A method and device for wifi network security monitoring

A technology for network security and network equipment, applied in the field of WiFi network security monitoring, can solve problems such as the inability of smart routers to accurately reflect real-time security status and security detection loopholes, and achieve the effect of meeting timeliness requirements and making up for loopholes

Active Publication Date: 2020-08-14
SHANGHAI ZHANGMEN TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security scan of a smart router cannot accurately reflect the real-time security status of Internet users using the WiFi network, and the probability of security detection vulnerabilities is high; in addition, when the WiFi network corresponds to a non-intelligent router, it is impossible to pass the Security scans to detect security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for wifi network security monitoring
  • A method and device for wifi network security monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The application will be described in further detail below in conjunction with the accompanying drawings.

[0027] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0028] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0029] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The purpose of this application is to provide a method and device for WiFi network security monitoring; obtain the first network security monitoring information corresponding to the target WiFi network sent by the user equipment, wherein the first network security monitoring information is in the Obtained when the user equipment is connected to the target WiFi network; based on the first network security monitoring information, determine the network security status information of the target WiFi network; provide the network security status information to the target WiFi network administrative users. Here, this application breaks through the conventional operation of intelligent routers performing network security detection through security scanning in the prior art. Even when the target WiFi is only an ordinary router, the technical solution of this application can also be used to implement network security protection. real time monitoring.

Description

technical field [0001] The present application relates to the communication field, and in particular to a technology for monitoring WiFi network security. Background technique [0002] With the development of Internet technology, it has become a daily habit of Internet users to connect to the Internet through WiFi (wireless fidelity, wireless fidelity) anytime and anywhere, and the accompanying WiFi network security issues will always bring great challenges to the information security of Internet users. The security solution of the existing WiFi network usually implements network security detection and corresponding security management through security scanning by the intelligent router corresponding to the WiFi network. However, the security scan of a smart router cannot accurately reflect the real-time security status of Internet users using the WiFi network, and the probability of security detection vulnerabilities is high; in addition, when the WiFi network corresponds t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04L29/06H04W12/126
CPCH04W84/12H04W24/10H04L63/1483H04L67/02H04W12/67H04W12/121H04W12/128H04L63/1408H04L63/20H04W12/12H04W24/08H04W84/18
Inventor 程翰
Owner SHANGHAI ZHANGMEN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products