User network access scenario-based protection method and device

A network access and scene technology, applied in the field of computer security, can solve problems such as information leakage

Active Publication Date: 2013-10-23
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the user's terminal is connected in a public wireless local area network, its MAC (Medium / MediaAccess Control, Media Access Control) information is basically open to other nodes in the local area network, so that the private information of the user terminal is easily leaked. Obtained by other terminals, if there is a malicious terminal, such as a terminal performing ARP (Address Resolution Protocol, Address Resolution Protocol) spoofing, then the risk of information leakage for this user terminal is obviously very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User network access scenario-based protection method and device
  • User network access scenario-based protection method and device
  • User network access scenario-based protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] refer to figure 1 , which shows a schematic flowchart of Embodiment 1 of a protection method based on user network access scenarios of the present invention, which may specifically include:

[0084] Step 110, after the user terminal accesses the local area network, extract the device identification corresponding to the local area network;

[0085] After the user uses a mobile terminal such as a mobile phone or a notebook computer to access a local area network, such as a wireless local area network (such as wifi), to communicate with a wide area network (such as the Internet), then after the wireless local area network, the data corresponding to the accessed local area network can be extracted. The device identifier, such as the MAC of the corresponding router, or SSID (Service Set Identifier, service set identifier), etc.

[0086] Step 120, comparing the device identifier with a preset device identifier library, and judging the scene where the current local area netwo...

Embodiment 2

[0128] refer to figure 2 , which shows a schematic flowchart of Embodiment 2 of a protection method based on user network access scenarios in the present invention, which may specifically include:

[0129] Step 210, after the user terminal accesses the local area network, extract the device identification corresponding to the local area network;

[0130] For example, obtain information such as the SSID of the wireless LAN and the MAC address of the network card.

[0131] Step 220, sending the device identifier to a cloud server; the cloud server is suitable for matching the device identifier with a device identifier library, and judging the current local area network scene;

[0132] Step 230, receiving the judgment result of the cloud server for the device identification; if the security judgment result is that the local area network is a safe network scene, proceed to step 240; if the security judgment result is that the local area network is not In a safe network scenario...

Embodiment 3

[0177] refer to image 3 , which shows a schematic structural diagram of a protection device based on user network access scenarios of the present invention, which may specifically include:

[0178] The device identification extraction module 310 is adapted to extract the device identification corresponding to the local area network when the user terminal accesses the local area network;

[0179] The scene judging module 320 is adapted to compare the device identification with a preset device identification library, and judge the scene where the current local area network is located;

[0180] The first prompting module 330 is adapted to prompt the network environment where the user terminal is located when the scene where the local area network is located is an unsafe network scene, and monitor the security level of the website visited by the user terminal;

[0181] The second prompt module 340 is adapted to intercept the access when the security level of the website accessed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user network access scenario-based protection method and device and relates to the field of computer safety. The method comprises the following steps of extracting a device identification which corresponds to a local area network after a user terminal is accessed to the local area network; comparing the device identification with a preset device identification library to judge a scenario in which the current local area network is located; prompting a network environment in which the user terminal is located after the scenario in which the local area network is located is judged to be an unsafe scenario, and monitoring the safety level of the network accessed by the user terminal; and intercepting access when the safety level of the network accessed by the user terminal reaches a threshold value, and promoting whether the user terminal enters a safety access mode. The method and the device disclosed by the invention have the beneficial effects that the risk that the information of the user terminal leaks is lowered, and the safety of the information of the user terminal is enhanced.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a protection method and device based on user network access scenarios. Background technique [0002] With the development of the Internet, users' terminals can also be connected to the Internet through various local area networks to send or obtain required information. For example, a user terminal is connected to the Internet through a public wireless local area network in a public area such as a coffee shop. ), and if the user's terminal performs some online banking transactions through the wireless local area network, or performs some important confidential event processing, etc., but the wireless local area network itself such as wifi is not necessarily safe. [0003] If the user's terminal is connected in a public wireless local area network, its MAC (Medium / MediaAccess Control, Media Access Control) information is basically open to other nodes in the local area network, so ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/08H04W12/122
Inventor 丁振
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products