Method and device for achieving WiFi network security monitoring

A technology for network security and network equipment, applied in the field of WiFi network security monitoring, can solve problems such as security detection loopholes, intelligent routers cannot accurately reflect real-time security conditions, etc., to achieve the effect of making up for loopholes and meeting timeliness requirements

Active Publication Date: 2018-01-23
SHANGHAI ZHANGMEN TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security scan of a smart router cannot accurately reflect the real-time security status of Internet users using the WiFi network, and the probability of security detection vulnerabilities is high; in addition, when the WiFi network corresponds to a non-intelligent router, it is impossible to pass the Security scans to detect security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for achieving WiFi network security monitoring
  • Method and device for achieving WiFi network security monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The application will be described in further detail below in conjunction with the accompanying drawings.

[0027] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0028] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0029] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a method and device for achieving WiFi network security monitoring. The method comprises the steps that first network security monitoring information which is sent by auser device and corresponds to a target WiFi network is acquired, wherein the first network security monitoring information is acquired when the user device is connected with the target WiFi network;network security state information of the target WiFi network is determined on the basis of the network security state information; and the network security state information is supplied to an administration user of the target WiFi network. Accordingly, the method has the advantages that a normal operation that network security detection is conducted by an intelligent router through security scanning in the prior art is broken, and even if the target WiFi is only a common router, real-time monitoring on network security can be achieved on the basis of the technical scheme.

Description

technical field [0001] The present application relates to the communication field, and in particular to a technology for monitoring WiFi network security. Background technique [0002] With the development of Internet technology, it has become a daily habit of Internet users to connect to the Internet through WiFi (wireless fidelity, wireless fidelity) anytime and anywhere, and the accompanying WiFi network security issues will always bring great challenges to the information security of Internet users. The security solution of the existing WiFi network usually implements network security detection and corresponding security management through security scanning by the intelligent router corresponding to the WiFi network. However, the security scan of a smart router cannot accurately reflect the real-time security status of Internet users using the WiFi network, and the probability of security detection vulnerabilities is high; in addition, when the WiFi network corresponds t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04L29/06H04W12/126
CPCH04W84/12H04W24/10H04L63/1483H04L67/02H04W12/67H04W12/121H04W12/128H04L63/1408H04L63/20H04W12/12H04W24/08H04W84/18
Inventor 程翰
Owner SHANGHAI ZHANGMEN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products