CN107896371A - A kind of data traffic sharing method, mobile device and storage device - Google Patents

A kind of data traffic sharing method, mobile device and storage device Download PDF

Info

Publication number
CN107896371A
CN107896371A CN201711102960.9A CN201711102960A CN107896371A CN 107896371 A CN107896371 A CN 107896371A CN 201711102960 A CN201711102960 A CN 201711102960A CN 107896371 A CN107896371 A CN 107896371A
Authority
CN
China
Prior art keywords
mobile device
data traffic
trusted devices
devices list
detected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711102960.9A
Other languages
Chinese (zh)
Inventor
何小明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Mobile Technology Co Ltd
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Mobile Technology Co Ltd
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Mobile Technology Co Ltd, Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Mobile Technology Co Ltd
Priority to CN201711102960.9A priority Critical patent/CN107896371A/en
Publication of CN107896371A publication Critical patent/CN107896371A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to technical field of mobile terminals, discloses a kind of data traffic sharing method, mobile device and storage device.This method includes:First mobile device detects the second mobile device in a preset range;First mobile device judges whether its trusted devices list includes the second mobile device detected;If trusted devices list includes the second mobile device, the first mobile device and the second mobile device, which are established, to be communicated to connect, to realize that carrying out data traffic to the second mobile device shares.By the above-mentioned means, the present invention can improve the security of mobile device data flow shared procedure.

Description

A kind of data traffic sharing method, mobile device and storage device
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of data traffic sharing method, mobile device with And storage device.
Background technology
Mobile terminal makes mobile communication terminal refer to the computer equipment that can be used on the move, and broad sense says bag Include mobile phone, notebook, tablet personal computer, POS or even include vehicle-mounted computer.But refer to mobile phone in most cases or have The smart mobile phone and tablet personal computer of a variety of application functions.As network and technology are towards the hair in more and more broadband direction Exhibition, Mobile Communication Industry will move towards the real mobile message epoch.On the other hand, with the rapid development of integrated circuit technique, The disposal ability of mobile terminal has had powerful disposal ability, and mobile terminal is changed into one from simple call instrument Individual integrated information processing platform.This also adds broader development space to mobile terminal.
The present inventor has found in long-term R&D process, different with the continuous development of mobile terminal technology Progress data traffic is shared between mobile terminal also increasingly popularizes, and different mobile terminal is equipped with different communication cards, different Communication card is that data traffic is shared in carrier progress LAN by mobile terminal, but at present, the data flow between mobile terminal There is risk in amount shared procedure, data traffic shared procedure is easily cracked by third party software malice, influences normal data flow Shared procedure is measured, the user experience of mobile terminal is had undesirable effect.
The content of the invention
In view of this, the present invention solves the technical problem of provide a kind of data traffic sharing method, mobile device And storage device, it is possible to increase the security of mobile device data flow shared procedure.
In order to solve the above technical problems, one aspect of the present invention is:There is provided a kind of data traffic shared side Method, this method include:
First mobile device detects the second mobile device in a preset range;First mobile device judges its trusted devices Whether list includes the second mobile device detected;If trusted devices list includes the second mobile device, the first movement is set Standby established with the second mobile device communicates to connect, to realize that carrying out data traffic to the second mobile device shares.
In order to solve the above technical problems, another technical scheme that the present invention uses is:A kind of mobile device is provided, the shifting Dynamic equipment includes processor and communication chip, and processor couples with communication chip, and processor can realize following action:
Control communication chip detects the second mobile device in a preset range;Judge whether trusted devices list includes inspection The second mobile device measured;If trusted devices list includes the second mobile device, control communication chip is set with the second movement It is standby to establish communication connection, to realize that carrying out data traffic to the second mobile device shares.
In order to solve the above technical problems, another technical scheme that the present invention uses is:A kind of storage device is provided, this is deposited Storage device is had program stored therein data, and routine data can be performed to realize the shared side of data traffic that above-described embodiment is illustrated Method, this method include:
First mobile device detects the second mobile device in a preset range;First mobile device judges its trusted devices Whether list includes the second mobile device detected;If trusted devices list includes the second mobile device, the first movement is set Standby established with the second mobile device communicates to connect, to realize that carrying out data traffic to the second mobile device shares.
The beneficial effects of the invention are as follows:Whether the second mobile device of the invention detected by the judgement of the first mobile device It is included in the trusted devices list of the first mobile device, to judge whether the second mobile device detected is that the first movement is set It is standby to carry out the shared equipment of data traffic, security is carried out to the second mobile device detected by the first mobile device and sentenced It is disconnected, if trusted devices list includes the second mobile device, illustrate that the second mobile device detected by the first mobile device is The equipment that secure and trusted is appointed, then establish and communicate to connect with detected the second mobile device, with realize the first mobile device to Second mobile device carries out data traffic and shared, so as to improve the security of mobile device data flow shared procedure.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of data traffic sharing method first embodiment of the present invention;
Fig. 2 is the schematic flow sheet of data traffic sharing method second embodiment of the present invention;
Fig. 3 is the structural representation that the present invention confirms the embodiment of interface one;
Fig. 4 is the schematic flow sheet of data traffic sharing method 3rd embodiment of the present invention;
Fig. 5 is the structural representation of the embodiment of mobile device one of the present invention;
Fig. 6 is the shared structural representation for setting the embodiment of interface one of the present invention;
Fig. 7 is the schematic flow sheet of data traffic sharing method fourth embodiment of the present invention;
Fig. 8 is the structural representation of the embodiment of data traffic shared system one of the present invention;
Fig. 9 is the structural representation of another embodiment of mobile device of the present invention;
Figure 10 is the structural representation of the embodiment of inventive memory device one.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of data traffic sharing method first embodiment of the present invention.
S101:First mobile device detects the second mobile device in a preset range;
In the present embodiment, the first mobile device can be centered on it, the detection progress data flow in a preset range The second shared mobile device of amount, the first mobile device are needed to receive the information for representing the second mobile device, and the first movement is set It is standby then can determine whether there is the presence of the second mobile device in preset range, if the first mobile device, which receives, represents the second movement The information of equipment, then judge to there are the second mobile device in preset range, by entering the second detected mobile device Row security judges that carrying out data traffic with the second mobile device afterwards shares.
Alternatively, preset range can be using the first mobile device as the center of circle, the circular scope of certain radius length, radius Length can be 5 meters, 10 meters, 15 meters etc., and preset range size is that the energy of the second mobile device is detected according to the first mobile device Power and the second mobile device send represent its identity characteristic information data-signal it is strong and weak determined, the first mobile device detects The ability of second mobile device is stronger, that is, receives the ability for representing the second mobile device information, then its movement of detection second The preset range of equipment is then bigger, and certainly, the form of preset range is including but not limited to described above, and preset range can also be Polygonal region centered on one first mobile device, or elliptical region, or be irregular area, all in accordance with The detection range of one mobile device is related to region and determined, does not limit herein.
S102:First mobile device judges whether its trusted devices list includes the second mobile device detected;
In the present embodiment, the first mobile device has detected the presence of the second mobile device within a preset range, then and first Mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device, with to detected Second mobile device carries out security aspect and judged, the second movement included by the trusted devices list of the first mobile device is set It is standby entered security for the first mobile device in terms of judge after, confirm the second mobile device by safety means and the institute that will confirm Have in the trusted devices list that the second mobile device creates added to the first mobile device, therefore the first mobile device only needs to judge Whether the second mobile device detected by it is included in its trusted devices list, you can its detected second movement is set Standby security is confirmed.
S103:If trusted devices list includes the second mobile device, the first mobile device and the second mobile device are established Communication connection, to realize that carrying out data traffic to the second mobile device shares;
In the present embodiment, if the second movement that the trusted devices list of the first mobile device includes detected by it is set Standby, then the first mobile device judges the equipment that the second mobile device detected by it is appointed for secure and trusted, by being detected After the security of the second mobile device arrived judges, establish and communicate to connect with the second mobile device, the first mobile device by with The communication connection established between second mobile device, the data traffic of the first mobile device is entered into line number to the second mobile device According to flow sharing operation, the second mobile device can use the data traffic of the first mobile device, to alleviate the second mobile device Situations such as data traffic scarcity.
It should be noted that the data traffic sharing method that the present embodiment is illustrated, includes but is not limited to apply in data The shared technical field of flow, the data sharing between equipment, such as multimedia file, business office file and application program Share, can by between the mobile device of the present embodiment first and the second mobile device by the second mobile device whether It is included in after carrying out security judgement in the trusted devices list of the first mobile device, the two establishes communication connection to carry out equipment Between data sharing, can be by the applicable object for the data traffic sharing method that the present embodiment illustrates, to ensure that first moves The dynamic security that data sharing process is carried out between equipment and the second mobile device, is not limited herein.
Above as can be seen that whether the second mobile device that the present invention judges to detect by the first mobile device is included in In the trusted devices list of first mobile device, to judge whether the second mobile device for detecting is that the first mobile device can be with The shared equipment of data traffic is carried out, security judgement is carried out to the second mobile device detected by the first mobile device, if Trusted devices list includes the second mobile device, then illustrates that the second mobile device detected by the first mobile device can for safety The equipment of trust, then establish and communicate to connect with the second detected mobile device, to realize that the first mobile device moves to second Dynamic equipment carries out data traffic and shared, so as to improve the security of the first mobile device data flow shared procedure.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of the second mobile device of data traffic sharing method embodiment of the present invention.
S201:Add the trusted device in trusted devices list;
In the present embodiment, whether the first mobile device is by judging the second mobile device detected by it in its trust In equipment list, analysis judgement is carried out with the security to the second mobile device detected by it, if the first mobile device institute The second mobile device detected is included in its trusted devices list, then it is safe trusted to illustrate second mobile device Equipment, therefore the first mobile device will carry out data traffic with it and share, and in the trusted devices list of the first mobile device not Including the second mobile device be added to trusted devices list in, with create add trusted devices list in trusted device, First mobile device is by judging whether the second mobile device is trusted device in trusted devices list, to be detected to it To the security of the second mobile device carry out analysis judgement.
S202:First mobile device detects the second mobile device in a preset range;
In the present embodiment, the first mobile device can be centered on it, the detection progress data flow in a preset range The second shared mobile device of amount, the first mobile device are needed to receive the information for representing the second mobile device, and the first movement is set It is standby then can determine whether there is the presence of the second mobile device in preset range, if the first mobile device, which receives, represents the second movement The information of equipment, then judge to there are the second mobile device in preset range, by entering the second detected mobile device Row security judges that carrying out data traffic with the second mobile device afterwards shares.
Alternatively, preset range can be using the first mobile device as the center of circle, the circular scope of certain radius length, radius Length can be 5 meters, 10 meters, 15 meters etc., and preset range size is that the energy of the second mobile device is detected according to the first mobile device Power and the second mobile device send represent its identity characteristic information data-signal it is strong and weak determined, the first mobile device detects The ability of second mobile device is stronger, that is, receives the ability for representing the second mobile device information, then its movement of detection second The preset range of equipment is then bigger, and certainly, the form of preset range is including but not limited to described above, and preset range can also be Polygonal region centered on one first mobile device, or elliptical region, or be irregular area, all in accordance with The detection range of one mobile device is related to region and determined, does not limit herein.
S203:First mobile device judges whether its trusted devices list includes the second mobile device detected;
In the present embodiment, if trusted devices list includes the second mobile device detected, step S204 is performed, if Trusted devices list does not include the second mobile device detected, then continues executing with step S202.
In the present embodiment, the first mobile device has detected the presence of the second mobile device within a preset range, then and first Mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device, with to detected Second mobile device carries out security aspect and judged, the second movement included by the trusted devices list of the first mobile device is set It is standby entered security for the first mobile device in terms of judge after, confirm the second mobile device by safety means and the institute that will confirm Have in the trusted devices list that the second mobile device creates added to the first mobile device, therefore the first mobile device only needs to judge Whether the second mobile device detected by it is included in its trusted devices list, you can its detected second movement is set Standby security is confirmed.
Alternatively, the second mobile device represents the MAC Address that its unique identities characteristic information can be the second mobile device, The MAC Address of first mobile device is respectively provided with uniqueness, therefore can be as the diacritics of the second mobile device, the first movement The MAC Address of included as the second mobile device in the trusted devices list of equipment, the first mobile device is by judging it Whether the MAC Address of the second detected mobile device is the first mobile device MAC included in its trusted devices list Address, if trusted devices list includes the MAC Address of the second mobile device detected by the first mobile device, judge second Mobile device is included in the trusted devices list of the first mobile device, and certainly, the present embodiment illustrates each first movement of difference The method of equipment is including but not limited to described above, represents the information of the first mobile equipment identity characteristic information uniqueness and can make The foundation of each first mobile device is distinguished for the present embodiment, is not limited herein.
S204:If trusted devices list includes the second mobile device, a confirmation interface is generated on the second mobile device;
In the present embodiment, the trusted devices list of the first mobile device includes detected by the first mobile device Two mobile devices, then generation one confirms interface 301 on the second mobile device, with to the first mobile device to the second mobile device The shared operation of data traffic is carried out to be confirmed.Second mobile device may within the detection range of the first mobile device, But the second mobile device does not need the first mobile device to carry out data traffic to it to share, it is understood that there may be the first mobile device mistake Judge that the behavior of the second mobile device is intended to, data traffic is carried out to it and shared, therefore the present embodiment in the second movement by setting Standby upper generation confirms interface 301, is intended to confirm with the behavior to the second mobile device, judges whether the second mobile device needs Data traffic is carried out to it to share, as shown in Figure 3.
S205:The input validation information in interface is confirmed, the first mobile device and the second mobile device, which are established, to be communicated to connect, To realize that carrying out data traffic to the second mobile device shares;
In the present embodiment, the input validation information 302 in the confirmation interface 301 of the second mobile device, to be moved to second The behavior of dynamic equipment is intended to be confirmed, judges whether the second mobile device needs to carry out data traffic to it to share.Confirmation letter Breath 302 can choose whether that receiving carries out data traffic to it and shared, or one section of word for representing confirmation 302 of input Symbol string etc., it is intended to confirm with the behavior to the second mobile device, certainly, the input form of confirmation 302 is included but not It is limited to described above, behavior that can be to the second mobile device is intended to confirm, judges whether the second mobile device is needed to it It can be that the confirmation 302 illustrated described in the present embodiment inputs to carry out the shared input form of confirmation 302 of data traffic Form, do not limit herein.
If the trusted devices list of the first mobile device includes the second mobile device detected by it, the first movement is set The equipment that standby the second mobile device judged detected by it is appointed for secure and trusted, by the second detected mobile device Security judge after, input validation information 302 in the confirmation interface 301 of the second mobile device, confirm the second mobile device connect Shared by data traffic is carried out to it, then establish and communicate to connect with the second mobile device, the first mobile device with second by moving The communication connection established between dynamic equipment, the data traffic of the first mobile device is subjected to data traffic to the second mobile device Sharing operation, the second mobile device can use the data traffic of the first mobile device, to alleviate the second mobile device data stream Measure situations such as deficient.
Alternatively, the first mobile device the second mobile device is detected in a preset range can be by the first mobile device Bluetooth Communication Technology or WLAN (WLAN) communication technology etc., detect the second mobile device within a preset range, lead to Cross after carrying out safety analysis judgement to the second detected mobile device, establish and communicate to connect with the second mobile device, With to the second mobile device carry out data traffic share, the communication connection established equally can be Bluetooth communication connection or WLAN communication connections etc., certainly, the communication connection types between the first mobile device are including but not limited to described above, Neng Gouying The communication connection that communication connection form for data transfer between different first mobile devices can be illustrated by the present embodiment Form, do not limit herein.
Referring to Fig. 4, Fig. 4 is the schematic flow sheet of data traffic sharing method 3rd embodiment of the present invention.Need to illustrate , the data traffic sharing method that data traffic sharing method that the present embodiment is illustrated is illustrated with above-described embodiment is not Be with part, the data traffic sharing method that this implementation is illustrated by automatic shared data flow, directly with it is trusty Second mobile device carries out data traffic and shared, and is described in detail below.
S401:First mobile device detects the second mobile device in a preset range;
In the present embodiment, the first mobile device can be centered on it, the detection progress data flow in a preset range The second shared mobile device of amount, the first mobile device are needed to receive the information for representing the second mobile device, and the first movement is set It is standby then can determine whether there is the presence of the second mobile device in preset range, if the first mobile device, which receives, represents the second movement The information of equipment, then judge to there are the second mobile device in preset range, by entering the second detected mobile device Row security judges that carrying out data traffic with the second mobile device afterwards shares.
Alternatively, preset range can be using the first mobile device as the center of circle, the circular scope of certain radius length, radius Length can be 5 meters, 10 meters, 15 meters etc., and preset range size is that the energy of the second mobile device is detected according to the first mobile device Power and the second mobile device send represent its identity characteristic information data-signal it is strong and weak determined, the first mobile device detects The ability of second mobile device is stronger, that is, receives the ability for representing the second mobile device information, then its movement of detection second The preset range of equipment is then bigger, and certainly, the form of preset range is including but not limited to described above, and preset range can also be Polygonal region centered on one first mobile device, or elliptical region, or be irregular area, all in accordance with The detection range of one mobile device is related to region and determined, does not limit herein.
S402:First mobile device judges whether its trusted devices list includes the second mobile device detected;
In the present embodiment, if trusted devices list includes the second mobile device detected, step S403 is performed, if Trusted devices list does not include the second mobile device detected, then continues executing with step S401.
In the present embodiment, the first mobile device has detected the presence of the second mobile device within a preset range, then and first Mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device, with to detected Second mobile device carries out security aspect and judged, the second movement included by the trusted devices list of the first mobile device is set It is standby entered security for the first mobile device in terms of judge after, confirm the second mobile device by safety means and the institute that will confirm Have in the trusted devices list that the second mobile device creates added to the first mobile device, therefore the first mobile device only needs to judge Whether the second mobile device detected by it is included in its trusted devices list, you can its detected second movement is set Standby security is confirmed.
Alternatively, the second mobile device represents the MAC Address that its unique identities characteristic information can be the second mobile device, The MAC Address of first mobile device is respectively provided with uniqueness, therefore can be as the diacritics of the second mobile device, the first movement The MAC Address of included as the second mobile device in the trusted devices list of equipment, the first mobile device is by judging it Whether the MAC Address of the second detected mobile device is the first mobile device MAC included in its trusted devices list Address, if trusted devices list includes the MAC Address of the second mobile device detected by the first mobile device, judge second Mobile device is included in the trusted devices list of the first mobile device, and certainly, the present embodiment illustrates each first movement of difference The method of equipment is including but not limited to described above, represents the information of the first mobile equipment identity characteristic information uniqueness and can make The foundation of each first mobile device is distinguished for the present embodiment, is not limited herein.
S403:If trusted devices list includes the second mobile device, the first mobile device judges whether it opens automatically Shared data traffic engineering capability;
In the present embodiment, if opening automatic shared data traffic engineering capability, step S404 is performed, if not opening automatic common Data traffic function is enjoyed, then continues executing with step S403.
In the present embodiment, the trusted devices list of the first mobile device includes detected by the first mobile device Two mobile devices, then automatic shared data traffic engineering capability whether is opened to the first mobile device and is judged, so as to avoid first Mobile device carries out data traffic to the second mobile device and shared, and is required to realize by corresponding operating process, operates Process is cumbersome, increases the operational ton of user, and the present embodiment is judging institute by the automatically shared traffic engineering capability of the first mobile device After trusted device of the second mobile device detected for safety, data traffic is carried out to it automatically and shared, simplify user Operating process, so as to improve the user experience of the first mobile device.
S404:If opening automatic shared data traffic engineering capability, the first mobile device is established with the second mobile device and communicated Connection, to realize that carrying out data traffic to the second mobile device shares;
In the present embodiment, if the first mobile device has turned on automatic shared data traffic engineering capability, and the first mobile device Trusted devices list include the second detected mobile device, then directly with the second mobile device establish communicate to connect, And carry out data traffic to the second mobile device and share, the first mobile device is logical by what is established between the second mobile device Letter connection, the data traffic of the first mobile device is subjected to data traffic sharing operation to the second mobile device, the second movement is set The standby data traffic that can use the first mobile device, situations such as to alleviate the second mobile device data flow scarcity.
Alternatively, the first mobile device the second mobile device is detected in a preset range can be by the first mobile device Bluetooth Communication Technology or WLAN (WLAN) communication technology etc., detect the second mobile device within a preset range, lead to Cross after carrying out safety analysis judgement to the second detected mobile device, establish and communicate to connect with the second mobile device, With to the second mobile device carry out data traffic share, the communication connection established equally can be Bluetooth communication connection or WLAN communication connections etc., certainly, the communication connection types between the first mobile device are including but not limited to described above, Neng Gouying The communication connection that communication connection form for data transfer between different first mobile devices can be illustrated by the present embodiment Form, do not limit herein.
It should be noted that the data traffic sharing method that the present embodiment is illustrated is applied to the data of the first mobile device Flow is shared, but is equally applicable to other first mobile device datas in addition to data traffic in the first different mobile devices Between shared, such as multimedia file, business office file and application program are shared, and can pass through the present embodiment By whether being included in the trust of the first mobile device to the second mobile device between first mobile device and the second mobile device After carrying out security judgement in equipment list, the two establishes communication connection to carry out the data sharing between equipment, can be this The applicable object for the data traffic sharing method that embodiment is illustrated, to ensure between the first mobile device and the second mobile device The security of data sharing process is carried out, is not limited herein.
In summary, whether the second mobile device that the present invention judges to detect by the first mobile device is included in first In the trusted devices list of mobile device, to judge whether the second mobile device detected is that the first mobile device can be carried out The shared equipment of data traffic, security judgement is carried out to the second mobile device detected by the first mobile device, if trusting Equipment list includes the second mobile device, then illustrates that the second mobile device detected by the first mobile device is appointed for secure and trusted Equipment, then establish and communicate to connect with detected the second mobile device, to realize that the first mobile device is set to the second movement The standby data traffic that carries out is shared, and so as to improve the security of the first mobile device data flow shared procedure, and passes through unlatching Automatic shared data traffic engineering capability, after judging the second mobile device for the trusted device of safety, directly moved with second Equipment, which is established, communicates to connect and carries out data traffic sharing operation, mitigates the operating burden during user's use, and then improve The user experience of first mobile device.
Fig. 5-6 is referred to, Fig. 5 is the structural representation of the embodiment of mobile device one of the present invention, and Fig. 6, which is that the present invention is shared, to be set Put the structural representation of the embodiment of interface one.
In the present embodiment, the first mobile device 500 can realize the shared side of data traffic that above-described embodiment is illustrated Method, specifically include:The second mobile device is detected in a preset range;Judge whether trusted devices list includes detecting the Two mobile devices;If trusted devices list includes the second mobile device, establish and communicate to connect with the second mobile device, to realize Data traffic is carried out to the second mobile device to share.
Alternatively, the first mobile device 500 includes a shared setting interface 601, as shown in fig. 6, can be set in the first movement Selection detect the communication technology of the second mobile device on standby shared setting interface 601, can be with as described in above-mentioned embodiment For Bluetooth Communication Technology 602, or WLAN communication technologys 603 etc., and shared to set interface 601 also to include automatic shared The settings button 605 of the function of data traffic 604, the unlatching of the automatic function of shared data flow 604 is carried out by 605 buttons by setting With closing.
Referring to Fig. 7, Fig. 7 is the schematic flow sheet of data traffic sharing method fourth embodiment of the present invention.
S701:First mobile device detects the second mobile device in a preset range;
In the present embodiment, the first mobile device can be centered on it, the detection progress data flow in a preset range The second shared mobile device of amount, the first mobile device are needed to receive the information for representing the second mobile device, and the first movement is set It is standby then can determine whether there is the presence of the second mobile device in preset range, if the first mobile device, which receives, represents the second movement The information of equipment, then judge to there are the second mobile device in preset range, by entering the second detected mobile device Row security judges that carrying out data traffic with the second mobile device afterwards shares.
S702:First mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device In;
In the present embodiment, the first mobile device has detected the presence of the second mobile device within a preset range, then and first Mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device, with to detected Second mobile device carries out security aspect and judged, the second movement included by the trusted devices list of the first mobile device is set It is standby entered security for the first mobile device in terms of judge after, confirm the second mobile device by safety means and the institute that will confirm Have in the trusted devices list that the second mobile device creates added to the first mobile device, therefore the first mobile device only needs to judge Whether the second mobile device detected by it is included in its trusted devices list, you can its detected second movement is set Standby security is confirmed.
S703:If the second mobile device is included in the trusted devices list of the first mobile device, the first mobile device Establish and communicate to connect with the second mobile device, shared with realizing that the first mobile device carries out data traffic to the second mobile device;
In the present embodiment, if the second movement that the trusted devices list of the first mobile device includes detected by it is set Standby, then the first mobile device judges the equipment that the second mobile device detected by it is appointed for secure and trusted, by being detected After the security of the second mobile device arrived judges, establish and communicate to connect with the second mobile device, the first mobile device by with The communication connection established between second mobile device, the data traffic of the first mobile device is entered into line number to the second mobile device According to flow sharing operation, the second mobile device can use the data traffic of the first mobile device, to alleviate the second mobile device Situations such as data traffic scarcity.
Referring to Fig. 8, Fig. 8 is the structural representation of the embodiment of data traffic shared system one of the present invention.
In the present embodiment, data traffic shared system 800 is based on the shared side of data traffic that above-described embodiment is illustrated Method, data traffic shared system 800 include the first mobile device 801 and the second mobile device 802, the first mobile device 801 Following action can be realized with the second mobile device 802:First mobile device 801 detects the second movement in a preset range and set Standby 802;First mobile device 801 judges whether the second mobile device 802 is included in the trusted devices name of the first mobile device 801 Dan Zhong;If the second mobile device 802 is included in the trusted devices list of the first mobile device 801, the first mobile device 801 Communication connection 803 is established with the second mobile device 802, to realize that the first mobile device 801 enters line number to the second mobile device 802 Shared according to flow.
Referring to Fig. 9, Fig. 9 is the structural representation of another embodiment of mobile device of the present invention.
In the present embodiment, the first mobile device 900 includes processor 901 and communication chip 902, processor 901 with Communication chip 902 couples, and processor 901 can realize following action:Control communication chip 902 detects the in a preset range Two mobile devices;Judge whether trusted devices list includes the second mobile device detected;If trusted devices list includes the Two mobile devices, then the mobile device of communication chip 902 and second is controlled to establish communication connection, to realize to enter to the second mobile device Row data traffic is shared.
Alternatively, communication chip 902 includes at least one of Bluetooth communication chip and WLAN communication chips.
Alternatively, the first mobile device 900 further comprises memory 903, and memory 903 couples with processor 901, place Manage device 901 can control memory 903 store trusted devices list in trusted device MAC Address.
Referring to Fig. 10, Figure 10 is the structural representation of the embodiment of inventive memory device one.
In the present embodiment, storage device 1000 has program stored therein data 1001, routine data 1001 can be performed with The data traffic sharing method that above-described embodiment is illustrated is realized, is just repeated no more herein.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can To realize by another way.For example, device embodiments described above are schematical, for example, the module or The division of unit, it is a kind of division of logic function, can there is other dividing mode, such as multiple units or group when actually realizing Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown Or the mutual coupling discussed or direct-coupling or communication connection can be by some interfaces, device or unit it is indirect Coupling or communication connection, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of present embodiment according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also may be used To be that unit is individually physically present, can also two or more units it is integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer It is each that equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention The all or part of step of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD Etc. it is various can be with the medium of store program codes.
Embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this The equivalent structure or equivalent flow conversion that description of the invention and accompanying drawing content are made, or directly or indirectly it is used in other correlations Technical field, it is included within the scope of the present invention.

Claims (10)

1. a kind of data traffic sharing method, it is characterised in that methods described includes:
First mobile device detects the second mobile device in a preset range;
First mobile device judges whether its trusted devices list includes second mobile device detected;
If the trusted devices list includes second mobile device, first mobile device is set with the described second movement It is standby to establish communication connection, to realize that carrying out data traffic to second mobile device shares.
2. according to the method for claim 1, it is characterised in that first mobile device judges that its trusted devices list is It is no including detect second mobile device the step of before specifically include:Add credible in the trusted devices list The step of appointing equipment, the step specifically includes:First mobile device is shared data traffic is carried out, and the trusted devices The second mobile device not included in list is added in the trusted devices list.
3. according to the method for claim 2, it is characterised in that described to judge whether trusted devices list includes what is detected The step of second mobile device, specifically includes:First mobile device judges whether the trusted devices list includes institute The MAC Address of the second mobile device is stated, if the trusted devices list includes the MAC Address of second mobile device, is sentenced Fixed second mobile device belongs to the trusted device, and first mobile device is built with second mobile device Vertical communication connection, to realize that carrying out data traffic to second mobile device shares.
4. according to the method for claim 1, it is characterised in that first mobile device is built with second mobile device The step of vertical communication connection, specifically includes:Generation one confirms interface on second mobile device, in the confirmation interface Input validation information, data flow is communicated to connect and carries out to realize that first mobile device is established with second mobile device Amount is shared.
5. according to the method for claim 1, it is characterised in that first mobile device is built with second mobile device The step of vertical communication connection, specifically includes:If the trusted devices list includes second mobile device, described first moves Dynamic equipment is directly established with second mobile device and communicated to connect, and is carried out data traffic to second mobile device and be total to Enjoy.
6. the method according to claim 4 or 5, it is characterised in that
The step of first mobile device detects the second mobile device in a preset range specifically includes:First movement Equipment detects the second mobile device by Bluetooth Communication Technology or the WLAN communication technologys in the preset range;
And the communication connection includes Bluetooth communication connection or WLAN communication connections.
A kind of 7. mobile device, it is characterised in that the mobile device includes processor and communication chip, the processor with The communication chip coupling, the processor can realize following action:
The communication chip is controlled to detect the second mobile device in a preset range;
Judge whether trusted devices list includes second mobile device detected;
If the trusted devices list includes second mobile device, control the communication chip to be moved with described second and set It is standby to establish communication connection, to realize that carrying out data traffic to second mobile device shares.
8. mobile device according to claim 7, it is characterised in that the communication chip include Bluetooth communication chip and At least one of WLAN communication chips.
9. mobile device according to claim 8, it is characterised in that the mobile device further comprises memory, institute State memory to couple with the processor, the processor can control can in trusted devices list described in the memory storage The MAC Address of trusted devices.
10. a kind of storage device, it is characterised in that the storage device is had program stored therein data, and described program data can be by Perform to realize the data traffic sharing method as described in any one of claim 1~6.
CN201711102960.9A 2017-11-08 2017-11-08 A kind of data traffic sharing method, mobile device and storage device Pending CN107896371A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711102960.9A CN107896371A (en) 2017-11-08 2017-11-08 A kind of data traffic sharing method, mobile device and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711102960.9A CN107896371A (en) 2017-11-08 2017-11-08 A kind of data traffic sharing method, mobile device and storage device

Publications (1)

Publication Number Publication Date
CN107896371A true CN107896371A (en) 2018-04-10

Family

ID=61804924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711102960.9A Pending CN107896371A (en) 2017-11-08 2017-11-08 A kind of data traffic sharing method, mobile device and storage device

Country Status (1)

Country Link
CN (1) CN107896371A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924911A (en) * 2018-07-27 2018-11-30 维沃移动通信有限公司 A kind of starting wifi hotspot shares the method and device of network
CN111065057A (en) * 2019-12-26 2020-04-24 珠海格力电器股份有限公司 Mobile traffic sharing method, device, equipment, medium and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656745A (en) * 2009-09-03 2010-02-24 深圳华为通信技术有限公司 Wireless communication device and system for realizing file sharing and file sharing method
CN103491183A (en) * 2013-09-29 2014-01-01 宇龙计算机通信科技(深圳)有限公司 Data sharing method, mobile terminals and cloud server
CN104363665A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Terminal
CN104363585A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Wireless local area network access method
CN106330471A (en) * 2016-10-25 2017-01-11 珠海格力电器股份有限公司 Mobile terminal data flow sharing method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656745A (en) * 2009-09-03 2010-02-24 深圳华为通信技术有限公司 Wireless communication device and system for realizing file sharing and file sharing method
CN103491183A (en) * 2013-09-29 2014-01-01 宇龙计算机通信科技(深圳)有限公司 Data sharing method, mobile terminals and cloud server
CN104363665A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Terminal
CN104363585A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Wireless local area network access method
CN106330471A (en) * 2016-10-25 2017-01-11 珠海格力电器股份有限公司 Mobile terminal data flow sharing method, device and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924911A (en) * 2018-07-27 2018-11-30 维沃移动通信有限公司 A kind of starting wifi hotspot shares the method and device of network
CN111065057A (en) * 2019-12-26 2020-04-24 珠海格力电器股份有限公司 Mobile traffic sharing method, device, equipment, medium and system

Similar Documents

Publication Publication Date Title
CN101751524B (en) Device, method and computer for management of computer external equipment
CN105307287B (en) A kind of connection method and wearable device
CN101536008A (en) Near field connection establishment
CN104467923B (en) Method, equipment and system that equipment is interacted
CN107896371A (en) A kind of data traffic sharing method, mobile device and storage device
CN104253818B (en) Server, terminal authentication method and server, terminal
CN106600401A (en) Electronic money management method and electronic money system
CN106897006A (en) A kind of method for processing payment information, device and user equipment
CN107633456B (en) A kind of financial terminal equipment based on rural migrant worker's credit worthiness
CN107203483A (en) The interface circuit and electronic equipment of a kind of electronic equipment
CN104239829A (en) Near-field communication device and method thereof
CN106529954A (en) Mobile terminal based payment method and mobile terminal
CN107403152A (en) High-pass platform TrustZone fingerprint recognition realization method and systems
CN105653989B (en) A kind of information leakage preventing method and device
CN107526955A (en) Put out screen unlocks method and apparatus
CN107566352A (en) A kind of method, a kind of method for unlocking and server for generating CUSTOMER ID
CN105403221B (en) The generation method and mobile terminal of a kind of navigation way
CN105872226A (en) Unlocking method and device of mobile terminal and the mobile terminal
CN104102870B (en) Electron underwriting authentication expansion equipment and information processing method
CN106295289A (en) A kind of message processing module
CN104363609A (en) Access control equipment of wireless hot spot
CN106412903A (en) Mobile terminal data transmission method and device
CN107885674A (en) Bluetooth equipment simulator and its method of work, bluetooth equipment operating system
CN105678157B (en) A kind of data property right protection system and method based on application environment identification
CN107633173A (en) Document handling method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180410

RJ01 Rejection of invention patent application after publication