reports;
Risk conditions are determined according to the attribute information;
The risk conditions are sent to terminal, the terminal is made to determine the network of the terminal according to the risk conditions Whether environment is safe.
A kind of determining device of network environment provided by the embodiments of the present application, comprising:
Monitoring modular, for monitoring itself network environment;
Judgment module, for judging whether the network environment meets preset risk conditions;
Determining module, for when the judgment module judges that the network environment meets preset risk conditions, really The fixed network environment is dangerous, otherwise, it determines the network environment is safe.
The determining device of another kind network environment provided by the embodiments of the present application, comprising:
Module is obtained, for obtaining the attribute information for the risk case that terminal reports;
Determining module, for determining risk conditions according to the attribute information;
Sending module determines the terminal according to the risk conditions for the risk conditions to be sent to terminal Whether the network environment of the terminal is safe.
The determination method of network environment provided by the embodiments of the present application, the network environment of terminal monitoring itself, and judge to supervise Whether the network environment measured meets preset risk conditions, if so, determine that the network environment is dangerous, otherwise, it determines The network environment safety.In this way, the user in current network environment could be aware that whether the network environment is safe, and Generally all terminal will not be accessed in unsafe network environment easily, in this way, can reduce terminal accesses unsafe network A possibility that, so as to effectively improve the safety of user information.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the determination method flow schematic diagram of network environment provided by the embodiments of the present application;
Fig. 2 is one of the determination apparatus structure schematic diagram of network environment provided by the embodiments of the present application;
Fig. 3 is the two of the determination apparatus structure schematic diagram of network environment provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below with reference to the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
It will be explained in detail the determination method of network environment provided by the embodiments of the present application below.
It is the flow diagram of the determination method of network environment provided by the embodiments of the present application, this method packet referring to Fig. 1 It includes:
S101, the network environment for monitoring itself.
In the embodiment of the present application, the network environment of the terminal itself is each network that terminal is scanned in a certain position Provided network access environment.The network may include the free wireless network for needing to authenticate and do not need certification.
Since the network of different location building is different (i.e. network identity is different), the network environment that heterogeneous networks provide can also It can be different.So the network environment that each network, each network that a certain position, the position are arranged provide uniquely corresponds to.Such as 1 institute of table Show.
Position Each network identity Network environment
Position A a1、a2、a3 Network environment 1
Position B b1、b2、b3 Network environment 2
Table 1
As shown in Table 1, position A is provided with the network that network identity is respectively a1, a2 and a3, these three networks mention for user Network environment 1 is supplied.Position B is provided with the network that network identity is respectively b1, b2 and b3, these three networks provide for user Network environment 2.
Therefore, in the embodiment of the present application, the network environment of terminal monitoring itself, specifically includes: terminal monitoring itself Position, as current location;Or the network identity for each network that Current Scan arrives is monitored, as current network identification.
Terminal can specifically be supervised in real time when monitoring itself current location by the location information for receiving come self aligning system The current location of itself is surveyed, for example, terminal can come from global positioning system (Globle Positioning by receiving System, GPS) or base station location information, using the location information as itself current location.
Wherein, network identity described in the embodiment of the present application can be the services set mark of the corresponding wireless router of each network Know (Service Set Identifier, SSID).
Whether the network environment that S102, judgement monitor meets preset risk conditions, if so, step S103 is executed, it is no Then, step S104 is executed.
In the embodiment of the present application, the risk conditions are to be determined and provided to terminal by server.Specifically, clothes Business device obtains the attribute information for the risk case that terminal reports, and risk conditions is determined according to the attribute information, by the risk conditions It is sent to terminal.Terminal then saves the risk conditions received.
Server can be according to the default risk position of risk case, default risk network identity, default risk environment mark Or the attribute informations such as preset signal strength, determine different risk conditions.
Specifically, server can obtain the generation position for the risk case that terminal reports, using the generation position as default Risk position.
Server determines the first risk conditions are as follows: the position that terminal monitoring arrives is default risk position.
When server can obtain the risk case generation that terminal reports, the network identity of the network of access, by the network mark Know as default risk network identity.
Server determines the second risk conditions are as follows: includes at least one default risk net in the network identity that terminal scans Network mark.
The first risk conditions determined and the second risk conditions are sent to terminal by server.
When terminal monitors current location (network environment) of itself by step S101, judge the current location whether be Default risk position (whether meeting the first risk conditions), if so, determining that the network environment of itself is dangerous, otherwise, it determines should Network environment safety.Alternatively, judgement is current when terminal is scanned by step S101 to each current network identification (network environment) Whether comprising default risk network identity (whether meeting the second risk conditions) in network identity, if so, determining the network of itself Environment is dangerous, otherwise, it determines the network environment is safe.
For example, it is assumed that steal-number event (risk case), in position A, terminal is in the network identity of the position A network accessed a1.Server is using position A as default risk position, using network identity a1 as default risk network identity.
The first risk conditions of server settings are as follows: the position of terminal is position A;Set the second risk conditions are as follows: terminal is swept It include a1 in the network identity retouched.
Assuming that user enters market M1, and monitors to be currently located at position A, determine that position A is default risk position, thus It can determine that A corresponding network environment in position is dangerous.Alternatively, if terminal scanned in the M1 of market to network identity be a1, a2 and The network of a3, it is determined that the network identity a1 scanned is default risk network identity, to can determine that network identity is a1, a2 Network environment corresponding with a3 is dangerous.
In the embodiment of the present application, server determines above-mentioned default risk position and default risk network identity, specifically may be used It realizes in the following way.
In the multiple risk cases reported at the terminal, server can will correspond to each risk thing of same risk network identity The generation position of part, as a default risk position.Further, in each generation position for corresponding to same risk network identity In setting, it can will be located at the generation position in set distance (such as 2km) range, as a default risk position.
S103, determine that current network environment is dangerous.
When terminal determines that itself network environment meets preset first risk conditions by step S102, itself is determined Network environment it is dangerous.
S104, current network environment safety is determined.
When terminal determines that itself network environment is unsatisfactory for preset first risk conditions by step S102, determine from The network environment safety of body.
In method shown in Fig. 1, the network environment of terminal monitoring itself, and it is default to judge whether the network environment meets Risk conditions, if so, determining that the network environment is dangerous, otherwise, it determines the network environment is safe.In this way, in working as User in preceding network environment could be aware that whether the network environment is safe, and generally all will not easily access terminal uneasy In full network environment, in this way, can effectively avoid user do not know itself network environment whether safety in the case where, will be whole It terminates into risk network, and then the safety of user information can be effectively improved.
In view of the accuracy in practical application scene, carrying out the location information of self aligning system is lower, location information is corresponding Current location region it is larger, therefore, terminal by the current location determine the network environment that is presently in whether safety The accuracy of (that is, whether there is risk) is lower.
In addition, attacker often changes the network identity (letter of the risk network of itself building in practical application scene Claim risk network identity).If the risk network identity after change is not in default risk network identity, terminal can not just be determined Current network environment is dangerous.Therefore, terminal by risk network identity determine the network environment that is presently in whether safety Accuracy is relatively low.
In order to improve terminal determine the network environment that is presently in whether An Quan accuracy, in the embodiment of the present application, When terminal passes through network identity (network environment) of the step S101 scanning to current each network, it can determine whether that the network environment of itself is It is no to meet third risk conditions.
The third risk conditions can be determined and provided to terminal by server.It is reported specifically, server can obtain terminal Risk case when occurring its scan but the network identity of network that does not access, using each network identity as default risk Environmental labels.
Server determines third risk conditions are as follows: the quantity for the default risk environment mark that terminal scans is preset with all The ratio of the quantity of risk environment mark is greater than the first preset threshold.
The third risk conditions are sent to terminal by server.
When terminal is scanned by step S101 to current each network identity (network environment), judge that terminal scan presets The ratio of the quantity of the quantity of risk environment mark and all default risk environment marks is greater than the first preset threshold and (judges net Whether network environment meets third risk conditions), if so, determining that current network environment is dangerous, otherwise, it determines current network environment Safety.
Specifically, terminal determines the quantity of current network identification in default risk environment mark, as the first quantity, The quantity that default risk environment is identified judges whether the first quantity and the ratio of the second quantity are greater than first as the second quantity Preset threshold, if so, determine that the network environment meets third risk conditions, so that it is determined that current network environment is dangerous, otherwise, Determine that the network environment is unsatisfactory for third risk conditions, so that it is determined that current network environment is safe.
For example, it is assumed that steal-number event (risk case) occurs, when steal-number event occurs, to access the net of network in position A Network is identified as a1, terminal position A sweep to but the network identity of network that does not access be a2, a3, a4, a5, server is then Using network identity a1 as default risk network identity, and using network identity a2, a3, a4, a5 as default risk environment mark Know.
Server settings third risk conditions are as follows: the quantity of default risk environment that terminal scans mark, and it is all pre- If the ratio of the quantity 4 of risk environment mark is greater than the first preset threshold.
If terminal scanned in the M1 of market to network identity be a1 ', a2, a3, a4, a5 when, terminal is in default risk environment It identifies in a2, a3, a4, a5, determines to include this 4 network identities of current network identification a2, a3, a4, a5, that is, determine default risk The first quantity in environmental labels comprising current network identification is 4.Terminal also determines the second of all default risk environment marks Quantity is 4.Assuming that the first preset threshold is 0.8, terminal determines that the ratio (4/4=1) of the first quantity and the second quantity is greater than the One preset threshold (0.8) then can determine that the network environment of itself meets third risk conditions, to can determine current network environment It is dangerous.
In this way, terminal can also be according to the net even if the network identity a1 of the network itself constructed is changed to a1 ' by attacker Other network identities a2, a3, a4, a5 in network environment in addition to network identity a1 determine that the network environment is dangerous, from And can effectively improve terminal determine the network environment that is presently in whether An Quan accuracy.
In order to further increase terminal determine the network environment that is presently in whether An Quan accuracy, in the application implementation In example, terminal also can determine whether the network environment of itself is full after the network environment for determining itself meets third risk conditions The 4th risk conditions of foot.
4th risk conditions can also be determined and provided to terminal by server.Specifically, the risk case that terminal reports Attribute information further include: each default risk environment that terminal reports identifies corresponding signal strength.
The default risk environment can be identified corresponding signal strength and be used as preset signal strength by server, and determination the Four risk conditions are as follows: the default risk environment that terminal scans identifies corresponding signal strength and the default risk environment mark pair The difference for the preset signal strength answered is less than the second preset threshold.
The 4th risk conditions that server determines this are sent to terminal.
Terminal is after the network environment for determining itself meets third risk conditions, further includes: acquisition Current Scan arrives each The signal strength of network, as current signal strength, for each current network identification for including in default risk environment mark, According to the corresponding preset signal strength of the current network identification of preservation, the corresponding current signal strength of the current network identification is judged And whether the difference of preset signal strength is less than the second preset threshold, if so, determining that the network environment of itself meets the 4th risk Condition, thus can determine that current network environment is dangerous, otherwise, it determines the network environment of itself is unsatisfactory for the 4th risk conditions, So that it is determined that current network environment is safe.
For example, it is assumed that steal-number event (risk case) occurs, when steal-number event occurs, to access the net of network in position A Network is identified as a1, terminal position A sweep to but the network identity of network that does not access be respectively a2, a3, a4, a5, network Identifying the corresponding signal strength of a2, a3, a4, a5 is respectively 20dbm, 25dbm, 30dbm, 35dbm.Server is by the network identity A1 is identified as default risk network identity using network identity a2, a3, a4, a5 as default risk environment, by signal strength 20dbm, 25dbm, 30dbm, 35dbm are respectively as the corresponding preset signal strength of a2, a3, a4, a5.
When terminal scanned in the M1 of market to network identity be a1 ', a2 and a3 when, each network identity got is right respectively The current signal strength answered is 15dbm, 14dbm, 18dbm.Obviously, in the network identity that terminal scans, a2 and a3 are default Risk environment mark.The corresponding preset signal strength of default risk environment mark a2 and a3 and current letter that terminal scans Number intensity is as shown in table 2.
Network identity Preset signal strength (dbm) Current signal strength (dbm)
a2 20 14
a3 25 18
Table 2
As shown in Table 2, the corresponding preset signal strength of a2 is 20dbm, and current signal strength 14dbm, a3 is corresponding pre- If signal strength is 25dbm, current signal strength 18dbm.
Assuming that the second preset threshold is 10dbm, after terminal gets the current signal strength of current network identification, according to Table 2 determines the exhausted of the difference for the corresponding preset signal strength of default risk environment mark a2 and current signal strength that Current Scan arrives It is 6dbm to value, the absolute value of the difference of the corresponding preset signal strength of a3 and current signal strength is 7dbm.For a2 and a3, eventually End can determine the difference (6dbm or 7dbm) of preset signal strength and current signal strength less than the second preset threshold (10dbm), from And it can determine the network environment of itself and meet the 4th risk conditions.
In this way, terminal passes through the signal strength of the network scanned, can further determine that whether the network environment of itself is full The 4th risk conditions of foot, thus can further improve terminal determine the network environment that is presently in whether An Quan accuracy.
Certainly, the determination method of network environment provided by the embodiments of the present application, the network environment that terminal can be current in determination When meeting one of condition in the first risk conditions, the second risk conditions, third risk conditions and the 4th risk conditions, or Person determines current network environment safety, which is not described herein again when meeting therein at least two or full terms.
Further, terminal can issue the user with warning information when the network environment for determining itself is dangerous, to mention Showing user's present position, there are risk networks.
Terminal, specifically can be by modes such as output icon, text, voice or vibrations, to user when issuing warning information Issue warning information.
Certainly, terminal can also issue the user with prompt information when the network environment for determining itself is safe, to prompt to use Family current network environment safety.
In view of in practical application scene, when terminal is in, there are the network environments of risk, but do not access the network When risk network in environment, if terminal issues the user with warning information, this can not only make troubles to user, but also waste money Source.
Therefore, in the embodiment of the present application, determined when terminal by step S102 Current Scan to network identity in wrap Containing default risk network identity, so that it is determined that when the network environment of itself is dangerous, method shown in FIG. 1 further include: monitoring is certainly Whether body currently presets the corresponding network of risk network identity (i.e. risk network) to this and has sent access request, if so, can Warning information is issued the user with, prompts user's stopping that terminal is accessed the risk network in time and does not otherwise issue the user with early warning Information.
The above are the determination methods of network environment provided by the embodiments of the present application, are based on same thinking, and the application is implemented Example additionally provides a kind of determining device of network environment, as shown in Figures 2 and 3.
Referring to fig. 2, the determining device of network environment provided by the embodiments of the present application, comprising:
Monitoring modular 21, for monitoring itself network environment;
Judgment module 22, for judging whether the network environment meets preset risk conditions;
Determining module 23, for determining institute when judgment module judges that the network environment meets preset risk conditions It is dangerous to state network environment, and when judgment module judges that the network environment is unsatisfactory for preset risk conditions, determines institute State network environment safety.
Optionally, the monitoring modular 21 is specifically used for: monitoring the current location of itself;
The judgment module 22 is specifically used for: judging whether the current location is default risk position;
The determining module 23 is specifically used for: when the current location is default risk position, determining the network rings Border meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset risk conditions.
Optionally, the monitoring modular 21 is specifically used for: the mark for each network that monitoring Current Scan arrives, as current net Network mark;
Whether the judgment module 22 is specifically used for: judging in current network identification comprising at least one default risk network Mark;
The determining module 23 is specifically used for: when including at least one default risk network mark in the current network identification When knowledge, it is determined that the network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset wind Dangerous condition.
Optionally, described device further include:
Warning module 24, for monitoring itself to have sent access to the corresponding network of the default risk network identity When request, warning information is issued.
Optionally, the monitoring modular 21 is specifically used for: the mark for each network that Current Scan arrives is obtained, as current net Network mark;
The judgment module 22 is specifically used for: in default risk environment mark, determining the quantity of current network identification, makees For the first quantity;Using the quantity of the default risk environment mark as the second quantity;And judge first quantity and institute Whether the ratio for stating the second quantity is greater than the first preset threshold;
The determining module 23 is specifically used for: presetting when the ratio of first quantity and second quantity is greater than first When threshold value, determine that the network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset wind Dangerous condition.
Optionally, the monitoring modular 21 is specifically used for: the signal strength of each network that Current Scan arrives is obtained, as working as Front signal intensity;
The determining module 23 is specifically used for: for default risk environment mark in include each current network identification, According to the corresponding preset signal strength of the current network identification of preservation, the corresponding current demand signal of the current network identification is determined Intensity and the difference of the preset signal strength are less than the second preset threshold.
Optionally, described device further include:
Warning module 24, for issuing warning information when the determining module 23 determines that the network environment is dangerous.
Referring to Fig. 3, the determining device of network environment provided by the embodiments of the present application, comprising:
Module 31 is obtained, for obtaining the attribute information for the risk case that terminal reports;
Determining module 32, for determining risk conditions according to the attribute information;
Sending module 33 makes the terminal monitor the terminal for the risk conditions to be sent to terminal It when network environment meets the risk conditions, determines that the network environment is dangerous, and monitors that the network environment is discontented When the preset risk conditions of foot, the network environment safety is determined.
Optionally, the module 31 that obtains is specifically used for: the generation position for the risk case that terminal reports is obtained, as pre- If risk position;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: the position of terminal is the default risk position It sets.
Optionally, the module 31 that obtains is specifically used for: obtaining accessed network when the risk case that terminal reports occurs Corresponding network identity, as default risk network identity;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: includes in the network identity that terminal scans At least one described default risk network identity.
Optionally, the module 31 that obtains is specifically used for: obtain when the risk case that reports of terminal occurs it is that it is scanned, But the network identity for the network not accessed is identified as default risk environment;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: the default risk environment mark that terminal scans The ratio of the quantity of the quantity of knowledge and all default risk environment marks is greater than the first preset threshold.
Optionally, the attribute information of the risk case, further includes: each default risk environment mark that terminal reports corresponds to Signal strength;
The determining module 32 is specifically used for, and the default risk environment is identified corresponding signal strength as default letter Number intensity;Determine the risk conditions are as follows: the default risk environment that terminal scans identifies corresponding signal strength and this is default Risk environment identifies the difference of corresponding preset signal strength less than the second preset threshold.
In conclusion network environment provided by the embodiments of the present application determines method, the network environment of terminal monitoring itself, and Judge whether the network environment meets preset risk conditions, if so, determining that the network environment is dangerous, otherwise, it determines institute State network environment safety.In this way, the user in current network environment could be aware that whether the network environment is safe, and one As all terminal will not be accessed in unsafe network environment easily, in this way, can effectively avoid user in the net for not knowing itself Network environment accesses risk network whether in the case where safety, by terminal, and then can effectively improve the safety of user information.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art, Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement, Improve etc., it should be included within the scope of the claims of this application.

Claims (24)

1. a kind of determination method of network environment characterized by comprising
The network environment for monitoring itself, specifically includes: the position of terminal monitoring itself, current as current location, or monitoring The network identity of each network scanned, as current network identification;
Judge whether the network environment meets preset risk conditions, wherein the risk conditions be by server according to Attribute information determines different risk conditions, and is supplied to terminal, and the attribute information includes the pre- of risk case If risk position, default risk network identity, default risk environment mark or preset signal strength;
If so, determining that the network environment is dangerous;
Otherwise, it determines the network environment safety.
2. the method as described in claim 1, which is characterized in that the network environment for monitoring itself specifically includes:
Monitor the current location of itself;
Judge whether the network environment meets preset risk conditions, specifically include:
Judge whether the current location is default risk position, if so, determining that the network environment meets preset risk item Part, otherwise, it determines the network environment is unsatisfactory for preset risk conditions.
3. the method as described in claim 1, which is characterized in that the network environment for monitoring itself specifically includes:
The mark for each network that monitoring Current Scan arrives, as current network identification;
Judge whether the network environment meets preset risk conditions, specifically include:
Judge whether comprising at least one default risk network identity in current network identification, if so, determining the network rings Border meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset risk conditions.
4. method as claimed in claim 3, which is characterized in that after determining that the network environment is dangerous, the method is also Include:
When monitoring that itself has sent access request to the corresponding network of the default risk network identity, early warning letter is issued Breath.
5. the method as described in claim 1, which is characterized in that the network environment for monitoring itself specifically includes:
The mark for obtaining each network that Current Scan arrives, as current network identification;
Judge whether the network environment meets preset risk conditions, specifically include:
In default risk environment mark, the quantity of current network identification is determined, as the first quantity;
Using the quantity of the default risk environment mark as the second quantity;
Judge whether first quantity and the ratio of second quantity are greater than the first preset threshold, if so, determining the net Network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset risk conditions.
6. method as claimed in claim 5, which is characterized in that determine the network environment meet preset risk conditions it Before, the method also includes:
The signal strength for obtaining each network that Current Scan arrives, as current signal strength;
For each current network identification for including in default risk environment mark, according to the current network identification pair of preservation The preset signal strength answered determines that the difference of the corresponding current signal strength of the current network identification and the preset signal strength is small In the second preset threshold.
7. the method as described in claim 1,2,3,5 or 6, which is characterized in that when determining that the network environment is dangerous, institute State method further include:
Issue warning information.
8. a kind of determination method of network environment characterized by comprising
The attribute information for the risk case that the terminal of the network environment of acquisition monitoring itself reports;The network rings of the monitoring itself Border specifically includes: the position of itself monitored, as current location, or monitors the network identity for each network that Current Scan arrives, As current network identification;The attribute information includes the default risk position of risk case, presets risk network identity, is pre- If risk environment mark or preset signal strength;
Risk conditions are determined according to the attribute information;
The risk conditions are sent to terminal, make the terminal judge the network environment whether meet the risk conditions with Determine whether the network environment of the terminal is safe.
9. method according to claim 8, which is characterized in that obtain the attribute information for the risk case that terminal reports, specifically Include:
The generation position for obtaining the risk case that terminal reports, as default risk position;
Risk conditions are determined according to the attribute information, are specifically included:
Determine the risk conditions are as follows: the position of terminal is the default risk position.
10. method according to claim 8, which is characterized in that obtain the attribute information for the risk case that terminal reports, specifically Include:
The corresponding network identity of accessed network when the risk case that reports of terminal occurs is obtained, as default risk network mark Know;
Risk conditions are determined according to the attribute information, are specifically included:
Determine the risk conditions are as follows: include at least one described default risk network mark in the network identity that terminal scans Know.
11. method according to claim 8, which is characterized in that obtain the attribute information for the risk case that terminal reports, specifically Include:
The network identity for obtaining when the risk case that reports of terminal occurs network that is that it scan but not accessing, as presetting Risk environment mark;
Risk conditions are determined according to the attribute information, are specifically included:
Determine the risk conditions are as follows: the quantity for the default risk environment mark that terminal scans and all default risk environment marks The ratio of the quantity of knowledge is greater than the first preset threshold.
12. method as claimed in claim 11, which is characterized in that the attribute information of the risk case further include: in terminal Each default risk environment of report identifies corresponding signal strength;
Risk conditions are determined according to the attribute information, are specifically included:
The default risk environment is identified into corresponding signal strength as preset signal strength;
Determine the risk conditions are as follows: the default risk environment that terminal scans identifies corresponding signal strength and the default risk The difference of the corresponding preset signal strength of environmental labels is less than the second preset threshold.
13. a kind of determining device of network environment characterized by comprising
Monitoring modular is specifically included for monitoring itself network environment: the position of terminal monitoring itself, as current location, Or the network identity for each network that Current Scan arrives is monitored, as current network identification;
Judgment module, for judging whether the network environment meets preset risk conditions, wherein the risk conditions are Different risk conditions are determined according to attribute information by server, and are supplied to terminal, and the attribute information includes The default risk position of risk case, default risk network identity, default risk environment mark or preset signal strength;
Determining module, it is no for determining that the network environment is dangerous when the network environment meets preset risk conditions Then, the network environment safety is determined.
14. device as claimed in claim 13, which is characterized in that the monitoring modular is specifically used for: monitoring the current of itself Position;
The judgment module is specifically used for: judging whether the current location is default risk position;
The determining module is specifically used for: when the current location is default risk position, determining that the network environment meets Preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset risk conditions.
15. device as claimed in claim 13, which is characterized in that the monitoring modular is specifically used for: monitoring Current Scan arrives Each network mark, as current network identification;
Whether the judgment module is specifically used for: judging in current network identification comprising at least one default risk network identity;
The determining module is specifically used for: when in the current network identification including at least one default risk network identity, Then determine that the network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset risk item Part.
16. device as claimed in claim 15, which is characterized in that described device further include:
It further include warning module, for when monitoring itself to have sent access to the corresponding network of the default risk network identity When request, warning information is issued.
17. device as claimed in claim 13, which is characterized in that the monitoring modular is specifically used for: obtaining Current Scan and arrive Each network mark, as current network identification;
The judgment module is specifically used for: in default risk environment mark, the quantity of current network identification is determined, as first Quantity;Using the quantity of the default risk environment mark as the second quantity;And judge first quantity and described second Whether the ratio of quantity is greater than the first preset threshold;
The determining module is specifically used for: when the ratio of first quantity and second quantity is greater than the first preset threshold When, determine that the network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset risk item Part.
18. device as claimed in claim 17, which is characterized in that the monitoring modular is specifically used for: obtaining Current Scan and arrive Each network signal strength, as current signal strength;
The determining module is specifically used for: for each current network identification for including in default risk environment mark, according to guarantor The corresponding preset signal strength of the current network identification deposited, determine the corresponding current signal strength of the current network identification with The difference of the preset signal strength is less than the second preset threshold.
19. the device as described in claim 13,14,15,17 or 18, which is characterized in that described device further include:
Warning module, for issuing warning information when the determining module determines that the network environment is dangerous.
20. a kind of determining device of network environment characterized by comprising
Module is obtained, for obtaining the attribute information for the risk case that the terminal of network environment of monitoring itself reports;The prison The network environment for surveying itself specifically includes: the position of itself is monitored, as current location, or each net that monitoring Current Scan arrives The network identity of network, as current network identification;The attribute information includes the default risk position of risk case, default wind Dangerous network identity, default risk environment mark or preset signal strength;
Determining module, for determining risk conditions according to the attribute information;
Sending module makes the terminal judge whether the network environment meets for the risk conditions to be sent to terminal Whether the risk conditions are safe with the network environment of the determination terminal.
21. device as claimed in claim 20, which is characterized in that the module that obtains is specifically used for: obtaining what terminal reported The generation position of risk case, as default risk position;
The determining module is specifically used for, and determines the risk conditions are as follows: the position of terminal is the default risk position.
22. device as claimed in claim 20, which is characterized in that the module that obtains is specifically used for: obtaining what terminal reported Accessed network corresponding network identity when risk case occurs, as default risk network identity;
The determining module is specifically used for, and determines the risk conditions are as follows: includes at least one in the network identity that terminal scans A default risk network identity.
23. device as claimed in claim 20, which is characterized in that the module that obtains is specifically used for: obtaining what terminal reported When risk case occurs its scan but the network identity of network that does not access, as default risk environment mark;
The determining module is specifically used for, and determines the risk conditions are as follows: the number for the default risk environment mark that terminal scans The ratio of amount and the quantity of all default risk environment marks is greater than the first preset threshold.
24. device as claimed in claim 23, which is characterized in that the attribute information of the risk case further include: in terminal Each default risk environment of report identifies corresponding signal strength;
The determining module is specifically used for, and it is strong as preset signals that the default risk environment is identified corresponding signal strength Degree;Determine the risk conditions are as follows: the default risk environment that terminal scans identifies corresponding signal strength and the default risk The difference of the corresponding preset signal strength of environmental labels is less than the second preset threshold.
CN201410643984.5A 2014-11-07 2014-11-07 A kind of determination method and device of network environment Active CN105577466B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201410643984.5A CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment
CN201811507594.XA CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device
HK16112216.5A HK1224104A1 (en) 2014-11-07 2016-10-25 Method and device for determining network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410643984.5A CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201811507594.XA Division CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device

Publications (2)

Publication Number Publication Date
CN105577466A CN105577466A (en) 2016-05-11
CN105577466B true CN105577466B (en) 2018-12-21

Family

ID=55887161

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201410643984.5A Active CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment
CN201811507594.XA Active CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201811507594.XA Active CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device

Country Status (2)

Country Link
CN (2) CN105577466B (en)
HK (1) HK1224104A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106686544B (en) * 2016-09-06 2019-07-16 腾讯科技(深圳)有限公司 A kind of location-based information early warning method, terminal and system
CN114598543B (en) * 2019-01-16 2023-06-23 创新先进技术有限公司 Network environment monitoring method, system, device and electronic equipment
CN115361470B (en) * 2022-08-26 2024-02-27 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101496364A (en) * 2005-07-28 2009-07-29 讯宝科技公司 Rogue AP roaming prevention
CN103167488A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Method and device for prompting Wi-Fi signal
CN103368941A (en) * 2013-04-22 2013-10-23 北京奇虎科技有限公司 User network access scenario-based protection method and device
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003079214A1 (en) * 2002-03-11 2003-09-25 Goldman, Sachs & Co. Network access risk management
US20030232598A1 (en) * 2002-06-13 2003-12-18 Daniel Aljadeff Method and apparatus for intrusion management in a wireless network using physical location determination
US20050254652A1 (en) * 2002-07-16 2005-11-17 Haim Engler Automated network security system and method
ES2326057B1 (en) * 2006-12-28 2010-06-25 Vodafone España, S.A. METHOD FOR IMPROVING TRAFFIC SAFETY THROUGH THE USE OF BEAMS.
CN101674566B (en) * 2008-09-08 2012-04-25 华为技术有限公司 Position locating and verifying methods and system of wireless access device and attribution server
CN101789880B (en) * 2010-01-22 2012-09-05 中国电信股份有限公司 Method for realizing uplink QoS (Quality of Service) based on IP access network and multi-service access gateway
US8843112B2 (en) * 2010-07-02 2014-09-23 Blackberry Limited Method and system for data session establishment
US20130212680A1 (en) * 2012-01-12 2013-08-15 Arxceo Corporation Methods and systems for protecting network devices from intrusion
CN102638459B (en) * 2012-03-23 2018-01-26 腾讯科技(深圳)有限公司 Authentication information Transmission system, authentication information transmission service platform and transmission method
US8718644B2 (en) * 2012-06-08 2014-05-06 Apple Inc. Automatically modifying wireless network connection policies based on user activity levels
US20170201878A1 (en) * 2012-10-29 2017-07-13 Intel Corporation Method and apparatus for safe network access point detection
CN103347116A (en) * 2012-11-09 2013-10-09 北京深思洛克软件技术股份有限公司 System and method for setting multi-security modes in smart phone
CN103621132A (en) * 2013-06-25 2014-03-05 华为技术有限公司 Network monitoring method and device
CN103648094A (en) * 2013-11-19 2014-03-19 华为技术有限公司 Method, device and system for detecting illegal wireless access point
CN104065539A (en) * 2014-07-09 2014-09-24 武汉安问科技发展有限责任公司 Method for monitoring unauthorized network equipment based on application behaviors

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101496364A (en) * 2005-07-28 2009-07-29 讯宝科技公司 Rogue AP roaming prevention
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points
CN103167488A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Method and device for prompting Wi-Fi signal
CN103368941A (en) * 2013-04-22 2013-10-23 北京奇虎科技有限公司 User network access scenario-based protection method and device

Also Published As

Publication number Publication date
HK1224104A1 (en) 2017-08-11
CN109962826A (en) 2019-07-02
CN109962826B (en) 2022-07-26
CN105577466A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
KR101823562B1 (en) A system and method for registering network information strings
US9408036B2 (en) Managing wireless beacon devices
US9813873B2 (en) Mobile device tracking prevention method and system
US9712962B2 (en) Public and private geo-fences
US20180276422A1 (en) Proximity-based localization of wireless tags based on wireless gateway association information
EP3544336B1 (en) Information transmission
US20160119320A1 (en) Method and system for secure deployment and use of bluetooth low energy beacons and other network devices
US20140052508A1 (en) Rogue service advertisement detection
US20120215898A1 (en) Applications of a Network-Centric Information Distribution Platform on the Internet
WO2014161433A1 (en) System and method for positioning terminal
US11790257B2 (en) Incident prediction system
RU2011125590A (en) METHOD FOR PREVENTING AND IDENTIFYING MOBILE DEVICES AND FORECASTING AND NOTIFICATION SYSTEM FOR IDENTIFICATION OF MOBILE DEVICES
US20160240063A1 (en) Position information prompting method, device and system
US20190387408A1 (en) Wireless access node detecting method, wireless network detecting system and server
US10656238B2 (en) Asset tracking
US20170019751A1 (en) Verification of Wireless Transmitter Articles in Proximity to Registered Devices
CN105577466B (en) A kind of determination method and device of network environment
CN106412819A (en) Method and device for positioning device
CN106982415A (en) The monitoring system and monitoring method of people streams in public places density
KR101272136B1 (en) Method on Postion Based Security of Mobile Device
CN104038491B (en) A kind of information intercepting method, apparatus and system
US20160191490A1 (en) Identify a radio frequency emitting device by mac address
CN109729159B (en) Method and device for reminding loss of network equipment
Song et al. Effective opportunistic crowd sensing IoT system for restoring missing objects
CN105119774B (en) Harass information identifying method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1224104

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.