CN102869014A - Terminal and data communication method - Google Patents
Terminal and data communication method Download PDFInfo
- Publication number
- CN102869014A CN102869014A CN2012103494644A CN201210349464A CN102869014A CN 102869014 A CN102869014 A CN 102869014A CN 2012103494644 A CN2012103494644 A CN 2012103494644A CN 201210349464 A CN201210349464 A CN 201210349464A CN 102869014 A CN102869014 A CN 102869014A
- Authority
- CN
- China
- Prior art keywords
- terminal
- authentication
- identification information
- request
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a terminal and a data communication method. The terminal comprises an information sending module and a connection module, wherein the information sending module is used for sending identification information of the terminal to a second terminal, which is used for judging whether a preset trusted group includes the identification information of the terminal or not, and agrees to the connection with the terminal when a positive judgment result is achieved; and the connection module is connected with the second terminal when the second terminal agrees the connection with the terminal. By means of the technical scheme disclosed by the invention, when one mobile terminal access to another terminal serving as a Soft AP (Access Point) in a Wifi (Wireless Fidelity) manner, passwords do not needs to be input all the time for authentication, so that not only is a user prevented from complex operation but also the password safety of the user can be guaranteed.
Description
Technical field
The present invention relates to moving communicating field, in particular to a kind of terminal and a kind of data communications method.
Background technology
Along with science and technology and expanding economy, mobile phone terminal and people's life closely links to each other.Mobile focus Soft AP(Soft AP is a kind of wireless network card that passes through, use special-purpose software to realize the technology of AP function at PC, it can replace the AP(Access Point in the wireless network, WAP (wireless access point))), the Wifi function has become the standard configuration of smart mobile phone, the data service of mobile phone terminal is used more and more, mobile phone can be shared the mobile phone 3G network at any time as mobile focus, can set up simple LAN whenever and wherever possible, people use the frequency of Wifi more and more higher, stricter to the information security requirement, operating procedure is required as far as possible simple.
After the mobile focus function of mobile phone is opened, cipher mode can be set, other mobile phones carry out Wifi and connect manually input password, behind the Soft AP that connects cipher mode, password expressly is kept at the configuration file the inside of mobile phone terminal, and read the information of configuration file the inside and finish Password Input next time when connecting.
According to such scheme, terminal and the Soft AP of encryption carry out Wifi when being connected, and need manually input password, and complicated operation, and password is that clear-text way is kept in the mobile phone configuration file, is easy to cause information leakage threatens to user's information security.
Therefore, need a kind of new technical scheme, when a portable terminal accesses another as the terminal of Soft AP by the Wifi mode, needn't always need to input password and carry out authentication, both avoided the user to carry out loaded down with trivial details operation, can guarantee again the safety of its password.
Summary of the invention
Technical problem to be solved by this invention is, a kind of new technical scheme is provided, when a portable terminal accesses another as the terminal of Soft AP by the Wifi mode, needn't always need to input password and carry out authentication, both avoid the user to carry out loaded down with trivial details operation, and can guarantee again the safety of its password.
In view of this, the invention provides a kind of terminal, comprise: information sending module, the identification information of described terminal is sent to the second terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and be connected with described terminal in judged result agreement when being; Link block, when described the second terminal agreement was connected with described terminal, described link block was connected with described the second terminal.In this technical scheme, need and Soft AP(another terminal as Soft AP in terminal) carry out when Wifi is connected, no longer need to input password, first terminal can be automatically be sent to the second terminal as Soft AP with self identification information, whether the second terminal can notify first terminal to allow it to connect after confirming the first terminal identity according to identification information, and first terminal operates according to notice and gets final product, avoid the user to input the operation of password, also guaranteed user's safety.
In technique scheme, preferably, also comprise: authentication module, agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described terminal request, described authentication module and described the second terminal are carried out the authentication of a described key cipher mode, and described link block is connected with described the second terminal after authentication is complete.In this technical scheme, when the second terminal encryption, first terminal can carry out with it PBC(one key and encrypt) authentication of mode, thus guarantee the fail safe that connects.
In technique scheme, preferably, also comprise: reminding module, when described the second terminal refusal connects, described reminding module is pointed out the user, and described authentication module is when receiving described user and carry out the order of authentication of described individual recognition code mode, to the authentication of described the second terminal request individual recognition code mode, described link block connects described the second terminal after finishing with authentication.In this technical scheme, when carrying out the authentication of PIN mode, the user is pointed out, and the password of user's input, finish the PIN authentication, in time to finish connection.
In technique scheme, preferably, also comprise: the record controls module, after described link block connects described the second terminal, if described the second terminal request with the identification information recording of described terminal in the trust group, the request of described the second terminal is agreed or refused to described record controls module according to described user's instruction.In this technical scheme, can be smoothly by PBC authentication and connection, so the user of first terminal can select to agree the request of the second terminal record identification information in next time for having guaranteed first terminal.
In technique scheme, preferably, described information sending module generates probe request message, comprises the identification information of described terminal in the described probe request message, and described probe request message is sent to described the second terminal; Described link block receives the probe response message of described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
The present invention also provides a kind of data communications method, comprise: step 202, the identification information of first terminal is sent to the second terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and is connected with described terminal in judged result agreement when being; Step 204 when described the second terminal agreement is connected with described first terminal, is connected with described the second terminal.In this technical scheme, need and Soft AP(another terminal as Soft AP in terminal) carry out when Wifi is connected, no longer need to input password, first terminal can be automatically be sent to the second terminal as Soft AP with self identification information, whether the second terminal can notify first terminal to allow it to connect after confirming the first terminal identity according to identification information, and first terminal operates according to notice and gets final product, avoid the user to input the operation of password, also guaranteed user's safety.
In technique scheme, preferably, described step 204 comprises: agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described first terminal request, carry out the authentication of a described key cipher mode with described the second terminal, and after authentication is complete, be connected with described the second terminal.In this technical scheme, when the second terminal encryption, first terminal can carry out with it PBC(one key and encrypt) authentication of mode, thus guarantee the fail safe that connects.
In technique scheme, preferably, described step 204 comprises: when described the second terminal refusal connects, the user is pointed out, and when receiving described user and carry out the order of authentication of described individual recognition code mode, to the authentication of described the second terminal request individual recognition code mode, and after finishing with authentication, connect described the second terminal.In this technical scheme, when carrying out the authentication of PIN mode, the user is pointed out, and the password of user's input, finish the PIN authentication, in time to finish connection.
In technique scheme, preferably, also comprise: after connecting described the second terminal, if described the second terminal request with the identification information recording of described first terminal in the trust group, according to described user's instruction, agree or refuse the request of described the second terminal.In this technical scheme, can be smoothly by PBC authentication and connection, so the user of first terminal can select to agree the request of the second terminal record identification information in next time for having guaranteed first terminal.
In technique scheme, preferably, described step 202 comprises: generate probe request message, comprise the identification information of described first terminal in the described probe request message, and described probe request message is sent to described the second terminal; Described step 204 comprises: the probe response message that receives described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
The present invention also provides a kind of terminal, comprising: information receiving module, the identification information of the described first terminal that the reception first terminal sends; Signal judgement module is judged the identification information that whether comprises described first terminal in the default trust group, wherein, in the described trust group with record by one or more identification informations; Link block when comprising the identification information of described terminal in described trust group, is agreed to be connected with described first terminal.In this technical scheme, recorded all in the trust group and allowed the identification information of the terminal of connection, when the first terminal request connects, need not input password, get final product but directly send identification information, can judge whether to connect first terminal according to the trust group, quick and fail safe is good.
In technique scheme, preferably, also comprise: authentication module, when described link block agreement is connected with described first terminal, described authentication module is carried out the authentication of a key cipher mode to described first terminal request, described link block is connected with described first terminal after authentication is finished.In this technical scheme, when allowing first terminal to connect, be the fail safe that guarantees to connect, can carry out the authentication of PBC mode.
In technique scheme, preferably, when described link block did not comprise the identification information of described first terminal in described trust group, refusal was connected with described first terminal.In this technical scheme, when the identification information of described first terminal is not in the trust group, illustrate that connecting first terminal exists risk, can refuse to connect.
In technique scheme, preferably, when described link block refusal connects described first terminal, if the authentication of individual recognition code mode is carried out in described first terminal request, described authentication module and described first terminal carry out the authentication of described individual recognition code mode, and connect described first terminal after authentication is finished.In this technical scheme, after refusal connects, if initiating the PIN authentication of traditional approach, first terminal connects, then allow to carry out authentication and connection, connection can be in time finished at assurance first terminal family, and need to carry out Password Input this moment.
In technique scheme, preferably, also comprise: logging modle, after described link block connects described first terminal, described logging modle to described first terminal request with the identification information recording of described first terminal in described trust group, when described first terminal accepts request, with the identification information recording of described first terminal in described trust group.In technical scheme, for guaranteed first terminal next time can be smoothly by the PBC authentication and connect, so can solicit the user's of first terminal suggestion, with the identification information recording of first terminal in the trust group.
In technique scheme, preferably, described information receiving module receives the probe request message of described first terminal, and obtains the identification information of described first terminal from described probe request message; When described link block comprises the identification information of described first terminal in described trust group, send probe response message, comprise the information that agreement is connected with described first terminal in the described probe response message, wherein, the identification information of described first terminal comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
The present invention also provides a kind of data communications method, comprising: step 402, the identification information of the described first terminal that the reception first terminal sends; Step 404 is judged the identification information that whether comprises described first terminal in the default trust group, wherein, in the described trust group with record by one or more identification informations; Step 406 when comprising the identification information of described first terminal in described trust group, is agreed to be connected with described terminal.In this technical scheme, recorded all in the trust group and allowed the identification information of the terminal of connection, when the first terminal request connects, need not input password, get final product but directly send identification information, can judge whether to connect first terminal according to the trust group, quick and fail safe is good.
In technique scheme, preferably, also comprise: when agreement is connected with described first terminal, carries out the authentication of a key cipher mode to described first terminal request, and after authentication is finished, be connected with described first terminal.In this technical scheme, when allowing first terminal to connect, be the fail safe that guarantees to connect, can carry out the authentication of PBC mode.
In technique scheme, preferably, described step 406 also comprises: when not comprising the identification information of described first terminal in described trust group, refusal is connected with described first terminal.In this technical scheme, when the identification information of described first terminal is not in the trust group, illustrate that connecting first terminal exists risk, can refuse to connect.
In technique scheme, preferably, also comprise: when refusal connects described first terminal, if the authentication of individual recognition code mode is carried out in described first terminal request, then carry out the authentication of described individual recognition code mode with described first terminal, and after authentication is finished, connect described first terminal.In this technical scheme, after refusal connects, if initiating the PIN authentication of traditional approach, first terminal connects, then allow to carry out authentication and connection, connection can be in time finished at assurance first terminal family, and need to carry out Password Input this moment.
In technique scheme, preferably, also comprise: after connecting described first terminal, to described first terminal request with the identification information recording of described first terminal in described trust group, when described first terminal accepts request, with the identification information recording of described first terminal in described trust group.In technical scheme, for guaranteed first terminal next time can be smoothly by the PBC authentication and connect, so can solicit the user's of first terminal suggestion, with the identification information recording of first terminal in the trust group.
In technique scheme, preferably, described step 402 comprises: receive the probe request message of described first terminal, and obtain the identification information of described terminal from described probe request message; Described step 404 comprises: when comprising the identification information of described first terminal in described trust group, send probe response message, comprise the information that agreement is connected with described first terminal in the described probe response message, wherein, the identification information of described first terminal comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
By technical scheme of the present invention, before a portable terminal is by the portable terminal of Wifi connection as Soft AP, utilize the probe bag that loCal number is sent to Soft AP, Soft AP searches corresponding number in the contact person, if found, then enter the WPS pattern and notify last portable terminal to connect by WPS, (use the PBC pattern of WPS, phone number is not the PIN code of being WPS, in the trust group of Soft AP, to search corresponding number whether to exist, if there is the then PBC authentication of Soft AP end initiation WPS, inform that simultaneously client end (request connects a side) carries out WPS and encrypts) like this user just need not input password and also can carry out a kind of connected mode of encryption, this invention can reduce user's operation and guarantee the fail safe of transfer of data, the user only need to select at the Wifi interface ssid of Soft AP, click to connect and get final product, intelligence is easily experienced, do not need password expressly is kept in the configuration file of mobile phone yet, each password all is to generate according to the PBC cryptographic algorithm of WPS is automatic, can not cause user profile to reveal.
Description of drawings
Fig. 1 is the block diagram of terminal according to an embodiment of the invention;
Fig. 2 is the flow chart of data communications method according to an embodiment of the invention;
Fig. 3 is the block diagram of terminal according to an embodiment of the invention;
Fig. 4 is the flow chart of data communications method according to an embodiment of the invention;
Fig. 5 is the flow chart of data communications method according to an embodiment of the invention.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments the present invention is further described in detail.Need to prove, in the situation that do not conflict, the application's embodiment and the feature among the embodiment can make up mutually.
A lot of details have been set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subjected to the restriction of following public specific embodiment.
Fig. 1 is the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 1, the invention provides a kind of terminal 100, comprise: information sending module 102, the identification information of described terminal is sent to the second terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and be connected with described terminal in judged result agreement when being; Link block 104, when described the second terminal agreement was connected with described terminal, described link block 104 was connected with described the second terminal.In this technical scheme, need and SoftAP(another terminal as Soft AP in terminal) carry out when Wifi is connected, no longer need to input password, first terminal can be automatically be sent to the second terminal as Soft AP with self identification information, whether the second terminal can notify first terminal to allow it to connect after confirming the first terminal identity according to identification information, and first terminal operates according to notice and gets final product, avoid the user to input the operation of password, also guaranteed user's safety.
In technique scheme, also comprise: authentication module 106, agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described terminal request, described authentication module 106 and described the second terminal are carried out the authentication of a described key cipher mode, and described link block 104 is connected with described the second terminal after authentication is complete.In this technical scheme, when the second terminal encryption, first terminal can carry out with it PBC(one key and encrypt) authentication of mode, thus guarantee the fail safe that connects.
In technique scheme, also comprise: reminding module 108, when described the second terminal refusal connects, described reminding module 108 couples of users point out, described authentication module 106 is when receiving described user and carry out the order of authentication of described individual recognition code mode, to the authentication of described the second terminal request individual recognition code mode, described link block 104 connects described the second terminal after finishing with authentication.In this technical scheme, when carrying out the authentication of PIN mode, the user is pointed out, and the password of user's input, finish the PIN authentication, in time to finish connection.
In technique scheme, also comprise: record controls module 110, after described link block 108 connects described the second terminal, if described the second terminal request with the identification information recording of described terminal in the trust group, the request of described the second terminal is agreed or is refused in 110 instructions according to described user of described record controls mould.In this technical scheme, can be smoothly by PBC authentication and connection, so the user of first terminal can select to agree the request of the second terminal record identification information in next time for having guaranteed first terminal.
In technique scheme, described information sending module 102 generates probe request message, comprises the identification information of described terminal in the described probe request message, and described probe request message is sent to described the second terminal; Described link block 104 receives the probe response message of described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
Fig. 2 is the flow chart of data communications method according to an embodiment of the invention.
As shown in Figure 2, the present invention also provides a kind of data communications method, comprise: step 202, the identification information of first terminal is sent to the second terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and be connected with described terminal in judged result agreement when being; Step 204 when described the second terminal agreement is connected with described first terminal, is connected with described the second terminal.In this technical scheme, need and Soft AP(another terminal as Soft AP in terminal) carry out when Wifi is connected, no longer need to input password, first terminal can be automatically be sent to the second terminal as Soft AP with self identification information, whether the second terminal can notify first terminal to allow it to connect after confirming the first terminal identity according to identification information, and first terminal operates according to notice and gets final product, avoid the user to input the operation of password, also guaranteed user's safety.
In technique scheme, described step 204 comprises: agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described first terminal request, carry out the authentication of a described key cipher mode with described the second terminal, and after authentication is complete, be connected with described the second terminal.In this technical scheme, when the second terminal encryption, first terminal can carry out with it PBC(one key and encrypt) authentication of mode, thus guarantee the fail safe that connects.
In technique scheme, described step 204 comprises: when described the second terminal refusal connects, the user is pointed out, and when receiving described user and carry out the order of authentication of described individual recognition code mode, authentication to described the second terminal request individual recognition code mode, and after finishing with authentication, connect described the second terminal.In this technical scheme, when carrying out the authentication of PIN mode, the user is pointed out, and the password of user's input, finish the PIN authentication, in time to finish connection.
In technique scheme, also comprise: after connecting described the second terminal, if described the second terminal request with the identification information recording of described first terminal in the trust group, according to described user's instruction, agree or refuse the request of described the second terminal.In this technical scheme, can be smoothly by PBC authentication and connection, so the user of first terminal can select to agree the request of the second terminal record identification information in next time for having guaranteed first terminal.
In technique scheme, described step 202 comprises: generate probe request message, comprise the identification information of described first terminal in the described probe request message, and described probe request message is sent to described the second terminal; Described step 204 comprises: the probe response message that receives described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
Fig. 3 is the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, the present invention also provides a kind of terminal 300, comprising: information receiving module 302, the identification information of the described first terminal that the reception first terminal sends; Signal judgement module 304 is judged the identification information that whether comprises described first terminal in the default trust group, wherein, in the described trust group with record by one or more identification informations; Link block 306 when comprising the identification information of described terminal in described trust group, is agreed to be connected with described first terminal.In this technical scheme, recorded all in the trust group and allowed the identification information of the terminal of connection, when the first terminal request connects, need not input password, get final product but directly send identification information, can judge whether to connect first terminal according to the trust group, quick and fail safe is good.
In technique scheme, also comprise: authentication module 308, when described link block 306 agreements are connected with described first terminal, described authentication module 308 is carried out the authentication of a key cipher mode to described first terminal request, described link block 306 is connected with described first terminal after authentication is finished.In this technical scheme, when allowing first terminal to connect, be the fail safe that guarantees to connect, can carry out the authentication of PBC mode.
In technique scheme, when described link block 306 did not comprise the identification information of described first terminal in described trust group, refusal was connected with described first terminal.In this technical scheme, when the identification information of described first terminal is not in the trust group, illustrate that connecting first terminal exists risk, can refuse to connect.
In technique scheme, when described link block 306 refusals connect described first terminal, if the authentication of individual recognition code mode is carried out in described first terminal request, described authentication module 308 is carried out the authentication of described individual recognition code mode with described first terminal, and connects described first terminal after authentication is finished.In this technical scheme, after refusal connects, if initiating the PIN authentication of traditional approach, first terminal connects, then allow to carry out authentication and connection, connection can be in time finished at assurance first terminal family, and need to carry out Password Input this moment.
In technique scheme, also comprise: logging modle 310, after described link block 306 connects described first terminal, described logging modle 310 to described first terminal request with the identification information recording of described first terminal in described trust group, when described first terminal accepts request, with the identification information recording of described first terminal in described trust group.In technical scheme, for guaranteed first terminal next time can be smoothly by the PBC authentication and connect, so can solicit the user's of first terminal suggestion, with the identification information recording of first terminal in the trust group.
In technique scheme, described information receiving module 302 receives the probe request message of described first terminal, and obtains the identification information of described first terminal from described probe request message; When described link block 304 comprises the identification information of described first terminal in described trust group, send probe response message, comprise the information that agreement is connected with described first terminal in the described probe response message, wherein, the identification information of described first terminal comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
Fig. 4 is the flow chart of data communications method according to an embodiment of the invention.
As shown in Figure 4, the present invention also provides a kind of data communications method, comprising: step 402, the identification information of the described first terminal that the reception first terminal sends; Step 404 is judged the identification information that whether comprises described first terminal in the default trust group, wherein, in the described trust group with record by one or more identification informations; Step 406 when comprising the identification information of described first terminal in described trust group, is agreed to be connected with described terminal.In this technical scheme, recorded all in the trust group and allowed the identification information of the terminal of connection, when the first terminal request connects, need not input password, get final product but directly send identification information, can judge whether to connect first terminal according to the trust group, quick and fail safe is good.
In technique scheme, also comprise: when agreement is connected with described first terminal, carries out the authentication of a key cipher mode to described first terminal request, and after authentication is finished, be connected with described first terminal.In this technical scheme, when allowing first terminal to connect, be the fail safe that guarantees to connect, can carry out the authentication of PBC mode.
In technique scheme, described step 406 also comprises: when not comprising the identification information of described first terminal in described trust group, refusal is connected with described first terminal.In this technical scheme, when the identification information of described first terminal is not in the trust group, illustrate that connecting first terminal exists risk, can refuse to connect.
In technique scheme, also comprise: when refusal connects described first terminal, if the authentication of individual recognition code mode is carried out in described first terminal request, then carry out the authentication of described individual recognition code mode with described first terminal, and after authentication is finished, connect described first terminal.In this technical scheme, after refusal connects, if initiating the PIN authentication of traditional approach, first terminal connects, then allow to carry out authentication and connection, connection can be in time finished at assurance first terminal family, and need to carry out Password Input this moment.
In technique scheme, also comprise: after connecting described first terminal, to described first terminal request with the identification information recording of described first terminal in described trust group, when described first terminal accepts request, with the identification information recording of described first terminal in described trust group.In technical scheme, for guaranteed first terminal next time can be smoothly by the PBC authentication and connect, so can solicit the user's of first terminal suggestion, with the identification information recording of first terminal in the trust group.
In technique scheme, described step 402 comprises: receive the probe request message of described first terminal, and obtain the identification information of described terminal from described probe request message; Described step 404 comprises: when comprising the identification information of described first terminal in described trust group, send probe response message, comprise the information that agreement is connected with described first terminal in the described probe response message, wherein, the identification information of described first terminal comprises the number of described first terminal.In this technical scheme, the identification information of phone number for example, can directly add probe request(probe request message to) time, and whether agree the notice that connects, can add among the probe response, in this way, can realize the information transmission of first terminal and the second terminal room, it will be appreciated by those skilled in the art that to also have more mode can finish the information transmission, more data can be used as identification information.
Fig. 5 is the flow chart of data communications method according to an embodiment of the invention.
In one embodiment of the invention, it mainly is the Wifi chip connection request probe package of increase when connecting Soft AP by portable terminal, comprise loCal number in the package, after Soft AP receives this Request Packet, judge that this number is whether in the contact person the inside of trust group, if then automatically initiating the WPS authentication, the user only needs a key can solve connectivity problem, and concrete steps as shown in Figure 5.
Whole process user only need click the ssid connection of Soft AP and just finish, and operating procedure is very simple, because the Soft AP that connects also encrypts, has guaranteed user's information security.
By above technical scheme, can realize terminal and data communications method, utilize the contact person to create a trust group that can connect mobile phone Soft AP, utilize the phone number in the package automatically to initiate the WPS authentication when terminal wifi mobile phone connects Soft AP in the group, whole connection procedure user does not need to see password, the connection procedure user only need select ssid corresponding to Soft AP to click can finish connection procedure, and other steps all are automatically to finish.Simplify user's operating procedure, improve the user and experience.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a terminal is characterized in that, comprising:
Information sending module is sent to the second terminal with the identification information of described terminal, by the identification information that whether comprises described terminal in the default trust group of described the second terminal judges, and is connected with described terminal in judged result agreement when being;
Link block, when described the second terminal agreement was connected with described terminal, described link block was connected with described the second terminal.
2. terminal according to claim 1 is characterized in that, also comprises:
Authentication module, agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described terminal request, described authentication module and described the second terminal are carried out the authentication of a described key cipher mode, and described link block is connected with described the second terminal after authentication is complete.
3. terminal according to claim 2 is characterized in that, also comprises:
Reminding module, when described the second terminal refusal connects, described reminding module is pointed out the user, described authentication module is when receiving described user and carry out the order of authentication of described individual recognition code mode, authentication to described the second terminal request individual recognition code mode, described link block connects described the second terminal after finishing with authentication.
4. terminal according to claim 3 is characterized in that, also comprises:
The record controls module, after described link block connects described the second terminal, if in the trust group, the request of described the second terminal is agreed or refused to described record controls module according to described user's instruction to described the second terminal request with the identification information recording of described terminal.
5. each described terminal in 4 according to claim 1, it is characterized in that, described information sending module generates probe request message, comprises the identification information of described terminal in the described probe request message, and described probe request message is sent to described the second terminal;
Described link block receives the probe response message of described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described terminal.
6. a data communications method is characterized in that, comprising:
Step 202 is sent to the second terminal with the identification information of first terminal, by the identification information that whether comprises described first terminal in the default trust group of described the second terminal judges, and is connected with described first terminal in judged result agreement when being;
Step 204 when described the second terminal agreement is connected with described first terminal, is connected with described the second terminal.
7. data communications method according to claim 6 is characterized in that, described step 204 comprises:
Agree to connect in described the second terminal, and when carrying out the authentication of a key cipher mode to described first terminal request, carry out the authentication of a described key cipher mode with described the second terminal, and after authentication is complete, be connected with described the second terminal.
8. data communications method according to claim 7 is characterized in that, described step 204 comprises:
When described the second terminal refusal connects, the user is pointed out, and when receiving described user and carry out the order of authentication of described individual recognition code mode, to the authentication of described the second terminal request individual recognition code mode, and after finishing with authentication, connect described the second terminal.
9. data communications method according to claim 8 is characterized in that, also comprises:
After connecting described the second terminal, if described the second terminal request with the identification information recording of described first terminal in the trust group, according to described user's instruction, agree or refuse the request of described the second terminal.
10. each described data communications method in 9 according to claim 6, it is characterized in that, described step 202 comprises: generate probe request message, comprise the identification information of described first terminal in the described probe request message, and described probe request message is sent to described the second terminal;
Described step 204 comprises: the probe response message that receives described the second terminal, when in described probe response message, comprising the information that described the second terminal is agreed with described terminal is connected, then be connected with described the second terminal, wherein, described identification information comprises the number of described first terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103494644A CN102869014A (en) | 2012-09-18 | 2012-09-18 | Terminal and data communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012103494644A CN102869014A (en) | 2012-09-18 | 2012-09-18 | Terminal and data communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102869014A true CN102869014A (en) | 2013-01-09 |
Family
ID=47447548
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012103494644A Pending CN102869014A (en) | 2012-09-18 | 2012-09-18 | Terminal and data communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102869014A (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475667A (en) * | 2013-09-24 | 2013-12-25 | 小米科技有限责任公司 | Method, device and system for controlling access router |
CN103476092A (en) * | 2013-09-13 | 2013-12-25 | 惠州Tcl移动通信有限公司 | Mobile terminal based WIFI hotspot access method and system |
CN103765855A (en) * | 2013-09-13 | 2014-04-30 | 华为终端有限公司 | Processing method of wireless network equipment, wireless network equipment and processor |
CN104023416A (en) * | 2013-02-28 | 2014-09-03 | 腾讯科技(深圳)有限公司 | Method and system for transmitting file, sending terminal and receiving terminal |
CN104159227A (en) * | 2014-08-15 | 2014-11-19 | 广东欧珀移动通信有限公司 | Wireless network connection control method and device |
CN104244234A (en) * | 2013-12-02 | 2014-12-24 | 北京东方泰华科技发展有限公司 | Method and device for connecting wireless device with intelligent terminal rapidly |
CN104380776A (en) * | 2014-05-31 | 2015-02-25 | 华为技术有限公司 | Network connection method, hotspot terminal and management terminal |
CN104427497A (en) * | 2013-08-20 | 2015-03-18 | 上海晨兴希姆通电子科技有限公司 | Handset verification method, handset and handset verification system |
CN104618988A (en) * | 2015-01-21 | 2015-05-13 | 青岛海尔智能家电科技有限公司 | Smart device network access method and device |
CN104767768A (en) * | 2014-01-02 | 2015-07-08 | 海尔集团公司 | Methods for sending and receiving network access configuration information of household appliances, and household appliances |
CN104850513A (en) * | 2015-06-04 | 2015-08-19 | 武汉星光河文化影视传媒有限公司 | Method and system for tablet computer controlling mobile terminal |
CN104853353A (en) * | 2015-05-13 | 2015-08-19 | 广东欧珀移动通信有限公司 | Access authenticating method and apparatus of wireless access point |
CN105050085A (en) * | 2015-07-06 | 2015-11-11 | 广东欧珀移动通信有限公司 | WiFi connecting method and device |
CN105207980A (en) * | 2014-06-26 | 2015-12-30 | 联想(北京)有限公司 | Information processing method and electronic equipment |
WO2016029668A1 (en) * | 2014-08-27 | 2016-03-03 | 中兴通讯股份有限公司 | Secure connection method, device and system, and computer storage medium |
CN105450610A (en) * | 2014-08-29 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Method and system for quickly establishing trusted connection between terminals |
CN105554845A (en) * | 2015-07-31 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Access method, router, and terminal |
CN105743844A (en) * | 2014-12-08 | 2016-07-06 | 联想(北京)有限公司 | Information processing method and electronic device |
WO2017063517A1 (en) * | 2015-10-12 | 2017-04-20 | 阿里巴巴集团控股有限公司 | Near field communication establishing method and device |
US9686819B2 (en) | 2013-09-24 | 2017-06-20 | Xiaomi Inc. | Methods, devices and systems for router access control |
CN107205257A (en) * | 2017-06-19 | 2017-09-26 | 深圳天珑无线科技有限公司 | A kind of focus cut-in method and system |
WO2017181919A1 (en) * | 2016-04-18 | 2017-10-26 | 肖华薇 | Method of connecting to wireless local area network, device, and system |
US9843567B2 (en) | 2013-08-30 | 2017-12-12 | Beijing Zhigu Rui Tuo Tech Co., Ltd. | Wireless network service provision method and system |
CN111669840A (en) * | 2019-03-05 | 2020-09-15 | 珠海奔图电子有限公司 | Network connection configuration method, network connection configuration device and image forming apparatus |
CN115119001A (en) * | 2021-03-17 | 2022-09-27 | 阿里巴巴新加坡控股有限公司 | Live broadcast control method, device, electronic equipment, medium and program product |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101043755A (en) * | 2007-04-16 | 2007-09-26 | 华为技术有限公司 | Method, system and apparatus for admittance determination in mobile communication system |
CN101401405A (en) * | 2006-03-21 | 2009-04-01 | 索尼爱立信移动通讯有限公司 | Method and system for maintaining anonymity of a mobile radio terminal |
CN201733450U (en) * | 2010-06-30 | 2011-02-02 | 华为终端有限公司 | Wireless access device |
CN102148769A (en) * | 2010-02-08 | 2011-08-10 | 汪岚岚 | Method for realizing internet instant messaging (IM) and network community service by taking phone number as service identification |
CN102209324A (en) * | 2011-05-23 | 2011-10-05 | 中兴通讯股份有限公司 | Mobile terminal and method for accessing mobile terminal into wireless local area network (WLAN) hotspot |
CN102572836A (en) * | 2010-12-20 | 2012-07-11 | 联想(北京)有限公司 | Method for accessing wireless network, portable mobile terminal and wireless network system |
CN102594987A (en) * | 2012-02-09 | 2012-07-18 | 深圳市中兴移动通信有限公司 | Method for realizing safe and quick Bluetooth pairing connection |
CN102651784A (en) * | 2011-02-28 | 2012-08-29 | 深圳富泰宏精密工业有限公司 | Contact person authentication system and method |
CN102664994A (en) * | 2012-04-12 | 2012-09-12 | 上海斐讯数据通信技术有限公司 | Method and system for friend relation authentication through contacts on mobile terminals |
-
2012
- 2012-09-18 CN CN2012103494644A patent/CN102869014A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101401405A (en) * | 2006-03-21 | 2009-04-01 | 索尼爱立信移动通讯有限公司 | Method and system for maintaining anonymity of a mobile radio terminal |
CN101043755A (en) * | 2007-04-16 | 2007-09-26 | 华为技术有限公司 | Method, system and apparatus for admittance determination in mobile communication system |
CN102148769A (en) * | 2010-02-08 | 2011-08-10 | 汪岚岚 | Method for realizing internet instant messaging (IM) and network community service by taking phone number as service identification |
CN201733450U (en) * | 2010-06-30 | 2011-02-02 | 华为终端有限公司 | Wireless access device |
CN102572836A (en) * | 2010-12-20 | 2012-07-11 | 联想(北京)有限公司 | Method for accessing wireless network, portable mobile terminal and wireless network system |
CN102651784A (en) * | 2011-02-28 | 2012-08-29 | 深圳富泰宏精密工业有限公司 | Contact person authentication system and method |
CN102209324A (en) * | 2011-05-23 | 2011-10-05 | 中兴通讯股份有限公司 | Mobile terminal and method for accessing mobile terminal into wireless local area network (WLAN) hotspot |
CN102594987A (en) * | 2012-02-09 | 2012-07-18 | 深圳市中兴移动通信有限公司 | Method for realizing safe and quick Bluetooth pairing connection |
CN102664994A (en) * | 2012-04-12 | 2012-09-12 | 上海斐讯数据通信技术有限公司 | Method and system for friend relation authentication through contacts on mobile terminals |
Cited By (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023416A (en) * | 2013-02-28 | 2014-09-03 | 腾讯科技(深圳)有限公司 | Method and system for transmitting file, sending terminal and receiving terminal |
CN104023416B (en) * | 2013-02-28 | 2019-01-11 | 腾讯科技(深圳)有限公司 | A kind of transmission method of file, system send terminal and receive terminal |
CN104427497A (en) * | 2013-08-20 | 2015-03-18 | 上海晨兴希姆通电子科技有限公司 | Handset verification method, handset and handset verification system |
US9843567B2 (en) | 2013-08-30 | 2017-12-12 | Beijing Zhigu Rui Tuo Tech Co., Ltd. | Wireless network service provision method and system |
WO2015035620A1 (en) * | 2013-09-13 | 2015-03-19 | 华为终端有限公司 | Processing method of wireless network equipment, wireless network equipment and processor thereof |
CN103476092A (en) * | 2013-09-13 | 2013-12-25 | 惠州Tcl移动通信有限公司 | Mobile terminal based WIFI hotspot access method and system |
CN103765855A (en) * | 2013-09-13 | 2014-04-30 | 华为终端有限公司 | Processing method of wireless network equipment, wireless network equipment and processor |
US9503896B2 (en) | 2013-09-13 | 2016-11-22 | Huawei Device Co., Ltd. | Processing method of wireless network device, wireless network device, and processor of wireless network device |
WO2015043198A1 (en) * | 2013-09-24 | 2015-04-02 | 小米科技有限责任公司 | Method, device and system for controlling access to router |
CN103475667A (en) * | 2013-09-24 | 2013-12-25 | 小米科技有限责任公司 | Method, device and system for controlling access router |
US9686819B2 (en) | 2013-09-24 | 2017-06-20 | Xiaomi Inc. | Methods, devices and systems for router access control |
CN104244234A (en) * | 2013-12-02 | 2014-12-24 | 北京东方泰华科技发展有限公司 | Method and device for connecting wireless device with intelligent terminal rapidly |
CN104767768A (en) * | 2014-01-02 | 2015-07-08 | 海尔集团公司 | Methods for sending and receiving network access configuration information of household appliances, and household appliances |
CN104380776A (en) * | 2014-05-31 | 2015-02-25 | 华为技术有限公司 | Network connection method, hotspot terminal and management terminal |
US11310239B2 (en) | 2014-05-31 | 2022-04-19 | Huawei Technologies Co., Ltd. | Network connection method, hotspot terminal and management terminal |
US10616232B2 (en) | 2014-05-31 | 2020-04-07 | Huawei Technologies Co., Ltd. | Network connection method, hotspot terminal and management terminal |
CN104380776B (en) * | 2014-05-31 | 2019-03-26 | 华为技术有限公司 | A kind of method for connecting network, hot terminal and management terminal |
WO2015180192A1 (en) * | 2014-05-31 | 2015-12-03 | 华为技术有限公司 | Network connection method, hotspot terminal, and management terminal |
CN105207980A (en) * | 2014-06-26 | 2015-12-30 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104159227A (en) * | 2014-08-15 | 2014-11-19 | 广东欧珀移动通信有限公司 | Wireless network connection control method and device |
CN104159227B (en) * | 2014-08-15 | 2018-07-03 | 广东欧珀移动通信有限公司 | wireless network connection control method and device |
WO2016029668A1 (en) * | 2014-08-27 | 2016-03-03 | 中兴通讯股份有限公司 | Secure connection method, device and system, and computer storage medium |
CN105472606A (en) * | 2014-08-27 | 2016-04-06 | 中兴通讯股份有限公司 | Safety connection method, device and system |
CN105450610A (en) * | 2014-08-29 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Method and system for quickly establishing trusted connection between terminals |
CN105450610B (en) * | 2014-08-29 | 2019-02-22 | 阿里巴巴集团控股有限公司 | The method and its system of connection trusty are quickly established between terminal |
CN105743844A (en) * | 2014-12-08 | 2016-07-06 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104618988A (en) * | 2015-01-21 | 2015-05-13 | 青岛海尔智能家电科技有限公司 | Smart device network access method and device |
CN104618988B (en) * | 2015-01-21 | 2018-11-23 | 青岛海尔智能家电科技有限公司 | Smart machine method for network access and device |
CN104853353A (en) * | 2015-05-13 | 2015-08-19 | 广东欧珀移动通信有限公司 | Access authenticating method and apparatus of wireless access point |
CN104850513A (en) * | 2015-06-04 | 2015-08-19 | 武汉星光河文化影视传媒有限公司 | Method and system for tablet computer controlling mobile terminal |
CN105050085A (en) * | 2015-07-06 | 2015-11-11 | 广东欧珀移动通信有限公司 | WiFi connecting method and device |
CN105554845A (en) * | 2015-07-31 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Access method, router, and terminal |
WO2017063517A1 (en) * | 2015-10-12 | 2017-04-20 | 阿里巴巴集团控股有限公司 | Near field communication establishing method and device |
WO2017181919A1 (en) * | 2016-04-18 | 2017-10-26 | 肖华薇 | Method of connecting to wireless local area network, device, and system |
CN107205257B (en) * | 2017-06-19 | 2021-02-19 | 深圳天珑无线科技有限公司 | Hotspot access method and system |
CN107205257A (en) * | 2017-06-19 | 2017-09-26 | 深圳天珑无线科技有限公司 | A kind of focus cut-in method and system |
CN111669840A (en) * | 2019-03-05 | 2020-09-15 | 珠海奔图电子有限公司 | Network connection configuration method, network connection configuration device and image forming apparatus |
US11687298B2 (en) | 2019-03-05 | 2023-06-27 | Zhuhai Pantum Electronics Co., Ltd. | Network connection configuration method, network connection configuration apparatus, image forming apparatus,and storage medium |
CN115119001A (en) * | 2021-03-17 | 2022-09-27 | 阿里巴巴新加坡控股有限公司 | Live broadcast control method, device, electronic equipment, medium and program product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102869014A (en) | Terminal and data communication method | |
US10516540B2 (en) | Management of profiles in an embedded universal integrated circuit card (eUICC) | |
CN101366299B (en) | Bootstrapping authentication using distinguished random challenges | |
EP2740315B1 (en) | Method, apparatus, and computer program product for connection setup in device-to-device communication | |
EP2671398B1 (en) | Subscriber identity module provisioning | |
JP6668407B2 (en) | Terminal authentication method and apparatus used in mobile communication system | |
EP1589703B1 (en) | System and method for accessing a wireless network | |
US10769615B2 (en) | Device and method in wireless communication system and wireless communication system | |
CN107667554A (en) | Decentralized configuration device entity | |
US20030120920A1 (en) | Remote device authentication | |
CN107439027A (en) | The apparatus and method installed and interoperated for electronic user identity module (ESIM) | |
WO2013127124A1 (en) | Method, system and terminal for implementing wi-fi connection through nfc | |
CN109922474B (en) | Method for triggering network authentication and related equipment | |
CN100388664C (en) | Access method for realizing WLAN multi mode safety identification | |
EP3041189A1 (en) | Communication control apparatus, authentication device, central control apparatus and communication systems | |
EP2873266B1 (en) | Method of accessing a wlan access point | |
CN104660567B (en) | D2D terminal access authentications method, D2D terminals and server | |
US20120059945A1 (en) | Data-Transfer Method and Terminal | |
CN103841551A (en) | Subscriber identity systems, servers, methods for controlling a subscriber identity system, and methods for controlling a server | |
CN101945371A (en) | Communication equipment and control method thereof | |
CN111031545A (en) | Wireless network access control method and device, relay equipment and electronic equipment | |
CN112235794A (en) | WAPI module with encryption chip and transmission method | |
EP2453608B1 (en) | Method and devices for accessing a wireless local area network | |
CN101877852A (en) | User access control method and system | |
CN107454557B (en) | Router connection method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130109 |