CN106534157B - A kind of data transmission method, device and terminal - Google Patents
A kind of data transmission method, device and terminal Download PDFInfo
- Publication number
- CN106534157B CN106534157B CN201611089009.XA CN201611089009A CN106534157B CN 106534157 B CN106534157 B CN 106534157B CN 201611089009 A CN201611089009 A CN 201611089009A CN 106534157 B CN106534157 B CN 106534157B
- Authority
- CN
- China
- Prior art keywords
- network
- list
- hardware
- data
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 82
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000012546 transfer Methods 0.000 claims abstract description 41
- 238000004590 computer program Methods 0.000 claims description 3
- 238000007792 addition Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 238000012545 processing Methods 0.000 description 9
- 238000012217 deletion Methods 0.000 description 8
- 230000037430 deletion Effects 0.000 description 8
- 239000002609 medium Substances 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000009885 systemic effect Effects 0.000 description 4
- 238000013501 data transformation Methods 0.000 description 3
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 239000006163 transport media Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Abstract
The present invention provides a kind of data transmission method, comprising: receives data transfer instruction;Obtain the network information of current connection network;When judging that the network information is matched with default network list, the hardware address of target terminal is obtained;When judging the hardware address and predetermined hardware list match, send data in the target terminal.The present invention passes through when receiving data transfer instruction, whether the hardware address for judging current network and target terminal is preset network and preset hardware address, when being all default, it sends data in target terminal, it solves the easily stolen the case where taking of data in data transmission procedure, is greatly improved the safety of user data.The invention further relates to a kind of data transmission device and terminals.
Description
Technical field
The present invention relates to terminal security technical field more particularly to a kind of data transmission methods, device and terminal.
Background technique
With the rapid development of terminal and universal, the data transmission of terminal is also more and more convenient, even if people are not same
A place can also connect network by terminal and mutually be transmitted the data such as photo, document.
In the data transmission of terminal, if the network of connection cannot ensure safety, in transmission, it is easy to by not
Method one's share of expenses for a joint undertaking steals data.And in my non-operation of terminal, the data of terminal can be transmitted to strange terminal by my non-user
On to steal the data of user, bring great loss to user, therefore, be easy to cause secure user data low.
Summary of the invention
The embodiment of the present invention provides a kind of data transmission method, device and terminal, solves that secure user data is low to ask
Topic.
The embodiment of the present invention the following technical schemes are provided:
A kind of data transmission method, comprising:
Receive data transfer instruction;
Obtain the network information of current connection network;
When judging that the network information is matched with default network list, the hardware address of target terminal is obtained;
When judging the hardware address and predetermined hardware list match, send data in the target terminal.
The embodiment of the present invention also the following technical schemes are provided:
A kind of data transmission device, comprising:
Command reception module, for receiving data transmission instruction;
Network obtains module, for obtaining the network information of current connection network;
Address acquisition module, for obtaining target terminal when judging that the network information is matched with default network list
Hardware address;
Transmission module, for sending data to the mesh when judging the hardware address and predetermined hardware list match
It marks in terminal.
The embodiment of the present invention also the following technical schemes are provided:
A kind of terminal, comprising:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes provided in an embodiment of the present invention
A kind of data transmission method.
A kind of data transmission method, device and terminal provided in this embodiment, by when receiving data transfer instruction,
Whether the hardware address for judging current network and target terminal is preset network and preset hardware address, when being all default
When, it sends data in target terminal, solves the easily stolen the case where taking of data in data transmission procedure, to promote use
The safety of user data.
Detailed description of the invention
With reference to the accompanying drawing, by the way that detailed description of specific embodiments of the present invention, technical solution of the present invention will be made
And other beneficial effects are apparent.
Fig. 1 is the flow diagram of data transmission method provided in an embodiment of the present invention.
Fig. 2 is the time diagram of data transmission method provided in an embodiment of the present invention.
Fig. 3 is another flow diagram of data transmission method provided in an embodiment of the present invention.
Fig. 4 is the module diagram of data transmission device provided in an embodiment of the present invention.
Fig. 5 is another module diagram of data transmission device provided in an embodiment of the present invention.
Fig. 6 is terminal structure schematic diagram provided in an embodiment of the present invention.
Specific embodiment
Schema is please referred to, wherein identical component symbol represents identical component, the principle of the present invention is to implement one
It is illustrated in computing environment appropriate.The following description be based on illustrated by the specific embodiment of the invention, should not be by
It is considered as the limitation present invention other specific embodiments not detailed herein.
Term as used herein " module " can regard the software object to execute in the arithmetic system as.It is somebody's turn to do herein not
Same component, module, engine and service can be regarded as the objective for implementation in the arithmetic system.And the device and method being somebody's turn to do herein is excellent
Being implemented in the form of software for choosing, can also be implemented, within that scope of the present invention on hardware certainly.
Concrete analysis explanation is carried out below.
In the present embodiment, it will be described from the angle of data transmission device, which can specifically collect
At in terminal, such as mobile phone, tablet computer, palm PC (PDA, Personal Digital Assistant) etc..
Referring to Fig. 1, Fig. 1 is the flow diagram of data transmission method provided in an embodiment of the present invention.Specifically, should
Method includes:
In step s101, data transfer instruction is received.
Wherein, data transfer instruction instruction sends data to target terminal.The data can be picture, audio, text
Files etc..The target terminal refers to receiving the terminal of data.For example there is data-transformation facility in user's using terminal
Application send data in target terminal, be judged to receiving data transfer instruction.
In step s 102, the network information of current connection network is obtained.
Wherein, which is information transmission, receives, shared virtual platform, by it each point, face, body information
It is linked together, to realize the shared of these resources.The network includes local area network, Metropolitan Area Network (MAN) and wide area network.Network letter
Breath can refer to the service set (SSID, Service Set Identifier) and network hardware addresses of current connection network
(MAC, Media Access Control).The corresponding network hardware addresses of each different network are different.
Based on this, service set and network hardware addresses that terminal currently connects network are obtained.
In step s 103, when judging that the network information is matched with default network list, the hardware of target terminal is obtained
Address.
It is understood that carrying out data by the network in user if the network of terminal connection is insecure network
When transmission, data are easy to illegally be intercepted by third party.Therefore user can preset the network information trusty, this is credible
Appoint network trust system in default network list.
It wherein, is the trusted network information of user preset addition in the default network list.The default network list can
It include the corresponding service set of each network and net in each historic network information to include a plurality of historic network information
Network hardware address.The hardware address of the target terminal is the hardware address of data receiving terminal, the hardware address of each terminal
It is unique when being factory.
In certain possible embodiment, judge that the network information is matched with default network list, comprising:
(1) network hardware addresses in the network information are obtained.
(2) judge in default network list whether to include network hardware addresses.
Wherein, due to network hardware addresses be it is unique, can be to avoid illegal part using network hardware addresses as Rule of judgment
Son copys the case where network information connects user to steal user data.
Further, if judging the network hardware addresses including the target terminal in default network list, step is executed
Suddenly (3);If judge do not include in default network list the target terminal network hardware addresses, illustrate the net currently connected
Network is unsafe network, forbids sending data to target terminal.
(3) it is determined as that the network information is matched with default network list.
Wherein, include the network hardware addresses in the default network list, illustrate that the network currently connected is user preset
Network, be trusted network, then be determined as that the network information is matched with default network list.
In step S104, when judging hardware address and predetermined hardware list match, the target is sent data to
In terminal.
Wherein, the information that the data receiving terminal trusty of user preset addition is stored in the predetermined hardware list, can
To include that a plurality of historical data receives end message, every historical data receives in the information of terminal include the implementor name of terminal with
And the hardware address of terminal.
Further, if judging the hardware including the i.e. current data receiving terminal of target terminal in predetermined hardware list
Address then illustrates that the target terminal of currently transmitted data is the data receiving terminal of safety, and execution sends data to the target
In terminal.If judge do not include in predetermined hardware list the i.e. current data receiving terminal of target terminal hardware address,
The target terminal for illustrating currently transmitted data is unsafe data receiving terminal, forbids for the data being transmitted to the target terminal
In.
Wherein, in order to preferably describe the present embodiment, referring to Fig. 2, Fig. 2 is data provided in an embodiment of the present invention transmission
The time diagram of method.As shown in Fig. 2, terminal A is to send terminal, terminal B is target terminal (i.e. data receiving terminal), net
Network C may include cable network and wireless network.User's input data transmission request in terminal A, the data transfer request
Data are transferred in terminal B by instruction from terminal A, and terminal A obtains the network information of the network C currently connected, the network information
It can be the service set and network hardware addresses of network C.When terminal A judges in default network list to include network C
Network hardware addresses when, execute send feedback request instruct to terminal B, the feedback request to instruction terminal B by hardware
Location feeds back to terminal A.Terminal B feeds back hardware address to terminal A, when terminal A judges the hard of terminal B feedback according to feedback request
When part address and predetermined hardware list match, the operation for carrying out data to be transmitted to terminal B is executed.
It can be seen from the above, a kind of data transmission method provided in this embodiment, by when receiving data transfer instruction,
The network information for obtaining current connection network obtains the hardware of target terminal when determining that the network information is the default network information
Address is sent data in target terminal, when being determined as that the hardware address is predetermined hardware address by network and target
The double verification of the hardware address of terminal, it is ensured that the safety of data transmission solves data in data transmission procedure and is easy quilt
The case where stealing, to promote the safety of user data.
Citing, is described in further detail by the method according to described in above-described embodiment below.
Referring to Fig. 3, Fig. 3 is another flow diagram of data transmission method provided in an embodiment of the present invention.
Specifically, this method comprises:
In step s 201, the key information of user's input is received.
Wherein, which is the password of user's input, can be the combination of character string, or characteristics of human body's letter
Breath, such as fingerprint, iris information.
In step S202, initial network list is encrypted based on key information, obtains default network list.
It wherein, may include a plurality of network information of systemic presupposition in the initial network list.Include in the network information
The service set and network hardware addresses of network.Key information based on user's input adds the initial network list
It is close, generate default network list.When user, which needs to look into the progress additions and deletions of default network list, to be changed, need to input preset key
Information can just carry out corresponding operation, otherwise, forbid operating default network list, store in default network list
The network information is the network information of users to trust.
Table 1 presets network list
Number | SSID | MAC Address |
1 | Network 1 | 47:CD:2A:23:BC:25 |
2 | Network 2 | 40:EF:2A:31:CD:A6 |
3 | Network 3 | 22:3A:1A:34:2A:B7 |
For example, please referring to table 1, table 1 is default network list.Include 3 web-based history letters in current preset network list
Breath, title, that is, SSID entitled " network 1 ", " network 2 ".The corresponding network hardware of " network 3 " and 3 historic network informations
Location, when user to this preset network list carry out additions and deletions look into change when, need to input key information.
For example, taking the mobile phone as an example, mobile phone receives the finger print information of user's input as key information, is based on the finger print information
Initial network list is encrypted, default network list is generated.As shown in table 1, when user needs to preset network list to this
When being operated (additions and deletions, which are looked into, to be changed), mobile phone will pop up " please input password " frame, the finger print information of acquisition active user's input.Currently
When the finger print information of user's input matches consistent with the finger print information that mobile phone stores, user is allowed to grasp default network list
Make, user is otherwise forbidden to operate default network list.
In step S203, initial hardware list is encrypted based on key information, obtains predetermined hardware list.
It wherein, may include a plurality of target terminal information of systemic presupposition, target terminal letter in the initial hardware list
The hardware address of implementor name and terminal in breath including terminal.Key information based on user's input is to the initial hardware list
It is encrypted, generates predetermined hardware list.When user needs to operate predetermined hardware list (additions and deletions, which are looked into, to be changed), need defeated
Corresponding operation can just be carried out by entering preset key information, otherwise, forbid operating the predetermined hardware list, be preset hard
The target terminal information stored in part list is the target terminal information i.e. data receiving terminal information of users to trust.
2 predetermined hardware list of table
Number | Implementor name | MAC Address |
1 | Equipment 1 | 33:BA:3A:23:CD:E9 |
2 | Equipment 2 | 34:BC:4A:24:CE:D8 |
3 | Equipment 3 | 35:BD:5A:25:BC:C7 |
For example, please referring to table 2, table 2 is predetermined hardware list, includes 3 historical Device letters in current preset hardware list
Breath, equipment entitled " equipment 1 ", " equipment 2 ".The hardware address of " equipment 3 " and 3 historical device informations, when user is pre- to this
It is looked into when changing if hardware list carries out additions and deletions, needs to input corresponding key information.
For example, taking the mobile phone as an example, mobile phone can receive the finger print information of user's input as key information, be based on the fingerprint
Information encrypts initial hardware list, generates predetermined hardware list.As shown in table 2, when user needs to the predetermined hardware
When list is operated (additions and deletions, which are looked into, to be changed), mobile phone will pop up " please input password " frame, and acquire the fingerprint letter of active user's input
Breath.When the finger print information of active user's input matches consistent with the finger print information that mobile phone stores, user is allowed to arrange predetermined hardware
Table is operated.
It, can be with it is contemplated that encrypted by key information to default network list and predetermined hardware list
Prevent undesirable's malice from adding network trusty or target terminal trusty.
In step S204, data transfer instruction is received.
Wherein, data transfer instruction instruction sends data to target terminal, which can be picture, audio, text
Files etc..The target terminal refers to receiving the terminal of data.For example there is data-transformation facility in user's using terminal
Application send data in target terminal, be judged to receiving data transfer instruction.
For example, user in mobile phone by using the application with data-transformation facility, execute and file be sent to some
In target terminal, that is, it is considered as mobile phone and receives data transfer instruction.
In step S205, the network information of current connection network is obtained.
Wherein, the acquisition currently connect network the network information can for obtain the service set of current connection network with
And network hardware addresses, the network can be cable network or wireless network (wireless network).
For example, obtaining the service set and net of the network currently connected when mobile phone receives data transfer instruction
Network hardware address, for example the network that currently connects is " network 1 ", corresponding network hardware addresses be " 47:CD:2A:23:BC:
25”。
In step S206, judge whether the network information matches with default network list.
Wherein, if judging, the network information is matched with default network list, thens follow the steps S207;If judging, network is believed
Breath is mismatched with default network list, thens follow the steps S210.
Specifically, this judges the network information includes: with whether default network list matches
(1) network hardware addresses in the network information are obtained.
Wherein, due to including the current service set and network hardware addresses for connecting network in the network information.It needs
It is noted that service set is recursive, but network hardware addresses are fixed, are that can not change under normal circumstances
Become, therefore by obtaining current network hardware address, it can the same network of effective Differentiated Services set identifier.
For example, the network hardware addresses that mobile phone obtains current connection network are " 47:CD:2A:23:BC:25 ".
(2) judge in default network list whether to include network hardware addresses.
Wherein, due to network hardware addresses be it is unique, can be to avoid illegal part using network hardware addresses as Rule of judgment
Son copys the case where network information steals user data.
Further, if judging, in default network list include the network hardware addresses, thens follow the steps (3);If sentencing
Do not include the network hardware addresses in disconnected network list default out, thens follow the steps (4).
For example, whether in mobile phone judging to preset shown in table 1 in network list includes that the current network for connecting network is hard
Part address " 47:CD:2A:23:BC:25 ".After comparison, it is found that in default network list include the network hardware addresses, then hold
Row step (3).
(3) it is determined as that the network information is matched with default network list.
(4) it is determined as that the network information and default network list mismatch.
In step S207, the hardware address of target terminal is obtained.
Wherein, the hardware address of the target terminal is the hardware address of data receiving terminal, the hardware address of each terminal
It is unique when being all factory.
Specifically, the hardware address of the acquisition target terminal includes:
(1) feedback request is sent to target terminal.
Wherein, which feeds back hardware address to request target terminal.It can not directly be obtained due to sending terminal
The target terminal i.e. implementor name of data receiving terminal and hardware address are taken, therefore needs to send feedback request.
For example, obtaining target mobile phones, that is, data receiver cellphone information in mobile phone, sent to the data receiver mobile phone
Feedback request, data receiver mobile phone feed back the hardware address of cell phone apparatus name and mobile phone after receiving feedback request
Give transmission mobile phone.
(2) hardware address of target terminal feedback is received.
In step S208, judge whether hardware address matches with predetermined hardware list.
Wherein, if judging hardware address and predetermined hardware list match, S209 is thened follow the steps;If with judging hardware
Location and predetermined hardware list mismatch, and then follow the steps S211.
In a kind of possible embodiment, when transmission terminal does not receive the hardware address of target terminal feedback, then directly
It connects and is determined as that hardware address and predetermined hardware list mismatch, execute step S211.In alternatively possible embodiment, hair
Make arrangements for his funeral end receive target terminal feedback hardware address when, whether including the hardware received judge in predetermined hardware list
Location.If judging to include the hardware address received in predetermined hardware list, it is determined as that hardware address and predetermined hardware arrange
Table matching illustrates that target terminal i.e. data receiving terminal is the terminal of users to trust, executes step S209.If judging default hard
Do not include the hardware address received in part list, is then determined as that hardware address and predetermined hardware list mismatch, illustrates mesh
Mark terminal, that is, data receiving terminal is not the terminal of users to trust, thens follow the steps S211.
For example, mobile phone does not receive target mobile phones after sending feedback request to target mobile phones, that is, data receiver mobile phone
The hardware address of feedback is then directly determined as that hardware address and predetermined hardware list mismatch.If receiving target mobile phones feedback
Hardware address such as " 33:BA:3A:23:CD:E9 " judge in predetermined hardware list shown in table 2 including the target mobile phones
Hardware address is then determined as hardware address and predetermined hardware list match.
In step S209, send data in target terminal.
Wherein, when terminal determines that the network currently connected is trusted network and target terminal is terminal trusty
When, response data transmission instruction is sent data in target terminal.
For example, mobile phone has determined that the network information of current connection network is trusted network and target mobile phones are trusted
After mobile phone, allow for the data such as picture, audio to be sent in target mobile phones.
In step S210, network module is closed, and encrypt to network module.
It should be noted that if judging that the network information and default network list mismatch, then illustrate the net currently connected
Network is insecure network.If carried out data transmission using the insecure network, it is likely that cause data by unauthorized theft.
The network module of terminal is closed when the network for judging currently to connect is insecure network based on this, even if eventually
End can not connect network, and encrypt to the network module.After encryption, user needs to carry out net using the network module
When network connects, preset solution confidential information need to be inputted, which can be characteristics of human body's information or character string information.
In step S211, record hardware address and the unmatched secondary numerical value of predetermined hardware list.
Being readily apparent that is, when the hardware address of target terminal and predetermined hardware list mismatch, it is likely to illegal part
The data of user are sent in un-trusted target terminal by son using terminal is sent.
Specifically, after the record hardware address and the unmatched secondary numerical value of predetermined hardware list, further includes:
(1) hardware address and the unmatched secondary numerical value of predetermined hardware list are obtained.
(2) when secondary numerical value is more than preset threshold, stop response data transmission instruction.
Wherein, after getting hardware address and the unmatched secondary numerical value of predetermined hardware list is more than certain numerical value, stop
The data transfer instruction is only responded, makes terminal that cannot execute data transfer instruction within the scope of certain time.
Specifically, can start the clock value, preset reaching after stopping responding the data transfer instruction
The data transfer instruction can be responded after time again, and is sent a notification message to reserved terminal, has informed that data may be non-
Method is stolen.
It is super with the unmatched secondary numerical value of predetermined hardware list when getting hardware address in certain possible embodiment
After crossing certain numerical value, screen locking operation can be executed, and using terminal could be unlocked after inputting preset password.
For example, being arranged when getting the target mobile phones i.e. hardware address of data receiver mobile phone with predetermined hardware in mobile phone
The unmatched number of table is more than certain number, when such as 5 times, it is likely that is carried out data transmission for undesirable using mobile phone, by hand
Machine screen locking, and mobile phone can be just continued to use after inputting correct password.
It can be seen from the above, a kind of data transmission method provided in this embodiment, by preset-key information to default network
List and predetermined hardware list are encrypted, and when receiving data transfer instruction, obtain the network letter of current connection network
Breath obtains the hardware address of target terminal, determines when determining the network information including current connection network in default network list
When including the hardware address of target terminal in predetermined hardware address, send data in target terminal.And in predetermined hardware
When the hardware address of address and target terminal mismatches number more than certain threshold value, data transfer instruction is closed, by network
The double verification of the hardware address of information and target terminal, it is ensured that the safety of data transmission, and in the hard of target terminal
When part address continuously mismatches, data transfer instruction is closed, solves the easily stolen the case where taking of data in data transmission procedure,
To promote the safety of user data.
For convenient for better implementation data transmission method provided in an embodiment of the present invention, the embodiment of the present invention also provides one kind
Device based on above-mentioned data transmission method.Wherein the meaning of noun is identical with above-mentioned data transmission method, and specific implementation is thin
Section can be with reference to the explanation in embodiment of the method.
Referring to Fig. 4, Fig. 4 is the module diagram of data transmission device provided in an embodiment of the present invention.Specifically, should
Data transmission device 300, comprising: command reception module 31, network obtain module 32, address acquisition module 33 and transmission mould
Block 34.
The command reception module 31, for receiving data transmission instruction.
Wherein, which refers to receiving the terminal of data, for example has data transmission in user's using terminal
The application of function is sent data in target terminal, is determined as that the command reception module 31 receives data transfer instruction.
The network obtains module 32, for obtaining the network information of current connection network.
Wherein, the network information which obtains in module 32 refers to that the service set of current connection network and network are hard
Part address, the corresponding network hardware addresses of each different network are different.
Wherein, what is connect with network acquisition module 32 further includes network encryption module, the network encryption module, for working as
When judging that the network information and default network list mismatch, network module is closed, and encrypt to the network module.
The address acquisition module 33, for obtaining target when judging that the network information is matched with default network list
The hardware address of terminal.
It wherein, is the trusted network information of user preset addition in the default network list, which can
It include the corresponding service set of the network and network in each historic network information to include a plurality of historic network information
Hardware address.The hardware address of the target terminal is the hardware address of data receiving terminal, and the hardware address of each terminal is
It is unique when factory.
For example, the address acquisition module 33 can judge the network in the following way in a kind of possible embodiment
Information is matched with default network list:
Obtain the network hardware addresses in the network information of current connection network, judge in default network list whether include
The network hardware addresses.When judging in default network list includes the network hardware addresses, be determined as the network information with
Default network list matching.
The transmission module 34, for sending data to when judging the hardware address and predetermined hardware list match
In the target terminal.
Wherein, which is the trusted target terminal information of user preset addition, may include a plurality of go through
History target terminal information includes the corresponding implementor name of history target terminal and hardware in each history target terminal information
Address.
Further, when the network for judging currently to connect is trusted network and target terminal is that trusted target is whole
When end, command adapted thereto receiving module 31 receives data transfer instruction, sends data in the target terminal.
Fig. 5 can be referred to together, and Fig. 5 is another module diagram of data transmission device provided in an embodiment of the present invention, should
Data transmission device 300 can also include:
Wherein, which can also include sending submodule 331 and receiving submodule 332.
Specifically, the sending submodule 331, for when judging that the network information is matched with default network list,
Feedback request is sent to target terminal, which feeds back hardware address to request target terminal.The receiving submodule
332, for receiving the hardware address of target terminal feedback.
Key reception module 35, for receiving the key information of user's input.
Wherein, the key information in the key reception module 35 can be the encrypted message of user preset.Key letter
Breath can be the combination of character string, or characteristics of human body's information, such as fingerprint, iris information.
First encrypting module 36 obtains default network for encrypting based on the key data to initial network list
List.
It wherein, may include a plurality of network letter of systemic presupposition in the initial network list in first encrypting module 36
Breath.Include the service set and network hardware addresses of network in the network information, is connect based on the key reception module 35
It receives key information to encrypt the initial network list, generates default network list.When user needs to arrange default network
Table carries out additions and deletions and looks into when changing, and corresponding behaviour can just be carried out with identical key information in key reception module 35 by needing to input
Make, the network information stored in default network list is the network information of users to trust.
Second encrypting module 37 obtains predetermined hardware for encrypting based on the key data to initial hardware list
List.
It wherein, may include a plurality of target terminal of systemic presupposition in the initial hardware list in second encrypting module 37
Information.The hardware address of implementor name and terminal in the target terminal information including terminal, is based on the key reception module 35
Received key information encrypts the initial hardware list, generates predetermined hardware list.When user needs to default hard
When part list is operated (additions and deletions, which are looked into, to be changed), needing to input can just be carried out with identical key information in key reception module 35
Corresponding operation, the target terminal information stored in predetermined hardware list are the target terminal information i.e. data receiver of users to trust
End message.
Number obtains module 38, for obtaining the hardware address and the unmatched secondary numerical value of predetermined hardware list.
Stopping modular 39, for stopping responding the data transfer instruction when the secondary numerical value is more than preset threshold.
It wherein, is more than one when number obtains module 38 to get hardware address and the unmatched secondary numerical value of predetermined hardware list
After fixed numerical value, stopping modular 39 stops responding the data transfer instruction that the command reception module 31 receives, and makes terminal one
Data transfer instruction cannot be executed in range of fixing time.
Specifically, sending a notification message to reserved terminal after stopping responding the data transfer instruction, having informed number
According to may be by unauthorized theft, can start the clock value, can respond data transmission again after reaching the preset time
Instruction.
In certain possible embodiment, hardware address and predetermined hardware list are got not when number obtains module 38
After matched secondary numerical value is more than certain numerical value, screen locking operation can also be performed, and could unlock after inputting preset password
Using terminal.
It can be seen from the above, a kind of data transmission device provided in this embodiment, by preset-key information to default network
List and predetermined hardware list are encrypted, and when receiving data transfer instruction, obtain the network letter of current connection network
Breath obtains the hardware address of target terminal, determines when determining the network information including current connection network in default network list
When including the hardware address of target terminal in predetermined hardware address, send data in target terminal, and in predetermined hardware
When the hardware address of address and target terminal mismatches number more than certain threshold value, data transfer instruction is closed, by network
The double verification of the hardware address of information and target terminal, it is ensured that the safety of data transmission, and in the hard of target terminal
When part address continuously mismatches, data transfer instruction is closed, solves the easily stolen the case where taking of data in data transmission procedure,
To promote the safety of user data.
The embodiment of the present invention also provides a kind of terminal, as shown in fig. 6, the terminal 400 may include have one or one with
Memory 401, sensor 402, input unit 403, the display unit 404, network module of upper computer readable storage medium
405, the components such as the processor 406 of processing core are included one or more than one.It will be understood by those skilled in the art that figure
The restriction of the not structure paired terminal of terminal structure shown in 6 may include than illustrating more or fewer components, or combination
Certain components or different component layouts.
Memory 401 can be used for storing application program and data.It include that can hold in the application program that memory 401 stores
Line code.Application program can form various functional modules.Processor 406 is stored in the application journey of memory 401 by operation
Sequence, thereby executing various function application and data processing.In addition, memory 401 may include high-speed random access memory,
It can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited
Memory device.Correspondingly, memory 401 can also include Memory Controller, right to provide processor 406 and input unit 403
The access of memory 401.
Terminal may also include at least one sensor 402, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or back when terminal is moved in one's ear
Light.As a kind of motion sensor, gravity accelerometer can detect (generally three axis) acceleration in all directions
Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Input unit 403 can be used for receiving number, character information or the user's characteristic information (such as fingerprint) of input, and
Generate keyboard related with user setting and function control, mouse, operating stick, optics or trackball signal input.Specifically
Ground, in a specific embodiment, input unit 403 may include touch sensitive surface and other input equipments.Touch sensitive surface,
Referred to as touch display screen or Trackpad, collect user on it or nearby touch operation (such as user using finger, touching
The operations of any suitable object or attachment on touch sensitive surface or near touch sensitive surface such as pen), and according to preset
Formula drives corresponding attachment device.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.
Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, transmit a signal to touch
Controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processing
Device 406, and order that processor 406 is sent can be received and executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray
And the multiple types such as surface acoustic wave realize touch sensitive surface.In addition to touch sensitive surface, input unit 403 can also include other inputs
Equipment.Specifically, other input equipments can include but is not limited to physical keyboard, function key (such as volume control button, switch
Key etc.), fingerprint recognition mould group, trace ball, mouse, one of operating stick etc. or a variety of.
Display unit 404 can be used for showing information input by user or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.Display
Unit 404 may include display panel.Optionally, can using liquid crystal display (LCD, Liquid Crystal Display),
The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further
, touch sensitive surface can cover display panel, after touch sensitive surface detects touch operation on it or nearby, send processing to
Device 406 is followed by subsequent processing device 406 and is provided on a display panel accordingly according to the type of touch event to determine the type of touch event
Visual output.Although touch sensitive surface and display panel are to realize input and input as two independent components in Fig. 6
Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realizes and outputs and inputs function.
Connection cable network and wireless network may be implemented in network module 405, is networking component of the work in link layer,
Be in local area network connect terminal and transmission medium interface, the physical connection being not only able to achieve between local network transport medium and
Electric signal matching, further relates to the sending and receiving of frame, the encapsulation of frame and opening, medium access control, the coding of data and decoding
And function of data buffer storage etc..
Processor 406 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the application program being stored in memory 401, and call the data being stored in memory 401, execute
The various functions and processing data of terminal, to carry out integral monitoring to terminal.Optionally, processor 406 may include one or
Multiple processing cores;Preferably, processor 406 can integrate application processor and modem processor, wherein application processor
Main processing operation system, user interface and application program etc..
Although being not shown in Fig. 6, terminal can also include camera, bluetooth module, power supply etc., and details are not described herein.
Specifically in the present embodiment, the processor 406 in terminal can be according to following instruction, will be one or more
The corresponding executable code of the process of application program is loaded into memory 401, and is run by processor 406 and be stored in storage
Application program in device 401, to realize various functions:
It is executed by processor 406 and receives data transfer instruction.
The network information for obtaining current connection network is executed by network module 405.
When judging that the network information is matched with the default network list in memory 401 by the execution of processor 406,
Obtain the hardware address of target terminal.
It, will when judging predetermined hardware list match in the hardware address and memory 401 by the execution of processor 406
Data are transmitted in the target terminal.
The key information for receiving user's input can also be performed before executing reception data transfer instruction in processor 406,
Initial network list is encrypted based on the key information, obtains default network list, and this is preset into network list storage
In memory 401, initial hardware list is encrypted based on the key information, obtains predetermined hardware list, and this is pre-
If hardware list is stored in memory 401.
Processor 406 can also include: described when judging after executing the network information for obtaining current connection network
When the network information and default network list mismatch, network module 405 is closed, and encrypt to the network module 405.
Processor 406 may include: acquisition network when execution judges that the network information is matched with default network list
Network hardware addresses in information, whether include the network hardware addresses, if sentencing if judging to preset in memory 401 in network list
Presetting in network list in disconnected memory 401 out includes the network hardware addresses, then is determined as the network information and default network
List match.
Processor 406 execute obtain target terminal hardware address after, can also be performed obtain the hardware address with
The unmatched secondary numerical value of predetermined hardware list in memory 401 stops responding the data when the secondary numerical value is more than preset threshold
Transmission instruction.
Since the terminal can execute any data transmission method provided by inventive embodiments, it is thereby achieved that
Beneficial effect achieved by any data transmission method provided by inventive embodiments is detailed in the embodiment of front, herein
It repeats no more.
When it is implemented, above each unit can be used as independent entity to realize, any combination can also be carried out, is made
It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not
It repeats again.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the detailed description above with respect to data transmission method, details are not described herein again.
Data transmission method, device and terminal provided in an embodiment of the present invention are for example mobile phone, tablet computer, palm electricity
Brain (PDA, Personal Digital Assistant) etc., the terminal, data transmission device and data transmission method belong to
Same design can run either offer method in the data transmission method embodiment, tool on the data transmission device
Body realizes that process is detailed in the data transmission method embodiment, and details are not described herein again.
It should be noted that this field common test personnel are understood that reality for the data transmission method of the invention
The all or part of the process of existing data transmission method of the embodiment of the present invention, be can be controlled by computer program it is relevant hard
Part is completed, which can be stored in a computer-readable storage medium, is such as stored in the memory of terminal,
And executed by least one processor in the terminal, it in the process of implementation may include such as the embodiment of the data transmission method
Process.Wherein, which can be magnetic disk, CD, read-only memory (ROM, Read Only Memory), arbitrary access note
Recall body (RAM, Random Access Memory) etc..
For the data transmission device of the embodiment of the present invention, each functional module be can integrate in a processing chip
In, it is also possible to modules and physically exists alone, can also be integrated in two or more modules in a module.It is above-mentioned
Integrated module both can take the form of hardware realization, can also be realized in the form of software function module.This is integrated
If module is realized and when sold or used as an independent product in the form of software function module, also can store at one
In computer-readable storage medium, which is for example read-only memory, disk or CD etc..
A kind of data transmission method, device and terminal is provided for the embodiments of the invention above to be described in detail,
Used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only used
In facilitating the understanding of the method and its core concept of the invention;Meanwhile for those skilled in the art, think of according to the present invention
Think, there will be changes in the specific implementation manner and application range, is to sum up somebody's turn to do, and the content of the present specification should not be construed as to this
The limitation of invention.
Claims (9)
1. a kind of data transmission method characterized by comprising
Receive data transfer instruction;
Obtain the network information of current connection network;
When judging that the network information is matched with default network list, the hardware address of target terminal is obtained;
When judging the hardware address and predetermined hardware list match, send data in the target terminal;
When judging that the hardware address and predetermined hardware list mismatch, the hardware address and predetermined hardware list are obtained
Unmatched secondary numerical value stops responding the data transfer instruction when the secondary numerical value is more than preset threshold;
Start timing after stopping responding the data transfer instruction, responds the data again after reaching preset time value and pass
Defeated instruction, and send a notification message to reserved terminal, to inform that data can be by the message of unauthorized theft to the reserved terminal;Or
Person, control executes screen locking operation after stopping responding the data transfer instruction, and unlock is executed when receiving preset password
Operation is to restore to use.
2. data transmission method as described in claim 1, which is characterized in that the step of the reception data transfer instruction it
Before, further includes:
Receive the key information of user's input;
Initial network list is encrypted based on the key information, obtains default network list;
Initial hardware list is encrypted based on the key information, obtains predetermined hardware list.
3. data transmission method as claimed in claim 2, which is characterized in that the network information of the current connection network of acquisition
The step of after, further includes:
When judging that the network information and default network list mismatch, network module is closed, and to the network module
It is encrypted.
4. data transmission method as claimed any one in claims 1 to 3, which is characterized in that described to judge the network
The step of information is matched with default network list, comprising:
Obtain the network hardware addresses in the network information;
Judge in default network list whether to include the network hardware addresses;
If judging, in default network list include the network hardware addresses, is determined as the network information and default network
List match.
5. a kind of data transmission device characterized by comprising
Command reception module, for receiving data transmission instruction;
Network obtains module, for obtaining the network information of current connection network;
Address acquisition module, for obtaining target terminal when judging that the network information is matched with default network list
Hardware address;
Transmission module, for sending data to the mesh when judging the hardware address and predetermined hardware list match
It marks in terminal;
Number obtains module, for obtaining the hardware when judging that the hardware address and predetermined hardware list mismatch
Address and the unmatched secondary numerical value of predetermined hardware list;
Stopping modular, for stopping responding the data transfer instruction when the secondary numerical value is more than preset threshold;Stopping ringing
Start timing after answering the data transfer instruction, responds the data transfer instruction again after reaching preset time value, concurrently
Send notification message to reserved terminal, to inform that data can be by the message of unauthorized theft to the reserved terminal;Alternatively, stopping ringing
It answers control after the data transfer instruction to execute screen locking operation, and executes unlock operation when receiving preset password to restore to make
With.
6. data transmission device as claimed in claim 5, which is characterized in that described device further include:
Key reception module, for receiving the key information of user's input;
First encrypting module obtains default network list for encrypting based on the key information to initial network list;
Second encrypting module obtains predetermined hardware list for encrypting based on the key information to initial hardware list.
7. data transmission device as claimed in claim 6, which is characterized in that described device further include:
Network encryption module, for closing network module when judging that the network information and default network list mismatch,
And the network module is encrypted.
8. a kind of terminal characterized by comprising
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as claim 1 to right
It is required that 4 described in any item data transmission methods.
9. a kind of computer readable storage medium, is stored with computer program, wherein the computer program makes computer
Execute such as the described in any item methods of Claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611089009.XA CN106534157B (en) | 2016-11-30 | 2016-11-30 | A kind of data transmission method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611089009.XA CN106534157B (en) | 2016-11-30 | 2016-11-30 | A kind of data transmission method, device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534157A CN106534157A (en) | 2017-03-22 |
CN106534157B true CN106534157B (en) | 2019-08-23 |
Family
ID=58354524
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611089009.XA Expired - Fee Related CN106534157B (en) | 2016-11-30 | 2016-11-30 | A kind of data transmission method, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534157B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109246232A (en) * | 2018-09-30 | 2019-01-18 | 西安万像电子科技有限公司 | Data transmission method, system and device |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003051857A (en) * | 2001-08-06 | 2003-02-21 | Nec Corp | Data communication system, data communication terminal and data communication method used by the terminal, and its program |
JP4613094B2 (en) * | 2005-05-13 | 2011-01-12 | パナソニック株式会社 | Communication terminal and communication method |
US9118699B2 (en) * | 2009-01-26 | 2015-08-25 | Qualcomm Incorporated | Communications methods and apparatus for use in communicating with communications peers |
CN107622026B (en) * | 2012-11-22 | 2021-12-03 | 华为终端有限公司 | Data transmission method and equipment |
CN103457991B (en) * | 2013-05-29 | 2017-03-15 | 北京奇虎科技有限公司 | A kind of terminal safety protection method and system |
US9432357B2 (en) * | 2013-08-28 | 2016-08-30 | Chung Jong Lee | Computer network security management system and method |
CN108183972B (en) * | 2014-11-19 | 2019-08-30 | Oppo广东移动通信有限公司 | Document handling method and terminal |
CN104883294A (en) * | 2015-05-28 | 2015-09-02 | 魅族科技(中国)有限公司 | Data transmission control method and device |
CN105323244B (en) * | 2015-09-22 | 2019-02-22 | 小米科技有限责任公司 | Network Recognition method and apparatus |
-
2016
- 2016-11-30 CN CN201611089009.XA patent/CN106534157B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN106534157A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11057378B2 (en) | Device and method of setting or removing security on content | |
CN105848134B (en) | Virtual SIM card management device, communication terminal, access control method and management method | |
CN103699825B (en) | Display apparatus and method for operating the same | |
CN106778130B (en) | Message display method, display device and mobile terminal | |
CN104933342B (en) | A kind of picture inspection method and mobile terminal | |
WO2017084288A1 (en) | Method and device for verifying identity | |
EP3337209B1 (en) | Method, apparatus and computer readable storage medium for secure context-aware password management | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
KR20150046766A (en) | Unlocking process mehtod, apparatus and device for terminal | |
KR102224553B1 (en) | Key storage method, key management method and device | |
CN109923544A (en) | Method for authenticating and electronic equipment | |
CN107040540B (en) | Cloud privacy data display method and device, server and mobile terminal | |
CN106709383A (en) | Communication message protection method and device and mobile terminal | |
WO2020233218A1 (en) | Information encryption method, information decryption method, and terminal | |
CN110417543A (en) | A kind of data ciphering method, device and storage medium | |
CN110035183B (en) | Information sharing method and terminal | |
CN108985034A (en) | A kind of unlocking method and terminal device | |
CN107256353A (en) | Possesses the display methods of privacy protection function | |
CN107370872A (en) | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine | |
CN108710806A (en) | A kind of terminal unlock method, mobile terminal | |
CN110084009A (en) | Digital unlocking method, device, storage medium and mobile terminal | |
CN106534157B (en) | A kind of data transmission method, device and terminal | |
CN109740312A (en) | A kind of application control method and terminal device | |
JP6201835B2 (en) | Information processing apparatus, information processing method, and computer program | |
CN108540645A (en) | A kind of operating method and mobile terminal of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190823 |