CN106534157B - A kind of data transmission method, device and terminal - Google Patents

A kind of data transmission method, device and terminal Download PDF

Info

Publication number
CN106534157B
CN106534157B CN201611089009.XA CN201611089009A CN106534157B CN 106534157 B CN106534157 B CN 106534157B CN 201611089009 A CN201611089009 A CN 201611089009A CN 106534157 B CN106534157 B CN 106534157B
Authority
CN
China
Prior art keywords
network
list
hardware
data
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201611089009.XA
Other languages
Chinese (zh)
Other versions
CN106534157A (en
Inventor
任利宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611089009.XA priority Critical patent/CN106534157B/en
Publication of CN106534157A publication Critical patent/CN106534157A/en
Application granted granted Critical
Publication of CN106534157B publication Critical patent/CN106534157B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The present invention provides a kind of data transmission method, comprising: receives data transfer instruction;Obtain the network information of current connection network;When judging that the network information is matched with default network list, the hardware address of target terminal is obtained;When judging the hardware address and predetermined hardware list match, send data in the target terminal.The present invention passes through when receiving data transfer instruction, whether the hardware address for judging current network and target terminal is preset network and preset hardware address, when being all default, it sends data in target terminal, it solves the easily stolen the case where taking of data in data transmission procedure, is greatly improved the safety of user data.The invention further relates to a kind of data transmission device and terminals.

Description

A kind of data transmission method, device and terminal
Technical field
The present invention relates to terminal security technical field more particularly to a kind of data transmission methods, device and terminal.
Background technique
With the rapid development of terminal and universal, the data transmission of terminal is also more and more convenient, even if people are not same A place can also connect network by terminal and mutually be transmitted the data such as photo, document.
In the data transmission of terminal, if the network of connection cannot ensure safety, in transmission, it is easy to by not Method one's share of expenses for a joint undertaking steals data.And in my non-operation of terminal, the data of terminal can be transmitted to strange terminal by my non-user On to steal the data of user, bring great loss to user, therefore, be easy to cause secure user data low.
Summary of the invention
The embodiment of the present invention provides a kind of data transmission method, device and terminal, solves that secure user data is low to ask Topic.
The embodiment of the present invention the following technical schemes are provided:
A kind of data transmission method, comprising:
Receive data transfer instruction;
Obtain the network information of current connection network;
When judging that the network information is matched with default network list, the hardware address of target terminal is obtained;
When judging the hardware address and predetermined hardware list match, send data in the target terminal.
The embodiment of the present invention also the following technical schemes are provided:
A kind of data transmission device, comprising:
Command reception module, for receiving data transmission instruction;
Network obtains module, for obtaining the network information of current connection network;
Address acquisition module, for obtaining target terminal when judging that the network information is matched with default network list Hardware address;
Transmission module, for sending data to the mesh when judging the hardware address and predetermined hardware list match It marks in terminal.
The embodiment of the present invention also the following technical schemes are provided:
A kind of terminal, comprising:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes provided in an embodiment of the present invention A kind of data transmission method.
A kind of data transmission method, device and terminal provided in this embodiment, by when receiving data transfer instruction, Whether the hardware address for judging current network and target terminal is preset network and preset hardware address, when being all default When, it sends data in target terminal, solves the easily stolen the case where taking of data in data transmission procedure, to promote use The safety of user data.
Detailed description of the invention
With reference to the accompanying drawing, by the way that detailed description of specific embodiments of the present invention, technical solution of the present invention will be made And other beneficial effects are apparent.
Fig. 1 is the flow diagram of data transmission method provided in an embodiment of the present invention.
Fig. 2 is the time diagram of data transmission method provided in an embodiment of the present invention.
Fig. 3 is another flow diagram of data transmission method provided in an embodiment of the present invention.
Fig. 4 is the module diagram of data transmission device provided in an embodiment of the present invention.
Fig. 5 is another module diagram of data transmission device provided in an embodiment of the present invention.
Fig. 6 is terminal structure schematic diagram provided in an embodiment of the present invention.
Specific embodiment
Schema is please referred to, wherein identical component symbol represents identical component, the principle of the present invention is to implement one It is illustrated in computing environment appropriate.The following description be based on illustrated by the specific embodiment of the invention, should not be by It is considered as the limitation present invention other specific embodiments not detailed herein.
Term as used herein " module " can regard the software object to execute in the arithmetic system as.It is somebody's turn to do herein not Same component, module, engine and service can be regarded as the objective for implementation in the arithmetic system.And the device and method being somebody's turn to do herein is excellent Being implemented in the form of software for choosing, can also be implemented, within that scope of the present invention on hardware certainly.
Concrete analysis explanation is carried out below.
In the present embodiment, it will be described from the angle of data transmission device, which can specifically collect At in terminal, such as mobile phone, tablet computer, palm PC (PDA, Personal Digital Assistant) etc..
Referring to Fig. 1, Fig. 1 is the flow diagram of data transmission method provided in an embodiment of the present invention.Specifically, should Method includes:
In step s101, data transfer instruction is received.
Wherein, data transfer instruction instruction sends data to target terminal.The data can be picture, audio, text Files etc..The target terminal refers to receiving the terminal of data.For example there is data-transformation facility in user's using terminal Application send data in target terminal, be judged to receiving data transfer instruction.
In step s 102, the network information of current connection network is obtained.
Wherein, which is information transmission, receives, shared virtual platform, by it each point, face, body information It is linked together, to realize the shared of these resources.The network includes local area network, Metropolitan Area Network (MAN) and wide area network.Network letter Breath can refer to the service set (SSID, Service Set Identifier) and network hardware addresses of current connection network (MAC, Media Access Control).The corresponding network hardware addresses of each different network are different.
Based on this, service set and network hardware addresses that terminal currently connects network are obtained.
In step s 103, when judging that the network information is matched with default network list, the hardware of target terminal is obtained Address.
It is understood that carrying out data by the network in user if the network of terminal connection is insecure network When transmission, data are easy to illegally be intercepted by third party.Therefore user can preset the network information trusty, this is credible Appoint network trust system in default network list.
It wherein, is the trusted network information of user preset addition in the default network list.The default network list can It include the corresponding service set of each network and net in each historic network information to include a plurality of historic network information Network hardware address.The hardware address of the target terminal is the hardware address of data receiving terminal, the hardware address of each terminal It is unique when being factory.
In certain possible embodiment, judge that the network information is matched with default network list, comprising:
(1) network hardware addresses in the network information are obtained.
(2) judge in default network list whether to include network hardware addresses.
Wherein, due to network hardware addresses be it is unique, can be to avoid illegal part using network hardware addresses as Rule of judgment Son copys the case where network information connects user to steal user data.
Further, if judging the network hardware addresses including the target terminal in default network list, step is executed Suddenly (3);If judge do not include in default network list the target terminal network hardware addresses, illustrate the net currently connected Network is unsafe network, forbids sending data to target terminal.
(3) it is determined as that the network information is matched with default network list.
Wherein, include the network hardware addresses in the default network list, illustrate that the network currently connected is user preset Network, be trusted network, then be determined as that the network information is matched with default network list.
In step S104, when judging hardware address and predetermined hardware list match, the target is sent data to In terminal.
Wherein, the information that the data receiving terminal trusty of user preset addition is stored in the predetermined hardware list, can To include that a plurality of historical data receives end message, every historical data receives in the information of terminal include the implementor name of terminal with And the hardware address of terminal.
Further, if judging the hardware including the i.e. current data receiving terminal of target terminal in predetermined hardware list Address then illustrates that the target terminal of currently transmitted data is the data receiving terminal of safety, and execution sends data to the target In terminal.If judge do not include in predetermined hardware list the i.e. current data receiving terminal of target terminal hardware address, The target terminal for illustrating currently transmitted data is unsafe data receiving terminal, forbids for the data being transmitted to the target terminal In.
Wherein, in order to preferably describe the present embodiment, referring to Fig. 2, Fig. 2 is data provided in an embodiment of the present invention transmission The time diagram of method.As shown in Fig. 2, terminal A is to send terminal, terminal B is target terminal (i.e. data receiving terminal), net Network C may include cable network and wireless network.User's input data transmission request in terminal A, the data transfer request Data are transferred in terminal B by instruction from terminal A, and terminal A obtains the network information of the network C currently connected, the network information It can be the service set and network hardware addresses of network C.When terminal A judges in default network list to include network C Network hardware addresses when, execute send feedback request instruct to terminal B, the feedback request to instruction terminal B by hardware Location feeds back to terminal A.Terminal B feeds back hardware address to terminal A, when terminal A judges the hard of terminal B feedback according to feedback request When part address and predetermined hardware list match, the operation for carrying out data to be transmitted to terminal B is executed.
It can be seen from the above, a kind of data transmission method provided in this embodiment, by when receiving data transfer instruction, The network information for obtaining current connection network obtains the hardware of target terminal when determining that the network information is the default network information Address is sent data in target terminal, when being determined as that the hardware address is predetermined hardware address by network and target The double verification of the hardware address of terminal, it is ensured that the safety of data transmission solves data in data transmission procedure and is easy quilt The case where stealing, to promote the safety of user data.
Citing, is described in further detail by the method according to described in above-described embodiment below.
Referring to Fig. 3, Fig. 3 is another flow diagram of data transmission method provided in an embodiment of the present invention.
Specifically, this method comprises:
In step s 201, the key information of user's input is received.
Wherein, which is the password of user's input, can be the combination of character string, or characteristics of human body's letter Breath, such as fingerprint, iris information.
In step S202, initial network list is encrypted based on key information, obtains default network list.
It wherein, may include a plurality of network information of systemic presupposition in the initial network list.Include in the network information The service set and network hardware addresses of network.Key information based on user's input adds the initial network list It is close, generate default network list.When user, which needs to look into the progress additions and deletions of default network list, to be changed, need to input preset key Information can just carry out corresponding operation, otherwise, forbid operating default network list, store in default network list The network information is the network information of users to trust.
Table 1 presets network list
Number SSID MAC Address
1 Network 1 47:CD:2A:23:BC:25
2 Network 2 40:EF:2A:31:CD:A6
3 Network 3 22:3A:1A:34:2A:B7
For example, please referring to table 1, table 1 is default network list.Include 3 web-based history letters in current preset network list Breath, title, that is, SSID entitled " network 1 ", " network 2 ".The corresponding network hardware of " network 3 " and 3 historic network informations Location, when user to this preset network list carry out additions and deletions look into change when, need to input key information.
For example, taking the mobile phone as an example, mobile phone receives the finger print information of user's input as key information, is based on the finger print information Initial network list is encrypted, default network list is generated.As shown in table 1, when user needs to preset network list to this When being operated (additions and deletions, which are looked into, to be changed), mobile phone will pop up " please input password " frame, the finger print information of acquisition active user's input.Currently When the finger print information of user's input matches consistent with the finger print information that mobile phone stores, user is allowed to grasp default network list Make, user is otherwise forbidden to operate default network list.
In step S203, initial hardware list is encrypted based on key information, obtains predetermined hardware list.
It wherein, may include a plurality of target terminal information of systemic presupposition, target terminal letter in the initial hardware list The hardware address of implementor name and terminal in breath including terminal.Key information based on user's input is to the initial hardware list It is encrypted, generates predetermined hardware list.When user needs to operate predetermined hardware list (additions and deletions, which are looked into, to be changed), need defeated Corresponding operation can just be carried out by entering preset key information, otherwise, forbid operating the predetermined hardware list, be preset hard The target terminal information stored in part list is the target terminal information i.e. data receiving terminal information of users to trust.
2 predetermined hardware list of table
Number Implementor name MAC Address
1 Equipment 1 33:BA:3A:23:CD:E9
2 Equipment 2 34:BC:4A:24:CE:D8
3 Equipment 3 35:BD:5A:25:BC:C7
For example, please referring to table 2, table 2 is predetermined hardware list, includes 3 historical Device letters in current preset hardware list Breath, equipment entitled " equipment 1 ", " equipment 2 ".The hardware address of " equipment 3 " and 3 historical device informations, when user is pre- to this It is looked into when changing if hardware list carries out additions and deletions, needs to input corresponding key information.
For example, taking the mobile phone as an example, mobile phone can receive the finger print information of user's input as key information, be based on the fingerprint Information encrypts initial hardware list, generates predetermined hardware list.As shown in table 2, when user needs to the predetermined hardware When list is operated (additions and deletions, which are looked into, to be changed), mobile phone will pop up " please input password " frame, and acquire the fingerprint letter of active user's input Breath.When the finger print information of active user's input matches consistent with the finger print information that mobile phone stores, user is allowed to arrange predetermined hardware Table is operated.
It, can be with it is contemplated that encrypted by key information to default network list and predetermined hardware list Prevent undesirable's malice from adding network trusty or target terminal trusty.
In step S204, data transfer instruction is received.
Wherein, data transfer instruction instruction sends data to target terminal, which can be picture, audio, text Files etc..The target terminal refers to receiving the terminal of data.For example there is data-transformation facility in user's using terminal Application send data in target terminal, be judged to receiving data transfer instruction.
For example, user in mobile phone by using the application with data-transformation facility, execute and file be sent to some In target terminal, that is, it is considered as mobile phone and receives data transfer instruction.
In step S205, the network information of current connection network is obtained.
Wherein, the acquisition currently connect network the network information can for obtain the service set of current connection network with And network hardware addresses, the network can be cable network or wireless network (wireless network).
For example, obtaining the service set and net of the network currently connected when mobile phone receives data transfer instruction Network hardware address, for example the network that currently connects is " network 1 ", corresponding network hardware addresses be " 47:CD:2A:23:BC: 25”。
In step S206, judge whether the network information matches with default network list.
Wherein, if judging, the network information is matched with default network list, thens follow the steps S207;If judging, network is believed Breath is mismatched with default network list, thens follow the steps S210.
Specifically, this judges the network information includes: with whether default network list matches
(1) network hardware addresses in the network information are obtained.
Wherein, due to including the current service set and network hardware addresses for connecting network in the network information.It needs It is noted that service set is recursive, but network hardware addresses are fixed, are that can not change under normal circumstances Become, therefore by obtaining current network hardware address, it can the same network of effective Differentiated Services set identifier.
For example, the network hardware addresses that mobile phone obtains current connection network are " 47:CD:2A:23:BC:25 ".
(2) judge in default network list whether to include network hardware addresses.
Wherein, due to network hardware addresses be it is unique, can be to avoid illegal part using network hardware addresses as Rule of judgment Son copys the case where network information steals user data.
Further, if judging, in default network list include the network hardware addresses, thens follow the steps (3);If sentencing Do not include the network hardware addresses in disconnected network list default out, thens follow the steps (4).
For example, whether in mobile phone judging to preset shown in table 1 in network list includes that the current network for connecting network is hard Part address " 47:CD:2A:23:BC:25 ".After comparison, it is found that in default network list include the network hardware addresses, then hold Row step (3).
(3) it is determined as that the network information is matched with default network list.
(4) it is determined as that the network information and default network list mismatch.
In step S207, the hardware address of target terminal is obtained.
Wherein, the hardware address of the target terminal is the hardware address of data receiving terminal, the hardware address of each terminal It is unique when being all factory.
Specifically, the hardware address of the acquisition target terminal includes:
(1) feedback request is sent to target terminal.
Wherein, which feeds back hardware address to request target terminal.It can not directly be obtained due to sending terminal The target terminal i.e. implementor name of data receiving terminal and hardware address are taken, therefore needs to send feedback request.
For example, obtaining target mobile phones, that is, data receiver cellphone information in mobile phone, sent to the data receiver mobile phone Feedback request, data receiver mobile phone feed back the hardware address of cell phone apparatus name and mobile phone after receiving feedback request Give transmission mobile phone.
(2) hardware address of target terminal feedback is received.
In step S208, judge whether hardware address matches with predetermined hardware list.
Wherein, if judging hardware address and predetermined hardware list match, S209 is thened follow the steps;If with judging hardware Location and predetermined hardware list mismatch, and then follow the steps S211.
In a kind of possible embodiment, when transmission terminal does not receive the hardware address of target terminal feedback, then directly It connects and is determined as that hardware address and predetermined hardware list mismatch, execute step S211.In alternatively possible embodiment, hair Make arrangements for his funeral end receive target terminal feedback hardware address when, whether including the hardware received judge in predetermined hardware list Location.If judging to include the hardware address received in predetermined hardware list, it is determined as that hardware address and predetermined hardware arrange Table matching illustrates that target terminal i.e. data receiving terminal is the terminal of users to trust, executes step S209.If judging default hard Do not include the hardware address received in part list, is then determined as that hardware address and predetermined hardware list mismatch, illustrates mesh Mark terminal, that is, data receiving terminal is not the terminal of users to trust, thens follow the steps S211.
For example, mobile phone does not receive target mobile phones after sending feedback request to target mobile phones, that is, data receiver mobile phone The hardware address of feedback is then directly determined as that hardware address and predetermined hardware list mismatch.If receiving target mobile phones feedback Hardware address such as " 33:BA:3A:23:CD:E9 " judge in predetermined hardware list shown in table 2 including the target mobile phones Hardware address is then determined as hardware address and predetermined hardware list match.
In step S209, send data in target terminal.
Wherein, when terminal determines that the network currently connected is trusted network and target terminal is terminal trusty When, response data transmission instruction is sent data in target terminal.
For example, mobile phone has determined that the network information of current connection network is trusted network and target mobile phones are trusted After mobile phone, allow for the data such as picture, audio to be sent in target mobile phones.
In step S210, network module is closed, and encrypt to network module.
It should be noted that if judging that the network information and default network list mismatch, then illustrate the net currently connected Network is insecure network.If carried out data transmission using the insecure network, it is likely that cause data by unauthorized theft.
The network module of terminal is closed when the network for judging currently to connect is insecure network based on this, even if eventually End can not connect network, and encrypt to the network module.After encryption, user needs to carry out net using the network module When network connects, preset solution confidential information need to be inputted, which can be characteristics of human body's information or character string information.
In step S211, record hardware address and the unmatched secondary numerical value of predetermined hardware list.
Being readily apparent that is, when the hardware address of target terminal and predetermined hardware list mismatch, it is likely to illegal part The data of user are sent in un-trusted target terminal by son using terminal is sent.
Specifically, after the record hardware address and the unmatched secondary numerical value of predetermined hardware list, further includes:
(1) hardware address and the unmatched secondary numerical value of predetermined hardware list are obtained.
(2) when secondary numerical value is more than preset threshold, stop response data transmission instruction.
Wherein, after getting hardware address and the unmatched secondary numerical value of predetermined hardware list is more than certain numerical value, stop The data transfer instruction is only responded, makes terminal that cannot execute data transfer instruction within the scope of certain time.
Specifically, can start the clock value, preset reaching after stopping responding the data transfer instruction The data transfer instruction can be responded after time again, and is sent a notification message to reserved terminal, has informed that data may be non- Method is stolen.
It is super with the unmatched secondary numerical value of predetermined hardware list when getting hardware address in certain possible embodiment After crossing certain numerical value, screen locking operation can be executed, and using terminal could be unlocked after inputting preset password.
For example, being arranged when getting the target mobile phones i.e. hardware address of data receiver mobile phone with predetermined hardware in mobile phone The unmatched number of table is more than certain number, when such as 5 times, it is likely that is carried out data transmission for undesirable using mobile phone, by hand Machine screen locking, and mobile phone can be just continued to use after inputting correct password.
It can be seen from the above, a kind of data transmission method provided in this embodiment, by preset-key information to default network List and predetermined hardware list are encrypted, and when receiving data transfer instruction, obtain the network letter of current connection network Breath obtains the hardware address of target terminal, determines when determining the network information including current connection network in default network list When including the hardware address of target terminal in predetermined hardware address, send data in target terminal.And in predetermined hardware When the hardware address of address and target terminal mismatches number more than certain threshold value, data transfer instruction is closed, by network The double verification of the hardware address of information and target terminal, it is ensured that the safety of data transmission, and in the hard of target terminal When part address continuously mismatches, data transfer instruction is closed, solves the easily stolen the case where taking of data in data transmission procedure, To promote the safety of user data.
For convenient for better implementation data transmission method provided in an embodiment of the present invention, the embodiment of the present invention also provides one kind Device based on above-mentioned data transmission method.Wherein the meaning of noun is identical with above-mentioned data transmission method, and specific implementation is thin Section can be with reference to the explanation in embodiment of the method.
Referring to Fig. 4, Fig. 4 is the module diagram of data transmission device provided in an embodiment of the present invention.Specifically, should Data transmission device 300, comprising: command reception module 31, network obtain module 32, address acquisition module 33 and transmission mould Block 34.
The command reception module 31, for receiving data transmission instruction.
Wherein, which refers to receiving the terminal of data, for example has data transmission in user's using terminal The application of function is sent data in target terminal, is determined as that the command reception module 31 receives data transfer instruction.
The network obtains module 32, for obtaining the network information of current connection network.
Wherein, the network information which obtains in module 32 refers to that the service set of current connection network and network are hard Part address, the corresponding network hardware addresses of each different network are different.
Wherein, what is connect with network acquisition module 32 further includes network encryption module, the network encryption module, for working as When judging that the network information and default network list mismatch, network module is closed, and encrypt to the network module.
The address acquisition module 33, for obtaining target when judging that the network information is matched with default network list The hardware address of terminal.
It wherein, is the trusted network information of user preset addition in the default network list, which can It include the corresponding service set of the network and network in each historic network information to include a plurality of historic network information Hardware address.The hardware address of the target terminal is the hardware address of data receiving terminal, and the hardware address of each terminal is It is unique when factory.
For example, the address acquisition module 33 can judge the network in the following way in a kind of possible embodiment Information is matched with default network list:
Obtain the network hardware addresses in the network information of current connection network, judge in default network list whether include The network hardware addresses.When judging in default network list includes the network hardware addresses, be determined as the network information with Default network list matching.
The transmission module 34, for sending data to when judging the hardware address and predetermined hardware list match In the target terminal.
Wherein, which is the trusted target terminal information of user preset addition, may include a plurality of go through History target terminal information includes the corresponding implementor name of history target terminal and hardware in each history target terminal information Address.
Further, when the network for judging currently to connect is trusted network and target terminal is that trusted target is whole When end, command adapted thereto receiving module 31 receives data transfer instruction, sends data in the target terminal.
Fig. 5 can be referred to together, and Fig. 5 is another module diagram of data transmission device provided in an embodiment of the present invention, should Data transmission device 300 can also include:
Wherein, which can also include sending submodule 331 and receiving submodule 332.
Specifically, the sending submodule 331, for when judging that the network information is matched with default network list, Feedback request is sent to target terminal, which feeds back hardware address to request target terminal.The receiving submodule 332, for receiving the hardware address of target terminal feedback.
Key reception module 35, for receiving the key information of user's input.
Wherein, the key information in the key reception module 35 can be the encrypted message of user preset.Key letter Breath can be the combination of character string, or characteristics of human body's information, such as fingerprint, iris information.
First encrypting module 36 obtains default network for encrypting based on the key data to initial network list List.
It wherein, may include a plurality of network letter of systemic presupposition in the initial network list in first encrypting module 36 Breath.Include the service set and network hardware addresses of network in the network information, is connect based on the key reception module 35 It receives key information to encrypt the initial network list, generates default network list.When user needs to arrange default network Table carries out additions and deletions and looks into when changing, and corresponding behaviour can just be carried out with identical key information in key reception module 35 by needing to input Make, the network information stored in default network list is the network information of users to trust.
Second encrypting module 37 obtains predetermined hardware for encrypting based on the key data to initial hardware list List.
It wherein, may include a plurality of target terminal of systemic presupposition in the initial hardware list in second encrypting module 37 Information.The hardware address of implementor name and terminal in the target terminal information including terminal, is based on the key reception module 35 Received key information encrypts the initial hardware list, generates predetermined hardware list.When user needs to default hard When part list is operated (additions and deletions, which are looked into, to be changed), needing to input can just be carried out with identical key information in key reception module 35 Corresponding operation, the target terminal information stored in predetermined hardware list are the target terminal information i.e. data receiver of users to trust End message.
Number obtains module 38, for obtaining the hardware address and the unmatched secondary numerical value of predetermined hardware list.
Stopping modular 39, for stopping responding the data transfer instruction when the secondary numerical value is more than preset threshold.
It wherein, is more than one when number obtains module 38 to get hardware address and the unmatched secondary numerical value of predetermined hardware list After fixed numerical value, stopping modular 39 stops responding the data transfer instruction that the command reception module 31 receives, and makes terminal one Data transfer instruction cannot be executed in range of fixing time.
Specifically, sending a notification message to reserved terminal after stopping responding the data transfer instruction, having informed number According to may be by unauthorized theft, can start the clock value, can respond data transmission again after reaching the preset time Instruction.
In certain possible embodiment, hardware address and predetermined hardware list are got not when number obtains module 38 After matched secondary numerical value is more than certain numerical value, screen locking operation can also be performed, and could unlock after inputting preset password Using terminal.
It can be seen from the above, a kind of data transmission device provided in this embodiment, by preset-key information to default network List and predetermined hardware list are encrypted, and when receiving data transfer instruction, obtain the network letter of current connection network Breath obtains the hardware address of target terminal, determines when determining the network information including current connection network in default network list When including the hardware address of target terminal in predetermined hardware address, send data in target terminal, and in predetermined hardware When the hardware address of address and target terminal mismatches number more than certain threshold value, data transfer instruction is closed, by network The double verification of the hardware address of information and target terminal, it is ensured that the safety of data transmission, and in the hard of target terminal When part address continuously mismatches, data transfer instruction is closed, solves the easily stolen the case where taking of data in data transmission procedure, To promote the safety of user data.
The embodiment of the present invention also provides a kind of terminal, as shown in fig. 6, the terminal 400 may include have one or one with Memory 401, sensor 402, input unit 403, the display unit 404, network module of upper computer readable storage medium 405, the components such as the processor 406 of processing core are included one or more than one.It will be understood by those skilled in the art that figure The restriction of the not structure paired terminal of terminal structure shown in 6 may include than illustrating more or fewer components, or combination Certain components or different component layouts.
Memory 401 can be used for storing application program and data.It include that can hold in the application program that memory 401 stores Line code.Application program can form various functional modules.Processor 406 is stored in the application journey of memory 401 by operation Sequence, thereby executing various function application and data processing.In addition, memory 401 may include high-speed random access memory, It can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited Memory device.Correspondingly, memory 401 can also include Memory Controller, right to provide processor 406 and input unit 403 The access of memory 401.
Terminal may also include at least one sensor 402, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or back when terminal is moved in one's ear Light.As a kind of motion sensor, gravity accelerometer can detect (generally three axis) acceleration in all directions Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Input unit 403 can be used for receiving number, character information or the user's characteristic information (such as fingerprint) of input, and Generate keyboard related with user setting and function control, mouse, operating stick, optics or trackball signal input.Specifically Ground, in a specific embodiment, input unit 403 may include touch sensitive surface and other input equipments.Touch sensitive surface, Referred to as touch display screen or Trackpad, collect user on it or nearby touch operation (such as user using finger, touching The operations of any suitable object or attachment on touch sensitive surface or near touch sensitive surface such as pen), and according to preset Formula drives corresponding attachment device.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller. Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, transmit a signal to touch Controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processing Device 406, and order that processor 406 is sent can be received and executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray And the multiple types such as surface acoustic wave realize touch sensitive surface.In addition to touch sensitive surface, input unit 403 can also include other inputs Equipment.Specifically, other input equipments can include but is not limited to physical keyboard, function key (such as volume control button, switch Key etc.), fingerprint recognition mould group, trace ball, mouse, one of operating stick etc. or a variety of.
Display unit 404 can be used for showing information input by user or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.Display Unit 404 may include display panel.Optionally, can using liquid crystal display (LCD, Liquid Crystal Display), The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further , touch sensitive surface can cover display panel, after touch sensitive surface detects touch operation on it or nearby, send processing to Device 406 is followed by subsequent processing device 406 and is provided on a display panel accordingly according to the type of touch event to determine the type of touch event Visual output.Although touch sensitive surface and display panel are to realize input and input as two independent components in Fig. 6 Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realizes and outputs and inputs function.
Connection cable network and wireless network may be implemented in network module 405, is networking component of the work in link layer, Be in local area network connect terminal and transmission medium interface, the physical connection being not only able to achieve between local network transport medium and Electric signal matching, further relates to the sending and receiving of frame, the encapsulation of frame and opening, medium access control, the coding of data and decoding And function of data buffer storage etc..
Processor 406 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the application program being stored in memory 401, and call the data being stored in memory 401, execute The various functions and processing data of terminal, to carry out integral monitoring to terminal.Optionally, processor 406 may include one or Multiple processing cores;Preferably, processor 406 can integrate application processor and modem processor, wherein application processor Main processing operation system, user interface and application program etc..
Although being not shown in Fig. 6, terminal can also include camera, bluetooth module, power supply etc., and details are not described herein.
Specifically in the present embodiment, the processor 406 in terminal can be according to following instruction, will be one or more The corresponding executable code of the process of application program is loaded into memory 401, and is run by processor 406 and be stored in storage Application program in device 401, to realize various functions:
It is executed by processor 406 and receives data transfer instruction.
The network information for obtaining current connection network is executed by network module 405.
When judging that the network information is matched with the default network list in memory 401 by the execution of processor 406, Obtain the hardware address of target terminal.
It, will when judging predetermined hardware list match in the hardware address and memory 401 by the execution of processor 406 Data are transmitted in the target terminal.
The key information for receiving user's input can also be performed before executing reception data transfer instruction in processor 406, Initial network list is encrypted based on the key information, obtains default network list, and this is preset into network list storage In memory 401, initial hardware list is encrypted based on the key information, obtains predetermined hardware list, and this is pre- If hardware list is stored in memory 401.
Processor 406 can also include: described when judging after executing the network information for obtaining current connection network When the network information and default network list mismatch, network module 405 is closed, and encrypt to the network module 405.
Processor 406 may include: acquisition network when execution judges that the network information is matched with default network list Network hardware addresses in information, whether include the network hardware addresses, if sentencing if judging to preset in memory 401 in network list Presetting in network list in disconnected memory 401 out includes the network hardware addresses, then is determined as the network information and default network List match.
Processor 406 execute obtain target terminal hardware address after, can also be performed obtain the hardware address with The unmatched secondary numerical value of predetermined hardware list in memory 401 stops responding the data when the secondary numerical value is more than preset threshold Transmission instruction.
Since the terminal can execute any data transmission method provided by inventive embodiments, it is thereby achieved that Beneficial effect achieved by any data transmission method provided by inventive embodiments is detailed in the embodiment of front, herein It repeats no more.
When it is implemented, above each unit can be used as independent entity to realize, any combination can also be carried out, is made It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not It repeats again.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the detailed description above with respect to data transmission method, details are not described herein again.
Data transmission method, device and terminal provided in an embodiment of the present invention are for example mobile phone, tablet computer, palm electricity Brain (PDA, Personal Digital Assistant) etc., the terminal, data transmission device and data transmission method belong to Same design can run either offer method in the data transmission method embodiment, tool on the data transmission device Body realizes that process is detailed in the data transmission method embodiment, and details are not described herein again.
It should be noted that this field common test personnel are understood that reality for the data transmission method of the invention The all or part of the process of existing data transmission method of the embodiment of the present invention, be can be controlled by computer program it is relevant hard Part is completed, which can be stored in a computer-readable storage medium, is such as stored in the memory of terminal, And executed by least one processor in the terminal, it in the process of implementation may include such as the embodiment of the data transmission method Process.Wherein, which can be magnetic disk, CD, read-only memory (ROM, Read Only Memory), arbitrary access note Recall body (RAM, Random Access Memory) etc..
For the data transmission device of the embodiment of the present invention, each functional module be can integrate in a processing chip In, it is also possible to modules and physically exists alone, can also be integrated in two or more modules in a module.It is above-mentioned Integrated module both can take the form of hardware realization, can also be realized in the form of software function module.This is integrated If module is realized and when sold or used as an independent product in the form of software function module, also can store at one In computer-readable storage medium, which is for example read-only memory, disk or CD etc..
A kind of data transmission method, device and terminal is provided for the embodiments of the invention above to be described in detail, Used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only used In facilitating the understanding of the method and its core concept of the invention;Meanwhile for those skilled in the art, think of according to the present invention Think, there will be changes in the specific implementation manner and application range, is to sum up somebody's turn to do, and the content of the present specification should not be construed as to this The limitation of invention.

Claims (9)

1. a kind of data transmission method characterized by comprising
Receive data transfer instruction;
Obtain the network information of current connection network;
When judging that the network information is matched with default network list, the hardware address of target terminal is obtained;
When judging the hardware address and predetermined hardware list match, send data in the target terminal;
When judging that the hardware address and predetermined hardware list mismatch, the hardware address and predetermined hardware list are obtained Unmatched secondary numerical value stops responding the data transfer instruction when the secondary numerical value is more than preset threshold;
Start timing after stopping responding the data transfer instruction, responds the data again after reaching preset time value and pass Defeated instruction, and send a notification message to reserved terminal, to inform that data can be by the message of unauthorized theft to the reserved terminal;Or Person, control executes screen locking operation after stopping responding the data transfer instruction, and unlock is executed when receiving preset password Operation is to restore to use.
2. data transmission method as described in claim 1, which is characterized in that the step of the reception data transfer instruction it Before, further includes:
Receive the key information of user's input;
Initial network list is encrypted based on the key information, obtains default network list;
Initial hardware list is encrypted based on the key information, obtains predetermined hardware list.
3. data transmission method as claimed in claim 2, which is characterized in that the network information of the current connection network of acquisition The step of after, further includes:
When judging that the network information and default network list mismatch, network module is closed, and to the network module It is encrypted.
4. data transmission method as claimed any one in claims 1 to 3, which is characterized in that described to judge the network The step of information is matched with default network list, comprising:
Obtain the network hardware addresses in the network information;
Judge in default network list whether to include the network hardware addresses;
If judging, in default network list include the network hardware addresses, is determined as the network information and default network List match.
5. a kind of data transmission device characterized by comprising
Command reception module, for receiving data transmission instruction;
Network obtains module, for obtaining the network information of current connection network;
Address acquisition module, for obtaining target terminal when judging that the network information is matched with default network list Hardware address;
Transmission module, for sending data to the mesh when judging the hardware address and predetermined hardware list match It marks in terminal;
Number obtains module, for obtaining the hardware when judging that the hardware address and predetermined hardware list mismatch Address and the unmatched secondary numerical value of predetermined hardware list;
Stopping modular, for stopping responding the data transfer instruction when the secondary numerical value is more than preset threshold;Stopping ringing Start timing after answering the data transfer instruction, responds the data transfer instruction again after reaching preset time value, concurrently Send notification message to reserved terminal, to inform that data can be by the message of unauthorized theft to the reserved terminal;Alternatively, stopping ringing It answers control after the data transfer instruction to execute screen locking operation, and executes unlock operation when receiving preset password to restore to make With.
6. data transmission device as claimed in claim 5, which is characterized in that described device further include:
Key reception module, for receiving the key information of user's input;
First encrypting module obtains default network list for encrypting based on the key information to initial network list;
Second encrypting module obtains predetermined hardware list for encrypting based on the key information to initial hardware list.
7. data transmission device as claimed in claim 6, which is characterized in that described device further include:
Network encryption module, for closing network module when judging that the network information and default network list mismatch, And the network module is encrypted.
8. a kind of terminal characterized by comprising
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as claim 1 to right It is required that 4 described in any item data transmission methods.
9. a kind of computer readable storage medium, is stored with computer program, wherein the computer program makes computer Execute such as the described in any item methods of Claims 1-4.
CN201611089009.XA 2016-11-30 2016-11-30 A kind of data transmission method, device and terminal Expired - Fee Related CN106534157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611089009.XA CN106534157B (en) 2016-11-30 2016-11-30 A kind of data transmission method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611089009.XA CN106534157B (en) 2016-11-30 2016-11-30 A kind of data transmission method, device and terminal

Publications (2)

Publication Number Publication Date
CN106534157A CN106534157A (en) 2017-03-22
CN106534157B true CN106534157B (en) 2019-08-23

Family

ID=58354524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611089009.XA Expired - Fee Related CN106534157B (en) 2016-11-30 2016-11-30 A kind of data transmission method, device and terminal

Country Status (1)

Country Link
CN (1) CN106534157B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246232A (en) * 2018-09-30 2019-01-18 西安万像电子科技有限公司 Data transmission method, system and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003051857A (en) * 2001-08-06 2003-02-21 Nec Corp Data communication system, data communication terminal and data communication method used by the terminal, and its program
JP4613094B2 (en) * 2005-05-13 2011-01-12 パナソニック株式会社 Communication terminal and communication method
US9118699B2 (en) * 2009-01-26 2015-08-25 Qualcomm Incorporated Communications methods and apparatus for use in communicating with communications peers
CN107622026B (en) * 2012-11-22 2021-12-03 华为终端有限公司 Data transmission method and equipment
CN103457991B (en) * 2013-05-29 2017-03-15 北京奇虎科技有限公司 A kind of terminal safety protection method and system
US9432357B2 (en) * 2013-08-28 2016-08-30 Chung Jong Lee Computer network security management system and method
CN108183972B (en) * 2014-11-19 2019-08-30 Oppo广东移动通信有限公司 Document handling method and terminal
CN104883294A (en) * 2015-05-28 2015-09-02 魅族科技(中国)有限公司 Data transmission control method and device
CN105323244B (en) * 2015-09-22 2019-02-22 小米科技有限责任公司 Network Recognition method and apparatus

Also Published As

Publication number Publication date
CN106534157A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
US11057378B2 (en) Device and method of setting or removing security on content
CN105848134B (en) Virtual SIM card management device, communication terminal, access control method and management method
CN103699825B (en) Display apparatus and method for operating the same
CN106778130B (en) Message display method, display device and mobile terminal
CN104933342B (en) A kind of picture inspection method and mobile terminal
WO2017084288A1 (en) Method and device for verifying identity
EP3337209B1 (en) Method, apparatus and computer readable storage medium for secure context-aware password management
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
KR20150046766A (en) Unlocking process mehtod, apparatus and device for terminal
KR102224553B1 (en) Key storage method, key management method and device
CN109923544A (en) Method for authenticating and electronic equipment
CN107040540B (en) Cloud privacy data display method and device, server and mobile terminal
CN106709383A (en) Communication message protection method and device and mobile terminal
WO2020233218A1 (en) Information encryption method, information decryption method, and terminal
CN110417543A (en) A kind of data ciphering method, device and storage medium
CN110035183B (en) Information sharing method and terminal
CN108985034A (en) A kind of unlocking method and terminal device
CN107256353A (en) Possesses the display methods of privacy protection function
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN110084009A (en) Digital unlocking method, device, storage medium and mobile terminal
CN106534157B (en) A kind of data transmission method, device and terminal
CN109740312A (en) A kind of application control method and terminal device
JP6201835B2 (en) Information processing apparatus, information processing method, and computer program
CN108540645A (en) A kind of operating method and mobile terminal of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190823