CN107896371A - A kind of data traffic sharing method, mobile device and storage device - Google Patents
A kind of data traffic sharing method, mobile device and storage device Download PDFInfo
- Publication number
- CN107896371A CN107896371A CN201711102960.9A CN201711102960A CN107896371A CN 107896371 A CN107896371 A CN 107896371A CN 201711102960 A CN201711102960 A CN 201711102960A CN 107896371 A CN107896371 A CN 107896371A
- Authority
- CN
- China
- Prior art keywords
- mobile device
- data traffic
- trusted devices
- devices list
- detected
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to technical field of mobile terminals, discloses a kind of data traffic sharing method, mobile device and storage device.This method includes:First mobile device detects the second mobile device in a preset range;First mobile device judges whether its trusted devices list includes the second mobile device detected;If trusted devices list includes the second mobile device, the first mobile device and the second mobile device, which are established, to be communicated to connect, to realize that carrying out data traffic to the second mobile device shares.By the above-mentioned means, the present invention can improve the security of mobile device data flow shared procedure.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of data traffic sharing method, mobile device with
And storage device.
Background technology
Mobile terminal makes mobile communication terminal refer to the computer equipment that can be used on the move, and broad sense says bag
Include mobile phone, notebook, tablet personal computer, POS or even include vehicle-mounted computer.But refer to mobile phone in most cases or have
The smart mobile phone and tablet personal computer of a variety of application functions.As network and technology are towards the hair in more and more broadband direction
Exhibition, Mobile Communication Industry will move towards the real mobile message epoch.On the other hand, with the rapid development of integrated circuit technique,
The disposal ability of mobile terminal has had powerful disposal ability, and mobile terminal is changed into one from simple call instrument
Individual integrated information processing platform.This also adds broader development space to mobile terminal.
The present inventor has found in long-term R&D process, different with the continuous development of mobile terminal technology
Progress data traffic is shared between mobile terminal also increasingly popularizes, and different mobile terminal is equipped with different communication cards, different
Communication card is that data traffic is shared in carrier progress LAN by mobile terminal, but at present, the data flow between mobile terminal
There is risk in amount shared procedure, data traffic shared procedure is easily cracked by third party software malice, influences normal data flow
Shared procedure is measured, the user experience of mobile terminal is had undesirable effect.
The content of the invention
In view of this, the present invention solves the technical problem of provide a kind of data traffic sharing method, mobile device
And storage device, it is possible to increase the security of mobile device data flow shared procedure.
In order to solve the above technical problems, one aspect of the present invention is:There is provided a kind of data traffic shared side
Method, this method include:
First mobile device detects the second mobile device in a preset range;First mobile device judges its trusted devices
Whether list includes the second mobile device detected;If trusted devices list includes the second mobile device, the first movement is set
Standby established with the second mobile device communicates to connect, to realize that carrying out data traffic to the second mobile device shares.
In order to solve the above technical problems, another technical scheme that the present invention uses is:A kind of mobile device is provided, the shifting
Dynamic equipment includes processor and communication chip, and processor couples with communication chip, and processor can realize following action:
Control communication chip detects the second mobile device in a preset range;Judge whether trusted devices list includes inspection
The second mobile device measured;If trusted devices list includes the second mobile device, control communication chip is set with the second movement
It is standby to establish communication connection, to realize that carrying out data traffic to the second mobile device shares.
In order to solve the above technical problems, another technical scheme that the present invention uses is:A kind of storage device is provided, this is deposited
Storage device is had program stored therein data, and routine data can be performed to realize the shared side of data traffic that above-described embodiment is illustrated
Method, this method include:
First mobile device detects the second mobile device in a preset range;First mobile device judges its trusted devices
Whether list includes the second mobile device detected;If trusted devices list includes the second mobile device, the first movement is set
Standby established with the second mobile device communicates to connect, to realize that carrying out data traffic to the second mobile device shares.
The beneficial effects of the invention are as follows:Whether the second mobile device of the invention detected by the judgement of the first mobile device
It is included in the trusted devices list of the first mobile device, to judge whether the second mobile device detected is that the first movement is set
It is standby to carry out the shared equipment of data traffic, security is carried out to the second mobile device detected by the first mobile device and sentenced
It is disconnected, if trusted devices list includes the second mobile device, illustrate that the second mobile device detected by the first mobile device is
The equipment that secure and trusted is appointed, then establish and communicate to connect with detected the second mobile device, with realize the first mobile device to
Second mobile device carries out data traffic and shared, so as to improve the security of mobile device data flow shared procedure.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of data traffic sharing method first embodiment of the present invention;
Fig. 2 is the schematic flow sheet of data traffic sharing method second embodiment of the present invention;
Fig. 3 is the structural representation that the present invention confirms the embodiment of interface one;
Fig. 4 is the schematic flow sheet of data traffic sharing method 3rd embodiment of the present invention;
Fig. 5 is the structural representation of the embodiment of mobile device one of the present invention;
Fig. 6 is the shared structural representation for setting the embodiment of interface one of the present invention;
Fig. 7 is the schematic flow sheet of data traffic sharing method fourth embodiment of the present invention;
Fig. 8 is the structural representation of the embodiment of data traffic shared system one of the present invention;
Fig. 9 is the structural representation of another embodiment of mobile device of the present invention;
Figure 10 is the structural representation of the embodiment of inventive memory device one.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of data traffic sharing method first embodiment of the present invention.
S101:First mobile device detects the second mobile device in a preset range;
In the present embodiment, the first mobile device can be centered on it, the detection progress data flow in a preset range
The second shared mobile device of amount, the first mobile device are needed to receive the information for representing the second mobile device, and the first movement is set
It is standby then can determine whether there is the presence of the second mobile device in preset range, if the first mobile device, which receives, represents the second movement
The information of equipment, then judge to there are the second mobile device in preset range, by entering the second detected mobile device
Row security judges that carrying out data traffic with the second mobile device afterwards shares.
Alternatively, preset range can be using the first mobile device as the center of circle, the circular scope of certain radius length, radius
Length can be 5 meters, 10 meters, 15 meters etc., and preset range size is that the energy of the second mobile device is detected according to the first mobile device
Power and the second mobile device send represent its identity characteristic information data-signal it is strong and weak determined, the first mobile device detects
The ability of second mobile device is stronger, that is, receives the ability for representing the second mobile device information, then its movement of detection second
The preset range of equipment is then bigger, and certainly, the form of preset range is including but not limited to described above, and preset range can also be
Polygonal region centered on one first mobile device, or elliptical region, or be irregular area, all in accordance with
The detection range of one mobile device is related to region and determined, does not limit herein.
S102:First mobile device judges whether its trusted devices list includes the second mobile device detected;
In the present embodiment, the first mobile device has detected the presence of the second mobile device within a preset range, then and first
Mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device, with to detected
Second mobile device carries out security aspect and judged, the second movement included by the trusted devices list of the first mobile device is set
It is standby entered security for the first mobile device in terms of judge after, confirm the second mobile device by safety means and the institute that will confirm
Have in the trusted devices list that the second mobile device creates added to the first mobile device, therefore the first mobile device only needs to judge
Whether the second mobile device detected by it is included in its trusted devices list, you can its detected second movement is set
Standby security is confirmed.
S103:If trusted devices list includes the second mobile device, the first mobile device and the second mobile device are established
Communication connection, to realize that carrying out data traffic to the second mobile device shares;
In the present embodiment, if the second movement that the trusted devices list of the first mobile device includes detected by it is set
Standby, then the first mobile device judges the equipment that the second mobile device detected by it is appointed for secure and trusted, by being detected
After the security of the second mobile device arrived judges, establish and communicate to connect with the second mobile device, the first mobile device by with
The communication connection established between second mobile device, the data traffic of the first mobile device is entered into line number to the second mobile device
According to flow sharing operation, the second mobile device can use the data traffic of the first mobile device, to alleviate the second mobile device
Situations such as data traffic scarcity.
It should be noted that the data traffic sharing method that the present embodiment is illustrated, includes but is not limited to apply in data
The shared technical field of flow, the data sharing between equipment, such as multimedia file, business office file and application program
Share, can by between the mobile device of the present embodiment first and the second mobile device by the second mobile device whether
It is included in after carrying out security judgement in the trusted devices list of the first mobile device, the two establishes communication connection to carry out equipment
Between data sharing, can be by the applicable object for the data traffic sharing method that the present embodiment illustrates, to ensure that first moves
The dynamic security that data sharing process is carried out between equipment and the second mobile device, is not limited herein.
Above as can be seen that whether the second mobile device that the present invention judges to detect by the first mobile device is included in
In the trusted devices list of first mobile device, to judge whether the second mobile device for detecting is that the first mobile device can be with
The shared equipment of data traffic is carried out, security judgement is carried out to the second mobile device detected by the first mobile device, if
Trusted devices list includes the second mobile device, then illustrates that the second mobile device detected by the first mobile device can for safety
The equipment of trust, then establish and communicate to connect with the second detected mobile device, to realize that the first mobile device moves to second
Dynamic equipment carries out data traffic and shared, so as to improve the security of the first mobile device data flow shared procedure.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of the second mobile device of data traffic sharing method embodiment of the present invention.
S201:Add the trusted device in trusted devices list;
In the present embodiment, whether the first mobile device is by judging the second mobile device detected by it in its trust
In equipment list, analysis judgement is carried out with the security to the second mobile device detected by it, if the first mobile device institute
The second mobile device detected is included in its trusted devices list, then it is safe trusted to illustrate second mobile device
Equipment, therefore the first mobile device will carry out data traffic with it and share, and in the trusted devices list of the first mobile device not
Including the second mobile device be added to trusted devices list in, with create add trusted devices list in trusted device,
First mobile device is by judging whether the second mobile device is trusted device in trusted devices list, to be detected to it
To the security of the second mobile device carry out analysis judgement.
S202:First mobile device detects the second mobile device in a preset range;
In the present embodiment, the first mobile device can be centered on it, the detection progress data flow in a preset range
The second shared mobile device of amount, the first mobile device are needed to receive the information for representing the second mobile device, and the first movement is set
It is standby then can determine whether there is the presence of the second mobile device in preset range, if the first mobile device, which receives, represents the second movement
The information of equipment, then judge to there are the second mobile device in preset range, by entering the second detected mobile device
Row security judges that carrying out data traffic with the second mobile device afterwards shares.
Alternatively, preset range can be using the first mobile device as the center of circle, the circular scope of certain radius length, radius
Length can be 5 meters, 10 meters, 15 meters etc., and preset range size is that the energy of the second mobile device is detected according to the first mobile device
Power and the second mobile device send represent its identity characteristic information data-signal it is strong and weak determined, the first mobile device detects
The ability of second mobile device is stronger, that is, receives the ability for representing the second mobile device information, then its movement of detection second
The preset range of equipment is then bigger, and certainly, the form of preset range is including but not limited to described above, and preset range can also be
Polygonal region centered on one first mobile device, or elliptical region, or be irregular area, all in accordance with
The detection range of one mobile device is related to region and determined, does not limit herein.
S203:First mobile device judges whether its trusted devices list includes the second mobile device detected;
In the present embodiment, if trusted devices list includes the second mobile device detected, step S204 is performed, if
Trusted devices list does not include the second mobile device detected, then continues executing with step S202.
In the present embodiment, the first mobile device has detected the presence of the second mobile device within a preset range, then and first
Mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device, with to detected
Second mobile device carries out security aspect and judged, the second movement included by the trusted devices list of the first mobile device is set
It is standby entered security for the first mobile device in terms of judge after, confirm the second mobile device by safety means and the institute that will confirm
Have in the trusted devices list that the second mobile device creates added to the first mobile device, therefore the first mobile device only needs to judge
Whether the second mobile device detected by it is included in its trusted devices list, you can its detected second movement is set
Standby security is confirmed.
Alternatively, the second mobile device represents the MAC Address that its unique identities characteristic information can be the second mobile device,
The MAC Address of first mobile device is respectively provided with uniqueness, therefore can be as the diacritics of the second mobile device, the first movement
The MAC Address of included as the second mobile device in the trusted devices list of equipment, the first mobile device is by judging it
Whether the MAC Address of the second detected mobile device is the first mobile device MAC included in its trusted devices list
Address, if trusted devices list includes the MAC Address of the second mobile device detected by the first mobile device, judge second
Mobile device is included in the trusted devices list of the first mobile device, and certainly, the present embodiment illustrates each first movement of difference
The method of equipment is including but not limited to described above, represents the information of the first mobile equipment identity characteristic information uniqueness and can make
The foundation of each first mobile device is distinguished for the present embodiment, is not limited herein.
S204:If trusted devices list includes the second mobile device, a confirmation interface is generated on the second mobile device;
In the present embodiment, the trusted devices list of the first mobile device includes detected by the first mobile device
Two mobile devices, then generation one confirms interface 301 on the second mobile device, with to the first mobile device to the second mobile device
The shared operation of data traffic is carried out to be confirmed.Second mobile device may within the detection range of the first mobile device,
But the second mobile device does not need the first mobile device to carry out data traffic to it to share, it is understood that there may be the first mobile device mistake
Judge that the behavior of the second mobile device is intended to, data traffic is carried out to it and shared, therefore the present embodiment in the second movement by setting
Standby upper generation confirms interface 301, is intended to confirm with the behavior to the second mobile device, judges whether the second mobile device needs
Data traffic is carried out to it to share, as shown in Figure 3.
S205:The input validation information in interface is confirmed, the first mobile device and the second mobile device, which are established, to be communicated to connect,
To realize that carrying out data traffic to the second mobile device shares;
In the present embodiment, the input validation information 302 in the confirmation interface 301 of the second mobile device, to be moved to second
The behavior of dynamic equipment is intended to be confirmed, judges whether the second mobile device needs to carry out data traffic to it to share.Confirmation letter
Breath 302 can choose whether that receiving carries out data traffic to it and shared, or one section of word for representing confirmation 302 of input
Symbol string etc., it is intended to confirm with the behavior to the second mobile device, certainly, the input form of confirmation 302 is included but not
It is limited to described above, behavior that can be to the second mobile device is intended to confirm, judges whether the second mobile device is needed to it
It can be that the confirmation 302 illustrated described in the present embodiment inputs to carry out the shared input form of confirmation 302 of data traffic
Form, do not limit herein.
If the trusted devices list of the first mobile device includes the second mobile device detected by it, the first movement is set
The equipment that standby the second mobile device judged detected by it is appointed for secure and trusted, by the second detected mobile device
Security judge after, input validation information 302 in the confirmation interface 301 of the second mobile device, confirm the second mobile device connect
Shared by data traffic is carried out to it, then establish and communicate to connect with the second mobile device, the first mobile device with second by moving
The communication connection established between dynamic equipment, the data traffic of the first mobile device is subjected to data traffic to the second mobile device
Sharing operation, the second mobile device can use the data traffic of the first mobile device, to alleviate the second mobile device data stream
Measure situations such as deficient.
Alternatively, the first mobile device the second mobile device is detected in a preset range can be by the first mobile device
Bluetooth Communication Technology or WLAN (WLAN) communication technology etc., detect the second mobile device within a preset range, lead to
Cross after carrying out safety analysis judgement to the second detected mobile device, establish and communicate to connect with the second mobile device,
With to the second mobile device carry out data traffic share, the communication connection established equally can be Bluetooth communication connection or
WLAN communication connections etc., certainly, the communication connection types between the first mobile device are including but not limited to described above, Neng Gouying
The communication connection that communication connection form for data transfer between different first mobile devices can be illustrated by the present embodiment
Form, do not limit herein.
Referring to Fig. 4, Fig. 4 is the schematic flow sheet of data traffic sharing method 3rd embodiment of the present invention.Need to illustrate
, the data traffic sharing method that data traffic sharing method that the present embodiment is illustrated is illustrated with above-described embodiment is not
Be with part, the data traffic sharing method that this implementation is illustrated by automatic shared data flow, directly with it is trusty
Second mobile device carries out data traffic and shared, and is described in detail below.
S401:First mobile device detects the second mobile device in a preset range;
In the present embodiment, the first mobile device can be centered on it, the detection progress data flow in a preset range
The second shared mobile device of amount, the first mobile device are needed to receive the information for representing the second mobile device, and the first movement is set
It is standby then can determine whether there is the presence of the second mobile device in preset range, if the first mobile device, which receives, represents the second movement
The information of equipment, then judge to there are the second mobile device in preset range, by entering the second detected mobile device
Row security judges that carrying out data traffic with the second mobile device afterwards shares.
Alternatively, preset range can be using the first mobile device as the center of circle, the circular scope of certain radius length, radius
Length can be 5 meters, 10 meters, 15 meters etc., and preset range size is that the energy of the second mobile device is detected according to the first mobile device
Power and the second mobile device send represent its identity characteristic information data-signal it is strong and weak determined, the first mobile device detects
The ability of second mobile device is stronger, that is, receives the ability for representing the second mobile device information, then its movement of detection second
The preset range of equipment is then bigger, and certainly, the form of preset range is including but not limited to described above, and preset range can also be
Polygonal region centered on one first mobile device, or elliptical region, or be irregular area, all in accordance with
The detection range of one mobile device is related to region and determined, does not limit herein.
S402:First mobile device judges whether its trusted devices list includes the second mobile device detected;
In the present embodiment, if trusted devices list includes the second mobile device detected, step S403 is performed, if
Trusted devices list does not include the second mobile device detected, then continues executing with step S401.
In the present embodiment, the first mobile device has detected the presence of the second mobile device within a preset range, then and first
Mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device, with to detected
Second mobile device carries out security aspect and judged, the second movement included by the trusted devices list of the first mobile device is set
It is standby entered security for the first mobile device in terms of judge after, confirm the second mobile device by safety means and the institute that will confirm
Have in the trusted devices list that the second mobile device creates added to the first mobile device, therefore the first mobile device only needs to judge
Whether the second mobile device detected by it is included in its trusted devices list, you can its detected second movement is set
Standby security is confirmed.
Alternatively, the second mobile device represents the MAC Address that its unique identities characteristic information can be the second mobile device,
The MAC Address of first mobile device is respectively provided with uniqueness, therefore can be as the diacritics of the second mobile device, the first movement
The MAC Address of included as the second mobile device in the trusted devices list of equipment, the first mobile device is by judging it
Whether the MAC Address of the second detected mobile device is the first mobile device MAC included in its trusted devices list
Address, if trusted devices list includes the MAC Address of the second mobile device detected by the first mobile device, judge second
Mobile device is included in the trusted devices list of the first mobile device, and certainly, the present embodiment illustrates each first movement of difference
The method of equipment is including but not limited to described above, represents the information of the first mobile equipment identity characteristic information uniqueness and can make
The foundation of each first mobile device is distinguished for the present embodiment, is not limited herein.
S403:If trusted devices list includes the second mobile device, the first mobile device judges whether it opens automatically
Shared data traffic engineering capability;
In the present embodiment, if opening automatic shared data traffic engineering capability, step S404 is performed, if not opening automatic common
Data traffic function is enjoyed, then continues executing with step S403.
In the present embodiment, the trusted devices list of the first mobile device includes detected by the first mobile device
Two mobile devices, then automatic shared data traffic engineering capability whether is opened to the first mobile device and is judged, so as to avoid first
Mobile device carries out data traffic to the second mobile device and shared, and is required to realize by corresponding operating process, operates
Process is cumbersome, increases the operational ton of user, and the present embodiment is judging institute by the automatically shared traffic engineering capability of the first mobile device
After trusted device of the second mobile device detected for safety, data traffic is carried out to it automatically and shared, simplify user
Operating process, so as to improve the user experience of the first mobile device.
S404:If opening automatic shared data traffic engineering capability, the first mobile device is established with the second mobile device and communicated
Connection, to realize that carrying out data traffic to the second mobile device shares;
In the present embodiment, if the first mobile device has turned on automatic shared data traffic engineering capability, and the first mobile device
Trusted devices list include the second detected mobile device, then directly with the second mobile device establish communicate to connect,
And carry out data traffic to the second mobile device and share, the first mobile device is logical by what is established between the second mobile device
Letter connection, the data traffic of the first mobile device is subjected to data traffic sharing operation to the second mobile device, the second movement is set
The standby data traffic that can use the first mobile device, situations such as to alleviate the second mobile device data flow scarcity.
Alternatively, the first mobile device the second mobile device is detected in a preset range can be by the first mobile device
Bluetooth Communication Technology or WLAN (WLAN) communication technology etc., detect the second mobile device within a preset range, lead to
Cross after carrying out safety analysis judgement to the second detected mobile device, establish and communicate to connect with the second mobile device,
With to the second mobile device carry out data traffic share, the communication connection established equally can be Bluetooth communication connection or
WLAN communication connections etc., certainly, the communication connection types between the first mobile device are including but not limited to described above, Neng Gouying
The communication connection that communication connection form for data transfer between different first mobile devices can be illustrated by the present embodiment
Form, do not limit herein.
It should be noted that the data traffic sharing method that the present embodiment is illustrated is applied to the data of the first mobile device
Flow is shared, but is equally applicable to other first mobile device datas in addition to data traffic in the first different mobile devices
Between shared, such as multimedia file, business office file and application program are shared, and can pass through the present embodiment
By whether being included in the trust of the first mobile device to the second mobile device between first mobile device and the second mobile device
After carrying out security judgement in equipment list, the two establishes communication connection to carry out the data sharing between equipment, can be this
The applicable object for the data traffic sharing method that embodiment is illustrated, to ensure between the first mobile device and the second mobile device
The security of data sharing process is carried out, is not limited herein.
In summary, whether the second mobile device that the present invention judges to detect by the first mobile device is included in first
In the trusted devices list of mobile device, to judge whether the second mobile device detected is that the first mobile device can be carried out
The shared equipment of data traffic, security judgement is carried out to the second mobile device detected by the first mobile device, if trusting
Equipment list includes the second mobile device, then illustrates that the second mobile device detected by the first mobile device is appointed for secure and trusted
Equipment, then establish and communicate to connect with detected the second mobile device, to realize that the first mobile device is set to the second movement
The standby data traffic that carries out is shared, and so as to improve the security of the first mobile device data flow shared procedure, and passes through unlatching
Automatic shared data traffic engineering capability, after judging the second mobile device for the trusted device of safety, directly moved with second
Equipment, which is established, communicates to connect and carries out data traffic sharing operation, mitigates the operating burden during user's use, and then improve
The user experience of first mobile device.
Fig. 5-6 is referred to, Fig. 5 is the structural representation of the embodiment of mobile device one of the present invention, and Fig. 6, which is that the present invention is shared, to be set
Put the structural representation of the embodiment of interface one.
In the present embodiment, the first mobile device 500 can realize the shared side of data traffic that above-described embodiment is illustrated
Method, specifically include:The second mobile device is detected in a preset range;Judge whether trusted devices list includes detecting the
Two mobile devices;If trusted devices list includes the second mobile device, establish and communicate to connect with the second mobile device, to realize
Data traffic is carried out to the second mobile device to share.
Alternatively, the first mobile device 500 includes a shared setting interface 601, as shown in fig. 6, can be set in the first movement
Selection detect the communication technology of the second mobile device on standby shared setting interface 601, can be with as described in above-mentioned embodiment
For Bluetooth Communication Technology 602, or WLAN communication technologys 603 etc., and shared to set interface 601 also to include automatic shared
The settings button 605 of the function of data traffic 604, the unlatching of the automatic function of shared data flow 604 is carried out by 605 buttons by setting
With closing.
Referring to Fig. 7, Fig. 7 is the schematic flow sheet of data traffic sharing method fourth embodiment of the present invention.
S701:First mobile device detects the second mobile device in a preset range;
In the present embodiment, the first mobile device can be centered on it, the detection progress data flow in a preset range
The second shared mobile device of amount, the first mobile device are needed to receive the information for representing the second mobile device, and the first movement is set
It is standby then can determine whether there is the presence of the second mobile device in preset range, if the first mobile device, which receives, represents the second movement
The information of equipment, then judge to there are the second mobile device in preset range, by entering the second detected mobile device
Row security judges that carrying out data traffic with the second mobile device afterwards shares.
S702:First mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device
In;
In the present embodiment, the first mobile device has detected the presence of the second mobile device within a preset range, then and first
Mobile device judges whether the second mobile device is included in the trusted devices list of the first mobile device, with to detected
Second mobile device carries out security aspect and judged, the second movement included by the trusted devices list of the first mobile device is set
It is standby entered security for the first mobile device in terms of judge after, confirm the second mobile device by safety means and the institute that will confirm
Have in the trusted devices list that the second mobile device creates added to the first mobile device, therefore the first mobile device only needs to judge
Whether the second mobile device detected by it is included in its trusted devices list, you can its detected second movement is set
Standby security is confirmed.
S703:If the second mobile device is included in the trusted devices list of the first mobile device, the first mobile device
Establish and communicate to connect with the second mobile device, shared with realizing that the first mobile device carries out data traffic to the second mobile device;
In the present embodiment, if the second movement that the trusted devices list of the first mobile device includes detected by it is set
Standby, then the first mobile device judges the equipment that the second mobile device detected by it is appointed for secure and trusted, by being detected
After the security of the second mobile device arrived judges, establish and communicate to connect with the second mobile device, the first mobile device by with
The communication connection established between second mobile device, the data traffic of the first mobile device is entered into line number to the second mobile device
According to flow sharing operation, the second mobile device can use the data traffic of the first mobile device, to alleviate the second mobile device
Situations such as data traffic scarcity.
Referring to Fig. 8, Fig. 8 is the structural representation of the embodiment of data traffic shared system one of the present invention.
In the present embodiment, data traffic shared system 800 is based on the shared side of data traffic that above-described embodiment is illustrated
Method, data traffic shared system 800 include the first mobile device 801 and the second mobile device 802, the first mobile device 801
Following action can be realized with the second mobile device 802:First mobile device 801 detects the second movement in a preset range and set
Standby 802;First mobile device 801 judges whether the second mobile device 802 is included in the trusted devices name of the first mobile device 801
Dan Zhong;If the second mobile device 802 is included in the trusted devices list of the first mobile device 801, the first mobile device 801
Communication connection 803 is established with the second mobile device 802, to realize that the first mobile device 801 enters line number to the second mobile device 802
Shared according to flow.
Referring to Fig. 9, Fig. 9 is the structural representation of another embodiment of mobile device of the present invention.
In the present embodiment, the first mobile device 900 includes processor 901 and communication chip 902, processor 901 with
Communication chip 902 couples, and processor 901 can realize following action:Control communication chip 902 detects the in a preset range
Two mobile devices;Judge whether trusted devices list includes the second mobile device detected;If trusted devices list includes the
Two mobile devices, then the mobile device of communication chip 902 and second is controlled to establish communication connection, to realize to enter to the second mobile device
Row data traffic is shared.
Alternatively, communication chip 902 includes at least one of Bluetooth communication chip and WLAN communication chips.
Alternatively, the first mobile device 900 further comprises memory 903, and memory 903 couples with processor 901, place
Manage device 901 can control memory 903 store trusted devices list in trusted device MAC Address.
Referring to Fig. 10, Figure 10 is the structural representation of the embodiment of inventive memory device one.
In the present embodiment, storage device 1000 has program stored therein data 1001, routine data 1001 can be performed with
The data traffic sharing method that above-described embodiment is illustrated is realized, is just repeated no more herein.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can
To realize by another way.For example, device embodiments described above are schematical, for example, the module or
The division of unit, it is a kind of division of logic function, can there is other dividing mode, such as multiple units or group when actually realizing
Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown
Or the mutual coupling discussed or direct-coupling or communication connection can be by some interfaces, device or unit it is indirect
Coupling or communication connection, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of present embodiment according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also may be used
To be that unit is individually physically present, can also two or more units it is integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
It is each that equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention
The all or part of step of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage
(ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD
Etc. it is various can be with the medium of store program codes.
Embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this
The equivalent structure or equivalent flow conversion that description of the invention and accompanying drawing content are made, or directly or indirectly it is used in other correlations
Technical field, it is included within the scope of the present invention.
Claims (10)
1. a kind of data traffic sharing method, it is characterised in that methods described includes:
First mobile device detects the second mobile device in a preset range;
First mobile device judges whether its trusted devices list includes second mobile device detected;
If the trusted devices list includes second mobile device, first mobile device is set with the described second movement
It is standby to establish communication connection, to realize that carrying out data traffic to second mobile device shares.
2. according to the method for claim 1, it is characterised in that first mobile device judges that its trusted devices list is
It is no including detect second mobile device the step of before specifically include:Add credible in the trusted devices list
The step of appointing equipment, the step specifically includes:First mobile device is shared data traffic is carried out, and the trusted devices
The second mobile device not included in list is added in the trusted devices list.
3. according to the method for claim 2, it is characterised in that described to judge whether trusted devices list includes what is detected
The step of second mobile device, specifically includes:First mobile device judges whether the trusted devices list includes institute
The MAC Address of the second mobile device is stated, if the trusted devices list includes the MAC Address of second mobile device, is sentenced
Fixed second mobile device belongs to the trusted device, and first mobile device is built with second mobile device
Vertical communication connection, to realize that carrying out data traffic to second mobile device shares.
4. according to the method for claim 1, it is characterised in that first mobile device is built with second mobile device
The step of vertical communication connection, specifically includes:Generation one confirms interface on second mobile device, in the confirmation interface
Input validation information, data flow is communicated to connect and carries out to realize that first mobile device is established with second mobile device
Amount is shared.
5. according to the method for claim 1, it is characterised in that first mobile device is built with second mobile device
The step of vertical communication connection, specifically includes:If the trusted devices list includes second mobile device, described first moves
Dynamic equipment is directly established with second mobile device and communicated to connect, and is carried out data traffic to second mobile device and be total to
Enjoy.
6. the method according to claim 4 or 5, it is characterised in that
The step of first mobile device detects the second mobile device in a preset range specifically includes:First movement
Equipment detects the second mobile device by Bluetooth Communication Technology or the WLAN communication technologys in the preset range;
And the communication connection includes Bluetooth communication connection or WLAN communication connections.
A kind of 7. mobile device, it is characterised in that the mobile device includes processor and communication chip, the processor with
The communication chip coupling, the processor can realize following action:
The communication chip is controlled to detect the second mobile device in a preset range;
Judge whether trusted devices list includes second mobile device detected;
If the trusted devices list includes second mobile device, control the communication chip to be moved with described second and set
It is standby to establish communication connection, to realize that carrying out data traffic to second mobile device shares.
8. mobile device according to claim 7, it is characterised in that the communication chip include Bluetooth communication chip and
At least one of WLAN communication chips.
9. mobile device according to claim 8, it is characterised in that the mobile device further comprises memory, institute
State memory to couple with the processor, the processor can control can in trusted devices list described in the memory storage
The MAC Address of trusted devices.
10. a kind of storage device, it is characterised in that the storage device is had program stored therein data, and described program data can be by
Perform to realize the data traffic sharing method as described in any one of claim 1~6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711102960.9A CN107896371A (en) | 2017-11-08 | 2017-11-08 | A kind of data traffic sharing method, mobile device and storage device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711102960.9A CN107896371A (en) | 2017-11-08 | 2017-11-08 | A kind of data traffic sharing method, mobile device and storage device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107896371A true CN107896371A (en) | 2018-04-10 |
Family
ID=61804924
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711102960.9A Pending CN107896371A (en) | 2017-11-08 | 2017-11-08 | A kind of data traffic sharing method, mobile device and storage device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107896371A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924911A (en) * | 2018-07-27 | 2018-11-30 | 维沃移动通信有限公司 | A kind of starting wifi hotspot shares the method and device of network |
CN111065057A (en) * | 2019-12-26 | 2020-04-24 | 珠海格力电器股份有限公司 | Mobile traffic sharing method, device, equipment, medium and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101656745A (en) * | 2009-09-03 | 2010-02-24 | 深圳华为通信技术有限公司 | Wireless communication device and system for realizing file sharing and file sharing method |
CN103491183A (en) * | 2013-09-29 | 2014-01-01 | 宇龙计算机通信科技(深圳)有限公司 | Data sharing method, mobile terminals and cloud server |
CN104363665A (en) * | 2014-10-27 | 2015-02-18 | 深圳市金立通信设备有限公司 | Terminal |
CN104363585A (en) * | 2014-10-27 | 2015-02-18 | 深圳市金立通信设备有限公司 | Wireless local area network access method |
CN106330471A (en) * | 2016-10-25 | 2017-01-11 | 珠海格力电器股份有限公司 | Mobile terminal data flow sharing method, device and system |
-
2017
- 2017-11-08 CN CN201711102960.9A patent/CN107896371A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101656745A (en) * | 2009-09-03 | 2010-02-24 | 深圳华为通信技术有限公司 | Wireless communication device and system for realizing file sharing and file sharing method |
CN103491183A (en) * | 2013-09-29 | 2014-01-01 | 宇龙计算机通信科技(深圳)有限公司 | Data sharing method, mobile terminals and cloud server |
CN104363665A (en) * | 2014-10-27 | 2015-02-18 | 深圳市金立通信设备有限公司 | Terminal |
CN104363585A (en) * | 2014-10-27 | 2015-02-18 | 深圳市金立通信设备有限公司 | Wireless local area network access method |
CN106330471A (en) * | 2016-10-25 | 2017-01-11 | 珠海格力电器股份有限公司 | Mobile terminal data flow sharing method, device and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924911A (en) * | 2018-07-27 | 2018-11-30 | 维沃移动通信有限公司 | A kind of starting wifi hotspot shares the method and device of network |
CN111065057A (en) * | 2019-12-26 | 2020-04-24 | 珠海格力电器股份有限公司 | Mobile traffic sharing method, device, equipment, medium and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101751524B (en) | Device, method and computer for management of computer external equipment | |
CN105307287B (en) | A kind of connection method and wearable device | |
CN101536008A (en) | Near field connection establishment | |
CN104467923B (en) | Method, equipment and system that equipment is interacted | |
CN107896371A (en) | A kind of data traffic sharing method, mobile device and storage device | |
CN104253818B (en) | Server, terminal authentication method and server, terminal | |
CN106600401A (en) | Electronic money management method and electronic money system | |
CN106897006A (en) | A kind of method for processing payment information, device and user equipment | |
CN107633456B (en) | A kind of financial terminal equipment based on rural migrant worker's credit worthiness | |
CN107203483A (en) | The interface circuit and electronic equipment of a kind of electronic equipment | |
CN104239829A (en) | Near-field communication device and method thereof | |
CN106529954A (en) | Mobile terminal based payment method and mobile terminal | |
CN107403152A (en) | High-pass platform TrustZone fingerprint recognition realization method and systems | |
CN105653989B (en) | A kind of information leakage preventing method and device | |
CN107526955A (en) | Put out screen unlocks method and apparatus | |
CN107566352A (en) | A kind of method, a kind of method for unlocking and server for generating CUSTOMER ID | |
CN105403221B (en) | The generation method and mobile terminal of a kind of navigation way | |
CN105872226A (en) | Unlocking method and device of mobile terminal and the mobile terminal | |
CN104102870B (en) | Electron underwriting authentication expansion equipment and information processing method | |
CN106295289A (en) | A kind of message processing module | |
CN104363609A (en) | Access control equipment of wireless hot spot | |
CN106412903A (en) | Mobile terminal data transmission method and device | |
CN107885674A (en) | Bluetooth equipment simulator and its method of work, bluetooth equipment operating system | |
CN105678157B (en) | A kind of data property right protection system and method based on application environment identification | |
CN107633173A (en) | Document handling method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180410 |
|
RJ01 | Rejection of invention patent application after publication |