CN106488454B - Method and device for connecting external equipment and mobile terminal - Google Patents

Method and device for connecting external equipment and mobile terminal Download PDF

Info

Publication number
CN106488454B
CN106488454B CN201510536598.0A CN201510536598A CN106488454B CN 106488454 B CN106488454 B CN 106488454B CN 201510536598 A CN201510536598 A CN 201510536598A CN 106488454 B CN106488454 B CN 106488454B
Authority
CN
China
Prior art keywords
external equipment
identification code
unique identification
user space
external
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510536598.0A
Other languages
Chinese (zh)
Other versions
CN106488454A (en
Inventor
刘亚鑫
叶瑞权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510536598.0A priority Critical patent/CN106488454B/en
Priority to PCT/CN2015/093535 priority patent/WO2017035943A1/en
Publication of CN106488454A publication Critical patent/CN106488454A/en
Application granted granted Critical
Publication of CN106488454B publication Critical patent/CN106488454B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Abstract

The invention discloses a method and a device for connecting external equipment and a mobile terminal, wherein the method comprises the following steps: when a connection request of an external device is received, an independent user space is distributed through a multi-domain space technology; and under the condition of accepting the connection request of the external equipment, connecting the external equipment to the independent user space so as to detect the safety of the external equipment in the independent user space. When the connection request of the external equipment is received, the independent user space is distributed through the multi-domain space technology, and when the external equipment is accessed, the external equipment is accessed into the independent user space to detect the safety of the external equipment.

Description

Method and device for connecting external equipment and mobile terminal
Technical Field
The present invention relates to the field of mobile communications, and in particular, to a method and an apparatus for connecting an external device, and a mobile terminal.
Background
For the current intelligent terminal, the intelligent terminal can be connected with external equipment, such as Bluetooth earphones, intelligent watches and other equipment. However, the current methods for connecting the external device to the intelligent terminal are that the intelligent terminal is directly connected in the current user state, the external device is directly started, and then the security of the external device is verified.
Because prior art is that external device connects to intelligent terminal earlier then detects the security, and external device direct connection visits to the normal user space of intelligent terminal, if external device has the security problem, then data in the intelligent terminal probably has been destroyed or stolen when detecting that equipment has the problem, and user experience is lower.
Disclosure of Invention
The invention provides a method and a device for connecting external equipment and a mobile terminal, and at least solves the problems that in the prior art, the external equipment is connected to an intelligent terminal firstly and then the safety is detected, if the external equipment has a safety problem, data in the intelligent terminal can be damaged or stolen when the external equipment is detected to have a problem, and the user experience is low.
In one aspect, the present invention provides a method for connecting an external device, including: when a connection request of an external device is received, an independent user space is distributed through a multi-domain space technology; and under the condition of accepting the connection request of the external equipment, connecting the external equipment to the independent user space so as to detect the safety of the external equipment in the independent user space.
Further, after receiving the connection request of the external device, the method further comprises: judging whether the external equipment has a unique identification code, wherein the unique identification code is generated when the terminal is accessed to the terminal for the first time; under the condition that the unique identification code does not exist, generating a unique identification code corresponding to the external equipment according to the current detection time, so that the external equipment is accessed to the independent user space through the unique identification code; and determining whether to access the independent user space according to the unique identification code under the condition of having the unique identification code.
Further, determining whether to access the independent user space according to the unique identification code comprises: judging whether the time difference between the connection and the last time of accessing the terminal is within a preset time range or not according to the unique identification code; under the condition that the time difference is within the preset time range, connecting the external equipment to a normal user space of the terminal; and connecting the external equipment to the independent user space under the condition that the time difference is not within the preset time range.
Further, after detecting the security of the external device in the independent user space, the method further includes: under the condition that the safety of the external equipment meets a preset standard, connecting the external equipment to a normal user space of a terminal to realize normal access; and under the condition that the safety of the external equipment does not accord with the preset standard, disconnecting the external equipment from the external equipment.
Further, after the disconnection with external device, still include: and recording the unique identification code of the external equipment so as to shield the access operation of the external equipment according to the unique identification code when the external equipment requests to access the terminal again.
On the other hand, the invention also provides a device for connecting the external equipment, which comprises: the distribution module is used for distributing an independent user space through a multi-domain space technology when receiving a connection request of the external equipment; and the connection module is used for connecting the external equipment to the independent user space under the condition of accepting the connection request of the external equipment so as to detect the safety of the external equipment in the independent user space.
Further, the apparatus further comprises: the judging module is used for judging whether the external equipment has a unique identification code, wherein the unique identification code is generated when the external equipment is accessed to the terminal for the first time; the generating module is used for generating a unique identification code corresponding to the external equipment according to the current detection time under the condition that the unique identification code does not exist, so that the external equipment is accessed to the independent user space through the unique identification code; and the access module is used for determining whether to access the independent user space according to the unique identification code under the condition of having the unique identification code.
Further, the access module comprises: the judging unit is used for judging whether the time difference between the connection and the last time of accessing the terminal is within a preset time range according to the unique identification code; the access unit is used for connecting the external equipment to a normal user space of the terminal under the condition that the time difference is within the preset time range; and connecting the external equipment to the independent user space under the condition that the time difference is not within the preset time range.
Further, the access module is further configured to connect the external device to a normal user space of the terminal to achieve normal access when the security of the external device meets a preset standard; and under the condition that the safety of the external equipment does not accord with the preset standard, disconnecting the external equipment from the external equipment.
Further, the apparatus further comprises: and the recording module is used for recording the unique identification code of the external equipment after the external equipment is disconnected, so that when the external equipment requests to access the terminal again, the access operation of the external equipment is shielded according to the unique identification code.
In another aspect, the present invention also provides a mobile terminal, including: any one of the above devices for connecting external devices.
When the connection request of the external equipment is received, an independent user space is distributed through a multi-domain space technology, and when the external equipment is connected, the external equipment is connected into the independent user space to detect the safety of the external equipment.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart of a method for connecting an external device according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a first structure of an apparatus for connecting an external device according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a second structure of an apparatus for connecting an external device according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a device access module for connecting an external device according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a third structure of an apparatus for connecting an external device according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a connection structure of functional modules of the smartphone in the preferred embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The invention provides a method, a device and a mobile terminal for connecting external equipment, and aims to solve the problems that in the prior art, the external equipment is connected to an intelligent terminal firstly and then the security is detected, if the external equipment has a security problem, data in the intelligent terminal can be damaged or stolen when the external equipment has the problem, and the user experience is low. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The embodiment of the invention provides a method for connecting an external device, the flow of the method is shown in fig. 1, and the method comprises steps S102 to S104:
s102, when receiving a connection request of an external device, allocating an independent user space through a multi-domain space technology;
and S104, under the condition of accepting the connection request of the external equipment, connecting the external equipment to the independent user space so as to detect the safety of the external equipment in the independent user space.
The embodiment of the invention allocates an independent user space through a multi-domain space technology when receiving a connection request of the external equipment, and accesses the external equipment into the independent user space to detect the security of the external equipment.
After receiving the connection request of the external device, whether the external device can be accessed quickly can be determined through the unique identification code, that is, whether the external device has the unique identification code is judged. The unique identification code is generated when the terminal is accessed to the terminal for the first time by the external equipment.
And under the condition that the external equipment does not have the unique identification code, generating a unique identification code corresponding to the external equipment according to the current detection time, and after the unique identification code is generated, when the external equipment still wants to access the terminal next time, determining whether the external equipment can be quickly accessed through the identification code. Of course, in this process, when the unique identification code is generated for the first time, the external device needs to be accessed to an independent user space for security verification.
Under the condition that the external device has the unique identification code, whether to access an independent user space is determined according to the unique identification code, and the method specifically comprises the following steps: judging whether the time difference between the connection and the last access terminal is within a preset time range or not according to the unique identification code; if the time difference is within the preset time range, the disconnection time with the terminal is short, no potential safety hazard exists, and the external equipment can be directly connected to the normal user space of the terminal again; if the time difference is not within the preset time range, the disconnection time with the terminal is longer, and potential safety hazards may exist, so that the external equipment needs to be connected to an independent user space for safety detection.
After the safety of the external equipment is detected in the independent user space, if the safety of the external equipment meets a preset standard, the external equipment is connected to the normal user space of the terminal to realize normal access; if the safety of the external equipment does not meet the preset standard, the potential safety hazard is indicated to exist, and the connection with the external equipment is disconnected.
After the connection with the external device is disconnected, in order to avoid processes such as security detection and the like performed again when the external device sends a request, the unique identification code of the external device may be recorded first, so that when the external device requests to access the terminal again, the access operation of the external device is shielded according to the unique identification code.
The embodiment of the present invention further provides a device for connecting an external device, where a structural schematic of the device is shown in fig. 2, and the device includes: the distribution module 10 is configured to distribute an independent user space through a multi-domain space technology when receiving a connection request of an external device; and a connection module 20 coupled to the distribution module 10, for connecting the external device to the independent user space to detect the security of the external device in the independent user space when the connection request of the external device is accepted.
Fig. 3 shows a schematic view of another structure of the above apparatus, which may further include: the judging module 30 is coupled with the allocating module 10 and is used for judging whether the external device has a unique identification code, wherein the unique identification code is generated when the external device is accessed to the terminal for the first time; the generating module 40 is coupled with the judging module 30 and is used for generating a unique identification code corresponding to the external device according to the current detection time under the condition that the unique identification code does not exist, so that the external device is accessed into an independent user space through the unique identification code; and an accessing module 50, coupled to the determining module 30, for determining whether to access the independent user space according to the unique identification code if the unique identification code is provided.
In the above embodiment, when the determining module 30 is coupled to the allocating module 10, the determining module 30 and the allocating module 10 have an interactive relationship, which is not a top-bottom relationship as shown in the figure, that is, when the allocating module 10 receives a connection request of an external device, the determining module 30 is turned to determine the unique identifier, and then it is determined whether the allocating module 10 allocates an independent user space according to execution results of the generating module 40, the accessing module 50, and the like.
The above-mentioned access module 50 may be schematically shown in fig. 4, and includes: a determining unit 501, configured to determine, according to the unique identifier, whether a time difference between the current connection and the last access terminal is within a preset time range; the access unit 502 is coupled with the judgment unit 501 and is used for connecting the external device to the normal user space of the terminal under the condition that the time difference is within the preset time range; and connecting the external equipment to the independent user space under the condition that the time difference is not within the preset time range.
In implementation, the access module 50 is further configured to connect the external device to a normal user space of the terminal to realize normal access when the security of the external device meets a preset standard; and under the condition that the safety of the external equipment does not accord with the preset standard, disconnecting the external equipment from the external equipment. Based on this function of the access module 50, fig. 5 further shows a schematic structural diagram of the above apparatus, and on the basis of fig. 3, the apparatus may further include: and a recording module 60, coupled to the access module 50, for recording the unique identification code of the external device after the connection with the external device is disconnected, so as to shield the access operation of the external device according to the unique identification code when the external device requests to access the terminal again.
The embodiment of the invention also provides a mobile terminal which comprises the device for connecting the external equipment. Those skilled in the art know how to integrate the above devices in the mobile terminal according to the above description, and will not be further described here. It should be noted that, when the device or the mobile terminal works, each module inside the device or the mobile terminal needs to interact when realizing its function, and is not independently completed.
PREFERRED EMBODIMENTS
The embodiment of the invention provides a smart phone, wherein a device for connecting external equipment (also called peripheral) is arranged in the smart phone, and the method can provide a multi-domain technology-based external equipment connecting method under the situation that some users need high security to connect the external equipment (such as the security space of the smart phone), and is used for detecting the accessed external equipment and improving the security of the smart phone for connecting the external equipment.
The schematic diagram of the connection structure of each functional module of the smart phone in the embodiment of the present invention is shown in fig. 6, and the connection structure includes: the peripheral judgment module, the user space management module, the peripheral connection processing module and the peripheral detection module are also indicated in fig. 6 to derive the working processes of the modules. The following describes the operation process of the smart phone with reference to the modules in fig. 6.
When the mobile phone is to be connected with the external device, after the driver detects the external device, the external judgment module preferentially judges whether the connected external device is the first connection mobile phone or whether the last connection time is overtime (whether the last connection time exceeds a preset value, and if so, the detection needs to be carried out again). If yes, generating a corresponding judgment result, and transmitting the result to the user space management module and the peripheral connection processing module.
And the user space management module temporarily generates a new user space according to the received judgment result, wherein the space is minimized and is only used for detecting the safety of the connection of the external equipment. And then the peripheral connection processing module connects the mobile phone peripheral to the temporarily generated new space. Due to the characteristic of the multi-domain space technology, at the moment, the peripheral connected with the mobile phone can only access/operate the data of the temporary space, so that the safety of the user data on the mobile phone is ensured.
In the temporary space, the external detection module detects the external equipment connected with the mobile phone, and generates a unique identification code of the mobile phone to the external equipment by combining the current time, wherein the identification code is used for identifying the external equipment and the last connection time when the external equipment is connected again later. In implementation, if it was generated previously, it is not generated here.
And when the detection result shows that the external equipment is unsafe, the result is fed back to the external connection processing module through the external judgment module, so that the external connection processing module closes the connection between the mobile phone and the external equipment, and simultaneously feeds back the identification code to the external judgment module.
When the detection result shows that the external equipment is safe, the result is fed back to the external connection processing module through the external judgment module, so that the external connection processing module transfers the connection between the mobile phone and the external equipment to a normal user to access a normal user space, and simultaneously feeds back the identification code to the external judgment module.
In the present embodiment, although the names of the functional modules are different, the total functions of the functional modules are the same as the sum of the functional modules of the device connected to the external device in the above-described embodiment.
The operation method of the embodiment of the invention is simple, convenient and quick, and does not need user participation; the method can effectively prevent the external equipment with potential safety hazard from accessing and operating the mobile phone data, and improves the safety performance of the system.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (7)

1. A method for connecting an external device is characterized by comprising the following steps:
when a connection request of an external device is received, an independent user space is distributed through a multi-domain space technology;
under the condition of accepting the connection request of the external device, connecting the external device to the independent user space so as to detect the safety of the external device in the independent user space;
after receiving the connection request of the external device, the method further comprises the following steps:
judging whether the external equipment has a unique identification code, wherein the unique identification code is generated when the external equipment is accessed to the terminal for the first time, and determining whether the external equipment can be accessed quickly or not through the unique identification code;
after receiving a connection request of an external device, determining whether the external device has a unique identification code, further comprising:
under the condition that the unique identification code does not exist, generating a unique identification code corresponding to the external equipment according to the current detection time, so that the external equipment is accessed to the independent user space through the unique identification code;
under the condition of having the unique identification code, determining whether to access the independent user space according to the unique identification code;
after detecting the security of the external device in the independent user space, the method further comprises:
under the condition that the safety of the external equipment meets a preset standard, connecting the external equipment to a normal user space of a terminal to realize normal access;
and under the condition that the safety of the external equipment does not accord with the preset standard, disconnecting the external equipment from the external equipment.
2. The method of claim 1, wherein determining whether to access the separate user space based on the unique identification code comprises:
judging whether the time difference between the connection and the last time of accessing the terminal is within a preset time range or not according to the unique identification code;
under the condition that the time difference is within the preset time range, connecting the external equipment to a normal user space of the terminal;
and connecting the external equipment to the independent user space under the condition that the time difference is not within the preset time range.
3. The method of claim 1, wherein after disconnecting the external device, further comprising:
and recording the unique identification code of the external equipment so as to shield the access operation of the external equipment according to the unique identification code when the external equipment requests to access the terminal again.
4. A device for connecting external equipment, comprising:
the distribution module is used for distributing an independent user space through a multi-domain space technology when receiving a connection request of the external equipment;
the connection module is used for connecting the external equipment to the independent user space under the condition of accepting the connection request of the external equipment so as to detect the safety of the external equipment in the independent user space;
the judging module is used for judging whether the external equipment has a unique identification code, wherein the unique identification code is generated when the external equipment is accessed to the terminal for the first time, and whether the external equipment can be accessed quickly is determined through the unique identification code; the device further comprises:
the generating module is used for generating a unique identification code corresponding to the external equipment according to the current detection time under the condition that the unique identification code does not exist, so that the external equipment is accessed to the independent user space through the unique identification code;
the access module is used for determining whether to access the independent user space according to the unique identification code under the condition of having the unique identification code;
the access module is also used for connecting the external equipment to a normal user space of the terminal under the condition that the safety of the external equipment meets a preset standard so as to realize normal access; and under the condition that the safety of the external equipment does not accord with the preset standard, disconnecting the external equipment from the external equipment.
5. The apparatus of claim 4, wherein the access module comprises:
the judging unit is used for judging whether the time difference between the connection and the last time of accessing the terminal is within a preset time range according to the unique identification code;
the access unit is used for connecting the external equipment to a normal user space of the terminal under the condition that the time difference is within the preset time range; and connecting the external equipment to the independent user space under the condition that the time difference is not within the preset time range.
6. The apparatus of claim 4, wherein the apparatus further comprises:
and the recording module is used for recording the unique identification code of the external equipment after the external equipment is disconnected, so that when the external equipment requests to access the terminal again, the access operation of the external equipment is shielded according to the unique identification code.
7. A mobile terminal, comprising: the device for connecting an external device according to any one of claims 4 to 6.
CN201510536598.0A 2015-08-28 2015-08-28 Method and device for connecting external equipment and mobile terminal Expired - Fee Related CN106488454B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510536598.0A CN106488454B (en) 2015-08-28 2015-08-28 Method and device for connecting external equipment and mobile terminal
PCT/CN2015/093535 WO2017035943A1 (en) 2015-08-28 2015-10-31 Method and apparatus for connecting external device, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510536598.0A CN106488454B (en) 2015-08-28 2015-08-28 Method and device for connecting external equipment and mobile terminal

Publications (2)

Publication Number Publication Date
CN106488454A CN106488454A (en) 2017-03-08
CN106488454B true CN106488454B (en) 2020-03-17

Family

ID=58186680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510536598.0A Expired - Fee Related CN106488454B (en) 2015-08-28 2015-08-28 Method and device for connecting external equipment and mobile terminal

Country Status (2)

Country Link
CN (1) CN106488454B (en)
WO (1) WO2017035943A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN102098475A (en) * 2009-12-11 2011-06-15 鸿富锦精密工业(深圳)有限公司 Electronic equipment, and method for acquiring connecting relationship between interfaces and external equipment
CN102172095A (en) * 2011-04-26 2011-08-31 华为终端有限公司 Method for connecting bluetooth devices and bluetooth device
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
US8458800B1 (en) * 2010-10-01 2013-06-04 Viasat, Inc. Secure smartphone
CN103198263A (en) * 2012-10-26 2013-07-10 马国强 Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100570592C (en) * 2008-10-29 2009-12-16 清华大学 A kind of soft computer and implementation method
US20110161452A1 (en) * 2009-12-24 2011-06-30 Rajesh Poornachandran Collaborative malware detection and prevention on mobile devices
WO2015094189A1 (en) * 2013-12-17 2015-06-25 Intel Corporation Detection of unauthorized memory modification and access using transactional memory

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN102098475A (en) * 2009-12-11 2011-06-15 鸿富锦精密工业(深圳)有限公司 Electronic equipment, and method for acquiring connecting relationship between interfaces and external equipment
US8458800B1 (en) * 2010-10-01 2013-06-04 Viasat, Inc. Secure smartphone
CN102172095A (en) * 2011-04-26 2011-08-31 华为终端有限公司 Method for connecting bluetooth devices and bluetooth device
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103198263A (en) * 2012-10-26 2013-07-10 马国强 Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key

Also Published As

Publication number Publication date
WO2017035943A1 (en) 2017-03-09
CN106488454A (en) 2017-03-08

Similar Documents

Publication Publication Date Title
CN107995215B (en) Control method and device of intelligent household equipment and cloud platform server
US20180041893A1 (en) Method and system of multi-terminal mapping to a virtual sim card
US9886813B2 (en) Providing multimedia contents to user equipment associated with electric vehicle
CN103415016A (en) Mobile WIFI hotspot connection processing method and system
CN103428696A (en) Virtual SIM card achieving method and system and relevant device
CN108156240B (en) Method and system for accessing industrial adapter to server
US10812592B2 (en) Method and apparatus for utilizing NFC to establish a secure connection
CN105227321A (en) Information processing method, server and client
CN105471815A (en) Internet-of-things data security method and Internet-of-things data security device based on security authentication
CN106488394A (en) A kind of method and device of equipment connection
CN106656985B (en) Backup account login method, device and system
CN106408096A (en) Data processing method in online ticketing system and online ticketing system
CN105681258A (en) Session method and session device based on third-party server
CN104284334A (en) Controlling method for WiFi protected setup and equipment thereof
CN107396283A (en) A kind of router wireless connection authentication method and system
CN106793063B (en) Data attachment control method and device
CN104980420A (en) Business processing method, device, terminal and server
CN108460251B (en) Method, device and system for running application program
CN103744707B (en) A kind of VCI device program upgrade method, device and system
CN105592459A (en) Security authentication device based on wireless communication
CN105162770A (en) Intelligent home security protection system and control method thereof
CN101800985A (en) Authentication method and system, terminal, server and data downloading method and device
CN106488454B (en) Method and device for connecting external equipment and mobile terminal
CN103823702A (en) Application installation method and electronic equipment
CN109033769B (en) Vehicle delivery detection method and device based on interaction, server and vehicle machine

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200317

Termination date: 20210828

CF01 Termination of patent right due to non-payment of annual fee