CN106411862A - Network security management method and terminal - Google Patents

Network security management method and terminal Download PDF

Info

Publication number
CN106411862A
CN106411862A CN201610822824.6A CN201610822824A CN106411862A CN 106411862 A CN106411862 A CN 106411862A CN 201610822824 A CN201610822824 A CN 201610822824A CN 106411862 A CN106411862 A CN 106411862A
Authority
CN
China
Prior art keywords
network
under test
server
access
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610822824.6A
Other languages
Chinese (zh)
Inventor
向攀
陈澜波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610822824.6A priority Critical patent/CN106411862A/en
Publication of CN106411862A publication Critical patent/CN106411862A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention discloses a network security management method and a terminal. The method comprises the following steps: receiving a first acquisition request sent by the terminal through a server; and transmitting stored first network access information and second network access information to the terminal in response to the first acquisition request, wherein the first network access information refers to network access information which is stored in the server and generated by a network access operation performed according to a preset network address under a network to be tested, the second network access information refers to network access information which is stored in the server and generated by a network access operation performed according to a preset network address under a preset secure network, and the network access information includes access scripts or access links. Through adoption of the network security management method, the terminal can be independently and selectively connected to the secure network according to the demand of a user, and the Internet-surfing security is ensured for the user.

Description

A kind of method of internet security management and terminal
Technical field
The present invention relates to security technology area, more particularly, to a kind of method of internet security management and terminal.
Background technology
WIFI is Institute of Electrical and Electric Engineers IEEE (Institute of Electrical and Electronics Engineers, IEEE) industrial standard (IEEE 802.11) of a wireless communication that defines, also may be used To regard a kind of supplementary of 3G technology as.WiFi technology, as Bluetooth technology, belongs to used in office and family Wireless LAN communication technology.WIFI is a kind of short range wireless transmission technology, can support internet in the range of hundreds of feet Access radio signal, its great advantage is that transmission speed is higher, and in the case of signal is weaker or noisy, bandwidth is adjustable Whole, effectively ensure stability and the reliability of network.But it is as the continuous expansion of WLAN application, its peace Full problem is also increasingly taken seriously.
In some megastore, communal facility, citizen can use wireless network much smootherly, that is, be commonly called as WIFI.Generally these places, because of the open network adopting, do not have password, so being searched for no with smart mobile phone, panel computer etc. one Gauze network, just can easily connect.In the epoch of WiFi, rubbing WiFi becomes one basic " existence technical ability ".But enjoying While WiFi offers convenience, the security precautions surfed the Net general lack of WiFi due to people, WiFi has become as safely respectively Plant network trap, the severely afflicated area of fishing swindle.
For solving the above problems, it is typically all by being encrypted to the application data needing transmission or setting up at present The mode of secure connection passage (as VPN passage) come to ensure access public WiFi after data safety.However, it has been found in practice that Terminal can not provide the user the safety information of public WIFI network in real time, and domestic consumer also cannot be by complicated encryption Means are ensureing the safety carrying out data transmission under public WiFi network it is therefore desirable to a kind of simple and reliable internet security Managed Solution.
Content of the invention
The embodiment of the present invention provides a kind of method of internet security management, can lift the security of internet security management And practicality.
In a first aspect, embodiments providing a kind of method of internet security management, the method includes:
The first acquisition request that server receiving terminal sends;
Respond described first and obtain request, the first network access information of storage and the second network access information are sent to Described terminal;
Wherein, described first network access information refer to described server storage under network under test according to default network ground Location carries out network access information produced by network access operation, and described second network access information refers to described server storage Carry out network access information produced by network access operation, described network according to the default network address under preset security network Access information includes accessing script or accesses link.
On the other hand, embodiments provide a kind of server, this server includes:
First receiving unit, the first acquisition request sending for receiving terminal;
First transmitting element, obtains request for responding described first, by the first network access information and second of storage Network access information is sent to described terminal;
Wherein, described first network access information refer to described server storage under network under test according to default network ground Location carries out network access information produced by network access operation, and described second network access information refers to described server storage Carry out network access information produced by network access operation, described network according to the default network address under preset security network Access information includes accessing script or accesses link.
The first acquisition request that the embodiment of the present invention can be sent by server receiving terminal, and respond described first acquisition Request, the first network access information of storage and the second network access information are sent to described terminal, wherein, described first net Network access information refer to described server storage under network under test according to the default network address carry out network access operation produced Raw network access information, described second network access information refer to described server storage under preset security network according to pre- If the network address carries out network access information produced by network access operation, described network access information include access script or Access link, so that described terminal is according to the described first network access information of reception and described second network access information The matching analysis, determine the security of described network under test;So can be by server record in network under test and preset security net Carry out under network network access information produced by identical network access operation contrasted thus simply and reliably draw/really Make the security of network under test, and then user/terminal can automatically, intelligently select safely or security net higher Network is attached and communicates;Improve the security of user's online.
Brief description
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below Accompanying drawing be briefly described it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of structural representation of network frame provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow sheet of internet security management method provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic flow sheet of internet security management method that another embodiment of the present invention provides;
Fig. 4 is a kind of schematic flow sheet of internet security management method that another embodiment of the present invention provides;
Fig. 5 is a kind of schematic flow sheet of internet security management method that another embodiment of the present invention provides;
Fig. 6 is a kind of schematic flow sheet of internet security management method that another embodiment of the present invention provides;
Fig. 7 is a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 8 is a kind of structural representation of terminal that another embodiment of the present invention provides;
Fig. 9 is a kind of structural representation of terminal that another embodiment of the present invention provides;
Figure 10 is a kind of structural representation of internet security management system provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment a part of embodiment that is the present invention, rather than whole embodiments.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of not making creative work Example, broadly falls into the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " inclusion " and "comprising" indicate The presence of described feature, entirety, step, operation, element and/or assembly, but it is not precluded from one or more of the other feature, whole Body, step, operation, the presence of element, assembly and/or its set or interpolation.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Hereafter clearly indicate other situations, otherwise " one " of singulative, " one " and " being somebody's turn to do " are intended to including plural form.
It will be further appreciated that, used in description of the invention and appended claims, term "and/or" is Refer to any combinations of one or more of the associated item listed and be possible to combine, and include these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if [described condition or event] is detected " can be interpreted to mean according to context " once it is determined that " or " in response to true Fixed " or " once [described condition or event] is detected " or " in response to [described condition or event] is detected ".
In implementing, the terminal described in the embodiment of the present invention including but not limited to such as has touch sensitive surface Other of the mobile phone of (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc is just Portable device.It is to be further understood that in certain embodiments, described equipment not portable communication device, but have tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, describe the terminal including display and touch sensitive surface.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control bar.
Terminal supports various application programs, for example one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can execute in terminal can be public using at least one of such as touch sensitive surface Physical user-interface device.Can adjust among applications and/or in corresponding application programs and/or change and touch sensitive table The corresponding information of display in the one or more functions in face and terminal.So, the public physical structure of terminal (for example, touches Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
The embodiment of the invention discloses a kind of method of internet security management and terminal, contribute to user select safety or The higher network of security enters row data communication.It is described in detail individually below.
In order to be best understood from method and the terminal of a kind of internet security management provided in an embodiment of the present invention, first right below The network architecture that the embodiment of the present invention is suitable for is described.Refer to Fig. 1, Fig. 1 is the open one kind providing of the embodiment of the present invention The structural representation of network architecture.As shown in figure 1, this network architecture schematic diagram can include service equipment and terminal, wherein, take Business equipment can include server, service host, service system and service platform etc., and terminal can include smart mobile phone (as Android phone, IOS mobile phone etc.), PC, panel computer, palm PC, mobile internet device (MID, Mobile Internet Devices) or the internet device such as wearable intelligent equipment.In network architecture shown in Fig. 1, clothes Business equipment can be communicatively coupled with terminal by internet, understands following server as service equipment for the convenience of the user One representative with described terminal carry out related communication description.
Referring to Fig. 2, it is that the embodiment of the present invention provides a kind of schematic flow sheet of internet security management method, as shown in the figure Internet security manager may comprise steps of:
The first acquisition request that S101, server receiving terminal send.
In the embodiment of the present invention, terminal can be by way of wire/wireless communicates (as wifi, bluetooth, data wire etc.) Send first to corresponding server and obtain request, described first obtains request for obtaining first of storage in described server Network access information and the second network access information, described first network access information may refer to described terminal some or Carry out institute during network access operation according to the default network address of the self-defined setting of user/system under multiple network under test The network access information producing, described second network access information may refer to certain that described terminal determines in this terminal/subscriber Under one or more preset security networks, (such as data network, 2G/3G/4G network) is carried out according to the above-mentioned default network address again Produced network access information in network access operating process.Described server can receive the institute that described terminal sends over State the first acquisition request.
It is understood that (such as connecting to footpath between fields to some or multiple uncertain network under test when described terminal connects Raw WiFi) when, when described terminal can carry out corresponding network access by this network under test and operates, described terminal can be according to The access informations such as the default network address of the self-defined setting of user/system, access link, access script carry out corresponding mutual Internet interview, i.e. network access operation, all or part that described terminal can be carried out under this network under test with minute book terminal Access record information, that is to say network access information.Because network under test may be unsafe network, as described terminal exists Connect to strange unsafe WiFi, unsafe WiFi equipment may be distorted terminal and be sent such as to associated server The access informations such as setting network address, access script, thus reach and stealing privacy of user data or destroy user equipment (i.e. Described terminal) or user data (i.e. terminal data) purpose.Alternatively, described terminal can receive or obtain this terminal and treat Carry out network access behaviour according to access informations such as the above-mentioned default network address, access link, access scripts under survey grid network Make the corresponding first network access information producing, (being the first network access information that server receives and accesses).
Alternatively, if terminal disconnects the network connection with network under test (as strange WiFi) in certain time, will When described terminal connects to some or the preset security network of the self-defined setting of multiple user/system, described terminal is permissible Read above-mentioned terminal in memory from this terminal and carry out the corresponding access letter of network access operation under network under test Breath (as the default network address, access link, accesses script etc.), and further described terminal can be again according to above-mentioned access Information carries out network access operation again, and further described terminal can receive or obtain server according to above-mentioned network access Operate the second returned network access information.
Wherein, described preset security network may refer to the network of user's hand labeled/setting, and such as user own home creates WiFi network, data network etc., further the network of mark can be uploaded to corresponding server, to share this net The security of network, or official registers in server/system and obtains network of certification etc., the embodiment of the present invention does not limit Fixed.
Exemplarily as it is assumed that terminal currently connects to certain network under test (as strange WiFi), present user is at end Network address " http is inputted in end://www.***.com " desires access to www.***.com, and terminal can be accessed by WiFi equipment “http://www.***.com " www.***.com, because this strange WiFi is probably insecure network, that is, WiFi equipment may For pseudo-base station equipment, now terminal accesses " http by unsafe pseudo-base station equipment://www.***.com " Baidu.com Stand, this unsafe pseudo-base station equipment may distort above-mentioned Baidu network address, is such as changed into " http://www.***.com/ Index.php.tn=site888_3_pg " etc. so makes what server received target access address and terminal send Reference address differs, but when terminal carries out Baidu's network address access by preset security network (as safe WiFi), server The target access address receiving will be consistent with the reference address that terminal sends over.
In the embodiment of the present invention, user can send corresponding first acquisition by this terminal to corresponding server please Ask, described first obtains request for obtaining this terminal of storage in server respectively under network under test and preset security network Carry out first network access information produced by network access operation and the second network access information according to the default network address, It is to obtain the described terminal that receives of described server to pass through map network (i.e. network under test and preset security network) to this The access information that server sends, accesses link or accesses the access informations such as script.Described server can receive/obtain The described first acquisition request that described terminal sends over.
Alternatively, when described terminal by above-mentioned network under test according to the self-defined setting of user/system such as preset net When the access informations such as network address, access link, access script carry out network access operation, due to described network under test possibly not The network of safety, is also possible to be subject to network attack during the operation of this network access, now described server or described end End can with minute book terminal connect to this network under test under network hole, safety defect etc. received by (strange WIFI) For representing the network attack data by network attack for the described terminal;And/or, when described terminal connects to described network under test If lower user/system in advance described terminal when occur abnormal, now described terminal can be treated to this connecting with minute book terminal Under survey grid network, abnormal operation exception data (as application abnormal data, system operation abnormal data etc.) in this terminal operating.
It should be noted that above-mentioned first network access information and the second network access information refer respectively to described terminal Carry out network access information produced by identical network access operation, described network under network under test and preset security network Access information can include such as access script, access link, network attack data, operation exception data or other be used for The data message producing or recorded in network access operating process, the embodiment of the present invention is not construed as limiting.
Alternatively, this terminal recording/getting can be connected to described network under test and described pre- by described terminal If (i.e. above-mentioned first network accesses letter to carry out network access information produced by identical network access operation under secure network Breath and the second network access information) and record such as network attack data, operation exception data and described treat survey grid The access informations such as the SSID (Service Set Identifier, service set) of network, MAC Address, network name upload/send out Give described server, so that described server record/storage is with regard to the access information of described network under test.
Described terminal can include smart mobile phone (as Android phone, IOS mobile phone etc.), PC, panel computer, The internets such as palm PC, mobile internet device (MID, Mobile Internet Devices) or wearable intelligent equipment Equipment, the embodiment of the present invention is not construed as limiting.
S102, response described first obtain request, by the first network access information of storage and the second network access information It is sent to described terminal, so that described terminal is according to the coupling to described first network access information and the second network access information Analysis determines the security of network under test.
In the embodiment of the present invention, server receives described first acquisition that described terminal sends in step S101 After request, described server can respond described first and obtain request, separately or concurrently by described in book server record/storage Terminal carries out network access according to the default network address/default access information under above-mentioned network under test or under preset security network First network access information produced by operation and the second network access information are sent to described terminal.Described terminal can receive Above-mentioned server obtains the first network access information asking to send/return to described server and the second net according to described first Network access information.Further described terminal can be according to described first network access information and described second network access letter The security to determine described network under test for the matching analysis of breath.
Wherein alternatively, the coupling to described first network access information and described second network access information for the described basis Analysis, determines the security of described network under test, including:
Terminal by the access script in described first network access information or accesses link and described second network access letter Access script in breath or access link carry out the matching analysis, obtain corresponding matching result information;
If there is default access in described matching result information to distort information it is determined that described network under test is uneasiness Whole network;Or, if there is not default access in described matching result information to distort information it is determined that described network under test For secure network or possible secure network.
Described terminal by the access script in described first network access information or can access link and described second net Access script in network access information or access link carry out the matching analysis and obtain corresponding matching result information, in implementing Described terminal may determine that access script in described first network access information or access link whether with described second network Access script in access information or access link coupling, if coupling, described terminal can consider that this terminal connects to described Carry out network access information produced by network access operation according to the default network address under network under test to be not tampered with, or Think that described network under test can be possible secure network or secure network, that is to say that described terminal can determine this terminal-pair Described first network access information and described second network access information carry out the matching analysis and can obtain such as network access letter Breath is not tampered with, described network under test is the matching result information such as secure network or possible secure network;Otherwise, described terminal It is considered that this terminal connects carrying out being produced with the operation of preset security network identical network access to described network under test Network access information be tampered or described network under test be insecure network, that is to say described terminal by determine arrive this terminal The matching analysis are carried out to described first network access information and described second network access information and obtains such as network access information It has been tampered or described network under test has been the matching result information such as insecure network.Further described terminal may determine that above-mentioned To in the matching result information obtained by the matching analysis of described first network access information and the second network access information whether The default access of self-defined setting in this terminal distorts information (as network access information is usurped in advance to there is user/system Change), if it is present, described terminal is fair to consider that/determines that described network under test is insecure network, if do not deposited , then described terminal can consider that described network under test is secure network or insecure network.That is to say, described terminal is permissible By accessing script or accessing the access pin in link and described second network access information in described first network access information This or access link carry out coupling contrast, if the access script in described first network access information or access link and described Access script in second network access information or access link are identical, then before described terminal can consider, this terminal is connected The described network under test connecing is secure network or possible secure network, if the access script in described first network access information Or the access script in access link and described second network access information or access link differ, then described terminal is permissible The described network under test that before thinking, this terminal connects is insecure network.
Wherein alternatively, the coupling to described first network access information and described second network access information for the described basis Analysis, determines the security of described network under test, including:
Terminal by the access script in described first network access information or accesses link and described second network access letter Access script in breath or access link carry out the matching analysis, obtain corresponding matching result information;
Send the second acquisition request including described matching result information to described server;Described second acquisition please Seek the frequency existing under described network under test corresponding to described matching result information for obtaining storage in described server, Or for obtaining described server existing corresponding to described matching result information under described network under test according to storage The security of the described network under test that the frequency determines;
Receive described server and obtain depositing under described network under test of the described storage that request returns according to described second In the frequency corresponding to described matching result information, and described coupling knot is had under described network under test according to described storage The frequency corresponding to fruit information determines the security of described network under test;Or, receive described server and obtain according to described second Take the security of the described network under test of request return.
That is to say, wherein alternatively, methods described also includes:
Server receives described terminal and sends the second acquisition request, and described second obtains request includes matching result information, Described matching result information refers to described terminal and links and described access script in described first network access information or access Access script in second network access information or access link carry out the matching analysis, the matching result information that correspondence obtains, institute State the second acquisition and ask there is described matching result information under described network under test for obtain in described server storage The corresponding frequency, or there is described matching result for obtaining described server under described network under test according to store The security of the described network under test that the frequency corresponding to information determines;
Respond described second and obtain request, by storage to there is described matching result information institute under described network under test right The frequency answered is sent to described terminal;Or, response described second obtains request, according to described storage in described network under test The lower frequency existing corresponding to described matching result information determines the security of described network under test, will treat survey grid described in determination The security of network is sent to described terminal.
Described terminal by the access script in described first network access information or can access link and described second net Access script in network access information or access link carry out the matching analysis and obtain corresponding matching result information, in implementing Described terminal may determine that access script in described first network access information or access link whether with described second network Access script in access information or access link coupling, if coupling, described terminal can consider that this terminal connects to described Carry out network access information produced by network access operation according to the default network address under network under test to be not tampered with, or Described network under test can be secure network/possibility secure network, that is to say that described terminal can determine described in this terminal-pair First network access information and described second network access information carry out the matching analysis obtain such as network access information not by Distort, described network under test is the matching result information such as secure network/possibility secure network;Otherwise, described terminal can consider This terminal connect carry out to described network under test and preset security network identical network access operation produced by network visit The information of asking has been tampered or described network under test is insecure network, that is to say that described terminal will determine to described in this terminal-pair the One network access information and described second network access information carry out the matching analysis obtain such as network access information be tampered or Described network under test is the matching result information such as insecure network.Further described terminal can send the to described server Two obtain request, and wherein, described second acquisition request can include described matching result information, and described second acquisition request is permissible For obtaining the frequency existing under described network under test corresponding to described matching result information of storage in described server, or Described in person, second obtains request and can be used for obtaining described server according to storage exists under described network under test Join the security of the described network under test that the frequency corresponding to object information determines.Alternatively, connect to described in each terminal After carrying out the operation of different or identical network access under network under test, each terminal can repeat above-mentioned to treating survey grid The network corresponding network access information obtained with carrying out the operation of identical network access under preset security network carries out coupling point Analysis (i.e. whether network access information is tampered), each terminal above-mentioned uploads it is also possible that obtaining corresponding matching result information To described server;Described server can count and store each terminal and carry out network access operation under described network under test Whether corresponding network access information is tampered, and distorts the matching result information such as number of times.
Described server receive described second obtain request after, if described second acquisition request be used for obtaining described The frequency existing under described network under test corresponding to described matching result information of storage in server, then described server Each terminal of statistics/storage in book server can be found out in described network under test according to the described second instruction obtaining request The lower frequency/the number of times existing corresponding to described matching result information, described server can be by the described server finding out The frequency existing under described network under test corresponding to described matching result information of storage is sent to described terminal, described terminal Can receive described server according to described second obtain request return described server in storage in described network under test The lower frequency existing corresponding to described matching result information, further described terminal can also be according to storage in described server The frequency existing under described network under test corresponding to described matching result information to determine the security of described network under test.
Described server receive described second obtain request after, if described second acquisition request be used for obtaining described Server is treated according to the frequency existing under described network under test corresponding to described matching result information of storage determines The security of survey grid network, then described server can first look for out book server according to the described second instruction obtaining request There is the frequency/number of times corresponding to described matching result information (i.e. under described network under test in each terminal of middle statistics/storage It is that described server can count and store each terminal and connect that to carry out network access operation to described network under test produced Number of times that network access information is tampered or thought that described network under test is secure network/insecure network/can by each terminal The number of times of energy secure network), the presence under described network under test then according to storage in the described server finding out is described The frequency corresponding to matching result information to determine the security of described network under test come the security to determine described network under test, Finally by determine to the security of described network under test be sent to described terminal.Described terminal can receive described server root According to the described second security obtaining the described network under test that request returns.
Wherein alternatively, the coupling to described first network access information and described second network access information for the described basis Analysis, determines the security of described network under test, including:
Terminal sends the 3rd to described server and obtains request, and described 3rd acquisition request is used for indicating that described server will Accessing script or accessing the access script in link and described second network access information in described first network access information Or access link and carry out the matching analysis, obtain corresponding matching result information, search and send in described server storage There is the frequency corresponding to described matching result information under described network under test;Or, for indicating that described server will be described Accessing script or accessing the access script in link and described second network access information or visit in first network access information Ask that link carries out the matching analysis, obtain corresponding matching result information, according to storage exists under described network under test The frequency corresponding to matching result information determines the security of described network under test, and the safety by the described network under test determining Property is sent to described terminal;
Receive described server and obtain depositing under described network under test of the described storage that request returns according to the described 3rd In the frequency corresponding to described matching result information, and described coupling knot is had under described network under test according to described storage The frequency corresponding to fruit information determines the security of described network under test;Or, receive described server and obtain according to the described 3rd Take the security of the described network under test of request return.
That is to say, wherein alternatively, methods described also includes:
Server receives described terminal and sends the 3rd acquisition request, and described 3rd acquisition request is used for indicating described server By accessing script or accessing the access pin in link and described second network access information in described first network access information This or access link and carry out the matching analysis, obtain corresponding matching result information, and search storage in described server in institute State the frequency existing under network under test corresponding to described matching result information;Or, for indicating described server by described Accessing script or accessing the access script in link and described second network access information or access in one network access information Link carries out the matching analysis, obtains corresponding matching result information, and according to storage exists under described network under test The frequency corresponding to matching result information determines the security of described network under test;
Respond the described 3rd and obtain request, described first is accessed link or first and accesses script and described second access chain Connect or the second access script carries out the matching analysis, obtain corresponding matching result information, and search storage in described server There is the frequency corresponding to described matching result information under described network under test, and by described storage in described network under test The lower frequency existing corresponding to described matching result information is sent to described terminal;Or, described first is accessed link or the One access script and described second accesses link or the second access script carries out the matching analysis, obtains corresponding matching result letter Breath, and search the frequency existing under described network under test corresponding to described matching result information of storage in described server, Treat survey grid according to the frequency that described storage exists corresponding to described matching result information under described network under test determines The security of network, the security of the described network under test determining is sent to described terminal.
In implementing, described terminal can send the 3rd to described server and obtain request, when the described 3rd acquisition please Ask for indicate described server by the access script in described first network access information or access link and described second net Access script in network access information or access link carry out the matching analysis, obtain corresponding matching result information, search concurrent Send in described server storage when there is the frequency corresponding to described matching result information under described network under test, described When server receives described 3rd acquisition request, described server can obtain institute according to the described 3rd instruction obtaining request State terminal respectively under described network under test and carry out network access behaviour according to the default network address under described preset security network Make the described first network access information that produces and described second network access information, then described server can be by described the Accessing script or accessing the access script in link and described second network access information or access in one network access information Link carry out mate comparative analysis, if it does, then described carry out mate comparative analysis will obtain such as described terminal described Carry out under network under test being not tampered with or institute with network access information produced by preset security network identical network operation Stating network under test is the matching result information such as secure network or possible secure network;Otherwise, described carry out mate comparative analysis will Obtain such as described terminal to carry out under described network under test and network produced by preset security network identical network operation Access information has been tampered or described network under test is the matching result information such as insecure network.Secondly described server is permissible Find out from book server book server count/store to each terminal connect and carry out network access to described network under test The number of times that network access information produced by operation is tampered, or described each terminal count/think described network under test be safety/ Dangerous/may secure network number of times, what that is, described server can find out in book server storage treats survey grid described There is the frequency/number of times corresponding to described matching result information, further described server can be by above-mentioned lookup under network In described server, the frequency/number of times existing under described network under test corresponding to described matching result information of storage is sent to Described terminal;Described terminal can receive described server and obtain, according to the described 3rd, the described server that request returns/sends The frequency/the number of times existing under described network under test corresponding to described matching result information of middle storage is sent to described terminal, And the frequency/the number of times existing under described network under test corresponding to described matching result information according to storage in described server It is sent to described terminal to determine the security of described network under test.
Or, described terminal can send the 3rd to described server and obtain request, if described 3rd acquisition request is used Visit with described second network in indicating that the access script in described first network access information or access are linked by described server Ask that the access script in information or access link carry out the matching analysis, obtain corresponding matching result information, existing according to storage There is the security that the frequency corresponding to described matching result information determines described network under test under described network under test, and will be really When the security of fixed described network under test is sent to described terminal, then described server is transmitted across receiving described terminal When the described 3rd coming obtains request, described server can obtain described terminal according to the described 3rd instruction obtaining request and divide Carry out what network access operation produced according to the default network address not under described network under test and under described preset security network Described first network access information and described second network access information, then described server described first network can be visited Ask that the access script in information or access link and link and carry out with the access script in described second network access information or access Coupling comparative analysis, if it does, then described carry out mate comparative analysis will obtain such as described terminal in described network under test Under carry out being not tampered with network access information produced by preset security network identical network operation or described treat survey grid Network is the matching result information such as secure network or possible secure network;Otherwise, described carry out mate comparative analysis will obtain such as Described terminal is carried out and network access information produced by preset security network identical network operation under described network under test It has been tampered or described network under test has been the matching result information such as insecure network.Secondly described server can be from this service Find out each terminal that book server counts/store in device and connect and carry out network access operation to described network under test and produced The number of times that raw network access information is tampered, or described each terminal count/think described network under test be safety/dangerous/ The number of times of possible secure network, that is, described server can find out in book server existing under described network under test of storage The frequency/number of times corresponding to described matching result information.Then described server can be according in the described server finding out The frequency/the number of times existing under described network under test corresponding to described matching result information of storage to determine described network under test Security, finally described server can by determine to the security of described network under test be sent to described terminal, described Terminal can receive described server according to the described 3rd security obtaining the described network under test that request returns.
It is wherein alternatively, described that there is described matching result information institute under described network under test according to described storage right The frequency answered determines the security of described network under test, including:
If the described frequency is in preset first threshold value scope it is determined that described network under test is secure network;
If the described frequency is in default Second Threshold scope it is determined that described network under test is possible secure network;
If the described frequency is in default 3rd threshold range it is determined that described network under test is insecure network.
It is described that to there is the frequency corresponding to described matching result information under described network under test according to described storage true The security specific implementation step of fixed described network under test can include:Judge/determine treating described of described server storage There is the frequency corresponding to described matching result information under survey grid network and be stored in advance in described terminal/described clothes in user/system The security of described network under test is determined, exemplarily as when described clothes in which threshold range of self-defined setting in business device The frequency existing under described network under test corresponding to described matching result information of business device storage is in user/system in advance certainly Definition setting preset first threshold value in the range of, then it is considered that/determine described network under test be secure network;When described service The frequency existing under described network under test corresponding to described matching result information of device storage is in user/system and makes by oneself in advance In the range of the default Second Threshold of justice setting, then it is considered that/determining that described network under test is possible secure network;When described clothes The frequency existing under described network under test corresponding to described matching result information of business device storage is in user/system in advance certainly In default 3rd threshold range of definition setting, then it is considered that/determine that described network under test is insecure network.
Wherein alternatively, methods described also includes:
Obtain terminal and carry out network access produced by network access operation according to the default network address under network under test Information;
Judge to whether there is in described network access information and caused operation exception data operated by described network access, And/or from server obtain network attack data;
If so, then according to described network attack data and/or described operation exception data, determine the peace of described network under test Quan Xing.
Described terminal can also obtain that this terminal recorded under described network under test according to the above-mentioned default network address Carry out network access information produced by network access operation (i.e. above-mentioned first network access information), then described terminal is also May determine that to whether there is in described network access information and caused operation exception data is operated (such as by described network access System operation is abnormal slow), and/or the network attack data getting from described server is (as application program occurs for no reason Collapse etc.), if it is present, described terminal can be according to above-mentioned network attack data and/or operation exception data Lai really The security of fixed described network under test;If it does not exist, then end flow process.
Wherein alternatively, described according to described network attack data and/or described operation exception data, determine described to be measured The security of network, including:
Terminal sends the 4th to described server and obtains request, and the described 4th obtains request includes described network attack data And/or described operation exception data, described acquisition ask for obtain storage in described server under described network under test There is the frequency corresponding to described network attack data and/or described operation exception data;Or, for obtaining described server The frequency existing under described network under test corresponding to described network attack data and/or described operation exception data according to storage The security of the described network under test of secondary determination;
Receive described server and obtain depositing under described network under test of the described storage that request returns according to the described 4th In the frequency corresponding to described network attack data and/or described operation exception data, and treated described according to described storage There is the frequency corresponding to described network attack data and/or described operation exception data under survey grid network and determine described network under test Security;Or, receive described server according to the described 4th security obtaining the described network under test that request returns.
That is to say, wherein alternatively, described first network access information also includes network attack data and/or operation exception Data, methods described also includes:
Server receives the 4th acquisition request that described terminal sends;Described 4th acquisition request is used for obtaining described service The frequency existing under described network under test corresponding to described network attack data and/or described operation exception data of storage in device Secondary;Or, for obtain described server according to storage exist under described network under test described network attack data and/or The security of the described network under test that the frequency corresponding to described operation exception data determines;
Respond the described 4th and obtain request, in the described server of lookup, storage has described net under described network under test The frequency corresponding to data and/or described operation exception data attacked by network, and described storage is deposited under described network under test The frequency corresponding in described network attack data and/or described operation exception data is sent to described terminal;Or, search institute State in server storage there is described network attack data under described network under test and/or described operation exception data institute is right The frequency answered, and described network attack data is had under described network under test according to described storage and/or described operation is different The frequency corresponding to regular data determines the security of described network under test, and the security of the described network under test determining is sent to Described terminal.
In implementing, described terminal can send the 4th to described server and obtain request, if described 4th acquisition Ask there is described network attack data and/or described fortune under described network under test for obtain in described server storage The frequency corresponding to row abnormal data, then when described server receives the described 4th and obtains request, described server can Connected with each terminal finding out in book server record/storage from book server carry out to described network under test identical or Different network access has the number of times/frequency corresponding to network attack data and/or operation exception data when operating, enter one Walk described server and can there is described network attack under described network under test by store in the described server finding The frequency corresponding to data and/or described operation exception data sends/returns to described terminal, and described terminal can receive described There is described net according to store in the described 4th described server obtaining request return under described network under test in server The frequency corresponding to data and/or described operation exception data attacked by network.Alternatively, connect in each terminal and treat survey grid to described After carrying out the operation of different or identical network access under network, each terminal treats survey grid by what this terminal record recorded described Carry out network access information produced by network access operation (as accessed script, accessing link, operation exception data, net under network Data etc. attacked by network) it is sent to described server;Described server can count and store each terminal in described network under test Under carry out the corresponding network access information of network access operation (as described in exist under described network under test operation exception data Or number of times/the frequency of described network attack data etc., described network under test are marked as safety/dangerous/may secure network Number of times/frequency etc.).
Or, described terminal can send the 4th to described server and obtain request, if described 4th acquisition request is used In obtain described server according to storage there is described network attack data under described network under test and/or described operation is different The security of the described network under test that the frequency corresponding to regular data determines, then receive the described 4th in described server and obtain When taking request, each terminal that described server can find out record/storage in book server from book server connects to institute State and under network under test, carry out thering is network attack data and/or operation exception data during identical or different network access operation Corresponding number of times/frequency, then described server can according in the described server finding storage described to be measured There is the frequency corresponding to described network attack data and/or described operation exception data under network to determine described network under test Security, further by determine to the security of described network under test be sent to described terminal;Described terminal can connect Receive described server according to the described 4th security obtaining the described network under test that request returns/sends.
Wherein alternatively, described existed under described network under test according to described storage described network attack data and/ Or the frequency corresponding to described operation exception data determines the security of described network under test, including:
If the described frequency is in default 4th threshold range it is determined that described network under test is secure network;
If the described frequency is in default 5th threshold range it is determined that described network under test is possible secure network;
If the described frequency is in default 6th threshold range it is determined that described network under test is insecure network.
Described have described network attack data according to described storage and/or described operation is different under described network under test The frequency corresponding to regular data determines that the security specific implementation step of described network under test can include:Judge/determine described The existing under described network under test corresponding to described network attack data and/or described operation exception data of server storage The frequency is in user/system and is stored in advance in which threshold range of self-defined setting in described terminal/described server Determine the security of described network under test, exemplarily as described in exist under described network under test when described server storage The frequency corresponding to network attack data and/or described operation exception data is in the pre- of user/system self-defined setting in advance If in the 4th threshold range, then it is considered that/determine described network under test be secure network;When described server storage is in institute State the frequency existing under network under test corresponding to described network attack data and/or described operation exception data and be in user/be In default 5th threshold range of system self-defined setting in advance, then it is considered that/determine that described network under test is possible safety net Network;When described server storage has described network attack data and/or described operation exception number under described network under test Be in default 6th threshold range of user/system self-defined setting in advance according to the corresponding frequency, then it is considered that/determine Described network under test is insecure network.
It should be noted that above-mentioned preset first threshold value scope, default Second Threshold scope ... are until preset the 6th Threshold range can be the self-defined setting in described terminal/described server in advance of user/system, and above-mentioned default the One threshold range is until described default 6th threshold range may refer to identical threshold range it is also possible to refer to different thresholds Value scope, the embodiment of the present invention is not construed as limiting.
Wherein alternatively, methods described also includes:
Terminal, when described terminal support at least one available network of connection is detected, sends corresponding to described server Network security verification is asked, and wherein, described network security verification request includes network identity corresponding with described available network, no The different network identity of same available network correspondence;
Receive the safety corresponding with described network identity that described server returns according to the request of described network security verification Object information;
According to described safe object information and described network identity, described available network is shown to default network connection Operation interface.
That is to say, wherein alternatively, methods described also includes:
Server receives the network security verification request that described terminal sends;Described network security verification request includes described Terminal supports the corresponding network identity of at least one available network connecting, the different network mark of different available network correspondences Know;
Respond described network security verification information, corresponding with the described network identity safe object information searched is sent To described terminal, so that described terminal knows the security of each available network.
In implementing, when user opens the network savvy of terminal, described terminal can detect and search this terminal Can support connect one or more available networks (such as user open terminal WiFi function, described terminal may search for attached Near just Broadcast SSIDs signal WiFi network, or non-Broadcast SSIDs signal but preserve in this terminal its network SSID and The hiding WiFi network of password), thus forming the available network list that described terminal allows to connect;Or, described terminal is Connect to a network, other attachable available networks can also be scanned for, regularly updating this terminal can Support the available network list connecting.Then described terminal by the current network connecting or can pass through data network (as 2G/ 3G etc.) send corresponding network security verification request to described server, described network security verification request includes above-mentioned available The network identity of network, different available network correspondences has different network identities, that is to say that described terminal can pass through net SSID in the above-mentioned available network list searching and MAC Address are sent to described server by network, so that described server Verify and return the security of all or part available network in described available network list.Described server receive described During the described network security verification request that terminal sends over, described server will respond described network security verification request, Search and determine the safe object information of all or part network in above-mentioned available network list in book server, that is to say respectively Find out network security object information corresponding with described network identity, further will find out and described network identity pair The safe object information answered is sent to described terminal.Described terminal can receive described server according to described network security verification The safe object information corresponding with described network identity that request returns, terminal described further can also be according to described safety Object information and described network identity, above-mentioned available network are shown in default network connection operation interface, that is to say Described terminal can be according to the lookup result (i.e. safe object information) of above-mentioned server, in each available network institute shown behind State the security of network, display " safety/trustable network ", " insecure network " " may be pacified such as after the SSID of each WiFi The information such as whole network ".
Wherein alternatively, described according to described safe object information and described network identity, described available network is shown To default network connection operation interface, including:
According to described network identity, by corresponding for whole available networks safe result presentation of information to default network connection Operation interface;Or,
According to described network identity, target available network is shown to default network connection operation interface, wherein, described The corresponding safe object information of target available network is default secure network object information.
Described terminal can be supported above-mentioned terminal corresponding to whole available networks of connection according to described network identity Safe result presentation of information to user/system in advance in this terminal self-defined setting default network connection operation circle Face;Or, target available network can be shown to default network connection operation circle according to described network identity by described terminal On face, the corresponding safe object information of wherein said target available network is user/system in advance in the self-defined setting of this terminal Default secure network object information, such as safety/trustable network or may secure network, be that described terminal can be by basis Described network identity and described safe object information, will determine as safe or may be safe target available network and are shown to institute State in default network connection operation interface.
The embodiment of the present invention can be by storing in terminal acquisition server under network under test according to the default network address Carry out first network access information produced by network access operation, and the weight under preset security network storing in server Newly carry out produced second network access information of network access operation according to the described default network address, according further to right Described first network access information and the matching analysis of described second network access information, determine the safety of described network under test Property;The network access information of server record so can be contrasted thus simply and reliably drawing/determining the safety of network under test Property, so user/terminal can automatically, intelligently select safely or security network is attached and communicates higher; Improve the security of user's online.
Refer to Fig. 3, be a kind of schematic flow sheet of internet security management method that another embodiment of the present invention provides, The methods described of the embodiment of the present invention may include steps of.
The first acquisition request that S201, server receiving terminal send.
S202, response described first obtain request, by the first network access information of storage and the second network access information It is sent to described terminal, so that described terminal is according to the coupling to described first network access information and the second network access information Analysis determines the security of network under test;Wherein, what described first network access information referred to described server storage is treating survey grid Carry out network access information produced by network access operation, described second network access information according to the default network address under network Refer to described server storage carries out net produced by network access operation according to the default network address under preset security network Network access information, described network access information includes accessing script or accesses link.
S203, the described terminal of reception send second and obtain request, and described second acquisition asks to include matching result information, institute State matching result information and refer to described terminal and by the access script in described first network access information or access link and described the Access script in two network access informations or access link carry out the matching analysis, correspond to the matching result information obtaining, described Second obtains request has described matching result information institute for obtain in described server storage under described network under test The corresponding frequency, or believed according to the described matching result that exists under described network under test of storage for obtaining described server The security of the described network under test that the corresponding frequency of breath determines.
It should be noted that when described second obtains request and treat survey grid for obtain in described server storage described When there is the frequency corresponding to described matching result information under network, server continues executing with step S204;When the described second acquisition Ask for obtaining described server existing corresponding to described matching result information under described network under test according to storage During the security of described network under test that the frequency determines, server continues executing with step S205.
S204, response described second obtain request, and the described matching result that exists under described network under test of storage is believed The corresponding frequency of breath is sent to described terminal.
S205, response described second obtain request, there is described coupling according to described storage under described network under test The frequency corresponding to object information determines the security of described network under test, and the security of the described network under test determining is sent To described terminal.
The embodiment of the present invention can be by storing in terminal acquisition server under network under test according to the default network address Carry out first network access information produced by network access operation, and the weight under preset security network storing in server Newly carry out produced second network access information of network access operation according to the described default network address, according further to right Described first network access information and the matching analysis of described second network access information, determine the safety of described network under test Property;The network access information of server record so can be contrasted thus simply and reliably drawing/determining the safety of network under test Property, so user/terminal can automatically, intelligently select safely or security network is attached and communicates higher; Improve the security of user's online.
Refer to Fig. 4, be a kind of schematic flow sheet of internet security management method that another embodiment of the present invention provides, The methods described of the embodiment of the present invention can be with all or part implementation steps in above-mentioned Fig. 3 embodiment, and wherein the present invention is implemented The methods described of example also comprises the steps.
S301, the described terminal of reception send the 3rd and obtain request, and described 3rd acquisition request is used for indicating described server By accessing script or accessing the access pin in link and described second network access information in described first network access information This or access link and carry out the matching analysis, obtain corresponding matching result information, and search storage in described server in institute State the frequency existing under network under test corresponding to described matching result information;Or, for indicating described server by described Accessing script or accessing the access script in link and described second network access information or access in one network access information Link carries out the matching analysis, obtains corresponding matching result information, and according to storage exists under described network under test The frequency corresponding to matching result information determines the security of described network under test.
It should be noted that when described 3rd acquisition request is used for indicating that described first network is accessed letter by described server The access script accessing in script or access link and described second network access information in breath or access link are mated Analysis, obtains corresponding matching result information, and it is described to search the presence under described network under test of storage in described server During the frequency corresponding to matching result information, server continues executing with step S302;When the described 3rd acquisition request is used for indicating Described server by the access script in described first network access information or accesses link and described second network access information In access script or access link and carry out the matching analysis, obtain corresponding matching result information, and according to storage described When there is the security that the frequency corresponding to described matching result information determines described network under test under network under test, server continues Continuous execution step S303.
S302, response the described 3rd obtain request, and described first is accessed link or the first access script and described second Access link or the second access script carries out the matching analysis, obtain corresponding matching result information, and search in described server The frequency existing under described network under test corresponding to described matching result information of storage, and described storage is treated described There is the frequency corresponding to described matching result information under survey grid network and be sent to described terminal.
S303, response the described 3rd obtain request, and described first is accessed link or the first access script and described second Access link or the second access script carries out the matching analysis, obtain corresponding matching result information, and search in described server The frequency existing under described network under test corresponding to described matching result information of storage, treats described according to described storage There is the security that the frequency corresponding to described matching result information determines described network under test, described in determining under survey grid network The security of network under test is sent to described terminal.
The embodiment of the present invention can be by storing in terminal acquisition server under network under test according to the default network address Carry out first network access information produced by network access operation, and the weight under preset security network storing in server Newly carry out produced second network access information of network access operation according to the described default network address, according further to right Described first network access information and the matching analysis of described second network access information, determine the safety of described network under test Property;The network access information of server record so can be contrasted thus simply and reliably drawing/determining the safety of network under test Property, so user/terminal can automatically, intelligently select safely or security network is attached and communicates higher; Improve the security of user's online.
Refer to Fig. 5, be a kind of schematic flow sheet of internet security management method that another embodiment of the present invention provides, The methods described of the embodiment of the present invention can be included as all or part implementation steps in figure 3 above or Fig. 4, wherein, the present invention The methods described of embodiment also comprises the steps.
The 4th acquisition request that S401, the described terminal of reception send;Described 4th acquisition request is used for obtaining described service The frequency existing under described network under test corresponding to described network attack data and/or described operation exception data of storage in device Secondary;Or, for obtain described server according to storage exist under described network under test described network attack data and/or The security of the described network under test that the frequency corresponding to described operation exception data determines.
In the embodiment of the present invention, when the described 4th obtain request for obtain in described server storage described to be measured When there is the frequency corresponding to described network attack data and/or described operation exception data under network, server continues executing with Step S402;When the described 4th acquisition request has institute for obtaining described server according to store under described network under test When stating the security of described network under test that the frequency corresponding to network attack data and/or described operation exception data determines, Server continues executing with step S403.
S402, response the described 4th obtain request, and in the described server of lookup, storage exists under described network under test The frequency corresponding to described network attack data and/or described operation exception data, and described storage is treated survey grid described There is the frequency corresponding to described network attack data and/or described operation exception data under network and be sent to described terminal.
S403, response the described 4th obtain request, and in the described server of lookup, storage exists under described network under test The frequency corresponding to described network attack data and/or described operation exception data, and according to described storage described to be measured There is the frequency corresponding to described network attack data and/or described operation exception data under network and determine described network under test Security, the security of the described network under test determining is sent to described terminal.
The embodiment of the present invention can be by storing in terminal acquisition server under network under test according to the default network address Carry out first network access information produced by network access operation, and the weight under preset security network storing in server Newly carry out produced second network access information of network access operation according to the described default network address, according further to right Described first network access information and the matching analysis of described second network access information, determine the safety of described network under test Property;The network access information of server record so can be contrasted thus simply and reliably drawing/determining the safety of network under test Property, so user/terminal can automatically, intelligently select safely or security network is attached and communicates higher; Improve the security of user's online.
Refer to Fig. 6, be a kind of schematic flow sheet of internet security management method that another embodiment of the present invention provides, The methods described of the embodiment of the present invention can include such as all or part implementation steps in figure 3 above-Fig. 5, and wherein, the present invention is real The methods described applying example also comprises the steps.
The network security verification request that S501, the described terminal of reception send;Described network security verification request includes described Terminal supports the corresponding network identity of at least one available network connecting, the different network mark of different available network correspondences Know.
S502, the described network security verification information of response, by corresponding with the described network identity safe result letter searched Breath is sent to described terminal, so that described terminal knows the security of each available network.
The embodiment of the present invention can be by storing in terminal acquisition server under network under test according to the default network address Carry out first network access information produced by network access operation, and the weight under preset security network storing in server Newly carry out produced second network access information of network access operation according to the described default network address, according further to right Described first network access information and the matching analysis of described second network access information, determine the safety of described network under test Property;The network access information of server record so can be contrasted thus simply and reliably drawing/determining the safety of network under test Property, so user/terminal can automatically, intelligently select safely or security network is attached and communicates higher; Improve the security of user's online.
Refer to Fig. 7, be a kind of structural representation of server of the embodiment of the present invention, the described clothes of the embodiment of the present invention Business device 7 includes:
First receiving unit 70, the first acquisition request sending for receiving terminal;
First transmitting element 71, obtains request for responding described first, by the first network access information of storage and the Two network access informations are sent to described terminal, so that described terminal is according to described first network access information and the second network The matching analysis of access information determine the security of network under test;
Wherein, described first network access information refer to described server storage under network under test according to default network ground Location carries out network access information produced by network access operation, and described second network access information refers to described server storage Carry out network access information produced by network access operation, described network according to the default network address under preset security network Access information includes accessing script or accesses link.
Implementing of the unit being related in the embodiment of the present invention refers to correlation in the corresponding embodiment of Fig. 1 to Fig. 6 Functional unit or the description of implementation steps, will not be described here.
The embodiment of the present invention can be by storing in terminal acquisition server under network under test according to the default network address Carry out first network access information produced by network access operation, and the weight under preset security network storing in server Newly carry out produced second network access information of network access operation according to the described default network address, according further to right Described first network access information and the matching analysis of described second network access information, determine the safety of described network under test Property;The network access information of server record so can be contrasted thus simply and reliably drawing/determining the safety of network under test Property, so user/terminal can automatically, intelligently select safely or security network is attached and communicates higher; Improve the security of user's online.
Refer to Fig. 8, be a kind of structural representation of server of another embodiment of the present invention, the institute of the embodiment of the present invention State server 8 can include:Above-mentioned the first receiving unit 70, the first transmitting element 71, wherein, described server also includes:
Second receiving unit 72, sends the second acquisition request for receiving described terminal, described second obtains request includes Matching result information, described matching result information refers to described terminal by the access script in described first network access information or visit Ask that the access script in link and described second network access information or access link carry out the matching analysis, the coupling that correspondence obtains Object information, described second obtains request for obtaining described of the presence under described network under test of storage in described server Join the frequency corresponding to object information, or there is institute for obtaining described server under described network under test according to store State the security of the described network under test that the frequency corresponding to matching result information determines;
Second transmitting element 73, obtains request for responding described second, storage is existed under described network under test The frequency corresponding to described matching result information is sent to described terminal;Or, response described second obtains request, according to described The frequency existing under described network under test corresponding to described matching result information of storage determines the safety of described network under test Property, the security of the described network under test determining is sent to described terminal.
Wherein alternatively, described server also includes:
3rd receiving unit 74, sends the 3rd acquisition request for receiving described terminal, described 3rd acquisition request is used for Indicate that described server by the access script in described first network access information or accesses link and described second network access Access script in information or access link carry out the matching analysis, obtain corresponding matching result information, and search described service The frequency existing under described network under test corresponding to described matching result information of storage in device;Or, described for indicating Server by the access script in described first network access information or accesses in link and described second network access information Access script or access link carries out the matching analysis, obtain corresponding matching result information, and according to storage described to be measured There is the security that the frequency corresponding to described matching result information determines described network under test under network;
3rd transmitting element 75, obtains request for responding the described 3rd, and described first is accessed link or the first access Script and described second accesses link or the second access script carries out the matching analysis, obtains corresponding matching result information, and looks into Look for the frequency existing under described network under test corresponding to described matching result information of storage in described server, and will be described The frequency existing under described network under test corresponding to described matching result information of storage is sent to described terminal;Or, will Described first access link or the first access script and described second access link or second access script and carry out the matching analysis, obtain To corresponding matching result information, and search storage in described server there is described matching result under described network under test , there is the frequency corresponding to described matching result information under described network under test according to described storage in the frequency corresponding to information The secondary security determining described network under test, the security of the described network under test determining is sent to described terminal.
Wherein alternatively, described first network access information also includes network attack data and/or operation exception data, institute State server also to include:
4th receiving unit 76, for receiving the 4th acquisition request that described terminal sends;Described 4th obtains request uses There is described network attack data and/or described operation exception in storage in the described server of acquisition under described network under test The frequency corresponding to data;Or, there is described net for obtaining described server under described network under test according to store The security of the described network under test that the frequency corresponding to data and/or described operation exception data determines attacked by network;
4th transmitting element 77, for respond described 4th obtain request, search described server in storage described There is the frequency corresponding to described network attack data and/or described operation exception data under network under test, and by described storage The frequency existing under described network under test corresponding to described network attack data and/or described operation exception data be sent to Described terminal;Or, search described server in storage exist under described network under test described network attack data and/or The frequency corresponding to described operation exception data, and described network attack is had under described network under test according to described storage The frequency corresponding to data and/or described operation exception data determines the security of described network under test, will treat described in determination The security of survey grid network is sent to described terminal.
Wherein alternatively, described server also includes:
5th receiving unit 78, for receiving the network security verification request that described terminal sends;Described network security is tested Card request includes the corresponding network identity of at least one available network that described terminal is supported to connect, and different available networks corresponds to Different network identities;
5th transmitting element 79, for responding described network security verification information, by lookup and described network identity pair The safe object information answered is sent to described terminal, so that described terminal knows the security of each available network.
Implementing of the unit being related in the embodiment of the present invention refers to correlation in the corresponding embodiment of Fig. 1 to Fig. 7 Functional unit or the description of implementation steps, will not be described here.
The embodiment of the present invention can be by storing in terminal acquisition server under network under test according to the default network address Carry out first network access information produced by network access operation, and the weight under preset security network storing in server Newly carry out produced second network access information of network access operation according to the described default network address, according further to right Described first network access information and the matching analysis of described second network access information, determine the safety of described network under test Property;The network access information of server record so can be contrasted thus simply and reliably drawing/determining the safety of network under test Property, so user/terminal can automatically, intelligently select safely or security network is attached and communicates higher; Improve the security of user's online.
Referring to Fig. 9, it is a kind of server architecture schematic diagram provided in an embodiment of the present invention.In the present embodiment as depicted Terminal can include:One or more processors 801;One or more input equipments 802, one or more output equipments 803 and memory 804.Above-mentioned processor 801, input equipment 802, output equipment 803 and memory 804 pass through bus 805 even Connect.Memory 802 is used for store instruction, and processor 801 is used for executing the instruction of memory 802 storage.Wherein, processor 801 For:
The first acquisition request that server receiving terminal sends;
Respond described first and obtain request, the first network access information of storage and the second network access information are sent to Described terminal;
Wherein, described first network access information refer to described server storage under network under test according to default network ground Location carries out network access information produced by network access operation, and described second network access information refers to described server storage Carry out network access information produced by network access operation, described network according to the default network address under preset security network Access information includes accessing script or accesses link.
Further, described processor 801 is additionally operable to:
Receive described terminal and send second and obtain request, described second obtains request includes matching result information, described Join object information refer to described terminal by the access script in described first network access information or access link and described second net Access script in network access information or access link and carry out the matching analysis, the matching result information that correspondence obtains, described second Obtain request for obtaining in described server existing corresponding to described matching result information under described network under test of storage The frequency, or for obtain described server according to storage there is described matching result information institute under described network under test The security of the described network under test that the corresponding frequency determines;
Respond described second and obtain request, by storage to there is described matching result information institute under described network under test right The frequency answered is sent to described terminal;Or, response described second obtains request, according to described storage in described network under test The lower frequency existing corresponding to described matching result information determines the security of described network under test, will treat survey grid described in determination The security of network is sent to described terminal.
Further, described processor 801 is additionally operable to:
Receive described terminal and send the 3rd acquisition request, described 3rd acquisition request is used for indicating that described server will be described Accessing script or accessing the access script in link and described second network access information or visit in first network access information Ask that link carries out the matching analysis, obtain corresponding matching result information, and search storage in described server described to be measured There is the frequency corresponding to described matching result information under network;Or, for indicating described server by described first network The access script accessing in script or access link and described second network access information in access information or access chain tap into Row the matching analysis, obtain corresponding matching result information, and are tied according to the described coupling that exists under described network under test of storage The frequency corresponding to fruit information determines the security of described network under test;
Respond the described 3rd and obtain request, described first is accessed link or first and accesses script and described second access chain Connect or the second access script carries out the matching analysis, obtain corresponding matching result information, and search storage in described server There is the frequency corresponding to described matching result information under described network under test, and by described storage in described network under test The lower frequency existing corresponding to described matching result information is sent to described terminal;Or, described first is accessed link or the One access script and described second accesses link or the second access script carries out the matching analysis, obtains corresponding matching result letter Breath, and search the frequency existing under described network under test corresponding to described matching result information of storage in described server, Treat survey grid according to the frequency that described storage exists corresponding to described matching result information under described network under test determines The security of network, the security of the described network under test determining is sent to described terminal.
Further, described processor 801 is additionally operable to:
Receive the 4th acquisition request that described terminal sends;Described 4th acquisition request is used for obtaining in described server deposits The frequency existing under described network under test corresponding to described network attack data and/or described operation exception data of storage;Or , there is described network attack data and/or described for obtaining described server under described network under test according to storage in person The security of the described network under test that the frequency corresponding to operation exception data determines;
Respond the described 4th and obtain request, in the described server of lookup, storage has described net under described network under test The frequency corresponding to data and/or described operation exception data attacked by network, and described storage is deposited under described network under test The frequency corresponding in described network attack data and/or described operation exception data is sent to described terminal;Or, search institute State in server storage there is described network attack data under described network under test and/or described operation exception data institute is right The frequency answered, and described network attack data is had under described network under test according to described storage and/or described operation is different The frequency corresponding to regular data determines the security of described network under test, and the security of the described network under test determining is sent to Described terminal.
Further, described processor 801 is additionally operable to:
Receive the network security verification request that described terminal sends;Described network security verification request includes described terminal and props up Hold the corresponding network identity of at least one available network of connection, the different network identity of different available network correspondences;
Respond described network security verification information, corresponding with the described network identity safe object information searched is sent To described terminal, so that described terminal knows the security of each available network.
It should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central Processing Unit, CPU), this processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), special IC (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device can also be any conventional processor etc..
Input equipment 802 can include Trackpad, fingerprint adopts sensor (for gathering the finger print information of user and fingerprint Directional information), microphone etc., output equipment 803 can include display (LCD etc.), loudspeaker etc..
This memory 804 can include read-only storage and random access memory, and to processor 801 provide instruction and Data.The a part of of memory 804 can also include nonvolatile RAM.For example, memory 804 can also be deposited The information of storage device type.
In implementing, processor 801 described in the embodiment of the present invention, input equipment 802, output equipment 803 can Execute described in the first embodiment of method and the 5th embodiment of internet security management provided in an embodiment of the present invention Implementation, also can perform the implementation of the terminal described by the embodiment of the present invention, will not be described here.
Referring to Figure 10, it is the structural representation of another kind internet security management system provided in an embodiment of the present invention.As Internet security management system in the present embodiment shown in figure can include:Server 80 and terminal 81;Wherein,
Described terminal 81, obtains request for sending first to server 80;Receive described server according to described first Obtain first network access information and the second network access information that request returns, described first network access information refers to described clothes What business device stored carries out network access information produced by network access operation, institute according to the default network address under network under test That states that the second network access information refers to described server storage carries out network according to the default network address under preset security network Access network access information produced by operation, described network access information includes accessing script or accesses link;According to institute State first network access information and the matching analysis of described second network access information, determine the security of described network under test.
Described server 80, the first acquisition request sending for receiving terminal 81;Respond described first and obtain request, will The first network access information of storage and the second network access information are sent to described terminal 81;Wherein, described first network is visited The information of asking refers to carrying out produced by network access operation under network under test of described server storage according to the default network address Network access information, described second network access information refer to the storage of described server 80 under preset security network according to default The network address carries out network access information produced by network access operation, and described network access information includes accessing script or visit Ask link.
Wherein alternatively,
Described terminal 81, is additionally operable to the access script in described first network access information or accesses link and described the Access script in two network access informations or access link carry out the matching analysis, obtain corresponding matching result information;To institute State server 80 and send the second acquisition request including described matching result information;Described second acquisition request is used for obtaining The frequency existing under described network under test corresponding to described matching result information of storage in described server, or be used for obtaining Described server 80 is taken to be determined according to the frequency existing under described network under test corresponding to described matching result information of storage Described network under test security;Receive described server 80 to be existed according to the described second described storage obtaining request return There is the frequency corresponding to described matching result information under described network under test, and according to described storage in described network under test The lower frequency existing corresponding to described matching result information determines the security of described network under test;Or, receive described service Device 80 is according to the described second security obtaining the described network under test that request returns.
Described server 80, is additionally operable to receive described terminal 81 transmission the second acquisition request, described second acquisition request bag Include matching result information, described matching result information refer to described terminal by the access script in described first network access information or Access the access script in link and described second network access information or access link and carry out the matching analysis, correspondence obtain Join object information, described second obtains request has institute for obtain storage in described server 80 under described network under test State the frequency corresponding to matching result information, or for obtaining described server 80 according to storage under described network under test There is the security of the described network under test that the frequency corresponding to described matching result information determines;Responding described second acquisition please Ask, the frequency existing under described network under test corresponding to described matching result information of storage is sent to described terminal;Or Person, response described second obtains request, there is described matching result information institute according to described storage under described network under test The corresponding frequency determines the security of described network under test, and the security of the described network under test determining is sent to described terminal 81.
Wherein alternatively,
Described terminal 81, is additionally operable to send the 3rd acquisition request to described server 80, described 3rd acquisition request is used for Indicate that described server 80 by the access script in described first network access information or accesses link and described second network visit Ask that the access script in information or access link carry out the matching analysis, obtain corresponding matching result information, search and send institute State the frequency existing under described network under test corresponding to described matching result information of storage in server;Or, for referring to Show that described server 80 by the access script in described first network access information or accesses link and described second network access Access script in information or access link carry out the matching analysis, obtain corresponding matching result information, according to storage in institute State the security that the frequency existing under network under test corresponding to described matching result information determines described network under test, and will determine The security of described network under test be sent to described terminal;Receive described server 80 and obtain request return according to the described 3rd Described storage the frequency existing under described network under test corresponding to described matching result information, and according to described storage There is the security that the frequency corresponding to described matching result information determines described network under test under described network under test;Or Person, receives described server 80 according to the described 3rd security obtaining the described network under test that request returns.
Described server 80, is additionally operable to receive described terminal 81 transmission the 3rd acquisition request, the described 3rd obtains request use By the access script in described first network access information or access link and described second network in the described server 80 of instruction Access script in access information or access link carry out the matching analysis, obtain corresponding matching result information, and search described The frequency existing under described network under test corresponding to described matching result information of storage in server 80;Or, for referring to Show that described server 80 by the access script in described first network access information or accesses link and described second network access Access script in information or access link carry out the matching analysis, obtain corresponding matching result information, and existing according to storage There is the security that the frequency corresponding to described matching result information determines described network under test under described network under test;Response institute State the 3rd acquisition request, described first is accessed link or the first access script and described second accesses link or the second access pin Originally carry out the matching analysis, obtain corresponding matching result information, and search storage in described server 80 treat survey grid described There is the frequency corresponding to described matching result information under network, and described storage is existed under described network under test described Join the frequency corresponding to object information and be sent to described terminal 81;Or, described first is accessed link or the first access script Access link with described second or the second access script carries out the matching analysis, obtain corresponding matching result information, and search institute State the frequency existing under described network under test corresponding to described matching result information of storage in server 80, deposited according to described The frequency existing under described network under test corresponding to described matching result information of storage determines the security of described network under test, The security of the described network under test determining is sent to described terminal 81.
Wherein alternatively,
Described terminal 81, is additionally operable to send the 4th acquisition request to described server 80, the described 4th obtains request includes Described network attack data and/or described operation exception data, described 4th acquisition request is used for obtaining in described server 80 The frequency existing under described network under test corresponding to described network attack data and/or described operation exception data of storage; Or, for obtain described server 80 according to storage exist under described network under test described network attack data and/or The security of the described network under test that the frequency corresponding to described operation exception data determines;Receive described server 80 according to institute State obtain request return described storage there is described network attack data under described network under test and/or described operation is different The frequency corresponding to regular data, and according to described storage exist under described network under test described network attack data and/or The frequency corresponding to described operation exception data determines the security of described network under test;Or, the described server of reception 80 According to the described security obtaining the described network under test that request returns.
Described server 80, is additionally operable to receive the 4th acquisition request that described terminal 81 sends;Described 4th obtains request There is described network attack data and/or described operation for obtain in described server 80 storage under described network under test The frequency corresponding to abnormal data;Or, existed under described network under test according to storage for obtaining described server 80 The security of the described network under test that the frequency corresponding to described network attack data and/or described operation exception data determines; Respond the described 4th and obtain request, in the described server 80 of lookup, storage has described network attack under described network under test The frequency corresponding to data and/or described operation exception data, and described storage is existed under described network under test described The frequency corresponding to network attack data and/or described operation exception data is sent to described terminal 81;Or, search described clothes In business device 80, storage exists corresponding to described network attack data and/or described operation exception data under described network under test The frequency, and described network attack data and/or described operation exception are had under described network under test according to described storage The frequency corresponding to data determines the security of described network under test, and the security of the described network under test determining is sent to institute State terminal 81.
Wherein alternatively,
Described terminal 81, is additionally operable to when described terminal support at least one available network of connection is detected, to described clothes Business device 80 sends corresponding network security verification request, and wherein, described network security verification request includes and described available network Corresponding network identity, the different network identity of different available network correspondences;Receive described server 80 according to described network The safe object information corresponding with described network identity that security authentication request returns;According to described safe object information and described Network identity, described available network is shown to default network connection operation interface.
Described server 80, is additionally operable to receive the network security verification request that described terminal 81 sends;Described network security Checking request includes the corresponding network identity of at least one available network that described terminal is supported to connect, different available network pair Answer different network identities;Respond described network security verification information, the safety knot corresponding with described network identity that will search Fruit information is sent to described terminal 81, so that described terminal 81 knows the security of each available network.
The embodiment of the present invention can be by storing in terminal acquisition server under network under test according to the default network address Carry out first network access information produced by network access operation, and the weight under preset security network storing in server Newly carry out produced second network access information of network access operation according to the described default network address, according further to right Described first network access information and the matching analysis of described second network access information, determine the safety of described network under test Property;The network access information of server record so can be contrasted thus simply and reliably drawing/determining the safety of network under test Property, so user/terminal can automatically, intelligently select safely or security network is attached and communicates higher; Improve the security of user's online.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example of the embodiments described herein description Unit and algorithm steps, can be with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware With the interchangeability of software, generally describe composition and the step of each example in the above description according to function.This A little functions to be executed with hardware or software mode actually, the application-specific depending on technical scheme and design constraint.Specially Industry technical staff can use different methods to each specific application realize described function, but this realization is not It is considered as beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience of description and succinctly, foregoing description be The specific work process of system, terminal and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
It should be understood that disclosed system, terminal and method in several embodiments provided herein, permissible Realize by another way.For example, device embodiment described above is only schematically, for example, described unit Divide, only a kind of division of logic function, actual can have other dividing mode when realizing, for example multiple units or assembly Can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not execute.In addition, it is shown or beg for By coupling each other or direct-coupling or communication connection can be INDIRECT COUPLING by some interfaces, device or unit Or communication connection or electricity, machinery or other forms connect.
The described unit illustrating as separating component can be or may not be physically separate, show as unit The part showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme Purpose.
In addition, can be integrated in a processing unit in each functional unit in each embodiment of the present invention it is also possible to It is that unit is individually physically present or two or more units are integrated in a unit.Above-mentioned integrated Unit both can be to be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If described integrated unit is realized and as independent production marketing or use using in the form of SFU software functional unit When, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part in other words prior art being contributed, or all or part of this technical scheme can be in the form of software product Embody, this computer software product is stored in a storage medium, including some instructions with so that a computer Equipment (can be personal computer, server, or network equipment etc.) executes the complete of each embodiment methods described of the present invention Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replace Change, these modifications or replacement all should be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right The protection domain requiring is defined.

Claims (10)

1. a kind of method of internet security management is it is characterised in that methods described includes:
The first acquisition request that server receiving terminal sends;
Respond described first and obtain request, the first network access information of storage and the second network access information are sent to described Terminal, so that described terminal is treated according to determining to the matching analysis of described first network access information and the second network access information The security of survey grid network;
Wherein, described first network access information refer to described server storage under described network under test according to default network ground Location carries out network access information produced by network access operation, and described second network access information refers to described server storage Carry out network access information produced by network access operation, described network according to the default network address under preset security network Access information includes accessing script or accesses link.
2. the method for claim 1 is it is characterised in that methods described also includes:
Receive described terminal and send the second acquisition request, described second obtains request includes matching result information, described coupling knot Fruit information refers to described terminal and by the access script in described first network access information or accesses link and described second network visit Ask that the access script in information or access link carry out the matching analysis, the matching result information that correspondence obtains, described second acquisition Ask the frequency existing under described network under test corresponding to described matching result information for obtaining storage in described server Secondary, or for obtaining described server existing corresponding to described matching result information under described network under test according to storage The frequency determine described network under test security;
Respond described second and obtain request, by existing corresponding to described matching result information under described network under test of storage The frequency is sent to described terminal;Or, response described second obtains request, is deposited under described network under test according to described storage The frequency corresponding in described matching result information determines the security of described network under test, by the described network under test determining Security is sent to described terminal.
3. the method for claim 1 is it is characterised in that methods described also includes:
Receive described terminal and send the 3rd and obtain request, described 3rd acquisition request is used for indicating described server by described first Accessing script or accessing the access script in link and described second network access information or access chain in network access information Tap into row the matching analysis, obtain corresponding matching result information, and search storage in described server in described network under test The lower frequency existing corresponding to described matching result information;Or, for indicating that described first network accesses by described server Accessing script or access the access script in link and described second network access information or access link and carry out in information Partition is analysed, and obtains corresponding matching result information, and is believed according to the described matching result that exists under described network under test of storage The corresponding frequency of breath determines the security of described network under test;
Respond described 3rd obtain request, will described first access link or first access script and described second access link or Second access script carries out the matching analysis, obtains corresponding matching result information, and search storage in described server in institute State the frequency existing under network under test corresponding to described matching result information, and described storage is deposited under described network under test The frequency corresponding in described matching result information is sent to described terminal;Or, described first is accessed link or the first visit Ask that script and described second accesses link or the second access script carries out the matching analysis, obtain corresponding matching result information, and Search the frequency existing under described network under test corresponding to described matching result information of storage in described server, according to institute The frequency existing under described network under test corresponding to described matching result information stating storage determines the peace of described network under test Quan Xing, the security of the described network under test determining is sent to described terminal.
4. the method for claim 1 is it is characterised in that described first network access information also includes network attack data And/or operation exception data, methods described also includes:
Receive the 4th acquisition request that described terminal sends;Described 4th obtains request for obtaining storage in described server There is the frequency corresponding to described network attack data and/or described operation exception data under described network under test;Or, use In obtain described server according to storage there is described network attack data under described network under test and/or described operation is different The security of the described network under test that the frequency corresponding to regular data determines;
Respond the described 4th and obtain request, the described network that exists under described network under test searching storage in described server is attacked Hit the frequency corresponding to data and/or described operation exception data, and described storage is existed under described network under test institute State the frequency corresponding to network attack data and/or described operation exception data and be sent to described terminal;Or, search described clothes In business device, storage exists corresponding to described network attack data and/or described operation exception data under described network under test The frequency, and described network attack data and/or described operation exception number are had under described network under test according to described storage Determine the security of described network under test according to the corresponding frequency, the security of the described network under test determining is sent to described Terminal.
5. the method as described in any one in claim 1-4 is it is characterised in that methods described also includes:
Receive the network security verification request that described terminal sends;Described network security verification request includes described terminal and supports even The corresponding network identity of at least one available network connecing, the different network identity of different available network correspondences;
Respond described network security verification information, the safe object information corresponding with described network identity searched is sent to institute State terminal, so that described terminal knows the security of each available network.
6. a kind of server is it is characterised in that described server includes:
First receiving unit, the first acquisition request sending for receiving terminal;
First transmitting element, obtains request for responding described first, by the first network access information of storage and the second network Access information is sent to described terminal, so that described terminal is according to described first network access information and the second network access letter The matching analysis of breath determine the security of network under test;
Wherein, described first network access information refers to entering under network under test of described server storage according to the default network address Row network access operation produced by network access information, described second network access information refer to described server storage pre- If carrying out network access information produced by network access operation, described network access according to the default network address under secure network Information includes accessing script or accesses link.
7. server as claimed in claim 6 is it is characterised in that described server also includes:
Second receiving unit, sends the second acquisition request for receiving described terminal, described second acquisition request includes coupling and ties Fruit information, described matching result information refers to described terminal and by the access script in described first network access information or accesses link Carry out the matching analysis with the access script in described second network access information or access link, the matching result letter that correspondence obtains Breath, described second obtains request has described matching result for obtain in described server storage under described network under test The frequency corresponding to information, or there is described coupling for obtaining described server under described network under test according to store The security of the described network under test that the frequency corresponding to object information determines;
Second transmitting element, obtains request for responding described second, storage is existed under described network under test described Join the frequency corresponding to object information and be sent to described terminal;Or, response described second obtains request, according to described storage There is the security that the frequency corresponding to described matching result information determines described network under test under described network under test, will be really The security of fixed described network under test is sent to described terminal.
8. server as claimed in claim 6 is it is characterised in that described server also includes:
3rd receiving unit, sends the 3rd acquisition request for receiving described terminal, described 3rd acquisition request is used for indicating institute State server by the access script in described first network access information or to access in link and described second network access information Access script or access link and carry out the matching analysis, obtain corresponding matching result information, and search in described server and deposit The frequency existing under described network under test corresponding to described matching result information of storage;Or, for indicating described server By accessing script or accessing the access pin in link and described second network access information in described first network access information This or access link carry out the matching analysis, obtain corresponding matching result information, and according to storage under described network under test There is the security that the frequency corresponding to described matching result information determines described network under test;
3rd transmitting element, for respond described 3rd obtain request, will described first access link or first access script with Described second access link or the second access script carry out the matching analysis, obtain corresponding matching result information, and search described The frequency existing under described network under test corresponding to described matching result information of storage in server, and by described storage There is the frequency corresponding to described matching result information and be sent to described terminal under described network under test;Or, by described One access link or the first access script and described second access link or second access script and carry out the matching analysis, are corresponded to Matching result information, and search in described server storage there is described matching result information institute under described network under test The corresponding frequency, determines according to the frequency that described storage exists corresponding to described matching result information under described network under test The security of described network under test, the security of the described network under test determining is sent to described terminal.
9. server as claimed in claim 6 is it is characterised in that described first network access information also includes network attack number According to and/or operation exception data, described server also includes:
4th receiving unit, for receiving the 4th acquisition request that described terminal sends;Described 4th acquisition request is used for obtaining In described server there is described network attack data and/or described operation exception data institute in storage under described network under test The corresponding frequency;Or, there is described network attack for obtaining described server under described network under test according to store The security of the described network under test that the frequency corresponding to data and/or described operation exception data determines;
4th transmitting element, obtains request for responding the described 4th, in the described server of lookup, storage treats survey grid described There is the frequency corresponding to described network attack data and/or described operation exception data under network, and by described storage in institute State the frequency existing under network under test corresponding to described network attack data and/or described operation exception data and be sent to described end End;Or, in the described server of lookup there is described network attack data and/or described fortune in storage under described network under test The frequency corresponding to row abnormal data, and described network attack data is had under described network under test according to described storage And/or the frequency corresponding to described operation exception data determines the security of described network under test, will determine described in treat survey grid The security of network is sent to described terminal.
10. the server as described in any one in claim 6-9 is it is characterised in that described server also includes:
5th receiving unit, for receiving the network security verification request that described terminal sends;Described network security verification request Support the corresponding network identity of at least one available network connecting including described terminal, different available network correspondences is different Network identity;
5th transmitting element, for responding described network security verification information, will search peace corresponding with described network identity Full object information is sent to described terminal, so that described terminal knows the security of each available network.
CN201610822824.6A 2016-09-13 2016-09-13 Network security management method and terminal Pending CN106411862A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610822824.6A CN106411862A (en) 2016-09-13 2016-09-13 Network security management method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610822824.6A CN106411862A (en) 2016-09-13 2016-09-13 Network security management method and terminal

Publications (1)

Publication Number Publication Date
CN106411862A true CN106411862A (en) 2017-02-15

Family

ID=57999408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610822824.6A Pending CN106411862A (en) 2016-09-13 2016-09-13 Network security management method and terminal

Country Status (1)

Country Link
CN (1) CN106411862A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902491B (en) * 2019-02-28 2021-08-31 苏州浪潮智能科技有限公司 Safe operation management architecture of server and server
CN116828474A (en) * 2023-08-30 2023-09-29 北京绿色苹果技术有限公司 WiFi implementation method, system and medium based on environmental security

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219670A (en) * 2014-09-03 2014-12-17 珠海市君天电子科技有限公司 Method and system for identifying false wifi (wireless fidelity), client side and server side
CN104219668A (en) * 2014-09-10 2014-12-17 北京金山安全软件有限公司 Method, device, server and mobile terminal for determining security of wireless network access point
CN105813083A (en) * 2016-05-24 2016-07-27 中国联合网络通信集团有限公司 Fishing WIFI processing method, device, platform and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219670A (en) * 2014-09-03 2014-12-17 珠海市君天电子科技有限公司 Method and system for identifying false wifi (wireless fidelity), client side and server side
CN104219668A (en) * 2014-09-10 2014-12-17 北京金山安全软件有限公司 Method, device, server and mobile terminal for determining security of wireless network access point
CN105813083A (en) * 2016-05-24 2016-07-27 中国联合网络通信集团有限公司 Fishing WIFI processing method, device, platform and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902491B (en) * 2019-02-28 2021-08-31 苏州浪潮智能科技有限公司 Safe operation management architecture of server and server
CN116828474A (en) * 2023-08-30 2023-09-29 北京绿色苹果技术有限公司 WiFi implementation method, system and medium based on environmental security
CN116828474B (en) * 2023-08-30 2023-11-14 北京绿色苹果技术有限公司 WiFi implementation method, system and medium based on environmental security

Similar Documents

Publication Publication Date Title
US11184359B2 (en) Automated access control policy generation for computer resources
US10484347B2 (en) Method and apparatus for supporting secure chat
CN111612168B (en) Management method and related device for machine learning task
CN104125216B (en) A kind of method, system and terminal for lifting credible performing environment security
CN103891242B (en) System and method for profile based filtering of outgoing information in a mobile environment
US20160241589A1 (en) Method and apparatus for identifying malicious website
CN107580005A (en) Website protection method, device, website safeguard and readable storage medium storing program for executing
CN107229854B (en) Application program registration method and device, electronic equipment and storage medium
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN106209918A (en) The method of a kind of internet security management and terminal
CN108696490A (en) The recognition methods of account permission and device
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN107612901A (en) One kind applies encryption method and terminal
CN106713266B (en) Method, device, terminal and system for preventing information leakage
CN106375478B (en) A kind of synchronous method of mobile terminal data, apparatus and system
CN106096450A (en) A kind of application program freezing method and mobile terminal
CN106302519A (en) The method of a kind of internet security management and terminal
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
CN110808872A (en) Method and device for realizing flow experiment and electronic equipment
CN110147186A (en) A kind of control method and terminal device of application
CN107148022B (en) A kind of anti-loiter network based reminding method and relevant device
CN106411862A (en) Network security management method and terminal
CN109688099A (en) Server end hits library recognition methods, device, equipment and readable storage medium storing program for executing
CN109818972A (en) A kind of industrial control system information security management method, device and electronic equipment
CN105373715A (en) Wearable device based data access method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170215