A wireless network security access method, device and terminal

A security access and wireless network technology, applied in the field of devices and terminals, wireless network security access methods, can solve the problems of low security and reliability, poor applicability, etc., to avoid network intrusion, enhance security and reliability Sex, protection from infestation

Active Publication Date: 2019-08-30
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the technical problem to be solved by the present invention is to provide a wireless network security access method, device and terminal to solve the problem of early warning and protection of high-risk network factors in the process of connecting to wireless network hotspots in the prior art. The technical solution has the technical defects of poor applicability, low safety and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless network security access method, device and terminal
  • A wireless network security access method, device and terminal
  • A wireless network security access method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 1 It is a flow chart of the wireless network security access method proposed by the present invention. The method includes:

[0053] S1, by isolating the network layer to detect whether the accessed network hotspot belongs to a malicious network. It can be understood that the wireless network secure access method proposed in this embodiment is applicable to smart devices with network access functions such as smart phones and tablet computers. Wherein, the isolated network layer may be a virtual network layer built on a basic network or a normal network. There is a corresponding isolation mechanism between the network data of the isolated network layer and the local machine, through which the external network data can prevent the occurrence of dangerous events such as malicious network intrusion on the local machine.

[0054] Further, set the corresponding isolation network layer for the object that needs to be protected on this machine. For example, if only th...

Embodiment 2

[0061] figure 2 It is a flow chart of the wireless network secure access method proposed by the second preferred embodiment of the present invention. Based on the first embodiment above, before detecting whether the accessed network hotspot belongs to a malicious network by isolating the network layer, it also includes:

[0062] S01, establishing a background server. It can be understood that the background server may be a cloud server or a background function module that runs independently of the device and can run independently. The same data processing, data analysis and data update operations as those of the cloud server are realized through the background function module.

[0063] S02, collecting characteristic information of malicious networks through a background server. The characteristic information of a malicious network may be signature information, keyword information, screenshot information, address information, malicious link information, and blacklist inform...

Embodiment 3

[0069] image 3 It is a flow chart of the wireless network security access method proposed by the third preferred embodiment of the present invention. Based on the first and second embodiments above, detecting whether the accessed network hotspot is a malicious network by isolating the network layer specifically includes:

[0070] S11. Before initiating a wireless network access request, generate virtual network parameters on the basis of a normal network layer. For example, a virtual network is established on the basis of a normal network layer, specifically, a virtual network card address, a virtual communication address, a virtual communication protocol, and the like of the virtual network are established.

[0071] Further, the virtual network parameters may be generated locally or provided by a third-party security service organization.

[0072] S12. Establish an isolation network layer by using virtual network parameters. Establishing a network layer by using network p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety access method of a wireless network, a device and a terminal. The method includes the steps that whether network hot spots having access to the wireless network belong to a malicious network or not is detected through an isolation network layer, if the network hot spots having access to the wireless network belong to the malicious network, a first communication link between the network hot spots and the wireless network is disconnected, if the network hot spots having access to the wireless network do not belong to the malicious network, the isolation network layer is removed, and a communication link between the network hot spots and the wireless network is established through a normal state network layer. When connection operation or switching operation of the network hot spots is performed, on one hand, unsafe factors caused when the wireless network has access to malicious network hot spots are avoided, on the other hand, when the wireless network has access to the malicious network hot spots, the malicious network hot spots can be disconnected in time, and unsafe factors such as network infection are avoided. Thus, a comprehensive safety guarantee is provided for access of the wireless network, and safety and reliability of access of the wireless network is enhanced while the wireless network is protected against infection.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a wireless network security access method, device and terminal. Background technique [0002] In the prior art, an intelligent terminal with wireless networking function may encounter the danger of unsafe network factors such as network hijacking during the process of connecting to a wireless network hotspot. The following technical solutions are proposed: [0003] Inform users of high-risk networks through wireless network early warning, but this method cannot provide users with warning content in a timely manner, and users often receive corresponding early warning information after connecting to high-risk networks. Therefore, the above technical solutions have poor applicability, Technical defects with low security and reliability. Contents of the invention [0004] In view of this, the technical problem to be solved by the present invention is to provide a w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08
Inventor 王均松倪飞
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products