CN102869014A - Terminal and data communication method - Google Patents

Terminal and data communication method Download PDF

Info

Publication number
CN102869014A
CN102869014A CN2012103494644A CN201210349464A CN102869014A CN 102869014 A CN102869014 A CN 102869014A CN 2012103494644 A CN2012103494644 A CN 2012103494644A CN 201210349464 A CN201210349464 A CN 201210349464A CN 102869014 A CN102869014 A CN 102869014A
Authority
CN
China
Prior art keywords
terminal
authentication
identification information
request
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012103494644A
Other languages
Chinese (zh)
Inventor
于长见
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN2012103494644A priority Critical patent/CN102869014A/en
Publication of CN102869014A publication Critical patent/CN102869014A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a terminal and a data communication method. The terminal comprises an information sending module and a connection module, wherein the information sending module is used for sending identification information of the terminal to a second terminal, which is used for judging whether a preset trusted group includes the identification information of the terminal or not, and agrees to the connection with the terminal when a positive judgment result is achieved; and the connection module is connected with the second terminal when the second terminal agrees the connection with the terminal. By means of the technical scheme disclosed by the invention, when one mobile terminal access to another terminal serving as a Soft AP (Access Point) in a Wifi (Wireless Fidelity) manner, passwords do not needs to be input all the time for authentication, so that not only is a user prevented from complex operation but also the password safety of the user can be guaranteed.

Description

Terminal and data communications method
Technical field
The present invention relates to moving communicating field, in particular to a kind of terminal and a kind of data communications method.
Background technology
Along with science and technology and expanding economy, mobile phone terminal and people's life closely links to each other.Mobile focus Soft AP(Soft AP is a kind of wireless network card that passes through, use special-purpose software to realize the technology of AP function at PC, it can replace the AP(Access Point in the wireless network, WAP (wireless access point))), the Wifi function has become the standard configuration of smart mobile phone, the data service of mobile phone terminal is used more and more, mobile phone can be shared the mobile phone 3G network at any time as mobile focus, can set up simple LAN whenever and wherever possible, people use the frequency of Wifi more and more higher, stricter to the information security requirement, operating procedure is required as far as possible simple.
After the mobile focus function of mobile phone is opened, cipher mode can be set, other mobile phones carry out Wifi and connect manually input password, behind the Soft AP that connects cipher mode, password expressly is kept at the configuration file the inside of mobile phone terminal, and read the information of configuration file the inside and finish Password Input next time when connecting.
According to such scheme, terminal and the Soft AP of encryption carry out Wifi when being connected, and need manually input password, and complicated operation, and password is that clear-text way is kept in the mobile phone configuration file, is easy to cause information leakage threatens to user's information security.
Therefore, need a kind of new technical scheme, when a portable terminal accesses another as the terminal of Soft AP by the Wifi mode, needn't always need to input password and carry out authentication, both avoided the user to carry out loaded down with trivial details operation, can guarantee again the safety of its password.
Summary of the invention
Technical problem to be solved by this invention is, a kind of new technical scheme is provided, when a portable terminal accesses another as the terminal of Soft AP by the Wifi mode, needn't always need to input password and carry out authentication, both avoid the user to carry out loaded down with trivial details operation, and can guarantee again the safety of its password.
In view of this, the invention provides a kind of terminal, comprise: information sending module, the identification information of described terminal is sent to the second terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and be connected with described terminal in judged result agreement when being; Link block, when described the second terminal agreement was connected with described terminal, described link block was connected with described the second terminal.In this technical scheme, need and Soft AP(another terminal as Soft AP in terminal) carry out when Wifi is connected, no longer need to input password, first terminal can be automatically be sent to the second terminal as Soft AP with self identification information, whether the second terminal can notify first terminal to allow it to connect after confirming the first terminal identity according to identification information, and first terminal operates according to notice and gets final product, avoid the user to input the operation of password, also guaranteed user's safety.
In technique scheme, preferably, also comprise: authentication module, agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described terminal request, described authentication module and described the second terminal are carried out the authentication of a described key cipher mode, and described link block is connected with described the second terminal after authentication is complete.In this technical scheme, when the second terminal encryption, first terminal can carry out with it PBC(one key and encrypt) authentication of mode, thus guarantee the fail safe that connects.
In technique scheme, preferably, also comprise: reminding module, when described the second terminal refusal connects, described reminding module is pointed out the user, and described authentication module is when receiving described user and carry out the order of authentication of described individual recognition code mode, to the authentication of described the second terminal request individual recognition code mode, described link block connects described the second terminal after finishing with authentication.In this technical scheme, when carrying out the authentication of PIN mode, the user is pointed out, and the password of user's input, finish the PIN authentication, in time to finish connection.
In technique scheme, preferably, also comprise: the record controls module, after described link block connects described the second terminal, if described the second terminal request with the identification information recording of described terminal in the trust group, the request of described the second terminal is agreed or refused to described record controls module according to described user's instruction.In this technical scheme, can be smoothly by PBC authentication and connection, so the user of first terminal can select to agree the request of the second terminal record identification information in next time for having guaranteed first terminal.
In technique scheme, preferably, described information sending module generates probe request message, comprises the identification information of described terminal in the described probe request message, and described probe request message is sent to described the second terminal; Described link block receives the probe response message of described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
The present invention also provides a kind of data communications method, comprise: step 202, the identification information of first terminal is sent to the second terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and is connected with described terminal in judged result agreement when being; Step 204 when described the second terminal agreement is connected with described first terminal, is connected with described the second terminal.In this technical scheme, need and Soft AP(another terminal as Soft AP in terminal) carry out when Wifi is connected, no longer need to input password, first terminal can be automatically be sent to the second terminal as Soft AP with self identification information, whether the second terminal can notify first terminal to allow it to connect after confirming the first terminal identity according to identification information, and first terminal operates according to notice and gets final product, avoid the user to input the operation of password, also guaranteed user's safety.
In technique scheme, preferably, described step 204 comprises: agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described first terminal request, carry out the authentication of a described key cipher mode with described the second terminal, and after authentication is complete, be connected with described the second terminal.In this technical scheme, when the second terminal encryption, first terminal can carry out with it PBC(one key and encrypt) authentication of mode, thus guarantee the fail safe that connects.
In technique scheme, preferably, described step 204 comprises: when described the second terminal refusal connects, the user is pointed out, and when receiving described user and carry out the order of authentication of described individual recognition code mode, to the authentication of described the second terminal request individual recognition code mode, and after finishing with authentication, connect described the second terminal.In this technical scheme, when carrying out the authentication of PIN mode, the user is pointed out, and the password of user's input, finish the PIN authentication, in time to finish connection.
In technique scheme, preferably, also comprise: after connecting described the second terminal, if described the second terminal request with the identification information recording of described first terminal in the trust group, according to described user's instruction, agree or refuse the request of described the second terminal.In this technical scheme, can be smoothly by PBC authentication and connection, so the user of first terminal can select to agree the request of the second terminal record identification information in next time for having guaranteed first terminal.
In technique scheme, preferably, described step 202 comprises: generate probe request message, comprise the identification information of described first terminal in the described probe request message, and described probe request message is sent to described the second terminal; Described step 204 comprises: the probe response message that receives described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
The present invention also provides a kind of terminal, comprising: information receiving module, the identification information of the described first terminal that the reception first terminal sends; Signal judgement module is judged the identification information that whether comprises described first terminal in the default trust group, wherein, in the described trust group with record by one or more identification informations; Link block when comprising the identification information of described terminal in described trust group, is agreed to be connected with described first terminal.In this technical scheme, recorded all in the trust group and allowed the identification information of the terminal of connection, when the first terminal request connects, need not input password, get final product but directly send identification information, can judge whether to connect first terminal according to the trust group, quick and fail safe is good.
In technique scheme, preferably, also comprise: authentication module, when described link block agreement is connected with described first terminal, described authentication module is carried out the authentication of a key cipher mode to described first terminal request, described link block is connected with described first terminal after authentication is finished.In this technical scheme, when allowing first terminal to connect, be the fail safe that guarantees to connect, can carry out the authentication of PBC mode.
In technique scheme, preferably, when described link block did not comprise the identification information of described first terminal in described trust group, refusal was connected with described first terminal.In this technical scheme, when the identification information of described first terminal is not in the trust group, illustrate that connecting first terminal exists risk, can refuse to connect.
In technique scheme, preferably, when described link block refusal connects described first terminal, if the authentication of individual recognition code mode is carried out in described first terminal request, described authentication module and described first terminal carry out the authentication of described individual recognition code mode, and connect described first terminal after authentication is finished.In this technical scheme, after refusal connects, if initiating the PIN authentication of traditional approach, first terminal connects, then allow to carry out authentication and connection, connection can be in time finished at assurance first terminal family, and need to carry out Password Input this moment.
In technique scheme, preferably, also comprise: logging modle, after described link block connects described first terminal, described logging modle to described first terminal request with the identification information recording of described first terminal in described trust group, when described first terminal accepts request, with the identification information recording of described first terminal in described trust group.In technical scheme, for guaranteed first terminal next time can be smoothly by the PBC authentication and connect, so can solicit the user's of first terminal suggestion, with the identification information recording of first terminal in the trust group.
In technique scheme, preferably, described information receiving module receives the probe request message of described first terminal, and obtains the identification information of described first terminal from described probe request message; When described link block comprises the identification information of described first terminal in described trust group, send probe response message, comprise the information that agreement is connected with described first terminal in the described probe response message, wherein, the identification information of described first terminal comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
The present invention also provides a kind of data communications method, comprising: step 402, the identification information of the described first terminal that the reception first terminal sends; Step 404 is judged the identification information that whether comprises described first terminal in the default trust group, wherein, in the described trust group with record by one or more identification informations; Step 406 when comprising the identification information of described first terminal in described trust group, is agreed to be connected with described terminal.In this technical scheme, recorded all in the trust group and allowed the identification information of the terminal of connection, when the first terminal request connects, need not input password, get final product but directly send identification information, can judge whether to connect first terminal according to the trust group, quick and fail safe is good.
In technique scheme, preferably, also comprise: when agreement is connected with described first terminal, carries out the authentication of a key cipher mode to described first terminal request, and after authentication is finished, be connected with described first terminal.In this technical scheme, when allowing first terminal to connect, be the fail safe that guarantees to connect, can carry out the authentication of PBC mode.
In technique scheme, preferably, described step 406 also comprises: when not comprising the identification information of described first terminal in described trust group, refusal is connected with described first terminal.In this technical scheme, when the identification information of described first terminal is not in the trust group, illustrate that connecting first terminal exists risk, can refuse to connect.
In technique scheme, preferably, also comprise: when refusal connects described first terminal, if the authentication of individual recognition code mode is carried out in described first terminal request, then carry out the authentication of described individual recognition code mode with described first terminal, and after authentication is finished, connect described first terminal.In this technical scheme, after refusal connects, if initiating the PIN authentication of traditional approach, first terminal connects, then allow to carry out authentication and connection, connection can be in time finished at assurance first terminal family, and need to carry out Password Input this moment.
In technique scheme, preferably, also comprise: after connecting described first terminal, to described first terminal request with the identification information recording of described first terminal in described trust group, when described first terminal accepts request, with the identification information recording of described first terminal in described trust group.In technical scheme, for guaranteed first terminal next time can be smoothly by the PBC authentication and connect, so can solicit the user's of first terminal suggestion, with the identification information recording of first terminal in the trust group.
In technique scheme, preferably, described step 402 comprises: receive the probe request message of described first terminal, and obtain the identification information of described terminal from described probe request message; Described step 404 comprises: when comprising the identification information of described first terminal in described trust group, send probe response message, comprise the information that agreement is connected with described first terminal in the described probe response message, wherein, the identification information of described first terminal comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
By technical scheme of the present invention, before a portable terminal is by the portable terminal of Wifi connection as Soft AP, utilize the probe bag that loCal number is sent to Soft AP, Soft AP searches corresponding number in the contact person, if found, then enter the WPS pattern and notify last portable terminal to connect by WPS, (use the PBC pattern of WPS, phone number is not the PIN code of being WPS, in the trust group of Soft AP, to search corresponding number whether to exist, if there is the then PBC authentication of Soft AP end initiation WPS, inform that simultaneously client end (request connects a side) carries out WPS and encrypts) like this user just need not input password and also can carry out a kind of connected mode of encryption, this invention can reduce user's operation and guarantee the fail safe of transfer of data, the user only need to select at the Wifi interface ssid of Soft AP, click to connect and get final product, intelligence is easily experienced, do not need password expressly is kept in the configuration file of mobile phone yet, each password all is to generate according to the PBC cryptographic algorithm of WPS is automatic, can not cause user profile to reveal.
Description of drawings
Fig. 1 is the block diagram of terminal according to an embodiment of the invention;
Fig. 2 is the flow chart of data communications method according to an embodiment of the invention;
Fig. 3 is the block diagram of terminal according to an embodiment of the invention;
Fig. 4 is the flow chart of data communications method according to an embodiment of the invention;
Fig. 5 is the flow chart of data communications method according to an embodiment of the invention.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments the present invention is further described in detail.Need to prove, in the situation that do not conflict, the application's embodiment and the feature among the embodiment can make up mutually.
A lot of details have been set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subjected to the restriction of following public specific embodiment.
Fig. 1 is the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 1, the invention provides a kind of terminal 100, comprise: information sending module 102, the identification information of described terminal is sent to the second terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and be connected with described terminal in judged result agreement when being; Link block 104, when described the second terminal agreement was connected with described terminal, described link block 104 was connected with described the second terminal.In this technical scheme, need and SoftAP(another terminal as Soft AP in terminal) carry out when Wifi is connected, no longer need to input password, first terminal can be automatically be sent to the second terminal as Soft AP with self identification information, whether the second terminal can notify first terminal to allow it to connect after confirming the first terminal identity according to identification information, and first terminal operates according to notice and gets final product, avoid the user to input the operation of password, also guaranteed user's safety.
In technique scheme, also comprise: authentication module 106, agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described terminal request, described authentication module 106 and described the second terminal are carried out the authentication of a described key cipher mode, and described link block 104 is connected with described the second terminal after authentication is complete.In this technical scheme, when the second terminal encryption, first terminal can carry out with it PBC(one key and encrypt) authentication of mode, thus guarantee the fail safe that connects.
In technique scheme, also comprise: reminding module 108, when described the second terminal refusal connects, described reminding module 108 couples of users point out, described authentication module 106 is when receiving described user and carry out the order of authentication of described individual recognition code mode, to the authentication of described the second terminal request individual recognition code mode, described link block 104 connects described the second terminal after finishing with authentication.In this technical scheme, when carrying out the authentication of PIN mode, the user is pointed out, and the password of user's input, finish the PIN authentication, in time to finish connection.
In technique scheme, also comprise: record controls module 110, after described link block 108 connects described the second terminal, if described the second terminal request with the identification information recording of described terminal in the trust group, the request of described the second terminal is agreed or is refused in 110 instructions according to described user of described record controls mould.In this technical scheme, can be smoothly by PBC authentication and connection, so the user of first terminal can select to agree the request of the second terminal record identification information in next time for having guaranteed first terminal.
In technique scheme, described information sending module 102 generates probe request message, comprises the identification information of described terminal in the described probe request message, and described probe request message is sent to described the second terminal; Described link block 104 receives the probe response message of described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
Fig. 2 is the flow chart of data communications method according to an embodiment of the invention.
As shown in Figure 2, the present invention also provides a kind of data communications method, comprise: step 202, the identification information of first terminal is sent to the second terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and be connected with described terminal in judged result agreement when being; Step 204 when described the second terminal agreement is connected with described first terminal, is connected with described the second terminal.In this technical scheme, need and Soft AP(another terminal as Soft AP in terminal) carry out when Wifi is connected, no longer need to input password, first terminal can be automatically be sent to the second terminal as Soft AP with self identification information, whether the second terminal can notify first terminal to allow it to connect after confirming the first terminal identity according to identification information, and first terminal operates according to notice and gets final product, avoid the user to input the operation of password, also guaranteed user's safety.
In technique scheme, described step 204 comprises: agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described first terminal request, carry out the authentication of a described key cipher mode with described the second terminal, and after authentication is complete, be connected with described the second terminal.In this technical scheme, when the second terminal encryption, first terminal can carry out with it PBC(one key and encrypt) authentication of mode, thus guarantee the fail safe that connects.
In technique scheme, described step 204 comprises: when described the second terminal refusal connects, the user is pointed out, and when receiving described user and carry out the order of authentication of described individual recognition code mode, authentication to described the second terminal request individual recognition code mode, and after finishing with authentication, connect described the second terminal.In this technical scheme, when carrying out the authentication of PIN mode, the user is pointed out, and the password of user's input, finish the PIN authentication, in time to finish connection.
In technique scheme, also comprise: after connecting described the second terminal, if described the second terminal request with the identification information recording of described first terminal in the trust group, according to described user's instruction, agree or refuse the request of described the second terminal.In this technical scheme, can be smoothly by PBC authentication and connection, so the user of first terminal can select to agree the request of the second terminal record identification information in next time for having guaranteed first terminal.
In technique scheme, described step 202 comprises: generate probe request message, comprise the identification information of described first terminal in the described probe request message, and described probe request message is sent to described the second terminal; Described step 204 comprises: the probe response message that receives described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
Fig. 3 is the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, the present invention also provides a kind of terminal 300, comprising: information receiving module 302, the identification information of the described first terminal that the reception first terminal sends; Signal judgement module 304 is judged the identification information that whether comprises described first terminal in the default trust group, wherein, in the described trust group with record by one or more identification informations; Link block 306 when comprising the identification information of described terminal in described trust group, is agreed to be connected with described first terminal.In this technical scheme, recorded all in the trust group and allowed the identification information of the terminal of connection, when the first terminal request connects, need not input password, get final product but directly send identification information, can judge whether to connect first terminal according to the trust group, quick and fail safe is good.
In technique scheme, also comprise: authentication module 308, when described link block 306 agreements are connected with described first terminal, described authentication module 308 is carried out the authentication of a key cipher mode to described first terminal request, described link block 306 is connected with described first terminal after authentication is finished.In this technical scheme, when allowing first terminal to connect, be the fail safe that guarantees to connect, can carry out the authentication of PBC mode.
In technique scheme, when described link block 306 did not comprise the identification information of described first terminal in described trust group, refusal was connected with described first terminal.In this technical scheme, when the identification information of described first terminal is not in the trust group, illustrate that connecting first terminal exists risk, can refuse to connect.
In technique scheme, when described link block 306 refusals connect described first terminal, if the authentication of individual recognition code mode is carried out in described first terminal request, described authentication module 308 is carried out the authentication of described individual recognition code mode with described first terminal, and connects described first terminal after authentication is finished.In this technical scheme, after refusal connects, if initiating the PIN authentication of traditional approach, first terminal connects, then allow to carry out authentication and connection, connection can be in time finished at assurance first terminal family, and need to carry out Password Input this moment.
In technique scheme, also comprise: logging modle 310, after described link block 306 connects described first terminal, described logging modle 310 to described first terminal request with the identification information recording of described first terminal in described trust group, when described first terminal accepts request, with the identification information recording of described first terminal in described trust group.In technical scheme, for guaranteed first terminal next time can be smoothly by the PBC authentication and connect, so can solicit the user's of first terminal suggestion, with the identification information recording of first terminal in the trust group.
In technique scheme, described information receiving module 302 receives the probe request message of described first terminal, and obtains the identification information of described first terminal from described probe request message; When described link block 304 comprises the identification information of described first terminal in described trust group, send probe response message, comprise the information that agreement is connected with described first terminal in the described probe response message, wherein, the identification information of described first terminal comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
Fig. 4 is the flow chart of data communications method according to an embodiment of the invention.
As shown in Figure 4, the present invention also provides a kind of data communications method, comprising: step 402, the identification information of the described first terminal that the reception first terminal sends; Step 404 is judged the identification information that whether comprises described first terminal in the default trust group, wherein, in the described trust group with record by one or more identification informations; Step 406 when comprising the identification information of described first terminal in described trust group, is agreed to be connected with described terminal.In this technical scheme, recorded all in the trust group and allowed the identification information of the terminal of connection, when the first terminal request connects, need not input password, get final product but directly send identification information, can judge whether to connect first terminal according to the trust group, quick and fail safe is good.
In technique scheme, also comprise: when agreement is connected with described first terminal, carries out the authentication of a key cipher mode to described first terminal request, and after authentication is finished, be connected with described first terminal.In this technical scheme, when allowing first terminal to connect, be the fail safe that guarantees to connect, can carry out the authentication of PBC mode.
In technique scheme, described step 406 also comprises: when not comprising the identification information of described first terminal in described trust group, refusal is connected with described first terminal.In this technical scheme, when the identification information of described first terminal is not in the trust group, illustrate that connecting first terminal exists risk, can refuse to connect.
In technique scheme, also comprise: when refusal connects described first terminal, if the authentication of individual recognition code mode is carried out in described first terminal request, then carry out the authentication of described individual recognition code mode with described first terminal, and after authentication is finished, connect described first terminal.In this technical scheme, after refusal connects, if initiating the PIN authentication of traditional approach, first terminal connects, then allow to carry out authentication and connection, connection can be in time finished at assurance first terminal family, and need to carry out Password Input this moment.
In technique scheme, also comprise: after connecting described first terminal, to described first terminal request with the identification information recording of described first terminal in described trust group, when described first terminal accepts request, with the identification information recording of described first terminal in described trust group.In technical scheme, for guaranteed first terminal next time can be smoothly by the PBC authentication and connect, so can solicit the user's of first terminal suggestion, with the identification information recording of first terminal in the trust group.
In technique scheme, described step 402 comprises: receive the probe request message of described first terminal, and obtain the identification information of described terminal from described probe request message; Described step 404 comprises: when comprising the identification information of described first terminal in described trust group, send probe response message, comprise the information that agreement is connected with described first terminal in the described probe response message, wherein, the identification information of described first terminal comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
Fig. 5 is the flow chart of data communications method according to an embodiment of the invention.
In one embodiment of the invention, it mainly is the Wifi chip connection request probe package of increase when connecting Soft AP by portable terminal, comprise loCal number in the package, after Soft AP receives this Request Packet, judge that this number is whether in the contact person the inside of trust group, if then automatically initiating the WPS authentication, the user only needs a key can solve connectivity problem, and concrete steps as shown in Figure 5.
Step 502, portable terminal (hereinafter referred to as the client end) is opened Wifi and is scanned Soft AP on every side, the Soft AP that selection will connect clicks and connects, the client end sends a connection request probe package to Soft AP, and the request package comprises the information such as the local phone number of client end, WPS authentication request;
Step 504, Soft AP end gets access to the phone number of client end, and inquires about in the local linkages people after receiving the probe package of client end transmission by package;
Step 506, if do not mate, Soft AP end sends a response package to the Wifi chip of client end, and the inside inclusion information represents that this mobile phone is not client trusty, and refusal initiation WPS authentication connects;
Step 508, client resolves after holding the response message of receiving the AP transmission;
Step 510, if what receive is that AP refusal is initiated the WPS authentication information, not in the trust group, Soft AP refuse connection in the interface prompt self of client end;
Step 512, whether prompting uses the WPS-PIN coding mode to carry out authentication, if user selection is then again to initiate WPS-PIN coding mode authentication;
Step 514, Soft AP end generates PIN code and informs that the input of client end connects, whether Soft AP end prompting user adds contact person's (owing to not in the trust group, must confirm to connect and to add the trust group by the user), successful connection to this client end number;
Step 516, if Soft AP finds the number of coupling in the contact person, Soft AP end thinks that this client end is in the trust group, then Soft AP sends a response message to client end wifi chip, the information that comprises in the message is to initiate the WPS authentication (to use the PBC pattern of WPS, whether phone number is not the PIN code of being WPS, be to search corresponding number to exist in the contact person, if there is the then PBC authentication of Soft AP end initiation WPS);
Step 518, the client end is received the response message that Soft AP responds;
Step 520, while Soft AP end has been initiated the PBC authentication of WPS automatically, and client agrees initiation WPS authentication to package parsing discovery Soft AP after holding the response message of receiving Soft AP response, and client holds and also automatically initiates the WPS authentication;
Step 522, Soft AP and client end both sides finish PBC authentication, successful connection.
Whole process user only need click the ssid connection of Soft AP and just finish, and operating procedure is very simple, because the Soft AP that connects also encrypts, has guaranteed user's information security.
By above technical scheme, can realize terminal and data communications method, utilize the contact person to create a trust group that can connect mobile phone Soft AP, utilize the phone number in the package automatically to initiate the WPS authentication when terminal wifi mobile phone connects Soft AP in the group, whole connection procedure user does not need to see password, the connection procedure user only need select ssid corresponding to Soft AP to click can finish connection procedure, and other steps all are automatically to finish.Simplify user's operating procedure, improve the user and experience.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a terminal is characterized in that, comprising:
Information sending module is sent to the second terminal with the identification information of described terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and is connected with described terminal in judged result agreement when being;
Link block, when described the second terminal agreement was connected with described terminal, described link block was connected with described the second terminal.
2. terminal according to claim 1 is characterized in that, also comprises:
Authentication module, agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described terminal request, described authentication module and described the second terminal are carried out the authentication of a described key cipher mode, and described link block is connected with described the second terminal after authentication is complete.
3. terminal according to claim 2 is characterized in that, also comprises:
Reminding module, when described the second terminal refusal connects, described reminding module is pointed out the user, described authentication module is when receiving described user and carry out the order of authentication of described individual recognition code mode, authentication to described the second terminal request individual recognition code mode, described link block connects described the second terminal after finishing with authentication.
4. terminal according to claim 3 is characterized in that, also comprises:
The record controls module, after described link block connects described the second terminal, if in the trust group, the request of described the second terminal is agreed or refused to described record controls module according to described user's instruction to described the second terminal request with the identification information recording of described terminal.
5. each described terminal in 4 according to claim 1, it is characterized in that, described information sending module generates probe request message, comprises the identification information of described terminal in the described probe request message, and described probe request message is sent to described the second terminal;
Described link block receives the probe response message of described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described terminal.
6. a data communications method is characterized in that, comprising:
Step 202 is sent to the second terminal with the identification information of first terminal, by the identification information that whether comprises described first terminal in the default trust group of described the second terminal judges, and is connected with described first terminal in judged result agreement when being;
Step 204 when described the second terminal agreement is connected with described first terminal, is connected with described the second terminal.
7. data communications method according to claim 6 is characterized in that, described step 204 comprises:
Agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described first terminal request, carry out the authentication of a described key cipher mode with described the second terminal, and after authentication is complete, be connected with described the second terminal.
8. data communications method according to claim 7 is characterized in that, described step 204 comprises:
When described the second terminal refusal connects, the user is pointed out, and when receiving described user and carry out the order of authentication of described individual recognition code mode, to the authentication of described the second terminal request individual recognition code mode, and after finishing with authentication, connect described the second terminal.
9. data communications method according to claim 8 is characterized in that, also comprises:
After connecting described the second terminal, if described the second terminal request with the identification information recording of described first terminal in the trust group, according to described user's instruction, agree or refuse the request of described the second terminal.
10. each described data communications method in 9 according to claim 6, it is characterized in that, described step 202 comprises: generate probe request message, comprise the identification information of described first terminal in the described probe request message, and described probe request message is sent to described the second terminal;
Described step 204 comprises: the probe response message that receives described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described first terminal.
CN2012103494644A 2012-09-18 2012-09-18 Terminal and data communication method Pending CN102869014A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012103494644A CN102869014A (en) 2012-09-18 2012-09-18 Terminal and data communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012103494644A CN102869014A (en) 2012-09-18 2012-09-18 Terminal and data communication method

Publications (1)

Publication Number Publication Date
CN102869014A true CN102869014A (en) 2013-01-09

Family

ID=47447548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012103494644A Pending CN102869014A (en) 2012-09-18 2012-09-18 Terminal and data communication method

Country Status (1)

Country Link
CN (1) CN102869014A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475667A (en) * 2013-09-24 2013-12-25 小米科技有限责任公司 Method, device and system for controlling access router
CN103476092A (en) * 2013-09-13 2013-12-25 惠州Tcl移动通信有限公司 Mobile terminal based WIFI hotspot access method and system
CN103765855A (en) * 2013-09-13 2014-04-30 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor
CN104023416A (en) * 2013-02-28 2014-09-03 腾讯科技(深圳)有限公司 Method and system for transmitting file, sending terminal and receiving terminal
CN104159227A (en) * 2014-08-15 2014-11-19 广东欧珀移动通信有限公司 Wireless network connection control method and device
CN104244234A (en) * 2013-12-02 2014-12-24 北京东方泰华科技发展有限公司 Method and device for connecting wireless device with intelligent terminal rapidly
CN104380776A (en) * 2014-05-31 2015-02-25 华为技术有限公司 Network connection method, hotspot terminal and management terminal
CN104427497A (en) * 2013-08-20 2015-03-18 上海晨兴希姆通电子科技有限公司 Handset verification method, handset and handset verification system
CN104618988A (en) * 2015-01-21 2015-05-13 青岛海尔智能家电科技有限公司 Smart device network access method and device
CN104767768A (en) * 2014-01-02 2015-07-08 海尔集团公司 Methods for sending and receiving network access configuration information of household appliances, and household appliances
CN104850513A (en) * 2015-06-04 2015-08-19 武汉星光河文化影视传媒有限公司 Method and system for tablet computer controlling mobile terminal
CN104853353A (en) * 2015-05-13 2015-08-19 广东欧珀移动通信有限公司 Access authenticating method and apparatus of wireless access point
CN105050085A (en) * 2015-07-06 2015-11-11 广东欧珀移动通信有限公司 WiFi connecting method and device
CN105207980A (en) * 2014-06-26 2015-12-30 联想(北京)有限公司 Information processing method and electronic equipment
WO2016029668A1 (en) * 2014-08-27 2016-03-03 中兴通讯股份有限公司 Secure connection method, device and system, and computer storage medium
CN105450610A (en) * 2014-08-29 2016-03-30 阿里巴巴集团控股有限公司 Method and system for quickly establishing trusted connection between terminals
CN105554845A (en) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Access method, router, and terminal
CN105743844A (en) * 2014-12-08 2016-07-06 联想(北京)有限公司 Information processing method and electronic device
WO2017063517A1 (en) * 2015-10-12 2017-04-20 阿里巴巴集团控股有限公司 Near field communication establishing method and device
US9686819B2 (en) 2013-09-24 2017-06-20 Xiaomi Inc. Methods, devices and systems for router access control
CN107205257A (en) * 2017-06-19 2017-09-26 深圳天珑无线科技有限公司 A kind of focus cut-in method and system
WO2017181919A1 (en) * 2016-04-18 2017-10-26 肖华薇 Method of connecting to wireless local area network, device, and system
US9843567B2 (en) 2013-08-30 2017-12-12 Beijing Zhigu Rui Tuo Tech Co., Ltd. Wireless network service provision method and system
CN111669840A (en) * 2019-03-05 2020-09-15 珠海奔图电子有限公司 Network connection configuration method, network connection configuration device and image forming apparatus
CN115119001A (en) * 2021-03-17 2022-09-27 阿里巴巴新加坡控股有限公司 Live broadcast control method, device, electronic equipment, medium and program product

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043755A (en) * 2007-04-16 2007-09-26 华为技术有限公司 Method, system and apparatus for admittance determination in mobile communication system
CN101401405A (en) * 2006-03-21 2009-04-01 索尼爱立信移动通讯有限公司 Method and system for maintaining anonymity of a mobile radio terminal
CN201733450U (en) * 2010-06-30 2011-02-02 华为终端有限公司 Wireless access device
CN102148769A (en) * 2010-02-08 2011-08-10 汪岚岚 Method for realizing internet instant messaging (IM) and network community service by taking phone number as service identification
CN102209324A (en) * 2011-05-23 2011-10-05 中兴通讯股份有限公司 Mobile terminal and method for accessing mobile terminal into wireless local area network (WLAN) hotspot
CN102572836A (en) * 2010-12-20 2012-07-11 联想(北京)有限公司 Method for accessing wireless network, portable mobile terminal and wireless network system
CN102594987A (en) * 2012-02-09 2012-07-18 深圳市中兴移动通信有限公司 Method for realizing safe and quick Bluetooth pairing connection
CN102651784A (en) * 2011-02-28 2012-08-29 深圳富泰宏精密工业有限公司 Contact person authentication system and method
CN102664994A (en) * 2012-04-12 2012-09-12 上海斐讯数据通信技术有限公司 Method and system for friend relation authentication through contacts on mobile terminals

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101401405A (en) * 2006-03-21 2009-04-01 索尼爱立信移动通讯有限公司 Method and system for maintaining anonymity of a mobile radio terminal
CN101043755A (en) * 2007-04-16 2007-09-26 华为技术有限公司 Method, system and apparatus for admittance determination in mobile communication system
CN102148769A (en) * 2010-02-08 2011-08-10 汪岚岚 Method for realizing internet instant messaging (IM) and network community service by taking phone number as service identification
CN201733450U (en) * 2010-06-30 2011-02-02 华为终端有限公司 Wireless access device
CN102572836A (en) * 2010-12-20 2012-07-11 联想(北京)有限公司 Method for accessing wireless network, portable mobile terminal and wireless network system
CN102651784A (en) * 2011-02-28 2012-08-29 深圳富泰宏精密工业有限公司 Contact person authentication system and method
CN102209324A (en) * 2011-05-23 2011-10-05 中兴通讯股份有限公司 Mobile terminal and method for accessing mobile terminal into wireless local area network (WLAN) hotspot
CN102594987A (en) * 2012-02-09 2012-07-18 深圳市中兴移动通信有限公司 Method for realizing safe and quick Bluetooth pairing connection
CN102664994A (en) * 2012-04-12 2012-09-12 上海斐讯数据通信技术有限公司 Method and system for friend relation authentication through contacts on mobile terminals

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023416A (en) * 2013-02-28 2014-09-03 腾讯科技(深圳)有限公司 Method and system for transmitting file, sending terminal and receiving terminal
CN104023416B (en) * 2013-02-28 2019-01-11 腾讯科技(深圳)有限公司 A kind of transmission method of file, system send terminal and receive terminal
CN104427497A (en) * 2013-08-20 2015-03-18 上海晨兴希姆通电子科技有限公司 Handset verification method, handset and handset verification system
US9843567B2 (en) 2013-08-30 2017-12-12 Beijing Zhigu Rui Tuo Tech Co., Ltd. Wireless network service provision method and system
WO2015035620A1 (en) * 2013-09-13 2015-03-19 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor thereof
CN103476092A (en) * 2013-09-13 2013-12-25 惠州Tcl移动通信有限公司 Mobile terminal based WIFI hotspot access method and system
CN103765855A (en) * 2013-09-13 2014-04-30 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor
US9503896B2 (en) 2013-09-13 2016-11-22 Huawei Device Co., Ltd. Processing method of wireless network device, wireless network device, and processor of wireless network device
WO2015043198A1 (en) * 2013-09-24 2015-04-02 小米科技有限责任公司 Method, device and system for controlling access to router
CN103475667A (en) * 2013-09-24 2013-12-25 小米科技有限责任公司 Method, device and system for controlling access router
US9686819B2 (en) 2013-09-24 2017-06-20 Xiaomi Inc. Methods, devices and systems for router access control
CN104244234A (en) * 2013-12-02 2014-12-24 北京东方泰华科技发展有限公司 Method and device for connecting wireless device with intelligent terminal rapidly
CN104767768A (en) * 2014-01-02 2015-07-08 海尔集团公司 Methods for sending and receiving network access configuration information of household appliances, and household appliances
CN104380776A (en) * 2014-05-31 2015-02-25 华为技术有限公司 Network connection method, hotspot terminal and management terminal
US11310239B2 (en) 2014-05-31 2022-04-19 Huawei Technologies Co., Ltd. Network connection method, hotspot terminal and management terminal
US10616232B2 (en) 2014-05-31 2020-04-07 Huawei Technologies Co., Ltd. Network connection method, hotspot terminal and management terminal
CN104380776B (en) * 2014-05-31 2019-03-26 华为技术有限公司 A kind of method for connecting network, hot terminal and management terminal
WO2015180192A1 (en) * 2014-05-31 2015-12-03 华为技术有限公司 Network connection method, hotspot terminal, and management terminal
CN105207980A (en) * 2014-06-26 2015-12-30 联想(北京)有限公司 Information processing method and electronic equipment
CN104159227A (en) * 2014-08-15 2014-11-19 广东欧珀移动通信有限公司 Wireless network connection control method and device
CN104159227B (en) * 2014-08-15 2018-07-03 广东欧珀移动通信有限公司 wireless network connection control method and device
WO2016029668A1 (en) * 2014-08-27 2016-03-03 中兴通讯股份有限公司 Secure connection method, device and system, and computer storage medium
CN105472606A (en) * 2014-08-27 2016-04-06 中兴通讯股份有限公司 Safety connection method, device and system
CN105450610A (en) * 2014-08-29 2016-03-30 阿里巴巴集团控股有限公司 Method and system for quickly establishing trusted connection between terminals
CN105450610B (en) * 2014-08-29 2019-02-22 阿里巴巴集团控股有限公司 The method and its system of connection trusty are quickly established between terminal
CN105743844A (en) * 2014-12-08 2016-07-06 联想(北京)有限公司 Information processing method and electronic device
CN104618988A (en) * 2015-01-21 2015-05-13 青岛海尔智能家电科技有限公司 Smart device network access method and device
CN104618988B (en) * 2015-01-21 2018-11-23 青岛海尔智能家电科技有限公司 Smart machine method for network access and device
CN104853353A (en) * 2015-05-13 2015-08-19 广东欧珀移动通信有限公司 Access authenticating method and apparatus of wireless access point
CN104850513A (en) * 2015-06-04 2015-08-19 武汉星光河文化影视传媒有限公司 Method and system for tablet computer controlling mobile terminal
CN105050085A (en) * 2015-07-06 2015-11-11 广东欧珀移动通信有限公司 WiFi connecting method and device
CN105554845A (en) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Access method, router, and terminal
WO2017063517A1 (en) * 2015-10-12 2017-04-20 阿里巴巴集团控股有限公司 Near field communication establishing method and device
WO2017181919A1 (en) * 2016-04-18 2017-10-26 肖华薇 Method of connecting to wireless local area network, device, and system
CN107205257B (en) * 2017-06-19 2021-02-19 深圳天珑无线科技有限公司 Hotspot access method and system
CN107205257A (en) * 2017-06-19 2017-09-26 深圳天珑无线科技有限公司 A kind of focus cut-in method and system
CN111669840A (en) * 2019-03-05 2020-09-15 珠海奔图电子有限公司 Network connection configuration method, network connection configuration device and image forming apparatus
US11687298B2 (en) 2019-03-05 2023-06-27 Zhuhai Pantum Electronics Co., Ltd. Network connection configuration method, network connection configuration apparatus, image forming apparatus,and storage medium
CN115119001A (en) * 2021-03-17 2022-09-27 阿里巴巴新加坡控股有限公司 Live broadcast control method, device, electronic equipment, medium and program product

Similar Documents

Publication Publication Date Title
CN102869014A (en) Terminal and data communication method
US10516540B2 (en) Management of profiles in an embedded universal integrated circuit card (eUICC)
CN101366299B (en) Bootstrapping authentication using distinguished random challenges
EP2740315B1 (en) Method, apparatus, and computer program product for connection setup in device-to-device communication
EP2671398B1 (en) Subscriber identity module provisioning
JP6668407B2 (en) Terminal authentication method and apparatus used in mobile communication system
EP1589703B1 (en) System and method for accessing a wireless network
US10769615B2 (en) Device and method in wireless communication system and wireless communication system
CN107667554A (en) Decentralized configuration device entity
US20030120920A1 (en) Remote device authentication
CN107439027A (en) The apparatus and method installed and interoperated for electronic user identity module (ESIM)
WO2013127124A1 (en) Method, system and terminal for implementing wi-fi connection through nfc
CN109922474B (en) Method for triggering network authentication and related equipment
CN100388664C (en) Access method for realizing WLAN multi mode safety identification
EP3041189A1 (en) Communication control apparatus, authentication device, central control apparatus and communication systems
EP2873266B1 (en) Method of accessing a wlan access point
CN104660567B (en) D2D terminal access authentications method, D2D terminals and server
US20120059945A1 (en) Data-Transfer Method and Terminal
CN103841551A (en) Subscriber identity systems, servers, methods for controlling a subscriber identity system, and methods for controlling a server
CN101945371A (en) Communication equipment and control method thereof
CN111031545A (en) Wireless network access control method and device, relay equipment and electronic equipment
CN112235794A (en) WAPI module with encryption chip and transmission method
EP2453608B1 (en) Method and devices for accessing a wireless local area network
CN101877852A (en) User access control method and system
CN107454557B (en) Router connection method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130109