Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wifi hijack resisting method and device

A technology for URL and web page request, applied in the field of communication, can solve problems such as hijacking

Active Publication Date: 2017-01-04
深圳市恒炎创新科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above problems, the present invention proposes an anti-wifi hijacking method and a corresponding device to solve the problem that the page opened by the APP is hijacked by the free wifi application it uses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wifi hijack resisting method and device
  • Wifi hijack resisting method and device
  • Wifi hijack resisting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] refer to figure 1 , which shows a flow chart of steps of an anti-wifi hijacking method according to an embodiment of the present invention.

[0074] Step 110, monitoring whether the second application triggers a web page request;

[0075] In the embodiment of the present invention, the user can first use the first wifi application to connect to a certain wifi in the mobile terminal, and then the user can open a certain application and visit the corresponding web page.

[0076] Then, after the user opens a certain second application, the second application may automatically visit a certain webpage, which triggers a webpage request, or the user clicks on a control, element, etc. in the interface of the second application, thereby triggering Web page request.

[0077] Wherein, the above-mentioned mobile terminal may be a mobile terminal such as a mobile phone or a tablet, which is not limited in the present invention.

[0078] Step 120, if the second application trigger...

Embodiment 3

[0142] refer to image 3 , which shows a structural block diagram of an anti-wifi hijacking device according to an embodiment of the present invention.

[0143] A monitoring module 310, configured to monitor whether the second application triggers a web page request;

[0144] A hijacking judging module 320, configured to judge whether the webpage request is hijacked by the first wifi application if the second application triggers the webpage request;

[0145] The access restoration module 330 is configured to replace the second URL in the hijacked webpage request with the first URL before hijacking if the webpage request is hijacked by the first wifi application for access.

[0146] Preferably, the hijacking judging module includes:

[0147] The webpage view component judging sub-module is used to judge whether the URL accessed by the webpage view component is hijacked by the first wifi application; if the URL accessed by the webpage view component is hijacked, ...

Embodiment 4

[0168] refer to Figure 4 , which shows a structural block diagram of an anti-wifi hijacking device according to an embodiment of the present invention.

[0169] A monitoring module 310, configured to monitor whether the second application triggers a web page request;

[0170] The hijacking judging module 320 is used to judge whether the webpage request is hijacked by the first wifi application if the second application triggers the webpage request, specifically including:

[0171] The first feature extraction submodule 321 is used to extract the header feature of the URL and the value of the first url field according to the preset rules corresponding to the first wifi application;

[0172] The first feature judging sub-module 322 is used to judge whether the header feature is the URL feature of the first wifi application, and judge whether the value of the url field corresponds to a correct URL; if the header feature is the first wifi application URL characterist...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a wifi hijack resisting method and device, and relates to the technical field of communication. The method comprises the following steps: monitoring whether a second application triggers a webpage request or not; if the second application triggers the webpage request, judging whether the webpage request is hijacked by a first wifi application or not; and if the webpage request is hijacked by the first wifi application, substituting a first website before hijacking for a second website in the hijacked webpage request. Through adoption of the wifi hijack resisting method and device, access of the second application to a webpage of the second application is prevented from being hijacked by the first wifi application, so that a user can browse webpage content of the second application normally, and trouble is avoided for the user.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an anti-wifi hijacking method and an anti-wifi hijacking device. Background technique [0002] With the development of technology, the mobile terminal can also use the mobile data network to connect to the Internet, but when the mobile terminal uses the mobile data network, the cost remains high. And because wifi (WIreless-Fidelity, wireless fidelity) network can provide Internet access function, so there are many free wifi applications, users can use mobile terminals to connect to free wifi through free wifi applications, thereby accessing the internet. [0003] However, since these free wifi are developed by major manufacturers, they may embed additional information such as advertisement pages. free wifi, its own page may be hijacked by this free wifi app. [0004] Therefore, when the user uses some APP (application, application) to open his own page, the page is hijack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W12/122
CPCH04W12/12
Inventor 程金然蒋凯
Owner 深圳市恒炎创新科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products