CN106209918A - The method of a kind of internet security management and terminal - Google Patents

The method of a kind of internet security management and terminal Download PDF

Info

Publication number
CN106209918A
CN106209918A CN201610822777.5A CN201610822777A CN106209918A CN 106209918 A CN106209918 A CN 106209918A CN 201610822777 A CN201610822777 A CN 201610822777A CN 106209918 A CN106209918 A CN 106209918A
Authority
CN
China
Prior art keywords
network
under test
terminal
server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610822777.5A
Other languages
Chinese (zh)
Inventor
向攀
陈澜波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610822777.5A priority Critical patent/CN106209918A/en
Publication of CN106209918A publication Critical patent/CN106209918A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention discloses method and the terminal of a kind of internet security management, wherein method includes: obtains terminal and carries out the network produced network access information of access operation according to the default network address under network under test;Judge whether described network access information exists and accessed the operation exception data caused by operation, and/or the network attack data obtained from server by described network;The most then according to described network attack data and/or described operation exception data, determine the safety of described network under test.Use the embodiment of the present invention, secure network, the Internet Security of protection user can be connected to according to the demand of user from main separation.

Description

The method of a kind of internet security management and terminal
Technical field
The present invention relates to security technology area, particularly relate to method and the terminal of the management of a kind of internet security.
Background technology
WIFI is Institute of Electrical and Electric Engineers IEEE (Institute of Electrical and Electronics Engineers, IEEE) industrial standard (IEEE 802.11) of a wireless communication that defines, it is possible to To regard that the one of 3G technology is supplemented as.WiFi technology, as Bluetooth technology, belongs to use in office and family Wireless LAN communication technology.WIFI is a kind of short range wireless transmission technology, it is possible to support the Internet in the range of hundreds of feet Accessing radio signal, its great advantage is that transmission speed is higher, and in the case of signal is more weak or noisy, bandwidth is adjustable Whole, effectively ensure stability and the reliability of network.But it is as the continuous expansion of WLAN application, its peace Full problem the most increasingly comes into one's own.
In some megastore, communal facility, citizen can use wireless network much smootherly, is namely commonly called as WIFI.Generally these places are because of the open network used, and do not have password, so searching for nothing with smart mobile phone, panel computer etc. Gauze network, just can connect easily.In the epoch of WiFi, rubbing WiFi becomes one basic " existence technical ability ".But enjoying While WiFi offers convenience, the security precautions surfed the Net general lack of WiFi due to people, WiFi has become as safely respectively Plant network trap, the severely afflicated area of fishing swindle.
For solving the problems referred to above, it is typically all at present by the application data needing transmission are encrypted or set up The mode of secure connection passage (such as VPN passage) ensures the data safety after accessing public WiFi.However, it has been found in practice that Terminal can not provide the user the safety information of public WIFI network in real time, and domestic consumer also cannot be by complicated encryption Means are guaranteed under public WiFi network the safety carried out data transmission, it is therefore desirable to a kind of simple and reliable internet security Managed Solution.
Summary of the invention
The embodiment of the present invention provides the method for a kind of internet security management, can promote the safety of internet security management And practicality.
First aspect, the method embodiments providing the management of a kind of internet security, the method includes:
Obtain terminal and carry out network access operation produced network access according to the default network address under network under test Information;
Judge whether described network access information exists and accessed the operation exception data caused by operation by described network, And/or from server obtain network attack data;
The most then according to described network attack data and/or described operation exception data, determine the peace of described network under test Quan Xing.
On the other hand, embodiments providing a kind of terminal, this terminal includes:
Acquiring unit, is used for obtaining terminal and carries out network according to the default network address under network under test and access operation and produced Raw network access information;
Whether judging unit, accessed caused by operation by described network for judging to exist in described network access information Operation exception data, and/or the network attack data obtained from server;
Determine unit, if being yes for the judged result of described judging unit, then according to described network attack data and/or Described operation exception data, determine the safety of described network under test.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters Row connects and communicates;Improve the safety of user's online.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is some embodiments of the present invention, general for this area From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the structural representation of a kind of network frame that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of a kind of internet security management method that the embodiment of the present invention provides;
Fig. 3 is the schematic flow sheet of a kind of internet security management method that another embodiment of the present invention provides;
Fig. 4 is the schematic flow sheet of a kind of internet security management method that another embodiment of the present invention provides;
Fig. 5 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 6 is the structural representation of a kind of terminal that another embodiment of the present invention provides;
Fig. 7 is the structural representation of a kind of terminal that another embodiment of the present invention provides;
Fig. 8 is the structural representation of a kind of internet security management system that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into the scope of protection of the invention.
Should be appreciated that when using in this specification and in the appended claims, term " includes " and " comprising " instruction Described feature, entirety, step, operation, element and/or the existence of assembly, but it is not precluded from one or more further feature, whole Body, step, operation, element, assembly and/or the existence of its set or interpolation.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Hereafter clearly indicating other situation, otherwise " ", " " and " being somebody's turn to do " of singulative is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to the one or more any combination being associated in the item listed and likely combine, and including that these combine.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if be detected that [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to really Fixed " or " [described condition or event] once being detected " or " in response to [described condition or event] being detected ".
In implementing, the terminal described in the embodiment of the present invention includes but not limited to such as have touch sensitive surface Mobile phone, laptop computer or the tablet PC of (such as, touch-screen display and/or touch pad) etc other just Portable device.It is to be further understood that in certain embodiments, described equipment not portable communication device, but have tactile Touch the desk computer of sensing surface (such as, touch-screen display and/or touch pad).
In discussion below, describe the terminal including display and touch sensitive surface.It is, however, to be understood that It is that terminal can include such as physical keyboard, mouse and/or control other physical user-interface device one or more of bar.
Terminal supports various application programs, such as following in one or more: drawing application program, demonstration application journey Sequence, word-processing application, website create application program, dish imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support the application of application program, photo management application program, digital camera application program, digital camera application program, web-browsing Program, digital music player application and/or video frequency player application program.
The various application programs that can perform in terminal can use at least one of such as touch sensitive surface public Physical user-interface device.Among applications and/or can adjust in corresponding application programs and/or change and touch sensitive table The corresponding information of display in one or more functions in face and terminal.So, the public physical structure of terminal (such as, touches Sensing surface) the various application programs with the most directly perceived and transparent user interface can be supported.
The embodiment of the invention discloses a kind of internet security management method and terminal, contribute to user select safety or The higher network of safety carries out data communication.It is described in detail individually below.
In order to be best understood from method and the terminal of a kind of internet security management that the embodiment of the present invention provides, the most right The network architecture that the embodiment of the present invention is suitable for is described.Referring to Fig. 1, Fig. 1 is the open one provided of the embodiment of the present invention The structural representation of network architecture.As it is shown in figure 1, this network architecture schematic diagram can include service equipment and terminal, wherein, clothes Business equipment can include server, service host, service system and service platform etc., and terminal can include smart mobile phone (such as Android phone, IOS mobile phone etc.), PC, panel computer, palm PC, mobile internet device (MID, Mobile Internet Devices) or the internet device such as wearable intelligent equipment.In the network architecture shown in Fig. 1, clothes Business equipment can be communicatively coupled with terminal by the Internet, understands that following server is as service equipment for the convenience of the user One representative with described terminal carry out related communication description.
See Fig. 2, be the schematic flow sheet of the embodiment of the present invention a kind of internet security management method of offer, as shown in the figure Internet security manager may comprise steps of:
S101, acquisition terminal carry out network according to the default network address under network under test and access the produced network of operation Access information.
In the embodiment of the present invention, user can open the network savvy of this terminal so that it is be connected to a network under test (as Strange WiFi network) under carry out net according to the one or more default network address of the most self-defined setting/input of user/system When network accesses operation, described terminal or corresponding server can record above-mentioned network and access produced institute in operating process Have or subnetwork accesses information.Described terminal can obtain this terminal from this terminal and carry out above-mentioned net under network under test Network accesses the described network access information that operation is produced/recorded, and/or described terminal can pass through wire/wireless communication Mode (such as WiFi, bluetooth, data wire etc.) obtain from correspondingly server as described in terminal be connected to as described under network under test Carry out network according to the default network address and access the produced network access information of operation.
It is understood that when described terminal is connected to some or multiple uncertain network under test (is such as connected to footpath between fields Raw WiFi) time, described terminal can by this network under test carry out the network of correspondence access operation time, described terminal can be according to The access information such as the network address, access link, access script of such as presetting of the self-defined setting of user/system carry out the mutual of correspondence Internet interview, i.e. network access operation, all or part that described terminal can be carried out under this network under test with minute book terminal Access record information, that is to say network access information.Owing to network under test may be unsafe network, as described terminal exists Being connected under strange unsafe WiFi, unsafe WiFi equipment may be distorted terminal and be sent such as to associated server Setting network address, access script etc. access information, thus reach steal privacy of user data or destroy subscriber equipment (i.e. Described terminal) or the purpose of user data (i.e. terminal data).Alternatively, described terminal can receive or obtain this terminal and treating Carry out network according to the above-mentioned access information such as the network address, access link, access script of such as presetting under survey grid network and access behaviour Make the corresponding first network produced and access information, (being i.e. the network access information in above-mentioned steps S101).
Alternatively, if terminal disconnection is connected with the network of network under test (such as strange WiFi) in certain time, will When described terminal is connected under some or the preset security network of multiple self-defined setting of user/system, described terminal is permissible Memorizer from this terminal reads above-mentioned terminal under network under test, carries out the access letter corresponding to network access operation Breath (such as the default network address, accesses link, access script etc.), and the most described terminal can be again according to above-mentioned access Information again carries out network and accesses operation, and the most described terminal can receive or obtain server and access according to above-mentioned network The second network access information that operation is returned.
Wherein, described preset security network may refer to the network of user's hand labeled/setting, as user own home creates WiFi network, data network etc., the network of labelling can be uploaded to the server of correspondence further, in order to share this net The safety of network, or official registers in server/system and obtains the network etc. of certification, the embodiment of the present invention does not limits Fixed.
The most such as, it is assumed that terminal is currently connected under certain network under test (such as strange WiFi), and present user is at end Inputting network address " http://www.***.com " in end and desire access to www.***.com, terminal can be accessed by WiFi equipment " http://www.***.com " www.***.com, owing to this strange WiFi is probably insecure network, i.e. WiFi equipment may For pseudo-base station equipment, now terminal accesses " http://www.***.com " Baidu.com by unsafe pseudo-base station equipment Standing, this unsafe pseudo-base station equipment may distort above-mentioned Baidu network address, such as becomes " http://www.***.com/ Index.php.tn=site888_3_pg " etc. so make what server received target access address and terminal send Reference address differs, but when terminal carries out Baidu's network address access by preset security network (such as safe WiFi), server The target access address received is by consistent for the reference address sended over terminal.
Alternatively, net is such as preset by above-mentioned network under test according to the self-defined setting of user/system when described terminal When network address, the access information such as link, access script that accesses carry out network access operation, owing to described network under test is probably not The network of safety, this network is also possible to during accessing operation can be by network attack, the most described server or described end End can with minute book terminal under being connected to this network under test such as network hole, safety defect etc. received by (strange WIFI) For representing the described terminal network attack data by network attack;And/or, when described terminal is connected to described network under test If occurring abnormal during the lower the most described terminal of user/system, the most described terminal can be treated being connected to this with minute book terminal Under survey grid network, there are abnormal operation exception data (such as application abnormal data, system operation exception data etc.) in this terminal operating.
It should be noted that above-mentioned first network accesses information and the second network access information refers respectively to described terminal Under network under test and preset security network, carry out identical network access the produced network access information of operation, described network Access information can include such as access script, access link, network attack data, operation exception data or other for The data message producing or recorded in network accesses operating process, the embodiment of the present invention is not construed as limiting.
Alternatively, this terminal of record/get can be connected under described network under test and described pre-by described terminal If carrying out identical network under secure network to access the produced network access information of operation (the most above-mentioned first network access letter Breath and the second network access information) and record to such as network attack data, operation exception data and described in treat survey grid The access information such as the SSID (Service Set Identifier, service set) of network, MAC Address, network name are uploaded/are sent out Give described server, in order to described server record/storage is about the access information of described network under test.
Described terminal can include smart mobile phone (such as Android phone, IOS mobile phone etc.), PC, panel computer, The Internets such as palm PC, mobile internet device (MID, Mobile Internet Devices) or wearable intelligent equipment Equipment, the embodiment of the present invention is not construed as limiting.
S102, judge whether described network access information exists and accessed the operation exception caused by operation by described network Data, and/or the network attack data obtained from server.
In the embodiment of the present invention, terminal may determine that the described network access information got in above-mentioned steps S101 (i.e. First network accesses information) in whether exist by above-mentioned network access operation caused/the operation exception data that produce (are such as System operation exception is slow, application program occurs collapse etc. for no reason), and/or the network attack data obtained from server, if Exist, then described terminal continues executing with step S103;Otherwise, flow process is terminated.
S103, according to described network attack data and/or described operation exception data, determine the safety of described network under test Property.
In the embodiment of the present invention, terminal can be according to described network attack data and/or described operation exception abnormal data Determine the safety of described network under test.
Alternatively, the most described according to described network attack data and/or described operation exception data, determine described to be measured The safety of network, including:
Sending the request of acquisition (can be the first acquisition request here) to described server, described (first) obtains request bag Including described network attack data and/or described operation exception data, described (first) acquisition request is used for obtaining described server Middle storage under described network under test, there is the frequency corresponding to described network attack data and/or described operation exception data Secondary;Or, for obtain described server according to storage exist under described network under test described network attack data and/or The safety of the described network under test that the frequency corresponding to described operation exception data determines;
Receive described server according to described (first) obtain request return described storage under described network under test There is the frequency corresponding to described network attack data and/or described operation exception data, and according to described storage described Exist under network under test the frequency corresponding to described network attack data and/or described operation exception data determine described in treat survey grid The safety of network;Or, receive described server and obtain the safety of the described network under test that request returns according to described (first) Property.
In implementing, described terminal can send the request of acquisition or first to described server and obtain request, if institute Under described network under test, there are described network attack data in the first acquisition request of stating for obtain in described server storage And/or the frequency corresponding to described operation exception data, then described server receive described first obtain request time, institute State server to find out each terminal of record/storage in book server from book server and be connected under described network under test Carry out having when identical or different network accesses operation corresponding to network attack data and/or operation exception data is secondary Number/the frequency, in the described server that server described further can will find, storage exists under described network under test The frequency corresponding to described network attack data and/or described operation exception data sends/returns to described terminal, described terminal Described server can be received deposit under described network under test according to what the described described server obtaining request return stored In the frequency corresponding to described network attack data and/or described operation exception data.Alternatively, it is connected to institute in each terminal State and carry out after different or identical network accesses operation under network under test, each terminal this terminal record be recorded in institute State and carry out network under network under test and access the produced network access information of operation (as accessed script, accessing link, operation exception Data, network attack data etc.) it is sent to described server;Described server can be added up and store each terminal and treat described Carry out under survey grid network network access network access information corresponding to operation (as described in there is described operation under network under test different Number of times/the frequencys of regular data or described network attack data etc., described network under test are marked as safety/dangerous/possible peace Number of times/the frequency etc. of whole network).
Or, described terminal can send, to described server, the request of acquisition, if described acquisition request is used for obtaining institute State server and under described network under test, there is described network attack data and/or described operation exception data institute according to store The safety of the described network under test that the corresponding frequency determines, then when described server receives described acquisition request, institute State server to find out each terminal of record/storage in book server from book server and be connected under described network under test Carry out having when identical or different network accesses operation corresponding to network attack data and/or operation exception data is secondary Number/the frequency, the most described server can be according to the existence under described network under test of storage in the described server found The frequency corresponding to described network attack data and/or described operation exception data determines the safety of described network under test, Further the safety of the described network under test determined is sent to described terminal;Described terminal can receive described service Device is according to the described safety obtaining the described network under test that request returns/sends.
The most alternatively, described according to described storage exist under described network under test described network attack data and/ Or the frequency corresponding to described operation exception data determines the safety of described network under test, including:
If the described frequency is in preset first threshold value scope, it is determined that described network under test is secure network;
If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible secure network;
If the described frequency is in default 3rd threshold range, it is determined that described network under test is insecure network.
Described according to described storage under described network under test, there are described network attack data and/or described operation is different The frequency corresponding to regular data determine the safety of described network under test be embodied as step may include that judge/determine described Existing under described network under test corresponding to described network attack data and/or described operation exception data of server storage The frequency is in user/system is stored in advance in described terminal/described server to come in which threshold range of self-defined setting Determine the safety of described network under test, exemplarily when as described in server store as described in exist under network under test as described in The frequency corresponding to network attack data and/or described operation exception data is in the pre-of the most self-defined setting of user/system If in the range of first threshold, then it is believed that/determine that described network under test is secure network;When described server store in institute State and there is the frequency corresponding to described network attack data and/or described operation exception data under network under test and be in user/be Unite in the range of the default Second Threshold of the most self-defined setting, then it is believed that/determine that described network under test is for may safety net Network;Under described network under test, described network attack data and/or described operation exception number is there is when what described server stored Be in the presetting in the 3rd threshold range of the most self-defined setting of user/system according to the corresponding frequency, then it is believed that/determine Described network under test is insecure network.
The most alternatively, described method also includes:
When detecting that described terminal support connects at least one available network, send corresponding network to described server Security authentication request, wherein, the request of described network security verification includes the network identity corresponding with described available network, different The corresponding different network identity of available network;
Receive the safety corresponding with described network identity that described server returns according to the request of described network security verification Object information;
According to described safe object information and described network identity, the network being shown to described available network preset connects Operation interface.
When user opens the network savvy of terminal, described terminal can detect and search this terminal and can support to connect One or more available networks (as user opens the WiFi function of terminal, described terminal may search near broadcast The WiFi network of SSID signal, or non-Broadcast SSIDs signal but this terminal is preserved hiding of the SSID of its network and password WiFi network), thus form the available network list that described terminal allows to connect;Or, described terminal is having been connected to one In the case of network, it is also possible to scan for other attachable available networks, timing updates this terminal can support connection Available network list.The most described terminal can pass through the current network connected or by data network (such as 2G/3G etc.) to institute Stating server and send corresponding network security verification request, the request of described network security verification includes the network of above-mentioned available network Mark, different available network correspondences has different network identities, that is to say that described terminal can be searched above-mentioned by network Rope to available network list in SSID and MAC Address be sent to described server, in order to described server authentication also returns The safety of all or part available network in described available network list.Described server is transmitted across receiving described terminal During the described network security verification request come, described server will respond the request of described network security verification, in book server Search and determine the safe object information of all or part network in above-mentioned available network list, that is to say and find out respectively and institute State the network security object information that network identity is corresponding, the safety knot corresponding with described network identity that will find out further Really information is sent to described terminal.Described terminal can receive what described server returned according to the request of described network security verification The safe object information corresponding with described network identity, terminal described further can also according to described safe object information and Described network identity, is shown to above-mentioned available network in the network attended operation interface preset, that is to say that described terminal can With the lookup result (the safest object information) according to above-mentioned server, in the peace of each available network described network shown behind Quan Xing, as shown the letter such as " safety/trustable network ", " insecure network " " possible secure network " after the SSID of each WiFi Breath.
Alternatively, the most described according to described safe object information and described network identity, described available network is shown To the network attended operation interface preset, including:
According to described network identity, the network being shown to safe object information corresponding for whole available networks preset connects Operation interface;Or,
According to described network identity, target available network is shown to the network attended operation interface preset, wherein, described The safe object information that target available network is corresponding is default secure network object information.
Corresponding to whole available networks that above-mentioned terminal support can be connected according to described network identity by described terminal Safe object information be shown to user/system in advance in this terminal self-defined setting preset network attended operation circle Face;Or, target available network can be shown to, according to described network identity, network attended operation circle preset by described terminal On face, the safe object information that wherein said target available network is corresponding is that user/system is in advance in the self-defined setting of this terminal Preset secure network object information, as safety/trustable network or may secure network, be i.e. that described terminal can be by basis Described network identity and described safe object information, will determine as safe or may be safe target available network and be shown to institute State on default network attended operation interface.
The most alternatively, described method also includes:
Terminal to server sends the second acquisition request;
Receive described server and obtain, according to described second, first network access information and the visit of the second network that request returns Asking information, described first network accesses information and refers to that what described server stored is carried out according to the default network address under network under test Network accesses the produced network access information of operation, described second network access information refer to that described server store default Carrying out network according to the default network address under secure network and access the produced network access information of operation, described network accesses letter Breath includes accessing script or accessing link;
Access information and the matching analysis of described second network access information according to described first network, determine described in treat The safety of survey grid network.
Described terminal can by the way of wire/wireless communication (such as wifi, bluetooth, data wire etc.) to as described in server Send the second acquisition request, described second obtain request for the first network obtaining in described server storage access information and Second network access information, described first network accesses information and may refer to described terminal under some or multiple network under test Carry out produced network during network accesses operation according to the default network address of the self-defined setting of user/system to access Information, described second network access information may refer to that described terminal determines in this terminal/subscriber some or multiple preset Again carry out network access according to the above-mentioned default network address (such as data network, 2G/3G/4G network) under secure network to operate Produced network access information in journey.Described terminal to described server send above-mentioned second obtain request after, described clothes Business device can receive and respond described second and obtain request, separately or concurrently the described terminal of book server record/storage is existed Under above-mentioned network under test or carry out network according to the default network address/default access information under preset security network and access operation institute The first network produced accesses information and the second network access information is sent to described terminal.Described terminal can receive above-mentioned clothes Business device accesses information and the access of the second network according to described second acquisition request to the first network that described server sends/returns Information.The most described terminal can be according to the above-mentioned first network receiving/obtaining accesses information and the access of the second network The matching analysis of information determines the safety of described network under test.
The most alternatively, described basis accesses information and the coupling of described second network access information to described first network Analyze, determine the safety of described network under test, including:
By in the access script in described first network access information or access link and described second network access information Access script or access link carry out the matching analysis, obtain correspondence matching result information;
If there is default access in described matching result information to distort information, it is determined that described network under test is uneasy Whole network;Or, if there is not default access in described matching result information to distort information, it is determined that described network under test For secure network or possible secure network.
Access script in described first network access information or access can be linked and described second net by described terminal Access script or access link in network access information carry out the matching analysis and obtain the matching result information of correspondence, in implementing Described terminal may determine that the access script in described first network access information or access link whether with described second network Access script in access information or access link coupling, if coupling, the most described terminal is it is believed that this terminal is connected to described Carry out the network produced network access information of access operation according to the default network address under network under test to be not tampered with, or Think that described network under test can be possible secure network or secure network, that is to say that described terminal may determine that this terminal pair Described first network accesses information and described second network access information carries out the matching analysis and can obtain such as network access letter Breath is not tampered with, described network under test is secure network or may the matching result information such as secure network;Otherwise, described terminal Produced it is believed that this terminal is connected under described network under test carry out the network access operation identical with preset security network Network access information be tampered or described network under test is insecure network, that is to say that described terminal will determine this terminal Described first network is accessed information and described second network access information carries out the matching analysis and obtains such as network access information It is tampered or described network under test has been the matching result information such as insecure network.The most described terminal may determine that above-mentioned Whether described first network is accessed in the matching result information obtained by the matching analysis of information and the second network access information Exist user/system in advance in this terminal the default access of self-defined setting distort information (as network access information is usurped Change), if it is present, described terminal it is fair to consider that/determine that described network under test is insecure network, if do not deposited , then described terminal is it is believed that described network under test is secure network or insecure network.That is to say, described terminal is permissible By accessing script or accessing the access foot in link and described second network access information in described first network access information This or access link carry out coupling contrast, if the access script in described first network access information or access link are with described Access script in second network access information or to access link identical, then described terminal it is believed that before this terminal connected The described network under test connect is secure network or possible secure network, if the access script in described first network access information Or access link differs with the access script in described second network access information or access link, then described terminal is permissible The described network under test that before thinking, this terminal connects is insecure network.
The most alternatively, described basis accesses information and the coupling of described second network access information to described first network Analyze, determine the safety of described network under test, including:
By in the access script in described first network access information or access link and described second network access information Access script or access link carry out the matching analysis, obtain correspondence matching result information;
The 3rd acquisition request sent including described matching result information to described server;Described 3rd acquisition please Ask and under described network under test, there is the frequency corresponding to described matching result information for obtain in described server storage, Or for obtaining described server existing under described network under test corresponding to described matching result information according to storage The safety of the described network under test that the frequency determines;
Receive described server depositing under described network under test according to the described 3rd described storage obtaining request return In the frequency corresponding to described matching result information, and tie according to the described coupling that exists under described network under test of described storage Really the frequency corresponding to information determines the safety of described network under test;Or, receive described server and obtain according to the described 3rd Take the safety of the described network under test that request returns.
Access script in described first network access information or access can be linked and described second net by described terminal Access script or access link in network access information carry out the matching analysis and obtain the matching result information of correspondence, in implementing Described terminal may determine that the access script in described first network access information or access link whether with described second network Access script in access information or access link coupling, if coupling, the most described terminal is it is believed that this terminal is connected to described Carry out the network produced network access information of access operation according to the default network address under network under test to be not tampered with, or Described network under test can be secure network/possibility secure network, that is to say that described terminal may determine that this terminal is to described First network access information and described second network access information carry out the matching analysis obtain such as network access information not by Distort, described network under test is secure network/the matching result information such as possibility secure network;Otherwise, described terminal it is believed that This terminal is connected under described network under test carry out the network identical with preset security network and accesses operation produced network visit The information of asking has been tampered or described network under test is insecure network, that is to say that described terminal will determine that this terminal is to described One network access information and described second network access information carry out the matching analysis obtain such as network access information be tampered or Described network under test is the matching result information such as insecure network.The most described terminal can send the to described server Three obtain request, and wherein, described 3rd acquisition request can include described matching result information, and described 3rd acquisition request is permissible Under described network under test, the frequency corresponding to described matching result information is there is for obtain in described server storage, or Described in person, the 3rd obtains described of the existence under described network under test that request may be used for obtaining described server according to storage Join the safety of the described network under test that the frequency corresponding to object information determines.Alternatively, described in being connected in each terminal After carrying out different or identical network access operations under network under test, each terminal can repeat above-mentioned to treating survey grid Network carries out coupling point with the corresponding network access information carried out under preset security network obtained by identical network access operates Analysis (i.e. whether network access information is tampered), each terminal above-mentioned is it is also possible that the matching result information obtaining correspondence is uploaded To described server;Described server can be added up and store each terminal and carry out network access operation under described network under test Whether corresponding network access information is tampered, and distorts the matching result information such as number of times.
Described server receive the described 3rd obtain request after, if described 3rd acquisition request is used for obtaining described In server there is the frequency corresponding to described matching result information in storage under described network under test, then described server The each terminal added up/store can be found out in book server at described network under test according to the described 3rd instruction obtaining request The lower frequency/the number of times existed corresponding to described matching result information, in the described server that described server can will find out The frequency corresponding to described matching result information that exists under described network under test of storage is sent to described terminal, described terminal Can receive described server according to described 3rd obtain request return described server in storage at described network under test The lower frequency existed corresponding to described matching result information, the most described terminal can also store according in described server Under described network under test, there is the frequency corresponding to described matching result information to determine the safety of described network under test.
Described server receive the described 3rd obtain request after, if described 3rd acquisition request is used for obtaining described Server according to storage exist under described network under test the frequency corresponding to described matching result information determine described in treat The safety of survey grid network, then described server can first look for out book server according to the described 3rd instruction obtaining request The frequency/the number of times corresponding to described matching result information is there is (i.e. in each terminal of middle statistics/storage under described network under test It is that described server can be added up and store each terminal and be connected in described network under test carry out produced by network access operation Number of times that network access information is tampered or thought that described network under test is secure network/insecure network/can by each terminal The number of times of energy secure network), described then according to the existence under described network under test of storage in the described server found out The frequency corresponding to matching result information determine the safety of described network under test to determine the safety of described network under test, Finally the safety of the described network under test determined is sent to described terminal.Described terminal can receive described server root According to the described 3rd safety obtaining the described network under test that request returns.
The most alternatively, described basis accesses information and the coupling of described second network access information to described first network Analyze, determine the safety of described network under test, including:
Sending the 4th acquisition request to described server, described 4th acquisition request is used for indicating described server by described Accessing script or accessing the access script in link and described second network access information or visit in first network access information Ask that link carries out the matching analysis, obtain the matching result information of correspondence, search and send in described server storage described The frequency corresponding to described matching result information is there is under network under test;Or, it is used for indicating described server by described first Accessing script or access the access script in link and described second network access information or access chain in network access information Tap into row the matching analysis, obtain the matching result information of correspondence, under described network under test, there is described coupling according to store The frequency corresponding to object information determines the safety of described network under test, and the safety of the described network under test determined is sent out Give described terminal;
Receive described server depositing under described network under test according to the described 4th described storage obtaining request return In the frequency corresponding to described matching result information, and tie according to the described coupling that exists under described network under test of described storage Really the frequency corresponding to information determines the safety of described network under test;Or, receive described server and obtain according to the described 4th Take the safety of the described network under test that request returns.
In implementing, described terminal can send the 4th acquisition request to described server, when described 4th acquisition please Ask for indicating described server by the access script in described first network access information or to access link and described second net Access script or access link in network access information carry out the matching analysis, obtain the matching result information of correspondence, search concurrent Send when there is the frequency corresponding to described matching result information under described network under test of storage in described server, described When server receives described 4th acquisition request, described server can obtain institute according to the described 4th instruction obtaining request State terminal and carry out network access behaviour according to the default network address under described network under test and under described preset security network respectively Making the described first network that produces and access information and described second network access information, the most described server can be by described the Accessing script or accessing link and the access script in described second network access information or access in one network access information Link carry out mate relative analysis, if it does, then described in carry out mate relative analysis will obtain the most described terminal described Carry out network access information produced by the network operation identical with preset security network under network under test to be not tampered with or institute Stating network under test is the matching result information such as secure network or possible secure network;Otherwise, carrying out mating relative analysis described in will Obtain the most described terminal under described network under test, carry out network produced by the network operation identical with preset security network Access information has been tampered or described network under test is the matching result information such as insecure network.Secondly described server is permissible Find out from book server book server statistics/storage to each terminal be connected under described network under test carry out network access The number of times that the produced network access information of operation is tampered, or described each terminal add up/think described network under test be safety/ Dangerous/may the number of times of secure network, what the most described server can find out storage in book server treats survey grid described There is the frequency/number of times corresponding to described matching result information under network, the most described server can be by above-mentioned lookup In described server, the frequency/number of times corresponding to described matching result information that exists under described network under test of storage is sent to Described terminal;Described terminal can receive described server and obtain, according to the described 4th, the described server that request returns/sends The frequency/the number of times corresponding to described matching result information that exists under described network under test of middle storage is sent to described terminal, And under described network under test, there is the frequency/number of times corresponding to described matching result information according to what described server stored It is sent to described terminal to determine the safety of described network under test.
Or, described terminal can send the 4th acquisition request to described server, if described 4th acquisition request is used By the access script in described first network access information or link and described second network visit is accessed in indicating described server Ask the access script in information or access link carry out the matching analysis, obtain correspondence matching result information, according to storage There is the frequency corresponding to described matching result information under described network under test and determine the safety of described network under test, and will be really When the safety of fixed described network under test is sent to described terminal, then described server is transmitted across receiving described terminal When the described 4th come obtains request, described server can obtain described terminal according to the described 4th instruction obtaining request and divide Do not carry out network according to the default network address under described network under test and under described preset security network and access what operation produced Described first network accesses information and described second network access information, and described first network can be visited by the most described server Ask that the access script in information or access link link carry out with the access script in described second network access information or access Coupling relative analysis, if it does, then described in carry out mate relative analysis will obtain the most described terminal at described network under test Under carry out network access information produced by the network operation identical with preset security network be not tampered with or described in treat survey grid Network is the matching result information such as secure network or possible secure network;Otherwise, carry out mating relative analysis described in will obtain such as Described terminal carries out network access information produced by the network operation identical with preset security network under described network under test It is tampered or described network under test has been the matching result information such as insecure network.Secondly described server can be from this service Device finds out book server statistics/storage to each terminal be connected under described network under test to carry out network and access operation and produced The number of times that raw network access information is tampered, or described each terminal add up/think described network under test be safety/dangerous/ The number of times of possible secure network, the most described server can find out the existence under described network under test of storage in book server The frequency/number of times corresponding to described matching result information.The most described server can be according in the described server found out The frequency/the number of times corresponding to described matching result information is there is to determine described network under test in store under described network under test Safety, the safety of the described network under test determined can be sent to described terminal by last described server, described Terminal can receive described server according to the described 4th safety obtaining the described network under test that request returns.
The most alternatively, described according to described storage exist under described network under test described matching result information institute right The frequency answered determines the safety of described network under test, including:
If the described frequency is in default 4th threshold range, it is determined that described network under test is secure network;
If the described frequency is in default 5th threshold range, it is determined that described network under test is possible secure network;
If the described frequency is in default 6th threshold range, it is determined that described network under test is insecure network.
Described according to described storage to there is the frequency corresponding to described matching result information under described network under test true The safety of fixed described network under test is embodied as step and may include that and judge/determine that what described server stored treats described There is the frequency corresponding to described matching result information under survey grid network and be stored in advance in described terminal/described clothes in user/system Business device determines in which threshold range of self-defined setting the safety of described network under test, exemplarily when as described in clothes The frequency corresponding to described matching result information that exists under described network under test of business device storage is in user/system in advance certainly What definition was arranged presets in the 4th threshold range, then it is believed that/determine that described network under test is secure network;When described service The frequency corresponding to described matching result information that exists under described network under test of device storage is in user/system and makes by oneself in advance What justice was arranged presets in the 5th threshold range, then it is believed that/determine that described network under test is for may secure network;When described clothes The frequency corresponding to described matching result information that exists under described network under test of business device storage is in user/system in advance certainly What definition was arranged presets in the 6th threshold range, then it is believed that/determine that described network under test is insecure network.
It should be noted that above-mentioned preset first threshold value scope, default Second Threshold scope ... until presetting the 6th Threshold range can be the self-defined setting in described terminal/described server in advance of user/system, and above-mentioned presets the One threshold range is until described the 6th threshold range of presetting may refer to identical threshold range, it is also possible to refer to different thresholds Value scope, the embodiment of the present invention is not construed as limiting.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters Row connects and communicates;Improve the safety of user's online.
Refer to Fig. 3, be the schematic flow sheet of a kind of internet security management method that another embodiment of the present invention provides, The described method of the embodiment of the present invention can be applied in band communications such as such as smart mobile phone, panel computer, intelligence wearable devices In the terminal of network function, specifically can be realized by the processor of these terminals.The described method of the embodiment of the present invention also includes Following steps.
S201, acquisition terminal carry out network according to the default network address under network under test and access the produced network of operation Access information.
S202, judge whether described network access information exists and accessed the operation exception caused by operation by described network Data, and/or the network attack data obtained from server.
In the embodiment of the present invention, accessed operation when terminal judges to described network access information there are by described network Caused operation exception data, and/or obtain from server network attack data time, described terminal can continue executing with Step S203;Otherwise, terminate flow process or directly determine that described network under test is safety/possibility secure network.
S203, to described server send obtain request, described acquisition request includes described network attack data and/or institute Stating operation exception data, described acquisition request is described for obtaining the existence under described network under test of storage in described server The frequency corresponding to network attack data and/or described operation exception data;Or, it is used for obtaining described server according to storage Under described network under test, have what the frequency corresponding to described network attack data and/or described operation exception data determined The safety of described network under test.
It should be noted that when described obtain request for obtain in described server storage under described network under test When there is the frequency corresponding to described network attack data and/or described operation exception data, the most described terminal continues executing with step Rapid S204;When described acquisition request exists described network for obtaining described server according to store under described network under test When attacking the safety of the described network under test that the frequency corresponding to data and/or described operation exception data determines, then described Terminal continues executing with step S205.
S204, receive described server and obtain, according to described, the depositing under described network under test of described storage that request returns In the frequency corresponding to described network attack data and/or described operation exception data, and treating described according to described storage There is the frequency corresponding to described network attack data and/or described operation exception data under survey grid network and determine described network under test Safety.
Described according to described storage under described network under test, there are described network attack data and/or described operation is different The frequency corresponding to regular data determines that the safety of described network under test specifically includes following enforcement step: if the described frequency is in Preset first threshold value scope, it is determined that described network under test is secure network;If the described frequency is in default Second Threshold scope, Then determine that described network under test is for possible secure network;If the described frequency is in default 3rd threshold range, it is determined that described in treat Survey grid network is insecure network.
S205, receive described server and obtain, according to described, the safety of described network under test that request returns.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters Row connects and communicates;Improve the safety of user's online.
Refer to Fig. 4, be the schematic flow sheet of a kind of internet security management method that another embodiment of the present invention provides, The described method of the embodiment of the present invention can include that all or part that above-mentioned Fig. 3 embodiment provides implements step, wherein this The described method of bright embodiment also comprises the steps.
S301, when detecting that described terminal support connects at least one available network, to described server send correspondence Network security verification request, wherein, described network security verification request include the network identity corresponding with described available network, The corresponding different network identity of different available networks.
S302, receive described server according to described network security verification request return corresponding with described network identity Safe object information.
S303, according to described network identity, safe object information corresponding for whole available networks is shown to the net preset Network attended operation interface.
S304, according to described network identity, target available network is shown to the network attended operation interface preset, its In, the safe object information that described target available network is corresponding is default secure network object information.
It should be noted that above-mentioned steps S304 can be another alternate embodiments of step S303.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters Row connects and communicates;Improve the safety of user's online.
Refer to Fig. 5, be the structural representation of a kind of terminal of the embodiment of the present invention, the described terminal of the embodiment of the present invention 5 include:
Acquiring unit 50, is used for obtaining terminal and carries out network according to the default network address under network under test and access operation institute The network access information produced;
Whether judging unit 51, be used for judging to exist in described network access information being accessed caused by operation by described network Operation exception data, and/or from server obtain network attack data;
Determine unit 52, if the judged result for described judging unit 51 is yes, then according to described network attack data And/or described operation exception data, determine the safety of described network under test.
Implementing of the unit related in the embodiment of the present invention refers to be correlated with in Fig. 1 to Fig. 4 correspondence embodiment Functional unit or the description of enforcement step, be not repeated herein.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters Row connects and communicates;Improve the safety of user's online.
Refer to Fig. 6, be the structural representation of a kind of terminal of another embodiment of the present invention, the embodiment of the present invention described Terminal 6 may include that above-mentioned acquiring unit 50, judging unit 51, determines unit 52, wherein,
Described determining unit 52, specifically for sending, to described server, the request of acquisition, described acquisition request includes described Network attack data and/or described operation exception data, described acquisition request for obtain in described server storage in institute State the frequency existed under network under test corresponding to described network attack data and/or described operation exception data;Or, it is used for obtaining Take described server and under described network under test, there is described network attack data and/or described operation exception number according to store Safety according to the described network under test that the corresponding frequency determines;Receive described server and obtain what request returned according to described Described storage under described network under test, there is the frequency corresponding to described network attack data and/or described operation exception data Secondary, and under described network under test, there are described network attack data and/or described operation exception data according to described storage The corresponding frequency determines the safety of described network under test;Or, receive described server and obtain request return according to described The safety of described network under test.
The most alternatively,
Described determine unit 52, if being in preset first threshold value scope specifically for the described frequency, it is determined that described to be measured Network is secure network;If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible safety net Network;If the described frequency is in default 3rd threshold range, it is determined that described network under test is insecure network.
The most alternatively, described terminal also includes:
Transmitting element 53, for when detecting that described terminal support connects at least one available network, to described service Device sends corresponding network security verification request, and wherein, the request of described network security verification includes corresponding with described available network Network identity, the corresponding different network identity of different available network;
Receive unit 54, for receive described server according to described network security verification request return with described network The safe object information that mark is corresponding;
Display unit 55, for according to described safe object information and described network identity, shows described available network To the network attended operation interface preset.
The most alternatively,
Described display unit 55, specifically for according to described network identity, by safe result corresponding for whole available networks Information is shown to the network attended operation interface preset;Or, according to described network identity, target available network is shown to pre- If network attended operation interface, wherein, the safe object information that described target available network is corresponding is default secure network Object information.
Implementing of the unit related in the embodiment of the present invention refers to be correlated with in Fig. 1 to Fig. 5 correspondence embodiment Functional unit or the description of enforcement step, be not repeated herein.
The embodiment of the present invention can carry out network access behaviour according to the default network address by obtaining terminal under network under test Make produced network access information, and judge whether described network access information exists and accessed operation by described network and drawn The operation exception data risen, and/or the network attack data obtained from server, the most then according to described network attack number According to and/or described operation exception data, determine the safety of described network under test;So can detect under network under test, carry out net Network access operation whether produces corresponding operation exception data and/or network attack data simply and reliably draw/determine The safety of network under test, and then user/terminal can select safely automatically, intelligently or safety network higher enters Row connects and communicates;Improve the safety of user's online.
See Fig. 7, be the another kind of terminal structure schematic diagram of another embodiment of the present invention offer.This enforcement as depicted Terminal in example may include that one or more processor 801;One or more input equipments 802, one or more outputs set Standby 803 and memorizer 804.Above-mentioned processor 801, input equipment 802, outut device 803 and memorizer 804 are by bus 805 Connect.Memorizer 802 is used for storing instruction, and processor 801 is for performing the instruction of memorizer 802 storage.Wherein, processor 801 are used for:
Obtain terminal and carry out network access operation produced network access according to the default network address under network under test Information;
Judge whether described network access information exists and accessed the operation exception data caused by operation by described network, And/or from server obtain network attack data;
The most then according to described network attack data and/or described operation exception data, determine the peace of described network under test Quan Xing.
Further, described processor 801 is additionally operable to:
Sending, to described server, the request of acquisition, described acquisition request includes described network attack data and/or described fortune Row abnormal data, there is described network for obtain in described server storage in described acquisition request under described network under test Attack the frequency corresponding to data and/or described operation exception data;Or, for obtain described server according to storage Have under described network under test that the frequency corresponding to described network attack data and/or described operation exception data determines is described The safety of network under test;
Receive described server according to described obtain request return described storage under described network under test, there is institute State the frequency corresponding to network attack data and/or described operation exception data, and treat survey grid according to described storage described There is the frequency corresponding to described network attack data and/or described operation exception data under network and determine the peace of described network under test Quan Xing;Or, receive described server according to the described safety obtaining the described network under test that request returns.
Further, described processor 801 is additionally operable to:
If the described frequency is in preset first threshold value scope, it is determined that described network under test is secure network;
If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible secure network;
If the described frequency is in default 3rd threshold range, it is determined that described network under test is insecure network.
Further, described processor 801 is additionally operable to:
When detecting that described terminal support connects at least one available network, send corresponding network to described server Security authentication request, wherein, the request of described network security verification includes the network identity corresponding with described available network, different The corresponding different network identity of available network;
Receive the safety corresponding with described network identity that described server returns according to the request of described network security verification Object information;
According to described safe object information and described network identity, the network being shown to described available network preset connects Operation interface.
Further, described processor 801 is additionally operable to:
According to described network identity, the network being shown to safe object information corresponding for whole available networks preset connects Operation interface;Or,
According to described network identity, target available network is shown to the network attended operation interface preset, wherein, described The safe object information that target available network is corresponding is default secure network object information.
Should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central Processing Unit, CPU), this processor can also is that other general processors, digital signal processor (Digital Signal Processor, DSP), special IC (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device can also be the processor etc. of any routine.
Input equipment 802 can include that Trackpad, fingerprint adopt sensor (for gathering the finger print information of user and fingerprint Directional information), mike etc., outut device 803 can include display (LCD etc.), speaker etc..
This memorizer 804 can include read only memory and random access memory, and to processor 801 provide instruction and Data.A part for memorizer 804 can also include nonvolatile RAM.Such as, memorizer 804 can also be deposited The information of storage device type.
In implementing, processor 801, input equipment 802 described in the embodiment of the present invention, outut device 803 can Perform described in first embodiment and the 5th embodiment of the method for the internet security management that the embodiment of the present invention provides Implementation, it is possible to the implementation of execution terminal described by the embodiment of the present invention, does not repeats them here.
See Fig. 8, be the structural representation of a kind of internet security management system that the embodiment of the present invention provides.As schemed Internet security management system in the present embodiment shown may include that server 80 and terminal 81;Wherein,
Described terminal 81, for sending the first acquisition request to server 80;Receive described server according to described first The first network that the request of acquisition returns accesses information and the second network access information, and described first network accesses information and refers to described clothes What business device stored carries out the network produced network access information of access operation, institute according to the default network address under network under test State the second network access information and refer to that what described server stored carries out network according to the default network address under preset security network Accessing the produced network access information of operation, described network access information includes accessing script or accessing link;According to institute State first network and access information and the matching analysis of described second network access information, determine the safety of described network under test;
Described server 80, for receiving the first acquisition request that terminal 81 sends;Respond described first and obtain request, will The first network of storage accesses information and the second network access information is sent to described terminal 81;Wherein, described first network is visited What the information of asking referred to that described server stores carry out network according to the default network address under network under test, and to access operation produced Network access information, described second network access information refer to that described server 80 stores under preset security network according to presetting The network address carries out network and accesses the produced network access information of operation, and described network access information includes accessing script or visit Ask link.
The most alternatively,
Described terminal 81, is additionally operable to the access script in described first network access information or accesses link and described the Access script or access link in two network access informations carry out the matching analysis, obtain the matching result information of correspondence;To institute State the second acquisition request that server 80 sends including described matching result information;Described second acquisition request is used for obtaining There is the frequency corresponding to described matching result information in store in described server under described network under test, or is used for obtaining Take described server 80 to determine according to the frequency corresponding to described matching result information that exists under described network under test of storage The safety of described network under test;Receive described server 80 according to described second obtain request return described storage There is the frequency corresponding to described matching result information under described network under test, and according to described storage at described network under test The lower frequency existed corresponding to described matching result information determines the safety of described network under test;Or, receive described service Device 80 is according to the described second safety obtaining the described network under test that request returns;
Described server 80, is additionally operable to receive described terminal 81 and sends the second acquisition request, and described second obtains request bag Include matching result information, described matching result information refer to described terminal by the access script in described first network access information or Access link and described second network access information in access script or access link carry out the matching analysis, correspondence obtain Joining object information, described second obtains request exists institute for obtain storage in described server 80 under described network under test State the frequency corresponding to matching result information, or for obtain described server 80 according to storage under described network under test There is the safety of the described network under test that the frequency corresponding to described matching result information determines;Responding described second acquisition please Ask, the frequency corresponding to described matching result information that exists under described network under test of storage is sent to described terminal;Or Person, responds described second and obtains request, there is described matching result information institute according to described storage under described network under test The corresponding frequency determines the safety of described network under test, and the safety of the described network under test determined is sent to described terminal 81。
The most alternatively,
Described terminal 81, is additionally operable to send the 3rd acquisition request to described server 80, and described 3rd acquisition request is used for Described server 80 is indicated by the access script in described first network access information or to access link and described second network visit Ask that the access script in information or access link carry out the matching analysis, obtain the matching result information of correspondence, search and send institute The frequency corresponding to described matching result information is there is in that states in server storage under described network under test;Or, it is used for referring to Show that described server 80 by the access script in described first network access information or accesses link and described second network access Access script in information or access link and carry out the matching analysis, obtains the matching result information of correspondence, according to storage in institute State and there is the frequency corresponding to described matching result information under network under test and determine the safety of described network under test, and will determine The safety of described network under test be sent to described terminal;Receive described server 80 and obtain request return according to the described 3rd Described storage under described network under test, there is the frequency corresponding to described matching result information, and according to described storage Under described network under test, there is the frequency corresponding to described matching result information determine the safety of described network under test;Or Person, receives described server 80 according to the described 3rd safety obtaining the described network under test that request returns;
Described server 80, is additionally operable to receive described terminal 81 and sends the 3rd acquisition request, and the described 3rd obtains request uses By the access script in described first network access information or link and described second network is accessed in indicating described server 80 Access script or access link in access information carry out the matching analysis, obtain the matching result information of correspondence, and search described In server 80 there is the frequency corresponding to described matching result information in storage under described network under test;Or, it is used for referring to Show that described server 80 by the access script in described first network access information or accesses link and described second network access Access script in information or access link and carry out the matching analysis, obtains the matching result information of correspondence, and according to storage There is the frequency corresponding to described matching result information under described network under test and determine the safety of described network under test;Response institute State the 3rd acquisition request, access link by described first or the first access script and described second accesses link or second and accesses foot Originally carry out the matching analysis, obtain the matching result information of correspondence, and search in described server 80 storage treat survey grid described The frequency corresponding to described matching result information is there is under network, and by described of the existence under described network under test of described storage Join the frequency corresponding to object information and be sent to described terminal 81;Or, access link or first by described first and access script Access link with described second or the second access script carries out the matching analysis, obtain the matching result information of correspondence, and search institute There is the frequency corresponding to described matching result information in that states in server 80 storage under described network under test, deposits according to described The frequency corresponding to described matching result information that exists under described network under test of storage determines the safety of described network under test, The safety of the described network under test determined is sent to described terminal 81.
The most alternatively,
Described terminal 81, is additionally operable to send the 4th acquisition request to described server 80, and described 4th acquisition request includes Described network attack data and/or described operation exception data, described 4th acquisition request is used for obtaining in described server 80 The frequency corresponding to described network attack data and/or described operation exception data is there is in store under described network under test; Or, for obtain described server 80 according to storage exist under described network under test described network attack data and/or The safety of the described network under test that the frequency corresponding to described operation exception data determines;Receive described server 80 according to institute State obtain request return described storage under described network under test, there are described network attack data and/or described operation is different The frequency corresponding to regular data, and according to described storage exist under described network under test described network attack data and/or The frequency corresponding to described operation exception data determines the safety of described network under test;Or, receive described server 80 According to the described safety obtaining the described network under test that request returns;
Described server 80, is additionally operable to receive the 4th acquisition request that described terminal 81 sends;Described 4th obtains request Under described network under test, described network attack data and/or described operation is there is for obtain in described server 80 storage The frequency corresponding to abnormal data;Or, for obtaining described server 80 existing under described network under test according to storage The safety of the described network under test that the frequency corresponding to described network attack data and/or described operation exception data determines; Responding the described 4th and obtain request, there is described network attack in that searches in described server 80 storage under described network under test The frequency corresponding to data and/or described operation exception data, and by described for existing under described network under test of described storage The frequency corresponding to network attack data and/or described operation exception data is sent to described terminal 81;Or, search described clothes In business device 80, storage exists corresponding to described network attack data and/or described operation exception data under described network under test The frequency, and under described network under test, there is described network attack data and/or described operation exception according to described storage The frequency corresponding to data determines the safety of described network under test, and the safety of the described network under test determined is sent to institute State terminal 81.
The most alternatively,
Described terminal 81, is additionally operable to when detecting that described terminal support connects at least one available network, to described clothes Business device 80 sends the network security verification request of correspondence, and wherein, the request of described network security verification includes and described available network Corresponding network identity, the corresponding different network identity of different available networks;Receive described server 80 according to described network The safe object information corresponding with described network identity that security authentication request returns;According to described safe object information and described Network identity, is shown to the network attended operation interface preset by described available network.
Described server 80, is additionally operable to receive the network security verification request that described terminal 81 sends;Described network security Checking request includes the network identity that at least one available network that described terminal support connects is corresponding, different available networks pair Answer different network identities;Respond described network security verification information, the safety knot corresponding with described network identity that will search Really information is sent to described terminal 81, in order to described terminal 81 knows the safety of each available network.
The embodiment of the present invention can by terminal obtain storage in server under network under test according to the default network address Carry out network and access the weight under preset security network of storage in operation produced first network access information, and server Newly carry out network according to the described default network address and access produced second network access information of operation, according further to right Described first network accesses information and the matching analysis of described second network access information, determines the safety of described network under test Property;So can contrast the network access information of server record thus simply and reliably draw/determine the safety of network under test Property, and then user/terminal can select safely automatically, intelligently or safety network higher is attached and communicates; Improve the safety of user's online.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example that the embodiments described herein describes Unit and algorithm steps, it is possible to electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware With the interchangeability of software, the most generally describe composition and the step of each example according to function.This A little functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Specially Industry technical staff can use different methods to realize described function to each specifically should being used for, but this realization is not It is considered as beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience of description and succinctly, foregoing description be System, terminal and the specific works process of unit, be referred to the corresponding process in preceding method embodiment, do not repeat them here.
In several embodiments provided herein, it should be understood that disclosed system, terminal and method, permissible Realize by another way.Such as, device embodiment described above is only schematically, such as, and described unit Dividing, be only a kind of logic function and divide, actual can have other dividing mode, the most multiple unit or assembly when realizing Can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs.It addition, it is shown or beg for The coupling each other of opinion or direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit Or communication connection, it is also possible to be electric, machinery or other form connect.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme Purpose.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to be that two or more unit are integrated in a unit.Above-mentioned integrated Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit Time, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part in other words prior art contributed, or this technical scheme completely or partially can be with the form of software product Embodying, this computer software product is stored in a storage medium, including some instructions with so that a computer Equipment (can be personal computer, server, or the network equipment etc.) performs the complete of method described in each embodiment of the present invention Portion or part steps.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art, in the technical scope that the invention discloses, can readily occur in the amendment of various equivalence or replace Changing, these amendments or replacement all should be contained within protection scope of the present invention.Therefore, protection scope of the present invention should be with right The protection domain required is as the criterion.

Claims (10)

1. the method for an internet security management, it is characterised in that described method includes:
Obtain terminal and carry out the network produced network access information of access operation according to the default network address under network under test;
Judge whether described network access information exists the operation exception data by caused by the access operation of described network, and/ Or from server obtain network attack data;
The most then according to described network attack data and/or described operation exception data, determine the safety of described network under test Property.
2. the method for claim 1, it is characterised in that described according to described network attack data and/or described operation Abnormal data, determines the safety of described network under test, including:
Sending, to described server, the request of acquisition, described acquisition request includes that described network attack data and/or described operation are different Regular data, there is described network attack for obtain in described server storage in described acquisition request under described network under test The frequency corresponding to data and/or described operation exception data;Or, for obtain described server according to storage described Have under network under test that the frequency corresponding to described network attack data and/or described operation exception data determines is described to be measured The safety of network;
Receive described server according to described obtain request return described storage under described network under test, there is described net Network attacks data and/or the frequency corresponding to described operation exception data, and according to described storage under described network under test There is the frequency corresponding to described network attack data and/or described operation exception data and determine the safety of described network under test Property;Or, receive described server according to the described safety obtaining the described network under test that request returns.
3. method as claimed in claim 2, it is characterised in that described existing under described network under test according to described storage The frequency corresponding to described network attack data and/or described operation exception data determines the safety of described network under test, bag Include:
If the described frequency is in preset first threshold value scope, it is determined that described network under test is secure network;
If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible secure network;
If the described frequency is in default 3rd threshold range, it is determined that described network under test is insecure network.
4. the method as described in any one in claim 1-3, it is characterised in that also include:
When detecting that described terminal support connects at least one available network, send corresponding network security to described server Checking request, wherein, the request of described network security verification includes the network identity corresponding with described available network, and different is available The corresponding different network identity of network;
Receive the safe result corresponding with described network identity that described server returns according to the request of described network security verification Information;
According to described safe object information and described network identity, described available network is shown to the network attended operation preset Interface.
5. method as claimed in claim 4, it is characterised in that described according to described safe object information with described network mark Know, described available network is shown to the network attended operation interface preset, including:
According to described network identity, safe object information corresponding for whole available networks is shown to the network attended operation preset Interface;Or,
According to described network identity, target available network is shown to the network attended operation interface preset, wherein, described target The safe object information that available network is corresponding is default secure network object information.
6. a terminal, it is characterised in that described terminal includes:
Acquiring unit, is used for obtaining terminal and carries out produced by network access operation according to the default network address under network under test Network access information;
Judging unit, is accessed the operation caused by operation for judging whether to exist in described network access information by described network Abnormal data, and/or the network attack data obtained from server;
Determine unit, if being yes for the judged result of described judging unit, then according to described network attack data and/or described Operation exception data, determine the safety of described network under test.
7. terminal as claimed in claim 6, it is characterised in that
Described determining unit, specifically for sending, to described server, the request of acquisition, described acquisition request includes that described network is attacked Hit data and/or described operation exception data, described acquisition request for obtain storage in described server described to be measured The frequency corresponding to described network attack data and/or described operation exception data is there is under network;Or, it is used for obtaining described Server according to storage exist under described network under test described network attack data and/or described operation exception data institute right The safety of the described network under test that the frequency answered determines;Receive described server to deposit described in request return according to described acquisition Storage under described network under test, there is the frequency corresponding to described network attack data and/or described operation exception data, and Existing under described network under test corresponding to described network attack data and/or described operation exception data according to described storage The frequency determine the safety of described network under test;Or, receive described server and obtain described in request return according to described The safety of network under test.
8. terminal as claimed in claim 7, it is characterised in that
Described determine unit, if being in preset first threshold value scope specifically for the described frequency, it is determined that described network under test is Secure network;If the described frequency is in default Second Threshold scope, it is determined that described network under test is possible secure network;If institute State the frequency and be in default 3rd threshold range, it is determined that described network under test is insecure network.
9. the terminal as described in any one in claim 6-8, it is characterised in that described terminal also includes:
Transmitting element, for when detecting that described terminal support connects at least one available network, sends to described server Corresponding network security verification request, wherein, the request of described network security verification includes the network corresponding with described available network Mark, the corresponding different network identity of different available networks;
Receive unit, for receive described server according to described network security verification request return with described network identity pair The safe object information answered;
Display unit, for according to described safe object information and described network identity, is shown to preset by described available network Network attended operation interface.
10. terminal as claimed in claim 9, it is characterised in that
Described display unit, specifically for according to described network identity, showing safe object information corresponding for whole available networks Show default network attended operation interface;Or, according to described network identity, target available network is shown to the net preset Network attended operation interface, wherein, the safe object information that described target available network is corresponding is default secure network result letter Breath.
CN201610822777.5A 2016-09-13 2016-09-13 The method of a kind of internet security management and terminal Withdrawn CN106209918A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610822777.5A CN106209918A (en) 2016-09-13 2016-09-13 The method of a kind of internet security management and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610822777.5A CN106209918A (en) 2016-09-13 2016-09-13 The method of a kind of internet security management and terminal

Publications (1)

Publication Number Publication Date
CN106209918A true CN106209918A (en) 2016-12-07

Family

ID=58067444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610822777.5A Withdrawn CN106209918A (en) 2016-09-13 2016-09-13 The method of a kind of internet security management and terminal

Country Status (1)

Country Link
CN (1) CN106209918A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979845A (en) * 2017-05-03 2018-05-01 上海掌门科技有限公司 The indicating risk method and apparatus of wireless access point
CN112565228A (en) * 2020-11-27 2021-03-26 北京高途云集教育科技有限公司 Client network analysis method and device
CN109902491B (en) * 2019-02-28 2021-08-31 苏州浪潮智能科技有限公司 Safe operation management architecture of server and server
CN113591080A (en) * 2021-06-16 2021-11-02 盐城一方信息技术有限公司 Computer network safety control system and control method
CN113875205A (en) * 2019-05-31 2021-12-31 微软技术许可有限责任公司 Suppressing security risks associated with insecure websites and networks

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points
CN104219670A (en) * 2014-09-03 2014-12-17 珠海市君天电子科技有限公司 Method and system for identifying false wifi (wireless fidelity), client side and server side
CN104703184A (en) * 2015-02-12 2015-06-10 中山大学 Safe WiFi hot spot information publishing method
CN105162768A (en) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 Method and device for detecting phishing Wi-Fi hotspots
CN105357221A (en) * 2015-12-04 2016-02-24 北京奇虎科技有限公司 Method and apparatus for identifying phishing website
CN105611534A (en) * 2014-11-25 2016-05-25 阿里巴巴集团控股有限公司 Method and device for recognizing pseudo WiFi network by wireless terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points
CN104219670A (en) * 2014-09-03 2014-12-17 珠海市君天电子科技有限公司 Method and system for identifying false wifi (wireless fidelity), client side and server side
CN105611534A (en) * 2014-11-25 2016-05-25 阿里巴巴集团控股有限公司 Method and device for recognizing pseudo WiFi network by wireless terminal
CN104703184A (en) * 2015-02-12 2015-06-10 中山大学 Safe WiFi hot spot information publishing method
CN105162768A (en) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 Method and device for detecting phishing Wi-Fi hotspots
CN105357221A (en) * 2015-12-04 2016-02-24 北京奇虎科技有限公司 Method and apparatus for identifying phishing website

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979845A (en) * 2017-05-03 2018-05-01 上海掌门科技有限公司 The indicating risk method and apparatus of wireless access point
CN109902491B (en) * 2019-02-28 2021-08-31 苏州浪潮智能科技有限公司 Safe operation management architecture of server and server
CN113875205A (en) * 2019-05-31 2021-12-31 微软技术许可有限责任公司 Suppressing security risks associated with insecure websites and networks
US11637850B2 (en) 2019-05-31 2023-04-25 Microsoft Technology Licensing, Llc Mitigating security risks associated with unsecured websites and networks
CN112565228A (en) * 2020-11-27 2021-03-26 北京高途云集教育科技有限公司 Client network analysis method and device
CN113591080A (en) * 2021-06-16 2021-11-02 盐城一方信息技术有限公司 Computer network safety control system and control method

Similar Documents

Publication Publication Date Title
Shabtai et al. Mobile malware detection through analysis of deviations in application network behavior
CN103634294B (en) Information verifying method and device
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
CN106209918A (en) The method of a kind of internet security management and terminal
US20160241589A1 (en) Method and apparatus for identifying malicious website
US10491548B2 (en) Techniques to configure bot flow
US20130097659A1 (en) System and method for whitelisting applications in a mobile network environment
CN104767713B (en) Account binding method, server and system
EP2769327A1 (en) System and method for whitelisting applications in a mobile network environment
CN107580005A (en) Website protection method, device, website safeguard and readable storage medium storing program for executing
CN106790727B (en) Information push method and device
Pal et al. IoT technical challenges and solutions
CN106713266B (en) Method, device, terminal and system for preventing information leakage
CN104468464A (en) Authentication method, device and system
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN105635122A (en) Wifi access method and device and electronic equipment
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN104317648B (en) A kind of method and apparatus of monitoring advertisement
CN107612901A (en) One kind applies encryption method and terminal
CN106302519A (en) The method of a kind of internet security management and terminal
CN106851779A (en) A kind of method and mobile terminal for recognizing access point and focus
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
CN106534324A (en) Data sharing method and cloud server
CN105306202B (en) Auth method, device and server
CN105357224B (en) A kind of registration of intelligent domestic gateway, removing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20161207

WW01 Invention patent application withdrawn after publication