CN106209918A - The method of a kind of internet security management and terminal - Google Patents
The method of a kind of internet security management and terminal Download PDFInfo
- Publication number
- CN106209918A CN106209918A CN201610822777.5A CN201610822777A CN106209918A CN 106209918 A CN106209918 A CN 106209918A CN 201610822777 A CN201610822777 A CN 201610822777A CN 106209918 A CN106209918 A CN 106209918A
- Authority
- CN
- China
- Prior art keywords
- network
- under test
- terminal
- server
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The embodiment of the invention discloses method and the terminal of a kind of internet security management, wherein method includes: obtains terminal and carries out the network produced network access information of access operation according to the default network address under network under test;Judge whether described network access information exists and accessed the operation exception data caused by operation, and/or the network attack data obtained from server by described network;The most then according to described network attack data and/or described operation exception data, determine the safety of described network under test.Use the embodiment of the present invention, secure network, the Internet Security of protection user can be connected to according to the demand of user from main separation.
Description
Technical field
The present invention relates to security technology area, particularly relate to method and the terminal of the management of a kind of internet security.
Background technology
WIFI is Institute of Electrical and Electric Engineers IEEE (Institute of Electrical and
Electronics Engineers, IEEE) industrial standard (IEEE 802.11) of a wireless communication that defines, it is possible to
To regard that the one of 3G technology is supplemented as.WiFi technology, as Bluetooth technology, belongs to use in office and family
Wireless LAN communication technology.WIFI is a kind of short range wireless transmission technology, it is possible to support the Internet in the range of hundreds of feet
Accessing radio signal, its great advantage is that transmission speed is higher, and in the case of signal is more weak or noisy, bandwidth is adjustable
Whole, effectively ensure stability and the reliability of network.But it is as the continuous expansion of WLAN application, its peace
Full problem the most increasingly comes into one's own.
In some megastore, communal facility, citizen can use wireless network much smootherly, is namely commonly called as
WIFI.Generally these places are because of the open network used, and do not have password, so searching for nothing with smart mobile phone, panel computer etc.
Gauze network, just can connect easily.In the epoch of WiFi, rubbing WiFi becomes one basic " existence technical ability ".But enjoying
While WiFi offers convenience, the security precautions surfed the Net general lack of WiFi due to people, WiFi has become as safely respectively
Plant network trap, the severely afflicated area of fishing swindle.
For solving the problems referred to above, it is typically all at present by the application data needing transmission are encrypted or set up
The mode of secure connection passage (such as VPN passage) ensures the data safety after accessing public WiFi.However, it has been found in practice that
Terminal can not provide the user the safety information of public WIFI network in real time, and domestic consumer also cannot be by complicated encryption
Means are guaranteed under public WiFi network the safety carried out data transmission, it is therefore desirable to a kind of simple and reliable internet security
Managed Solution.
Summary of the invention
The embodiment of the present invention provides the method for a kind of internet security management, can promote the safety of internet security management
And practicality.
First aspect, the method embodiments providing the management of a kind of internet security, the method includes:
Obtain terminal and carry out network access operation produced network access according to the default network address under network under test
Information;
Judge whether described network access information exists and accessed the operation exception data caused by operation by described network,
And/or from server obtain network attack data;
The most then according to described network attack data and/or described operation exception data, determine the peace of described network under test
Quan Xing.
On the other hand, embodiments providing a kind of terminal, this terminal includes:
Acquiring unit, is used for obtaining terminal and carries out network according to the default network address under network under test and access operation and produced
Raw network access information;
Whether judging unit, accessed caused by operation by described network for judging to exist in described network access information
Operation exception data, and/or the network attack data obtained from server;
Determine unit, if being yes for the judged result of described judging unit, then according to described network attack data and/or
Described operation exception data, determine the safety of described network under test.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test
Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn
The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number
According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net
Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine
The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters
Row connects and communicates;Improve the safety of user's online.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below
Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is some embodiments of the present invention, general for this area
From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the structural representation of a kind of network frame that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of a kind of internet security management method that the embodiment of the present invention provides;
Fig. 3 is the schematic flow sheet of a kind of internet security management method that another embodiment of the present invention provides;
Fig. 4 is the schematic flow sheet of a kind of internet security management method that another embodiment of the present invention provides;
Fig. 5 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 6 is the structural representation of a kind of terminal that another embodiment of the present invention provides;
Fig. 7 is the structural representation of a kind of terminal that another embodiment of the present invention provides;
Fig. 8 is the structural representation of a kind of internet security management system that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise
Example, broadly falls into the scope of protection of the invention.
Should be appreciated that when using in this specification and in the appended claims, term " includes " and " comprising " instruction
Described feature, entirety, step, operation, element and/or the existence of assembly, but it is not precluded from one or more further feature, whole
Body, step, operation, element, assembly and/or the existence of its set or interpolation.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Hereafter clearly indicating other situation, otherwise " ", " " and " being somebody's turn to do " of singulative is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is
Refer to the one or more any combination being associated in the item listed and likely combine, and including that these combine.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if be detected that [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to really
Fixed " or " [described condition or event] once being detected " or " in response to [described condition or event] being detected ".
In implementing, the terminal described in the embodiment of the present invention includes but not limited to such as have touch sensitive surface
Mobile phone, laptop computer or the tablet PC of (such as, touch-screen display and/or touch pad) etc other just
Portable device.It is to be further understood that in certain embodiments, described equipment not portable communication device, but have tactile
Touch the desk computer of sensing surface (such as, touch-screen display and/or touch pad).
In discussion below, describe the terminal including display and touch sensitive surface.It is, however, to be understood that
It is that terminal can include such as physical keyboard, mouse and/or control other physical user-interface device one or more of bar.
Terminal supports various application programs, such as following in one or more: drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, dish imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support the application of application program, photo management application program, digital camera application program, digital camera application program, web-browsing
Program, digital music player application and/or video frequency player application program.
The various application programs that can perform in terminal can use at least one of such as touch sensitive surface public
Physical user-interface device.Among applications and/or can adjust in corresponding application programs and/or change and touch sensitive table
The corresponding information of display in one or more functions in face and terminal.So, the public physical structure of terminal (such as, touches
Sensing surface) the various application programs with the most directly perceived and transparent user interface can be supported.
The embodiment of the invention discloses a kind of internet security management method and terminal, contribute to user select safety or
The higher network of safety carries out data communication.It is described in detail individually below.
In order to be best understood from method and the terminal of a kind of internet security management that the embodiment of the present invention provides, the most right
The network architecture that the embodiment of the present invention is suitable for is described.Referring to Fig. 1, Fig. 1 is the open one provided of the embodiment of the present invention
The structural representation of network architecture.As it is shown in figure 1, this network architecture schematic diagram can include service equipment and terminal, wherein, clothes
Business equipment can include server, service host, service system and service platform etc., and terminal can include smart mobile phone
(such as Android phone, IOS mobile phone etc.), PC, panel computer, palm PC, mobile internet device (MID,
Mobile Internet Devices) or the internet device such as wearable intelligent equipment.In the network architecture shown in Fig. 1, clothes
Business equipment can be communicatively coupled with terminal by the Internet, understands that following server is as service equipment for the convenience of the user
One representative with described terminal carry out related communication description.
See Fig. 2, be the schematic flow sheet of the embodiment of the present invention a kind of internet security management method of offer, as shown in the figure
Internet security manager may comprise steps of:
S101, acquisition terminal carry out network according to the default network address under network under test and access the produced network of operation
Access information.
In the embodiment of the present invention, user can open the network savvy of this terminal so that it is be connected to a network under test (as
Strange WiFi network) under carry out net according to the one or more default network address of the most self-defined setting/input of user/system
When network accesses operation, described terminal or corresponding server can record above-mentioned network and access produced institute in operating process
Have or subnetwork accesses information.Described terminal can obtain this terminal from this terminal and carry out above-mentioned net under network under test
Network accesses the described network access information that operation is produced/recorded, and/or described terminal can pass through wire/wireless communication
Mode (such as WiFi, bluetooth, data wire etc.) obtain from correspondingly server as described in terminal be connected to as described under network under test
Carry out network according to the default network address and access the produced network access information of operation.
It is understood that when described terminal is connected to some or multiple uncertain network under test (is such as connected to footpath between fields
Raw WiFi) time, described terminal can by this network under test carry out the network of correspondence access operation time, described terminal can be according to
The access information such as the network address, access link, access script of such as presetting of the self-defined setting of user/system carry out the mutual of correspondence
Internet interview, i.e. network access operation, all or part that described terminal can be carried out under this network under test with minute book terminal
Access record information, that is to say network access information.Owing to network under test may be unsafe network, as described terminal exists
Being connected under strange unsafe WiFi, unsafe WiFi equipment may be distorted terminal and be sent such as to associated server
Setting network address, access script etc. access information, thus reach steal privacy of user data or destroy subscriber equipment (i.e.
Described terminal) or the purpose of user data (i.e. terminal data).Alternatively, described terminal can receive or obtain this terminal and treating
Carry out network according to the above-mentioned access information such as the network address, access link, access script of such as presetting under survey grid network and access behaviour
Make the corresponding first network produced and access information, (being i.e. the network access information in above-mentioned steps S101).
Alternatively, if terminal disconnection is connected with the network of network under test (such as strange WiFi) in certain time, will
When described terminal is connected under some or the preset security network of multiple self-defined setting of user/system, described terminal is permissible
Memorizer from this terminal reads above-mentioned terminal under network under test, carries out the access letter corresponding to network access operation
Breath (such as the default network address, accesses link, access script etc.), and the most described terminal can be again according to above-mentioned access
Information again carries out network and accesses operation, and the most described terminal can receive or obtain server and access according to above-mentioned network
The second network access information that operation is returned.
Wherein, described preset security network may refer to the network of user's hand labeled/setting, as user own home creates
WiFi network, data network etc., the network of labelling can be uploaded to the server of correspondence further, in order to share this net
The safety of network, or official registers in server/system and obtains the network etc. of certification, the embodiment of the present invention does not limits
Fixed.
The most such as, it is assumed that terminal is currently connected under certain network under test (such as strange WiFi), and present user is at end
Inputting network address " http://www.***.com " in end and desire access to www.***.com, terminal can be accessed by WiFi equipment
" http://www.***.com " www.***.com, owing to this strange WiFi is probably insecure network, i.e. WiFi equipment may
For pseudo-base station equipment, now terminal accesses " http://www.***.com " Baidu.com by unsafe pseudo-base station equipment
Standing, this unsafe pseudo-base station equipment may distort above-mentioned Baidu network address, such as becomes " http://www.***.com/
Index.php.tn=site888_3_pg " etc. so make what server received target access address and terminal send
Reference address differs, but when terminal carries out Baidu's network address access by preset security network (such as safe WiFi), server
The target access address received is by consistent for the reference address sended over terminal.
Alternatively, net is such as preset by above-mentioned network under test according to the self-defined setting of user/system when described terminal
When network address, the access information such as link, access script that accesses carry out network access operation, owing to described network under test is probably not
The network of safety, this network is also possible to during accessing operation can be by network attack, the most described server or described end
End can with minute book terminal under being connected to this network under test such as network hole, safety defect etc. received by (strange WIFI)
For representing the described terminal network attack data by network attack;And/or, when described terminal is connected to described network under test
If occurring abnormal during the lower the most described terminal of user/system, the most described terminal can be treated being connected to this with minute book terminal
Under survey grid network, there are abnormal operation exception data (such as application abnormal data, system operation exception data etc.) in this terminal operating.
It should be noted that above-mentioned first network accesses information and the second network access information refers respectively to described terminal
Under network under test and preset security network, carry out identical network access the produced network access information of operation, described network
Access information can include such as access script, access link, network attack data, operation exception data or other for
The data message producing or recorded in network accesses operating process, the embodiment of the present invention is not construed as limiting.
Alternatively, this terminal of record/get can be connected under described network under test and described pre-by described terminal
If carrying out identical network under secure network to access the produced network access information of operation (the most above-mentioned first network access letter
Breath and the second network access information) and record to such as network attack data, operation exception data and described in treat survey grid
The access information such as the SSID (Service Set Identifier, service set) of network, MAC Address, network name are uploaded/are sent out
Give described server, in order to described server record/storage is about the access information of described network under test.
Described terminal can include smart mobile phone (such as Android phone, IOS mobile phone etc.), PC, panel computer,
The Internets such as palm PC, mobile internet device (MID, Mobile Internet Devices) or wearable intelligent equipment
Equipment, the embodiment of the present invention is not construed as limiting.
S102, judge whether described network access information exists and accessed the operation exception caused by operation by described network
Data, and/or the network attack data obtained from server.
In the embodiment of the present invention, terminal may determine that the described network access information got in above-mentioned steps S101 (i.e.
First network accesses information) in whether exist by above-mentioned network access operation caused/the operation exception data that produce (are such as
System operation exception is slow, application program occurs collapse etc. for no reason), and/or the network attack data obtained from server, if
Exist, then described terminal continues executing with step S103;Otherwise, flow process is terminated.
S103, according to described network attack data and/or described operation exception data, determine the safety of described network under test
Property.
In the embodiment of the present invention, terminal can be according to described network attack data and/or described operation exception abnormal data
Determine the safety of described network under test.
Alternatively, the most described according to described network attack data and/or described operation exception data, determine described to be measured
The safety of network, including:
Sending the request of acquisition (can be the first acquisition request here) to described server, described (first) obtains request bag
Including described network attack data and/or described operation exception data, described (first) acquisition request is used for obtaining described server
Middle storage under described network under test, there is the frequency corresponding to described network attack data and/or described operation exception data
Secondary;Or, for obtain described server according to storage exist under described network under test described network attack data and/or
The safety of the described network under test that the frequency corresponding to described operation exception data determines;
Receive described server according to described (first) obtain request return described storage under described network under test
There is the frequency corresponding to described network attack data and/or described operation exception data, and according to described storage described
Exist under network under test the frequency corresponding to described network attack data and/or described operation exception data determine described in treat survey grid
The safety of network;Or, receive described server and obtain the safety of the described network under test that request returns according to described (first)
Property.
In implementing, described terminal can send the request of acquisition or first to described server and obtain request, if institute
Under described network under test, there are described network attack data in the first acquisition request of stating for obtain in described server storage
And/or the frequency corresponding to described operation exception data, then described server receive described first obtain request time, institute
State server to find out each terminal of record/storage in book server from book server and be connected under described network under test
Carry out having when identical or different network accesses operation corresponding to network attack data and/or operation exception data is secondary
Number/the frequency, in the described server that server described further can will find, storage exists under described network under test
The frequency corresponding to described network attack data and/or described operation exception data sends/returns to described terminal, described terminal
Described server can be received deposit under described network under test according to what the described described server obtaining request return stored
In the frequency corresponding to described network attack data and/or described operation exception data.Alternatively, it is connected to institute in each terminal
State and carry out after different or identical network accesses operation under network under test, each terminal this terminal record be recorded in institute
State and carry out network under network under test and access the produced network access information of operation (as accessed script, accessing link, operation exception
Data, network attack data etc.) it is sent to described server;Described server can be added up and store each terminal and treat described
Carry out under survey grid network network access network access information corresponding to operation (as described in there is described operation under network under test different
Number of times/the frequencys of regular data or described network attack data etc., described network under test are marked as safety/dangerous/possible peace
Number of times/the frequency etc. of whole network).
Or, described terminal can send, to described server, the request of acquisition, if described acquisition request is used for obtaining institute
State server and under described network under test, there is described network attack data and/or described operation exception data institute according to store
The safety of the described network under test that the corresponding frequency determines, then when described server receives described acquisition request, institute
State server to find out each terminal of record/storage in book server from book server and be connected under described network under test
Carry out having when identical or different network accesses operation corresponding to network attack data and/or operation exception data is secondary
Number/the frequency, the most described server can be according to the existence under described network under test of storage in the described server found
The frequency corresponding to described network attack data and/or described operation exception data determines the safety of described network under test,
Further the safety of the described network under test determined is sent to described terminal;Described terminal can receive described service
Device is according to the described safety obtaining the described network under test that request returns/sends.
The most alternatively, described according to described storage exist under described network under test described network attack data and/
Or the frequency corresponding to described operation exception data determines the safety of described network under test, including:
If the described frequency is in preset first threshold value scope, it is determined that described network under test is secure network;
If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible secure network;
If the described frequency is in default 3rd threshold range, it is determined that described network under test is insecure network.
Described according to described storage under described network under test, there are described network attack data and/or described operation is different
The frequency corresponding to regular data determine the safety of described network under test be embodied as step may include that judge/determine described
Existing under described network under test corresponding to described network attack data and/or described operation exception data of server storage
The frequency is in user/system is stored in advance in described terminal/described server to come in which threshold range of self-defined setting
Determine the safety of described network under test, exemplarily when as described in server store as described in exist under network under test as described in
The frequency corresponding to network attack data and/or described operation exception data is in the pre-of the most self-defined setting of user/system
If in the range of first threshold, then it is believed that/determine that described network under test is secure network;When described server store in institute
State and there is the frequency corresponding to described network attack data and/or described operation exception data under network under test and be in user/be
Unite in the range of the default Second Threshold of the most self-defined setting, then it is believed that/determine that described network under test is for may safety net
Network;Under described network under test, described network attack data and/or described operation exception number is there is when what described server stored
Be in the presetting in the 3rd threshold range of the most self-defined setting of user/system according to the corresponding frequency, then it is believed that/determine
Described network under test is insecure network.
The most alternatively, described method also includes:
When detecting that described terminal support connects at least one available network, send corresponding network to described server
Security authentication request, wherein, the request of described network security verification includes the network identity corresponding with described available network, different
The corresponding different network identity of available network;
Receive the safety corresponding with described network identity that described server returns according to the request of described network security verification
Object information;
According to described safe object information and described network identity, the network being shown to described available network preset connects
Operation interface.
When user opens the network savvy of terminal, described terminal can detect and search this terminal and can support to connect
One or more available networks (as user opens the WiFi function of terminal, described terminal may search near broadcast
The WiFi network of SSID signal, or non-Broadcast SSIDs signal but this terminal is preserved hiding of the SSID of its network and password
WiFi network), thus form the available network list that described terminal allows to connect;Or, described terminal is having been connected to one
In the case of network, it is also possible to scan for other attachable available networks, timing updates this terminal can support connection
Available network list.The most described terminal can pass through the current network connected or by data network (such as 2G/3G etc.) to institute
Stating server and send corresponding network security verification request, the request of described network security verification includes the network of above-mentioned available network
Mark, different available network correspondences has different network identities, that is to say that described terminal can be searched above-mentioned by network
Rope to available network list in SSID and MAC Address be sent to described server, in order to described server authentication also returns
The safety of all or part available network in described available network list.Described server is transmitted across receiving described terminal
During the described network security verification request come, described server will respond the request of described network security verification, in book server
Search and determine the safe object information of all or part network in above-mentioned available network list, that is to say and find out respectively and institute
State the network security object information that network identity is corresponding, the safety knot corresponding with described network identity that will find out further
Really information is sent to described terminal.Described terminal can receive what described server returned according to the request of described network security verification
The safe object information corresponding with described network identity, terminal described further can also according to described safe object information and
Described network identity, is shown to above-mentioned available network in the network attended operation interface preset, that is to say that described terminal can
With the lookup result (the safest object information) according to above-mentioned server, in the peace of each available network described network shown behind
Quan Xing, as shown the letter such as " safety/trustable network ", " insecure network " " possible secure network " after the SSID of each WiFi
Breath.
Alternatively, the most described according to described safe object information and described network identity, described available network is shown
To the network attended operation interface preset, including:
According to described network identity, the network being shown to safe object information corresponding for whole available networks preset connects
Operation interface;Or,
According to described network identity, target available network is shown to the network attended operation interface preset, wherein, described
The safe object information that target available network is corresponding is default secure network object information.
Corresponding to whole available networks that above-mentioned terminal support can be connected according to described network identity by described terminal
Safe object information be shown to user/system in advance in this terminal self-defined setting preset network attended operation circle
Face;Or, target available network can be shown to, according to described network identity, network attended operation circle preset by described terminal
On face, the safe object information that wherein said target available network is corresponding is that user/system is in advance in the self-defined setting of this terminal
Preset secure network object information, as safety/trustable network or may secure network, be i.e. that described terminal can be by basis
Described network identity and described safe object information, will determine as safe or may be safe target available network and be shown to institute
State on default network attended operation interface.
The most alternatively, described method also includes:
Terminal to server sends the second acquisition request;
Receive described server and obtain, according to described second, first network access information and the visit of the second network that request returns
Asking information, described first network accesses information and refers to that what described server stored is carried out according to the default network address under network under test
Network accesses the produced network access information of operation, described second network access information refer to that described server store default
Carrying out network according to the default network address under secure network and access the produced network access information of operation, described network accesses letter
Breath includes accessing script or accessing link;
Access information and the matching analysis of described second network access information according to described first network, determine described in treat
The safety of survey grid network.
Described terminal can by the way of wire/wireless communication (such as wifi, bluetooth, data wire etc.) to as described in server
Send the second acquisition request, described second obtain request for the first network obtaining in described server storage access information and
Second network access information, described first network accesses information and may refer to described terminal under some or multiple network under test
Carry out produced network during network accesses operation according to the default network address of the self-defined setting of user/system to access
Information, described second network access information may refer to that described terminal determines in this terminal/subscriber some or multiple preset
Again carry out network access according to the above-mentioned default network address (such as data network, 2G/3G/4G network) under secure network to operate
Produced network access information in journey.Described terminal to described server send above-mentioned second obtain request after, described clothes
Business device can receive and respond described second and obtain request, separately or concurrently the described terminal of book server record/storage is existed
Under above-mentioned network under test or carry out network according to the default network address/default access information under preset security network and access operation institute
The first network produced accesses information and the second network access information is sent to described terminal.Described terminal can receive above-mentioned clothes
Business device accesses information and the access of the second network according to described second acquisition request to the first network that described server sends/returns
Information.The most described terminal can be according to the above-mentioned first network receiving/obtaining accesses information and the access of the second network
The matching analysis of information determines the safety of described network under test.
The most alternatively, described basis accesses information and the coupling of described second network access information to described first network
Analyze, determine the safety of described network under test, including:
By in the access script in described first network access information or access link and described second network access information
Access script or access link carry out the matching analysis, obtain correspondence matching result information;
If there is default access in described matching result information to distort information, it is determined that described network under test is uneasy
Whole network;Or, if there is not default access in described matching result information to distort information, it is determined that described network under test
For secure network or possible secure network.
Access script in described first network access information or access can be linked and described second net by described terminal
Access script or access link in network access information carry out the matching analysis and obtain the matching result information of correspondence, in implementing
Described terminal may determine that the access script in described first network access information or access link whether with described second network
Access script in access information or access link coupling, if coupling, the most described terminal is it is believed that this terminal is connected to described
Carry out the network produced network access information of access operation according to the default network address under network under test to be not tampered with, or
Think that described network under test can be possible secure network or secure network, that is to say that described terminal may determine that this terminal pair
Described first network accesses information and described second network access information carries out the matching analysis and can obtain such as network access letter
Breath is not tampered with, described network under test is secure network or may the matching result information such as secure network;Otherwise, described terminal
Produced it is believed that this terminal is connected under described network under test carry out the network access operation identical with preset security network
Network access information be tampered or described network under test is insecure network, that is to say that described terminal will determine this terminal
Described first network is accessed information and described second network access information carries out the matching analysis and obtains such as network access information
It is tampered or described network under test has been the matching result information such as insecure network.The most described terminal may determine that above-mentioned
Whether described first network is accessed in the matching result information obtained by the matching analysis of information and the second network access information
Exist user/system in advance in this terminal the default access of self-defined setting distort information (as network access information is usurped
Change), if it is present, described terminal it is fair to consider that/determine that described network under test is insecure network, if do not deposited
, then described terminal is it is believed that described network under test is secure network or insecure network.That is to say, described terminal is permissible
By accessing script or accessing the access foot in link and described second network access information in described first network access information
This or access link carry out coupling contrast, if the access script in described first network access information or access link are with described
Access script in second network access information or to access link identical, then described terminal it is believed that before this terminal connected
The described network under test connect is secure network or possible secure network, if the access script in described first network access information
Or access link differs with the access script in described second network access information or access link, then described terminal is permissible
The described network under test that before thinking, this terminal connects is insecure network.
The most alternatively, described basis accesses information and the coupling of described second network access information to described first network
Analyze, determine the safety of described network under test, including:
By in the access script in described first network access information or access link and described second network access information
Access script or access link carry out the matching analysis, obtain correspondence matching result information;
The 3rd acquisition request sent including described matching result information to described server;Described 3rd acquisition please
Ask and under described network under test, there is the frequency corresponding to described matching result information for obtain in described server storage,
Or for obtaining described server existing under described network under test corresponding to described matching result information according to storage
The safety of the described network under test that the frequency determines;
Receive described server depositing under described network under test according to the described 3rd described storage obtaining request return
In the frequency corresponding to described matching result information, and tie according to the described coupling that exists under described network under test of described storage
Really the frequency corresponding to information determines the safety of described network under test;Or, receive described server and obtain according to the described 3rd
Take the safety of the described network under test that request returns.
Access script in described first network access information or access can be linked and described second net by described terminal
Access script or access link in network access information carry out the matching analysis and obtain the matching result information of correspondence, in implementing
Described terminal may determine that the access script in described first network access information or access link whether with described second network
Access script in access information or access link coupling, if coupling, the most described terminal is it is believed that this terminal is connected to described
Carry out the network produced network access information of access operation according to the default network address under network under test to be not tampered with, or
Described network under test can be secure network/possibility secure network, that is to say that described terminal may determine that this terminal is to described
First network access information and described second network access information carry out the matching analysis obtain such as network access information not by
Distort, described network under test is secure network/the matching result information such as possibility secure network;Otherwise, described terminal it is believed that
This terminal is connected under described network under test carry out the network identical with preset security network and accesses operation produced network visit
The information of asking has been tampered or described network under test is insecure network, that is to say that described terminal will determine that this terminal is to described
One network access information and described second network access information carry out the matching analysis obtain such as network access information be tampered or
Described network under test is the matching result information such as insecure network.The most described terminal can send the to described server
Three obtain request, and wherein, described 3rd acquisition request can include described matching result information, and described 3rd acquisition request is permissible
Under described network under test, the frequency corresponding to described matching result information is there is for obtain in described server storage, or
Described in person, the 3rd obtains described of the existence under described network under test that request may be used for obtaining described server according to storage
Join the safety of the described network under test that the frequency corresponding to object information determines.Alternatively, described in being connected in each terminal
After carrying out different or identical network access operations under network under test, each terminal can repeat above-mentioned to treating survey grid
Network carries out coupling point with the corresponding network access information carried out under preset security network obtained by identical network access operates
Analysis (i.e. whether network access information is tampered), each terminal above-mentioned is it is also possible that the matching result information obtaining correspondence is uploaded
To described server;Described server can be added up and store each terminal and carry out network access operation under described network under test
Whether corresponding network access information is tampered, and distorts the matching result information such as number of times.
Described server receive the described 3rd obtain request after, if described 3rd acquisition request is used for obtaining described
In server there is the frequency corresponding to described matching result information in storage under described network under test, then described server
The each terminal added up/store can be found out in book server at described network under test according to the described 3rd instruction obtaining request
The lower frequency/the number of times existed corresponding to described matching result information, in the described server that described server can will find out
The frequency corresponding to described matching result information that exists under described network under test of storage is sent to described terminal, described terminal
Can receive described server according to described 3rd obtain request return described server in storage at described network under test
The lower frequency existed corresponding to described matching result information, the most described terminal can also store according in described server
Under described network under test, there is the frequency corresponding to described matching result information to determine the safety of described network under test.
Described server receive the described 3rd obtain request after, if described 3rd acquisition request is used for obtaining described
Server according to storage exist under described network under test the frequency corresponding to described matching result information determine described in treat
The safety of survey grid network, then described server can first look for out book server according to the described 3rd instruction obtaining request
The frequency/the number of times corresponding to described matching result information is there is (i.e. in each terminal of middle statistics/storage under described network under test
It is that described server can be added up and store each terminal and be connected in described network under test carry out produced by network access operation
Number of times that network access information is tampered or thought that described network under test is secure network/insecure network/can by each terminal
The number of times of energy secure network), described then according to the existence under described network under test of storage in the described server found out
The frequency corresponding to matching result information determine the safety of described network under test to determine the safety of described network under test,
Finally the safety of the described network under test determined is sent to described terminal.Described terminal can receive described server root
According to the described 3rd safety obtaining the described network under test that request returns.
The most alternatively, described basis accesses information and the coupling of described second network access information to described first network
Analyze, determine the safety of described network under test, including:
Sending the 4th acquisition request to described server, described 4th acquisition request is used for indicating described server by described
Accessing script or accessing the access script in link and described second network access information or visit in first network access information
Ask that link carries out the matching analysis, obtain the matching result information of correspondence, search and send in described server storage described
The frequency corresponding to described matching result information is there is under network under test;Or, it is used for indicating described server by described first
Accessing script or access the access script in link and described second network access information or access chain in network access information
Tap into row the matching analysis, obtain the matching result information of correspondence, under described network under test, there is described coupling according to store
The frequency corresponding to object information determines the safety of described network under test, and the safety of the described network under test determined is sent out
Give described terminal;
Receive described server depositing under described network under test according to the described 4th described storage obtaining request return
In the frequency corresponding to described matching result information, and tie according to the described coupling that exists under described network under test of described storage
Really the frequency corresponding to information determines the safety of described network under test;Or, receive described server and obtain according to the described 4th
Take the safety of the described network under test that request returns.
In implementing, described terminal can send the 4th acquisition request to described server, when described 4th acquisition please
Ask for indicating described server by the access script in described first network access information or to access link and described second net
Access script or access link in network access information carry out the matching analysis, obtain the matching result information of correspondence, search concurrent
Send when there is the frequency corresponding to described matching result information under described network under test of storage in described server, described
When server receives described 4th acquisition request, described server can obtain institute according to the described 4th instruction obtaining request
State terminal and carry out network access behaviour according to the default network address under described network under test and under described preset security network respectively
Making the described first network that produces and access information and described second network access information, the most described server can be by described the
Accessing script or accessing link and the access script in described second network access information or access in one network access information
Link carry out mate relative analysis, if it does, then described in carry out mate relative analysis will obtain the most described terminal described
Carry out network access information produced by the network operation identical with preset security network under network under test to be not tampered with or institute
Stating network under test is the matching result information such as secure network or possible secure network;Otherwise, carrying out mating relative analysis described in will
Obtain the most described terminal under described network under test, carry out network produced by the network operation identical with preset security network
Access information has been tampered or described network under test is the matching result information such as insecure network.Secondly described server is permissible
Find out from book server book server statistics/storage to each terminal be connected under described network under test carry out network access
The number of times that the produced network access information of operation is tampered, or described each terminal add up/think described network under test be safety/
Dangerous/may the number of times of secure network, what the most described server can find out storage in book server treats survey grid described
There is the frequency/number of times corresponding to described matching result information under network, the most described server can be by above-mentioned lookup
In described server, the frequency/number of times corresponding to described matching result information that exists under described network under test of storage is sent to
Described terminal;Described terminal can receive described server and obtain, according to the described 4th, the described server that request returns/sends
The frequency/the number of times corresponding to described matching result information that exists under described network under test of middle storage is sent to described terminal,
And under described network under test, there is the frequency/number of times corresponding to described matching result information according to what described server stored
It is sent to described terminal to determine the safety of described network under test.
Or, described terminal can send the 4th acquisition request to described server, if described 4th acquisition request is used
By the access script in described first network access information or link and described second network visit is accessed in indicating described server
Ask the access script in information or access link carry out the matching analysis, obtain correspondence matching result information, according to storage
There is the frequency corresponding to described matching result information under described network under test and determine the safety of described network under test, and will be really
When the safety of fixed described network under test is sent to described terminal, then described server is transmitted across receiving described terminal
When the described 4th come obtains request, described server can obtain described terminal according to the described 4th instruction obtaining request and divide
Do not carry out network according to the default network address under described network under test and under described preset security network and access what operation produced
Described first network accesses information and described second network access information, and described first network can be visited by the most described server
Ask that the access script in information or access link link carry out with the access script in described second network access information or access
Coupling relative analysis, if it does, then described in carry out mate relative analysis will obtain the most described terminal at described network under test
Under carry out network access information produced by the network operation identical with preset security network be not tampered with or described in treat survey grid
Network is the matching result information such as secure network or possible secure network;Otherwise, carry out mating relative analysis described in will obtain such as
Described terminal carries out network access information produced by the network operation identical with preset security network under described network under test
It is tampered or described network under test has been the matching result information such as insecure network.Secondly described server can be from this service
Device finds out book server statistics/storage to each terminal be connected under described network under test to carry out network and access operation and produced
The number of times that raw network access information is tampered, or described each terminal add up/think described network under test be safety/dangerous/
The number of times of possible secure network, the most described server can find out the existence under described network under test of storage in book server
The frequency/number of times corresponding to described matching result information.The most described server can be according in the described server found out
The frequency/the number of times corresponding to described matching result information is there is to determine described network under test in store under described network under test
Safety, the safety of the described network under test determined can be sent to described terminal by last described server, described
Terminal can receive described server according to the described 4th safety obtaining the described network under test that request returns.
The most alternatively, described according to described storage exist under described network under test described matching result information institute right
The frequency answered determines the safety of described network under test, including:
If the described frequency is in default 4th threshold range, it is determined that described network under test is secure network;
If the described frequency is in default 5th threshold range, it is determined that described network under test is possible secure network;
If the described frequency is in default 6th threshold range, it is determined that described network under test is insecure network.
Described according to described storage to there is the frequency corresponding to described matching result information under described network under test true
The safety of fixed described network under test is embodied as step and may include that and judge/determine that what described server stored treats described
There is the frequency corresponding to described matching result information under survey grid network and be stored in advance in described terminal/described clothes in user/system
Business device determines in which threshold range of self-defined setting the safety of described network under test, exemplarily when as described in clothes
The frequency corresponding to described matching result information that exists under described network under test of business device storage is in user/system in advance certainly
What definition was arranged presets in the 4th threshold range, then it is believed that/determine that described network under test is secure network;When described service
The frequency corresponding to described matching result information that exists under described network under test of device storage is in user/system and makes by oneself in advance
What justice was arranged presets in the 5th threshold range, then it is believed that/determine that described network under test is for may secure network;When described clothes
The frequency corresponding to described matching result information that exists under described network under test of business device storage is in user/system in advance certainly
What definition was arranged presets in the 6th threshold range, then it is believed that/determine that described network under test is insecure network.
It should be noted that above-mentioned preset first threshold value scope, default Second Threshold scope ... until presetting the 6th
Threshold range can be the self-defined setting in described terminal/described server in advance of user/system, and above-mentioned presets the
One threshold range is until described the 6th threshold range of presetting may refer to identical threshold range, it is also possible to refer to different thresholds
Value scope, the embodiment of the present invention is not construed as limiting.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test
Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn
The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number
According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net
Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine
The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters
Row connects and communicates;Improve the safety of user's online.
Refer to Fig. 3, be the schematic flow sheet of a kind of internet security management method that another embodiment of the present invention provides,
The described method of the embodiment of the present invention can be applied in band communications such as such as smart mobile phone, panel computer, intelligence wearable devices
In the terminal of network function, specifically can be realized by the processor of these terminals.The described method of the embodiment of the present invention also includes
Following steps.
S201, acquisition terminal carry out network according to the default network address under network under test and access the produced network of operation
Access information.
S202, judge whether described network access information exists and accessed the operation exception caused by operation by described network
Data, and/or the network attack data obtained from server.
In the embodiment of the present invention, accessed operation when terminal judges to described network access information there are by described network
Caused operation exception data, and/or obtain from server network attack data time, described terminal can continue executing with
Step S203;Otherwise, terminate flow process or directly determine that described network under test is safety/possibility secure network.
S203, to described server send obtain request, described acquisition request includes described network attack data and/or institute
Stating operation exception data, described acquisition request is described for obtaining the existence under described network under test of storage in described server
The frequency corresponding to network attack data and/or described operation exception data;Or, it is used for obtaining described server according to storage
Under described network under test, have what the frequency corresponding to described network attack data and/or described operation exception data determined
The safety of described network under test.
It should be noted that when described obtain request for obtain in described server storage under described network under test
When there is the frequency corresponding to described network attack data and/or described operation exception data, the most described terminal continues executing with step
Rapid S204;When described acquisition request exists described network for obtaining described server according to store under described network under test
When attacking the safety of the described network under test that the frequency corresponding to data and/or described operation exception data determines, then described
Terminal continues executing with step S205.
S204, receive described server and obtain, according to described, the depositing under described network under test of described storage that request returns
In the frequency corresponding to described network attack data and/or described operation exception data, and treating described according to described storage
There is the frequency corresponding to described network attack data and/or described operation exception data under survey grid network and determine described network under test
Safety.
Described according to described storage under described network under test, there are described network attack data and/or described operation is different
The frequency corresponding to regular data determines that the safety of described network under test specifically includes following enforcement step: if the described frequency is in
Preset first threshold value scope, it is determined that described network under test is secure network;If the described frequency is in default Second Threshold scope,
Then determine that described network under test is for possible secure network;If the described frequency is in default 3rd threshold range, it is determined that described in treat
Survey grid network is insecure network.
S205, receive described server and obtain, according to described, the safety of described network under test that request returns.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test
Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn
The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number
According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net
Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine
The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters
Row connects and communicates;Improve the safety of user's online.
Refer to Fig. 4, be the schematic flow sheet of a kind of internet security management method that another embodiment of the present invention provides,
The described method of the embodiment of the present invention can include that all or part that above-mentioned Fig. 3 embodiment provides implements step, wherein this
The described method of bright embodiment also comprises the steps.
S301, when detecting that described terminal support connects at least one available network, to described server send correspondence
Network security verification request, wherein, described network security verification request include the network identity corresponding with described available network,
The corresponding different network identity of different available networks.
S302, receive described server according to described network security verification request return corresponding with described network identity
Safe object information.
S303, according to described network identity, safe object information corresponding for whole available networks is shown to the net preset
Network attended operation interface.
S304, according to described network identity, target available network is shown to the network attended operation interface preset, its
In, the safe object information that described target available network is corresponding is default secure network object information.
It should be noted that above-mentioned steps S304 can be another alternate embodiments of step S303.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test
Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn
The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number
According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net
Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine
The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters
Row connects and communicates;Improve the safety of user's online.
Refer to Fig. 5, be the structural representation of a kind of terminal of the embodiment of the present invention, the described terminal of the embodiment of the present invention
5 include:
Acquiring unit 50, is used for obtaining terminal and carries out network according to the default network address under network under test and access operation institute
The network access information produced;
Whether judging unit 51, be used for judging to exist in described network access information being accessed caused by operation by described network
Operation exception data, and/or from server obtain network attack data;
Determine unit 52, if the judged result for described judging unit 51 is yes, then according to described network attack data
And/or described operation exception data, determine the safety of described network under test.
Implementing of the unit related in the embodiment of the present invention refers to be correlated with in Fig. 1 to Fig. 4 correspondence embodiment
Functional unit or the description of enforcement step, be not repeated herein.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test
Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn
The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number
According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net
Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine
The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters
Row connects and communicates;Improve the safety of user's online.
Refer to Fig. 6, be the structural representation of a kind of terminal of another embodiment of the present invention, the embodiment of the present invention described
Terminal 6 may include that above-mentioned acquiring unit 50, judging unit 51, determines unit 52, wherein,
Described determining unit 52, specifically for sending, to described server, the request of acquisition, described acquisition request includes described
Network attack data and/or described operation exception data, described acquisition request for obtain in described server storage in institute
State the frequency existed under network under test corresponding to described network attack data and/or described operation exception data;Or, it is used for obtaining
Take described server and under described network under test, there is described network attack data and/or described operation exception number according to store
Safety according to the described network under test that the corresponding frequency determines;Receive described server and obtain what request returned according to described
Described storage under described network under test, there is the frequency corresponding to described network attack data and/or described operation exception data
Secondary, and under described network under test, there are described network attack data and/or described operation exception data according to described storage
The corresponding frequency determines the safety of described network under test;Or, receive described server and obtain request return according to described
The safety of described network under test.
The most alternatively,
Described determine unit 52, if being in preset first threshold value scope specifically for the described frequency, it is determined that described to be measured
Network is secure network;If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible safety net
Network;If the described frequency is in default 3rd threshold range, it is determined that described network under test is insecure network.
The most alternatively, described terminal also includes:
Transmitting element 53, for when detecting that described terminal support connects at least one available network, to described service
Device sends corresponding network security verification request, and wherein, the request of described network security verification includes corresponding with described available network
Network identity, the corresponding different network identity of different available network;
Receive unit 54, for receive described server according to described network security verification request return with described network
The safe object information that mark is corresponding;
Display unit 55, for according to described safe object information and described network identity, shows described available network
To the network attended operation interface preset.
The most alternatively,
Described display unit 55, specifically for according to described network identity, by safe result corresponding for whole available networks
Information is shown to the network attended operation interface preset;Or, according to described network identity, target available network is shown to pre-
If network attended operation interface, wherein, the safe object information that described target available network is corresponding is default secure network
Object information.
Implementing of the unit related in the embodiment of the present invention refers to be correlated with in Fig. 1 to Fig. 5 correspondence embodiment
Functional unit or the description of enforcement step, be not repeated herein.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test
Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn
The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number
According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net
Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine
The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters
Row connects and communicates;Improve the safety of user's online.
See Fig. 7, be the another kind of terminal structure schematic diagram of another embodiment of the present invention offer.This enforcement as depicted
Terminal in example may include that one or more processor 801;One or more input equipments 802, one or more outputs set
Standby 803 and memorizer 804.Above-mentioned processor 801, input equipment 802, outut device 803 and memorizer 804 are by bus 805
Connect.Memorizer 802 is used for storing instruction, and processor 801 is for performing the instruction of memorizer 802 storage.Wherein, processor
801 are used for:
Obtain terminal and carry out network access operation produced network access according to the default network address under network under test
Information;
Judge whether described network access information exists and accessed the operation exception data caused by operation by described network,
And/or from server obtain network attack data;
The most then according to described network attack data and/or described operation exception data, determine the peace of described network under test
Quan Xing.
Further, described processor 801 is additionally operable to:
Sending, to described server, the request of acquisition, described acquisition request includes described network attack data and/or described fortune
Row abnormal data, there is described network for obtain in described server storage in described acquisition request under described network under test
Attack the frequency corresponding to data and/or described operation exception data;Or, for obtain described server according to storage
Have under described network under test that the frequency corresponding to described network attack data and/or described operation exception data determines is described
The safety of network under test;
Receive described server according to described obtain request return described storage under described network under test, there is institute
State the frequency corresponding to network attack data and/or described operation exception data, and treat survey grid according to described storage described
There is the frequency corresponding to described network attack data and/or described operation exception data under network and determine the peace of described network under test
Quan Xing;Or, receive described server according to the described safety obtaining the described network under test that request returns.
Further, described processor 801 is additionally operable to:
If the described frequency is in preset first threshold value scope, it is determined that described network under test is secure network;
If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible secure network;
If the described frequency is in default 3rd threshold range, it is determined that described network under test is insecure network.
Further, described processor 801 is additionally operable to:
When detecting that described terminal support connects at least one available network, send corresponding network to described server
Security authentication request, wherein, the request of described network security verification includes the network identity corresponding with described available network, different
The corresponding different network identity of available network;
Receive the safety corresponding with described network identity that described server returns according to the request of described network security verification
Object information;
According to described safe object information and described network identity, the network being shown to described available network preset connects
Operation interface.
Further, described processor 801 is additionally operable to:
According to described network identity, the network being shown to safe object information corresponding for whole available networks preset connects
Operation interface;Or,
According to described network identity, target available network is shown to the network attended operation interface preset, wherein, described
The safe object information that target available network is corresponding is default secure network object information.
Should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central
Processing Unit, CPU), this processor can also is that other general processors, digital signal processor (Digital
Signal Processor, DSP), special IC (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device can also be the processor etc. of any routine.
Input equipment 802 can include that Trackpad, fingerprint adopt sensor (for gathering the finger print information of user and fingerprint
Directional information), mike etc., outut device 803 can include display (LCD etc.), speaker etc..
This memorizer 804 can include read only memory and random access memory, and to processor 801 provide instruction and
Data.A part for memorizer 804 can also include nonvolatile RAM.Such as, memorizer 804 can also be deposited
The information of storage device type.
In implementing, processor 801, input equipment 802 described in the embodiment of the present invention, outut device 803 can
Perform described in first embodiment and the 5th embodiment of the method for the internet security management that the embodiment of the present invention provides
Implementation, it is possible to the implementation of execution terminal described by the embodiment of the present invention, does not repeats them here.
See Fig. 8, be the structural representation of a kind of internet security management system that the embodiment of the present invention provides.As schemed
Internet security management system in the present embodiment shown may include that server 80 and terminal 81;Wherein,
Described terminal 81, for sending the first acquisition request to server 80;Receive described server according to described first
The first network that the request of acquisition returns accesses information and the second network access information, and described first network accesses information and refers to described clothes
What business device stored carries out the network produced network access information of access operation, institute according to the default network address under network under test
State the second network access information and refer to that what described server stored carries out network according to the default network address under preset security network
Accessing the produced network access information of operation, described network access information includes accessing script or accessing link;According to institute
State first network and access information and the matching analysis of described second network access information, determine the safety of described network under test;
Described server 80, for receiving the first acquisition request that terminal 81 sends;Respond described first and obtain request, will
The first network of storage accesses information and the second network access information is sent to described terminal 81;Wherein, described first network is visited
What the information of asking referred to that described server stores carry out network according to the default network address under network under test, and to access operation produced
Network access information, described second network access information refer to that described server 80 stores under preset security network according to presetting
The network address carries out network and accesses the produced network access information of operation, and described network access information includes accessing script or visit
Ask link.
The most alternatively,
Described terminal 81, is additionally operable to the access script in described first network access information or accesses link and described the
Access script or access link in two network access informations carry out the matching analysis, obtain the matching result information of correspondence;To institute
State the second acquisition request that server 80 sends including described matching result information;Described second acquisition request is used for obtaining
There is the frequency corresponding to described matching result information in store in described server under described network under test, or is used for obtaining
Take described server 80 to determine according to the frequency corresponding to described matching result information that exists under described network under test of storage
The safety of described network under test;Receive described server 80 according to described second obtain request return described storage
There is the frequency corresponding to described matching result information under described network under test, and according to described storage at described network under test
The lower frequency existed corresponding to described matching result information determines the safety of described network under test;Or, receive described service
Device 80 is according to the described second safety obtaining the described network under test that request returns;
Described server 80, is additionally operable to receive described terminal 81 and sends the second acquisition request, and described second obtains request bag
Include matching result information, described matching result information refer to described terminal by the access script in described first network access information or
Access link and described second network access information in access script or access link carry out the matching analysis, correspondence obtain
Joining object information, described second obtains request exists institute for obtain storage in described server 80 under described network under test
State the frequency corresponding to matching result information, or for obtain described server 80 according to storage under described network under test
There is the safety of the described network under test that the frequency corresponding to described matching result information determines;Responding described second acquisition please
Ask, the frequency corresponding to described matching result information that exists under described network under test of storage is sent to described terminal;Or
Person, responds described second and obtains request, there is described matching result information institute according to described storage under described network under test
The corresponding frequency determines the safety of described network under test, and the safety of the described network under test determined is sent to described terminal
81。
The most alternatively,
Described terminal 81, is additionally operable to send the 3rd acquisition request to described server 80, and described 3rd acquisition request is used for
Described server 80 is indicated by the access script in described first network access information or to access link and described second network visit
Ask that the access script in information or access link carry out the matching analysis, obtain the matching result information of correspondence, search and send institute
The frequency corresponding to described matching result information is there is in that states in server storage under described network under test;Or, it is used for referring to
Show that described server 80 by the access script in described first network access information or accesses link and described second network access
Access script in information or access link and carry out the matching analysis, obtains the matching result information of correspondence, according to storage in institute
State and there is the frequency corresponding to described matching result information under network under test and determine the safety of described network under test, and will determine
The safety of described network under test be sent to described terminal;Receive described server 80 and obtain request return according to the described 3rd
Described storage under described network under test, there is the frequency corresponding to described matching result information, and according to described storage
Under described network under test, there is the frequency corresponding to described matching result information determine the safety of described network under test;Or
Person, receives described server 80 according to the described 3rd safety obtaining the described network under test that request returns;
Described server 80, is additionally operable to receive described terminal 81 and sends the 3rd acquisition request, and the described 3rd obtains request uses
By the access script in described first network access information or link and described second network is accessed in indicating described server 80
Access script or access link in access information carry out the matching analysis, obtain the matching result information of correspondence, and search described
In server 80 there is the frequency corresponding to described matching result information in storage under described network under test;Or, it is used for referring to
Show that described server 80 by the access script in described first network access information or accesses link and described second network access
Access script in information or access link and carry out the matching analysis, obtains the matching result information of correspondence, and according to storage
There is the frequency corresponding to described matching result information under described network under test and determine the safety of described network under test;Response institute
State the 3rd acquisition request, access link by described first or the first access script and described second accesses link or second and accesses foot
Originally carry out the matching analysis, obtain the matching result information of correspondence, and search in described server 80 storage treat survey grid described
The frequency corresponding to described matching result information is there is under network, and by described of the existence under described network under test of described storage
Join the frequency corresponding to object information and be sent to described terminal 81;Or, access link or first by described first and access script
Access link with described second or the second access script carries out the matching analysis, obtain the matching result information of correspondence, and search institute
There is the frequency corresponding to described matching result information in that states in server 80 storage under described network under test, deposits according to described
The frequency corresponding to described matching result information that exists under described network under test of storage determines the safety of described network under test,
The safety of the described network under test determined is sent to described terminal 81.
The most alternatively,
Described terminal 81, is additionally operable to send the 4th acquisition request to described server 80, and described 4th acquisition request includes
Described network attack data and/or described operation exception data, described 4th acquisition request is used for obtaining in described server 80
The frequency corresponding to described network attack data and/or described operation exception data is there is in store under described network under test;
Or, for obtain described server 80 according to storage exist under described network under test described network attack data and/or
The safety of the described network under test that the frequency corresponding to described operation exception data determines;Receive described server 80 according to institute
State obtain request return described storage under described network under test, there are described network attack data and/or described operation is different
The frequency corresponding to regular data, and according to described storage exist under described network under test described network attack data and/or
The frequency corresponding to described operation exception data determines the safety of described network under test;Or, receive described server 80
According to the described safety obtaining the described network under test that request returns;
Described server 80, is additionally operable to receive the 4th acquisition request that described terminal 81 sends;Described 4th obtains request
Under described network under test, described network attack data and/or described operation is there is for obtain in described server 80 storage
The frequency corresponding to abnormal data;Or, for obtaining described server 80 existing under described network under test according to storage
The safety of the described network under test that the frequency corresponding to described network attack data and/or described operation exception data determines;
Responding the described 4th and obtain request, there is described network attack in that searches in described server 80 storage under described network under test
The frequency corresponding to data and/or described operation exception data, and by described for existing under described network under test of described storage
The frequency corresponding to network attack data and/or described operation exception data is sent to described terminal 81;Or, search described clothes
In business device 80, storage exists corresponding to described network attack data and/or described operation exception data under described network under test
The frequency, and under described network under test, there is described network attack data and/or described operation exception according to described storage
The frequency corresponding to data determines the safety of described network under test, and the safety of the described network under test determined is sent to institute
State terminal 81.
The most alternatively,
Described terminal 81, is additionally operable to when detecting that described terminal support connects at least one available network, to described clothes
Business device 80 sends the network security verification request of correspondence, and wherein, the request of described network security verification includes and described available network
Corresponding network identity, the corresponding different network identity of different available networks;Receive described server 80 according to described network
The safe object information corresponding with described network identity that security authentication request returns;According to described safe object information and described
Network identity, is shown to the network attended operation interface preset by described available network.
Described server 80, is additionally operable to receive the network security verification request that described terminal 81 sends;Described network security
Checking request includes the network identity that at least one available network that described terminal support connects is corresponding, different available networks pair
Answer different network identities;Respond described network security verification information, the safety knot corresponding with described network identity that will search
Really information is sent to described terminal 81, in order to described terminal 81 knows the safety of each available network.
The embodiment of the present invention can by terminal obtain storage in server under network under test according to the default network address
Carry out network and access the weight under preset security network of storage in operation produced first network access information, and server
Newly carry out network according to the described default network address and access produced second network access information of operation, according further to right
Described first network accesses information and the matching analysis of described second network access information, determines the safety of described network under test
Property;So can contrast the network access information of server record thus simply and reliably draw/determine the safety of network under test
Property, and then user/terminal can select safely automatically, intelligently or safety network higher is attached and communicates;
Improve the safety of user's online.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example that the embodiments described herein describes
Unit and algorithm steps, it is possible to electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware
With the interchangeability of software, the most generally describe composition and the step of each example according to function.This
A little functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Specially
Industry technical staff can use different methods to realize described function to each specifically should being used for, but this realization is not
It is considered as beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience of description and succinctly, foregoing description be
System, terminal and the specific works process of unit, be referred to the corresponding process in preceding method embodiment, do not repeat them here.
In several embodiments provided herein, it should be understood that disclosed system, terminal and method, permissible
Realize by another way.Such as, device embodiment described above is only schematically, such as, and described unit
Dividing, be only a kind of logic function and divide, actual can have other dividing mode, the most multiple unit or assembly when realizing
Can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs.It addition, it is shown or beg for
The coupling each other of opinion or direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit
Or communication connection, it is also possible to be electric, machinery or other form connect.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit
The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme
Purpose.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to be that two or more unit are integrated in a unit.Above-mentioned integrated
Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit
Time, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part in other words prior art contributed, or this technical scheme completely or partially can be with the form of software product
Embodying, this computer software product is stored in a storage medium, including some instructions with so that a computer
Equipment (can be personal computer, server, or the network equipment etc.) performs the complete of method described in each embodiment of the present invention
Portion or part steps.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any
Those familiar with the art, in the technical scope that the invention discloses, can readily occur in the amendment of various equivalence or replace
Changing, these amendments or replacement all should be contained within protection scope of the present invention.Therefore, protection scope of the present invention should be with right
The protection domain required is as the criterion.
Claims (10)
1. the method for an internet security management, it is characterised in that described method includes:
Obtain terminal and carry out the network produced network access information of access operation according to the default network address under network under test;
Judge whether described network access information exists the operation exception data by caused by the access operation of described network, and/
Or from server obtain network attack data;
The most then according to described network attack data and/or described operation exception data, determine the safety of described network under test
Property.
2. the method for claim 1, it is characterised in that described according to described network attack data and/or described operation
Abnormal data, determines the safety of described network under test, including:
Sending, to described server, the request of acquisition, described acquisition request includes that described network attack data and/or described operation are different
Regular data, there is described network attack for obtain in described server storage in described acquisition request under described network under test
The frequency corresponding to data and/or described operation exception data;Or, for obtain described server according to storage described
Have under network under test that the frequency corresponding to described network attack data and/or described operation exception data determines is described to be measured
The safety of network;
Receive described server according to described obtain request return described storage under described network under test, there is described net
Network attacks data and/or the frequency corresponding to described operation exception data, and according to described storage under described network under test
There is the frequency corresponding to described network attack data and/or described operation exception data and determine the safety of described network under test
Property;Or, receive described server according to the described safety obtaining the described network under test that request returns.
3. method as claimed in claim 2, it is characterised in that described existing under described network under test according to described storage
The frequency corresponding to described network attack data and/or described operation exception data determines the safety of described network under test, bag
Include:
If the described frequency is in preset first threshold value scope, it is determined that described network under test is secure network;
If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible secure network;
If the described frequency is in default 3rd threshold range, it is determined that described network under test is insecure network.
4. the method as described in any one in claim 1-3, it is characterised in that also include:
When detecting that described terminal support connects at least one available network, send corresponding network security to described server
Checking request, wherein, the request of described network security verification includes the network identity corresponding with described available network, and different is available
The corresponding different network identity of network;
Receive the safe result corresponding with described network identity that described server returns according to the request of described network security verification
Information;
According to described safe object information and described network identity, described available network is shown to the network attended operation preset
Interface.
5. method as claimed in claim 4, it is characterised in that described according to described safe object information with described network mark
Know, described available network is shown to the network attended operation interface preset, including:
According to described network identity, safe object information corresponding for whole available networks is shown to the network attended operation preset
Interface;Or,
According to described network identity, target available network is shown to the network attended operation interface preset, wherein, described target
The safe object information that available network is corresponding is default secure network object information.
6. a terminal, it is characterised in that described terminal includes:
Acquiring unit, is used for obtaining terminal and carries out produced by network access operation according to the default network address under network under test
Network access information;
Judging unit, is accessed the operation caused by operation for judging whether to exist in described network access information by described network
Abnormal data, and/or the network attack data obtained from server;
Determine unit, if being yes for the judged result of described judging unit, then according to described network attack data and/or described
Operation exception data, determine the safety of described network under test.
7. terminal as claimed in claim 6, it is characterised in that
Described determining unit, specifically for sending, to described server, the request of acquisition, described acquisition request includes that described network is attacked
Hit data and/or described operation exception data, described acquisition request for obtain storage in described server described to be measured
The frequency corresponding to described network attack data and/or described operation exception data is there is under network;Or, it is used for obtaining described
Server according to storage exist under described network under test described network attack data and/or described operation exception data institute right
The safety of the described network under test that the frequency answered determines;Receive described server to deposit described in request return according to described acquisition
Storage under described network under test, there is the frequency corresponding to described network attack data and/or described operation exception data, and
Existing under described network under test corresponding to described network attack data and/or described operation exception data according to described storage
The frequency determine the safety of described network under test;Or, receive described server and obtain described in request return according to described
The safety of network under test.
8. terminal as claimed in claim 7, it is characterised in that
Described determine unit, if being in preset first threshold value scope specifically for the described frequency, it is determined that described network under test is
Secure network;If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible secure network;If institute
State the frequency and be in default 3rd threshold range, it is determined that described network under test is insecure network.
9. the terminal as described in any one in claim 6-8, it is characterised in that described terminal also includes:
Transmitting element, for when detecting that described terminal support connects at least one available network, sends to described server
Corresponding network security verification request, wherein, the request of described network security verification includes the network corresponding with described available network
Mark, the corresponding different network identity of different available networks;
Receive unit, for receive described server according to described network security verification request return with described network identity pair
The safe object information answered;
Display unit, for according to described safe object information and described network identity, is shown to preset by described available network
Network attended operation interface.
10. terminal as claimed in claim 9, it is characterised in that
Described display unit, specifically for according to described network identity, showing safe object information corresponding for whole available networks
Show default network attended operation interface;Or, according to described network identity, target available network is shown to the net preset
Network attended operation interface, wherein, the safe object information that described target available network is corresponding is default secure network result letter
Breath.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610822777.5A CN106209918A (en) | 2016-09-13 | 2016-09-13 | The method of a kind of internet security management and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610822777.5A CN106209918A (en) | 2016-09-13 | 2016-09-13 | The method of a kind of internet security management and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106209918A true CN106209918A (en) | 2016-12-07 |
Family
ID=58067444
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610822777.5A Withdrawn CN106209918A (en) | 2016-09-13 | 2016-09-13 | The method of a kind of internet security management and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209918A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107979845A (en) * | 2017-05-03 | 2018-05-01 | 上海掌门科技有限公司 | The indicating risk method and apparatus of wireless access point |
CN112565228A (en) * | 2020-11-27 | 2021-03-26 | 北京高途云集教育科技有限公司 | Client network analysis method and device |
CN109902491B (en) * | 2019-02-28 | 2021-08-31 | 苏州浪潮智能科技有限公司 | Safe operation management architecture of server and server |
CN113591080A (en) * | 2021-06-16 | 2021-11-02 | 盐城一方信息技术有限公司 | Computer network safety control system and control method |
CN113875205A (en) * | 2019-05-31 | 2021-12-31 | 微软技术许可有限责任公司 | Suppressing security risks associated with insecure websites and networks |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103891332A (en) * | 2011-08-12 | 2014-06-25 | F-赛酷公司 | Detection of suspect wireless access points |
CN104219670A (en) * | 2014-09-03 | 2014-12-17 | 珠海市君天电子科技有限公司 | Method and system for identifying false wifi (wireless fidelity), client side and server side |
CN104703184A (en) * | 2015-02-12 | 2015-06-10 | 中山大学 | Safe WiFi hot spot information publishing method |
CN105162768A (en) * | 2015-07-31 | 2015-12-16 | 腾讯科技(深圳)有限公司 | Method and device for detecting phishing Wi-Fi hotspots |
CN105357221A (en) * | 2015-12-04 | 2016-02-24 | 北京奇虎科技有限公司 | Method and apparatus for identifying phishing website |
CN105611534A (en) * | 2014-11-25 | 2016-05-25 | 阿里巴巴集团控股有限公司 | Method and device for recognizing pseudo WiFi network by wireless terminal |
-
2016
- 2016-09-13 CN CN201610822777.5A patent/CN106209918A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103891332A (en) * | 2011-08-12 | 2014-06-25 | F-赛酷公司 | Detection of suspect wireless access points |
CN104219670A (en) * | 2014-09-03 | 2014-12-17 | 珠海市君天电子科技有限公司 | Method and system for identifying false wifi (wireless fidelity), client side and server side |
CN105611534A (en) * | 2014-11-25 | 2016-05-25 | 阿里巴巴集团控股有限公司 | Method and device for recognizing pseudo WiFi network by wireless terminal |
CN104703184A (en) * | 2015-02-12 | 2015-06-10 | 中山大学 | Safe WiFi hot spot information publishing method |
CN105162768A (en) * | 2015-07-31 | 2015-12-16 | 腾讯科技(深圳)有限公司 | Method and device for detecting phishing Wi-Fi hotspots |
CN105357221A (en) * | 2015-12-04 | 2016-02-24 | 北京奇虎科技有限公司 | Method and apparatus for identifying phishing website |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107979845A (en) * | 2017-05-03 | 2018-05-01 | 上海掌门科技有限公司 | The indicating risk method and apparatus of wireless access point |
CN109902491B (en) * | 2019-02-28 | 2021-08-31 | 苏州浪潮智能科技有限公司 | Safe operation management architecture of server and server |
CN113875205A (en) * | 2019-05-31 | 2021-12-31 | 微软技术许可有限责任公司 | Suppressing security risks associated with insecure websites and networks |
US11637850B2 (en) | 2019-05-31 | 2023-04-25 | Microsoft Technology Licensing, Llc | Mitigating security risks associated with unsecured websites and networks |
CN112565228A (en) * | 2020-11-27 | 2021-03-26 | 北京高途云集教育科技有限公司 | Client network analysis method and device |
CN113591080A (en) * | 2021-06-16 | 2021-11-02 | 盐城一方信息技术有限公司 | Computer network safety control system and control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shabtai et al. | Mobile malware detection through analysis of deviations in application network behavior | |
CN103634294B (en) | Information verifying method and device | |
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
CN106209918A (en) | The method of a kind of internet security management and terminal | |
US20160241589A1 (en) | Method and apparatus for identifying malicious website | |
US10491548B2 (en) | Techniques to configure bot flow | |
US20130097659A1 (en) | System and method for whitelisting applications in a mobile network environment | |
CN104767713B (en) | Account binding method, server and system | |
EP2769327A1 (en) | System and method for whitelisting applications in a mobile network environment | |
CN107580005A (en) | Website protection method, device, website safeguard and readable storage medium storing program for executing | |
CN106790727B (en) | Information push method and device | |
Pal et al. | IoT technical challenges and solutions | |
CN106713266B (en) | Method, device, terminal and system for preventing information leakage | |
CN104468464A (en) | Authentication method, device and system | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN105635122A (en) | Wifi access method and device and electronic equipment | |
CN104735657B (en) | Security terminal verification method, wireless access point binding method, apparatus and system | |
CN104317648B (en) | A kind of method and apparatus of monitoring advertisement | |
CN107612901A (en) | One kind applies encryption method and terminal | |
CN106302519A (en) | The method of a kind of internet security management and terminal | |
CN106851779A (en) | A kind of method and mobile terminal for recognizing access point and focus | |
CN113468515A (en) | User identity authentication method and device, electronic equipment and storage medium | |
CN106534324A (en) | Data sharing method and cloud server | |
CN105306202B (en) | Auth method, device and server | |
CN105357224B (en) | A kind of registration of intelligent domestic gateway, removing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161207 |
|
WW01 | Invention patent application withdrawn after publication |