Method for network security management and terminal

A security and network technology, applied in the security field, can solve the problems of not being able to provide real-time public WIFI network security information, ordinary users cannot guarantee the security of data transmission, etc., and achieve the effect of improving security

Inactive Publication Date: 2016-12-07
SHENZHEN GIONEE COMM EQUIP
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practice, it is found that the terminal cannot provide users with the security information of the public WIFI network in real time, and ordinary users cannot use complex encryption methods to ensure the security of data transmission under the public WIFI network. Therefore, a simple and reliable Network Security Management Program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for network security management and terminal
  • Method for network security management and terminal
  • Method for network security management and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0026] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for network security management and a terminal. The method comprises the steps of obtaining network access information generated when a terminal carries out network access operation in a to-be-tested network according to a preset network address; judging whether operation abnormal data caused by the network access operation and / or network attack data obtained from a server exist in the network access information; and if so, determining the security of the to-be-tested network based on the network attack data and / or the operation abnormal data. By adoption of the embodiment, a user can independently select to connect to a security network based on the demand thereof, and the networking security of the user is protected.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a method and terminal for network security management. Background technique [0002] WIFI is an industry standard (IEEE 802.11) for wireless network communication defined by the Institute of Electrical and Electronics Engineers (IEEE), and can also be regarded as a supplement to 3G technology. WIFI technology, like Bluetooth technology, belongs to the wireless local area network communication technology used in offices and homes. WIFI is a short-range wireless transmission technology that can support Internet access radio signals within a range of hundreds of feet. Its biggest advantage is high transmission speed. In the case of weak signals or interference, the bandwidth can be adjusted, effectively The stability and reliability of the network are guaranteed. However, with the continuous expansion of the application field of WLAN, its security issues have been paid m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/08H04W12/122
CPCH04L63/10H04L63/1425H04W12/08
Inventor 向攀陈澜波
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products