CN105119881A - File sharing method and terminal - Google Patents

File sharing method and terminal Download PDF

Info

Publication number
CN105119881A
CN105119881A CN201510398895.3A CN201510398895A CN105119881A CN 105119881 A CN105119881 A CN 105119881A CN 201510398895 A CN201510398895 A CN 201510398895A CN 105119881 A CN105119881 A CN 105119881A
Authority
CN
China
Prior art keywords
terminal
user
password
shared
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510398895.3A
Other languages
Chinese (zh)
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510398895.3A priority Critical patent/CN105119881A/en
Publication of CN105119881A publication Critical patent/CN105119881A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention provides a file sharing method and terminal. The method includes that a first terminal detects that a user shakes the first terminal and hits the parameters of the first terminal, generates a sharing cipher according to detected parameters and preset rules, and encrypts shared files through the sharing cipher; the encrypted file and the sharing cipher are sent to a second terminal to allow the second terminal to execute shaking or hitting operation according to the preset rules and the sharing cipher to decrypt the shared files. Shaking or hitting the parameters of a first terminal are detected to generate sharing cipher, so that remembering sharing cipher is easy and interesting, and the terminal is easy to use.

Description

A kind of method of shared file and terminal
Technical field
The present invention relates to communication technical field, be specifically related to a kind of method and terminal of shared file.
Background technology
Along with the development of electronic technology and terminal technology, market there is various terminal equipment, such as mobile phone, panel computer, notebook computer, Intelligent bracelet etc.Utilize these terminal equipments, user not only can work, amusement, can also and other users carry out file transfer, voice-enabled chat, Video chat even move flow share etc. various communication activity.
When carrying out file-sharing between terminal, in order to protect the fail safe of shared file, need to be encrypted file; prior art is arranged by user or system stochastic generation usually, for access side, needs to remember oneself unfamiliar shared password; easily make mistakes, Consumer's Experience is not good.
Summary of the invention
Embodiments provide a kind of method and terminal of shared file, not easily remember to solve shared password, the problem of easily makeing mistakes during Password Input.
Embodiment of the present invention first aspect provides a kind of method of shared file, comprising:
First terminal detects user and rocks described first terminal or knock the parameter of described first terminal, generates share password according to the parameter detected and preset rules;
Described shared password is used to be encrypted by shared file;
File after encryption and described shared password are sent to the second terminal, so as described second terminal receive that user performs according to described preset rules and described shared password rock or knock operation, to described shared file decryption.
Wherein, described first terminal detects the parameter that user rocks described first terminal, generates and shares password, comprising according to the parameter detected and preset rules:
Detect direction and number of times that user rocks described first terminal;
By the direction of rocking and number of times corresponding with character or mathematic(al) representation;
When user stops rocking after described first terminal reaches Preset Time, rock direction and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
Wherein, described first terminal detects the parameter that user knocks described first terminal, generates and shares password, comprising according to the parameter detected and preset rules:
Detect the number of times that user knocks described first terminal zones of different successively;
By the region of knocking and number of times corresponding with character or mathematic(al) representation;
When user stops knocking after described first terminal reaches Preset Time, knock region and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
Wherein, described first terminal detects the parameter that user knocks described first terminal, generates and shares password, comprising according to the parameter detected and preset rules:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
By corresponding with character for the number of times knocked;
When user stops knocking after described first terminal reaches Preset Time, within each time interval, knock the number of times of described first terminal according to the user detected, generate the shared password be made up of character.
Wherein, described character comprises letter, symbol or numeral.
Correspondingly, embodiment of the present invention second aspect provides a kind of terminal, can comprise:
Detect generation module, for detecting the parameter that user rocks described first terminal or knocks described first terminal, generating according to the parameter detected and preset rules and sharing password;
Encrypting module, is encrypted shared file for using described shared password;
Sending module, for the file after encryption and described shared password are sent to the second terminal so that described second terminal receive that user performs according to described preset rules and described shared password rock or knock operation, to described shared file decryption.
Wherein, described detection generation module specifically for:
Detect direction and number of times that user rocks described first terminal;
By the direction of rocking and number of times corresponding with character or mathematic(al) representation;
When user stops rocking after described first terminal reaches Preset Time, rock direction and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
Wherein, described detection generation module specifically for:
Detect the number of times that user knocks described first terminal zones of different successively;
By the region of knocking and number of times corresponding with character or mathematic(al) representation;
When user stops knocking after described first terminal reaches Preset Time, knock region and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
Wherein, described detection generation module specifically for:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
By corresponding with character for the number of times knocked;
When user stops knocking after described first terminal reaches Preset Time, within each time interval, knock the number of times of described first terminal according to the user detected, generate the shared password be made up of character.
Wherein, described character comprises letter, symbol or numeral.
First terminal is after setting up hotspot, access pin is generated by the parameter detecting user and rock or knock first terminal, receive the second terminal by rocking or knock the authentication password of generation, after judgement two passwords are identical, allow the second terminal access hotspot.Thus realize the object that the second terminal uses the mobile flow online of first terminal.Because access pin is by rocking or knocking generation, user, without the need to remembering complicated password, is beneficial to user's memory, improves the ease for use of terminal, improve interest and the Consumer's Experience of password authentification.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the first embodiment schematic flow sheet of the method for a kind of shared file that the embodiment of the present invention provides;
Fig. 2 is the second embodiment schematic flow sheet of the method for a kind of shared file that the embodiment of the present invention provides;
Fig. 3 is the 3rd embodiment schematic flow sheet of the method for a kind of shared file that the embodiment of the present invention provides;
Fig. 4 is the 4th embodiment schematic flow sheet of the method for a kind of shared file that the embodiment of the present invention provides;
Fig. 5 is the first embodiment composition schematic diagram of a kind of terminal that the embodiment of the present invention provides;
Fig. 6 is the second embodiment composition schematic diagram of a kind of terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Terminal in the embodiment of the present invention can comprise possess camera function smart mobile phone (as Android phone, iOS mobile phone, WindowsPhone mobile phone etc.), panel computer, digital camera, palmtop PC, notebook computer, mobile internet device (MID, or Wearable etc. MobileInternetDevices), above-mentioned terminal is only citing, and non exhaustive, including but not limited to above-mentioned terminal.
Refer to Fig. 1, the first embodiment schematic flow sheet of the method for a kind of shared file provided for the embodiment of the present invention.The method of the shared file described in the present embodiment, comprises the following steps:
S101, first terminal detect user and rock described first terminal or knock the parameter of described first terminal, generate share password according to the parameter detected and preset rules.
Wherein, when detecting the parameter of rocking or knocking, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
Alternatively, the parameter of rocking herein can include but not limited to that the direction of rocking is as up and down etc., the number of times rocked as once, two inferior.
Can generate specific password by the combination of direction and number of times, this password can be character, also can be mathematic(al) representation, and character can be letter, symbol or numeral, and the embodiment of the present invention is not limited in any way.Mathematic(al) representation then comprises sign to represent the direction of rocking.
Such as, user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, rock 3 times towards a left side again, then rock 4 times towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, rock 7 times towards a left side again, then rock 8 times towards the right, then the shared password that can generate pure digi-tal is 12345678.Or sign can also be brought left as being just, be to the right negative, then sharing password is mathematic(al) representation :+1-2+3-4+5-6+7-8.
Or, 26 English alphabets can also be mapped according to direction and number of times, as left rolling 1-13 difference corresponding A-N, right rolling 1-13 corresponding O-Z of difference, then user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, 3 times are rocked again towards a left side, 4 times are rocked again towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, 7 times are rocked again towards a left side, 8 times are rocked again towards the right, the shared password APCRETGV of character style will be generated, certainly, in order to reduce the number of times rocked, more direction can be introduced, such as introduce 4 directions up and down, each direction is maximum configures 6 to 7 times rock respectively.
Or, can also numeral combine with letter with the fail safe improving access pin, the corresponding numeral of the number of times that can rock in some directions, and the number of times correspondence letter rocked on other directions.The mapping class of concrete principle and above-mentioned letter seemingly, repeats no more herein.
And the parameter of knocking can include but not limited to the region of knocking and the number of times knocked.
Such as, knock terminal screen on along 3 times, then to knock under terminal screen along 2 times, then can generate numerical ciphers 32, or also can by letter or numbers corresponding different with different number of times for zones of different, concrete configuration process to rock similar, repeat no more herein.
Or, only can also knock the effect that the same area or setting knock arbitrary region identical, but the such as 3 seconds identical time interval was set, count within each time interval, then knocking in series of time intervals is counted and numeral or alphabetical corresponding, thus obtain access pin.Such as, in each 3 seconds, knock 1,2,3,4,5,6,7,8 time successively, and set point number is corresponding with numeral, then by the access pin of generation 12345678, if set point number is corresponding with lexicographic order, then will generates the access pin of ABCDEFGH.
Alternatively, can sound production prompt user at the end of each time interval, so that user is knocking accurately.
It should be noted that, after shared password generates, user can be shown in the form of text and check so that whether user confirms the shared password that generates correctly or whether be the shared password that user wants.
S102, described shared password is used to be encrypted by shared file.
Like this, the fail safe of the file shared can be guaranteed.Only know about preset rules to be decrypted the file shared and to check with the user receiving shared password.
S103, the file after encryption and described shared password are sent to the second terminal, so as described second terminal receive that user performs according to described preset rules and described shared password rock or knock operation, to described shared file decryption.
Alternatively, described second terminal is by rocking or knocking the mode and the described first terminal that generate authentication password to generate the mode of shared password identical.Like this, just can the second terminal the authentication password of generation just can be used to verify shared password, after being verified, just can check shared file.
If the operating mistake that the second terminal is rocked or knocked, now, want that the user checking shared file again can rock the second terminal or knock the second terminal, password authentification is again carried out in trial, and for the second terminal of continuous several times authentication password mistake, can lock within a certain period of time, hide or delete shared file.
First terminal is by detecting user and rock or knocking the parameter of first terminal and preset rules generates shared password, and use the file sharing codon pair shared to be encrypted, again the file after encryption and shared password are sent to the second terminal, like this, second terminal just can be decrypted the file shared by rocking or knocking operation according to shared password and preset rules, and then checks shared file.Because shared password is by rocking or knocking generation, user, without the need to remembering complicated password, is beneficial to user's memory, improves the ease for use of terminal, improve interest and the Consumer's Experience of password authentification.
Refer to Fig. 2, the second embodiment schematic flow sheet of the method for a kind of shared file provided for the embodiment of the present invention.The method of the shared file described in the present embodiment, comprises the following steps:
S201, detection user rock direction and the number of times of described first terminal.
S202, by the direction of rocking and number of times corresponding with character or mathematic(al) representation.
Wherein, when detecting the direction of rocking and number of times, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
S203, when user stops rocking after described first terminal reaches Preset Time, rock direction and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
Can be generated by the combination of direction and number of times and specifically share password, this shared password can be character style as numeral, letter or symbol, can be also mathematic(al) representation form, the embodiment of the present invention be limited in any way.
Such as, user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, rock 3 times towards a left side again, then rock 4 times towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, rock 7 times towards a left side again, then rock 8 times towards the right, then the shared password that can generate pure digi-tal is 12345678.Or sign can also be brought left as being just, be to the right negative, then sharing password is mathematic(al) representation :+1-2+3-4+5-6+7-8.
Or, 26 English alphabets can also be mapped according to direction and number of times, as left rolling 1-13 difference corresponding A-N, right rolling 1-13 corresponding O-Z of difference, then user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, 3 times are rocked again towards a left side, 4 times are rocked again towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, 7 times are rocked again towards a left side, 8 times are rocked again towards the right, the shared password APCRETGV of character style will be generated, certainly, in order to reduce the number of times rocked, more direction can be introduced, such as introduce 4 directions up and down, each direction is maximum configures 6 to 7 times rock respectively.
Or, can also numeral combine with letter with the fail safe improving access pin, the corresponding numeral of the number of times that can rock in some directions, and the number of times correspondence letter rocked on other directions.The mapping class of concrete principle and above-mentioned letter seemingly, repeats no more herein.
S204, described shared password is used to be encrypted by shared file.
Like this, the fail safe of the file shared can be guaranteed.Only know about preset rules to be decrypted the file shared and to check with the user receiving shared password.
S205, the file after encryption and described shared password are sent to the second terminal, so as described second terminal receive that user performs according to described preset rules and described shared password rock operation, to described shared file decryption.
Alternatively, described second terminal is identical with the mode that described first terminal generates shared password by rocking the mode generating authentication password.Like this, just can the second terminal the authentication password of generation just can be used to verify shared password, after being verified, just can check shared file.
If the operating mistake that the second terminal is rocked, now, want that the user checking shared file can rock the second terminal again, attempt carrying out password authentification again, and for the second terminal of continuous several times authentication password mistake, can lock within a certain period of time, hide or delete shared file.
The shared password that the direction of first terminal and number of times generate encryption shared file is rocked by detecting user, simple and practical, be beneficial to user's memory.
Refer to Fig. 3, the 3rd embodiment schematic flow sheet of the method for a kind of shared file provided for the embodiment of the present invention.The method of the shared file described in the present embodiment, comprises the following steps:
S301, successively detection user knock the number of times of described first terminal zones of different.
S302, by the region of knocking and number of times corresponding with character or mathematic(al) representation.
Wherein, when detecting the parameter of knocking, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
Such as, knock terminal screen on along 3 times, then to knock under terminal screen along 2 times, then can generate numerical ciphers 32, or also can by letter or numbers corresponding different with different number of times for zones of different, concrete configuration process to rock similar, repeat no more herein.
Or also can zones of different be met corresponding from different arithmetic, the corresponding plus sige of such as region A, the corresponding minus sign of region B, then in conjunction with different number of times, corresponding shared password just can be generated, such as, first tapping areas A reaches 3 times, then tapping areas B reaches 2 times, then tapping areas A reaches 1 time, tapping areas B reaches 4 times again, then can generate the shared password of+3-2+1-4.Certainly, can also arrange more multizone correspondence more multioperation symbol, the corresponding multiplication sign of such as region C, corresponding division sign of region D etc., repeats no more herein.
S303, when user stops knocking after described first terminal reaches Preset Time, knock region and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
It should be noted that, after shared password generates, user can be shown in the form of text and check so that whether user confirms the shared password that generates correctly or whether be the shared password that user wants.
S304, described shared password is used to be encrypted by shared file.
Like this, the fail safe of the file shared can be guaranteed.Only know about preset rules to be decrypted the file shared and to check with the user receiving shared password.
S305, the file after encryption and described shared password are sent to the second terminal, so as described second terminal receive that user performs according to described preset rules and described shared password knock operation, to described shared file decryption.
Alternatively, described second terminal is identical with the mode that described first terminal generates shared password by knocking the mode generating authentication password.Like this, just can the second terminal the authentication password of generation just can be used to verify shared password, after being verified, just can check shared file.
If the operating mistake that the second terminal is knocked, now, want that the user checking shared file can knock the second terminal again, attempt carrying out password authentification again, and for the second terminal of continuous several times authentication password mistake, can lock within a certain period of time, hide or delete shared file.
The number of times knocking first terminal zones of different by detecting user generates the shared password of shared file, simple and practical, is beneficial to user's memory.
Refer to Fig. 4, the 4th embodiment schematic flow sheet of the method for a kind of shared file provided for the embodiment of the present invention.The method of the shared file described in the present embodiment, comprises the following steps:
S401, within the continuous print time interval, detect user successively in each time interval, knock the number of times of described first terminal.
Alternatively, can sound production prompt user at the end of each time interval, so that user is knocking accurately.
It should be noted that, after shared password generates, user can be shown in the form of text and check so that whether user confirms the shared password that generates correctly or whether be the shared password that user wants.
S402, by corresponding with character for the number of times knocked.
Wherein, when detecting the parameter of rocking or knocking, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
Can set that to knock the effect that the same area or setting knock arbitrary region identical, but the such as 3 seconds identical time interval was set, count within each time interval, then knocking in series of time intervals is counted and numeral, symbol or alphabetical corresponding, thus generate shared password.Such as, in each 3 seconds, knock 1,2,3,4,5,6,7,8 time successively, and set point number is corresponding with numeral, then by the shared password of generation 12345678, if set point number is corresponding with lexicographic order, then sharing into password by generation ABCDEFGH.
S403, when user stops knocking after described first terminal reaches Preset Time, within each time interval, knock the number of times of described first terminal according to the user detected, generate the shared password be made up of character.
Only can knock the effect that the same area or setting knock arbitrary region identical, but the such as 3 seconds identical time interval was set, count within each time interval, then knocking in series of time intervals is counted and numeral or alphabetical corresponding, thus obtain access pin.Such as, in each 3 seconds, knock 1,2,3,4,5,6,7,8 time successively, and set point number is corresponding with numeral, then by the access pin of generation 12345678, if set point number is corresponding with lexicographic order, then will generates the access pin of ABCDEFGH.
Alternatively, can sound production prompt user at the end of each time interval, so that user is knocking accurately.
It should be noted that, after access pin generates, user can be shown in the form of text and check so that whether user confirms the access pin that generates correctly or whether be the access pin that user wants; Or also can directly be stored on first terminal in an encrypted form, the authentication password sent for first terminal and the second terminal be carried out bottom and is compared, and the present invention is not limited in any way.
S404, described shared password is used to be encrypted by shared file.
Like this, the fail safe of the file shared can be guaranteed.Only know about preset rules to be decrypted the file shared and to check with the user receiving shared password.
S405, the file after encryption and described shared password are sent to the second terminal, so as described second terminal receive that user performs according to described preset rules and described shared password knock operation, to described shared file decryption.
Alternatively, described second terminal is identical with the mode that described first terminal generates shared password by knocking the mode generating authentication password.Like this, just can the second terminal the authentication password of generation just can be used to verify shared password, after being verified, just can check shared file.
If the operating mistake that the second terminal is knocked, now, want that the user checking shared file can knock the second terminal again, attempt carrying out password authentification again, and for the second terminal of continuous several times authentication password mistake, can lock within a certain period of time, hide or delete shared file.
The number of times knocking first terminal by detecting user generates the shared password of shared file, simple and practical, is beneficial to user's memory.
Referring to Fig. 5, is the first example structure schematic diagram of a kind of terminal that the embodiment of the present invention provides.Terminal described in the present embodiment, comprising: detect generation module 100, encrypting module 200 and sending module 300, wherein,
Detect generation module 100, for detecting the parameter that user rocks described first terminal or knocks described first terminal, generating according to the parameter detected and preset rules and sharing password;
Wherein, when detecting the parameter of rocking or knocking, detect by the 3-axis acceleration sensor of terminal, gravity sensor, inertial sensor, gyroscope, range sensor or displacement transducer etc.
Alternatively, the parameter of rocking herein can include but not limited to that the direction of rocking is as up and down etc., the number of times rocked as once, two inferior.
Can generate specific password by the combination of direction and number of times, this password can be character, also can be mathematic(al) representation, and character can be letter, symbol or numeral, and the embodiment of the present invention is not limited in any way.Mathematic(al) representation then comprises sign to represent the direction of rocking.
Such as, user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, rock 3 times towards a left side again, then rock 4 times towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, rock 7 times towards a left side again, then rock 8 times towards the right, then the shared password that can generate pure digi-tal is 12345678.Or sign can also be brought left as being just, be to the right negative, then sharing password is mathematic(al) representation :+1-2+3-4+5-6+7-8.
Or, 26 English alphabets can also be mapped according to direction and number of times, as left rolling 1-13 difference corresponding A-N, right rolling 1-13 corresponding O-Z of difference, then user rocks mobile phone 1 time towards a left side, mobile phone is rocked 2 times again towards the right, 3 times are rocked again towards a left side, 4 times are rocked again towards the right, user rocks mobile phone 5 times towards a left side, mobile phone is rocked 6 times again towards the right, 7 times are rocked again towards a left side, 8 times are rocked again towards the right, the shared password APCRETGV of character style will be generated, certainly, in order to reduce the number of times rocked, more direction can be introduced, such as introduce 4 directions up and down, each direction is maximum configures 6 to 7 times rock respectively.
Or, can also numeral combine with letter with the fail safe improving access pin, the corresponding numeral of the number of times that can rock in some directions, and the number of times correspondence letter rocked on other directions.The mapping class of concrete principle and above-mentioned letter seemingly, repeats no more herein.
And the parameter of knocking can include but not limited to the region of knocking and the number of times knocked.
Such as, knock terminal screen on along 3 times, then to knock under terminal screen along 2 times, then can generate numerical ciphers 32, or also can by letter or numbers corresponding different with different number of times for zones of different, concrete configuration process to rock similar, repeat no more herein.
Or, only can also knock the effect that the same area or setting knock arbitrary region identical, but the such as 3 seconds identical time interval was set, count within each time interval, then knocking in series of time intervals is counted and numeral or alphabetical corresponding, thus obtain access pin.Such as, in each 3 seconds, knock 1,2,3,4,5,6,7,8 time successively, and set point number is corresponding with numeral, then by the access pin of generation 12345678, if set point number is corresponding with lexicographic order, then will generates the access pin of ABCDEFGH.
Alternatively, can sound production prompt user at the end of each time interval, so that user is knocking accurately.
It should be noted that, after shared password generates, user can be shown in the form of text and check so that whether user confirms the shared password that generates correctly or whether be the shared password that user wants.
Encrypting module 200, is encrypted shared file for using described shared password;
Like this, the fail safe of the file shared can be guaranteed.Only know about preset rules to be decrypted the file shared and to check with the user receiving shared password.
Sending module 300, for the file after encryption and described shared password are sent to the second terminal so that described second terminal receive that user performs according to described preset rules and described shared password rock or knock operation, to described shared file decryption.
Alternatively, described second terminal is by rocking or knocking the mode and the described first terminal that generate authentication password to generate the mode of shared password identical.Like this, just can the second terminal the authentication password of generation just can be used to verify shared password, after being verified, just can check shared file.
If the operating mistake that the second terminal is rocked or knocked, now, want that the user checking shared file again can rock the second terminal or knock the second terminal, password authentification is again carried out in trial, and for the second terminal of continuous several times authentication password mistake, can lock within a certain period of time, hide or delete shared file.
First terminal is by detecting user and rock or knocking the parameter of first terminal and preset rules generates shared password, and use the file sharing codon pair shared to be encrypted, again the file after encryption and shared password are sent to the second terminal, like this, second terminal just can be decrypted the file shared by rocking or knocking operation according to shared password and preset rules, and then checks shared file.Because shared password is by rocking or knocking generation, user, without the need to remembering complicated password, is beneficial to user's memory, improves the ease for use of terminal, improve interest and the Consumer's Experience of password authentification.
Optionally, described detection generation module 200 specifically for:
Detect direction and number of times that user rocks described first terminal;
By the direction of rocking and number of times corresponding with character or mathematic(al) representation;
When user stops rocking after described first terminal reaches Preset Time, rock direction and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
Alternatively, described detection generation module 200 specifically for:
Detect the number of times that user knocks described first terminal zones of different successively;
By the region of knocking and number of times corresponding with character or mathematic(al) representation;
When user stops knocking after described first terminal reaches Preset Time, knock region and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
Alternatively, described detection generation module 200 specifically for:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
By corresponding with character for the number of times knocked;
When user stops knocking after described first terminal reaches Preset Time, within each time interval, knock the number of times of described first terminal according to the user detected, generate the shared password be made up of character.
Alternatively, described character comprises letter, symbol or numeral.
Referring to Fig. 5, is the second example structure schematic diagram of a kind of terminal that the embodiment of the present invention provides.Terminal described in the present embodiment, comprising:
At least one input equipment 1000; At least one output equipment 2000; At least one processor 3000, such as CPU; With memory 4000, above-mentioned input equipment 1000, output equipment 2000, processor 3000 are connected by bus 5000 with memory 4000.
Wherein, above-mentioned input equipment 1000 specifically can be screen or the keyboard of terminal, for receiving the various instructions of user's input.
Above-mentioned output equipment 2000 specifically can be the sending module of terminal, for the file after encryption and described shared password are sent to the second terminal, so that what described second terminal reception user performed according to described preset rules and described shared password rocks or knocks operation, to described shared file decryption.
Above-mentioned memory 4000 can be high-speed RAM memory, also can be non-labile memory (non-volatilememory), such as magnetic disc store.Above-mentioned memory 4000 is for storing batch processing code, and above-mentioned processor 3000, for calling the program code stored in memory 4000, performs and operates as follows:
Detect user to rock described first terminal or knock the parameter of described first terminal, generate according to the parameter detected and preset rules and share password;
Described shared password is used to be encrypted by shared file;
File after encryption and described shared password are sent to the second terminal by instruction output equipment 2000, so as described second terminal receive that user performs according to described preset rules and described shared password rock or knock operation, to described shared file decryption.
In the execution mode that some are feasible, above-mentioned processor 3000 specifically for:
Detect direction and number of times that user rocks described first terminal;
By the direction of rocking and number of times corresponding with character or mathematic(al) representation;
When user stops rocking after described first terminal reaches Preset Time, rock direction and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
In the execution mode that some are feasible, above-mentioned processor 3000 specifically for:
Detect the number of times that user knocks described first terminal zones of different successively;
By the region of knocking and number of times corresponding with character or mathematic(al) representation;
When user stops knocking after described first terminal reaches Preset Time, knock region and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
In the execution mode that some are feasible, above-mentioned processor 3000 specifically for:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
By corresponding with character for the number of times knocked;
When user stops knocking after described first terminal reaches Preset Time, within each time interval, knock the number of times of described first terminal according to the user detected, generate the shared password be made up of character.
In the execution mode that some are feasible, described character comprises letter, symbol or numeral.
In specific implementation, input equipment 1000 described in the embodiment of the present invention, output equipment 2000 and processor 3000 can perform the first embodiment of the method for a kind of shared file that the embodiment of the present invention provides, the second embodiment, the 3rd embodiment and the implementation described in the 4th embodiment, also can perform the implementation of the terminal described in the first embodiment of a kind of terminal that the embodiment of the present invention provides, not repeat them here.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory is called for short ROM) or random access memory (RandomAccessMemory is called for short RAM) etc.
Above the method for a kind of shared file that the embodiment of the present invention provides and terminal are described in detail, apply specific case herein to set forth principle of the present invention and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (10)

1. a method for shared file, is characterized in that, comprising:
First terminal detects user and rocks described first terminal or knock the parameter of described first terminal, generates share password according to the parameter detected and preset rules;
Described shared password is used to be encrypted by shared file;
File after encryption and described shared password are sent to the second terminal, so as described second terminal receive that user performs according to described preset rules and described shared password rock or knock operation, to described shared file decryption.
2. method according to claim 1, is characterized in that, described first terminal detects the parameter that user rocks described first terminal, generates and shares password, comprising according to the parameter detected and preset rules:
Detect direction and number of times that user rocks described first terminal;
By the direction of rocking and number of times corresponding with character or mathematic(al) representation;
When user stops rocking after described first terminal reaches Preset Time, rock direction and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
3. method according to claim 1, is characterized in that, described first terminal detects the parameter that user knocks described first terminal, generates and shares password, comprising according to the parameter detected and preset rules:
Detect the number of times that user knocks described first terminal zones of different successively;
By the region of knocking and number of times corresponding with character or mathematic(al) representation;
When user stops knocking after described first terminal reaches Preset Time, knock region and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
4. method according to claim 1, is characterized in that, described first terminal detects the parameter that user knocks described first terminal, generates and shares password, comprising according to the parameter detected and preset rules:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
By corresponding with character for the number of times knocked;
When user stops knocking after described first terminal reaches Preset Time, within each time interval, knock the number of times of described first terminal according to the user detected, generate the shared password be made up of character.
5. the method according to any one of claim 2-4, is characterized in that, described character comprises letter, symbol or numeral.
6. a terminal, is characterized in that, comprising:
Detect generation module, for detecting the parameter that user rocks described first terminal or knocks described first terminal, generating according to the parameter detected and preset rules and sharing password;
Encrypting module, is encrypted shared file for using described shared password;
Sending module, for the file after encryption and described shared password are sent to the second terminal so that described second terminal receive that user performs according to described preset rules and described shared password rock or knock operation, to described shared file decryption.
7. terminal according to claim 6, is characterized in that, described detection generation module specifically for:
Detect direction and number of times that user rocks described first terminal;
By the direction of rocking and number of times corresponding with character or mathematic(al) representation;
When user stops rocking after described first terminal reaches Preset Time, rock direction and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
8. terminal according to claim 6, is characterized in that, described detection generation module specifically for:
Detect the number of times that user knocks described first terminal zones of different successively;
By the region of knocking and number of times corresponding with character or mathematic(al) representation;
When user stops knocking after described first terminal reaches Preset Time, knock region and the number of times of described first terminal according to the user detected, generate the shared password that is made up of character or generate the shared password be made up of mathematic(al) representation.
9. terminal according to claim 6, is characterized in that, described detection generation module specifically for:
Within the continuous print time interval, detect the number of times that user knocks described first terminal in each time interval successively;
By corresponding with character for the number of times knocked;
When user stops knocking after described first terminal reaches Preset Time, within each time interval, knock the number of times of described first terminal according to the user detected, generate the shared password be made up of character.
10. the terminal according to any one of claim 7-9, is characterized in that, described character comprises letter, symbol or numeral.
CN201510398895.3A 2015-07-08 2015-07-08 File sharing method and terminal Pending CN105119881A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510398895.3A CN105119881A (en) 2015-07-08 2015-07-08 File sharing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510398895.3A CN105119881A (en) 2015-07-08 2015-07-08 File sharing method and terminal

Publications (1)

Publication Number Publication Date
CN105119881A true CN105119881A (en) 2015-12-02

Family

ID=54667774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510398895.3A Pending CN105119881A (en) 2015-07-08 2015-07-08 File sharing method and terminal

Country Status (1)

Country Link
CN (1) CN105119881A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108781473A (en) * 2016-12-12 2018-11-09 华为技术有限公司 A kind of method and apparatus of the shared file between different terminals

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100097320A1 (en) * 2008-10-22 2010-04-22 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Electronic device for entering password
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration
CN102455842A (en) * 2010-10-21 2012-05-16 北京创新方舟科技有限公司 Method and equipment for unlocking screen according to clicking operation of user
CN102981737A (en) * 2012-10-30 2013-03-20 北京小米科技有限责任公司 File operation method and device
CN103079000A (en) * 2012-12-27 2013-05-01 深圳市金立通信设备有限公司 Method and device for terminal unlocking

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100097320A1 (en) * 2008-10-22 2010-04-22 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Electronic device for entering password
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration
CN102455842A (en) * 2010-10-21 2012-05-16 北京创新方舟科技有限公司 Method and equipment for unlocking screen according to clicking operation of user
CN102981737A (en) * 2012-10-30 2013-03-20 北京小米科技有限责任公司 File operation method and device
CN103079000A (en) * 2012-12-27 2013-05-01 深圳市金立通信设备有限公司 Method and device for terminal unlocking

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108781473A (en) * 2016-12-12 2018-11-09 华为技术有限公司 A kind of method and apparatus of the shared file between different terminals
US10887745B2 (en) 2016-12-12 2021-01-05 Huawei Technologies Co., Ltd. Method and device for sharing file between different terminals

Similar Documents

Publication Publication Date Title
CN105072611A (en) Verification method and terminal
US8826406B2 (en) Password security input system using shift value of password key and password security input method thereof
US9571280B2 (en) Application integrity protection via secure interaction and processing
CN109033885B (en) Data response method, terminal equipment and server
CN103634107A (en) Authentication method, password setting method and authentication system for electronic device
EP3220573A1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN107204986A (en) High in the clouds storage encryption method, decryption method and high in the clouds storage encryption device
CN104992120A (en) Picture encryption method and mobile terminal
CN105809000A (en) Information processing method and electronic device
CN105184126A (en) Password setting method, authentication method and terminal
CN108282330A (en) Key preserves and acquisition device, method and computer readable storage medium
CN104951684A (en) Fingerprint encryption and decryption method and terminal
CN104915583A (en) Interface decryption processing method and mobile terminal
KR20210046357A (en) Method and apparatus for key storing and recovery for blockchain based system
CN103532960A (en) Text encryption interaction method, encryption method and device, decryption method and device
CN105426727A (en) Fingerprint decryption method and mobile terminal
CN105069360B (en) A kind of file encryption, decryption method and terminal
CN106453514A (en) Chat information distinguishing synchronization method and device
Nguyen Using unrestricted mobile sensors to infer tapped and traced user inputs
CN105119881A (en) File sharing method and terminal
CN105656704B (en) Page abnormity detection method, device and system
KR20140043836A (en) Communication system utilizing fingerprint information and use of the system
CN105227583A (en) A kind of key encryption method and system, electronic equipment
CN104994160B (en) Document transmission method and relevant apparatus and Transmission system
CN110177371B (en) Method and device for generating equipment identification information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151202