WO2011106956A1 - Mobile terminal and a data-share method for the mobile terminal - Google Patents

Mobile terminal and a data-share method for the mobile terminal Download PDF

Info

Publication number
WO2011106956A1
WO2011106956A1 PCT/CN2010/074692 CN2010074692W WO2011106956A1 WO 2011106956 A1 WO2011106956 A1 WO 2011106956A1 CN 2010074692 W CN2010074692 W CN 2010074692W WO 2011106956 A1 WO2011106956 A1 WO 2011106956A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
shared
sharing
data
identity authentication
Prior art date
Application number
PCT/CN2010/074692
Other languages
French (fr)
Chinese (zh)
Inventor
李希鹏
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011106956A1 publication Critical patent/WO2011106956A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Definitions

  • the present invention relates to the field of communications, and in particular, to a mobile terminal and a data sharing method thereof.
  • MID Mobile Internet Device
  • UMPC Ultra Mobile PC
  • MID is also a portable mobile PC product.
  • users can access the Internet and enjoy entertainment, information inquiry, and mail sending and receiving.
  • MID products are gradually maturing. MID products are between smartphones and PCs. They have larger screens and higher computing power than smartphones.
  • a primary object of the present invention is to provide a mobile terminal and a data sharing method thereof to solve at least the above problems.
  • a data sharing method for a mobile terminal including: a shared mobile terminal automatically detecting a mobile terminal therearound; a shared mobile terminal automatically performing identity authentication on the detected mobile terminal; sharing The mobile terminal automatically transmits the data to be shared to the mobile terminal with successful identity authentication.
  • the shared mobile terminal automatically detects the mobile terminal around it comprises: the shared mobile terminal periodically detects the mobile terminal around it by using a wireless communication technology.
  • the shared mobile terminal automatically authenticates the detected mobile terminal, including: the shared mobile terminal determines whether the detected identity of the mobile terminal is an identifier of the mobile terminal corresponding to the set friend, wherein the friend is allowed to share The mobile terminal sharing the data in the mobile terminal; if yes, determining that the detected mobile terminal identity authentication is successful.
  • the shared mobile terminal before the shared mobile terminal automatically detects the mobile terminal around the mobile terminal, the shared mobile terminal further includes: the shared mobile terminal accepts the identifier of the shared mobile terminal, and the friend; wherein, the shared mobile terminal accepts the user setting the friend, including: accepting the user in the sharing The identity authentication information specified in the address book of the mobile terminal, and the sharing authority of the friend specified by the user, wherein the identity authentication information is the identifier of the mobile terminal corresponding to the friend.
  • the method further includes: the shared mobile terminal accepting the file/folder to be shared by the user setting, the method comprising: accepting the user to specify the file/folder in the shared mobile terminal as The files/folders to be shared by the friends, or accept the files/folders to be shared by the user-specified friends; accept the sharing rights of the files/folders specified by the user.
  • the sharing permission is one of: full sharing, partial sharing, and encrypted sharing; wherein, the full sharing means that the identity authentication succeeds, and the shared mobile terminal transmits the file/folder to the mobile terminal with successful identity authentication; The file/folder is restricted or the friend is restricted.
  • the encryption sharing means that after the identity authentication is successful, the shared mobile terminal needs to detect whether the key provided by the mobile terminal with successful identity authentication is correct, and if the key is correct, the shared mobile terminal will file.
  • the / folder is transferred to the mobile terminal with successful authentication.
  • the shared mobile terminal automatically transmits the data to be shared to the mobile terminal with successful identity authentication, including: sharing the mobile terminal with sharing rights, and transmitting the file/folder to the mobile terminal with successful identity authentication.
  • the shared mobile terminal automatically authenticates the detected mobile terminal, further comprising: the shared mobile terminal acquiring an authentication key from the detected mobile terminal; and the shared mobile terminal determining whether the obtained authentication key is correct; If the key is correct, the shared mobile terminal determines that the detected mobile terminal identity authentication is successful.
  • the method further includes: sharing, by the mobile terminal, a size of a remaining storage space of the mobile terminal that successfully authenticates the identity authentication; and determining, by the shared mobile terminal, the remaining storage The size of the space is not less than the size of the data to be shared.
  • the method further includes: sharing the mobile terminal and the mobile terminal with successful identity authentication to display data transmission information; wherein the data transmission information includes prompt information for preparing to send/receive data, and data transmission/reception interruption. Prompt information, as well as the data transfer time, the large data 'J, and the name of the transferred file/folder.
  • a mobile terminal including: a detecting module, configured to automatically detect a mobile terminal therearound; an authentication module, configured to automatically perform identity authentication on the detected mobile terminal; and data sharing The module is configured to automatically transfer the data to be shared to the mobile terminal with successful identity authentication.
  • FIG. 1 is a flowchart of a data sharing method of a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of setting a friend right according to a first embodiment of the present invention
  • FIG. 3 is a flowchart according to an embodiment of the present invention.
  • FIG. 4 is a flow chart of the MID discovery process according to the first embodiment of the present invention
  • Figure 5 is a flow chart of the MID authentication process according to the first embodiment of the present invention
  • 6 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention
  • FIG. 7 is a schematic structural diagram of a mobile terminal according to Embodiment 1 of the present invention.
  • Step S102 A shared mobile terminal automatically detects a mobile terminal therearound;
  • Step S104 the shared mobile terminal automatically detects the mobile terminal The obtained mobile terminal performs identity authentication.
  • Step S106 The shared mobile terminal automatically transmits the data to be shared to the mobile terminal with successful identity authentication.
  • the embodiment can be used to automatically share data information between mobile terminals when approaching, without any operation by the user, which can improve the user's experience of sharing information with friends, thereby increasing the appeal to the user.
  • the mobile terminal may be an MID, a mobile phone, a home information machine, or the like.
  • the step S102 includes: the shared mobile terminal periodically detects the mobile terminal around it by using a wireless communication technology. In this way, the automatic detection can be realized by using the cycle detection method.
  • the mobile terminal in the method supports a common wireless protocol, and the wireless protocol includes: 2G, 3G, LTE, Wi-Fi (Wireless Fidelity, Wireless Fidelity), Bluetooth, Red Line, FM (Frequency Modulation, FM) and so on.
  • the step S4 includes: the shared mobile terminal determines whether the detected identity of the mobile terminal is an identifier of the mobile terminal corresponding to the set friend; if yes, determines that the detected mobile terminal identity authentication is successful.
  • the preferred embodiment provides a specific implementation manner for the mobile terminal to perform identity authentication on the surrounding mobile terminal, which may be referred to as a user identity authentication method.
  • the identifier of the mobile terminal may be a name, a character string, or the like.
  • the method further includes: the shared mobile terminal accepting the identifier of the shared mobile terminal, and the friend, the friend is a mobile terminal that allows the data to be shared, wherein the shared mobile terminal accepts the user setting the friend, including: accepting the user In the address book of the shared mobile terminal, the identity authentication information corresponding to the friend is accepted; the sharing authority of the user-specified friend is accepted; wherein the identity authentication information is the identifier of the mobile terminal corresponding to the friend.
  • the method further includes: sharing, by the mobile terminal, a file/folder to be shared by the user setting, comprising: accepting a file/folder that the user specifies to share the file/folder as a friend in the shared mobile terminal , or accept the file/folder that the user-specified friend wants to share; accept the share permission of the user-specified file/folder.
  • sharing by the mobile terminal, a file/folder to be shared by the user setting, comprising: accepting a file/folder that the user specifies to share the file/folder as a friend in the shared mobile terminal , or accept the file/folder that the user-specified friend wants to share; accept the share permission of the user-specified file/folder.
  • a user There are two ways for a user to set a friend who is allowed to share data: one is to specify a friend among the contacts saved in the address book, and the other is to establish a friend and its corresponding one in the friend list pre-established by the user or the manufacturer.
  • Mobile terminal identification ie, the identity authentication information described above.
  • the purpose of setting the identity of the shared mobile terminal is to: perform identification and identity authentication on the shared mobile terminal when it is the shared mobile terminal.
  • the sharing permission mentioned above is one of the following: full sharing, partial sharing, and encrypted sharing; wherein, full sharing means that the identity authentication succeeds, and the shared mobile terminal transmits the file/folder to the mobile terminal with successful identity authentication; partial sharing The file/folder is restricted or the friend is restricted.
  • the encryption sharing means that after the identity authentication is successful, the shared mobile terminal needs to detect whether the key provided by the mobile terminal with successful identity authentication is correct.
  • step S106 includes: sharing the mobile terminal with sharing rights, and transmitting the file/folder to be shared to the mobile terminal with successful identity authentication.
  • data sharing can be performed according to the corresponding sharing authority during the transmission process.
  • step S4 includes: the shared mobile terminal acquires an authentication key from the detected mobile terminal; the shared mobile terminal determines whether the obtained authentication key is correct; if the authentication key is correct, the shared mobile terminal determines to detect The mobile terminal identity authentication succeeded.
  • This embodiment provides another specific implementation manner in which the mobile terminal performs identity authentication on the surrounding mobile terminal, which may be referred to as an encryption authentication method.
  • this method only the authentication key provided by other mobile terminals detected around the danger certificate is required.
  • the method further includes: sharing, by the mobile terminal, a size of a remaining storage space of the mobile terminal that successfully authenticates the identity authentication; and the shared mobile terminal determines that the size of the remaining storage space is not smaller than the size of the data to be shared. In this way, the problem of data transmission failure due to insufficient storage space of the shared mobile terminal can be avoided in advance.
  • the method further includes: sharing the mobile terminal and the mobile terminal with successful identity authentication to display data transmission information; wherein the data transmission information includes prompt information for preparing to send/receive data, and prompt for data transmission/reception interruption Information, as well as the data transfer time, data size, and the name of the transferred file/folder.
  • the preferred embodiment notifies the user of the information about the data transmission by notifying the user (including the shared user and the shared user), so that the user clearly knows the data transmission situation, and further enhances the user experience.
  • the data sharing method of the present invention is described in detail by taking the mobile terminal as the MID as an example, and specifically includes the following five steps: user setting, MID discovery, MID authentication, data sharing, and user notification.
  • Step one user settings.
  • the user sets the MID, and the set contents include user identification settings, friend settings, and file sharing settings.
  • User ID setting means that the user sets his own MID identifier.
  • the MID identifier is used for identification and authentication on other MIDs.
  • the identifier can be (but is not limited to) the user's name or a series of keys.
  • There are several methods for setting up a friend The basic principle is to distinguish the friend by the ID of the mobile terminal corresponding to the friend. This method needs to be set by the shared user on the MID, so that the MID can be used to identify the identity when they discover each other. Certification. Here are two ways to set up your friends.
  • the first method is that the user directly sets the friend in the address book, and the method 2 user or the MID manufacturer establishes a table (which can be called a friend list) on the MID, and saves the ID of the friend, and the ID type can be a name, a phone number or other.
  • Method 1 The user sets the friends saved in the address book (as shown in Figure 2), that is, specifies the entries in the address book (corresponding to the contacts) as friends, and can also set different sharing rights for different friends, sharing
  • the permission setting method can be: full sharing, partial sharing, encrypted sharing, and so on.
  • the file sharing setting refers to the sharing setting of the file/folder stored locally by the user for the MID, and the user can share the specified file or folder, and the sharing permission of the file or folder specified by the user can be set to be fully shared, partially shared, encrypted. Sharing, etc.
  • the method 1 of the user setting the friend includes the following steps: Step S202: The user enters the address book and selects a friend; Step S204, setting the sharing right of the selected friend.
  • Method 2 The user establishes a friend ID list in the ID table (ie, the above friend list), and the ID type may be a name, a phone number, or the like. Users can set different data sharing permissions for different ID numbers.
  • the sharing permission setting methods can be: full sharing, partial sharing, encrypted sharing, and so on.
  • the file sharing setting refers to the user sharing settings for the files stored locally by the MID.
  • the user can share the specified file or file folder, and the user can set the specified file or folder to be fully shared, partially shared, encrypted shared, and the like.
  • FIG. 3 is a flowchart of setting file sharing according to the first embodiment of the present invention, including the following steps: Step 4: S302, the user selects a locally saved file or folder on the shared MID; Step S304, select the selected file A file or folder sets its share permissions and sets up friends who share the file or folder.
  • Step 4 S302
  • the user selects a locally saved file or folder on the shared MID
  • Step S304 select the selected file
  • a file or folder sets its share permissions and sets up friends who share the file or folder.
  • Step 2 MID discovery (ie, the above steps of detecting the surrounding mobile terminal).
  • MID discovery means that the MID automatically detects the surrounding MID devices by wireless communication technology. Once other MID devices are detected, they are saved in their MID record table and the MID record table is refreshed on the next test.
  • 4 is a flowchart of a MID discovery process according to the first embodiment of the present invention, including the following steps: Step S402: The MID (ie, the shared mobile terminal) periodically detects the surrounding MIDs by using a wireless method; Step S404, recording the detection result to the MID record. Table S406, periodically refreshing the MID record table.
  • the above step 4 to S402 to step 4 to S406 is a cyclical process. Step 4 gathers three, MID certification.
  • the purpose of the MID authentication is to determine whether the shared user can share the data of the shared user.
  • the authentication methods may include: authentication and user identification.
  • Encryption authentication means that when the MID judges the identity of other MIDs, it requires other MIDs to provide the authentication key. If the key is correct, the authentication passes. Otherwise, it fails, and the final result is recorded in the authentication table.
  • User ID authentication means that the MID judges the user ID of another MID. For example, if the user ID of the shared MID is a name, the shared MID determines whether the name is a friend, and if so, further determines the sharing permission setting of the friend, and then the final result is obtained. Recorded in the certification form.
  • Step S502 The shared MID performs identity authentication on each MID that has been detected in the MID record table.
  • Step S504 check the current MID.
  • Step S506 determines whether the current MID name identifier is in the address book, if yes, proceed to step S510, and if not, return Step S502: Step S508, checking whether the identifier of the current MID is recorded in the buddy ID list, and if yes, proceeding to step 4 S510, if no, returning to step 4 S502; Step S510, determining the current MID identity authentication Successful, and recorded in the certification table, that is, update the certification table. Step four, data sharing.
  • the MID is for the friend or ID passed by the authentication, and at the same time, the data is shared and transmitted according to the corresponding authority.
  • Step 4 gathers five, the user informs.
  • the purpose of the user notification is to report the related situation of the data sharing to the user.
  • the method for reporting the information includes but is not limited to: pushing the information about the sharing result to the standby interface of the user MID, and at the same time, the user may be considered to audibly alert the user.
  • the detecting module 10 is configured to automatically detect the mobile terminal around it; the authentication module 20 is configured to automatically authenticate the detected mobile terminal; and the data sharing module 30 is configured to automatically transmit the data to be shared to the identity.
  • Successfully authenticated mobile terminal The mobile terminal of this embodiment automatically performs each step of detecting the surrounding mobile terminal, performing identity authentication on the detected mobile terminal, and data transmission during the data sharing process, and solves each step existing in the related art. All need human operation, which will cause inconvenience to users.
  • the embodiment can be used to automatically share data information between mobile terminals when approaching, without any operation by the user, which can improve the user's experience of sharing information with friends, thereby increasing the appeal to the user.
  • the mobile terminal may be an MID, a mobile phone, a home information machine, or the like.
  • the mobile terminal of the present invention may specifically include the following modules, as shown in FIG. 7, wherein the setting module 40 is a prerequisite for the invention to be effective, and the detecting module 10, the authentication module 20, and the data sharing module 30 are the main parts of the invention.
  • the user notification module 50 is a supplement to the integrity of the present invention.
  • the detecting module 10 comprises: a wireless detecting module, configured to periodically detect the mobile terminal around the mobile terminal where the mobile terminal is located by using a wireless communication technology.
  • the authentication module 20 includes: a determining module, configured to determine whether the detected identity of the mobile terminal is an identifier of the mobile terminal corresponding to the configured friend, where the friend is a mobile terminal that allows data to be shared; if yes, determine The detected mobile terminal identity authentication is successful.
  • a determining module configured to determine whether the detected identity of the mobile terminal is an identifier of the mobile terminal corresponding to the configured friend, where the friend is a mobile terminal that allows data to be shared; if yes, determine The detected mobile terminal identity authentication is successful.
  • the mobile terminal further includes: a setting module 40, configured to accept an identifier of the user to set the shared mobile terminal, and a friend; wherein the setting module 40 includes: a first accepting module, configured to accept the user's address book in the mobile terminal Specifying or inputting an entry as a friend or inputting an entry as a friend in the buddy list; a second accepting module, configured to accept the user to set the identity authentication information corresponding to the buddy, and accept the sharing privilege of the user-specified buddy, wherein the identity authentication information is The target i of the mobile terminal corresponding to the friend.
  • the setting module 40 includes: a first accepting module, configured to accept the user's address book in the mobile terminal Specifying or inputting an entry as a friend or inputting an entry as a friend in the buddy list; a second accepting module, configured to accept the user to set the identity authentication information corresponding to the buddy, and accept the sharing privilege of the user-specified buddy, wherein the identity authentication information is The target i of the mobile terminal corresponding to the friend.
  • the setting module 40 is further configured to accept a file/folder to be shared by the user, where the setting module 40 further includes: a third accepting module, configured to accept that the user specifies the file/folder as a friend in the mobile terminal. The shared file/folder, or accept the file/folder to be shared by the user-specified friend; the fourth accepting module, for accepting the user-specified file/file Sharing permissions.
  • a third accepting module configured to accept that the user specifies the file/folder as a friend in the mobile terminal.
  • the shared file/folder or accept the file/folder to be shared by the user-specified friend
  • the fourth accepting module for accepting the user-specified file/file Sharing permissions.
  • the sharing permission is one of the following: a full sharing, a partial sharing, and an encrypted sharing; wherein, the full sharing means that the identity authentication is successful, and the shared mobile terminal transmits the file/folder to the mobile terminal with successful identity authentication; Sharing means that the file/folder is restricted or the friend is restricted; the encryption sharing means that after the identity authentication is successful, the shared mobile terminal also needs to detect whether the key provided by the mobile terminal with successful identity authentication is correct, and if the key is correct, the mobile terminal is shared. Transfer the file/folder to the mobile terminal with successful authentication.
  • the data sharing module 30 includes: a sending module, configured to share the file/folder of the file/folder to be shared, and transfer the file/folder to the mobile terminal with successful identity authentication.
  • the authentication module 20 further includes: an obtaining module, configured to acquire an authentication key from the mobile terminal detected by the detecting module 10; a correctness determining module, configured to determine whether the authentication key acquired by the acquiring module is correct; When the judgment result of the correctness judgment module is that the authentication key is correct, it is determined that the mobile terminal identity authentication detected by the detection module 10 is successful.
  • the foregoing mobile terminal further includes: a querying module, configured to query a size of a remaining storage space of the mobile terminal successfully authenticated by the authentication module 20; and a size determining module, configured to determine a remaining storage space queried by the query module Whether the size is not less than the size of the data to be shared.
  • the data sharing module 30 automatically transmits the data to be shared to the mobile terminal with successful identity authentication, preferably, if the size of the remaining storage space is not smaller than the size of the data to be shared.
  • the mobile terminal further includes: a user notification module 50, configured to display information of data transmission of the data sharing module 30; wherein, the data transmission information includes prompt information for preparing to send/receive data, prompt information for data transmission/reception interruption, and Data transfer time, data size, and the name of the transferred file/folder.
  • the data sharing method of the present invention may include the following steps in combination with the foregoing embodiment: Step 1: The user performs setting related operations through the setting module 40. The user sets the MID, and the settings include user identification settings, friend settings, and file sharing settings.
  • the user sets his own user identifier (ie, the identifier of his MID), and the user can set his own name (here, for example: Zhang San) as its user identification ID.
  • the friend setting as shown in Figure 2, the user first needs to set the relevant permissions for the MID.
  • the user sets the friend saved in the address book (here, Li Si), and the user can set different data sharing rights for Li Si, for example, setting the sharing right of Li Si to be completely shared.
  • There are several ways to set up a friend The basic principle is to use ID to distinguish friends. This method requires friends to set the same ID on their MID, so that they can be used for user authentication when MIDs discover each other.
  • the file sharing setting as shown in FIG.
  • Step 3 the user performs sharing setting for one music folder locally stored by the MID, and the user sets the sharing right of the folder to be completely shared.
  • Step 2 the MID discovery flow chart is shown in Figure 4.
  • the information in the table includes: ID number of other MID, that is, user ID. If there are other MIDs that can be found around the MID, the ID number will be displayed in the table.
  • ⁇ _ the table retrieves "Li Si,, the user's ID, and shows that its connection status is normal.
  • Step 3 MID authentication flow chart shown in Figure 5, after the authentication starts, first check the MID Record table, at this time, a user named Li Si is displayed in the MID record table. At this time, the MID will judge whether the ID is a name, and the judgment result is yes. At this time, the MID further determines whether the name has a corresponding address in the address book. Recording, the judgment result is yes, the authentication table is updated, and the authentication process of the MID ends.
  • Step 4 In the data sharing process, the MID first checks the authentication table, and finds that one of the user IDs is Li Si, and the user authority is "Full sharing.” At this point, the MID retrieves the local shared file or folder and finds that there is a music folder whose corresponding share is "full sharing.” Next, the MID sends a query command to the shared MID device, requesting It returns its remaining storage space. After receiving the feedback, the MID compares the return value with the music folder and finds that the other party can store it normally. Next, MID The music folder is copied and sent to the "shared" directory under the local storage directory of the other party through the wireless interface. The MID will judge the abnormal interruption of the transmission.
  • Step 5 The process of user notification, that is, reporting the relevant data sharing to the user, in use
  • a prompt to start receiving data is displayed on the MID display of the transmitted and transmitted data, and the user is audibly alerted.
  • the MID will display a corresponding prompt to inform the user to know.
  • These prompts include, but are not limited to: file transfer time, data size, file name, and so on.
  • This step is implemented by the user notification module 50 described above. From the above description, it can be seen that the present invention achieves the following technical effects:
  • the mobile terminal can automatically share data information when they are close to each other, without requiring the user to perform any operation, thereby improving the user and the friend well.
  • the experience of information sharing can increase the attractiveness of mobile terminals to users, thereby increasing the market sales of mobile terminal products.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a mobile terminal and a data-share method for the mobile terminal, wherein, the method includes the following steps: a sharing mobile terminal detects mobile terminals around automatically; the sharing terminal performing identity authentications of the detected mobile terminals automatically; the sharing terminal automatically transmits the data to be shared to the mobile terminals which succeed in the identity authentication. The present invention can realize sharing data information among mobile terminals automatically when they are close to each other without any operations by users, can greatly improve the experience of information sharing between users and good friends, and further can increase the attraction for users.

Description

移动终端及其数据共享方法 技术领域 本发明涉及通信领域, 具体涉及一种移动终端及其数据共享方法。 背景技术 MID ( Mobile Internet Device, 移动互联网设备 ) 是在 2008年 IDF大会 上英特尔推出的一种新概念迷你笔记本电脑。 在英特尔的定义中, 这是一种 体积小于笔记电脑, 但大于手机的流动互联网装置。 MID 与 UMPC ( Ultra Mobile PC, 超便携移动计算机) 类似, 同样为便于携带的移动 PC产品, 通 过 MID, 用户可进入互联网, 随时享受娱乐、 进行信息查询、 邮件收发等操 作。 随着技术的进步, MID类产品正在逐步走上成熟, MID类产品介于智能 手机与 PC之间, 它具有比智能手机更大的屏幕以及更高的运算能力。 在此 背景下人们对 MID产品的数据存储空间有了更高的要求。 MID上需要保存 更多的数据, 比如: 电影、 音乐、 电子邮件、 相片等等。 人们在使用 MID的过程中, 时常会把一些数据等信息与好友进行分享, 目前常见的数据共享方法是使用数据线或者蓝牙, 釆用上述方法由于在共享 的过程中, 共享方和被共享方的每个步骤都需要人为操作, 如接收到用户通 过操作按键所生成的指令后才能执行, 这样会给用户带来不便。 发明内容 本发明的主要目的在于提供一种移动终端及其数据共享方法, 以至少解 决上述问题。 才艮据本发明的一个方面, 提供了一种移动终端的数据共享方法, 包括: 共享移动终端自动地检测其周围的移动终端; 共享移动终端自动地对检测到 的移动终端进行身份认证; 共享移动终端自动地将所要共享的数据传送给身 份认证成功的移动终端。 优选地, 共享移动终端自动地检测其周围的移动终端包括: 共享移动终 端周期性地釆用无线通信技术检测其周围的移动终端。 优选地, 共享移动终端自动地对检测到的移动终端进行身份认证包括: 共享移动终端判断检测到的移动终端的标识是否为已设置的好友所对应的移 动终端的标识, 其中, 好友是允许共享上述共享移动终端中的数据的移动终 端; 若是, 则判定检测到的移动终端身份认证成功。 优选地, 在共享移动终端自动地检测其周围的移动终端之前, 还包括: 共享移动终端接受用户设置共享移动终端的标识、 以及好友; 其中, 共享移 动终端接受用户设置好友包括: 接受用户在共享移动终端的通讯录中指定或 所对应的身份认证信息, 以及接受用户指定好友的共享权限, 其中, 身份认 证信息为好友所对应的移动终端的标识。 优选地, 在共享移动终端自动地检测其周围的移动终端之前, 还包括: 共享移动终端接受用户设置所要共享的文件 /文件夹, 其包括: 接受用户在共 享移动终端中指定文件 /文件夹作为好友所要共享的文件 /文件夹, 或者, 接 受用户指定好友所要共享的文件 /文件夹; 接受用户指定文件 /文件夹的共享 权限。 优选地, 共享权限为以下之一: 完全共享、 部分共享和加密共享; 其中, 完全共享是指身份认证成功,则共享移动终端将文件 /文件夹传送给身份认证 成功的移动终端; 部分共享是指文件 /文件夹受到限制或者好友受到限制; 加 密共享是指身份认证成功后, 共享移动终端还需检测身份认证成功的移动终 端提供的密钥是否正确,若密钥正确则共享移动终端将文件 /文件夹传送给身 份认证成功的移动终端。 优选地, 共享移动终端自动地将所要共享的数据传送给身份认证成功的 移动终端包括: 共享移动终端 居共享权限, 将文件 /文件夹传送给身份认证 成功的移动终端。 优选地,共享移动终端自动地对检测到的移动终端进行身份认证还包括: 共享移动终端向检测到的移动终端获取认证密钥; 共享移动终端判断获取到 的认证密钥是否正确; 若认证密钥正确, 则共享移动终端判定检测到的移动 终端身份认证成功。 优选地, 在共享移动终端自动地将所要共享的数据传送给身份认证成功 的移动终端之前, 还包括: 共享移动终端查询身份认证成功的移动终端的剩 余存储空间的大小; 共享移动终端判断剩余存储空间的大小不小于所要共享 的数据的大小。 优选地, 在上述的方法中, 还包括: 共享移动终端以及身份认证成功的 移动终端显示数据传送的信息; 其中, 数据传送的信息包括准备发送 /接收数 据的提示信息、 数据发送 /接收中断的提示信息、 以及数据传送时间、 数据大 'J、和传送的文件 /文件夹的名称。 根据本发明的另一方面, 提供了一种移动终端, 包括: 检测模块, 用于 自动地检测其周围的移动终端; 认证模块, 用于自动地对检测到的移动终端 进行身份认证; 数据共享模块, 用于自动地将所要共享的数据传送给身份认 证成功的移动终端。 通过本发明, 由于在数据的共享过程中, 共享移动终端的检测周围移动 终端、 身份认证以及数据传送的各个步骤都是自动执行的, 解决了相关技术 中存在的每个步骤都需要人为操作, 会给用户带来不便的问题, 从而可以实 现移动终端之间在接近时自动共享数据信息, 而无需用户进行任何操作, 可 以很好地提升用户与好友进行信息共享的体验, 进而可以增加对用户的吸引 力。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部 分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的 不当限定。 在附图中: 图 1是根据本发明实施例的移动终端的数据共享方法的流程图; 图 2是根据本发明实施例一的设置好友权限的流程图; 图 3是根据本发明实施例一的设置文件共享的流程图; 图 4是才艮据本发明实施例一的 MID发现过程的流程图; 图 5是才艮据本发明实施例一的 MID认证过程的流程图; 图 6是 居本发明实施例的移动终端的结构示意图; 图 7是 居本发明实施例一的移动终端的结构示意图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互组合。 图 1是根据本发明实施例的移动终端的数据共享方法的流程图, 包括以 下步骤: 步骤 S 102, 共享移动终端自动地检测其周围的移动终端; 步骤 S 104, 共享移动终端自动地对检测到的移动终端进行身份认证; 步骤 S 106,共享移动终端自动地将所要共享的数据传送给身份认证成功 的移动终端。 该实施例由于在数据的共享过程中,共享移动终端的检测周围移动终端、 身份认证以及数据传送的各个步骤都是自动执行的, 解决了相关技术中存在 的每个步骤都需要人为操作, 会给用户带来不便的问题。 使用该实施例可以 实现移动终端之间在接近时自动共享数据信息, 而无需用户进行任何操作, 可以很好地提升用户与好友进行信息共享的体验, 进而可以增加对用户的吸 引力。 其中, 上述移动终端可以是 MID、 手机或者家庭信息机等。 优选地, 步 4聚 S 102 包括: 共享移动终端周期性地釆用无线通信技术检 测其周围的移动终端。 这样, 釆用周期检测的方式可以实现自动检测。 其中, 所述方法中的移动终端支持常见的无线协议, 无线协议包括: 2G、 3G、 LTE、 Wi-Fi ( Wireless Fidelity, 无线保真技术)、 蓝牙、 红夕卜线、 FM ( Frequency Modulation, 调频) 等。 优选地, 步 4聚 S 104 包括: 共享移动终端判断检测到的移动终端的标识 是否为已设置的好友所对应的移动终端的标识; 若是, 则判定检测到的移动 终端身份认证成功。 该优选实施例提供了移动终端对周围检测到的移动终端进行身份认证的 一种具体实施方案, 可称为用户标识认证方法。 上述移动终端的标识可以是 姓名、 字符串等。 优选地, 在步骤 S 102 之前, 还包括: 共享移动终端接受用户设置该共 享移动终端的标识、 以及好友, 好友是允许共享数据的移动终端, 其中, 共 享移动终端接受用户设置好友包括: 接受用户在共享移动终端的通讯录中指 好友所对应的身份认证信息; 接受用户指定好友的共享权限; 其中, 身份认 证信息为好友所对应的移动终端的标识。 优选地, 在步骤 S 102 之前, 还包括: 共享移动终端接受用户设置所要 共享的文件 /文件夹, 其包括: 接受用户在共享移动终端中指定文件 /文件夹 作为好友所要共享的文件 /文件夹, 或者, 接受用户指定好友所要共享的文件 /文件夹; 接受用户指定文件 /文件夹的共享权限。 上述优选实施例提供了在共享移动终端在进行检测之前还需接受用户的 设置的具体实施方案。 用户设置允许共享数据的好友的方式包括两种: 一种 是在通讯录中保存的联系人中指定好友, 另一种是在用户或者生产厂商预先 建立的好友列表中建立好友及其所对应的移动终端标识 (即上述的身份认证 信息)。 而设置所要共享的文件 /文件夹也可以有两种方式: 一种是以所要共 享的文件 /文件夹来进行设置, 即指定共享移动终端本地保存的一个文件 /文 件夹作为共享文件 /文件夹, 并指定共享该文件 /文件夹的好友, 另一种是以 所要共享的好友来设置,即指定一个好友,并指定其所要共享的文件 /文件夹。 这样, 即可 居好友及其所要共享的文件 /文件夹的对应关系, 将文件 /文件 夹传送给对应的好友。 设置共享移动终端的标识的目的是: 当其作为被共享 的移动终端时可以在共享移动终端上进行识别和身份认证。 其中, 上述的共享权限为以下之一: 完全共享、 部分共享和加密共享; 其中, 完全共享是指身份认证成功, 则共享移动终端将文件 /文件夹传送给身 份认证成功的移动终端;部分共享是指文件 /文件夹受到限制或者好友受到限 制; 加密共享是指身份认证成功后, 共享移动终端还需检测身份认证成功的 移动终端提供的密钥是否正确,若密钥正确则共享移动终端将文件 /文件夹传 送给身份认证成功的移动终端。 该优选实施例提供了三种共享权限, 可以根据不同需要对不同好友或者 不同的共享文件 /文件夹设置不同的共享权限。 优选地, 步骤 S 106 包括: 共享移动终端 居共享权限, 将所要共享的 文件 /文件夹传送给身份认证成功的移动终端。 该实施例在传送过程中可以才艮据相对应的共享权限进行数据共享。 优选地, 步 4聚 S 104 还包括: 共享移动终端向检测到的移动终端获取认 证密钥; 共享移动终端判断获取到的认证密钥是否正确; 若认证密钥正确, 则共享移动终端判定检测到的移动终端身份认证成功。 该实施例提供了移动终端对周围检测到的移动终端进行身份认证的另一 种具体实施方案, 可称为加密认证方法。 该方法中只需-险证周围检测到的其 他移动终端提供的认证密钥。 优选地, 在步 4聚 S 106 之前, 还包括: 共享移动终端查询身份认证成功 的移动终端的剩余存储空间的大小; 共享移动终端判断剩余存储空间的大小 不小于所要共享的数据的大小。 这样, 可以提前避免因被共享移动终端的剩 余存储空间不够而导致的数据传送失败的问题。 优选地, 在上述方法中, 还包括: 共享移动终端以及身份认证成功的移 动终端显示数据传送的信息; 其中, 数据传送的信息包括准备发送 /接收数据 的提示信息、 数据发送 /接收中断的提示信息、 以及数据传送时间、 数据大小 和传送的文件 /文件夹的名称。 该优选实施例通过向用户 (包括共享用户以及被共享用户) 进行通知, 将数据传送的相关信息通知给用户, 从而使得用户清楚地知道数据传送的情 况, 进一步提升了用户的体验。 实施例一 以移动终端为 MID为例对本发明的数据共享方法进行详细说明,具体主 要包括以下五个步骤: 用户设置、 MID发现、 MID认证、 数据共享、 用户通 知。 步骤一, 用户设置。 用户对 MID进行设置,设置的内容包括用户标识设置,好友设置和文件 共享设置等。 用户标识设置是指用户设定自己的 MID标识, MID标识用于 在其它的 MID上进行识别和认证, 标识可以(但不限于)是用户的姓名或者 是一串密钥。 好友设置有多种方法, 其基本原理是用好友所对应的移动终端 的 ID来区分好友, 此方法需要被共享用户在其 MID上设置相同的 ID , 这样 在 MID相互发现时可以用来进行身份认证。 下面举出两种好友设置的方法。 方法一是用户直接对通讯录中的好友进 行设置, 方法二用户或者 MID生产商等在 MID上建立一个表 (可称为好友 列表), 保存好友的 ID, ID类型可以是姓名、 电话号码或者其它。 方法一: 用户对通讯录中保存的好友进行设置 (如图 2 所示), 即指定 通讯录中的条目 (对应于联系人) 作为好友, 还可以针对不同的好友设置不 同的共享权限, 共享权限的设置方法可以是: 完全共享、 部分共享、 加密共 享等。 文件共享设置指用户针对 MID本地存储的文件 /文件夹进行共享设置, 用户可以共享指定的文件或文件夹, 用户可以 4巴指定的文件或文件夹的共享 权限设置为完全共享、 部分共享、 加密共享等。 如图 2所示, 用户对好友的设置的上述方法一包括以下步骤: 步骤 S202, 用户进入通讯录, 并选择好友; 步骤 S204, 对所选择的好友设置其共享权限。 方法二: 用户在 ID表(即上述好友列表) 中建立好友 ID列表, ID类型 可以是姓名、 电话号码或者其它。 用户可以针对不同的 ID 号设置不同的数 据共享权限, 共享权限设置方法可以是: 完全共享、 部分共享、 加密共享等。 文件共享设置指用户针对 MID本地存储的文件进行共享设置,用户可以共享 指定的文件或文件文件夹,用户可以把指定的文件或文件夹设置为完全共享、 部分共享、 加密共享等。 图 3示出了根据本发明实施例一的设置文件共享的 流程图, 包括以下步 4聚: 步 4聚 S302, 用户选择共享 MID上本地保存的文件或者文件夹; 步骤 S304, 对所选择的文件或者文件夹设置其共享权限, 以及设置共享 该文件或者文件夹的好友。 在上述的两种方法中,设置一个好友所要共享的文件 /文件夹的方式可以 包括两种: The present invention relates to the field of communications, and in particular, to a mobile terminal and a data sharing method thereof. BACKGROUND OF THE INVENTION MID (Mobile Internet Device) is a new concept mini notebook computer introduced by Intel at the 2008 IDF conference. In Intel's definition, this is a mobile Internet device that is smaller than a laptop but larger than a mobile phone. Similar to UMPC (Ultra Mobile PC, Ultra Mobile PC), MID is also a portable mobile PC product. With MID, users can access the Internet and enjoy entertainment, information inquiry, and mail sending and receiving. With the advancement of technology, MID products are gradually maturing. MID products are between smartphones and PCs. They have larger screens and higher computing power than smartphones. In this context, people have higher requirements for the data storage space of MID products. More data needs to be saved on the MID, such as: movies, music, emails, photos, and more. In the process of using MID, people often share information such as data with friends. The common data sharing method is to use data cable or Bluetooth. The above method is used in the sharing process, the sharing party and the shared party. Each step requires human operation, such as receiving an instruction generated by the user through the operation of the button, which can cause inconvenience to the user. SUMMARY OF THE INVENTION A primary object of the present invention is to provide a mobile terminal and a data sharing method thereof to solve at least the above problems. According to an aspect of the present invention, a data sharing method for a mobile terminal is provided, including: a shared mobile terminal automatically detecting a mobile terminal therearound; a shared mobile terminal automatically performing identity authentication on the detected mobile terminal; sharing The mobile terminal automatically transmits the data to be shared to the mobile terminal with successful identity authentication. Preferably, the shared mobile terminal automatically detects the mobile terminal around it comprises: the shared mobile terminal periodically detects the mobile terminal around it by using a wireless communication technology. Preferably, the shared mobile terminal automatically authenticates the detected mobile terminal, including: the shared mobile terminal determines whether the detected identity of the mobile terminal is an identifier of the mobile terminal corresponding to the set friend, wherein the friend is allowed to share The mobile terminal sharing the data in the mobile terminal; if yes, determining that the detected mobile terminal identity authentication is successful. Preferably, before the shared mobile terminal automatically detects the mobile terminal around the mobile terminal, the shared mobile terminal further includes: the shared mobile terminal accepts the identifier of the shared mobile terminal, and the friend; wherein, the shared mobile terminal accepts the user setting the friend, including: accepting the user in the sharing The identity authentication information specified in the address book of the mobile terminal, and the sharing authority of the friend specified by the user, wherein the identity authentication information is the identifier of the mobile terminal corresponding to the friend. Preferably, before the shared mobile terminal automatically detects the mobile terminal around the shared mobile terminal, the method further includes: the shared mobile terminal accepting the file/folder to be shared by the user setting, the method comprising: accepting the user to specify the file/folder in the shared mobile terminal as The files/folders to be shared by the friends, or accept the files/folders to be shared by the user-specified friends; accept the sharing rights of the files/folders specified by the user. Preferably, the sharing permission is one of: full sharing, partial sharing, and encrypted sharing; wherein, the full sharing means that the identity authentication succeeds, and the shared mobile terminal transmits the file/folder to the mobile terminal with successful identity authentication; The file/folder is restricted or the friend is restricted. The encryption sharing means that after the identity authentication is successful, the shared mobile terminal needs to detect whether the key provided by the mobile terminal with successful identity authentication is correct, and if the key is correct, the shared mobile terminal will file. The / folder is transferred to the mobile terminal with successful authentication. Preferably, the shared mobile terminal automatically transmits the data to be shared to the mobile terminal with successful identity authentication, including: sharing the mobile terminal with sharing rights, and transmitting the file/folder to the mobile terminal with successful identity authentication. Preferably, the shared mobile terminal automatically authenticates the detected mobile terminal, further comprising: the shared mobile terminal acquiring an authentication key from the detected mobile terminal; and the shared mobile terminal determining whether the obtained authentication key is correct; If the key is correct, the shared mobile terminal determines that the detected mobile terminal identity authentication is successful. Preferably, before the shared mobile terminal automatically transmits the data to be shared to the mobile terminal with successful identity authentication, the method further includes: sharing, by the mobile terminal, a size of a remaining storage space of the mobile terminal that successfully authenticates the identity authentication; and determining, by the shared mobile terminal, the remaining storage The size of the space is not less than the size of the data to be shared. Preferably, in the above method, the method further includes: sharing the mobile terminal and the mobile terminal with successful identity authentication to display data transmission information; wherein the data transmission information includes prompt information for preparing to send/receive data, and data transmission/reception interruption. Prompt information, as well as the data transfer time, the large data 'J, and the name of the transferred file/folder. According to another aspect of the present invention, a mobile terminal is provided, including: a detecting module, configured to automatically detect a mobile terminal therearound; an authentication module, configured to automatically perform identity authentication on the detected mobile terminal; and data sharing The module is configured to automatically transfer the data to be shared to the mobile terminal with successful identity authentication. Through the present invention, since the steps of detecting the surrounding mobile terminal, identity authentication, and data transmission of the shared mobile terminal are automatically performed during the data sharing process, it is solved that each step existing in the related art requires human operation, It will bring inconvenience to the user, so that the mobile terminal can automatically share the data information when approaching, without the user performing any operation, which can improve the user's experience of sharing information with the friend, and thus can increase the user. Appeal. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are set to illustrate,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 1 is a flowchart of a data sharing method of a mobile terminal according to an embodiment of the present invention; FIG. 2 is a flowchart of setting a friend right according to a first embodiment of the present invention; FIG. 3 is a flowchart according to an embodiment of the present invention. Figure 4 is a flow chart of the MID discovery process according to the first embodiment of the present invention; Figure 5 is a flow chart of the MID authentication process according to the first embodiment of the present invention; 6 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention; and FIG. 7 is a schematic structural diagram of a mobile terminal according to Embodiment 1 of the present invention. BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. 1 is a flowchart of a data sharing method of a mobile terminal according to an embodiment of the present invention, including the following steps: Step S102: A shared mobile terminal automatically detects a mobile terminal therearound; Step S104, the shared mobile terminal automatically detects the mobile terminal The obtained mobile terminal performs identity authentication. Step S106: The shared mobile terminal automatically transmits the data to be shared to the mobile terminal with successful identity authentication. In this embodiment, since the steps of detecting the surrounding mobile terminal, identity authentication, and data transmission of the shared mobile terminal are automatically performed during the data sharing process, it is solved that each step existing in the related art requires human operation, and Inconvenience to the user. The embodiment can be used to automatically share data information between mobile terminals when approaching, without any operation by the user, which can improve the user's experience of sharing information with friends, thereby increasing the appeal to the user. The mobile terminal may be an MID, a mobile phone, a home information machine, or the like. Preferably, the step S102 includes: the shared mobile terminal periodically detects the mobile terminal around it by using a wireless communication technology. In this way, the automatic detection can be realized by using the cycle detection method. The mobile terminal in the method supports a common wireless protocol, and the wireless protocol includes: 2G, 3G, LTE, Wi-Fi (Wireless Fidelity, Wireless Fidelity), Bluetooth, Red Line, FM (Frequency Modulation, FM) and so on. Preferably, the step S4 includes: the shared mobile terminal determines whether the detected identity of the mobile terminal is an identifier of the mobile terminal corresponding to the set friend; if yes, determines that the detected mobile terminal identity authentication is successful. The preferred embodiment provides a specific implementation manner for the mobile terminal to perform identity authentication on the surrounding mobile terminal, which may be referred to as a user identity authentication method. The identifier of the mobile terminal may be a name, a character string, or the like. Preferably, before the step S102, the method further includes: the shared mobile terminal accepting the identifier of the shared mobile terminal, and the friend, the friend is a mobile terminal that allows the data to be shared, wherein the shared mobile terminal accepts the user setting the friend, including: accepting the user In the address book of the shared mobile terminal, the identity authentication information corresponding to the friend is accepted; the sharing authority of the user-specified friend is accepted; wherein the identity authentication information is the identifier of the mobile terminal corresponding to the friend. Preferably, before step S102, the method further includes: sharing, by the mobile terminal, a file/folder to be shared by the user setting, comprising: accepting a file/folder that the user specifies to share the file/folder as a friend in the shared mobile terminal , or accept the file/folder that the user-specified friend wants to share; accept the share permission of the user-specified file/folder. The preferred embodiment described above provides a specific implementation that also requires the user's settings to be accepted before the shared mobile terminal is performing the detection. There are two ways for a user to set a friend who is allowed to share data: one is to specify a friend among the contacts saved in the address book, and the other is to establish a friend and its corresponding one in the friend list pre-established by the user or the manufacturer. Mobile terminal identification (ie, the identity authentication information described above). There are two ways to set the files/folders to be shared: One is to set the files/folders to be shared, that is, to specify a file/folder saved locally by the shared mobile terminal as a shared file/folder. , and specify the friends who share the file/folder, and the other is set by the friends to share, that is, specify a friend and specify the files/folders they want to share. In this way, the file/folder can be transferred to the corresponding friend by the correspondence between the friend and the file/folder to be shared. The purpose of setting the identity of the shared mobile terminal is to: perform identification and identity authentication on the shared mobile terminal when it is the shared mobile terminal. The sharing permission mentioned above is one of the following: full sharing, partial sharing, and encrypted sharing; wherein, full sharing means that the identity authentication succeeds, and the shared mobile terminal transmits the file/folder to the mobile terminal with successful identity authentication; partial sharing The file/folder is restricted or the friend is restricted. The encryption sharing means that after the identity authentication is successful, the shared mobile terminal needs to detect whether the key provided by the mobile terminal with successful identity authentication is correct. If the key is correct, the shared mobile terminal will The file/folder is transferred to the mobile terminal with successful authentication. The preferred embodiment provides three sharing rights, and different sharing rights can be set for different friends or different shared files/folders according to different needs. Preferably, step S106 includes: sharing the mobile terminal with sharing rights, and transmitting the file/folder to be shared to the mobile terminal with successful identity authentication. In this embodiment, data sharing can be performed according to the corresponding sharing authority during the transmission process. Preferably, the step S4 includes: the shared mobile terminal acquires an authentication key from the detected mobile terminal; the shared mobile terminal determines whether the obtained authentication key is correct; if the authentication key is correct, the shared mobile terminal determines to detect The mobile terminal identity authentication succeeded. This embodiment provides another specific implementation manner in which the mobile terminal performs identity authentication on the surrounding mobile terminal, which may be referred to as an encryption authentication method. In this method, only the authentication key provided by other mobile terminals detected around the danger certificate is required. Preferably, before step S106, the method further includes: sharing, by the mobile terminal, a size of a remaining storage space of the mobile terminal that successfully authenticates the identity authentication; and the shared mobile terminal determines that the size of the remaining storage space is not smaller than the size of the data to be shared. In this way, the problem of data transmission failure due to insufficient storage space of the shared mobile terminal can be avoided in advance. Preferably, in the above method, the method further includes: sharing the mobile terminal and the mobile terminal with successful identity authentication to display data transmission information; wherein the data transmission information includes prompt information for preparing to send/receive data, and prompt for data transmission/reception interruption Information, as well as the data transfer time, data size, and the name of the transferred file/folder. The preferred embodiment notifies the user of the information about the data transmission by notifying the user (including the shared user and the shared user), so that the user clearly knows the data transmission situation, and further enhances the user experience. In the first embodiment, the data sharing method of the present invention is described in detail by taking the mobile terminal as the MID as an example, and specifically includes the following five steps: user setting, MID discovery, MID authentication, data sharing, and user notification. Step one, user settings. The user sets the MID, and the set contents include user identification settings, friend settings, and file sharing settings. User ID setting means that the user sets his own MID identifier. The MID identifier is used for identification and authentication on other MIDs. The identifier can be (but is not limited to) the user's name or a series of keys. There are several methods for setting up a friend. The basic principle is to distinguish the friend by the ID of the mobile terminal corresponding to the friend. This method needs to be set by the shared user on the MID, so that the MID can be used to identify the identity when they discover each other. Certification. Here are two ways to set up your friends. The first method is that the user directly sets the friend in the address book, and the method 2 user or the MID manufacturer establishes a table (which can be called a friend list) on the MID, and saves the ID of the friend, and the ID type can be a name, a phone number or other. Method 1: The user sets the friends saved in the address book (as shown in Figure 2), that is, specifies the entries in the address book (corresponding to the contacts) as friends, and can also set different sharing rights for different friends, sharing The permission setting method can be: full sharing, partial sharing, encrypted sharing, and so on. The file sharing setting refers to the sharing setting of the file/folder stored locally by the user for the MID, and the user can share the specified file or folder, and the sharing permission of the file or folder specified by the user can be set to be fully shared, partially shared, encrypted. Sharing, etc. As shown in FIG. 2, the method 1 of the user setting the friend includes the following steps: Step S202: The user enters the address book and selects a friend; Step S204, setting the sharing right of the selected friend. Method 2: The user establishes a friend ID list in the ID table (ie, the above friend list), and the ID type may be a name, a phone number, or the like. Users can set different data sharing permissions for different ID numbers. The sharing permission setting methods can be: full sharing, partial sharing, encrypted sharing, and so on. The file sharing setting refers to the user sharing settings for the files stored locally by the MID. The user can share the specified file or file folder, and the user can set the specified file or folder to be fully shared, partially shared, encrypted shared, and the like. FIG. 3 is a flowchart of setting file sharing according to the first embodiment of the present invention, including the following steps: Step 4: S302, the user selects a locally saved file or folder on the shared MID; Step S304, select the selected file A file or folder sets its share permissions and sets up friends who share the file or folder. In the above two methods, there are two ways to set a file/folder to be shared by a friend:
①以所要共享的文件 /文件夹来进行设置, 即在 MID本地保存的文件 /文 件夹中选择文件 /文件夹进行共享, 并指定共享所选择的文件 /文件夹的好友; 或者, 1Set the file/folder to be shared, that is, select the file/folder for sharing in the file/folder saved locally in the MID, and specify the friend who shares the selected file/folder; or
②以所要共享的好友进行设置, 即选择一个所要共享的好友, 并指定允 许其共享的文件 /文件夹。 以上内容中提到的"完全共享,,是指 MID之间只要满足共享的认证条件, 就可以共享文件, 不需要用户输出密钥; "部分共享,,是指共享的文件或者文 件夹受到限制, 或者是指共享针对的好友受到限制; "加密共享" 是指 MID 之间在满足共享的认证条件时, 数据共享前还需要被共享用户输入指定的密 钥, 并由其移动终端将该密钥发送给共享移动终端进行-险证, -险证密钥正确 共享移动终端才将共享数据传送给被共享移动终端。 步骤二, MID发现 (即上述的检测周围的移动终端的步骤)。 MID发现是指 MID通过无线通信技术自动定时检测周围的 MID设备。 一旦检测到其它的 MID设备, 就保存在其 MID记录表中, 并在下一次检测 时对 MID记录表进行刷新。 图 4是根据本发明实施例一的 MID发现过程的流程图, 包括以下步骤: 步骤 S402, MID (即共享移动终端) 通过无线方式周期性检测周围的 MID; 步骤 S404 , 记录检测结果到 MID记录表; 步骤 S406, 周期性地刷新 MID记录表。 上述的步 4聚 S402至步 4聚 S406是一个周期性地循环过程。 步 4聚三, MID认证。 MID 认证的目的是判断被共享用户是否可以分享共享用户的数据的权 限, 釆取的认证手段可以包括: 力口密认证、 用户标识认证。 加密认证是指 MID在判断其它 MID的身份时,要求其它 MID提供认证 密钥, 密钥正确, 则认证通过, 否则, 不通过, 然后把最终结果记录在认证 表中。 用户标识认证是指 MID判断其它 MID的用户标识, 比如被共享 MID 的用户标识是一个姓名, 则共享 MID判断这个姓名是否是好友, 如果是则进 一步判断该好友的共享权限设置, 然后把最终结果记录在认证表中。 图 5是根据本发明实施例一的 MID认证过程的流程图, 包括以下步骤: 步骤 S502, 共享 MID对 MID记录表中的已经检测到的各个 MID进行 身份认证; 步骤 S504, 检查当前的 MID的标识是否是一个姓名, 若是, 则进入步 骤 S506, 若否, 则进入步骤 S508; 步骤 S506, 判断该当前的 MID的姓名标识是否在通讯录中, 若是, 则 进入步骤 S510, 若否, 则返回步骤 S502; 步骤 S508, 检查当前的 MID的标识是否记录在好友 ID列表中, 若是, 则转入步 4聚 S510, 若否, 则返回步 4聚 S502; 步骤 S510, 判定该当前的 MID身份认证成功, 并记录到认证表中, 即 更新认证表。 步骤四, 数据共享。 2 Set up with the friends you want to share, that is, select a friend to share, and specify the files/folders that you are allowed to share. The "full sharing" mentioned in the above content means that the files can be shared between the MIDs as long as the shared authentication conditions are met, and the user does not need to output the keys; "Partial sharing means that the shared files or folders are restricted. , or means that the shared friends are restricted; "encrypted sharing" means that when the shared authentication conditions are met between the MIDs, the shared key is required to be input by the shared user before the data sharing, and the mobile terminal encrypts the key. The key is sent to the shared mobile terminal for the risk certificate, and the risk key correctly shares the mobile terminal to transmit the shared data to the shared mobile terminal. Step 2, MID discovery (ie, the above steps of detecting the surrounding mobile terminal). MID discovery means that the MID automatically detects the surrounding MID devices by wireless communication technology. Once other MID devices are detected, they are saved in their MID record table and the MID record table is refreshed on the next test. 4 is a flowchart of a MID discovery process according to the first embodiment of the present invention, including the following steps: Step S402: The MID (ie, the shared mobile terminal) periodically detects the surrounding MIDs by using a wireless method; Step S404, recording the detection result to the MID record. Table S406, periodically refreshing the MID record table. The above step 4 to S402 to step 4 to S406 is a cyclical process. Step 4 gathers three, MID certification. The purpose of the MID authentication is to determine whether the shared user can share the data of the shared user. The authentication methods may include: authentication and user identification. Encryption authentication means that when the MID judges the identity of other MIDs, it requires other MIDs to provide the authentication key. If the key is correct, the authentication passes. Otherwise, it fails, and the final result is recorded in the authentication table. User ID authentication means that the MID judges the user ID of another MID. For example, if the user ID of the shared MID is a name, the shared MID determines whether the name is a friend, and if so, further determines the sharing permission setting of the friend, and then the final result is obtained. Recorded in the certification form. 5 is a flowchart of a MID authentication process according to the first embodiment of the present invention, including the following steps: Step S502: The shared MID performs identity authentication on each MID that has been detected in the MID record table. Step S504, check the current MID. Whether the identifier is a name, if yes, proceed to step S506, if no, proceed to step S508; step S506, determine whether the current MID name identifier is in the address book, if yes, proceed to step S510, and if not, return Step S502: Step S508, checking whether the identifier of the current MID is recorded in the buddy ID list, and if yes, proceeding to step 4 S510, if no, returning to step 4 S502; Step S510, determining the current MID identity authentication Successful, and recorded in the certification table, that is, update the certification table. Step four, data sharing.
MID 针对认证通过的好友或者 ID, 同时才艮据相对应的权限, 进行数据 的共享和传输。数据共享前, 可根据情况选择是否对被共享 MID的存储空间 大小进行询问。 在数据传输时, 还需要考虑传输异常中断的情况, 并根据情 况来选择是否重传。 步 4聚五, 用户通知。 用户通知的目的是把数据共享的相关情况上报给用户, 信息上报的方法 包括但不限于: 将共享结果相关信息推送到用户 MID的待机界面, 同时可以 考虑发声提醒用户。 图 6是 居本发明实施例的移动终端 (称为共享移动终端) 的结构示意 图, 包括: 检测模块 10 , 用于自动地检测其周围的移动终端; 认证模块 20 , 用于自动地对检测到的移动终端进行身份认证; 数据共享模块 30 ,用于自动地将所要共享的数据传送给身份认证成功的 移动终端。 该实施例的移动终端由于在数据的共享过程中, 检测周围移动终端、 对 检测到的移动终端进行身份认证以及数据传送的各个步骤都是自动执行的, 解决了相关技术中存在的每个步骤都需要人为操作, 会给用户带来不便的问 题。 使用该实施例可以实现移动终端之间在接近时自动共享数据信息, 而无 需用户进行任何操作, 可以很好地提升用户与好友进行信息共享的体验, 进 而可以增加对用户的吸引力。 其中, 上述移动终端可以是 MID、 手机或者家庭信息机等。 本发明的移动终端可以具体地包括以下几个模块, 如图 7所示, 其中, 设置模块 40是发明生效的前提条件, 而检测模块 10、 认证模块 20和数据共 享模块 30是发明的主体部分, 用户通知模块 50是本发明完善性的补充。 优选地, 检测模块 10 包括: 无线检测模块, 用于周期性地釆用无线通 信技术检测其所在的移动终端的周围的移动终端。 优选地, 认证模块 20 包括: 判断模块, 用于判断检测到的移动终端的 标识是否为已设置的好友所对应的移动终端的标识, 其中, 好友是允许共享 数据的移动终端; 若是, 则判定检测到的移动终端身份认证成功。 优选地, 上述的移动终端还包括: 设置模块 40 , 用于接受用户设置共享 移动终端的标识、 以及好友; 其中, 设置模块 40 包括: 第一接受模块, 用 于接受用户在移动终端的通讯录中指定或输入条目作为好友或者在好友列表 中输入条目作为好友; 第二接受模块, 用于接受用户设置好友所对应的身份 认证信息, 以及接受用户指定好友的共享权限, 其中, 身份认证信息为好友 所对应的移动终端的标 i只。 优选地, 上述的设置模块 40还用于接受用户设置所要共享的文件 /文件 夹, 其中设置模块 40 还包括: 第三接受模块, 用于接受用户在移动终端中 指定文件 /文件夹作为好友所要共享的文件 /文件夹, 或者, 接受用户指定好 友所要共享的文件 /文件夹; 第四接受模块, 用于接受用户指定文件 /文件央 的共享权限。 优选地, 上述的共享权限为以下之一: 完全共享、 部分共享和加密共享; 其中, 完全共享是指身份认证成功, 则共享移动终端将文件 /文件夹传送给身 份认证成功的移动终端;部分共享是指文件 /文件夹受到限制或者好友受到限 制; 加密共享是指身份认证成功后, 共享移动终端还需检测身份认证成功的 移动终端提供的密钥是否正确,若密钥正确则共享移动终端将文件 /文件夹传 送给身份认证成功的移动终端。 优选地, 数据共享模块 30 包括: 发送模块, 用于 居所要共享的文件 / 文件夹的共享权限, 将文件 /文件夹传送给身份认证成功的移动终端。 优选地, 认证模块 20还包括: 获取模块, 用于向检测模块 10检测到的 移动终端获取认证密钥; 正确性判断模块, 用于判断获取模块获取到的认证 密钥是否正确; 确定模块, 用于在正确性判断模块的判断结果为认证密钥正 确的情况下, 判定检测模块 10检测到的移动终端身份认证成功。 优选地, 上述的移动终端还包括: 查询模块, 用于查询经认证模块 20 进行身份认证成功的移动终端的剩余存储空间的大小; 大小判断模块, 用于 判断查询模块查询到的剩余存储空间的大小是否不小于所要共享的数据的大 小。 则数据共享模块 30 在大小判断模块的判断结果为上述剩余存储空间的 大小不小于所要共享的数据的大小的情况下, 自动地将所要共享的数据传送 给身份认证成功的移动终端 优选地, 上述的移动终端还包括: 用户通知模块 50, 用于显示数据共享 模块 30的数据传送的信息; 其中, 数据传送的信息包括准备发送 /接收数据 的提示信息、 数据发送 /接收中断的提示信息、 以及数据传送时间、 数据大小 和传送的文件 /文件夹的名称。 结合上述实施例一本发明的数据共享方法可以具体包括以下步骤: 步骤 1 , 用户通过设置模块 40进行设置相关的操作。 用户对 MID进行 设置, 设置的内容包括用户标识设置、 好友设置和文件共享设置等。 具体地, 用户设定自己的用户标识 (即其 MID的标识 ), 用户可以 4巴自 己的姓名 (这里举例为: 张三)设置为其用户标识 ID。 对于好友设置,如图 2所示,用户首先需要对 MID进行相关的权限设置。 用户对通讯录中保存的好友 (此处举例为: 李四) 进行设置, 用户可以对李 四设置不同的数据共享权限, 例如设置李四的共享权限为完全共享。 好友设置有多种方法, 其基本原理是用 ID 来区分好友, 此方法需要好 友在其 MID上设置相同的 ID , 这样在 MID相互发现时可以用来进行用户认 证。 对于文件共享设置, 如图 3所示, 用户针对 MID本地存储的一个音乐文 件夹进行共享设置, 用户将该文件夹的共享权限设置为完全共享。 步骤 2 , MID的发现流程图如图 4所示, 这里假定用户把检测周期设定 为 5分钟, 那么 MID每隔 5分钟通过蓝牙对周边的 MID设备进行检索, 并 将每次检索后的结果保存到一个表(称为 MID记录表)里面, 该表中的信息 包括: 其它 MID的 ID号, 即用户标识。 如果该 MID周边有其它的可以发现 的 MID, 则表中会显示其 ID号。 在此我们^ _定, 表中检索到 "李四,, 这位 用户的 ID, 并显示其连接状态正常。 步骤 3 , MID认证的流程图如图 5所示, 认证开始后, 首先查看 MID记 录表, 此时 MID记录表中显示一位叫李四的用户, 此时 MID会判断这个 ID 是否是一个姓名, 判断结果为是, 此时 MID进一步判断这个姓名是否在通讯 录中有相应的记录, 判断结果为是, 更新认证表, 到此 MID的一次认证过程 结束。 步骤 4, 在数据共享过程中, MID首先查看认证表, 发现其中有一位用 户 ID为李四, 并且其用户权限为 "完全共享"。 此时, MID检索本地的共享 文件或文件夹, 发现有一个音乐文件夹, 其相应的共享为 "完全共享"。 接下 来, MID向被共享 MID设备发送一个查询指令, 要求其返回其剩余存储空 间, 接收到反馈后, MID将返回值大小与音乐文件夹进行对比, 发现对方可 以正常存储。 接下来, MID会通过无线接口把音乐文件夹拷贝并发送到对方 的本地存储才艮目录下的 "共享" 目录中。 其中, MID会判断传输异常中断的 情况, 如果发生中断, 则 MID会间隔一定的时间后重新尝试新的传输。 这里 要说明的一点是如果一次传送正常完成, MID 上会记录相应的传送记录历 史, 下次与相同的 MID进行认证后, MID会判断已经成功传送过的文件, 以便不会出现同样的数据进行多次传送。 步骤 5 , 用户通知的过程, 即把相关数据共享的情况上报给用户, 在用 户认证完成, 并准备开始传送数据时,传送与被传送数据的 MID显示屏上显 示出一个准备开始接收数据的提示, 同时发声提醒用户。 相应的在数据传送 完毕, 或者中断后, MID会出现相应的提示来通知用户知晓。 这些提示信息 包括但不限于: 文件传送的时间、 数据大小、 文件名等。 该步骤是由上述的 用户通知模块 50来实现的。 从以上的描述中, 可以看出, 本发明实现了如下技术效果: 实现了移动 终端之间在相互接近时可以自动共享数据信息, 无需用户进行任何操作, 从 而可以很好地提升用户与好友进行信息共享的体验, 可以增加移动终端对用 户的吸引力, 进而提升移动终端产品的市场销量。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 并 且在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤, 或者 将它们分别制作成各个集成电路模块, 或者将它们中的多个模块或步骤制作 成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软件 结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的 ^"神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。 The MID is for the friend or ID passed by the authentication, and at the same time, the data is shared and transmitted according to the corresponding authority. Before data sharing, you can choose whether to query the storage space size of the shared MID according to the situation. In the case of data transmission, it is also necessary to consider the case of abnormal transmission interruption, and select whether to retransmit according to the situation. Step 4 gathers five, the user informs. The purpose of the user notification is to report the related situation of the data sharing to the user. The method for reporting the information includes but is not limited to: pushing the information about the sharing result to the standby interface of the user MID, and at the same time, the user may be considered to audibly alert the user. FIG. 6 is a schematic structural diagram of a mobile terminal (referred to as a shared mobile terminal) according to an embodiment of the present invention, including: The detecting module 10 is configured to automatically detect the mobile terminal around it; the authentication module 20 is configured to automatically authenticate the detected mobile terminal; and the data sharing module 30 is configured to automatically transmit the data to be shared to the identity. Successfully authenticated mobile terminal. The mobile terminal of this embodiment automatically performs each step of detecting the surrounding mobile terminal, performing identity authentication on the detected mobile terminal, and data transmission during the data sharing process, and solves each step existing in the related art. All need human operation, which will cause inconvenience to users. The embodiment can be used to automatically share data information between mobile terminals when approaching, without any operation by the user, which can improve the user's experience of sharing information with friends, thereby increasing the appeal to the user. The mobile terminal may be an MID, a mobile phone, a home information machine, or the like. The mobile terminal of the present invention may specifically include the following modules, as shown in FIG. 7, wherein the setting module 40 is a prerequisite for the invention to be effective, and the detecting module 10, the authentication module 20, and the data sharing module 30 are the main parts of the invention. The user notification module 50 is a supplement to the integrity of the present invention. Preferably, the detecting module 10 comprises: a wireless detecting module, configured to periodically detect the mobile terminal around the mobile terminal where the mobile terminal is located by using a wireless communication technology. Preferably, the authentication module 20 includes: a determining module, configured to determine whether the detected identity of the mobile terminal is an identifier of the mobile terminal corresponding to the configured friend, where the friend is a mobile terminal that allows data to be shared; if yes, determine The detected mobile terminal identity authentication is successful. Preferably, the mobile terminal further includes: a setting module 40, configured to accept an identifier of the user to set the shared mobile terminal, and a friend; wherein the setting module 40 includes: a first accepting module, configured to accept the user's address book in the mobile terminal Specifying or inputting an entry as a friend or inputting an entry as a friend in the buddy list; a second accepting module, configured to accept the user to set the identity authentication information corresponding to the buddy, and accept the sharing privilege of the user-specified buddy, wherein the identity authentication information is The target i of the mobile terminal corresponding to the friend. Preferably, the setting module 40 is further configured to accept a file/folder to be shared by the user, where the setting module 40 further includes: a third accepting module, configured to accept that the user specifies the file/folder as a friend in the mobile terminal. The shared file/folder, or accept the file/folder to be shared by the user-specified friend; the fourth accepting module, for accepting the user-specified file/file Sharing permissions. Preferably, the sharing permission is one of the following: a full sharing, a partial sharing, and an encrypted sharing; wherein, the full sharing means that the identity authentication is successful, and the shared mobile terminal transmits the file/folder to the mobile terminal with successful identity authentication; Sharing means that the file/folder is restricted or the friend is restricted; the encryption sharing means that after the identity authentication is successful, the shared mobile terminal also needs to detect whether the key provided by the mobile terminal with successful identity authentication is correct, and if the key is correct, the mobile terminal is shared. Transfer the file/folder to the mobile terminal with successful authentication. Preferably, the data sharing module 30 includes: a sending module, configured to share the file/folder of the file/folder to be shared, and transfer the file/folder to the mobile terminal with successful identity authentication. Preferably, the authentication module 20 further includes: an obtaining module, configured to acquire an authentication key from the mobile terminal detected by the detecting module 10; a correctness determining module, configured to determine whether the authentication key acquired by the acquiring module is correct; When the judgment result of the correctness judgment module is that the authentication key is correct, it is determined that the mobile terminal identity authentication detected by the detection module 10 is successful. Preferably, the foregoing mobile terminal further includes: a querying module, configured to query a size of a remaining storage space of the mobile terminal successfully authenticated by the authentication module 20; and a size determining module, configured to determine a remaining storage space queried by the query module Whether the size is not less than the size of the data to be shared. The data sharing module 30 automatically transmits the data to be shared to the mobile terminal with successful identity authentication, preferably, if the size of the remaining storage space is not smaller than the size of the data to be shared. The mobile terminal further includes: a user notification module 50, configured to display information of data transmission of the data sharing module 30; wherein, the data transmission information includes prompt information for preparing to send/receive data, prompt information for data transmission/reception interruption, and Data transfer time, data size, and the name of the transferred file/folder. The data sharing method of the present invention may include the following steps in combination with the foregoing embodiment: Step 1: The user performs setting related operations through the setting module 40. The user sets the MID, and the settings include user identification settings, friend settings, and file sharing settings. Specifically, the user sets his own user identifier (ie, the identifier of his MID), and the user can set his own name (here, for example: Zhang San) as its user identification ID. For the friend setting, as shown in Figure 2, the user first needs to set the relevant permissions for the MID. The user sets the friend saved in the address book (here, Li Si), and the user can set different data sharing rights for Li Si, for example, setting the sharing right of Li Si to be completely shared. There are several ways to set up a friend. The basic principle is to use ID to distinguish friends. This method requires friends to set the same ID on their MID, so that they can be used for user authentication when MIDs discover each other. For the file sharing setting, as shown in FIG. 3, the user performs sharing setting for one music folder locally stored by the MID, and the user sets the sharing right of the folder to be completely shared. Step 2, the MID discovery flow chart is shown in Figure 4. Here, it is assumed that the user sets the detection period to 5 minutes, then the MID searches for the surrounding MID device via Bluetooth every 5 minutes, and the result after each retrieval. Saved to a table (called MID record table), the information in the table includes: ID number of other MID, that is, user ID. If there are other MIDs that can be found around the MID, the ID number will be displayed in the table. Here we ^ _, the table retrieves "Li Si,, the user's ID, and shows that its connection status is normal. Step 3, MID authentication flow chart shown in Figure 5, after the authentication starts, first check the MID Record table, at this time, a user named Li Si is displayed in the MID record table. At this time, the MID will judge whether the ID is a name, and the judgment result is yes. At this time, the MID further determines whether the name has a corresponding address in the address book. Recording, the judgment result is yes, the authentication table is updated, and the authentication process of the MID ends. Step 4: In the data sharing process, the MID first checks the authentication table, and finds that one of the user IDs is Li Si, and the user authority is "Full sharing." At this point, the MID retrieves the local shared file or folder and finds that there is a music folder whose corresponding share is "full sharing." Next, the MID sends a query command to the shared MID device, requesting It returns its remaining storage space. After receiving the feedback, the MID compares the return value with the music folder and finds that the other party can store it normally. Next, MID The music folder is copied and sent to the "shared" directory under the local storage directory of the other party through the wireless interface. The MID will judge the abnormal interruption of the transmission. If an interruption occurs, the MID will be re-separated after a certain time. Try a new transfer. The point to note here is that if a transfer is completed normally, the corresponding transfer history will be recorded on the MID. After the next MID is authenticated, the MID will judge the file that has been successfully transferred, so that it will not The same data appears and is transmitted multiple times. Step 5: The process of user notification, that is, reporting the relevant data sharing to the user, in use When the user authentication is completed and ready to start transmitting data, a prompt to start receiving data is displayed on the MID display of the transmitted and transmitted data, and the user is audibly alerted. Correspondingly, after the data transfer is completed, or after the interruption, the MID will display a corresponding prompt to inform the user to know. These prompts include, but are not limited to: file transfer time, data size, file name, and so on. This step is implemented by the user notification module 50 described above. From the above description, it can be seen that the present invention achieves the following technical effects: The mobile terminal can automatically share data information when they are close to each other, without requiring the user to perform any operation, thereby improving the user and the friend well. The experience of information sharing can increase the attractiveness of mobile terminals to users, thereby increasing the market sales of mobile terminal products. Obviously, those skilled in the art should understand that the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. The steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the scope of the present invention are intended to be included within the scope of the present invention.

Claims

权 利 要 求 书 Claim
1. 一种移动终端的数据共享方法, 其特征在于, 包括: A data sharing method for a mobile terminal, comprising:
共享移动终端自动地检测其周围的移动终端; 所述共享移动终端自动地对检测到的移动终端进行身份认证; 所述共享移动终端自动地将所要共享的数据传送给所述身份认证成 功的移动终端。  The shared mobile terminal automatically detects the mobile terminal around it; the shared mobile terminal automatically performs identity authentication on the detected mobile terminal; the shared mobile terminal automatically transmits the data to be shared to the mobile with successful identity authentication terminal.
2. 根据权利要求 1所述的方法, 其特征在于, 共享移动终端自动地检测其 周围的移动终端包括: 2. The method according to claim 1, wherein the shared mobile terminal automatically detects the mobile terminal around it comprises:
所述共享移动终端周期性地釆用无线通信技术检测其周围的移动终 端。  The shared mobile terminal periodically detects the mobile terminals around it using wireless communication technology.
3. 根据权利要求 1所述的方法, 其特征在于, 所述共享移动终端自动地对 检测到的移动终端进行身份认证包括: 所述共享移动终端判断所述检测到的移动终端的标识是否为已设置 的好友所对应的移动终端的标识, 其中, 所述好友是允许共享所述共享 移动终端中的数据的移动终端; The method according to claim 1, wherein the shared mobile terminal automatically performs identity authentication on the detected mobile terminal, including: the shared mobile terminal determining whether the detected identity of the mobile terminal is An identifier of the mobile terminal corresponding to the friend that has been set, wherein the friend is a mobile terminal that allows sharing of data in the shared mobile terminal;
若是, 则判定所述检测到的移动终端身份认证成功。  If yes, it is determined that the detected mobile terminal identity authentication is successful.
4. 根据权利要求 3所述的方法, 其特征在于, 在共享移动终端自动地检测 其周围的移动终端之前, 还包括: 所述共享移动终端接受用户设置所述 共享移动终端的标识、 以及所述好友; 其中, 所述共享移动终端接受用 户设置所述好友包括: The method according to claim 3, wherein before the shared mobile terminal automatically detects the mobile terminal around the shared mobile terminal, the method further includes: the shared mobile terminal accepting a user setting an identifier of the shared mobile terminal, and a friend; wherein, the sharing mobile terminal accepting a user setting the friend includes:
接受用户在所述共享移动终端的通讯录中指定或输入条目作为所述 好友或者在好友列表中输入条目作为所述好友;  Accepting, by the user, specifying or inputting an entry in the address book of the shared mobile terminal as the friend or inputting an entry in the friend list as the friend;
接受用户设置所述好友所对应的身份认证信息, 以及接受用户指定 所述好友的共享权限, 其中, 所述身份认证信息为所述好友所对应的移 动终端的标 i只。  The user is configured to set the identity authentication information corresponding to the friend, and accept the sharing permission of the friend by the user, where the identity authentication information is the target of the mobile terminal corresponding to the friend.
5. 根据权利要求 4所述的方法, 其特征在于, 在共享移动终端自动地检测 其周围的移动终端之前, 还包括: 所述共享移动终端接受用户设置所要 共享的文件 /文件夹, 其包括: The method according to claim 4, wherein before the shared mobile terminal automatically detects the mobile terminal around the mobile terminal, the method further comprises: the sharing mobile terminal accepting the user setting Shared files/folders, which include:
接受用户在所述共享移动终端中指定文件 /文件夹作为所述好友所 要共享的文件 /文件夹, 或者, 接受用户指定所述好友所要共享的文件 / 文件夹;  Accepting a file/folder specified by the user in the shared mobile terminal as a file/folder to be shared by the friend, or accepting a file/folder to which the user specifies the friend to share;
接受用户指定所述文件 /文件夹的共享权限。  Accept user-specified share permissions for the file/folder.
6. 根据权利要求 5所述的方法, 其特征在于, 所述共享权限为以下之一: 完全共享、 部分共享和加密共享; 其中, 所述完全共享是指所述身份认证成功, 则所述共享移动终端 将所述文件 /文件夹传送给所述身份认证成功的移动终端; The method according to claim 5, wherein the sharing right is one of: full sharing, partial sharing, and encrypted sharing; wherein, the full sharing means that the identity authentication is successful, The shared mobile terminal transmits the file/folder to the mobile terminal with successful identity authentication;
所述部分共享是指所述文件 /文件夹受到限制或者所述好友受到限 制;  The partial sharing means that the file/folder is restricted or the friend is restricted;
所述加密共享是指所述身份认证成功后, 所述共享移动终端还需检 测所述身份认证成功的移动终端提供的密钥是否正确, 若所述密钥正确 动终端。  The encryption sharing means that after the identity authentication succeeds, the shared mobile terminal further needs to detect whether the key provided by the mobile terminal with successful identity authentication is correct, if the key is correct to the terminal.
7. 根据权利要求 5所述的方法, 其特征在于, 所述共享移动终端自动地将 所要共享的数据传送给所述身份认证成功的移动终端包括: 所述共享移动终端 居所述共享权限 , 将所述文件 /文件夹传送给所 述身份认证成功的移动终端。 The method according to claim 5, wherein the sharing of the data to be shared by the shared mobile terminal to the mobile terminal with successful identity authentication comprises: the sharing mobile terminal locating the sharing authority, Transmitting the file/folder to the mobile terminal with successful identity authentication.
8. 根据权利要求 1所述的方法, 其特征在于, 所述共享移动终端自动地对 检测到的移动终端进行身份认证还包括: The method according to claim 1, wherein the sharing, by the shared mobile terminal, the identity authentication of the detected mobile terminal automatically includes:
所述共享移动终端向所述检测到的移动终端获取认证密钥; 所述共享移动终端判断获取到的所述认证密钥是否正确; 若所述认证密钥正确, 则所述共享移动终端判定所述检测到的移动 终端身份认证成功。  The shared mobile terminal acquires an authentication key from the detected mobile terminal; the shared mobile terminal determines whether the obtained authentication key is correct; if the authentication key is correct, the shared mobile terminal determines The detected identity authentication of the mobile terminal is successful.
9. 根据权利要求 1所述的方法, 其特征在于, 在所述共享移动终端自动地 将所要共享的数据传送给所述身份认证成功的移动终端之前, 还包括: 所述共享移动终端查询所述身份认证成功的移动终端的剩余存储空 间的大小; 所述共享移动终端判断所述剩余存储空间的大小不小于所述所要共 享的数据的大小。 The method according to claim 1, wherein before the shared mobile terminal automatically transmits the data to be shared to the mobile terminal with successful identity authentication, the method further includes: the shared mobile terminal querying the location Describe the size of the remaining storage space of the mobile terminal with successful identity authentication; The shared mobile terminal determines that the size of the remaining storage space is not smaller than the size of the data to be shared.
10. 根据权利要求 1所述的方法, 其特征在于, 还包括: 10. The method according to claim 1, further comprising:
所述共享移动终端以及所述身份认证成功的移动终端显示数据传送 的信息;  The shared mobile terminal and the mobile terminal with successful identity authentication display information of data transmission;
其中, 所述数据传送的信息包括准备发送 /接收数据的提示信息、 数 据发送 /接收中断的提示信息、 以及数据传送时间、 数据大小和传送的文 件 /文件夹的名称。  The information transmitted by the data includes prompt information for preparing to transmit/receive data, prompt information for data transmission/reception interruption, and data transmission time, data size, and name of the transferred file/folder.
11. 根据权利要求 1至 10中任一项所述的方法, 其特征在于, 所述共享移动 终端和所述移动终端为移动互联网设备。 The method according to any one of claims 1 to 10, wherein the shared mobile terminal and the mobile terminal are mobile internet devices.
12. 一种移动终端, 其特征在于, 包括: 12. A mobile terminal, comprising:
检测模块, 用于自动地检测其周围的移动终端;  a detecting module, configured to automatically detect a mobile terminal around the detecting terminal;
认证模块, 用于自动地对检测到的移动终端进行身份认证; 数据共享模块, 用于自动地将所要共享的数据传送给所述身份认证 成功的移动终端。  And an authentication module, configured to automatically authenticate the detected mobile terminal, and a data sharing module, configured to automatically transmit the data to be shared to the mobile terminal with the identity authentication success.
13. 根据权利要求 12所述的移动终端, 其特征在于, 所述移动终端为移动互 联网设备。 The mobile terminal according to claim 12, wherein the mobile terminal is a mobile internet device.
PCT/CN2010/074692 2010-03-03 2010-06-29 Mobile terminal and a data-share method for the mobile terminal WO2011106956A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010143496A CN101807944A (en) 2010-03-03 2010-03-03 Mobile terminal and data sharing method thereof
CN201010143496.X 2010-03-03

Publications (1)

Publication Number Publication Date
WO2011106956A1 true WO2011106956A1 (en) 2011-09-09

Family

ID=42609574

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/074692 WO2011106956A1 (en) 2010-03-03 2010-06-29 Mobile terminal and a data-share method for the mobile terminal

Country Status (2)

Country Link
CN (1) CN101807944A (en)
WO (1) WO2011106956A1 (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2011202836B2 (en) 2010-12-21 2014-04-10 Lg Electronics Inc. Mobile terminal and method of controlling a mode screen display therein
AU2011202838B2 (en) 2010-12-21 2014-04-10 Lg Electronics Inc. Mobile terminal and method of controlling a mode screen display therein
CN102651751A (en) * 2011-02-25 2012-08-29 国基电子(上海)有限公司 File transmission system and file transmission method of file transmission system
CN103108007B (en) * 2011-11-14 2016-03-30 联想(北京)有限公司 Terminal equipment and document receiving method thereof
CN103188312B (en) * 2011-12-30 2018-05-11 上海博泰悦臻电子设备制造有限公司 Data handling system and data processing method
CN102624912A (en) * 2012-03-20 2012-08-01 无锡德思普科技有限公司 Method for point-to-point information transmission of intelligent terminals
CN102685747A (en) * 2012-05-04 2012-09-19 深圳芯智汇科技有限公司 Mobile equipment and data transmission method thereof
CN103457644B (en) * 2012-05-29 2015-11-25 三星电子(中国)研发中心 The method of backup associated person information and portable terminal
CN103457643A (en) * 2012-05-29 2013-12-18 宏碁股份有限公司 System and method for sharing files of near-field communication devices
EP2701103A3 (en) * 2012-08-24 2014-03-26 Samsung Electronics Co., Ltd Method of recommending friends, and server and terminal therefor
CN102970063B (en) * 2012-10-26 2015-12-16 北京三星通信技术研究有限公司 The method of near-field communication and equipment thereof
CN102970439B (en) * 2012-11-29 2014-10-15 广东欧珀移动通信有限公司 Method and device for sharing application programs of mobile phones
CN103929452B (en) * 2013-01-14 2018-04-27 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN103973874A (en) * 2013-01-31 2014-08-06 联想(北京)有限公司 Device associating method and device
CN103475788B (en) * 2013-09-24 2015-08-05 广东欧珀移动通信有限公司 A kind of method and system of mobile device fast sharing file
CN105227607A (en) * 2014-06-24 2016-01-06 中兴通讯股份有限公司 A kind of method, apparatus and system of data sharing
CN104079645A (en) * 2014-06-27 2014-10-01 华为技术有限公司 Information sharing method and device
CN105450833A (en) * 2014-08-19 2016-03-30 联想(北京)有限公司 Information processing method and electronic equipment
CN104640060B (en) 2015-01-28 2019-08-23 惠州Tcl移动通信有限公司 A kind of method and its system of data sharing
CN104883352B (en) * 2015-03-31 2018-09-28 北京畅游天下网络技术有限公司 A kind of message method for anti-counterfeit and device in social software
CN106506577A (en) * 2015-09-07 2017-03-15 腾讯科技(深圳)有限公司 A kind of terminal control method and device
CN106998318A (en) * 2016-01-22 2017-08-01 广东福地新视野光电技术有限公司 A kind of PACS authority control method and system
CN108076009B (en) * 2016-11-10 2021-03-19 杭州海康威视数字技术股份有限公司 Resource sharing method, device and system
CN106648899A (en) * 2016-12-28 2017-05-10 深圳Tcl数字技术有限公司 Cloud computing storage method and device based on surplus storage space of terminal device
CN108156128A (en) * 2017-01-03 2018-06-12 中兴通讯股份有限公司 A kind of sharing method, apparatus and system
CN107728973A (en) * 2017-08-31 2018-02-23 努比亚技术有限公司 Screen sharing method, system, initiating terminal and computer-readable recording medium
CN110069938A (en) * 2018-01-24 2019-07-30 中兴通讯股份有限公司 A kind of method, equipment and storage medium for protecting contact data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794842A (en) * 2004-12-23 2006-06-28 乐金电子(中国)研究开发中心有限公司 Personal information share device and method of portable terminal
CN101202977A (en) * 2006-12-14 2008-06-18 英华达(上海)电子有限公司 Method and terminal for implementation of information sharing in mobile communication
KR20080090786A (en) * 2007-04-06 2008-10-09 엘지전자 주식회사 Data sharing based on mobile device
CN101547026A (en) * 2009-01-16 2009-09-30 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and system and method for sharing and downloading data of same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794842A (en) * 2004-12-23 2006-06-28 乐金电子(中国)研究开发中心有限公司 Personal information share device and method of portable terminal
CN101202977A (en) * 2006-12-14 2008-06-18 英华达(上海)电子有限公司 Method and terminal for implementation of information sharing in mobile communication
KR20080090786A (en) * 2007-04-06 2008-10-09 엘지전자 주식회사 Data sharing based on mobile device
CN101547026A (en) * 2009-01-16 2009-09-30 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and system and method for sharing and downloading data of same

Also Published As

Publication number Publication date
CN101807944A (en) 2010-08-18

Similar Documents

Publication Publication Date Title
WO2011106956A1 (en) Mobile terminal and a data-share method for the mobile terminal
KR102018971B1 (en) Method for enabling network access device to access wireless network access point, network access device, application server and non-volatile computer readable storage medium
US20180248694A1 (en) Assisted device provisioning in a network
US9031050B2 (en) Using a mobile device to enable another device to connect to a wireless network
US9628585B2 (en) Systems and methods for cross-layer secure connection set up
US8594632B1 (en) Device to-device (D2D) discovery without authenticating through cloud
JP5524157B2 (en) Secure wireless link between two devices using a probe
JP3800198B2 (en) Information processing apparatus, access control processing method, and computer program
JP6668407B2 (en) Terminal authentication method and apparatus used in mobile communication system
EP2775741A1 (en) Electronic name card exchange method, terminal and system
US20160242033A1 (en) Communication service using method and electronic device supporting the same
CN110235424A (en) For providing the device and method with managing security information in a communications system
US11765164B2 (en) Server-based setup for connecting a device to a local area network
TW201132171A (en) Methods and apparatus for solicited activation for protected wireless networking
US20180337785A1 (en) Secure password sharing for wireless networks
CN108667699B (en) Method and device for interconnecting terminal equipment and gateway equipment
CN102739642A (en) Permitting access to a network
US11824854B2 (en) Communication system and computer readable storage medium
CA2828258C (en) Smart plug or cradle
WO2018107593A1 (en) Method and device for sharing file between different terminals
CN106452999B (en) Intelligent household appliance and method and device for safely accessing intelligent household appliance
CN111726801A (en) Network security control method
EP3833153B1 (en) Network connection methods and devices
US20180160463A1 (en) Wireless control of devices
CN108702705B (en) Information transmission method and equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10846875

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10846875

Country of ref document: EP

Kind code of ref document: A1