Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security management method and terminal

A security and network technology, applied in the field of security, can solve the problems of not being able to provide real-time public WIFI network security information, ordinary users cannot guarantee the security of data transmission, etc., and achieve the effect of improving security

Inactive Publication Date: 2017-01-04
SHENZHEN GIONEE COMM EQUIP
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practice, it is found that the terminal cannot provide users with the security information of the public WIFI network in real time, and ordinary users cannot use complex encryption methods to ensure the security of data transmission under the public WIFI network. Therefore, a simple and reliable Network Security Management Program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security management method and terminal
  • Network security management method and terminal
  • Network security management method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0026] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention discloses a network security management method and terminal, wherein the method comprises: sending a first acquisition request to a server from the terminal; receiving the first network accessing information and the second network accessing information returned by the server according to the first acquisition request wherein the first network accessing information is network accessing information stored in the server and generated by the network accessing operation of the server under the network to be tested according to a preset network address and the second network accessing information is network accessing information stored in the server and generated by the network accessing operation of the server in a preset security network according to a preset network address, the internet accessing information including accessing scripts and accessing links; and matching and analyzing the first network accessing information and the second network accessing information to determine the security of the network to be tested. According to the embodiment of the invention, a user can choose to be connected with a security network according to his or her requirement, therefore, ensuring the security of accessing a network.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a method and terminal for network security management. Background technique [0002] WIFI is an industry standard (IEEE 802.11) for wireless network communication defined by the Institute of Electrical and Electronics Engineers (IEEE), and can also be regarded as a supplement to 3G technology. WIFI technology, like Bluetooth technology, belongs to the wireless local area network communication technology used in offices and homes. WIFI is a short-range wireless transmission technology that can support Internet access radio signals within a range of hundreds of feet. Its biggest advantage is high transmission speed. In the case of weak signals or interference, the bandwidth can be adjusted, effectively The stability and reliability of the network are guaranteed. However, with the continuous expansion of the application field of WLAN, its security issues have been paid m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/20H04L41/14
Inventor 向攀陈澜波
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products