CN106604272A - Method and system for secret data transmission - Google Patents
Method and system for secret data transmission Download PDFInfo
- Publication number
- CN106604272A CN106604272A CN201611141503.6A CN201611141503A CN106604272A CN 106604272 A CN106604272 A CN 106604272A CN 201611141503 A CN201611141503 A CN 201611141503A CN 106604272 A CN106604272 A CN 106604272A
- Authority
- CN
- China
- Prior art keywords
- data
- mobile terminal
- transmission
- module
- several
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72451—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications
Abstract
The invention relates to a method and system for secret data transmission. The method comprises steps that the data acquisition module of a user mobile terminal obtains target data, the target data including an alarm clock start instruction and valid data; the data conversion module of the user mobile terminal converts the target data into a plurality of pieces of data according to an encryption/decryption mechanism; the data transfer module of the user mobile terminal transfers the plurality of pieces of data to an object mobile terminal; the data interception module of the object mobile terminal intercepts the target data from the plurality of pieces of data according to the encryption/decryption mechanism; the data playing module of the object mobile terminal initiates an alarm application and simultaneously plays the valid data according to the alarm clock start instruction.
Description
Technical field
The present invention relates to a kind of method and system of mobile terminal data transmission, especially call out to be related to one kind with reference to alarm clock
The method and system of the data transmission of awake function.
Background technology
With the development and the progress of technology of science and technology, mobile terminal system such as smart mobile phone sets as a kind of portable communications
It is standby, can strengthen user side with other people contacting to each other, carry out business contact, more can operate through mobile terminal various
Software, as amusement and recreation on ordinary days, improves the quality of life of modern, but when mobile terminal system becomes many matchmakers of process
During the main application medium of the daily size affairs such as body amusement, business office, that is, represent many important informations of user, archives
All it is to be stored among the mobile terminal system, the now strick precaution of message safety will be our very important important issues.
Through the further investigation to prior art, at present on the market the mode of data transmission is mainly a side and directly transmits text
Part itself gives other side, and the file that receives of other side be also file itself and do not receive time restriction, this mode counterweight
The data wanted is often unprotected and prompting function, and data during transmission and reception without privacy mechanism, hold
Easily obtained by people intentionally, recipient also easily misses the reading of capsule information.So for user, cause greatly
Inconvenience.
The content of the invention
In order to solve above-mentioned technical problem, it is an object of the present invention to provide a kind of method of data secrecy transmission and being
System, makes data carry out secrecy transmission by combining with alarm clock arousal function, and the confidentiality and timed reminding for improving data is used
Person receives capsule information.
The object of the invention to solve the technical problems employs the following technical solutions to realize.According to proposed by the present invention
A kind of method of data secrecy transmission, it is adaptable to which the data between a customer mobile terminal and a subject mobile terminal is passed
It is defeated, comprise the following steps:
First, a target data, the target data are obtained by a data acquisition module of the customer mobile terminal
Including an alarm clock enabled instruction and a live data;By a data modular converter of the customer mobile terminal by the target
Data is according to an encryption and decryption mechanism transformation into more several data;By a data transmission module of the customer mobile terminal by institute
More several data transmissions are stated to the subject mobile terminal;By a data interception module of the subject mobile terminal according to institute
State encryption and decryption mechanism and intercept the target data from more several data;And the money for passing through the subject mobile terminal
Material playing module starts alarm clock application and while plays the live data according to the alarm clock enabled instruction.
Wherein, when the target data is obtained by the data acquisition module, further include:The customer mobile terminal
It is full trust state between the subject mobile terminal.
Wherein, by the data transmission module of the customer mobile terminal by more several data transmissions to institute
When stating subject mobile terminal, further include:More several data are transmitted by the data transmission module to move to the object
The mode of terminal is that single channel is transmitted or multi-channel transmission.
Wherein, the multi-channel is transmitted when transmitting in the case of short distance, by described in the customer mobile terminal
More several data are divided into two parts by data transmission module, and a part passes through bluetooth by wireless network transmission, another part
Transmission.
Wherein, further include:The multi-channel is transmitted when transmitting in the case of long range, when the subject mobile terminal exists
When receiving several data more, the subject mobile terminal is set and switches different network names in different network time sections
Or the network address receives corresponding part information, until completing the reception of more several data.
By above-mentioned technical proposal, a kind of method of data secrecy transmission of the present invention is applied to each big industry inside weight
Transmission and the timing receipt of file and secret are wanted, can prevent data from being stolen by people intentionally while other side can also be reminded on time
Reception data, and suitable for the prompting of the secret dialogue between good friend, between lovers, interesting transmission is enhanced with timing receipt
The emotion of both sides, improves the experience of user.
The object of the invention to solve the technical problems can also be applied to the following technical measures to achieve further.According to the present invention
A kind of system of the data secrecy transmission for proposing, including:One customer mobile terminal, and a subject mobile terminal;The user
Mobile terminal, including:One data acquisition module, obtains a target data, and the target data includes that an alarm clock starts and refers to
Order and a live data;One data storing module, stores the target data that the data acquisition module is obtained;One data turns
Mold changing block, the target data that the data storing module is stored is according to an encryption and decryption mechanism transformation into more several data;
One data transmission module, by more several data transmissions to the subject mobile terminal;And the subject mobile terminal, its
Include:One data interception module, the target data is intercepted according to the encryption and decryption mechanism from more several data;One
Data storing module, stores the target data that the data interception module is intercepted;One data playing module, according to described noisy
Clock enabled instruction starts alarm clock application and while plays the live data.
Wherein, further include:It is full trust state between the customer mobile terminal and the subject mobile terminal.
Wherein, further include:The data transmission module transmits the side of more several data to the subject mobile terminal
Formula is that single channel is transmitted or multi-channel transmission.
Wherein, further include:The multi-channel is transmitted when transmitting in the case of short distance, by the customer mobile terminal
The data transmission module more several data are divided into into two parts, a part is led to by wireless network transmission, another part
Cross Bluetooth transmission.
Wherein, further include:The multi-channel is transmitted when transmitting in the case of long range, when the subject mobile terminal exists
When receiving several data more, the subject mobile terminal is set and switches different network names in different network time sections
Or the network address receives corresponding part information, until completing the reception of more several data.
By abovementioned technology, a kind of system of data secrecy transmission of the present invention at least has following advantages and beneficial
Effect:The confidentiality of data transmission is improved, prevents data from being stolen by people intentionally while other side can also be reminded to receive money on time
Material;Increase the customer mobile terminal amusement interactive with subject mobile terminal, through shirtsleeve operation, bring more preferably emotion to pass
Pass, improve user experience.
In sum, a kind of method and system of data secrecy transmission of the invention are a significant progress in technology, and
With obvious actively technique effect, become a new and innovative, progressive, practical new invention.
Described above only to the general introduction of technical solution of the present invention, in order to better understand the technology handss of the present invention
Section, and can be practiced according to the content of description, and in order to allow above and other purpose, feature and the advantage of the present invention
Can become apparent, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, describe in detail as follows.
Description of the drawings
Fig. 1 is a kind of component diagram of the system of data secrecy transmission of the invention.
The step of Fig. 2 is a kind of method of data secrecy transmission of the invention flow chart.
Fig. 3 A to Fig. 3 G are a kind of embodiment schematic diagrams of the method and system of data secrecy transmission of the present invention.
Specific embodiment
Further to illustrate the present invention to reach technological means and effect that predetermined goal of the invention is taken, below in conjunction with
Accompanying drawing and preferred embodiment, according to the method and system of data secrecy transmission proposed by the present invention its specific embodiments, knot
Structure, feature and its effect, describe in detail as after.
Fig. 1 is refer to, it is a kind of component diagram of the system of data secrecy transmission of the present invention.In FIG, data
The system of secrecy transmission, including:One customer mobile terminal 100 and an object mobile terminal 1 10;One customer mobile terminal
100, including:One data acquisition module 120, obtains a target data, and the target data includes an alarm clock enabled instruction
With a live data;One data storing module 130, stores the target data that the data acquisition module is obtained;One data
Modular converter 140, the target data that the data storing module is stored is according to an encryption and decryption mechanism transformation into more several
Data;One data transmission module 150, by more several data transmissions to an object mobile terminal 1 10;And the object is moved
Dynamic terminal 110, including:One data interception module 160, intercepts according to the encryption and decryption mechanism from more several data
The target data;One data storing module 170, stores the target data that the data interception module is intercepted;One data
Playing module 180, starts alarm clock application and while plays the live data according to the alarm clock enabled instruction.
In the present embodiment, further include:It is full letter between the customer mobile terminal and the subject mobile terminal
Appoint state.
In the present embodiment, further include:The data transmission module transmits more several data and moves to the object
The mode of terminal is that single channel is transmitted or multi-channel transmission.
In the present embodiment, further include:The multi-channel is transmitted when transmitting in the case of short distance, by the user
More several data are divided into two parts by the data transmission module of mobile terminal, and a part passes through wireless network transmission, separately
A part passes through Bluetooth transmission.
In the present embodiment, further include:The multi-channel is transmitted when transmitting in the case of long range, when the object is moved
Dynamic terminal arranges the subject mobile terminal different in different network time section switchings when several data more are received
Network name or the network address receive corresponding part information, until completing the reception of more several data.
Refer to Fig. 2, its be the present invention a kind of data secrecy transmission method the step of flow chart, steps flow chart is such as
Under:
Step S210:Target data is obtained by the data acquisition module of customer mobile terminal, the target data includes
Alarm clock enabled instruction and live data;
Step S220:The target data is turned according to encryption and decryption mechanism by the data modular converter of customer mobile terminal
Change more several data into;
Step S230:More several data transmissions to object are moved by the data transmission module of customer mobile terminal
Terminal;
Step S240:By the data interception module of subject mobile terminal according to encryption and decryption mechanism from more several data
It is middle to intercept the target data;
Step S250:By the data playing module of subject mobile terminal according to alarm clock enabled instruction start alarm clock application and
Play the live data simultaneously.
In the present embodiment, when the target data is obtained by the data acquisition module, further include:The user
It is full trust state between mobile terminal and the subject mobile terminal.
In the present embodiment, further include:The encryption and decryption mechanism can be Character Font Recognition, gesture identification, recognition of face
Or fingerprint recognition.When recognizing the data modular converter of customer mobile terminal and the data of subject mobile terminal of successfully just can carry out
The action of interception module.
In the present embodiment, by the data transmission module of the customer mobile terminal by more several data
When being sent to the subject mobile terminal, further include:More several data are transmitted to described by the data transmission module
The mode of subject mobile terminal is that single channel is transmitted or multi-channel transmission.
In the present embodiment, further include:Single channel is transmitted as generally normality operation transmission, by bluetooth,
P2P or WIFI is transmitted.
In the present embodiment, further include:Multi-channel is transmitted when transmitting in the case of short distance, is moved by the user
More several data are divided into two parts by the data transmission module of terminal, and a part is by wireless network transmission, another portion
Divide and pass through Bluetooth transmission.
In the present embodiment, further include:Multi-channel is transmitted in the case of during long range propagation, by third party's gateway or
More several data are transferred to the other end by router-assisted mechanism from one end, when the other end is in several data more of reception, are arranged
Corresponding part information is received in the different network name of different network time section switchings or IP address, until completing whole
Mix the reception of data.(for example, more several data X are transferred to second end from first end, when second end is when X is received, at the T1 times,
Network B 1 is switched to, hop data X1, at the T2 times, switches to network B 2, hop data X2, in the T3 times
When, network B 3, hop data X3 are switched to, until second end finishes receiving more several data X).
In the present embodiment, further include:The encryption and decryption machine is obtained by a Touch Screen of the subject mobile terminal
Input signal processed.
Fig. 3 A to Fig. 3 G are refer to, is that a kind of embodiment of the method and system of data secrecy transmission of the present invention is illustrated
Figure, is described as follows:
Fig. 3 A:Customer mobile terminal research and development department 301 records face video 302 as password.
Fig. 3 B:Subject mobile terminal check portion 303 records face video 304 as password.
Fig. 3 C:Research and development department 301 obtains a target data, and the target data has including an alarm clock enabled instruction 305 with one
Effect data 306.
Fig. 3 D:Research and development department 301 carries out recognition of face 307, when recognition of face it is correct 308 after, by the target data conversion
Into more several data.
Fig. 3 E:More several data 309 are sent to check portion by research and development department 301.
Fig. 3 F:Check portion 303 carries out recognition of face 310, when recognition of face it is correct 311 after, intercept target data.
Fig. 3 G:When alarm clock is to point 312, check portion 303 plays live data 306 automatically.
In the present embodiment, further include:Customer mobile terminal research and development department 301 and subject mobile terminal check portion 303 are each other
Between be complete to trust (full trust) state.
In the present embodiment, further include:The password identification can also be gesture identification, Character Font Recognition or fingerprint recognition.
In the present embodiment, further include:The mode of more several data transmissions to check portion is single channel biography by research and development department
The transmission of defeated or multi-channel.
The above, is only presently preferred embodiments of the present invention, and any pro forma restriction is not made to the present invention, though
So the present invention is disclosed above with preferred embodiment, but is not limited to the present invention, any to be familiar with this professional technology people
Member, in the range of without departing from technical solution of the present invention, when making a little change or modification using the technology contents of the disclosure above
For the Equivalent embodiments of equivalent variations, as long as being the content without departing from technical solution of the present invention, the technical spirit of the foundation present invention
Any simple modification, equivalent variations and the modification made to above example, still falls within the range of technical solution of the present invention.
Claims (10)
1. a kind of method of data secrecy transmission, it is adaptable between a customer mobile terminal and a subject mobile terminal
Data transmission, it is characterised in that comprise the following steps:
One target data is obtained by a data acquisition module of the customer mobile terminal, the target data includes an alarm clock
Enabled instruction and a live data;
By a data modular converter of the customer mobile terminal by the target data according to an encryption and decryption mechanism transformation into
More several data;
It is by a data transmission module of the customer mobile terminal that more several data transmissions are whole to object movement
End;
By a data interception module of the subject mobile terminal according to the encryption and decryption mechanism from more several data
Intercept the target data;And
Alarm clock application and same is started according to the alarm clock enabled instruction by a data playing module of the subject mobile terminal
When play the live data.
2. as described in claim the 1 data secrecy transmission method, it is characterised in that mould is being obtained by the data
When block obtains the target data, further include:It is full letter between the customer mobile terminal and the subject mobile terminal
Appoint state.
3. as described in claim the 1 data secrecy transmission method, it is characterised in that by user movement eventually
End the data transmission module by more several data transmissions to the subject mobile terminal when, further include:By described
It is that single channel is transmitted or multiple letter that data transmission module transmits the mode of more several data to the subject mobile terminal
Transmit in road.
4. as described in claim the 3 data secrecy transmission method, it is characterised in that further include:The multi-channel
Transmission when transmitting in the case of short distance, by the data transmission module of the customer mobile terminal by more several moneys
Material is divided into two parts, and a part passes through Bluetooth transmission by wireless network transmission, another part.
5. as described in claim the 3 data secrecy transmission method, it is characterised in that further include:The multi-channel
When transmitting in the case of long range, when the subject mobile terminal is when several data more are received, it is described right to arrange for transmission
As mobile terminal receives corresponding part information in the different network name of different network time section switchings or the network address,
Until completing the reception of more several data.
6. a kind of system of data secrecy transmission, it is characterised in that include:
One customer mobile terminal, including:
One data acquisition module, obtains a target data, and the target data includes an alarm clock enabled instruction and a live data;
One data storing module, stores the target data that the data acquisition module is obtained;
One data modular converter, by the data storing module store the target data according to an encryption and decryption mechanism transformation into
More several data;
One data transmission module, by more several data transmissions to a subject mobile terminal;And
The subject mobile terminal, including:
One data interception module, the target data is intercepted according to the encryption and decryption mechanism from more several data;
One data storing module, stores the target data that the data interception module is intercepted;
One data playing module, starts alarm clock application and while plays the live data according to the alarm clock enabled instruction.
7. as described in claim the 6 data secrecy transmission system, it is characterised in that further include:User's movement is eventually
It is full trust state between end and the subject mobile terminal.
8. as described in claim the 6 data secrecy transmission system, it is characterised in that further include:The data transmission mould
It is that single channel is transmitted or multi-channel transmission that block transmits the mode of more several data to the subject mobile terminal.
9. as described in claim the 8 data secrecy transmission system, it is characterised in that further include:The multi-channel is passed
It is defeated when transmitting in the case of short distance, by the data transmission module of the customer mobile terminal by more several data
It is divided into two parts, a part passes through Bluetooth transmission by wireless network transmission, another part.
10. as described in claim the 8 data secrecy transmission system, it is characterised in that further include:The multi-channel is passed
It is defeated when transmitting in the case of long range, when the subject mobile terminal is when several data more are received, the object is set
Mobile terminal receives corresponding part information in the different network name of different network time section switchings or the network address, directly
To the reception for completing more several data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611141503.6A CN106604272A (en) | 2016-12-12 | 2016-12-12 | Method and system for secret data transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611141503.6A CN106604272A (en) | 2016-12-12 | 2016-12-12 | Method and system for secret data transmission |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106604272A true CN106604272A (en) | 2017-04-26 |
Family
ID=58598925
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611141503.6A Pending CN106604272A (en) | 2016-12-12 | 2016-12-12 | Method and system for secret data transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106604272A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101257535A (en) * | 2008-03-31 | 2008-09-03 | 宇龙计算机通信科技(深圳)有限公司 | Split type mobile terminal alarm clock prompting method and split type mobile terminal |
WO2010128421A2 (en) * | 2009-05-05 | 2010-11-11 | Koninklijke Philips Electronics N.V. | Method for securing communications in a wireless network, and resource-restricted device therefor |
CN104394530A (en) * | 2014-12-09 | 2015-03-04 | 天津光电安辰信息技术有限公司 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
CN104967992A (en) * | 2015-05-11 | 2015-10-07 | 广东美晨通讯有限公司 | Encrypting and decrypting method and device |
CN105554062A (en) * | 2015-11-30 | 2016-05-04 | 东莞酷派软件技术有限公司 | Method, associated device and system of file transmission |
-
2016
- 2016-12-12 CN CN201611141503.6A patent/CN106604272A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101257535A (en) * | 2008-03-31 | 2008-09-03 | 宇龙计算机通信科技(深圳)有限公司 | Split type mobile terminal alarm clock prompting method and split type mobile terminal |
WO2010128421A2 (en) * | 2009-05-05 | 2010-11-11 | Koninklijke Philips Electronics N.V. | Method for securing communications in a wireless network, and resource-restricted device therefor |
CN104394530A (en) * | 2014-12-09 | 2015-03-04 | 天津光电安辰信息技术有限公司 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
CN104967992A (en) * | 2015-05-11 | 2015-10-07 | 广东美晨通讯有限公司 | Encrypting and decrypting method and device |
CN105554062A (en) * | 2015-11-30 | 2016-05-04 | 东莞酷派软件技术有限公司 | Method, associated device and system of file transmission |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102461128B (en) | Method and apparatus for proximity based pairing of mobile devices | |
CN104243517B (en) | Content share method and device between different terminals | |
WO2019179253A1 (en) | Identity verification method and device and electronic device | |
CN102523213A (en) | Server and terminal authenticating method and server and terminal | |
CN103270707A (en) | Method and system for bluetooth communication | |
CN102222368A (en) | Electronic ticket authentication system applying short-distance communication technology and detection method | |
CN102984698A (en) | Near field communication safety protection method and mobile communication terminal | |
CN107370610A (en) | Meeting synchronous method and device | |
CN105610792B (en) | Near-field communication moves system of registering | |
ES2329052T3 (en) | TREATMENT OF DATA SENSITIVE TO THE CONTEXT. | |
KR101005879B1 (en) | Method and system for creating secure network links utilizing a user's biometric identity on network elements | |
CN108419232A (en) | The method and mobile terminal of shared user identity module card | |
CN105792185A (en) | System and method of using multiple phone numbers through one smart phone | |
CN103236926A (en) | Point-to-point-based data transmission system and data transmission method | |
CN106028260A (en) | Real-time transmission device, system and method based on call and information | |
WO2018233681A1 (en) | Method for calling terminal, and related device | |
CN103200325A (en) | Peripheral device for mobile terminal and communication method for mobile terminal and peripheral device | |
CN111356117A (en) | Voice interaction method and Bluetooth device | |
US9949122B2 (en) | Challenge-response-test image to phone for secure pairing | |
CN103259711B (en) | communication information transmission method and system | |
CN113065622A (en) | Business handling method, terminal and server | |
CN104734750B (en) | Shield and its method of work, Mobile terminal signature method, mobile terminal and system | |
CN109314969A (en) | Transmission configuration method, apparatus, equipment, system and storage medium | |
CN106604272A (en) | Method and system for secret data transmission | |
WO2022142427A1 (en) | Method and apparatus for adding friend, device, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |