CN106488394A - A kind of method and device of equipment connection - Google Patents
A kind of method and device of equipment connection Download PDFInfo
- Publication number
- CN106488394A CN106488394A CN201610913478.2A CN201610913478A CN106488394A CN 106488394 A CN106488394 A CN 106488394A CN 201610913478 A CN201610913478 A CN 201610913478A CN 106488394 A CN106488394 A CN 106488394A
- Authority
- CN
- China
- Prior art keywords
- target device
- target
- equipment
- trusted
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a kind of method of equipment connection, including:Receiving device connection request, obtains the target device mark that the equipment connection request is carried, and the target device is identified corresponding to target device;Judge whether the target device is trusted device, if trusted device, then generate authentication and target device is instructed and be sent to, the target device is used for detecting the password being input on the target device and returning;The password of target device return is received, authentication is carried out to the password;When authentication passes through, set up and the communication connection between target device.Additionally, a kind of the embodiment of the invention also discloses device of equipment connection.The embodiment of the present invention can improve the Information Security of equipment connection.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of method and device of equipment connection.
Background technology
With the development of terminal technology, in the plurality of devices such as smart mobile phone, bluetooth earphone, all Bluetooth function is integrated with, two
The individual equipment for possessing Bluetooth function or terminal can carry out data interaction after the bluetooth connection between correlation is established, because
The transmission for data being carried out by bluetooth can realize the transmission of data in short distance class, and steady with time delay section, connection
Qualitative strong a little.
In general, two equipment for possessing Bluetooth function or terminal be when connection each other is set up, such as two
Individual smart mobile phone is needed to mate PIN code from each other or is input into default password, and typically come when bluetooth connection is set up
Say, PIN code or preset password are all 4 relatively simple bit digital, for example, " 0000 ", or, what some terminals were taken is no
The connected mode of checking.Therefore the transmission of data is carried out by two terminals are established after bluetooth connection, if take no testing
The mode of card may then cause data to be eavesdropped or steal, further, if adopting the authentication of above-mentioned PIN code in connection
Formula, because be easily cracked there is also the problem of security.
Content of the invention
The method that the embodiment of the present invention proposes a kind of connection of equipment, the connected mode that can be solved between Bluetooth terminal are held
It is easily caused data and is stolen and there is the not enough technical problem of security.
A kind of method of equipment connection, including:
Receiving device connection request, obtains the target device mark that the equipment connection request is carried, the target device
Mark is corresponding to target device;
Judge whether the target device is trusted device, if trusted device, then generate authentication and instruct simultaneously
Target device is sent to, the target device is used for detecting the password being input on the target device and returning;
The password of target device return is received, authentication is carried out to the password;
When authentication passes through, set up and the communication connection between target device.
Optionally, wherein in one embodiment, described the step of whether judge the target device be trusted device
Also include afterwards:
When the target device is not for trusted device, refuse the equipment connection request;
Or,
The equipment of receiving user's input adds request, the target device is designated trusted device, and is executed described
The step of generation authentication is instructed and is sent to target device.
Optionally, wherein in one embodiment, described the step of whether judge the target device be trusted device
Also include:
History linkage record corresponding with the target device is obtained, the target is judged according to the history linkage record
Whether equipment is trusted device.
Optionally, wherein in one embodiment, described foundation and target device between communication connection the step of after
Also include:
Target corresponding with the target device is determined according to the history linkage record corresponding with the target device
Reliability rating;
According to the corresponding relation between default reliability rating and data access authority, determine and the target reliability rating
Corresponding target data access rights;
The addressable data of the target device are determined according to the target data access rights.
Optionally, wherein in one embodiment, described foundation and target device between communication connection the step of after
Also include:
The data access request that target device sends is received, target data corresponding with the data access request is obtained,
The access path of the target data is returned to the target device.
In addition, it is also proposed that a kind of device of equipment connection.
A kind of device of equipment connection, including:
Equipment connection request receiver module, for receiving device connection request, obtains what the equipment connection request was carried
Target device is identified, and the target device is identified corresponding to target device;
Trusted device judge module, for judging whether the target device is trusted device, sets in the target
Instruct and be sent to target device for authentication during for trusted device, is generated, the target device is used for detection described
On target device be input into password and return;
Authentication module, for receiving the password of target device return, carries out authentication to the password;
Module is set up in communication connection, for the communication connection when authentication passes through, between foundation and target device.
Optionally, wherein in one embodiment, described device also includes that equipment connection request refusal module and equipment add
Plus module, wherein:
The equipment connection request refusal module is used for, when the target device is not for trusted device, setting described in refusal
Standby connection request;
The equipment add module is used for the equipment of receiving user's input and adds request, and the target device is designated can
Trusted devices, and call the trusted device judge module.
Optionally, wherein in one embodiment, the trusted device judge module is additionally operable to obtain and the target
Whether the corresponding history linkage record of equipment, judge the target device as trusted device according to the history linkage record.
Optionally, wherein in one embodiment, described device also includes reliability rating determining module, for according to described
History linkage record corresponding with the target device determines target reliability rating corresponding with the target device;According to default
Reliability rating and data access authority between corresponding relation, determine that target data corresponding with the target reliability rating is visited
Ask authority;The addressable data of the target device are determined according to the target data access rights.
Optionally, wherein in one embodiment, described device also includes Data access module, for receiving target device
The data access request of transmission, obtains target data corresponding with the data access request, by the access of the target data
Path returns to the target device.
After employing the method and apparatus of the said equipment connection, if target device needs to set up and local device between setting
Communication connection between standby simultaneously carries out the operation such as access and transmission of data, it is necessary first to determine whether target device is trusted
Equipment, then also needs to carry out authentication.That is, only in the case that target device is for trusted device, ability
Proceed authentication, also, in the case that only authentication passes through further, target device could be set up and locally set
Communication connection between standby.That is, setting up connection simultaneously by compared to simply checking PIN code is only needed in conventional art
For the scheme for carrying out data transmission, by the double verification of equipment whether trusted and authentication, improve equipment it
Between connect security, improve the security of user data.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Accompanying drawing to be used needed for technology description is had to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, acceptable
Other accompanying drawings are obtained according to these accompanying drawings.
Wherein:
Fig. 1 is a kind of schematic flow sheet of the method for equipment connection in one embodiment;
Fig. 2 is a kind of structural representation of the device of equipment connection in one embodiment;
Fig. 3 is the structural representation of the computer equipment of the method for running aforementioned device connection in one embodiment.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
In the present embodiment, it is proposed that a kind of method of equipment connection, the realization of the method can be dependent on computer program,
The computer program is can run on the computer system based on von Neumann system, the computer program can be equipment or
Connection management application program between terminal, for example, the management program of the management program of bluetooth connection or WiFi connection.The meter
Calculation machine system can run server or the ends such as the such as smart mobile phone of above computer program, panel computer, PC
End.
It should be noted that in the present embodiment, the connection between two equipment can be bluetooth connection, or
WiFi connects, and can also be other communication connection modes, also, after communication connection is set up, the equipment of two interconnections
Between can carry out the interaction of data.
Specifically, as shown in figure 1, the method for the said equipment connection comprises the steps:
Step S102:Receiving device connection request, obtains the target device mark that the equipment connection request is carried, described
Target device is identified corresponding to target device.
In the present embodiment, executive agent is the such as terminal device such as smart mobile phone, panel computer, on the terminal device
Corresponding functional module is additionally provided with, for example, when connection between both devices is bluetooth connection, in local terminal device
On be provided with bluetooth module, then for example, when connection between both devices connects for WiFi, on local terminal device
It is provided with WiFi module.It should be noted that be not provided with terminal device only local corresponding bluetooth module or
WiFi module, is also required to be provided with corresponding bluetooth module or WiFi on another equipment connected with local terminal device
Module.
In the present embodiment, target device can connect to local terminal device (hereinafter referred to as local device) initiating equipment
Request, for example, target device can be in bluetooth administration page or the bluetooth connection page, in attachable bluetooth equipment list
A certain equipment initiating equipment connection request, after target device initiating equipment connection request, the equipment can receive mesh
The equipment connection request that marking device is initiated.
When target device is to local device initiating equipment connection request, local device can detect target device transmission
Equipment connection request, also, after the equipment connection request is received, the equipment connection request to receiving is parsed,
Obtain the relevant information carried in equipment connection request.In the present embodiment, carry initiation in equipment connection request to set
The corresponding target device mark of the target device of standby connection request, also, can determine according to target device mark corresponding
Equipment.
Step S104:Judge whether the target device is trusted device, if so, then execution step S106:Generate body
Part checking instructs and is sent to target device, and the target device is used for the password of detection input on the target device and simultaneously returns
Return;If it is not, then execution step S108:Refuse the equipment connection request.
In the present embodiment, the communication connection that target device is if desired set up and local device between, not only needs to carry out
Authentication, in addition it is also necessary to which target device is trusted device for local device.
Specifically, for example, the device identification that user can often be set up communication connection is trusted device, or,
In this step, judge according to certain data whether target device is trusted device.In another embodiment, at this
Trusted device list is also provided with ground equipment, belongs to the as trusted of the equipment in the trusted device list and set
Standby, that is to say, that to judge that whether target device be whether the process of trusted device can belong to above-mentioned according to target device
Trusted device list is being judged.
Specifically, above-mentioned judge that the step of whether target device is trusted device also includes:Default credible
Appointing and the device identification that mates with target device mark in list of devices, is searched, if finding, judging the target device
For trusted device.
That is, after equipment connection request is received, the corresponding mesh of initiator of the equipment connection request is obtained
Marking device is identified, and is searched to identify with the target device in the default trusted device list for storing in the terminal and mated
Device identification, if finding, illustrates that target device identifies corresponding target device and belongs to the trusted device list, i.e. target
Equipment is trusted device.If conversely, not finding, illustrating that target device is not belonging to the trusted device list, currently
Equipment connection there may be potential safety hazard.
It should be noted that in the present embodiment, judge that whether an equipment be that the mode of trusted device is not limited to
The judgment mode for being given is stated, can also be other arbitrarily feasible judgment modes.
Specifically, in one embodiment, above-mentioned judge that the step of whether target device is trusted device is also wrapped
Include:History linkage record corresponding with the target device is obtained, the target device is judged according to the history linkage record
Whether it is trusted device.
In the present embodiment, history linkage record include between target device and local device history connection when
Between, duration, frequency and data transfer record etc., if history connection is often and data transfer is more frequent, corresponding mesh
Marking device is trusted device.If without any history linkage record between target device and local device, target device is not
Probably due to the history linkage record of blank is judged as trusted device.
In this embodiment, the calculation of credit score can be set, for example, is often increased a history and connect number of times, meter 1
Point, connection duration often increases 1h, counts 1 point, etc., and the summation of all of score is final credit score, work as credit
In the case that fraction exceedes preset value, target device is trusted device, conversely, not being then trusted device.
In the case that target device is for trusted device, you can carry out further authentication.
Local terminal generates authentication and instructs and be sent to target device, and target device is receiving authentication instruction
Afterwards, prompting user input password on the target device, after target terminal obtains the password that user is input by target device,
The password is returned to local device, judges whether the password that target terminal is returned passes through authentication by local device.
Step S110:The password of target device return is received, authentication is carried out to the password;In authentication
By when, execution step S112:Set up and the communication connection between target device, in the case that authentication does not pass through, hold
Row step S108:Refuse the equipment connection request.
After password is returned to local device by target device, local device is according to the password for receiving to target device
Authentication is carried out, in the case that authentication passes through, communication connection, the i.e. mesh set up between target device and local device
Marking device can access the data on local device by the communication connection, if conversely, authentication is not over target sets
Standby equipment connection failure between local device.
The process of above-mentioned authentication can be the process verified by the password that above-mentioned target device is returned, for example,
Judge whether the password is mated with preset value, if coupling, judge that authentication passes through, conversely, then judging that authentication is obstructed
Cross.
For example, in one embodiment, in the case that the said equipment is connected as bluetooth connection, above-mentioned password is PIN
Code, that is to say, that local device arranges a PIN code, if the PIN code that user is input on the target device is arranged with local device
PIN code mate in the case of, that is, judge authentication pass through.
Optionally, in one embodiment, above-mentioned judge the step of whether target device is trusted device it
Also include afterwards:The equipment of receiving user's input adds request, the target device is designated trusted device, and is executed described
The step of generation authentication is instructed and is sent to target device.
In the present embodiment, if target device is not trusted device, cannot set up target device and local device it
Between communication connection, but, in the case that target device is not trusted device, can generate corresponding information and
Be shown on local device, be not trusted device with the target device of informing user's initiating equipment connection request, therefore Wu
Method is set up and the communication connection between target device.
Further, while above-mentioned information is shown, user can also be for the information of above-mentioned displaying, defeated
Enter the operation of correlation, for example, ignore the prompting message, or, directly set up and the communication connection between target device, then or
Person, target device is designated the operational order of trusted device.Above-mentioned judge whether target device is trusted device when
Be judged by default trusted device list in the case of, if target device is not trusted device, user is acceptable
Input equipment adds request, target device is added in above-mentioned trusted device list, that is to say, that in target device again
During secondary initiating equipment connection request, can be because target device have had added to trusted device list, such that it is able to set up this
Communication connection between ground equipment and target device.
In the present embodiment, after target device establishes communication connection with local terminal, can not access without exception local
All data on equipment, for example, it is possible to arrange different access rights, under a certain access rights, target device can access this
The file of all picture formats on ground equipment, under another access rights, target device can access the SD card on local device
All data can not still access all data on local device in non-SD card, etc., can be arranged as required to different
Access rights.
In local terminal, user can arrange reliability rating corresponding with each trusted device, each trust
Grade has all corresponded to corresponding access rights, and access rights determine the file that target device can be accessed on the local device,
That is accessible file, that is to say, that reliability rating determines the addressable accessible file of target device.
In another embodiment, can also be and determined according to the history linkage record between target device and local device
Reliability rating corresponding with target device, for example, history connection often, frequency high, connection when grow up in the case of,
Its corresponding reliability rating is higher, also, corresponding addressable file is more.
Specifically, also include after the step of communication connection between above-mentioned foundation and target device:According to described and institute
State the corresponding history linkage record of target device and determine target reliability rating corresponding with the target device;According to default letter
Appoint the corresponding relation between grade and data access authority, determine target data access right corresponding with the target reliability rating
Limit;The addressable data of the target device are determined according to the target data access rights.
If that is, after the communication connection between target device and local device is successfully established, target device is needed
Data on local device to be accessed need to be stored the data copy on local device in target device, then need
Whether target device to be judged possesses corresponding data access authority or data manipulation authority.
In the case that target device possesses the data access authority of the data to needing access, you can access the data.
Specifically, in one embodiment, described foundation and target device between communication connection the step of after also wrap
Include:The data access request that target device sends is received, target data corresponding with the data access request is obtained, will be described
The access path of target data returns to the target device.
Target data can be file or folder, for example, photograph album, daily record, contact data, system file etc..Target
Data Identification is filename or file path for access target data.For example, if target device will access local device
Photograph album in certain photo, then need to be input into the file path of the photo, and data generated according to the file path of the input
Access request.
That is, when local terminal receives the data access request of target device transmission, if target device possesses
In the case of the access rights of access target data, the access path of target data is returned to target device, target device can
To read target data by the access path or locally store target data copies to target device.
Optionally, in one embodiment, in order to ensure establish equipment connection establishment successful in the case of user
The security of data, it is to avoid other users have copied excessive data from local device, in addition it is also necessary to the feelings connected in equipment
The data volume of the data transfer under condition is controlled.
Specifically, this method also includes:Detection and target device corresponding data delivery flow rate, in the data transfer throughput
In the case of default flow threshold, suspend and the data transfer between the target device, and generate prompting message
Row shows;Detection for the operational order of prompting message input, the operational order include data transfer continue instruction and
Equipment connects open command;When the operational order continues instruction for data transfer, remove to temporary with the data transfer
Stop state;When the operational order connects open command for equipment, disconnect and the communication connection between the target device.
That is, after equipment connection establishment success, setting up one and monitoring corresponding data traffic process, for examining
The data traffic that target device accesses the data on local device is surveyed, the data traffic can be data access flow, it is also possible to
It is data transfer throughput.
In the present embodiment, flow threshold is provided with, the flow threshold is used for showing the maximum of above-mentioned data traffic,
That is, data access between target device and local device or the maximum amount of data of data transfer are no more than above-mentioned flow
Threshold value, if having exceeded the flow threshold, it is necessary to suspend the data transfer between target device and local device or data access,
And generate corresponding prompting message and user is showed, reached with the data volume of pointing out current data transfer or data access
To maximum, data transfer data is accessed and is suspended.
Further, in the case that above-mentioned data traffic exceedes default flow threshold, if user needs to continue to access
Related data on local device, can be input into the operational order for continuing to access or continue transmission on the local device, that is,
Say, user can continue instruction by the transmission of local device input data, so that the halted state of the data transfer is removed
Continue the data transfer being suspended before;In another embodiment, user can also be connected by local device input equipment
Connect open command, disconnect the communication connection between target device and local device, so as to terminate target device and local device it
Between data transfer.
Further, in one embodiment, the Connection Time of the communication connection between target device and local device be
Conditional, it is to avoid other users are using the user data on communication connection switching equipment therebetween, that is to say, that be directed to
The equipment Connection Time between target device and local device arranges a timer, in the case that timer is waken up, breaks
Open the communication connection between target device and local device.
Additionally, in one embodiment, as shown in Figure 2, it is also proposed that a kind of device of equipment connection, connect including equipment
Module 108 is set up in request receiving module 102, trusted device judge module 104, authentication module 106 and communication connection,
Wherein:
Equipment connection request receiver module 102, for receiving device connection request, obtains the equipment connection request and carries
Target device mark, the target device identified corresponding to target device;
Trusted device judge module 104, for judging whether the target device is trusted device, in the target
When equipment is trusted device, generates authentication and instruct and target device is sent to, the target device is used for detection in institute
State on target device be input into password and return;
Authentication module 106, for receiving the password of target device return, carries out identity to the password and tests
Card;
Module 108 is set up in communication connection, for the communication link when authentication passes through, between foundation and target device
Connect.
Optionally, in one embodiment, as shown in Fig. 2 said apparatus also include equipment connection request refusal module 110
With equipment add module 112, wherein:It is not credible that the equipment connection request refusal module 110 is used in the target device
When appointing equipment, refuse the equipment connection request;The equipment add module 112 is used for the equipment interpolation of receiving user's input please
Ask, the target device is designated trusted device, and calls the trusted device judge module.
Optionally, in one embodiment, trusted device judge module 104 is additionally operable to obtain and the target device pair
Whether the history linkage record that answers, judge the target device as trusted device according to the history linkage record.
Optionally, in one embodiment, as shown in Fig. 2 said apparatus also include reliability rating determining module 114, use
In determining that target corresponding with the target device is trusted according to the history linkage record corresponding with the target device
Level;According to the corresponding relation between default reliability rating and data access authority, determine corresponding with the target reliability rating
Target data access rights;The addressable data of the target device are determined according to the target data access rights.
Optionally, in one embodiment, as shown in Fig. 2 said apparatus also include Data access module 116, for connecing
The data access request that target device sends is received, target data corresponding with the data access request is obtained, by the target
The access path of data returns to the target device.
After employing the method and apparatus of the said equipment connection, if target device needs to set up and local device between setting
Communication connection between standby simultaneously carries out the operation such as access and transmission of data, it is necessary first to determine whether target device is trusted
Equipment, then also needs to carry out authentication.That is, only in the case that target device is for trusted device, ability
Proceed authentication, also, in the case that only authentication passes through further, target device could be set up and locally set
Communication connection between standby.That is, setting up connection simultaneously by compared to simply checking PIN code is only needed in conventional art
For the scheme for carrying out data transmission, by the double verification of equipment whether trusted and authentication, improve equipment it
Between connect security, improve the security of user data.
In one embodiment, as shown in figure 3, Fig. 3 illustrate a kind of operation the said equipment connection method based on Feng
The terminal of the computer system of Nuo Yiman system.The computer system can be smart mobile phone, panel computer, palm PC, pen
Remember the terminal devices such as this computer or PC.Specifically, it may include the outer input interface 1001 that connected by system bus,
Processor 1002, memory 1003 and output interface 1004.Wherein, outer input interface 1001 optionally can at least include network
Interface 10012.Memory 1003 may include external memory 10032 (such as hard disk, CD or floppy disk etc.) and built-in storage
10034.Output interface 1004 can at least include 10042 grade equipment of display screen.
In the present embodiment, the operation of this method is based on computer program, and the program file of the computer program is stored in
In the external memory 10032 of the aforementioned computer system based on von Neumann system, built-in storage is operationally loaded into
In 10034, it is transferred to execute in processor 1002 after being then compiled as machine code, so that being based on von Neumann system
Computer system in form equipment connection request receiver module 102, trusted device judge module 104, identity in logic
Authentication module 106, communication connection are set up module 108, equipment connection request refusal module 110, equipment add module 112, are trusted
Level determination module 114 and Data access module 116.And in the said equipment connection. in method implementation procedure, the ginseng of input
Number is all received by outer input interface 1001, and is transferred to cache in memory 1003, is then input in processor 1002
Processed, the result data of process or be cached in memory 1003 is subsequently processed, or is passed to output interface
1004 are exported.
Specifically, above-mentioned processor 1002 is used for executing following operation:
Receiving device connection request, obtains the target device mark that the equipment connection request is carried, the target device
Mark is corresponding to target device;
Judge whether the target device is trusted device, if trusted device, then generate authentication and instruct simultaneously
Target device is sent to, the target device is used for detecting the password being input on the target device and returning;
The password of target device return is received, authentication is carried out to the password;
When authentication passes through, set up and the communication connection between target device.
Optionally, in one embodiment, it is not credible that above-mentioned processor 1002 is additionally operable to execute in the target device
When appointing equipment, refuse the equipment connection request;Or, add request for executing the equipment of receiving user's input, by the mesh
Marking device is designated trusted device.
Optionally, in one embodiment, above-mentioned processor 1002 be additionally operable to execute obtain corresponding with the target device
History linkage record, judge the target device whether as trusted device according to the history linkage record.
Optionally, in one embodiment, above-mentioned processor 1002 is additionally operable to execute according to described with the target device
Corresponding history linkage record determines target reliability rating corresponding with the target device;According to default reliability rating and number
According to the corresponding relation between access rights, target data access rights corresponding with the target reliability rating are determined;According to institute
State target data access rights and determine the addressable data of the target device.
Optionally, in one embodiment, above-mentioned processor 1002 is additionally operable to execute the data for receiving that target device sends
Access request, obtains target data corresponding with the data access request, the access path of the target data is returned to
The target device.
Above disclosed only present pre-ferred embodiments, can not limit the right model of the present invention certainly with this
Enclose, the equivalent variations that is therefore made according to the claims in the present invention, still belong to the scope covered by the present invention.
Claims (10)
1. a kind of method that equipment connects, it is characterised in that include:
Receiving device connection request, obtains the target device mark that the equipment connection request is carried, the target device mark
Corresponding to target device;
Judge whether the target device is trusted device, if trusted device, then generate authentication and instruct and send
To target device, the target device is used for detecting the password being input on the target device and returning;
The password of target device return is received, authentication is carried out to the password;
When authentication passes through, set up and the communication connection between target device.
2. the method for equipment according to claim 1 connection, it is characterised in that described judge that whether the target device is
Also include after the step of trusted device:
When the target device is not for trusted device, refuse the equipment connection request;
Or,
The equipment of receiving user's input adds request, the target device is designated trusted device, and executes the generation
The step of authentication is instructed and is sent to target device.
3. the method for equipment according to claim 1 connection, it is characterised in that described judge that whether the target device is
The step of trusted device, also includes:
History linkage record corresponding with the target device is obtained, the target device is judged according to the history linkage record
Whether it is trusted device.
4. the method that equipment according to claim 3 connects, it is characterised in that logical between the foundation and target device
Also include after the step of letter connection:
Determine that target corresponding with the target device is trusted according to the history linkage record corresponding with the target device
Grade;
According to the corresponding relation between default reliability rating and data access authority, determine corresponding with the target reliability rating
Target data access rights;
The addressable data of the target device are determined according to the target data access rights.
5. the method that equipment according to claim 1 connects, it is characterised in that logical between the foundation and target device
Also include after the step of letter connection:
The data access request that target device sends is received, target data corresponding with the data access request is obtained, by institute
The access path for stating target data returns to the target device.
6. the device that a kind of equipment connects, it is characterised in that include:
Equipment connection request receiver module, for receiving device connection request, obtains the target that the equipment connection request is carried
Device identification, the target device are identified corresponding to target device;
Trusted device judge module, for judging whether the target device is trusted device, in the target device be
During trusted device, generate authentication and instruct and target device is sent to, the target device is used for detection in the target
On equipment be input into password and return;
Authentication module, for receiving the password of target device return, carries out authentication to the password;
Module is set up in communication connection, for the communication connection when authentication passes through, between foundation and target device.
7. the device that equipment according to claim 6 connects, it is characterised in that described device also includes equipment connection request
Refusal module and equipment add module, wherein:
The equipment connection request refusal module is used for, when the target device is not for trusted device, refusing the equipment and connecting
Connect request;
The equipment add module is used for the equipment of receiving user's input and adds request, and the target device is designated trusted
Equipment, and call the trusted device judge module.
8. the device that equipment according to claim 6 connects, it is characterised in that the trusted device judge module is also used
In history linkage record corresponding with the target device is obtained, judge that the target device is according to the history linkage record
No for trusted device.
9. the device that equipment according to claim 8 connects, it is characterised in that described device also includes that reliability rating determines
Module, for determining target corresponding with the target device according to the history linkage record corresponding with the target device
Reliability rating;According to the corresponding relation between default reliability rating and data access authority, determine and trust etc. with the target
The corresponding target data access rights of level;The addressable number of the target device is determined according to the target data access rights
According to.
10. the device that equipment according to claim 6 connects, it is characterised in that described device also includes data access mould
Block, for receiving the data access request of target device transmission, obtains target data corresponding with the data access request, will
The access path of the target data returns to the target device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610913478.2A CN106488394A (en) | 2016-10-19 | 2016-10-19 | A kind of method and device of equipment connection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610913478.2A CN106488394A (en) | 2016-10-19 | 2016-10-19 | A kind of method and device of equipment connection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106488394A true CN106488394A (en) | 2017-03-08 |
Family
ID=58270175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610913478.2A Pending CN106488394A (en) | 2016-10-19 | 2016-10-19 | A kind of method and device of equipment connection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106488394A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107135471A (en) * | 2017-05-11 | 2017-09-05 | 维沃移动通信有限公司 | The method and mobile terminal of a kind of data transfer |
CN107678884A (en) * | 2017-09-27 | 2018-02-09 | 维沃移动通信有限公司 | A kind of data transmission method, mobile terminal and computer-readable recording medium |
CN108664799A (en) * | 2017-03-31 | 2018-10-16 | 腾讯科技(深圳)有限公司 | The authority setting method and device of device management application |
CN109450887A (en) * | 2018-11-01 | 2019-03-08 | 西安万像电子科技有限公司 | Data transmission method, apparatus and system |
CN109495562A (en) * | 2018-11-09 | 2019-03-19 | 精硕科技(北京)股份有限公司 | Obtain the method and device of device identification |
WO2019144832A1 (en) * | 2018-01-24 | 2019-08-01 | 阿里巴巴集团控股有限公司 | Device connection method, device and system |
CN113766672A (en) * | 2017-05-31 | 2021-12-07 | 华为技术有限公司 | Connection establishing method and equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101860480A (en) * | 2009-04-01 | 2010-10-13 | 奥迪康有限公司 | The method of pair wireless devices |
EP2383935A3 (en) * | 2010-04-29 | 2012-03-28 | Airties Kablosuz Iletisim Sanayi Ve Dis Ticaret An Gulbahar Mahallesi Avni Dilligil Sokak | Wireless network setup and configuration distribution system |
CN104797003A (en) * | 2015-03-17 | 2015-07-22 | 广东欧珀移动通信有限公司 | Intelligent terminal user switching method and device |
CN105245507A (en) * | 2015-09-23 | 2016-01-13 | 宇龙计算机通信科技(深圳)有限公司 | Communication link establishing method and device |
CN105303083A (en) * | 2015-09-18 | 2016-02-03 | 宇龙计算机通信科技(深圳)有限公司 | Data communication method and wearable device |
CN105578390A (en) * | 2015-12-18 | 2016-05-11 | 联想(北京)有限公司 | Method for transmitting information, electronic equipment and system |
-
2016
- 2016-10-19 CN CN201610913478.2A patent/CN106488394A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101860480A (en) * | 2009-04-01 | 2010-10-13 | 奥迪康有限公司 | The method of pair wireless devices |
EP2383935A3 (en) * | 2010-04-29 | 2012-03-28 | Airties Kablosuz Iletisim Sanayi Ve Dis Ticaret An Gulbahar Mahallesi Avni Dilligil Sokak | Wireless network setup and configuration distribution system |
CN104797003A (en) * | 2015-03-17 | 2015-07-22 | 广东欧珀移动通信有限公司 | Intelligent terminal user switching method and device |
CN105303083A (en) * | 2015-09-18 | 2016-02-03 | 宇龙计算机通信科技(深圳)有限公司 | Data communication method and wearable device |
CN105245507A (en) * | 2015-09-23 | 2016-01-13 | 宇龙计算机通信科技(深圳)有限公司 | Communication link establishing method and device |
CN105578390A (en) * | 2015-12-18 | 2016-05-11 | 联想(北京)有限公司 | Method for transmitting information, electronic equipment and system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108664799A (en) * | 2017-03-31 | 2018-10-16 | 腾讯科技(深圳)有限公司 | The authority setting method and device of device management application |
CN107135471A (en) * | 2017-05-11 | 2017-09-05 | 维沃移动通信有限公司 | The method and mobile terminal of a kind of data transfer |
CN107135471B (en) * | 2017-05-11 | 2020-10-30 | 维沃移动通信有限公司 | Data transmission method and mobile terminal |
CN113766672A (en) * | 2017-05-31 | 2021-12-07 | 华为技术有限公司 | Connection establishing method and equipment |
CN113766672B (en) * | 2017-05-31 | 2023-11-21 | 华为技术有限公司 | Connection establishment method and device |
CN107678884A (en) * | 2017-09-27 | 2018-02-09 | 维沃移动通信有限公司 | A kind of data transmission method, mobile terminal and computer-readable recording medium |
WO2019144832A1 (en) * | 2018-01-24 | 2019-08-01 | 阿里巴巴集团控股有限公司 | Device connection method, device and system |
CN109450887A (en) * | 2018-11-01 | 2019-03-08 | 西安万像电子科技有限公司 | Data transmission method, apparatus and system |
CN109450887B (en) * | 2018-11-01 | 2022-01-11 | 西安万像电子科技有限公司 | Data transmission method, device and system |
CN109495562A (en) * | 2018-11-09 | 2019-03-19 | 精硕科技(北京)股份有限公司 | Obtain the method and device of device identification |
CN109495562B (en) * | 2018-11-09 | 2022-04-12 | 北京明略昭辉科技有限公司 | Method and device for acquiring equipment identifier |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106488394A (en) | A kind of method and device of equipment connection | |
CN106412909B (en) | A kind of method and device of equipment connection | |
EP3029593B1 (en) | System and method of limiting the operation of trusted applications in the presence of suspicious programs | |
EP3240254A1 (en) | Dual-system switch based data security processing method and apparatus | |
CN109660502A (en) | Detection method, device, equipment and the storage medium of abnormal behaviour | |
CN104767713B (en) | Account binding method, server and system | |
US20170372311A1 (en) | Secure payment-protecting method and related electronic device | |
CN107888589A (en) | A kind of method and its system for calling trusted application | |
CN103888418A (en) | Strategy authentication method and system | |
CN111898124A (en) | Process access control method and device, storage medium and electronic equipment | |
CN106357807A (en) | Data processing method, device and system | |
CN106790315A (en) | A kind of right management method and device | |
CN104252352A (en) | Information processing method and electronic equipment | |
CN106569918A (en) | Data backup method and mobile terminal | |
CN107786349B (en) | Security management method and device for user account | |
CN109151790B (en) | Bluetooth device connection method and system based on network security | |
CN108282784B (en) | Wireless network access method, MiFi terminal, mobile terminal and storage medium | |
CN104995635B (en) | Picture sending method and device and terminal device | |
CN106102011A (en) | Method, device and the terminal that a kind of terminal positioning processes | |
CN105678149A (en) | Unlocking method and terminal | |
KR101122697B1 (en) | Method and system to prevent Data leakage using Content Inspection based USB Memory Device | |
CN112165706B (en) | Equipment connection management method and device and Bluetooth equipment | |
CN105099773A (en) | Method for achieving Web network management system of access controller and Web network management system | |
CN104281811A (en) | Terminal self-destruction method, system and device | |
CN113836529A (en) | Process detection method, device, storage medium and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170308 |