CN108513716A - The method and apparatus for establishing connection - Google Patents

The method and apparatus for establishing connection Download PDF

Info

Publication number
CN108513716A
CN108513716A CN201780005586.2A CN201780005586A CN108513716A CN 108513716 A CN108513716 A CN 108513716A CN 201780005586 A CN201780005586 A CN 201780005586A CN 108513716 A CN108513716 A CN 108513716A
Authority
CN
China
Prior art keywords
terminal
connection
trust
information
request message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780005586.2A
Other languages
Chinese (zh)
Other versions
CN108513716B (en
Inventor
杨俊�
李家欣
刁猛
徐永攀
李凯
钱璟
周耀颖
刁月磊
王众
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN108513716A publication Critical patent/CN108513716A/en
Application granted granted Critical
Publication of CN108513716B publication Critical patent/CN108513716B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive loop type
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Abstract

A kind of method and apparatus for establishing connection, this method include:First terminal obtains the trust information for trusting set of terminal, at least one terminal of the trust set of terminal including the first terminal, can carry out exempting from pairing connection between any two terminal in the trust set of terminal;The first terminal determines second terminal according to the trust information;The first terminal to second terminal send connection establishes request message, the connection establish request message for ask with the second terminal foundation exempt from pairing connect.Trust terminal included in set of terminal by the way that first terminal is determining first, that is, determines which terminal is trusty, and then established between any two terminal in realization trust set of terminal and exempt from pairing connection.To promote user experience.

Description

The method and apparatus for establishing connection
Technical field
This application involves electronic device fields, and more particularly, to the method for establishing connection in electronic device field And device.
Background technology
With the development of science and technology, terminal (Terminal), or also referred to as user equipment (User Equipment, UE) is logical Often with the function of having data transmission.
When carrying out data transmission between two terminals, in view of the security consideration of data transmission, each transmission mode The function of nearly all providing certification pairing, that is, require to be authenticated authentication to terminal.
However, the authentication relationship between terminal in the same family group is trusty, each equipment in terminal It is complexity that is very cumbersome, and can increasing data transmission that pairing is all carried out with some external equipment, influences user's body It tests.
Invention content
This application provides a kind of method and apparatus for establishing connection, can reduce the complexity that equipment room establishes connection, Promote user experience.
In a first aspect, providing a kind of method for establishing connection, this method includes:First terminal, which obtains, trusts set of terminal Trust information, at least one terminal of the trust set of terminal including the first terminal, arbitrary two in the trust set of terminal It can carry out exempting from pairing connection between a terminal;The first terminal determines second terminal according to the trust information;The first terminal To second terminal send connection establish request message, the connection establish request message for ask with the second terminal establish exempt to match To connection.
It is determined first by first terminal and trusts terminal included in set of terminal, that is, determine which terminal is trusted , and then established between any two terminal in realization trust set of terminal and exempt from pairing connection.To promote user experience.
With reference to first aspect, in the first realization method of first aspect, which includes the second terminal.
When the trust set of terminal includes the second terminal, any other one in the trust set of terminal may be implemented Terminal exempts from pairing connection with second terminal foundation.
With reference to first aspect and its above-mentioned realization method, in second of realization method of first aspect, the first terminal Trust information is obtained, including:The first terminal obtains the trust information by logging in high in the clouds.
The trust information is obtained by logging in high in the clouds, any one terminal that may be implemented in the trust set of terminal can High in the clouds is logged in by unified high in the clouds log-on message or obtains the trust information.Promote user experience.
With reference to first aspect and its above-mentioned realization method, in the third realization method of first aspect, the trust terminal Group includes multiple terminals of same user.
The terminal that the trust set of terminal includes can be multiple terminals of same user, that is, can be by same user's Multiple terminals are added to same trust set of terminal, so as to ensure between multiple terminal to be all trusty.
With reference to first aspect and its above-mentioned realization method is connected to establish and be asked in the 4th kind of realization method of first aspect Message is asked to carry in the physical address information of the equipment log-on message of the first terminal, high in the clouds account information and communication module extremely A kind of few information.
Second aspect, provides a kind of method for establishing connection, and this method includes:Second terminal receives first terminal hair Request message is established in the connection sent, the connection establish request message for ask with the second terminal foundation exempt from pairing connect;It should Second terminal establishes request message according to the connection, determines whether the first terminal passes through certification;Pass through this in the first terminal After the certification of second terminal, which exempts from pairing connection with first terminal foundation.
It is determined first by first terminal and trusts terminal included in set of terminal, that is, determine which terminal is trusted , and then established between any two terminal in realization trust set of terminal and exempt from pairing connection.To promote user experience.
In conjunction with second aspect, in the first realization method of second aspect, which asks according to connection foundation Message is sought, whether determines the first terminal by certification, including:The second terminal obtains the trust information for trusting set of terminal, should Trust at least one terminal of the set of terminal including the first terminal, energy between any two terminal in the trust set of terminal It enough carries out exempting from pairing connection;The second terminal establishes request message according to the trust information and the connection of the trust set of terminal, really Whether the fixed first terminal passes through certification.
In conjunction with second aspect and its above-mentioned realization method, in second of realization method of second aspect, the trust terminal Group includes the second terminal.
When the trust set of terminal includes the second terminal, any other one in the trust set of terminal may be implemented Terminal exempts from pairing connection with second terminal foundation.
In conjunction with second aspect and its above-mentioned realization method, in the third realization method of second aspect, the second terminal The trust information for trusting set of terminal is obtained, including:The second terminal obtains the trust information by logging in high in the clouds.
The trust information is obtained by logging in high in the clouds, any one terminal that may be implemented in the trust set of terminal can High in the clouds is logged in by unified high in the clouds log-on message or obtains the trust information.Promote user experience.
In conjunction with second aspect and its above-mentioned realization method, in the 4th kind of realization method of second aspect, the trust terminal Group includes multiple terminals of same user.
The terminal that the trust set of terminal includes can be multiple terminals of same user, that is, can be by same user's Multiple terminals are added to same trust set of terminal, so as to ensure between multiple terminal to be all trusty.
In conjunction with second aspect and its above-mentioned realization method, in the 5th kind of realization method of second aspect, which establishes Request message carries in the physical address information of the equipment log-on message of the first terminal, high in the clouds account information and communication module At least one information.
The third aspect, provides a kind of method for establishing connection, and this method includes:First terminal is carried out with equipment to be connect Authentication processing, to pass through the certification of the equipment to be connected to the first terminal;The first terminal obtains first identifier information;This One terminal sends the first identifier information to the equipment to be connected, so that the equipment to be connected is receiving second terminal transmission Carry the first identifier information connection establish request message after, according to the first identifier information, determine that the second terminal is logical Certification is crossed, and establishes and connects with the second terminal.
Certification is completed with equipment to be connect first by first terminal, and first identifier letter is sent to equipment to be connected Breath, so that equipment to be connected establishes request message in the connection for carrying the first identifier information for receiving second terminal transmission Afterwards, according to the first identifier information, determine that the second terminal is equipment trusty, and exempt from pairing with second terminal foundation and connect It connects, i.e., the second terminal, which does not need user's input username and password, to be successfully established connection with the equipment to be connect, and carry Rise user experience.
In conjunction with the third aspect, in the first realization method of the third aspect, the first identifier information be used to indicate this Two terminals.
By make the first identifier information indicate second terminal so that equipment to be connected receive the first identifier information it Afterwards, according to the first identifier information, it will be able to determine that second terminal needs to establish with equipment to be connect and connect, the connection equipment is only When thering is the connection for carrying the first identifier information for receiving two terminal device transmission to establish request, the request can just be passed through Certification, and establish a connection, to improve reliability and the safety of connection.
In conjunction with the third aspect and its above-mentioned realization method, in second of realization method of the third aspect, this method is also wrapped It includes:
The first terminal sends the first identifier information to the second terminal.
In conjunction with the third aspect and its above-mentioned realization method, in the third realization method of the third aspect, the first identifier Information is used to indicate terminal device set, at least one terminal device of the terminal device set including the first terminal.
A terminal device set is indicated by first identifier information so that any one terminal device in the set Request message is established in the connection that the first identifier information can be carried to equipment to be connected transmission, and the equipment to be connected exists It receives when carrying the connection of the first identifier information and establishing request message, determines by arbitrary in the terminal device set Request is established in the connection of one terminal device, and is established a connection.To promote user experience.
In conjunction with the third aspect and its above-mentioned realization method, in the 4th kind of realization method of the third aspect, the first identifier Information includes the account information or device name information of terminal device.
Fourth aspect, provides a kind of method for establishing connection, and this method includes:Second terminal is sent to equipment to be connected Request message is established in connection, which, which establishes request message and be used to indicate second terminal request and established with the equipment to be connect, connects It connects, which establishes request message and carry the first identifier information, wherein the first identifier information by this by waiting connecting The first terminal of device authentication is sent to the equipment to be connected.
Certification is completed with equipment to be connect first by first terminal, and first identifier letter is sent to equipment to be connected Breath, so that equipment to be connected establishes request message in the connection for carrying the first identifier information for receiving second terminal transmission Afterwards, according to the first identifier information, determine that the second terminal is equipment trusty, and exempt from pairing with second terminal foundation and connect It connects, i.e., the second terminal, which does not need user's input username and password, to be successfully established connection with the equipment to be connect, and carry Rise user experience.
In conjunction with fourth aspect, in the first realization method of fourth aspect, the first identifier information be used to indicate this Two terminals.
By make the first identifier information indicate second terminal so that equipment to be connected receive the first identifier information it Afterwards, according to the first identifier information, it will be able to determine that second terminal needs to establish with equipment to be connect and connect, the connection equipment is only When thering is the connection for carrying the first identifier information for receiving two terminal device transmission to establish request, the request can just be passed through Certification, and establish a connection, to improve reliability and the safety of connection.
In conjunction with fourth aspect, in second of realization method of fourth aspect, this method further includes:
The second terminal receives the first identifier information of first terminal transmission.
In conjunction with fourth aspect, in the third realization method of fourth aspect, which is used to indicate terminal Cluster tool, at least one terminal device of the terminal device set including the first terminal.
A terminal device set is indicated by first identifier information so that any one terminal device in the set Request message is established in the connection that the first identifier information can be carried to equipment to be connected transmission, and the equipment to be connected exists It receives when carrying the connection of the first identifier information and establishing request message, determines by arbitrary in the terminal device set Request is established in the connection of one terminal device, and is established a connection.To promote user experience.
In conjunction with fourth aspect, in the 4th kind of realization method of fourth aspect, which includes terminal device Account information or device name information.
5th aspect provides a kind of method for establishing connection, which is characterized in that this method includes:Equipment to be connected with First terminal is authenticated processing, to pass through the certification to the first terminal;The equipment to be connected receives first terminal transmission First identifier information, and determine that the terminal device for sending the message for carrying the first identifier information is to be set by the terminal of certification It is standby;Request message is established in the connection that the equipment to be connected receives second terminal transmission, which establishes request message for referring to Show that second terminal request is established with the equipment to be connect to connect, which establishes request message and carry first identifier letter Breath;The equipment to be connected establishes request message according to the first identifier information and the connection, establishes and connects with the second terminal.
Certification is completed with equipment to be connect first by first terminal, and first identifier letter is sent to equipment to be connected Breath, so that equipment to be connected establishes request message in the connection for carrying the first identifier information for receiving second terminal transmission Afterwards, according to the first identifier information, determine that the first terminal is equipment trusty, and exempt from pairing with first terminal foundation and connect It connects, i.e., the second terminal, which does not need user's input username and password, to be successfully established connection with the equipment to be connect, and carry Rise user experience.
In conjunction with the 5th aspect, in the first realization method of the 5th aspect, the first identifier information be used to indicate this Two terminals.
By make the first identifier information indicate second terminal so that equipment to be connected receive the first identifier information it Afterwards, according to the first identifier information, it will be able to determine that second terminal needs to establish with equipment to be connect and connect, the connection equipment is only When thering is the connection for carrying the first identifier information for receiving two terminal device transmission to establish request, the request can just be passed through Certification, and establish a connection, to improve reliability and the safety of connection.
In conjunction with the 5th aspect and its above-mentioned realization method, in second of realization method of the 5th aspect, the first identifier Information is used to indicate terminal device set, at least one terminal device of the terminal device set including the first terminal.
A terminal device set is indicated by first identifier information so that any one terminal device in the set Request message is established in the connection that the first identifier information can be carried to equipment to be connected transmission, and the equipment to be connected exists It receives when carrying the connection of the first identifier information and establishing request message, determines by arbitrary in the terminal device set Request is established in the connection of one terminal device, and is established a connection.To promote user experience.
In conjunction with the 5th aspect and its above-mentioned realization method, in the third realization method of the 5th aspect, the first identifier Information includes the account information or device name information of terminal device.
6th aspect provides a kind of device established and connected, including is used to execute above-mentioned first aspect and first party The unit of each step of the method for foundation connection in each realization method in face.
7th aspect provides a kind of device established and connected, including is used to execute above-mentioned second aspect and second party The unit of each step of the method for foundation connection in each realization method in face.
Eighth aspect provides a kind of device established and connected, including is used to execute the above-mentioned third aspect and third party The unit of each step of the method for foundation connection in each realization method in face.
9th aspect provides a kind of device established and connected, including is used to execute above-mentioned fourth aspect and four directions The unit of each step of the method for foundation connection in each realization method in face.
Tenth aspect provides a kind of device established and connected, including is used to execute above-mentioned 5th aspect and the 5th side The unit of each step of the method for foundation connection in each realization method in face.
Tenth on the one hand, provides a kind of equipment for establishing connection, including memory and processor, the memory is for depositing Computer program is stored up, the processor from memory for calling and running the computer program so that on terminal device executes State the method that any one of first aspect and its various realization methods establish connection.
12nd aspect provides a kind of equipment for establishing connection, including memory and processor, and the memory is for depositing Computer program is stored up, the processor from memory for calling and running the computer program so that on the network equipment executes State the method that any one of second aspect and its various realization methods establish connection.
13rd aspect provides a kind of equipment for establishing connection, including memory and processor, and the memory is for depositing Computer program is stored up, the processor from memory for calling and running the computer program so that on the network equipment executes State the method that any one of the third aspect and its various realization methods establish connection.
Fourteenth aspect provides a kind of equipment for establishing connection, including memory and processor, and the memory is for depositing Computer program is stored up, the processor from memory for calling and running the computer program so that on the network equipment executes State the method that any one of fourth aspect and its various realization methods establish connection.
15th aspect provides a kind of equipment for establishing connection, including memory and processor, and the memory is for depositing Computer program is stored up, the processor from memory for calling and running the computer program so that on the network equipment executes State the method that any one of the 5th aspect and its various realization methods establish connection.
16th aspect, provides a kind of computer program product, the computer program product includes:Computer program Code, when the computer program code is run by the processing unit of the network equipment, transmission unit or processor, transmitter, So that the method for executing any one of above-mentioned first aspect and its various realization methods and establishing connection of terminal device.
17th aspect, provides a kind of computer program product, the computer program product includes:Computer program Code, when the computer program code is run by the receiving unit of terminal device, processing unit or receiver, processor, So that the network equipment executes the method that any one of above-mentioned second aspect and its various realization methods establish connection.
18th aspect, provides a kind of computer program product, the computer program product includes:Computer program Code, when the computer program code is run by the receiving unit of terminal device, processing unit or receiver, processor, So that the network equipment executes the method that any one of the above-mentioned third aspect and its various realization methods establish connection.
19th aspect, provides a kind of computer program product, the computer program product includes:Computer program Code, when the computer program code is run by the receiving unit of terminal device, processing unit or receiver, processor, So that the network equipment executes the method that any one of above-mentioned fourth aspect and its various realization methods establish connection.
20th aspect, provides a kind of computer program product, the computer program product includes:Computer program Code, when the computer program code is run by the receiving unit of terminal device, processing unit or receiver, processor, So that the network equipment executes the method that any one of above-mentioned 5th aspect and its various realization methods establish connection.
On the one hand 20th, provides a kind of computer readable storage medium, the computer-readable recording medium storage There are program, described program that terminal device is made to execute any one of above-mentioned first aspect and its various realization methods and establish connection Method.
22nd aspect, provides a kind of computer readable storage medium, the computer-readable recording medium storage There are program, described program that the network equipment is made to execute any one of above-mentioned second aspect and its various realization methods and establish connection Method.
23rd aspect, provides a kind of computer readable storage medium, the computer-readable recording medium storage There are program, described program that the network equipment is made to execute any one of the above-mentioned third aspect and its various realization methods and establish connection Method.
Twenty-fourth aspect provides a kind of computer readable storage medium, the computer-readable recording medium storage There are program, described program that the network equipment is made to execute any one of above-mentioned fourth aspect and its various realization methods and establish connection Method.
25th aspect, provides a kind of computer readable storage medium, the computer-readable recording medium storage There are program, described program that the network equipment is made to execute any one of above-mentioned 5th aspect and its various realization methods and establish connection Method.
Description of the drawings
Fig. 1 is an illustrative interaction figure of the method for the foundation connection of the application.
Fig. 2 be the application cell phone apparatus between shared file Application Program Interface a kind of state schematic diagram.
Fig. 3 be the application cell phone apparatus between shared file Application Program Interface another state schematic diagram.
Fig. 4 is another illustrative interaction figure of the method for the foundation connection of the application.
Fig. 5 is a kind of schematic diagram of state of the Application Program Interface that connection is established with mobile phone hot spot of the application.
Fig. 6 is the schematic diagram of another state of the Application Program Interface that connection is established with mobile phone hot spot of the application.
Fig. 7 is another illustrative interaction figure of the method for the foundation connection of the application.
Fig. 8 is a kind of schematic diagram of state of the Application Program Interface that connection is established with wireless network of the application.
Fig. 9 is a kind of schematic diagram of state of the Application Program Interface that connection is established with bluetooth equipment of the application.
Figure 10 is the schematic diagram of another state of the Application Program Interface that connection is established with wireless network of the application.
Figure 11 is the schematic diagram of another state of the Application Program Interface that connection is established with bluetooth equipment of the application.
Figure 12 is an example schematic block diagram of the device of the foundation connection of the application.
Figure 13 is another illustrative block diagram of the device of the foundation connection of the application.
Figure 14 is another illustrative block diagram of the device of the foundation connection of the application.
Figure 15 is another illustrative block diagram of the device of the foundation connection of the application.
Figure 16 is another illustrative block diagram of the device of the foundation connection of the application.
Figure 17 is an example schematic diagram of the equipment of the foundation connection of the application.
Figure 18 is another illustrative structure chart of the equipment of the foundation connection of the application.
Figure 19 is another illustrative structure chart of the equipment of the foundation connection of the application.
Figure 20 is another illustrative structure chart of the equipment of the foundation connection of the application.
Figure 21 is another illustrative structure chart of the equipment of the foundation connection of the application.
Specific implementation mode
The technical solution of the application can be applied to various terminal device (also referred to as, the users with image display function Equipment), for example, mobile phone, bracelet, tablet computer, laptop, Ultra-Mobile PC (Ultra-Mobile Personal Computer, UMPC), personal digital assistant (Personal Digital Assistant, PDA) equipment, have The handheld device of wireless communication function, computing device or be connected to other processing equipments of radio modem, mobile unit, Wearable device etc., is not limited solely to communication terminal.
Fig. 1 shows the schematic flow chart of the method 100 of the foundation connection according to the application, as shown in Figure 1, this method 100 include:
Below for carrying out exempting from the file-sharing of pairing between any two terminal in same trust set of terminal, to this The technical solution of application illustrates.
S110, first terminal obtain the trust information for trusting set of terminal, and the trust set of terminal is including the first terminal At least one terminal, can carry out exempting from pairing connection between any two terminal in the trust set of terminal.
Optionally, which obtains the trust information by logging in high in the clouds
Specifically, first terminal can log on to high in the clouds acquisition trust information by high in the clouds log-on message.The trust terminal Group includes at least one terminal.Terminal in the trust set of terminal may include the different terminals of same user, can also wrap The terminal (for example, terminal of the logged same high in the clouds account) for including the different home member in the same family, can also wrap The terminal of the friends and family of the same family user is included, the application is not limited in any way this.What the trust set of terminal included appoints It can carry out exempting from pairing connection between two terminals of meaning.
It should be noted that pairing connection of exempting from herein is for a user that is, user is between two terminals The connection procedure process of username and password (for example, input) be not perceive (for example, the screen of terminal will not be to user Frame is played, the bullet frame is for prompting user to input username and password).But for two terminals, between two terminals Pairing process is carried out, the process of the pairing may include automatic matching process (for example, username and password need not be used Family inputs, but automatically enters) either privately owned pairing process or save the pairing process.
After first terminal logs on to high in the clouds, all terminals for logging in the high in the clouds account can be got from high in the clouds Identification information (for example, an example of trust information).The identification information can be the account letter trusted the terminal in set of terminal and shared It ceases (for example, high in the clouds account information), and then first terminal can know same trust set of terminal (for example, trusting the one of set of terminal Example) in included terminal.The identification information can also be that user is the mark letter for trusting each terminal setting in set of terminal Breath.The application is not limited in any way this.
Optionally, the trust information obtained from high in the clouds can also be cached to local store by first terminal, you can with The terminal trusted in set of terminal is determined in the list of the trusted devices stored in local terminal (for example, an example of first terminal) Equipment and the equipment identification information.The application is not limited in any way this.
Optionally, which can also be created by user, i.e., user can establish one on first terminal A trust set of terminal, and the identification information of terminal trusty is added in the trust set of terminal.
For example, first terminal knows the high in the clouds account in terminal 1, terminal 2, terminal 3 and terminal 4 by logging in high in the clouds On all once logged in, and then the first terminal determines that the terminal 1, terminal 2, terminal 3 and terminal 4 are terminal trusty, And further determine that the identification information of four terminals.
It should be understood that being carried out to the acquisition modes for trusting set of terminal for only in such a way that set of terminal is trusted in above-mentioned several acquisitions Illustrate, but the application is not limited to this.Trust set of terminal can also be obtained by other means, and the application does not make this any limit It is fixed.
For example, terminal 1 (for example, an example of first terminal) is had determined that by step S110 in same trust set of terminal Terminal.When the terminal 1 in the trust set of terminal opens file-sharing switch, near the terminal 1 and can be scanned To the same trust set of terminal in the identification information of terminal will be displayed in connectable device module, will be swept The identification information for the non-same terminal for trusting set of terminal retouched is shown in available devices module.As shown in Figure 2.
The terminal of shown identification information includes the terminal belonged in the same trust set of terminal, also same including being not belonging to Terminal in a trust set of terminal.For being not belonging to the same terminal for trusting set of terminal, only found when terminal Switch is opened, and when the terminal is within findable distance range, and the identification information of the terminal can be just displayed on can With in EM equipment module.
For belonging to the same terminal for trusting set of terminal, if same trust finding for the terminal in set of terminal Switch close when, terminal 1 still can be not switched on can find switch the same trust set of terminal in terminal identification information It is shown in connectable device module.
Terminal is selected for the ease of user, when terminal 1 opens file-sharing switch, the end that will scan The identification information at end is shown as presence (for example, the identification information for the terminal that will be scanned is shown using light tone Show).For example, by the terminal 2 scanned (for example, identification information is Yangjun ' Ipad) and terminal 4 (for example, identification information is Liuyang ' Iphone) identification information shown using light tone, can connect shape for informing that user's terminal is currently at State, wherein terminal 2 is the terminal in the same trust set of terminal, and terminal 4 is the non-same terminal trusted in set of terminal.
For the terminal in the same trust set of terminal, if the terminal cannot be currently scanned, by the end The identification information at end be shown as non-presence (such as, it is impossible to the identification information of the terminal being scanned is carried out using dark-coloured Display).For example, by terminal 3 (for example, identification information is Zhangjie ' Ipad) and terminal 5 in the same trust set of terminal The identification information of (for example, identification information is Lihong ' Iphone) is shown using dead color, for informing user's terminal category In the same trust set of terminal, but currently without being scanned.
User can carry out trial connection to the terminal using dark-coloured display, that is, attempt to be sent to file.
Optionally, it if sending successfully, can be marked using " √ " on the left side of the terminal scanned, such as Fig. 3 It is shown, for informing that user's terminal is the equipment trusted in set of terminal, and (that is, for can not in attachable range It was found that but attachable terminal).
Optionally, it after by attempting, when the terminal of the dark-coloured display of the use cannot be connected, can be arrived in scanning The left side of the terminal be marked using "×", for informing that user's terminal is terminal but the current place trusted in set of terminal In not attachable state (that is, for that can not find, not attachable terminal).Can also use "" mark without trial Terminal, for inform the user terminal at present can successful connection be uncertain.
Optionally, the identification information of the terminal, can also be shown as by the terminal of successful connection after being connected for trial Presence (for example, the identification information for the terminal that will be scanned is shown using light tone);For attempting after connecting The terminal of connection failure, the identification information of the terminal can also be shown as non-presence (such as, it is impossible to be scanned The identification information of terminal is shown using dead color).The application is not limited in any way this.
It optionally, can not be can for the terminal that cannot be currently scanned in the same trust set of terminal Link block is shown the terminal (that is, all terminals trusted in set of terminal are all shown in network-connectable module Show);The terminal connecting can also will be established with other-end in the trust set of terminal (terminal cannot be currently scanned) It is shown in network-connectable module.The application is not limited in any way this.
It is alternatively possible to trial connection is carried out to the identification information click of the terminal using dark-coloured display by user, Backstage connection can be carried out by the background application of terminal, the application is not limited in any way this.
Optionally, when terminal 1 open file-sharing switch when, can be by any one communication pair around In can be in join domain terminal be scanned.The application is not limited in any way the communication of end of scan.
Optionally, any one communication can be low-power consumption bluetooth (Bluetooth Low Energy, BLE) scan mode.For the terminal scanned using low-power consumption bluetooth, can be used on the right of the identification information of the terminal Icon is marked, which, which represents, is scanned by low-power consumption bluetooth when the terminal.
It should be understood that it is above-mentioned only by taking low-power consumption bluetooth is scanned the connectable device of surrounding as an example, to connectable device Scan mode illustrate, but the application is not limited to this, and can also be scanned using other scan modes.The application couple This is not limited in any way.
Optionally, when terminal 1 opens file-sharing switch, which starts to be scanned the terminal of surrounding.Wherein, , can also be by the way of WiFi scannings by the way of the mode of scanning can be to be scanned using bluetooth, the application does not appoint this What is limited.
When carrying out file transmission between the terminal and other-end, the mode of Bluetooth transmission may be used, can also adopt With the mode of Email, or the mode of WiFi transmission may be used, does not enumerate herein.The application does not appoint this What is limited.
S120, the first terminal determine second terminal according to the trust information.
Specifically, first terminal is according to the trust information, so that it may trust terminal included in set of terminal to determine.In turn It can determine and need to establish the terminal (for example, second terminal) for exempting from pairing connection with it.
S130, the first terminal send connection to second terminal and establish request message, which establishes request message and be used for Request exempts from pairing connection with second terminal foundation.
Specifically, after terminal 1 determines the identification information for trusting the terminal in set of terminal, so that it may with to second terminal (for example, trusting the terminal in set of terminal) sends file data information.For example, terminal 1 selects bluetooth transmission to be sent out to terminal 2 Send file data information.
First, user is by clicking the identification information of corresponding terminal 2.For example, the same trust terminal when the user clicks When identification information (for example, identification information is Yangjun ' Ipad) of the terminal 2 (for example, an example of second terminal) in group, use The click action at family will triggering terminal 1 to terminal 2 send connection establish request message, which establishes request message and is used for The pairing of exempting from for carrying out bluetooth module with the terminal 2 is needed to connect to 2 instruction terminal 1 of terminal.
Optionally, which establishes the equipment log-on message, high in the clouds account information and communication that request message carries the terminal 1 At least one of physical address information of module information.
Specifically, which establishes the equipment log-on message, high in the clouds account information and communication that request message carries the terminal 1 At least one of physical address information of module information.When request message is established in the connection that terminal 2 receives the terminal 1 transmission Later, so that it may to establish the equipment log-on message, high in the clouds account information and communication that request message carries the terminal 1 according to the connection At least one of physical address information of module information determines the identification information of the terminal 1.
Wherein, which, which establishes request message, can pass through encryption, with prevent the other-end of non-trusted set of terminal to this Terminal 2 sends same connection and establishes request message, and then prevents terminal 2 from carrying out erroneous authentication.Alternatively, same trust set of terminal In any two terminal send connection establish request message after, can be mutually authenticated, determine both whether belong to The same trust set of terminal.The process of above-mentioned encryption or certification can be referred to as safety check.Side of the application to safety check Formula is not limited in any way.
Request message is established in S140, the connection which receives first terminal transmission, which establishes request and disappear Breath exempts from pairing connection for asking with second terminal foundation.
S150, the second terminal establish request message according to the connection, determine whether the first terminal passes through certification.
Optionally, which obtains the trust information for trusting set of terminal, which includes the first terminal At least one terminal inside can carry out exempting from pairing connection between any two terminal in the trust set of terminal;This second Whether terminal establishes request message according to the trust information and the connection of the trust set of terminal, determine the first terminal by recognizing Card.
Specifically, received in terminal 2 transmission of terminal 1 connection establish request message after, and then it needs to be determined that this Whether one terminal can determine whether the first terminal is the same terminal trusted in set of terminal by certification.
Terminal 2 can trust the trust information of set of terminal by acquisition, and then according to the trust information of the trust set of terminal, It determines the identification information of the terminal included by the trust set of terminal, and then determines the identification information of the terminal 1.Meanwhile 2, terminal Request message is established in the connection sent according to terminal 1, determines the identification information that the corresponding terminal of solicited message 1 is established with the connection, When the identification information for the terminal 1 that terminal 2 is determined according to the trust information for trusting set of terminal establishes solicited message with being connect according to this When the identification information of determining terminal 1 is consistent, terminal 2 determines that the terminal 1 is the terminal in same trust group in turn.That is, eventually End 1 is passed through by 2 certification of terminal.
S160, after the first terminal is by the certification of the second terminal, which establishes with the first terminal Exempt from pairing connection.
Specifically, after terminal 1 is passed through by 2 certification of terminal, which determines establishes bluetooth module with the terminal 1 Exempt from pairing connection.When exempting from pairing connection of bluetooth module is established with the terminal 1 when the terminal 2 is determined, by the bluetooth mould of the terminal 2 Pairing connection is exempted from block and the bluetooth module foundation of the terminal 1, when the bluetooth module and the bluetooth module of the terminal 1 of the terminal 2 are exempted from After pairing connection is successfully established, which needs the file data information that sends will be by exempting from the Bluetooth transmission side of pairing Formula is sent to terminal 1.
Optionally, if terminal 1 not over terminal 2 certification when, terminal 2 can refuse terminal 1 connection establish request, i.e., Terminal 2 will not be established with terminal 1 exempts from pairing connection.
Optionally, the terminal which includes can be updated.
It should be noted that the update includes adding new terminal into the trust set of terminal, also include by trust end Terminal in the group of end is deleted and (did not establish the terminal connecting with the terminal for a long time for example, deleting).
For trusting the different terminals that set of terminal includes, for example, ought be for trusting terminal 1 and end in set of terminal For end 2, the first trust group is established in the terminal 1, which includes a bluetooth headset terminal and a hand Ring terminal;The second trust group is established in the terminal 2, which includes a Bluetooth audio device terminal and a bracelet Terminal, the bracelet terminal are identical as the bracelet terminal that the first trust group includes.When terminal 2 is whole by the bracelet in the second trust group When end is deleted, the delete operation of terminal 2 has no effect on terminal included in the first trust group of terminal 1.I.e. when 1 He of terminal When terminal 2 logs on to high in the clouds and synchronizes, the bracelet terminal in the first trust group preserved in high in the clouds will not trust because of second Bracelet terminal in group is deleted and deletes.
Optionally, same some terminal trusted in set of terminal can add another terminal in the trust set of terminal Enter blacklist.For terminal 1, terminal 2 and terminal 3 in the same trust group, for example, terminal 3 is added black name by terminal 1 It is single, at this time when the request of terminal 3 exempts from pairing connection with the foundation of terminal 1, since terminal 3 adds blacklist by terminal 1, Terminal 1 can't exempt from pairing connection request by terminal 3, at this point, terminal 1 can carry out bullet frame to 3 corresponding user of terminal, it should The password that frame is used to that the user to be prompted to input pairing connection is played, when 3 corresponding user of terminal correctly enters the password, terminal 1 It can just establish and connect with the terminal 3.
When terminal 1 asks to exempt from pairing connection with the foundation of terminal 3, since blacklist is not added in terminal 1 by terminal 3, In turn, terminal 3 can exempt to match connection request by terminal 1, and exempt from pairing connection with the foundation of terminal 1.
Optionally, when blacklist is added in terminal 3 by terminal 1, and when the black list information is synchronized to high in the clouds by terminal 1 When, when the other-end (for example, terminal 4) for sharing a high in the clouds log-on message with the terminal 1 logs in the high in the clouds, with the terminal 4 also can be synchronized to local from high in the clouds by the black list information, i.e. terminal 4 can know the particular content of the black list information.That is, By logging in high in the clouds, which will know that terminal 3 is added to blacklist.Optionally, one is trusted in set of terminal For terminal, each terminal can be established with some other external equipment and be connected.
It should be noted that the external equipment can be the terminal for not having login function.For example, the external equipment can be with It is the terminals such as bluetooth headset, wireless router or bracelet.
For example, the terminal 1 in trust set of terminal is established with external equipment wireless router and is connect.For the same trust For terminal 2 or terminal 3 in set of terminal, the terminal 2 or terminal 3 can be established with the external equipment wireless router and exempt to match To connection.
Further for example, the terminal 2 in trust set of terminal is established with external equipment bluetooth headset and is connect.For the same trust For terminal 1 or terminal 3 in set of terminal, the terminal 1 or terminal 3 can be established with the external equipment bluetooth headset and exempt to match Connection.
It should be noted that it is above-mentioned it is same trust set of terminal in terminal device can be mobile phone terminal, handheld terminal and Any one terminal in bracelet terminal.The application is not limited in any way this.
Therefore, the method for the foundation connection of the application is determined by first terminal first included by trusting in set of terminal Terminal determines which terminal is trusty, and then established between any two terminal in realization trust set of terminal and exempt to match To connection.To promote user experience.
Fig. 4 shows the schematic flow chart of the method 200 of the foundation connection according to the application, as shown in figure 4, this method 200 include:
Below for carrying out exempting from the hot spot connection of pairing between any two terminal in same trust set of terminal, to this The technical solution of application illustrates.
S210, first terminal obtain the trust information for trusting set of terminal, and the trust set of terminal is including the first terminal At least one terminal, can carry out exempting from pairing connection between any two terminal in the trust set of terminal.
Optionally, which obtains the trust information by logging in high in the clouds
Specifically, first terminal can log on to high in the clouds acquisition trust information by high in the clouds log-on message.The trust terminal Group includes at least one terminal.Terminal in the trust set of terminal may include the different terminals of same user, can also wrap The terminal (for example, terminal of the logged same high in the clouds account) for including the different home member in the same family, can also wrap The terminal of the friends and family of the same family user is included, the application is not limited in any way this.What the trust set of terminal included appoints It can carry out exempting from pairing connection between two terminals of meaning.
It should be noted that pairing connection of exempting from herein is for a user that is, user is between two terminals The connection procedure process of username and password (for example, input) be not perceive (for example, the screen of terminal will not be to user Frame is played, the bullet frame is for prompting user to input username and password).But for two terminals, between two terminals Pairing process is carried out, the process of the pairing may include automatic matching process (for example, username and password need not be used Family inputs, but automatically enters) either privately owned pairing process or save the pairing process.
After first terminal logs on to high in the clouds, all terminals for logging in the high in the clouds account can be got from high in the clouds Identification information (for example, an example of trust information).The identification information can be the account letter trusted the terminal in set of terminal and shared It ceases (for example, high in the clouds account information), and then first terminal can know same trust set of terminal (for example, trusting the one of set of terminal Example) in included terminal.The identification information can also be that user is the mark letter for trusting each terminal setting in set of terminal Breath.The application is not limited in any way this.
Optionally, the trust information obtained from high in the clouds can also be cached to local store by first terminal, you can with The terminal trusted in set of terminal is determined in the list of the trusted devices stored in local terminal (for example, an example of first terminal) Equipment and the equipment identification information.The application is not limited in any way this.
Optionally, which can also be created by user, i.e., user can establish one on first terminal A trust set of terminal, and the identification information of terminal trusty is added in the trust set of terminal.
For example, first terminal knows the high in the clouds account in terminal 1, terminal 2, terminal 3 and terminal 4 by logging in high in the clouds On all once logged in, and then the first terminal determines that the terminal 1, terminal 2, terminal 3 and terminal 4 are terminal trusty, And further determine that the identification information of four terminals.
It should be understood that being carried out to the acquisition modes for trusting set of terminal for only in such a way that set of terminal is trusted in above-mentioned several acquisitions Illustrate, but the application is not limited to this.Trust set of terminal can also be obtained by other means, and the application does not make this any limit It is fixed.
S220, the first terminal determine second terminal according to the trust information.
Specifically, first terminal is according to the trust information, so that it may trust terminal included in set of terminal to determine.In turn It can determine and need to establish the terminal (for example, second terminal) for exempting from pairing connection with it.
S230, the first terminal send connection to second terminal and establish request message, which establishes request message and be used for Request exempts from pairing connection with second terminal foundation.
Specifically, after first terminal determines the identification information for trusting the terminal in set of terminal, so that it may with to second Terminal (for example, trusting the terminal in set of terminal) sends connection and establishes request message, which establishes request message for asking The hot spot for exempting to match is established with the second terminal to connect.
For example, include four terminals of same user in the trust set of terminal, respectively terminal 1, terminal 2, terminal 3 with And terminal 4.
It, can be with when terminal 1 (for example, an example of first terminal), which needs to establish with the hot spot of the terminal near other, to be connected Wireless network switch is opened, at this time by the terminal in the terminal 1 and the same trust set of terminal that can be scanned The wireless network setting interface that identification information will be displayed on the terminal 1 connects hot spot module, will be scanned It is non-it is same trust set of terminal terminal identification information be shown in the terminal 1 wireless network setting interface available network Module.As shown in Figure 5.
The terminal of shown identification information includes the terminal belonged in the same trust set of terminal, also same including being not belonging to Terminal in a trust set of terminal.For being not belonging to the same terminal for trusting set of terminal, only found when terminal Switch is opened, and when the terminal is within findable distance range, and the identification information of the terminal can be just displayed on can With in network module.
For belonging to the same terminal for trusting set of terminal, if same trust finding for the terminal in set of terminal Switch close when, terminal 1 still can be not switched on can find switch the same trust set of terminal in terminal identification information It is shown in connectable device module.
The selection for the terminal that hot spot module is shown can be connected for the ease of user couple, the mark for the terminal that will be scanned Presentation of information is presence (for example, the identification information for the terminal that will be scanned is shown using light tone).For example, will The terminal 2 (for example, identification information is Yangjun ' Iphone) and terminal 3 scanned is (for example, identification information is Liuyang ' Ipad identification information) shown using light tone, can connection status for informing that user's terminal is currently at, wherein eventually End 2 is the terminal in the same trust set of terminal, and terminal 3 is the non-same terminal trusted in set of terminal.
For the terminal in the same trust set of terminal, if the terminal cannot be currently scanned, by the end The identification information at end be shown as non-presence (such as, it is impossible to the identification information of the terminal being scanned is carried out using dark-coloured Display).For example, by the mark of the terminal 4 (for example, identification information is Zhangjie ' Iphone) in the same trust set of terminal Information is shown using dead color, for informing that user's terminal belongs to the same trust set of terminal, but currently without scanned It arrives.
User can carry out trial connection to the terminal using dark-coloured display, that is, attempt to establish a connection.
Optionally, it if successful connection, can be marked using " √ " on the left side of the terminal scanned, such as Fig. 6 It is shown, for informing that user's terminal is the equipment trusted in set of terminal, and (that is, for can not in attachable range It was found that but attachable terminal).
Optionally, it after by attempting, when the terminal of the dark-coloured display of the use cannot be connected, can be arrived in scanning The left side of the terminal be marked using "×", for informing that user's terminal is terminal but the current place trusted in set of terminal In not attachable state (that is, for that can not find, not attachable terminal).Can also use "" mark without trial Terminal, for inform the user terminal at present can successful connection be uncertain.
Optionally, the identification information of the terminal, can also be shown as by the terminal of successful connection after being connected for trial Presence (for example, the identification information for the terminal that will be scanned is shown using light tone);For attempting after connecting The terminal of connection failure, the identification information of the terminal can also be shown as non-presence (such as, it is impossible to be scanned The identification information of terminal is shown using dead color).The application is not limited in any way this.
It optionally, can not be can for the terminal that cannot be currently scanned in the same trust set of terminal Link block is shown the terminal (that is, all terminals trusted in set of terminal are all shown in network-connectable module Show);The terminal connecting can also will be established with other-end in the trust set of terminal (terminal cannot be currently scanned) It is shown in network-connectable module.The application is not limited in any way this.
It is alternatively possible to trial connection is carried out to the identification information click of the terminal using dark-coloured display by user, Backstage connection can be carried out by the background application of terminal, the application is not limited in any way this.
Optionally, when terminal 1 open wireless network switch when, can be by any one communication pair around In can be in join domain terminal be scanned.The application is not limited in any way the communication of end of scan.
Optionally, any one communication can be low-power consumption bluetooth (Bluetooth Low Energy, BLE) scan mode.For the terminal scanned using low-power consumption bluetooth, can be used on the right of the identification information of the terminal Icon is marked, which, which represents, is scanned by low-power consumption bluetooth when the terminal.
It should be understood that it is above-mentioned only by taking low-power consumption bluetooth is scanned the connectable device of surrounding as an example, to connectable device Scan mode illustrate, but the application is not limited to this, and can also be scanned using other scan modes.The application couple This is not limited in any way.
After the identification information of attachable terminal, which is displayed on, to be connected in hot spot module, terminal 1 is (for example, first An example of terminal) heat that the terminal in the same trust set of terminal in hot spot module exempt from pairing can be connected to this Point is connected to.
First, the identification information that user passes through the corresponding terminal of click.For example, the same trust set of terminal when the user clicks In terminal 2 (for example, an example of second terminal) identification information (Yangjun ' Iphone) when, the click action of user is just Meeting triggering terminal 1 sends connection to terminal 2 and establishes request message, which establishes request message and be used for 2 instruction terminal 1 of terminal The hot spot for the terminal 2 exempt from pairing is needed to connect.
Optionally, which establishes the equipment log-on message, high in the clouds account information and communication that request message carries the terminal 1 At least one of physical address information of module information.
Specifically, which establishes the equipment log-on message, high in the clouds account information and communication that request message carries the terminal 1 At least one of physical address information of module information.When request message is established in the connection that terminal 2 receives the terminal 1 transmission Later, so that it may to establish the equipment log-on message, high in the clouds account information and communication that request message carries the terminal 1 according to the connection At least one of physical address information of module information determines the identification information of the terminal 1.
Wherein, which, which establishes request message, can pass through encryption, with prevent the other-end of non-trusted set of terminal to this Terminal 2 sends same connection and establishes request message, and then prevents terminal 2 from carrying out erroneous authentication.Alternatively, same trust set of terminal In any two terminal send connection establish request message after, can be mutually authenticated, determine both whether belong to The same trust set of terminal.The process of above-mentioned encryption or certification can be referred to as safety check.Side of the application to safety check Formula this be not limited in any way.
Request message is established in S240, the connection which receives first terminal transmission, which establishes request and disappear Breath exempts from pairing connection for asking with second terminal foundation.
S250, the second terminal establish request message according to the connection, determine whether the first terminal passes through certification.
Optionally, which obtains the trust information for trusting set of terminal, which includes the first terminal At least one terminal inside can carry out exempting from pairing connection between any two terminal in the trust set of terminal;This second Whether terminal establishes request message according to the trust information and the connection of the trust set of terminal, determine the first terminal by recognizing Card.
Specifically, received in terminal 2 transmission of terminal 1 connection establish request message after, and then it needs to be determined that this Whether one terminal can determine whether the first terminal is the same terminal trusted in set of terminal by certification.
Terminal 2 can trust the trust information of set of terminal by acquisition, and then according to the trust information of the trust set of terminal, It determines the identification information of the terminal included by the trust set of terminal, and then determines the identification information of the terminal 1.Meanwhile 2, terminal Request message is established in the connection sent according to terminal 1, determines the identification information that the corresponding terminal of solicited message 1 is established with the connection, When the identification information for the terminal 1 that terminal 2 is determined according to the trust information for trusting set of terminal establishes solicited message with being connect according to this When the identification information of determining terminal 1 is consistent, terminal 2 determines that the terminal 1 is the terminal in same trust group in turn.That is, eventually End 1 is passed through by 2 certification of terminal.
S260, after the first terminal is by the certification of the second terminal, which establishes with the first terminal Exempt from pairing connection.
Specifically, after terminal 1 is passed through by 2 certification of terminal, which determines the heat established with the terminal 1 and exempt from pairing Point connection.The terminal 2 establishes the instruction of request message according to connection, opens hot spot immediately, and by the user name of the hot spot and close Code is sent to the terminal 1, to make the terminal 2 and the hot spot foundation of the terminal 1 exempt from pairing connection, i.e., user need not input The username and password of the hot spot of the terminal 2, so that it may be connect with being successfully established with the hot spot of the terminal 2.
Optionally, if terminal 1 not over terminal 2 certification when, terminal 2 can refuse terminal 1 connection establish request, i.e., Terminal 2 will not be established with terminal 1 exempts from pairing connection.
It should be noted that it is above-mentioned only with user by clicking the identification information of terminal to be connected, it triggers this and waits for connection eventually Hot spot switch is opened at end, and for the corresponding username and password of the hot spot is sent to distant terminal, pair with terminal to be connect The mode for exempt from pairing connection illustrates, but the application is not limited to this.
It can also carry out exempting from pairing connection with terminal to be connect by other means, for example, by sending out to terminal to be connected Send short message (for example, sending short message) so that username and password is equally sent in a manner of short message by terminal to be connected Distant terminal exempts from pairing connection to be established between the distant terminal.The application is not limited in any way this.
It should also be noted that, the above-mentioned same terminal device trusted in set of terminal can be mobile phone terminal, handheld terminal With any one terminal in bracelet terminal.The application is not limited in any way this.
Therefore, the method for the foundation connection of the application is determined by first terminal first included by trusting in set of terminal Terminal determines which terminal is trusty, and then established between any two terminal in realization trust set of terminal and exempt to match To connection.To promote user experience.
Another embodiment of the technical solution of the application is illustrated below.Fig. 7 is shown according to the another of the application The schematic flow chart of the method 300 of the foundation connection of embodiment, as shown in fig. 7, this method 300 includes:
S310, first terminal equipment are authenticated processing with equipment to be connect, with by the equipment to be connected to this first The certification of terminal device.
S320, equipment to be connected is authenticated processing with first terminal equipment, with by recognizing the first terminal equipment Card.Below using the first terminal as cell phone apparatus, the equipment to be connected be wireless router for, to step S310 and S320 into Row explanation.
It is non-limiting as example.For the wireless network of one family, when one of kinsfolk is (following Referred to as the first user) when accessing wireless network for the first time by first terminal (for example, first cell phone apparatus), need into mobile phone Simultaneously open wireless network in the setting interface of WLAN.After the wireless network is opened, the first cell phone apparatus starts pair Wireless network around present position is scanned, and includes the setting in wireless network by the title of the wireless network scanned In the available network module at interface, available network module shows the title for the wireless network that Current ambient can scan Show, as shown in Figure 8.
In the title for all wireless networks that first user shows in available network module, first click on what needs connected The title of wireless network.For example, it is WirelessNet that the first user, which needs the wireless network name that connects, for for the first time with this Wireless network WirelessNet establishes first cell phone apparatus of connection, when first cell phone apparatus is in available network module point It hits after wireless network WirelessNet, at this point, the connection that wireless router will receive first cell phone apparatus transmission is established Request message, wireless router are established request message to the connection and are judged, it is corresponding to determine that request message is established in the connection Secondary established with the wireless router connects headed by first cell phone apparatus, and the wireless router can trigger first mobile phone and set at this time It is standby that the password that the first user inputs wireless network WirelessNet is prompted by display interface, when the first user correctly enters When the password of the wireless network, which could establish with the wireless network and connect.That is, first cell phone apparatus is logical The certification for crossing the wireless router is successfully established with the wireless router and connect.
Further for example, using the first terminal as cell phone apparatus, for which is bluetooth equipment, to step S310 and S320 is illustrated.
It is non-limiting as example, it is illustrated by taking the cell phone apparatus connection bluetooth equipment in family as an example, which sets Standby can be Bluetooth audio device.When in kinsfolk a member (hereinafter referred to as " the first user ") first passage first terminal (for example, First cell phone apparatus) with the Bluetooth audio device establish connect when, which is first turned on the switch of the Bluetooth audio device, make its into Enter operating mode.Interface is arranged in the bluetooth that first user enters first cell phone apparatus, and opens the Bluetooth function of mobile phone, at this time The bluetooth equipment that can be attached will be shown in the available devices module at bluetooth setting interface of the first cell phone apparatus.
First user clicks the corresponding title of Bluetooth audio device in available devices module, for example, the title of the Bluetooth audio device For " YOYO ", then the first user click " YOYO " in the available devices module at bluetooth setting interface, the Bluetooth audio device will receive Request message is established in the connection that first cell phone apparatus is sent, which establishes request message according to the connection, and determining should It is secondary headed by first cell phone apparatus to establish a connection.The Bluetooth audio device can trigger first cell phone apparatus and pass through mobile phone screen at this time User is prompted to input pairing password, as shown in Figure 9.The password can be the initial password of Bluetooth audio device.When the first user is correct When inputting the pairing password of the Bluetooth audio device, then with the Bluetooth audio device successful matching, i.e. first cell phone apparatus passes through the bluetooth The certification of sound equipment.
S330, the first terminal obtain first identifier information.
It is non-limiting as example.Specifically, this is waited in first terminal (for example, the first cell phone apparatus) first passage After the certification for connecting equipment (for example, wireless router or Bluetooth audio device).First terminal obtains first identifier information.
For example, the first identifier information can be the information that the first terminal generates at random.
Further for example, the first identifier information can also be the information based on system configuration, you can be in the same family The information that terminal device is all known each other.
For another example the first identifier information can also be the equipment log-on message of the first terminal, high in the clouds account information and At least one of physical address information of communication module information.The application is not limited in any way this.
S340, the first terminal send the first identifier information to the equipment to be connected, so that the equipment to be connected is connecing Receive second terminal transmission carry the first identifier information connection establish request message after, according to the first identifier believe Breath, determines the second terminal by certification, and establishes and connect with the second terminal.
S350, the equipment to be connected receive the first terminal and send first identifier information, and determine send carry this The terminal device of the message of one identification information is the terminal device by certification.
S360, second terminal send connection to equipment to be connected and establish request message, which establishes request message and be used for It indicates that second terminal request is established with the equipment to be connect to connect, which establishes request message and carry first identifier letter Breath, wherein the first identifier information by the first terminal of the certification of the equipment to be connected by being sent to the equipment to be connected.
Request message is established in S370, the connection which receives second terminal transmission, which establishes request Message is used to indicate second terminal request and equipment connect foundation connection, the connection establish request message carry this One identification information.
S380, which establishes request message according to the first identifier information and the connection, with the second terminal Establish connection.
For example, using the first terminal and the second terminal as cell phone apparatus, equipment connect for for wireless router, Step S340 to step S380 is illustrated.
It is non-limiting as example.For the wireless network of one family, when member is logical one of in family Cross first terminal (for example, first cell phone apparatus) access wireless network (for example, entitled WirelessNet of the wireless network) Later, which obtains first identifier information, for example, the first identifier information is the information based on system configuration, All cell phone apparatus i.e. in family all know the first identifier information, and the first identifier information is first cell phone apparatus Device name information, for example, the device name information of first cell phone apparatus is Liujiang ' Iphone.
The first identifier information is sent to wireless router by first cell phone apparatus so that the wireless router is receiving To other cell phone apparatus (for example, second cell phone apparatus) in family, what is sent for the first time carry the connection of the first identifier information When establishing request message, i.e., second cell phone apparatus is established with the wireless router and is connected for the first time.The wireless router will The first identifier information that request message carrying is established according to the connection determines that second cell phone apparatus is setting by certification It is standby, you can the cell phone apparatus of trust.At this point, the wireless router can allow second cell phone apparatus foundation to exempt from pairing connection, I.e. second cell phone apparatus can not need user's input username and password and just have access to wireless network.
At this point, in these cases, when second cell phone apparatus enters the setting interface of WLAN and opens wireless When network, which starts the wireless network that is scanned, and will scan to the wireless network around present position The title of network is shown in the available network module at the setting interface of wireless network.For being authenticated to the first cell phone apparatus Wireless network WirelessNet for, when second cell phone apparatus is clicked in the network name that available network module is shown When wireless network WirelessNet, the wireless router just will receive second cell phone apparatus transmission carry first identifier Request message is established in the connection of information (Liujiang ' Iphone), which establishes request message according to the connection and take The first identifier information (Liujiang ' Iphone) of band determines that second cell phone apparatus is equipment trusty, can be built with it It is vertical to exempt from pairing connection.
At this point, when wireless router determines that second cell phone apparatus is terminal device trusty, wireless router is just Second cell phone apparatus can be needed the title WirelessNet of the wireless network connected to be shown in the setting interface of wireless network Network-connectable module, as shown in Figure 10, to indicate to the user that the wireless network is to exempt from pairing connection network, i.e. user does not need User, which inputs username and password, can be successfully accessed network, promote user experience.And exempt from second cell phone apparatus foundation Pairing connection, when second cell phone apparatus is successfully established with the wireless router to be connect, what network-connectable module was shown should The left side of wireless network WirelessNet just will appear successful connection mark, to indicate to the user that and wireless router success Pairing connection is exempted from foundation, promotes user experience.
Optionally, which is used to indicate the second terminal.
For example, using the first terminal and the second terminal as cell phone apparatus, the equipment to be connected is for wireless router It illustrates.
It is non-limiting as example.When the wireless router receives the first terminal (for example, first cell phone apparatus) hair When the first identifier information sent, for example, the first identifier information is the account information of first cell phone apparatus.Due to first mark Know information and is used to indicate the second terminal (for example, second cell phone apparatus).I.e. only when the wireless router receives the second-hand When request message is established in the connection for carrying the first identifier information (account information of the first cell phone apparatus) of machine equipment transmission, The second terminal can be just allowed to carry out exempting from pairing connection.Therefore, when other cell phone apparatus (for example, third cell phone apparatus) are to the nothing When request message is established in line router transmission connection, even if the connection that the third cell phone apparatus is sent is established request message and is carried The first identifier information, can not wireless network WirelessNet corresponding with wireless router foundation exempt from pairing connection.
Optionally, which sends the first identifier information to the second terminal.
For example, using the first terminal and the second terminal as cell phone apparatus, the equipment to be connected is for wireless router It illustrates.
It is non-limiting as example.The first terminal (for example, first cell phone apparatus) sends the first mark to wireless router Know information, for example, the first identifier information is the information that the first cell phone apparatus generates at random, only first cell phone apparatus is known The particular content of the first identifier information.Therefore, first cell phone apparatus to the wireless router in addition to that will send first mark Know information, it is also necessary to send to the second terminal (for example, second cell phone apparatus) for exempting from pairing connection is established with the wireless router The first identifier information so that the wireless router and second cell phone apparatus all know the first identifier information.
At this point, working as second cell phone apparatus sends the connection foundation for carrying the first identifier information to the wireless router When request message, which establishes request message when receiving the connection and establishing request message, by the connection and carries The first identifier information, determine and request established by the connection of second cell phone apparatus, and established with second cell phone apparatus Exempt from pairing connection.
Optionally, which is sent to cloud space by the first identifier information.
Specifically, the first identifier information of acquisition is sent to cloud space by the first terminal, other are needed and the company of waiting for Connect equipment establish exempt from pairing connection terminal device (for example, second terminal) the first identifier information can be obtained from cloud space. Without the first terminal first identifier information is sent to the second terminal.
For example, the first identifier information is uploaded to first mobile phone and set by the first terminal (for example, first cell phone apparatus) Standby cloud space, and the log-on message in the cloud space (for example, login account information and login password information) is shared to second Terminal (for example, second cell phone apparatus).Second cell phone apparatus need with when connect equipment foundation exempt to match connect when, can be with It is stored to local from the cloud space by first identifier synchronizing information, and first mark is carried to the equipment transmission to be connected Request message is established in the connection for knowing information.
Further for example, the first identifier information of acquisition is sent to cloud sky by the first terminal (for example, first cell phone apparatus) Between, and the second terminal (for example, second cell phone apparatus) shares the log-on message in a cloud space with first cell phone apparatus.This When, which need not send the first identifier information to second cell phone apparatus, which can be with Directly stored to local from cloud space by the first identifier synchronizing information, and send to equipment connect carry this first Request message is established in the connection of identification information.
It is above using the first terminal and the second terminal as cell phone apparatus, which is that wireless router is Example, illustrates step S340 to step S380.
Below will using the first terminal and the second terminal as cell phone apparatus, equipment connect for for bluetooth equipment, Step S340 to step S380 is illustrated.
When a member in family by first terminal (for example, first cell phone apparatus) and the bluetooth equipment (for example, blue Tooth sound equipment) it establishes after connection, which obtains first identifier information.For example, the first identifier information be based on The information of system configuration, i.e., all cell phone apparatus in family all know the first identifier information.
The first identifier information is sent to bluetooth equipment by first cell phone apparatus so that the bluetooth equipment is got home in reception The connection that other cell phone apparatus (for example, second cell phone apparatus) in front yard were sent for the first time carry the first identifier information is established When request message, i.e., second cell phone apparatus is established with the bluetooth equipment and is connected for the first time.The bluetooth equipment will be according to the company The first identifier information for establishing request message carrying is connect, determines that second cell phone apparatus is the equipment by certification, you can letter The cell phone apparatus appointed.At this point, the bluetooth equipment can allow second cell phone apparatus foundation to exempt from pairing connection, i.e. second mobile phone Equipment, which can not need user's input username and password, to establish connection with the Bluetooth audio device.
At this point, in these cases, when another member (hereinafter referred to as " second user ") in kinsfolk passes through second When terminal (for example, second cell phone apparatus) needs are connect for the first time with the Bluetooth audio device, second user is first turned on the bluetooth The switch of sound equipment makes it into operating mode, and enters the bluetooth setting interface of mobile phone and open the Bluetooth function of mobile phone.
The title of the bluetooth equipment in operating mode around the first cell phone apparatus corresponding with the first user is just at this time It can be displayed in the available devices module at bluetooth setting interface, as shown in figure 11.For with the first cell phone apparatus It established for the Bluetooth audio device " YOYO " of connection, when the bluetooth equipment that second cell phone apparatus is shown in available devices module When clicking Bluetooth audio device " YOYO " in title, the Bluetooth audio device just will receive second cell phone apparatus transmission carry first Request message is established in the connection of identification information, and the first identifier which establishes request message carrying according to the connection is believed Breath determines that second cell phone apparatus is equipment trusty, can be established with it and exempt from pairing connection.
At this point, when bluetooth equipment determines that second cell phone apparatus is terminal device trusty, bluetooth equipment will be The title YOYO for the Bluetooth audio device that second cell phone apparatus needs connect is shown in the connectable device at the setting interface of wireless network Module, to indicate to the user that the bluetooth equipment is to exempt from pairing connection equipment, i.e., user need not input pairing password can be at Work(is established with the Bluetooth audio device and is connected, and user experience is promoted.And with second cell phone apparatus foundation exempt from pairing connection, when this second Cell phone apparatus is successfully established with the bluetooth equipment when connecting, the left side of the title YOYO of the Bluetooth audio device of connectable device module It just will appear successful connection mark, exempt from pairing connection to indicate to the user that be successfully established with the bluetooth equipment, promote user's body It tests.
Optionally, what the device name or network-connectable module that can also be shown to attachable EM equipment module were shown sets Standby title is labeled, this is noted for indicating whether the equipment or network can currently connect.As it is possible that before certain The equipment or network connected be not currently in it is attachable within the scope of, device name that attachable EM equipment module is shown Or the device name that network-connectable module is shown is labeled so that user is very clear to current connectable device, promotion is used It experiences at family.
Optionally, the equipment for connecting before certain, if its be not currently in it is attachable within the scope of when, user It can the equipment that shows of the device name that is temporarily shown from attachable EM equipment module of the terminal device or network-connectable module It is deleted in title, to the terminal device for facilitating user to select to need to connect, avoids the feelings that cannot be successfully connected occur after clicking Condition promotes user experience.
It should be understood that the above citing is only to schematically illustrate, any restriction is not constituted to the application.
Therefore, the method for the foundation connection of the application completes certification with equipment to be connect first by first terminal, and To equipment to be connected send first identifier information so that equipment connect receive second terminal send carry this first After request message is established in the connection of identification information, according to the first identifier information, determine that the first terminal is equipment trusty, And with the first terminal foundation exempt from pairing connection, i.e., the second terminal do not need user input username and password can be with this Equipment to be connected is successfully established connection, promotes user experience.
Figure 12 is the schematic block diagram according to the device 400 of the foundation connection of the application.As shown in figure 12, the device 400 Including processing unit 410 and transmission unit 420.
Wherein, processing unit 410 obtains the trust information for trusting set of terminal for device, the trust set of terminal include this At least one terminal including one terminal can carry out exempting from pairing connection between any two terminal in the trust set of terminal;
The processing unit 410 is additionally operable to the device according to the trust information, determines second terminal.
Transmission unit 420 sends connection to second terminal for the device and establishes request message, which establishes request and disappear Breath exempts from pairing connection for asking with second terminal foundation.
Optionally, which includes the second terminal.
Optionally, which is additionally operable to the device and obtains the trust information by logging in high in the clouds.
Optionally, which includes multiple terminals of same user.
Optionally, the connection establish request message carry the equipment log-on message of the first terminal, high in the clouds account information and At least one of physical address information of communication module information.
It should be understood that the first terminal in the present processes can correspond to according to the device 400 of the foundation connection of the application, And above and other operation and/or function of each unit in the device 400 of foundation connection is respectively for implementation method 100 The corresponding flow with the first terminal in method 200, for sake of simplicity, details are not described herein.
Therefore, the device of the foundation connection of the application is determined by first terminal first included by trusting in set of terminal Terminal determines which terminal is trusty, and then established between any two terminal in realization trust set of terminal and exempt to match To connection.To promote user experience.
Figure 13 is the schematic block diagram according to the device 500 of the foundation connection of the application.As shown in figure 13, the device 500 Including receiving unit 510 and processing unit 520.
Wherein, receiving unit 510 receives the connection that the first terminal is sent for device and establishes request message, which builds Vertical request message exempts from pairing connection for asking with device foundation;Processing unit 520 is established for the device according to the connection Request message, determines whether the first terminal passes through certification;
The processing unit 520 is additionally operable to the device according to the trust information, it is determined whether exempts to match with first terminal foundation To connection.
Optionally, which is additionally operable to the device and obtains the trust information for trusting set of terminal, the trust set of terminal At least one terminal including the first terminal can carry out exempting to match between any two terminal in the trust set of terminal To connection;
The processing unit 520 is additionally operable to the device and is disappeared according to the trust information of the trust set of terminal and connection foundation request Breath, determines whether the first terminal passes through certification.
Optionally, which includes the second terminal.
Optionally, which is additionally operable to the device and obtains the trust information by logging in high in the clouds.
Optionally, which includes multiple terminals of same user.
Optionally, the connection establish request message carry the equipment log-on message of the first terminal, high in the clouds account information and At least one of physical address information of communication module information.
It should be understood that the second terminal in the present processes can correspond to according to the device 500 of the foundation connection of the application, And above and other operation and/or function of each unit in the device 500 of foundation connection is respectively for implementation method 100 The corresponding flow with the second terminal in method 200, for sake of simplicity, details are not described herein.
Therefore, the device of the foundation connection of the application is determined by first terminal first included by trusting in set of terminal Terminal determines which terminal is trusty, and then established between any two terminal in realization trust set of terminal and exempt to match To connection.To promote user experience.
Figure 14 is the schematic block diagram according to the terminal 600 of the foundation connection of the application.As shown in figure 14, the terminal 600 Including:
At least one communication module;
Processor 620;
Memory 630;
Optionally, which includes first communication module 610 and/or second communication module 640;
Wherein, for storing instruction, which is used to execute the instruction of memory storage to the memory 630, with It controls the first communication module 610 or second communication module 640 sends signal.
Optionally, which can be central processing unit (Central Processing Unit, CPU), should Processor 620 can also be other general processors, digital signal processor (DSP), application-specific integrated circuit (ASIC), it is ready-made can Program gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components Deng.General processor can be microprocessor or the processor can also be any conventional processor etc..
The memory 630 may include read-only memory and random access memory, and to processor 620 provide instruction and Data.The a part of of memory 630 can also include nonvolatile RAM.For example, memory 630 can also be deposited Store up the information of device type.
Wherein, which obtains the trust information for trusting set of terminal for terminal, the trust set of terminal include this At least one terminal including one terminal can carry out exempting from pairing connection between any two terminal in the trust set of terminal.
The processor 620 determines second terminal for being additionally operable to the terminal according to the trust information.
Wherein, which sends connection to second terminal for the terminal and establishes request message, the connection Establish request message for ask with the second terminal foundation exempt from pairing connect.
Wherein, which sends connection to second terminal for the terminal and establishes request message, the connection Establish request message for ask with the second terminal foundation exempt from pairing connect.
Optionally, which includes the second terminal.
Optionally, which is additionally operable to the terminal and obtains the trust information by logging in high in the clouds.
Optionally, which includes multiple terminals of same user.
Optionally, the connection establish request message carry the equipment log-on message of the first terminal, high in the clouds account information and At least one of physical address information of communication module information.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any limit It is fixed.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any limit It is fixed.
Optionally, which can also include display 650, and the display is for showing the identification information of terminal To user.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 620 Or the instruction of software form is completed.Hardware processor can be embodied directly in conjunction with the step of method disclosed in the present application to hold Row complete, or in processor hardware and software module combine execute completion.Software module can be located at random access memory, This fields such as flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register maturation In storage medium.The storage medium is located at memory 630, and processor 620 reads the information in memory 630, in conjunction with its hardware The step of completing the above method.To avoid repeating, it is not detailed herein.
It should be understood that the second terminal in the present processes can correspond to according to the terminal 600 of the foundation connection of the application, And above and other operation and/or function of each unit in the terminal 600 of foundation connection is respectively for implementation method 100 The corresponding flow with the first terminal in method 200, for sake of simplicity, details are not described herein.
Therefore, the terminal of the foundation connection of the application is determined by first terminal first included by trusting in set of terminal Terminal determines which terminal is trusty, and then established between any two terminal in realization trust set of terminal and exempt to match To connection.To promote user experience.
Figure 15 is the schematic block diagram according to the terminal 700 of the foundation connection of the application.As shown in figure 15, the terminal 700 Including:
At least one communication module;
Processor 720;
Memory 730;
Optionally, which includes first communication module 710 and/or second communication module 740;
Wherein, for storing instruction, which is used to execute the instruction of memory storage to the memory 730, with It controls the first communication module 710 or second communication module 740 receives signal.
Optionally, which can be central processing unit (Central Processing Unit, CPU), should Processor 720 can also be other general processors, digital signal processor (DSP), application-specific integrated circuit (ASIC), it is ready-made can Program gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components Deng.General processor can be microprocessor or the processor can also be any conventional processor etc..
The memory 730 may include read-only memory and random access memory, and to processor 720 provide instruction and Data.The a part of of memory 730 can also include nonvolatile RAM.For example, memory 730 can also be deposited Store up the information of device type.
Wherein, which receives the connection that the first terminal is sent for terminal and establishes request message, should Connection establish request message for ask with the terminal foundation exempt from pairing connect.
Wherein, which receives the connection that the first terminal is sent for terminal and establishes request message, should Connection establish request message for ask with the terminal foundation exempt from pairing connect.
Wherein, processor 720 establishes request message for the terminal according to the connection, determines whether the first terminal passes through Certification.
Wherein, processor 720 is additionally operable to the terminal according to the trust information, it is determined whether exempts to match with first terminal foundation To connection.
Wherein, processor 720 is additionally operable to the terminal and obtains trust information, which includes at least one terminal;
The processor 720 is additionally operable to the terminal according to the trust information, it is determined whether exempts to match with first terminal foundation Connection.
Optionally, which is additionally operable to the terminal and obtains the trust information for trusting set of terminal, the trust set of terminal packet At least one terminal including the first terminal is included, can carry out exempting to match between any two terminal in the trust set of terminal Connection;
The processor 720 is additionally operable to the terminal and is disappeared according to the trust information of the trust set of terminal and connection foundation request Breath, determines whether the first terminal passes through certification.
Optionally, which includes the second terminal.
Optionally, which is additionally operable to the terminal and obtains the trust information by logging in high in the clouds.
Optionally, which includes multiple terminals of same user.
Optionally, the connection establish request message carry the equipment log-on message of the first terminal, high in the clouds account information and At least one of physical address information of communication module information.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any limit It is fixed.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any limit It is fixed.
Optionally, which can also include display 750, and the display is for showing the identification information of terminal To user.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 720 Or the instruction of software form is completed.Hardware processor can be embodied directly in conjunction with the step of method disclosed in the present application to hold Row complete, or in processor hardware and software module combine execute completion.Software module can be located at random access memory, This fields such as flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register maturation In storage medium.The storage medium is located at memory 730, and processor 720 reads the information in memory 730, in conjunction with its hardware The step of completing the above method.To avoid repeating, it is not detailed herein.
It should be understood that the second terminal in the present processes can correspond to according to the terminal 700 of the foundation connection of the application, And above and other operation and/or function of each unit in the terminal 700 of foundation connection is respectively for implementation method 100 The corresponding flow with the second terminal in method 200, for sake of simplicity, details are not described herein.
Therefore, the terminal of the foundation connection of the application is determined by first terminal first included by trusting in set of terminal Terminal determines which terminal is trusty, and then established between any two terminal in realization trust set of terminal and exempt to match To connection.To promote user experience.
Figure 16 is the schematic block diagram according to the device 800 of the foundation connection of the application.As shown in figure 16, the device 800 Including processing unit 810 and transmission unit 820.
Wherein, processing unit 810 is authenticated processing for the device with equipment to be connect, to pass through the equipment to be connected Certification to the device;The processing unit 810 is additionally operable to the device and obtains first identifier information;Transmission unit 820 is used for the dress It sets to the equipment to be connected and sends the first identifier information, so that the equipment to be connected is in the carrying for receiving second terminal transmission After thering is the connection of the first identifier information to establish request message, according to the first identifier information, determine the second terminal by recognizing Card, and establish and connect with the second terminal.
Optionally, which is used to indicate the second terminal.
Optionally, which is additionally operable to:
The device sends the first identifier information to the second terminal.
Optionally, which is used to indicate terminal device set, which includes that the device exists Interior at least one terminal device.
Optionally, which includes the account information or device name information of terminal device.
It should be understood that the first terminal in the present processes can correspond to according to the device 800 of the foundation connection of the application, And above and other operation and/or function of each unit in the device 800 of foundation connection is respectively for implementation method 200 In first terminal corresponding flow, for sake of simplicity, details are not described herein.
Therefore, the device of the foundation connection of the application completes certification with equipment to be connect first by first terminal, and To equipment to be connected send first identifier information so that equipment connect receive second terminal send carry this first After request message is established in the connection of identification information, according to the first identifier information, determine that the first terminal is equipment trusty, And with the first terminal foundation exempt from pairing connection, i.e., the second terminal do not need user input username and password can be with this Equipment to be connected is successfully established connection, promotes user experience.
Figure 17 is the schematic block diagram according to the device 900 of the foundation connection of the application.As shown in figure 17, the device 900 Including transmission unit 910.
Wherein, transmission unit 910 sends connection to equipment to be connected for the device and establishes request message, which establishes Request message is used to indicate device request and equipment connect foundation connection, the connection establish request message carry this One identification information, wherein the first identifier information by the first terminal of the device authentication to be connected by being sent to the company of waiting for Connect equipment.
Optionally, which is used to indicate the device.
Optionally, which further includes:
Receiving unit 920 receives the first identifier information of first terminal transmission for the device.
Optionally, which is used to indicate terminal device set, which includes first end At least one terminal device including end.
Optionally, which includes the account information or device name information of terminal device.
It should be understood that the second terminal in the present processes can correspond to according to the device 900 of the foundation connection of the application, And above and other operation and/or function of each unit in the device 900 of foundation connection is respectively for implementation method 200 In second terminal corresponding flow, for sake of simplicity, details are not described herein.
Therefore, the device of the foundation connection of the application completes certification with equipment to be connect first by first terminal, and To equipment to be connected send first identifier information so that equipment connect receive second terminal send carry this first After request message is established in the connection of identification information, according to the first identifier information, determine that the first terminal is equipment trusty, And with the first terminal foundation exempt from pairing connection, i.e., the second terminal do not need user input username and password can be with this Equipment to be connected is successfully established connection, promotes user experience.
Figure 18 is the schematic block diagram according to the device 1000 of the foundation connection of the application.As shown in figure 18, the device 1000 include processing unit 1010 and receiving unit 1020.
Wherein, processing unit 1010 is authenticated processing for the device with first terminal, with by the first terminal Certification;Receiving unit 1020 receives the first terminal for the device and sends first identifier information, and determines to send and carry The terminal device of the message of the first identifier information is the terminal device by certification;
The receiving unit 1020 be additionally operable to the device receive the second terminal transmission connection establish request message, the connection It establishes request message and is used to indicate second terminal request and device foundation connection, which establishes request message and carry this First identifier information;
The processing unit 1010 is additionally operable to the device and establishes request message according to the first identifier information and the connection, with this Second terminal establishes connection.
Optionally, which is used to indicate the second terminal.
Optionally, which is used to indicate terminal device set, which includes first end At least one terminal device including end.
Optionally, which includes the account information or device name information of terminal device.
It should be understood that can correspond in the present processes wait for that connection is set according to the device 1000 of the foundation connection of the application It is standby, and above and other operation and/or function of each unit in the device 1000 of foundation connection is respectively for the side of realization The corresponding flow of equipment to be connected in method 200, for sake of simplicity, details are not described herein.
Therefore, the device of the foundation connection of the application completes certification with equipment to be connect first by first terminal, and To equipment to be connected send first identifier information so that equipment connect receive second terminal send carry this first After request message is established in the connection of identification information, according to the first identifier information, determine that the first terminal is equipment trusty, And with the first terminal foundation exempt from pairing connection, i.e., the second terminal do not need user input username and password can be with this Equipment to be connected is successfully established connection, promotes user experience.
Figure 19 is the schematic block diagram according to the terminal 1100 of the foundation connection of the application.As shown in figure 19, the terminal 1100 include:
At least one communication module;
Processor 1120;
Memory 1130;
Optionally, which includes first communication module 1110 and/or second communication module 1140;
Wherein, for storing instruction, which is used to execute the instruction of memory storage to the memory 1130, Signal is sent to control the first communication module 1110 or second communication module 1140.
Optionally, which can be central processing unit (Central Processing Unit, CPU), should Processor 1120 can also be other general processors, digital signal processor (DSP), application-specific integrated circuit (ASIC), ready-made Programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware group Part etc..General processor can be microprocessor or the processor can also be any conventional processor etc..
The memory 1130 may include read-only memory and random access memory, and provide instruction to processor 1120 And data.The a part of of memory 1130 can also include nonvolatile RAM.For example, memory 1130 may be used also With the information of storage device type.
Wherein, processor 1120 is authenticated processing for the terminal with equipment to be connect, to pass through the equipment to be connected Certification to the terminal;The processor 1120 is additionally operable to the terminal and obtains first identifier information.
Wherein, first communication module 1110 is used for the terminal to the first of the equipment (for example, wireless router) to be connected Communication module sends the first identifier information so that the equipment to be connected receive second terminal transmission carry this first After request message is established in the connection of identification information, according to the first identifier information, determine the second terminal by certification, and with this Second terminal establishes connection.
Wherein, second communication module 1140 leads to for the terminal to the second of the equipment (for example, bluetooth equipment) to be connected Letter module send the first identifier information so that equipment connect receive second terminal transmission carry this first mark Know information connection establish request message after, according to the first identifier information, determine the second terminal by certification, and with this Two terminals establish connection.
Optionally, which is used to indicate the second terminal.
Optionally, which is additionally operable to:
The terminal sends the first identifier information to the first communication module of the second terminal.
Optionally, which is used to indicate terminal device set, which includes that the terminal exists Interior at least one terminal device.
Optionally, which is additionally operable to:
The terminal sends the first identifier information to the second communication module of the second terminal.
Optionally, which is used to indicate terminal device set, which includes that the terminal exists Interior at least one terminal device.
Optionally, which includes the account information or device name information of terminal device.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any It limits.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any It limits.
Optionally, which can also include display 1150, and the display is for showing the identification information of terminal Show to user.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1120 Or the instruction of software form is completed.Hardware processor can be embodied directly in conjunction with the step of method disclosed in the present application to hold Row complete, or in processor hardware and software module combine execute completion.Software module can be located at random access memory, This fields such as flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register maturation In storage medium.The storage medium is located at memory 1130, and processor 1120 reads the information in memory 1130, hard in conjunction with it Part completes the step of above method.To avoid repeating, it is not detailed herein.
It should be understood that can correspond to the first end in the present processes according to the terminal 1100 of the foundation connection of the application End, and above and other operation and/or function of each unit in the terminal 1100 of foundation connection is respectively for the side of realization The corresponding flow of first terminal in method 200, for sake of simplicity, details are not described herein.
Therefore, the terminal of the foundation connection of the application completes certification with equipment to be connect first by first terminal, and To equipment to be connected send first identifier information so that equipment connect receive second terminal send carry this first After request message is established in the connection of identification information, according to the first identifier information, determine that the first terminal is equipment trusty, And with the first terminal foundation exempt from pairing connection, i.e., the second terminal do not need user input username and password can be with this Equipment to be connected is successfully established connection, promotes user experience.
Figure 20 is the schematic block diagram according to the terminal 1200 of the foundation connection of the application.As shown in figure 20, the terminal 1200 include:
At least one communication module;
Processor 1220;
Memory 1230;
Optionally, which includes first communication module 1210 and/or second communication module 1240;
Wherein, for storing instruction, which is used to execute the instruction of memory storage to the memory 1230, Signal is sent to control the first communication module 1210 or second communication module 1240.
Optionally, which can be central processing unit (Central Processing Unit, CPU), should Processor 1220 can also be other general processors, digital signal processor (DSP), application-specific integrated circuit (ASIC), ready-made Programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware group Part etc..General processor can be microprocessor or the processor can also be any conventional processor etc..
The memory 1230 may include read-only memory and random access memory, and provide instruction to processor 1220 And data.The a part of of memory 1230 can also include nonvolatile RAM.For example, memory 1230 may be used also With the information of storage device type.
Wherein, first communication module 1210 leads to for the terminal to the first of equipment to be connected (for example, wireless router) Letter module sends connection and establishes request message, which establishes request message and be used to indicate the terminal request and the equipment to be connect Connection is established, which establishes request message and carry the first identifier information, wherein the first identifier information is by by this The first terminal of device authentication to be connected is sent to the equipment to be connected.
Wherein, second communication of the second communication module 1240 for the terminal to equipment to be connected (for example, bluetooth equipment) Module 1240 sends connection and establishes request message, which, which establishes request message and be used to indicate the terminal request and wait connecting with this, sets Standby to establish connection, which establishes request message and carries the first identifier information, wherein the first identifier information is by having passed through The first terminal of the device authentication to be connected is sent to the equipment to be connected.
Optionally, which is used to indicate the terminal.
Optionally, which is additionally operable to the first communication module transmission that the terminal receives the first terminal The first identifier information.
Optionally, which is additionally operable to the second communication module 1240 that the terminal receives the first terminal The first identifier information sent.
Optionally, which is used to indicate terminal device set, which includes first end At least one terminal device including end.
Optionally, which includes the account information or device name information of terminal device.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any It limits.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any It limits.
Optionally, which can also include display 1250, and the display is for showing the identification information of terminal Show to user.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1220 Or the instruction of software form is completed.Hardware processor can be embodied directly in conjunction with the step of method disclosed in the present application to hold Row complete, or in processor hardware and software module combine execute completion.Software module can be located at random access memory, This fields such as flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register maturation In storage medium.The storage medium is located at memory 1230, and processor 1220 reads the information in memory 1230, hard in conjunction with it Part completes the step of above method.To avoid repeating, it is not detailed herein.
It should be understood that can correspond to the second end in the present processes according to the terminal 1200 of the foundation connection of the application End, and above and other operation and/or function of each unit in the terminal 1200 of foundation connection is respectively for the side of realization The corresponding flow of second terminal in method 200, for sake of simplicity, details are not described herein.
Therefore, the terminal of the foundation connection of the application completes certification with equipment to be connect first by first terminal, and To equipment to be connected send first identifier information so that equipment connect receive second terminal send carry this first After request message is established in the connection of identification information, according to the first identifier information, determine that the first terminal is equipment trusty, And with the first terminal foundation exempt from pairing connection, i.e., the second terminal do not need user input username and password can be with this Equipment to be connected is successfully established connection, promotes user experience.
Figure 21 is the schematic block diagram according to the terminal 1300 of the foundation connection of the application.As shown in figure 21, the terminal 1300 include:
At least one communication module;
Processor 1320;
Memory 1330;
Optionally, which includes first communication module 1310 and/or second communication module 1340;
Wherein, for storing instruction, which is used to execute the instruction of memory storage to the memory 1330, Signal is received to control the first communication module 1310 or second communication module 1340.
Optionally, which can be central processing unit (Central Processing Unit, CPU), should Processor 1320 can also be other general processors, digital signal processor (DSP), application-specific integrated circuit (ASIC), ready-made Programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware group Part etc..General processor can be microprocessor or the processor can also be any conventional processor etc..
The memory 1330 may include read-only memory and random access memory, and provide instruction to processor 1320 And data.The a part of of memory 1330 can also include nonvolatile RAM.For example, memory 1330 may be used also With the information of storage device type.
Wherein, which is authenticated processing for the terminal with first terminal, with by the first terminal Certification;
Wherein, which receives the of the first terminal for the terminal (for example, wireless router) The first identifier information that one communication module is sent, and determine that the terminal device for sending the message for carrying the first identifier information is Pass through the terminal device of certification;
Wherein, second communication module 1340 for the terminal (for example, bluetooth equipment) receive the first terminal it is second logical Believe the first identifier information that module is sent, and determines that the terminal device for sending the message for carrying the first identifier information is to pass through The terminal device of certification;
Wherein, which is additionally operable to:
Request message is established in the connection that the terminal receives second terminal transmission, which establishes request message and be used to indicate The second terminal is asked to establish with the terminal and be connected, which establishes request message and carry the first identifier information.
Wherein, which is additionally operable to:
Request message is established in the connection that the terminal receives second terminal transmission, which establishes request message and be used to indicate The second terminal is asked to establish with the terminal and be connected, which establishes request message and carry the first identifier information.
Wherein, which is additionally operable to:
The terminal establishes request message according to the first identifier information and the connection, establishes and connects with the second terminal.
Optionally, which is used to indicate the second terminal.
Optionally, which is used to indicate terminal device set, which includes first end At least one terminal device including end.
Optionally, which includes the account information or device name information of terminal device.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any It limits.
Optionally, which can be bluetooth module or Wifi modules.The application does not make this any It limits.
Optionally, which can also include display 1350, and the display is for showing the identification information of terminal Show to user.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor 1320 Or the instruction of software form is completed.Hardware processor can be embodied directly in conjunction with the step of method disclosed in the present application to hold Row complete, or in processor hardware and software module combine execute completion.Software module can be located at random access memory, This fields such as flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register maturation In storage medium.The storage medium is located at memory 1330, and processor 1320 reads the information in memory 1330, hard in conjunction with it Part completes the step of above method.To avoid repeating, it is not detailed herein.
It should be understood that can correspond in the present processes wait for that connection is set according to the terminal 1300 of the foundation connection of the application It is standby, and above and other operation and/or function of each unit in the terminal 1300 of foundation connection is respectively for the side of realization The corresponding flow of equipment to be connected in method 200, for sake of simplicity, details are not described herein.
Therefore, the terminal of the foundation connection of the application completes certification with equipment to be connect first by first terminal, and To equipment to be connected send first identifier information so that equipment connect receive second terminal send carry this first After request message is established in the connection of identification information, according to the first identifier information, determine that the first terminal is equipment trusty, And with the first terminal foundation exempt from pairing connection, i.e., the second terminal do not need user input username and password can be with this Equipment to be connected is successfully established connection, promotes user experience.
It should be understood that in the various embodiments of the application, size of the sequence numbers of the above procedures is not meant to execute suitable The execution sequence of the priority of sequence, each process should be determined by its function and internal logic, the implementation process structure without coping with the application At any restriction.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed Scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of terminal and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, terminal and method, it can be with It realizes by another way.For example, terminal embodiment described above is only schematical, for example, the unit It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, terminal or unit It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of step. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), arbitrary access are deposited The various media that can store program code such as reservoir (Random Access Memory, RAM), magnetic disc or CD.
The above, the only specific implementation mode of the application, but the protection domain of the application is not limited thereto, it is any Those familiar with the art can easily think of the change or the replacement in the technical scope that the application discloses, and should all contain It covers within the protection domain of the application.Therefore, the protection domain of the application should be subject to the protection domain described in claim.

Claims (33)

1. a kind of method for establishing connection, which is characterized in that the method includes:
First terminal obtain trust set of terminal trust information, the trust set of terminal including the first terminal at least One terminal can carry out exempting from pairing connection between any two terminal trusted in set of terminal;
The first terminal determines second terminal according to the trust information;
The first terminal sends connection to second terminal and establishes request message, the connection establish request message for ask and Pairing connection is exempted from the second terminal foundation.
2. according to the method described in claim 1, it is characterized in that, the trust set of terminal includes the second terminal.
3. method according to claim 1 or 2, which is characterized in that the first terminal obtains trust information, including:
The first terminal obtains the trust information by logging in high in the clouds.
4. according to the method in any one of claims 1 to 3, which is characterized in that the trust set of terminal includes same use Multiple terminals at family.
5. method according to claim 1 to 4, which is characterized in that request message carrying is established in the connection At least one of the equipment log-on message of the first terminal, physical address information of high in the clouds account information and communication module are believed Breath.
6. a kind of method for establishing connection, which is characterized in that the method includes:
Second terminal receives the connection that first terminal is sent and establishes request message, the connection establish request message for ask and Pairing connection is exempted from the second terminal foundation;
The second terminal establishes request message according to the connection, determines whether the first terminal passes through certification;
After the first terminal is by the certification of the second terminal, the second terminal is exempted from first terminal foundation Pairing connection.
7. according to the method described in claim 6, it is characterized in that, the second terminal disappears according to connection foundation request Whether breath, determine the first terminal by certification, including:
The second terminal obtains the trust information for trusting set of terminal, and the trust set of terminal is including the first terminal At least one terminal can carry out exempting from pairing connection between any two terminal trusted in set of terminal;
The second terminal establishes request message according to the trust information for trusting set of terminal and the connection, determines described the Whether one terminal passes through certification.
8. the method according to the description of claim 7 is characterized in that the trust set of terminal includes the second terminal.
9. method according to claim 7 or 8, which is characterized in that the second terminal obtains the trust for trusting set of terminal Information, including:
The second terminal obtains the trust information by logging in high in the clouds.
10. the method according to any one of claim 7 to 9, which is characterized in that the trust set of terminal includes same use Multiple terminals at family.
11. the method according to any one of claim 6 to 10, which is characterized in that the connection is established request message and taken At least one of the physical address information of equipment log-on message, high in the clouds account information and communication module with the first terminal Information.
12. a kind of device for establishing connection, which is characterized in that described device includes:
Processing unit obtains the trust information for trusting set of terminal for device, and the trust set of terminal includes the first terminal At least one terminal inside can carry out exempting from pairing connection between any two terminal trusted in set of terminal;
The processing unit is additionally operable to:
Described device determines second terminal according to the trust information;
Transmission unit sends connection to second terminal for described device and establishes request message, and request message is established in the connection For asking to exempt from pairing connection with second terminal foundation.
13. device according to claim 12, which is characterized in that the trust set of terminal includes the second terminal.
14. device according to claim 12 or 13, which is characterized in that the processing unit is additionally operable to:
Described device obtains the trust information by logging in high in the clouds.
15. the device according to any one of claim 12 to 14, which is characterized in that the trust set of terminal includes same Multiple terminals of user.
16. according to device described in any one of claim 12 to 15, which is characterized in that the connection is established request message and taken At least one of the physical address information of equipment log-on message, high in the clouds account information and communication module with the first terminal Information.
17. a kind of device for establishing connection, which is characterized in that described device includes:
Receiving unit receives the connection that first terminal is sent for device and establishes request message, and request message is established in the connection For asking to exempt from pairing connection with second terminal foundation;
Whether processing unit establishes request message according to the connection for described device, determines the first terminal by recognizing Card;
The processing unit is additionally operable to:
Described device is according to the trust information, it is determined whether exempts from pairing connection with first terminal foundation.
18. device according to claim 17, which is characterized in that the processing unit is additionally operable to:
Described device obtain trust set of terminal trust information, the trust set of terminal including the first terminal at least One terminal can carry out exempting from pairing connection between any two terminal trusted in set of terminal;
The processing unit is additionally operable to:
Described device establishes request message according to the trust information for trusting set of terminal and the connection, determines described first eventually Whether end passes through certification.
19. device according to claim 18, which is characterized in that the trust set of terminal includes the second terminal.
20. the device according to claim 18 or 19, which is characterized in that the processing unit is additionally operable to:
Described device obtains the trust information by logging in high in the clouds.
21. the device according to any one of claim 18 to 20, which is characterized in that the trust set of terminal includes same Multiple terminals of user.
22. the device according to any one of claim 17 to 21, which is characterized in that the connection is established request message and taken At least one of the physical address information of equipment log-on message, high in the clouds account information and communication module with the first terminal Information.
23. a kind of terminal for establishing connection, which is characterized in that the terminal includes:At least one processor and processor, In,
At least one processor, for storing instruction;
The processor, for calling the instruction execution following steps in at least one processor:
Obtain the trust information for trusting set of terminal, at least one terminal for trusting set of terminal including the terminal, institute Stating can carry out exempting from pairing connection between any two terminal trusted in set of terminal;
According to the trust information, second terminal is determined;
Send connection to second terminal and establish request message, the connection establish request message for ask and the second terminal Pairing connection is exempted from foundation.
24. terminal according to claim 23, which is characterized in that the trust set of terminal includes the second terminal.
25. the terminal according to claim 23 or 24, which is characterized in that the processor is additionally operable to:
The terminal obtains the trust information by logging in high in the clouds.
26. the terminal according to any one of claim 23 to 25, which is characterized in that the trust set of terminal includes same Multiple terminals of user.
27. the terminal according to any one of claim 23 to 26, which is characterized in that the connection is established request message and taken At least one of the physical address information of equipment log-on message, high in the clouds account information and communication module with the first terminal Information.
28. a kind of terminal for establishing connection, which is characterized in that the terminal includes:At least one processor and processor, In,
At least one processor, for storing instruction;
The processor, for calling the instruction execution following steps in at least one processor:
Receive the connection that first terminal is sent and establish request message, the connection establish request message for ask and described second Pairing connection is exempted from terminal foundation;
Request message is established according to the connection, determines whether the first terminal passes through certification;
According to the trust information, it is determined whether exempt from pairing connection with first terminal foundation.
29. terminal according to claim 28, which is characterized in that the processor is additionally operable to:
The terminal obtains the trust information for trusting set of terminal, the trust set of terminal including the first terminal at least One terminal can carry out exempting from pairing connection between any two terminal trusted in set of terminal;
The processor is additionally operable to:
The terminal establishes request message according to the trust information for trusting set of terminal and the connection, determines described first eventually Whether end passes through certification.
30. terminal according to claim 29, which is characterized in that the trust set of terminal includes the second terminal.
31. the terminal according to claim 29 or 30, which is characterized in that the processor is additionally operable to:
The terminal obtains the trust information by logging in high in the clouds.
32. the terminal according to any one of claim 29 to 31, which is characterized in that the trust set of terminal includes same Multiple terminals of user.
33. the terminal according to any one of claim 28 to 32, which is characterized in that the connection is established request message and taken At least one of the physical address information of equipment log-on message, high in the clouds account information and communication module with the first terminal Information.
CN201780005586.2A 2017-02-25 2017-02-25 Method, device and terminal for establishing connection Active CN108513716B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/074894 WO2018152820A1 (en) 2017-02-25 2017-02-25 Method and device for establishing connection

Publications (2)

Publication Number Publication Date
CN108513716A true CN108513716A (en) 2018-09-07
CN108513716B CN108513716B (en) 2020-08-07

Family

ID=63254214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780005586.2A Active CN108513716B (en) 2017-02-25 2017-02-25 Method, device and terminal for establishing connection

Country Status (2)

Country Link
CN (1) CN108513716B (en)
WO (1) WO2018152820A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311730A (en) * 2019-07-29 2021-02-02 西安中兴新软件有限责任公司 Pairing information uploading, connection and authentication method, terminal and server
CN112596907A (en) * 2019-12-31 2021-04-02 华为技术有限公司 Method for occupying equipment and electronic equipment
WO2021237536A1 (en) * 2020-05-27 2021-12-02 Oppo广东移动通信有限公司 Communication method, apparatus and device based on internet of things
WO2023246055A1 (en) * 2022-06-23 2023-12-28 Oppo广东移动通信有限公司 Bluetooth device configuration method and apparatus, electronic device, and storage medium
US11983960B2 (en) 2019-12-31 2024-05-14 Huawei Technologies Co., Ltd. Device occupation method and electronic device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114584930B (en) * 2020-11-30 2023-04-07 华为技术有限公司 Multi-device communication method, electronic device, and computer-readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252376A (en) * 2008-03-27 2008-08-27 宇龙计算机通信科技(深圳)有限公司 System and method for connecting blue tooth equipment and mobile communication terminal thereof
US20090199291A1 (en) * 2008-02-06 2009-08-06 Mamiko Hayasaka Communication apparatus, a firewall control method, and a firewall control program
CN101827252A (en) * 2010-05-14 2010-09-08 山东泰信电子有限公司 System and method for realizing safe internet visit by internet television terminal
CN201674527U (en) * 2010-05-14 2010-12-15 山东泰信电子有限公司 System for implementing internet television terminal to safely access internet
CN102594987A (en) * 2012-02-09 2012-07-18 深圳市中兴移动通信有限公司 Method for realizing safe and quick Bluetooth pairing connection
CN105303097A (en) * 2014-12-17 2016-02-03 维沃移动通信有限公司 Verification method of mobile terminal, mobile terminal and verification system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090199291A1 (en) * 2008-02-06 2009-08-06 Mamiko Hayasaka Communication apparatus, a firewall control method, and a firewall control program
CN101252376A (en) * 2008-03-27 2008-08-27 宇龙计算机通信科技(深圳)有限公司 System and method for connecting blue tooth equipment and mobile communication terminal thereof
CN101827252A (en) * 2010-05-14 2010-09-08 山东泰信电子有限公司 System and method for realizing safe internet visit by internet television terminal
CN201674527U (en) * 2010-05-14 2010-12-15 山东泰信电子有限公司 System for implementing internet television terminal to safely access internet
CN102594987A (en) * 2012-02-09 2012-07-18 深圳市中兴移动通信有限公司 Method for realizing safe and quick Bluetooth pairing connection
CN105303097A (en) * 2014-12-17 2016-02-03 维沃移动通信有限公司 Verification method of mobile terminal, mobile terminal and verification system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311730A (en) * 2019-07-29 2021-02-02 西安中兴新软件有限责任公司 Pairing information uploading, connection and authentication method, terminal and server
CN112311730B (en) * 2019-07-29 2023-10-20 西安中兴新软件有限责任公司 Pairing information uploading, connecting and authenticating method, terminal and server
CN112596907A (en) * 2019-12-31 2021-04-02 华为技术有限公司 Method for occupying equipment and electronic equipment
CN113330761A (en) * 2019-12-31 2021-08-31 华为技术有限公司 Method for occupying equipment and electronic equipment
CN112596907B (en) * 2019-12-31 2021-12-03 华为技术有限公司 Method for occupying equipment and electronic equipment
US11637922B2 (en) 2019-12-31 2023-04-25 Huawei Technologies Co., Ltd. Device occupation method and electronic device
US11983960B2 (en) 2019-12-31 2024-05-14 Huawei Technologies Co., Ltd. Device occupation method and electronic device
WO2021237536A1 (en) * 2020-05-27 2021-12-02 Oppo广东移动通信有限公司 Communication method, apparatus and device based on internet of things
WO2023246055A1 (en) * 2022-06-23 2023-12-28 Oppo广东移动通信有限公司 Bluetooth device configuration method and apparatus, electronic device, and storage medium

Also Published As

Publication number Publication date
CN108513716B (en) 2020-08-07
WO2018152820A1 (en) 2018-08-30

Similar Documents

Publication Publication Date Title
US11310239B2 (en) Network connection method, hotspot terminal and management terminal
EP4007321A1 (en) Information sharing method, terminal apparatus, storage medium, and computer program product
CN108513716A (en) The method and apparatus for establishing connection
CN104159226B (en) Method for connecting network and device
CN104378145B (en) The matching method and system of bluetooth equipment
US20180368058A1 (en) Method for controlling device access, and related device and system
EP3627777B1 (en) Message transmission method and device, terminal and storage medium
JP6668407B2 (en) Terminal authentication method and apparatus used in mobile communication system
CN104105218A (en) Method and system for achieving Android system mobile phone hotspot WPS connection
CN108683690A (en) Method for authenticating, user equipment, authentication device, authentication server and storage medium
CN109151822A (en) Wireless network connecting method and device, storage medium, electronic device
CN107678798A (en) A kind of SIM card fast initializing method, device and computer-readable recording medium
CN107343325A (en) A kind of data transmission method, device and terminal
WO2016015510A1 (en) Method and device for terminal authentication for use in mobile communication system
CN104518949A (en) Method and system for message prompt
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
US20190007831A1 (en) Communication method and device
CN107743304B (en) A kind of device identification method and relevant device
WO2012026932A1 (en) Method and apparatus for over-the-air configuration of a wireless device
US20190200226A1 (en) Method of authenticating access to a wireless communication network and corresponding apparatus
CN106341374A (en) Method and device for restricting access of unlicensed user device to home gateway
CN106713222A (en) Access authentication method of wireless local area network, server and authentication system
CN105072610B (en) A kind of method for network access, system, user terminal and server
WO2024061091A1 (en) Network communication method and apparatus, and network-side device, terminal and medium
WO2023143423A1 (en) Information acquisition, storage and reporting method and device, terminal, and network function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant