CN108319825B - Data transmission method and terminal - Google Patents

Data transmission method and terminal Download PDF

Info

Publication number
CN108319825B
CN108319825B CN201710035355.8A CN201710035355A CN108319825B CN 108319825 B CN108319825 B CN 108319825B CN 201710035355 A CN201710035355 A CN 201710035355A CN 108319825 B CN108319825 B CN 108319825B
Authority
CN
China
Prior art keywords
terminal
authentication information
identity authentication
data
transmitted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710035355.8A
Other languages
Chinese (zh)
Other versions
CN108319825A (en
Inventor
古明涛
王余雷
祁麟
盛霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710035355.8A priority Critical patent/CN108319825B/en
Priority to PCT/CN2017/115985 priority patent/WO2018133594A1/en
Publication of CN108319825A publication Critical patent/CN108319825A/en
Application granted granted Critical
Publication of CN108319825B publication Critical patent/CN108319825B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0637Permissions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices

Abstract

The embodiment of the invention discloses a data transfer method and a terminal. The method may include: determining that the first mode is a data transmission mode, wherein the first mode is a mode allowing data stored in the storage area to be transmitted to the second terminal; when the mobile terminal is in the first mode, acquiring first identity authentication information, and authenticating the first identity authentication information; when the first identity authentication information is successfully authenticated, performing communication connection with a second terminal; and when the communication connection is successful, determining the first data to be transmitted and sending the first data to be transmitted to the second terminal.

Description

Data transmission method and terminal
Technical Field
The present invention relates to data processing technologies in the field of communications technologies, and in particular, to a data transmission method and a terminal.
Background
As mobile terminals are used more and more frequently in daily work and study, a large amount of user personal information and important data are stored in the mobile terminals. A user may utilize a mobile terminal to transfer data stored on the mobile terminal to other terminals. Generally, a user performs manual authentication and uses data transmission software by operating on a touch screen of a mobile terminal, such as: and the mobile phone assistant or the backup software transmits the data stored on the mobile terminal. However, when the mobile terminal has a touch screen damage, a Liquid Crystal Display (LCD) backlight is not bright, and other faults, the mobile terminal cannot perform authentication, and cannot use an Android Debug (ADB) function, so that the user cannot perform data transmission on the mobile terminal.
At present, when a touch screen of a mobile terminal is damaged, an LCD backlight is not bright and the like, a user can select to repair a fault part after sale or transmit data to other terminals through a professional instrument.
However, the repair of the faulty part or the transmission of data to other terminals by professional instruments may expose a third party to the data of the mobile terminal, and the expensive repair cost and the cost for transmitting data may cause a large number of users to abandon the repair of the faulty hardware or the transmission of data, resulting in a decrease in data security and an increased risk of data loss.
Disclosure of Invention
In order to solve the above technical problems, embodiments of the present invention are expected to provide a data transmission method and a terminal, which can transmit data when the mobile terminal cannot use the ADB function, so as to enhance the security of the data and reduce the risk of data loss.
The technical scheme of the invention is realized as follows:
the embodiment of the invention provides a data transmission method, which is applied to a first terminal and comprises the following steps:
the embodiment of the invention provides a data transmission method, which is characterized by being applied to a first terminal and comprising the following steps:
determining a first mode as a data transmission mode, wherein the first mode is a mode allowing data stored in the storage area to be transmitted to a second terminal;
when the mobile terminal is in the first mode, acquiring first identity authentication information, and authenticating the first identity authentication information;
when the first identity authentication information is successfully authenticated, performing communication connection with the second terminal;
and when the communication connection is successful, determining first data to be transmitted and sending the first data to be transmitted to the second terminal.
In the above method, before the establishing of the communication connection with the second terminal, the method further includes:
starting a communication connection function, and searching a terminal to be connected within a preset threshold range;
correspondingly, the establishing of the communication connection with the second terminal includes:
and when the terminal to be connected is determined to be the second terminal, sending a communication connection request to the second terminal to realize communication connection with the second terminal.
In the above method, before determining the first data to be transmitted, the method further includes:
performing identity authentication on the second terminal;
correspondingly, the determining the first data to be transmitted includes:
and when the identity authentication of the second terminal is successful, determining the first data to be transmitted.
In the above method, the performing identity authentication on the second terminal includes:
sending a first authentication instruction, wherein the first authentication instruction is used for instructing the second terminal to acquire second identity authentication information;
receiving the second identity authentication information;
and matching the second identity authentication information with a preset identity information base, and representing that the identity authentication of the second terminal is successful when the second identity authentication information is matched with third identity authentication information in the preset identity characteristic information base.
In the above method, the sending the first data to be transmitted to the second terminal includes:
sending a first data list to be transmitted to the second terminal;
receiving a second data list to be transmitted, wherein the second data list to be transmitted is a list determined after the second terminal selects the first data list to be transmitted;
and sending the first data to be transmitted corresponding to the second transmission data list to the second terminal.
In the above method, after the matching of the second identity authentication information with the preset identity information base, the method further includes:
and when the second identity authentication information is not matched with the third identity authentication information, sending an authentication failure instruction to the second terminal, and finishing the data transmission operation with the second terminal.
In the above method, the determining that the first mode is a data transmission mode includes:
receiving a preset key instruction, and determining that the data transmission mode is the first mode according to the preset key instruction.
In the above method, the authenticating the first identity authentication information includes:
matching the first identity authentication information with the preset identity information base;
when the first identity authentication information is matched with fourth identity authentication information in the preset identity information base, representing that the first identity authentication information is successfully authenticated;
and when the first identity authentication information is not matched with the fourth identity authentication information, ending the data transmission operation.
The embodiment of the invention provides a data transmission method, which is characterized by being applied to a second terminal and comprising the following steps:
receiving a communication connection request sent by a first terminal;
performing second identity authentication information when the communication connection between the communication connection request and the first terminal is successful;
and receiving the first data to be transmitted when the second identity authentication information is successful.
In the above method, the performing the second identity authentication information includes:
receiving a first authentication instruction, wherein the first authentication instruction is used for performing the second identity authentication information;
acquiring the second identity authentication information according to the first authentication instruction;
and sending the second identity authentication information to the first terminal to finish the authentication of the second identity authentication information.
In the above method, the receiving the first data to be transmitted includes:
receiving a first data list to be transmitted;
receiving a selection instruction of the first user;
determining a second data list to be transmitted from the first data list to be transmitted according to the selection instruction;
sending the second data list to be transmitted to the first terminal;
and receiving the first data to be transmitted, wherein the first data to be transmitted is data corresponding to the second data list to be transmitted, which is acquired by the first terminal.
An embodiment of the present invention provides a first terminal, including:
a first determination unit configured to determine that a first mode is a data transmission mode, the first mode being a mode allowing transmission of data stored in the storage area to the second terminal;
an acquisition unit configured to acquire first authentication information and authenticate the first authentication information when in the first mode;
a connection unit, configured to perform communication connection with the second terminal when the first identity authentication information is successfully authenticated;
and the first sending unit is used for determining first data to be transmitted when the communication connection is successful and sending the first data to be transmitted to the second terminal.
In the above first terminal, the terminal further includes: a start unit;
the starting unit is used for starting a communication connection function and searching a terminal to be connected within a preset threshold range;
the first sending unit is further configured to send a communication connection request to the second terminal when it is determined that the terminal to be connected is the second terminal, so as to implement communication connection with the second terminal.
In the above first terminal, the terminal further includes: a first authentication unit;
the first authentication unit is used for performing identity authentication on the second terminal;
the first determining unit is further configured to determine the first data to be transmitted when the identity authentication of the second terminal is successful.
In the above first terminal, the terminal further includes: a first receiving unit and a matching unit;
the first sending unit is further configured to send a first authentication instruction, where the first authentication instruction is used to instruct the second terminal to collect second identity authentication information;
the first receiving unit is configured to receive the second identity authentication information;
and the matching unit is used for matching the second identity authentication information with a preset identity information base, and when the second identity authentication information is matched with third identity authentication information in the preset identity characteristic information base, the identity authentication of the second terminal is represented to be successful.
In the first terminal, the first sending unit is further configured to send a first to-be-transmitted data list to the second terminal;
the first receiving unit is further configured to receive a second to-be-transmitted data list, where the second to-be-transmitted data list is a list determined after the second terminal selects the first to-be-transmitted data list;
the first sending unit is specifically configured to send the first data to be transmitted corresponding to the second transmission data list to the second terminal.
In the above first terminal, the terminal further includes: an ending unit;
the first sending unit is further configured to send an authentication failure instruction to the second terminal when the second identity authentication information is not matched with the third identity authentication information;
and the ending unit is used for ending the data transmission operation with the second terminal when the second identity authentication information is not matched with the third identity authentication information.
In the first terminal, the first receiving unit is further configured to receive a preset key instruction, and determine that the data transmission mode is the first mode according to the preset key instruction.
In the first terminal, the matching unit is further configured to match the first identity authentication information with the preset identity information base; when the first identity authentication information is matched with fourth identity authentication information in the preset identity information base, representing that the first identity authentication information is successfully authenticated;
the ending unit is further configured to end the data transmission operation when the first identity authentication information does not match the fourth identity authentication information.
An embodiment of the present invention provides a second terminal, including:
a second receiving unit, configured to receive a communication connection request sent by a first terminal;
the second authentication unit is used for performing second identity authentication information when the communication connection with the first terminal is successful according to the communication connection request;
the second receiving unit is further configured to receive the first data to be transmitted when the second identity authentication information is successful.
In the above second terminal, the terminal further includes: the acquisition unit and the second sending unit;
the second receiving unit is further configured to receive a first authentication instruction, where the first authentication instruction is used to perform the second identity authentication information;
the acquisition unit is used for acquiring the second identity authentication information according to the first authentication instruction;
the second sending unit is configured to send the second identity authentication information to the first terminal, so as to complete authentication of the second identity authentication information.
In the above second terminal, the terminal further includes: a second determination unit;
the second receiving unit is further configured to receive a first to-be-transmitted data list;
the second receiving unit is further configured to receive a selection instruction of the first user;
the second determining unit is configured to determine a second data list to be transmitted from the first data list to be transmitted according to the selection instruction;
the second sending unit is further configured to send the second to-be-transmitted data list to the first terminal;
the second receiving unit is specifically configured to receive the first data to be transmitted, where the first data to be transmitted is data corresponding to the second data list to be transmitted, where the data to be transmitted is acquired by the first terminal.
The embodiment of the invention provides a data transmission method and a terminal, wherein a first mode is determined to be a data transmission mode, and the first mode is a mode allowing data stored in a storage area to be transmitted to a second terminal; when the mobile terminal is in a first mode, acquiring first identity authentication information; when the first identity authentication information is successfully authenticated, performing communication connection with a second terminal; and when the communication connection is successful, sending the first data to be transmitted to the second terminal. By adopting the technical scheme, when the mobile terminal cannot use the ADB function, the mobile terminal can enter the first mode by inputting the preset key and transmits the data to the terminal with successful identity authentication, so that the data security is enhanced, and the risk of data loss is reduced.
Drawings
Fig. 1 is a first flowchart of a data transmission method according to an embodiment of the present invention;
fig. 2 is a second flowchart of a data transmission method according to another embodiment of the present invention;
fig. 3 is a schematic diagram of an exemplary fingerprint information input interface according to an embodiment of the present invention;
fig. 4 is an interaction diagram of a data transmission method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of an exemplary interface for selecting a first to-be-transmitted data list according to an embodiment of the present invention;
fig. 6 is a third schematic interface diagram of an exemplary interface for determining a second list of data to be transmitted according to an embodiment of the present invention;
fig. 7 is a flowchart illustrating an exemplary data transmission according to an embodiment of the present invention;
fig. 8 is a first schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 9 is a second schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 10 is a third schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 11 is a fourth schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 13 is a sixth schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 14 is a first schematic structural diagram of a second terminal according to an embodiment of the present invention;
fig. 15 is a second schematic structural diagram of a second terminal according to an embodiment of the present invention;
fig. 16 is a third schematic structural diagram of a second terminal according to an embodiment of the present invention;
fig. 17 is a fourth schematic structural diagram of a second terminal according to an embodiment of the present invention;
fig. 18 is a diagram of a data interaction structure between two terminals according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example one
An embodiment of the present invention provides a data transmission method, as shown in fig. 1, which is applied to a data transmission method at a first terminal side, and the method may include:
s101, determining that the first mode is a data transmission mode, wherein the first mode is a mode allowing data stored in the storage area to be transmitted to the second terminal.
The data transmission method provided by the embodiment of the invention is suitable for a scene that the first terminal cannot perform data transmission through the operation of a user on the touch screen due to the faults of the first terminal, such as damage of the touch screen, poor backlight of an LCD (liquid crystal display) and the like.
In the embodiment of the invention, the first terminal is preset with the first mode, the first mode can transmit the data of the first terminal on the premise of not operating the touch screen, and the first mode has the highest authority.
Optionally, the first terminal in the embodiment of the present invention may be a mobile phone, a tablet, or another communication device that can perform data transmission, and the embodiment of the present invention is not limited.
Optionally, in the embodiment of the present invention, the user may enter the first mode by inputting a preset key instruction or inputting biological information, which is specifically set according to an actual situation, and the embodiment of the present invention is not limited specifically.
Optionally, the preset key instruction in the embodiment of the present invention may be a combination key, for example: a combination of an upper key and a lower key of the first terminal, a combination of a power-on key and a lower key of the first terminal, etc., which are not limited in the embodiments of the present invention.
In the embodiment of the invention, the first mode and the normal starting mode of the first terminal share a preset identity information base, and the first mode of the first terminal comprises a first to-be-transmitted data list needing to be transmitted and corresponding to-be-transmitted data. The first mode of the first terminal stores first data to be transmitted in a storage area of the first terminal, and the first mode reads data from the storage of the storage area of the first terminal.
Optionally, the preset identity information base stores collected biometric information of the user or preset key combination information, which is specifically selected according to an actual situation, and the embodiment of the present invention is not limited specifically.
It should be noted that, in the embodiment of the present invention, the preset key instruction is obtained by the first terminal based on the user behavior. Specifically, a user operates keys on the first terminal to generate a first combined key instruction, and when the first combined key instruction is matched with a preset key combination in the first terminal, the first combined key is represented as a preset key instruction, that is, the first terminal receives the preset key instruction.
Further, in the embodiment of the present invention, when the key instruction received by the first terminal is different from the preset key instruction, the first terminal ends the operation of entering the first mode.
S102, when the mobile terminal is in the first mode, first identity authentication information is obtained, and authentication is carried out on the first identity authentication information.
Specifically, when the first terminal is in the first mode, the first identity authentication information needs to be acquired first to perform the validity authentication of the user.
In the embodiment of the invention, when the first terminal is in the first mode, the first terminal can prompt the user to input the first identity authentication information through the first prompt message.
Optionally, the first prompt message may include: voice prompt, charge indicator light prompt, and the like. For example, the user is prompted to enter the first mode by the color or on and off of an indicator lamp arranged on the front surface of the first terminal, and user validity authentication is required. Specifically, the first terminal prompts the user, which is not limited in the embodiment of the present invention.
Optionally, the first identity authentication information may include identity information representing the user, such as a fingerprint or a preset key combination.
It should be noted that the first identity authentication information acquired by the first terminal is identity information of the current user, and the current user identity information refers to identity information of a user currently using the first terminal for data transmission.
In the embodiment of the invention, after the first terminal receives the first identity authentication information, the first terminal judges the validity of the first identity authentication information by matching the first identity authentication information with the preset identity information base.
Optionally, the preset identity information base stores collected biometric information of the user or preset key combination information, which is specifically selected according to an actual situation, and the embodiment of the present invention is not limited specifically.
The biological feature information of the user in the embodiment of the present invention refers to some information that the self physiology of the user changes, wherein the biological feature may be a contraction in an auricle, a blood flow velocity, brain waves of a cerebral cortex, a fingerprint, face information, and the like. Thus, the predetermined identity information base may comprise a database of biometric information, such as fingerprints, that characterize the user.
Illustratively, the acquisition of the first identity authentication information is described by taking the example that the first terminal collects the user fingerprint information and the user face information. The first terminal can collect the fingerprint information through an HOME key arranged on the first terminal, and when a user places a finger on the HOME key on the first terminal, a sensor arranged on the position of the HOME key can detect the fingerprint information of the user. The first terminal can collect face information of the face of the user through a camera arranged on the first terminal. Specifically, under the condition that the front-facing camera exists, the first terminal can start the front-facing camera to perform information acquisition work of a current target object; under the condition that the front camera does not exist, the first terminal can start the rear camera to collect the face information of the current user.
In the embodiment of the present invention, when a user uses a first terminal without ADB function to perform data transmission, the first terminal needs to perform validity authentication on the user, and the data transmission method provided in the embodiment of the present invention can be adopted only when the user used is authenticated to be valid.
It is understood that in the embodiment of the present invention, since the user biometric information is a user with the same or similar characteristics, the possibility is very low. Therefore, the fingerprint features (fingerprint information) or the face features (face information) in the user biological feature information are not easy to be stolen or falsely used, so the confidentiality of the user legality authentication by adopting the user biological feature is very good.
Further, in the embodiment of the present invention, when the validity authentication of the first terminal to the user fails, that is, the user is authenticated to be illegal, the operation in the first mode is ended, for example, the first mode is exited.
Illustratively, the user inputs a correct combination key, the charging indicator light of the first terminal turns green, the user inputs an incorrect combination key, the charging indicator light of the first terminal turns red, after the charging indicator light of the first terminal turns green, the charging indicator light of the first terminal flashes to remind the user of inputting the first identity authentication information, and when the first terminal collects the first identity authentication information of the user, the charging indicator light of the first terminal stops flashing.
And S103, when the first identity authentication information is successfully authenticated, performing communication connection with the second terminal.
When the first terminal acquires the first identity authentication information, the first terminal needs to authenticate the legality of the user of the second terminal, and when the user of the second terminal is authenticated to be legal, the first terminal establishes communication connection with the second terminal.
In the embodiment of the invention, the first terminal can prompt whether the first identity authentication information is matched with the fourth identity authentication information in the preset identity information base through the second prompt information.
It should be noted that the fourth identity authentication information in the embodiment of the present invention is any identity information in a preset identity information base.
Optionally, the second prompt message may include: voice prompt, charge indicator light prompt, and the like.
Optionally, the first identity authentication information in the embodiment of the present invention may be biometric information of the user, or authentication information such as a preset key combination that can represent the identity of the second terminal, which is specifically selected according to an actual situation, and the embodiment of the present invention is not limited specifically.
It should be noted that, in the embodiment of the present invention, the first terminal prompts the user to input the first identity authentication information through the first prompt information, and then prompts the user whether to pass the validity authentication through the second prompt information, where the first prompt information and the second prompt information of the first terminal may be the same prompt information or different prompt information, for example: the first terminal can prompt a user to input first identity authentication information through the flickering of the charging indicator lamp, and prompt the user whether to pass the legality authentication or not through the green and red changing of the charging indicator lamp; the first terminal can also prompt the user to input the first identity authentication information through the flickering of the charging indicator lamp, and prompt the user whether to pass the validity authentication or not through the flickering times of the charging indicator lamp.
Exemplarily, when the charging indicator light of the first terminal is green, it indicates that the first identity authentication information matches the fourth identity authentication information; when the charging indicator light of the first terminal is red, it is indicated that the first identity authentication information is not matched with the fourth identity authentication information.
In the embodiment of the invention, the first terminal matches the acquired first user identity authentication with the fourth identity authentication information to complete the authentication of the first identity authentication information.
In the embodiment of the present invention, the fourth user authentication information and the first user authentication information may be biometric information of the same user.
It should be noted that the process of establishing a communication connection between the first terminal and the second terminal in the embodiment of the present invention may be a process of performing a network connection between the first terminal and the second terminal, and specifically, the first terminal and the second terminal may perform a wireless connection, so as to perform interaction between data of the two terminals through a wireless network connection.
Optionally, the Wireless network connection in the embodiment of the present invention may be Wireless technologies such as Wireless local area network (WIFI), Bluetooth (BT), and the like.
Preferably, the wireless network connection mode in the embodiment of the present invention may be bluetooth.
Further, in the embodiment of the present invention, when the first terminal and the second terminal are unsuccessfully connected, the first terminal ends the operation of communication connection with the second terminal.
And S104, when the communication connection is successful, determining the first data to be transmitted, and sending the first data to be transmitted to the second terminal.
When the communication connection between the first terminal and the second terminal is successful, data transmission between the first terminal and the second terminal can be performed, specifically, the first terminal sends the first to-be-transmitted data list to the second terminal, after the second terminal selects the first to-be-transmitted data list, the selected second to-be-transmitted data list is sent to the first terminal, and the first terminal sends the first to-be-transmitted data corresponding to the second to-be-transmitted data list to the second terminal to complete data transmission between the first terminal and the second terminal.
Further, before the first terminal sends the first data to be transmitted to the second terminal, the first terminal needs to authenticate second identity information of the second terminal, specifically, the first terminal instructs the second terminal to send the second identity authentication information, after the first terminal receives the second identity authentication information, the second identity authentication information is matched with a preset identity information base, and when the second identity authentication information is matched with third identity authentication information in the preset identity characteristic information base, the second identity authentication information corresponding to the second terminal is represented to be successful.
In the embodiment of the invention, the first terminal packs the first data to be transmitted into the data packet and sends the data packet to the second terminal.
Optionally, the first data to be transmitted may include a local application installation package, multimedia data such as voice, picture, video, and the like.
It should be noted that, in the embodiment of the present invention, in the process that the first terminal authenticates the user on the first terminal and the first user on the second terminal, the two users to be authenticated may be the same user or different users, and a specific setting is provided with an actual operation decision, which is not limited in the embodiment of the present invention.
It should be noted that a terminal without faults such as touch screen damage, LCD backlight failure, and the like may also use the method for transmitting data without operating the touch screen of the terminal provided in the embodiment of the present invention, at this time, the terminal may be used as both a receiver and a sender of data to be transmitted, and the specific implementation is implemented according to the requirements of a user, and the embodiment of the present invention is not specifically limited.
It can be understood that the first terminal does not operate the touch screen of the first terminal while performing data transmission with the second terminal, and the first terminal authenticates both the user of the first terminal and the first user of the second terminal before data transmission. Therefore, the safety of data transmission is improved, and the risk of data loss is reduced.
Example two
An embodiment of the present invention further provides a data transmission method, as shown in fig. 2, which is applied to a data transmission method at a second terminal side, where the method includes:
s201, receiving a communication connection request sent by a first terminal.
In the embodiment of the invention, the second terminal is used for receiving the data transmission of the first terminal in a normal operation state, and the second terminal starts a communication connection function for information and data interaction with the first terminal.
Optionally, the second terminal in the embodiment of the present invention may be a communication device that can perform data transmission, such as a mobile phone and a tablet.
In the embodiment of the present invention, the second terminal starts the communication connection function, and specifically, the communication connection function started by the second terminal should be the same as the communication connection function started by the first terminal.
Optionally, the communication connection function in the embodiment of the present invention may include: WIFI functionality, bluetooth functionality, etc.
Illustratively, the first terminal starts the bluetooth function, and the second terminal needs to start the bluetooth function at this time for the first terminal to search and send a request for communication connection.
S202, when the communication connection with the first terminal is successful according to the communication connection request, the second identity authentication information is authenticated.
The second terminal agrees to perform communication connection with the first terminal, represents that the communication connection between the second terminal and the first terminal is successful, and then needs to perform validity authentication of the identity of the first user.
In the embodiment of the invention, the second terminal receives the communication connection request with the first terminal and is connected with the first terminal, after the communication connection with the first terminal is successful, the first authentication instruction indicating the second identity authentication information by the first terminal is received, the second terminal authenticates the identity of the first user according to the first authentication instruction, specifically, the second terminal acquires the second identity authentication information and sends the second identity authentication information to the first terminal, and the first terminal performs the validity authentication according to the second identity authentication information.
In the embodiment of the invention, the first authentication instruction is used for instructing the second terminal to acquire the second identity authentication information.
Optionally, the second identity authentication information may include information representing a user biometric characteristic such as a fingerprint, or authentication information representing a second terminal identity such as a preset key combination, which is specifically selected according to a time condition, and the embodiment of the present invention is not limited specifically.
For example, as shown in fig. 3, a touch screen of the second terminal prompts a user to input fingerprint information, the user places a finger in a designated fingerprint input area, and the second terminal collects fingerprints in the fingerprint input area to complete fingerprint collection.
Further, in the embodiment of the present invention, when the second terminal is unsuccessfully connected to the first terminal in a communication manner, the operation of the communication connection with the first terminal is ended.
S203, receiving the first data to be transmitted when the second identity authentication information is successfully authenticated.
When the second identity authentication information of the first user in the second terminal is matched with the third identity authentication information, the validity authentication of the identity of the first user is represented to be successful, at this time, data transmission between the first terminal and the second terminal is performed, and specifically, the second terminal receives a first to-be-transmitted data packet which is sent by the first terminal and corresponds to the selected second to-be-transmitted data list.
In the embodiment of the invention, the second terminal receives the data packet of the first data to be transmitted, and after the data packet is received, the second terminal is disconnected from the first terminal and the recovery of the first data to be transmitted or the installation of the local application is carried out.
Optionally, the first data to be transmitted may include a local application installation package, multimedia data such as voice, picture, video, and the like.
Further, when the second identity authentication information is unsuccessful, the data transmission with the first terminal is ended.
It should be noted that, in the embodiment of the present invention, in the process that the first terminal authenticates the user on the first terminal and the first user on the second terminal, the two users to be authenticated may be the same user or different users, and a specific setting is provided with an actual operation decision, which is not limited in the embodiment of the present invention.
It should be noted that a terminal without faults such as touch screen damage, LCD backlight failure, and the like may also use the method for transmitting data without operating the touch screen of the terminal provided in the embodiment of the present invention, at this time, the terminal may be used as both a receiver and a sender of data to be transmitted, and the specific implementation is implemented according to the requirements of a user, and the embodiment of the present invention is not specifically limited.
EXAMPLE III
An embodiment of the present invention provides a data transmission method, as shown in fig. 4, the method may include:
s301, the first terminal determines that the data transmission mode is a first mode according to a preset key instruction, wherein the first mode is a mode allowing data stored in the storage area to be transmitted to the second terminal.
The data transmission method provided by the embodiment of the invention is suitable for a scene that the first terminal cannot perform data transmission through the operation of a user on the touch screen due to the faults of the first terminal, such as damage of the touch screen, poor backlight of an LCD (liquid crystal display) and the like.
In the embodiment of the invention, the first terminal is preset with a first mode, the first mode can transmit the data of the first terminal on the premise of not operating the touch screen, and the first mode has the highest authority
Optionally, the first terminal in the embodiment of the present invention may be a mobile phone, a tablet, or another communication device that can perform data transmission, and the embodiment of the present invention is not limited.
Optionally, in the embodiment of the present invention, the user may enter the first mode by inputting a preset key instruction or inputting biological information, which is specifically set according to an actual situation, and the embodiment of the present invention is not limited specifically.
Optionally, the preset key instruction in the embodiment of the present invention may be a combination key, for example: a combination of an upper key and a lower key of the first terminal, a combination of a power-on key and a lower key of the first terminal, etc., which are not limited in the embodiments of the present invention.
In the embodiment of the invention, the first mode and the normal starting mode of the first terminal share a preset identity information base, and the first mode of the first terminal comprises a first to-be-transmitted data list needing to be transmitted and corresponding to-be-transmitted data. The first mode of the first terminal stores first data to be transmitted in a storage area of the first terminal, and the first mode reads data from the storage of the storage area of the first terminal.
Optionally, the preset identity information base stores collected biometric information of the user or preset key combination information, which is specifically selected according to an actual situation, and the embodiment of the present invention is not limited specifically.
It should be noted that, in the embodiment of the present invention, the preset key instruction is obtained by the first terminal based on the user behavior. Specifically, a user operates keys on the first terminal to generate a first combined key instruction, and when the first combined key instruction is matched with a preset key combination in the first terminal, the first combined key is represented as a preset key instruction, that is, the first terminal receives the preset key instruction.
Further, in the embodiment of the present invention, when the key instruction received by the first terminal is different from the preset key instruction, the first terminal ends the operation of entering the first mode.
S302, when the first terminal is in the first mode, first identity authentication information is obtained.
Specifically, when the first terminal is in the first mode, the first identity authentication information needs to be acquired first to perform the validity authentication of the user.
In the embodiment of the invention, when the first terminal is in the first mode, the first terminal can prompt the user to input the first identity authentication information through the first prompt message.
Optionally, the first prompt message may include: voice prompt, charge indicator light prompt, and the like. For example, the user is prompted to enter the first mode by the color or on and off of an indicator lamp arranged on the front surface of the first terminal, and user validity authentication is required. Specifically, the first terminal prompts the user, which is not limited in the embodiment of the present invention.
Optionally, the first identity authentication information may represent identity information of the user, such as a fingerprint or a preset key combination.
It should be noted that the first identity authentication information acquired by the first terminal is identity information of the current user, and the current user identity information refers to identity information of a user currently using the first terminal for data transmission.
In the embodiment of the invention, after the first terminal receives the first identity authentication information, the first terminal judges the validity of the first identity authentication information by matching the first identity authentication information with the preset identity information base.
Optionally, the preset identity information base stores collected biometric information of the user or preset key combination information, which is specifically selected according to an actual situation, and the embodiment of the present invention is not limited specifically.
Illustratively, the acquisition of the first identity authentication information is described by taking the example that the first terminal collects the user fingerprint information and the user face information. The first terminal can collect the fingerprint information through an HOME key arranged on the first terminal, and when a user places a finger on the HOME key on the first terminal, a sensor arranged on the position of the HOME key can detect the fingerprint information of the user. The first terminal can collect face information of the face of the user through a camera arranged on the first terminal. Specifically, under the condition that the front-facing camera exists, the first terminal can start the front-facing camera to perform information acquisition work of a current target object; under the condition that the front camera does not exist, the first terminal can start the rear camera to collect the face information of the current user.
In the embodiment of the present invention, when a user uses a first terminal without ADB function to perform data transmission, the first terminal needs to perform validity authentication on the user, and the data transmission method provided in the embodiment of the present invention can be adopted only when the user used is authenticated to be valid.
It is understood that in the embodiment of the present invention, since the user biometric information is a user with the same or similar characteristics, the possibility is very low. Therefore, the fingerprint features (fingerprint information) or the face features (face information) in the user biological feature information are not easy to be stolen or falsely used, so the confidentiality of the user legality authentication by adopting the user biological feature is very good.
Further, in the embodiment of the present invention, when the validity authentication of the first terminal to the user fails, that is, the user is authenticated to be illegal, the operation in the first mode is ended, for example, the first mode is exited.
Illustratively, the user inputs a correct combination key, the charging indicator light of the first terminal turns green, the user inputs an incorrect combination key, the charging indicator light of the first terminal turns red, after the charging indicator light of the first terminal turns green, the charging indicator light of the first terminal flashes to remind the user of inputting the first identity authentication information, and when the first terminal collects the first identity authentication information of the user, the charging indicator light of the first terminal stops flashing.
S303, the first terminal matches the first identity authentication information with a preset identity information base.
In the embodiment of the invention, the acquired first identity authentication information is matched with third identity authentication information in a preset identity information base.
When the first terminal acquires the first identity authentication information, the first terminal needs to authenticate the validity of the user, specifically, the first terminal matches the acquired first identity authentication information with third identity authentication information in a preset identity information base, and when the first identity authentication information is matched with the third identity authentication information, the identity of the user is represented to be legal.
In the embodiment of the invention, the first terminal can prompt whether the first identity authentication information is matched with the third identity authentication information in the preset identity information base through the second prompt information.
It should be noted that the third identity authentication information in the embodiment of the present invention is any one piece of biometric information in a preset identity information base.
Optionally, the second prompt message may include: voice prompt, charge indicator light prompt, and the like.
It should be noted that, in the embodiment of the present invention, the first terminal prompts the user to input the first identity authentication information through the first prompt information, and then prompts the user whether to pass the validity authentication through the second prompt information, where the first prompt information and the second prompt information of the first terminal may be the same prompt information or different prompt information, for example: the first terminal can prompt a user to input first identity authentication information through the flickering of the charging indicator lamp, and prompt the user whether to pass the legality authentication or not through the green and red changing of the charging indicator lamp; the first terminal can also prompt the user to input the first identity authentication information through the flickering of the charging indicator lamp, and prompt the user whether to pass the validity authentication or not through the flickering times of the charging indicator lamp.
Illustratively, when the charging indicator light of the first terminal is green, it indicates that the first identity authentication information matches the third identity authentication information; when the charging indicator light of the first terminal is red, it is indicated that the first identity authentication information is not matched with the third identity authentication information.
S304, when the first identity authentication information is not matched with the third identity authentication information, the first terminal ends the data transmission operation.
In the embodiment of the invention, when the acquired first identity authentication information is not matched with the third identity authentication information in the pre-stored biological characteristic information base, the first terminal acquires the first identity authentication information again through the prompt information, and when the acquired times exceed the preset acquisition times of the first terminal, the data transmission operation is finished.
Optionally, the prompt message may include: voice prompt, charge indicator light prompt, and the like.
Illustratively, when the acquired first identity authentication information is not matched with third identity authentication information in a pre-stored biological characteristic information base, the first terminal sends a voice prompt for inputting the first identity authentication information again, the preset acquisition times of the first terminal are set to be 3 times, and when the acquisition of the first identity authentication information for the third time fails, the first terminal sends a voice prompt for ending the data transmission operation.
S305, when the first identity authentication information is matched with third identity authentication information in a preset identity information base, the first terminal starts a communication connection function and searches for a terminal to be connected within a preset threshold range.
Optionally, the communication connection function in the embodiment of the present invention may include: WIFI functionality, bluetooth functionality, etc.
In the embodiment of the invention, the preset threshold range is a search range preset by the first terminal.
In the embodiment of the invention, the equipment to be connected is the equipment starting the same communication connection function.
In the embodiment of the invention, the first terminal starts the communication connection function, and searches a list of terminals to be connected, which start the same communication connection function within a preset threshold range.
Illustratively, the first terminal starts a bluetooth function to search, and the searched list of terminals to be connected, which also start the bluetooth function within a certain range, is obtained.
It should be noted that S304 and S305 are two execution conditions of S303, and are executed after S303, and S304 and S305 are selectively executed according to actual situations, and the execution order is not limited in the embodiment of the present invention.
S306, when the first terminal determines that the terminal to be connected is the second terminal, the first terminal sends a communication connection request to the second terminal.
In the embodiment of the invention, when the searched list of the terminals to be connected has the second terminal, the first terminal sends a communication connection request to the second terminal.
In the embodiment of the present invention, the second terminal starts the communication connection function, and specifically, the communication connection function started by the second terminal should be the same as the communication connection function started by the first terminal.
It should be noted that the process of establishing a communication connection between the first terminal and the second terminal in the embodiment of the present invention may be a process of performing a network connection between the first terminal and the second terminal, and specifically, the first terminal and the second terminal may perform a wireless connection, so as to perform interaction between data of the two terminals through a wireless network connection.
Optionally, the wireless network connection in the embodiment of the present invention may be wireless technologies such as WIFI and bluetooth.
Preferably, the wireless network connection mode in the embodiment of the present invention may be bluetooth.
S307, the second terminal sends a response of the communication connection request, and the communication connection between the first terminal and the second terminal is represented to be successful.
In the embodiment of the invention, the second terminal is used for receiving the data transmission of the first terminal in a normal operation state, and the second terminal starts a communication connection function for information and data interaction with the first terminal.
Optionally, the second terminal in the embodiment of the present invention may be a communication device that can perform data transmission, such as a mobile phone and a tablet.
In the embodiment of the present invention, the second terminal starts the communication connection function, and specifically, the communication connection function started by the second terminal should be the same as the communication connection function started by the first terminal.
Optionally, the communication connection function in the embodiment of the present invention may include: WIFI functionality, bluetooth functionality, etc.
Illustratively, the first terminal starts the bluetooth function, and the second terminal needs to start the bluetooth function at this time for the first terminal to search and send a request for communication connection.
It should be noted that, in the embodiment of the present invention, when the second terminal does not send the accept communication connection request information, the communication connection operation with the first terminal is ended.
S308, when the communication connection with the second terminal is successful, the first terminal sends a first authentication instruction, and the first authentication instruction is used for instructing the second terminal to collect second identity authentication information.
After the first terminal completes the legality authentication of the user, the first terminal starts to be connected with the second terminal to transmit data from the first terminal to the second terminal, before data transmission, the first terminal needs to authenticate the identity of the first user corresponding to the second terminal, specifically, the first terminal matches second identity authentication information representing the identity information of the first user with third identity authentication information in a preset identity information base, and when the second identity authentication information is matched with the third identity authentication information, the second identity authentication information is represented successfully.
In the embodiment of the invention, the first terminal matches the acquired second user identity authentication information and the third identity authentication information to finish the second identity authentication information.
In the embodiment of the present invention, the second identity authentication information and the first identity authentication information may be biometric information of the same user.
In the embodiment of the invention, the first terminal sends the first authentication instruction to instruct the second terminal to collect the second identity authentication information of the first user, the second terminal collects the second identity authentication information of the first user according to the first authentication instruction, and the second terminal sends the collected second identity authentication information of the first user to the first terminal.
In the embodiment of the invention, the first terminal receives the communication connection receiving information returned by the second terminal, and the successful communication connection between the first terminal and the second terminal is represented.
Optionally, the second identity authentication information may include information representing a user biometric characteristic, such as a fingerprint, or information that the second terminal may perform identity authentication, such as a camouflage agent of the second terminal, specifically selected according to an actual situation, and the embodiment of the present invention is not specifically limited.
S309, the second terminal collects second identity authentication information according to the first authentication instruction.
In the embodiment of the invention, the second terminal receives the communication connection request with the first terminal and is connected with the first terminal, when the communication connection with the first terminal is successful, the first authentication instruction of the second identity authentication information of the first terminal is received, and the second terminal acquires the second identity authentication information and sends the second identity authentication information to the first terminal.
In the embodiment of the invention, the first authentication instruction is used for instructing the second terminal to acquire the second identity authentication information.
Alternatively, the second authentication information may include information representing a biometric characteristic of the user, such as a fingerprint.
For example, as shown in fig. 3, the user is prompted to input the second identity authentication information on the touch screen of the second terminal, and the user inputs the second identity authentication information into the area specified by the second terminal to complete the collection of the second identity authentication information by the second terminal.
S310, the second terminal sends the second identity authentication information to the first terminal so as to finish the authentication of the second identity authentication information.
In the embodiment of the invention, after the second terminal sends the third biological characteristic information to the first terminal, the identity authentication result sent by the first terminal is received.
It should be noted that, in the embodiment of the present invention, when the second identity authentication information fails, the second terminal prompts to acquire the second identity authentication information again, and when the acquired number of times exceeds the preset acquisition number of times of the second terminal, the communication connection operation with the first terminal is ended.
S311, the first terminal matches the second identity authentication information with a preset identity information base.
In the embodiment of the invention, the first terminal matches the second identity authentication information with third identity authentication information in a preset identity information base.
And S312, when the second identity authentication information is not matched with the preset identity information base, the first terminal sends an authentication failure instruction to the second terminal, and the data transmission operation with the second terminal is finished.
S313, when the second identity authentication information is matched with the preset identity information base, the second identity authentication information corresponding to the second terminal is represented to be successfully authenticated.
It should be noted that S312 and S313 are two execution conditions of S311, and are executed after S311, and S312 and S313 are selected to be executed according to actual situations, and the execution order is not limited in the embodiment of the present invention.
And S314, when the second identity authentication information is successful, the first terminal sends the first data list to be transmitted to the second terminal.
When the second identity authentication information of the second terminal is also successful, the first terminal represents that the users of the two terminals are legal users, and at this time, data transmission between the first terminal and the second terminal can be performed.
In the embodiment of the invention, the first terminal packs the first data to be transmitted into the data packet and sends the data packet to the second terminal.
Optionally, the first data to be transmitted may include a local application installation package, multimedia data such as voice, picture, video, and the like.
For example, the first to-be-transmitted data list is shown in fig. 5, the first to-be-transmitted data is preceded by a box that can be checked, and a user can complete the selection of the first to-be-transmitted data by checking in the box.
In the embodiment of the invention, the first list to be transmitted is stored in the terminal storage area.
And S315, the second terminal receives a selection instruction of the first user.
After the second terminal receives the first to-be-transmitted data list of the first terminal, the second terminal may display the first to-be-transmitted data list to allow the first user to make a selection. When the user selects the content in the data list to be transmitted, namely, the second terminal receives the selection instruction from the first user.
And the first user of the second terminal selects the first data list to be transmitted and generates a selection instruction of the first user.
In the embodiment of the present invention, the selection instruction of the first user is used for the first user to determine the second data list to be transmitted from the first data list to be transmitted.
And S316, the second terminal determines a second data list to be transmitted from the first data list to be transmitted according to the selection instruction of the first user.
After the second terminal receives the selection instruction of the first user, the second terminal can obtain a second data list to be transmitted through the selection instruction of the first user, that is, the second terminal determines the second data list to be transmitted from the first data list to be transmitted according to the selection instruction of the first user.
For example, as shown in fig. 6, the first user checks a second to-be-transmitted data list to be transmitted in a box in front of the first to-be-transmitted data list displayed on the second terminal, that is, a selection instruction of the first user of the second terminal is generated, and when the selection instruction is completed, the "ok" button is clicked, that is, the second terminal completes the determination of the second to-be-transmitted data list (QQ, photo, and video) from the first to-be-transmitted data list.
And S317, the second terminal sends a second data list to be transmitted to the first terminal.
In the embodiment of the invention, the second terminal receives a selection instruction of a first user on the second terminal for the first data list to be transmitted, determines a second data list to be transmitted from the first data list to be transmitted according to the selection instruction of the first user, and then sends the second data list to be transmitted to the first terminal.
S318, the first terminal sends the first to-be-transmitted data corresponding to the second transmission data list to the second terminal.
In the embodiment of the invention, the first terminal packs the received second transmission data list corresponding to the first data to be transmitted and sends the packed data packet to the second terminal.
Optionally, the first data to be transmitted may include a local application installation package, multimedia data such as voice, picture, video, and the like.
In the embodiment of the invention, the second terminal receives the data packet of the first data to be transmitted and performs data recovery or local application installation on the first data to be transmitted.
And S319, disconnecting the second terminal from the first terminal when the data transmission of the first data to be transmitted is finished.
In the embodiment of the invention, the second terminal receives the data packet of the first data to be transmitted, and after the data packet is received, the second terminal is disconnected from the first terminal to recover the first data to be transmitted.
It should be noted that, in the embodiment of the present invention, in the process that the first terminal authenticates the user on the first terminal and the first user on the second terminal, the two users to be authenticated may be the same user or different users, and a specific setting is provided with an actual operation decision, which is not limited in the embodiment of the present invention.
It should be noted that a terminal without faults such as touch screen damage, LCD backlight failure, and the like may also use the method for transmitting data without operating the touch screen of the terminal provided in the embodiment of the present invention, at this time, the terminal may be used as both a receiver and a sender of data to be transmitted, and the specific implementation is implemented according to the requirements of a user, and the embodiment of the present invention is not specifically limited.
It can be understood that the first terminal does not operate the touch screen of the first terminal while performing data transmission with the second terminal, and the first terminal authenticates both the user of the first terminal and the first user of the second terminal before data transmission. Therefore, the safety of data transmission is improved, and the risk of data loss is reduced.
For example, as shown in fig. 7, it is assumed that the first terminal is an a device, the user operating on the first terminal is an a user, the second terminal is a B device, and the user operating on the second terminal is a B user. The method for data transmission between the device a and the device B may be:
1. the a device enters the first mode through a combination of the upper side key and the lower side key.
2. When the device A is in the first mode, the charging indicator lamp flickers to prompt the user A to input fingerprint verification information.
3. And the device A matches the acquired fingerprint information of the user A with a fingerprint template prestored in the device.
4. When the fingerprint verification information acquired by the device A is not matched with the fingerprint template pre-stored in the device A, the charging indicator lamp turns red, and the device A prohibits data transmission.
5. When the fingerprint verification information acquired by the device A is matched with a fingerprint template pre-stored in the device A, the charging indicator lamp turns green, and the device A starts the Bluetooth function to search the device B.
6. The B device turns on the bluetooth function.
7. When the A device searches the B device, the A device transmits a communication connection request to the B device.
8. And the B device sends a response of the communication connection request to establish connection with the A device.
9. After the communication connection between the device A and the device B is successful, the device A prompts the device B to input fingerprints.
10. And the B device collects the fingerprint information of the B user.
11. And the B device sends the fingerprint information of the B user to the A device.
12. And the A equipment matches the fingerprint information of the B user with a fingerprint template prestored in the A equipment.
13. And when the fingerprint information of the B user is not matched with the fingerprint template pre-stored in the A device, the A device forbids to transmit data to the B device and quits the connection.
14. And when the fingerprint information of the user B is matched with a fingerprint template pre-stored in the device A, the device A sends a list A of the options needing to be backed up to the device B.
15. And the B equipment filters the A list and then sends the selected B list to the A equipment.
16. And the device A sends the B installation package corresponding to the B list to the device B.
17. And the device B recovers the data and the application according to the installation package B, transmits a reception completion command of the installation package B to the device A and disconnects the connection.
Example four
As shown in fig. 8, an embodiment of the present invention provides a first terminal 1, where the first terminal 1 may include:
a first determining unit 10, configured to determine that a first mode is a data transmission mode, where the first mode is a mode allowing transmission of data stored in the storage area to the second terminal.
An obtaining unit 11, configured to obtain first authentication information when in the first mode, and authenticate the first authentication information.
A connection unit 12, configured to perform communication connection with the second terminal when the first identity authentication information is successfully authenticated.
A first sending unit 13, configured to determine the first data to be transmitted when the communication connection is successful, and send the first data to be transmitted to the second terminal.
Optionally, based on fig. 8, as shown in fig. 9, the first terminal 1 further includes: the unit 14 is started.
The starting unit 14 is configured to start a communication connection function, and search for a terminal to be connected within a preset threshold range.
The first sending unit 13 is further configured to send a communication connection request to the second terminal when it is determined that the terminal to be connected is the second terminal, so as to implement communication connection with the second terminal.
Optionally, as shown in fig. 10 based on fig. 8, the first terminal 1 further includes: a first authentication unit 15;
the first authentication unit 15 is configured to perform identity authentication on the second terminal.
The first determining unit 10 is further configured to determine the first data to be transmitted when the identity authentication of the second terminal is successful.
Optionally, as shown in fig. 11 based on fig. 8, the first terminal 1 further includes: a first receiving unit 16 and a matching unit 17;
the first sending unit 13 is further configured to send a first authentication instruction, where the first authentication instruction is used to instruct the second terminal to collect second identity authentication information.
The first receiving unit 16 is further configured to receive the second identity authentication information.
The matching unit 17 is configured to match the second identity authentication information with a preset identity information base, and when the second identity authentication information matches third identity authentication information in the preset identity characteristic information base, characterize that the second identity authentication information corresponding to the second terminal is successful.
Optionally, the first sending unit 13 is further configured to send a first to-be-transmitted data list to the second terminal.
The first receiving unit 16 is further configured to receive a second to-be-transmitted data list, where the second to-be-transmitted data list is a list determined after the second terminal selects the first to-be-transmitted data list.
The first sending unit 13 is specifically configured to send the first data to be transmitted corresponding to the second transmission data list to the second terminal.
Optionally, as shown in fig. 12 based on fig. 11, the terminal 1 further includes: and a unit 18 is ended.
The first sending unit 13 is further configured to send an authentication failure instruction to the second terminal when the second identity authentication information is not matched with the third identity authentication information.
The ending unit 18 is configured to end the data transmission operation with the second terminal when the second identity authentication information does not match the third identity authentication information.
Optionally, the first receiving unit 16 is further configured to receive a preset key instruction, and determine that the data transmission mode is the first mode according to the preset key instruction.
Optionally, the matching unit 17 is further configured to match the first identity authentication information with the preset identity information base, and when the first identity authentication information matches fourth identity authentication information in the preset identity information base, represent that the first identity authentication information is successfully authenticated.
The ending unit 18 is further configured to end the data transmission operation when the first identity authentication information does not match the fourth identity authentication information.
As shown in fig. 13, in practical applications, the first determining unit 10, the obtaining unit 11, the connecting unit 12, the starting unit 14, the first authenticating unit 15, the matching unit 17, and the ending unit 18 may be implemented by a processor 19 located on a first terminal, which may be implemented by a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like, the first transmitting unit 13 may be implemented by a transmitter 110, the first receiving unit 16 may be implemented by a receiver 111, and the first terminal further includes: a storage medium 112, the transmitter 110, and the receiver 111 may be connected to the processor 19, wherein the storage medium 112 is used for storing executable program code, the program code comprising computer operating instructions, and the storage medium 112 may comprise a high-speed RAM memory and may further comprise a non-volatile memory, such as at least one disk memory.
As shown in fig. 14, an embodiment of the present invention provides a second terminal 2, where the second terminal 2 may include:
a second receiving unit 20, configured to receive the communication connection request sent by the first terminal.
And a second authentication unit 21, configured to perform second identity authentication information when the communication connection between the first terminal and the second terminal is successful according to the communication connection request.
The second receiving unit 20 is further configured to receive the first data to be transmitted when the second identity authentication information is successful.
Optionally, based on fig. 14, as shown in fig. 15, the second terminal 2 further includes: an acquisition unit 22 and a second transmission unit 23.
The second receiving unit 20 is further configured to receive a first authentication instruction, where the first authentication instruction is used to perform the second identity authentication information.
The acquisition unit 22 is configured to acquire the second identity authentication information according to the first authentication instruction.
The second sending unit 23 is configured to send the second identity authentication information to the first terminal, so as to complete authentication of the second identity authentication information.
Optionally, based on fig. 14, as shown in fig. 16, the second terminal 2 further includes: a second determination unit 24.
The second receiving unit 20 is further configured to receive a first to-be-transmitted data list.
The second receiving unit 20 is further configured to receive a selection instruction of the first user.
The second determining unit 24 is configured to determine a second data list to be transmitted from the first data list to be transmitted according to the selection instruction.
The second sending unit 23 is further configured to send the second to-be-transmitted data list to the first terminal.
The second receiving unit 20 is specifically configured to receive the first data to be transmitted, where the first data to be transmitted is data corresponding to the second data list to be transmitted, where the data to be transmitted is acquired by the first terminal.
As shown in fig. 17, in practical applications, the acquiring unit 22, the second authenticating unit 21, and the second determining unit 24 may be implemented by a processor 25 located on the second terminal, and may be implemented by a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like, the second transmitting unit 23 may be implemented by a transmitter 26, the second receiving unit 20 may be implemented by a receiver 27, and the second terminal further includes: a storage medium 28, the transmitter 26, and the receiver 27 may be coupled to the processor 25, wherein the storage medium 28 is configured to store executable program code comprising computer operating instructions, and the storage medium 28 may comprise a high-speed RAM memory and may further comprise a non-volatile memory, such as at least one disk memory.
In the embodiment of the present invention, data between units of a first terminal and a second terminal are performed interactively, and a specific interaction between the first terminal and the second terminal is as shown in fig. 18, a start unit 14 of the first terminal searches for a terminal to be connected within a preset threshold range, sends a request communication connection instruction to a second receiving unit 20 of the second terminal, the second receiving unit 20 of the second terminal receives the request communication connection instruction of the first terminal, when the two terminals are successfully connected, an acquisition unit 22 of the second terminal sends the acquired second identity authentication information of the first user to a matching unit 16 of the first terminal, after the matching unit 16 completes authentication, the authentication result is sent to an authentication unit 21 of the second terminal, and when the second identity authentication information of the second terminal is successful, the first authentication unit 15 of the first terminal sends the first data list to be transmitted to the determination unit 24 of the second terminal, the second sending unit 23 of the second terminal selects the first data list to be transmitted to form a second data list to be transmitted, and sends the second data list to be transmitted to the first sending unit 13 of the first terminal, and the first sending unit 13 of the first terminal sends the first data to be transmitted to the second terminal.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (14)

1. A data transmission method is applied to a first terminal and comprises the following steps:
determining a first mode as a data transmission mode, wherein the first mode is a mode allowing data stored in the storage area to be transmitted to a second terminal;
when the mobile terminal is in the first mode, acquiring first identity authentication information, and authenticating the first identity authentication information;
when the first identity authentication information is successfully authenticated, performing communication connection with the second terminal;
when the communication connection is successful, determining first data to be transmitted, and sending the first data to be transmitted to the second terminal;
before determining the first data to be transmitted, the method further includes:
performing identity authentication on the second terminal;
the determining the first data to be transmitted includes:
when the identity authentication of the second terminal is successful, determining the first data to be transmitted;
the performing identity authentication on the second terminal includes:
sending a first authentication instruction, wherein the first authentication instruction is used for instructing the second terminal to acquire second identity authentication information;
receiving the second identity authentication information;
matching the second identity authentication information with a preset identity information base, and representing that the identity authentication of the second terminal is successful when the second identity authentication information is matched with third identity authentication information in the preset identity information base;
the determining that the first mode is a data transmission mode includes:
receiving a preset key instruction, and determining that the data transmission mode is the first mode according to the preset key instruction.
2. The method of claim 1, wherein before the establishing the communication connection with the second terminal, the method further comprises:
starting a communication connection function, and searching a terminal to be connected within a preset threshold range;
the establishing of the communication connection with the second terminal includes:
and when the terminal to be connected is determined to be the second terminal, sending a communication connection request to the second terminal to realize communication connection with the second terminal.
3. The method of claim 1, wherein the sending the first data to be transmitted to the second terminal comprises:
sending a first data list to be transmitted to the second terminal;
receiving a second data list to be transmitted, wherein the second data list to be transmitted is a list determined after the second terminal selects the first data list to be transmitted;
and sending the first data to be transmitted corresponding to the second data list to be transmitted to the second terminal.
4. The method of claim 1, wherein after matching the second identity authentication information with the preset identity information base, the method further comprises:
and when the second identity authentication information is not matched with the third identity authentication information, sending an authentication failure instruction to the second terminal, and finishing the data transmission operation with the second terminal.
5. The method of claim 1, wherein authenticating the first authentication information comprises:
matching the first identity authentication information with the preset identity information base;
when the first identity authentication information is matched with fourth identity authentication information in the preset identity information base, representing that the first identity authentication information is successfully authenticated;
and when the first identity authentication information is not matched with the fourth identity authentication information, ending the data transmission operation.
6. A data transmission method, applied to a second terminal, includes:
the method comprises the steps that a first terminal determines that a first mode is a data transmission mode, wherein the first mode is a mode allowing the first terminal to transmit data stored in a storage area to a second terminal;
the first terminal determines that the first mode is a data transmission mode, and the method comprises the following steps:
the first terminal receives a preset key instruction, and determines the data transmission mode to be the first mode according to the preset key instruction;
receiving a communication connection request sent by a first terminal;
when the communication connection with the first terminal is successful according to the communication connection request, authenticating second identity authentication information;
when the second identity authentication information is successfully authenticated, receiving first data to be transmitted;
the performing authentication of the second identity authentication information includes:
receiving a first authentication instruction, wherein the first authentication instruction is used for authenticating the second identity authentication information;
acquiring the second identity authentication information according to the first authentication instruction;
and sending the second identity authentication information to the first terminal to finish the authentication of the second identity authentication information.
7. The method of claim 6, wherein the receiving the first data to be transmitted comprises:
receiving a first data list to be transmitted;
receiving a selection instruction of a first user;
determining a second data list to be transmitted from the first data list to be transmitted according to the selection instruction;
sending the second data list to be transmitted to the first terminal;
and receiving the first data to be transmitted, wherein the first data to be transmitted is data corresponding to the second data list to be transmitted, which is acquired by the first terminal.
8. A first terminal for data transmission, comprising:
a first determination unit configured to determine that a first mode is a data transmission mode, the first mode being a mode allowing transmission of data stored in the storage area to the second terminal;
an acquisition unit configured to acquire first authentication information and authenticate the first authentication information when in the first mode;
a connection unit, configured to perform communication connection with the second terminal when the first identity authentication information is successfully authenticated;
a first sending unit, configured to determine first data to be transmitted when the communication connection is successful, and send the first data to be transmitted to the second terminal;
the terminal further comprises: a first authentication unit;
the first authentication unit is used for performing identity authentication on the second terminal;
the first determining unit is further configured to determine the first data to be transmitted when the identity authentication of the second terminal is successful;
the terminal further comprises: a first receiving unit and a matching unit;
the first sending unit is further configured to send a first authentication instruction, where the first authentication instruction is used to instruct the second terminal to collect second identity authentication information;
the first receiving unit is configured to receive the second identity authentication information;
the matching unit is used for matching the second identity authentication information with a preset identity information base, and when the second identity authentication information is matched with third identity authentication information in the preset identity information base, the identity authentication of the second terminal is represented to be successful;
the first receiving unit is further configured to receive a preset key instruction, and determine that the data transmission mode is the first mode according to the preset key instruction.
9. The terminal of claim 8, wherein the terminal further comprises: a start unit;
the starting unit is used for starting a communication connection function and searching a terminal to be connected within a preset threshold range;
the first sending unit is further configured to send a communication connection request to the second terminal when it is determined that the terminal to be connected is the second terminal, so as to implement communication connection with the second terminal.
10. The terminal of claim 8,
the first sending unit is further configured to send a first to-be-transmitted data list to the second terminal;
the first receiving unit is further configured to receive a second data list to be transmitted, where the second data list to be transmitted is a list determined after the second terminal selects the first data list to be transmitted;
the first sending unit is specifically configured to send the first to-be-transmitted data corresponding to the second to-be-transmitted data list to the second terminal.
11. The terminal of claim 8, wherein the terminal further comprises: an ending unit;
the first sending unit is further configured to send an authentication failure instruction to the second terminal when the second identity authentication information is not matched with the third identity authentication information;
and the ending unit is used for ending the data transmission operation with the second terminal when the second identity authentication information is not matched with the third identity authentication information.
12. The terminal of claim 8,
the matching unit is further used for matching the first identity authentication information with the preset identity information base; when the first identity authentication information is matched with fourth identity authentication information in the preset identity information base, representing that the first identity authentication information is successfully authenticated;
and the ending unit is further used for ending the data transmission operation when the first identity authentication information is not matched with the fourth identity authentication information.
13. A second terminal for data transmission, comprising:
a second receiving unit, configured to receive a communication connection request sent by a first terminal;
the second authentication unit is used for authenticating second identity authentication information when the communication connection with the first terminal is successful according to the communication connection request;
the second receiving unit is further configured to receive first data to be transmitted when the second identity authentication information is successfully authenticated;
the terminal further comprises: the acquisition unit and the second sending unit;
the second receiving unit is further configured to receive a first authentication instruction, where the first authentication instruction is used to authenticate the second identity authentication information;
the acquisition unit is used for acquiring the second identity authentication information according to the first authentication instruction;
the second sending unit is configured to send the second identity authentication information to the first terminal to complete authentication of the second identity authentication information;
the first terminal comprises a first determining unit used for determining that a first mode is a data transmission mode, wherein the first mode is a mode allowing data stored in a storage area to be transmitted to the second terminal;
the first terminal further comprises a first receiving unit, which is used for receiving a preset key instruction and determining the data transmission mode to be the first mode according to the preset key instruction.
14. The terminal of claim 13, wherein the second terminal further comprises: a second determination unit;
the second receiving unit is further configured to receive a first to-be-transmitted data list;
the second receiving unit is further used for receiving a selection instruction of a first user;
the second determining unit is configured to determine a second data list to be transmitted from the first data list to be transmitted according to the selection instruction;
the second sending unit is further configured to send the second to-be-transmitted data list to the first terminal;
the second receiving unit is specifically configured to receive the first data to be transmitted, where the first data to be transmitted is data corresponding to the second data list to be transmitted, where the data to be transmitted is acquired by the first terminal.
CN201710035355.8A 2017-01-17 2017-01-17 Data transmission method and terminal Active CN108319825B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710035355.8A CN108319825B (en) 2017-01-17 2017-01-17 Data transmission method and terminal
PCT/CN2017/115985 WO2018133594A1 (en) 2017-01-17 2017-12-13 Data transmission method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710035355.8A CN108319825B (en) 2017-01-17 2017-01-17 Data transmission method and terminal

Publications (2)

Publication Number Publication Date
CN108319825A CN108319825A (en) 2018-07-24
CN108319825B true CN108319825B (en) 2021-08-06

Family

ID=62891226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710035355.8A Active CN108319825B (en) 2017-01-17 2017-01-17 Data transmission method and terminal

Country Status (2)

Country Link
CN (1) CN108319825B (en)
WO (1) WO2018133594A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111147656A (en) * 2018-11-05 2020-05-12 奇酷互联网络科技(深圳)有限公司 Data interaction method of mobile terminal, mobile terminal and computer storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007110703A (en) * 2005-10-12 2007-04-26 Toshiba Corp Electronic document transmission system, method and program
CN102664893A (en) * 2012-04-23 2012-09-12 重庆理工大学 Adaptive retransmission and signature segmented embedding data transmission method
CN103781068A (en) * 2012-10-18 2014-05-07 中兴通讯股份有限公司 Data transmission method and terminal device
CN103987038A (en) * 2013-02-07 2014-08-13 深圳市快播科技有限公司 Radio communication method and system
CN104202185A (en) * 2014-08-25 2014-12-10 腾讯科技(深圳)有限公司 Backup method and backup device for communication data
CN105426742A (en) * 2015-11-30 2016-03-23 广东小天才科技有限公司 Method and apparatus for connecting mobile terminal with computer
CN106331987A (en) * 2016-08-16 2017-01-11 深圳天珑无线科技有限公司 Contact-based data transmission method, and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100762629B1 (en) * 2003-08-26 2007-10-01 삼성전자주식회사 Method for processing back-up service of mobile terminal
CN106066819A (en) * 2016-05-26 2016-11-02 广东欧珀移动通信有限公司 A kind of method and device of backup information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007110703A (en) * 2005-10-12 2007-04-26 Toshiba Corp Electronic document transmission system, method and program
CN102664893A (en) * 2012-04-23 2012-09-12 重庆理工大学 Adaptive retransmission and signature segmented embedding data transmission method
CN103781068A (en) * 2012-10-18 2014-05-07 中兴通讯股份有限公司 Data transmission method and terminal device
CN103987038A (en) * 2013-02-07 2014-08-13 深圳市快播科技有限公司 Radio communication method and system
CN104202185A (en) * 2014-08-25 2014-12-10 腾讯科技(深圳)有限公司 Backup method and backup device for communication data
CN105426742A (en) * 2015-11-30 2016-03-23 广东小天才科技有限公司 Method and apparatus for connecting mobile terminal with computer
CN106331987A (en) * 2016-08-16 2017-01-11 深圳天珑无线科技有限公司 Contact-based data transmission method, and terminal

Also Published As

Publication number Publication date
WO2018133594A1 (en) 2018-07-26
CN108319825A (en) 2018-07-24

Similar Documents

Publication Publication Date Title
CN104378145B (en) The matching method and system of bluetooth equipment
CN110476316B (en) Management device, management system, vehicle, and program
EP2405622B1 (en) Device communication
CN107437009B (en) Authority control method and related product
CN107040927A (en) Wireless network focus sharing method and device, computer installation and storage medium
WO2017166355A1 (en) Method, device and system for processing information, mobile terminal and smart lock
KR20160120197A (en) Method and apparatus for setting smart device management account
CN108811179B (en) Wireless network connection method, device and storage medium
CN105357214A (en) Remote control method, remote control device, terminal and remote control system
US20120047539A1 (en) Automatic mobile image diary backup and display
US20210012630A1 (en) Theft sensing system for fusion splicer device and fusion splicer device
CN113508609A (en) User-friendly vehicle-mounted Bluetooth pairing scheme
CN105472771A (en) Wireless connection method and device
CN106154997B (en) Vehicle-mounted control device, terminal device, and vehicle control program updating method and system
CN107563712A (en) A kind of mobile terminal punch card method, device, equipment and system
EP2978162A1 (en) Anti-counterfeiting verification method, device and system
CN110719583B (en) Communication method and device
CN105825103A (en) Encryption setting method and decryption starting method of application program and electronic equipment
JP2008306487A (en) Personal identification communication system and program to be executed therein
CN108319825B (en) Data transmission method and terminal
CN109561413B (en) Bluetooth authentication and authorization method and system of BLE equipment
CN105975825A (en) Safety protection method and device, and mobile terminal
CN105744520B (en) Method, device and system for issuing and verifying application service
CN111554013A (en) Access control passing method, device, equipment and storage medium
CN112308569A (en) Application function calling method, device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant