Network security management method and terminal

A security and network technology, applied in the field of security, can solve the problems that ordinary users cannot guarantee the security of data transmission, cannot provide real-time information on public WIFI network security, etc.

Inactive Publication Date: 2017-02-15
SHENZHEN GIONEE COMM EQUIP
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practice, it is found that the terminal cannot provide users with the security information of the public WIFI network in real time, and ordinary users cannot use complex encryption methods to ensure the security of data transmission under the public WIFI network. Therefore, a simple and reliable Network Security Management Program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security management method and terminal
  • Network security management method and terminal
  • Network security management method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0028] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a network security management method and a terminal. The method comprises the following steps: receiving a first acquisition request sent by the terminal through a server; and transmitting stored first network access information and second network access information to the terminal in response to the first acquisition request, wherein the first network access information refers to network access information which is stored in the server and generated by a network access operation performed according to a preset network address under a network to be tested, the second network access information refers to network access information which is stored in the server and generated by a network access operation performed according to a preset network address under a preset secure network, and the network access information includes access scripts or access links. Through adoption of the network security management method, the terminal can be independently and selectively connected to the secure network according to the demand of a user, and the Internet-surfing security is ensured for the user.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a method and terminal for network security management. Background technique [0002] WIFI is an industry standard (IEEE 802.11) for wireless network communication defined by the Institute of Electrical and Electronics Engineers (IEEE), and can also be regarded as a supplement to 3G technology. WIFI technology, like Bluetooth technology, belongs to the wireless local area network communication technology used in offices and homes. WIFI is a short-range wireless transmission technology that can support Internet access radio signals within a range of hundreds of feet. Its biggest advantage is high transmission speed. In the case of weak signals or interference, the bandwidth can be adjusted, effectively The stability and reliability of the network are guaranteed. However, with the continuous expansion of the application field of WLAN, its security issues have been paid m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L63/20H04L43/08
Inventor 向攀陈澜波
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products