CN109040050B - Data interaction method and related product - Google Patents

Data interaction method and related product Download PDF

Info

Publication number
CN109040050B
CN109040050B CN201810833143.9A CN201810833143A CN109040050B CN 109040050 B CN109040050 B CN 109040050B CN 201810833143 A CN201810833143 A CN 201810833143A CN 109040050 B CN109040050 B CN 109040050B
Authority
CN
China
Prior art keywords
target
information
verified
equipment
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810833143.9A
Other languages
Chinese (zh)
Other versions
CN109040050A (en
Inventor
柯世兴
胡亚东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810833143.9A priority Critical patent/CN109040050B/en
Publication of CN109040050A publication Critical patent/CN109040050A/en
Application granted granted Critical
Publication of CN109040050B publication Critical patent/CN109040050B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Abstract

The embodiment of the application discloses a data interaction method and a related product, which are applied to electronic equipment, wherein the electronic equipment and target adjacent equipment establish connection of a Neighbor Awareness Network (NAN). The method comprises the following steps: if a data interaction request sent by the target adjacent equipment is received, sending verification prompt information to the target adjacent equipment; receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information; and if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment. By the aid of the method and the device, safety of data interaction of the NAN network can be improved.

Description

Data interaction method and related product
Technical Field
The application relates to the technical field of communication, and mainly relates to a data interaction method and a related product.
Background
With the development of communication technology and electronic device technology, more and more functions are integrated on electronic devices (such as mobile phones, tablet computers and the like), and it is a common thing to download files directly through the electronic devices. In the prior art, the NAN network is connected and transmits data by using an open password-free method or a small number of NAN network are connected by using passwords, so that the security of the electronic device is reduced.
Disclosure of Invention
The embodiment of the application provides a data interaction method and a related product, which can be used for improving the security of data interaction of a NAN network.
In a first aspect, an embodiment of the present application provides a data interaction method, which is applied to an electronic device, where the electronic device establishes a neighbor awareness network NAN connection with a target neighbor device, and the method includes:
if a data interaction request sent by the target adjacent equipment is received, sending verification prompt information to the target adjacent equipment;
receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information;
and if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment.
In a second aspect, an embodiment of the present application provides a data interaction apparatus, which is applied to an electronic device, where the electronic device establishes a neighbor awareness network NAN connection with a target neighbor device, and the apparatus includes:
the communication unit is used for sending verification prompt information to the target adjacent equipment if receiving the data interaction request sent by the target adjacent equipment; receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information;
and the processing unit is used for allowing the target adjacent equipment to perform data interaction with the electronic equipment if the information to be verified is verified successfully.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for some or all of the steps described in the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, where the computer program makes a computer perform some or all of the steps as described in the first aspect of the present application.
In a fifth aspect, embodiments of the present application provide a computer program product, where the computer program product comprises a non-transitory computer-readable storage medium storing a computer program, the computer program being operable to cause a computer to perform some or all of the steps as described in the first aspect of embodiments of the present application. The computer program product may be a software installation package.
The embodiment of the application has the following beneficial effects:
after the data interaction method and the related products are adopted, the data interaction method and the related products are applied to the electronic equipment, and the NAN connection is established between the electronic equipment and the target adjacent equipment. And if the electronic equipment receives a data interaction request sent by the target adjacent equipment, sending verification prompt information to the target adjacent equipment, and receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information. And if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment. That is to say, after the NAN connection is established between the target neighboring device and the electronic device, data interaction verification is required, and when the verification is successful, the target neighboring device and the electronic device may perform data interaction, so that the security of the electronic device is improved. And one of the devices is used for verification, so that the verification efficiency can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
fig. 1A is a network architecture diagram of a NAN according to an embodiment of the present application;
fig. 1B is a schematic view of a scenario for starting a network function according to an embodiment of the present application;
fig. 1C is a schematic flowchart of a data interaction method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another data interaction method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data interaction device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
A Neighbor Awareness Network (NAN), also called a Wireless Fidelity (Wi-Fi) awareness network, is described in the embodiments of the present application by using the NAN.
The NAN function is mainly used for realizing a real-time efficient discovery mechanism, so that the Wi-Fi function is expanded, and the application experience at the moment is improved. The device and the service are continuously discovered in the Wi-Fi range before connection is established, the device does not need to be connected to a mobile broadband network or a Wi-Fi infrastructure network, and a fast awareness networking mode of a component NAN can be achieved. The social application created by the new technology can be adopted, for example, people can be helped to find nearby friends, information or services meeting the requirements of the people, small-section information can be exchanged under the condition of no connection, for example, position information is carried in a discovery frame discover beacon, information exchange is carried out through interaction of the discovery frame, and the like. In addition, the environment sensing function is improved. Because the terminals do not need to rely on network connection to inform the surrounding experience of the users to the users through the NAN, as long as the Wi-Fi Aware discovers the terminals which also support the NAN function, the Wi-Fi Direct or infrastructure connection can be established, and then multiple experiences are provided. Thus, the NAN functionality may help users complete more tasks using the information they receive, from discovering information to eventual activities, supplementing the proximity-based experience.
The electronic devices involved in the embodiments of the present application may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem with wireless communication functions, as well as various forms of User Equipment (UE), Mobile Stations (MS), terminal equipment (terminal device), and so on. For convenience of description, the above-mentioned devices are collectively referred to as electronic devices. For convenience of description, the above-mentioned devices are collectively referred to as electronic devices, and a neighboring device also belongs to one of the electronic devices, and the device of the NAN that is accessed together with the electronic device is referred to as a neighboring device in this application.
Referring to fig. 1A, fig. 1A is a network architecture diagram of a NAN according to an embodiment of the present disclosure, where the network architecture diagram includes an electronic device, a first neighboring device, a second neighboring device, and a third neighboring device.
And the electronic equipment and the adjacent equipment in the NAN both support the NAN function, and both start the NAN function before running the application. The NAN function may be triggered by similar actions like turning on a Wi-Fi switch or turning on a button for controlling the NAN function, as shown in fig. 1B, the neighbor awareness network and the wired network are in an on state, and the wireless network is in an off state; and the system can also be automatically started when the operation parameters meet certain conditions, wherein: the operating parameter may be a current location of the electronic device, for example: parking area, market, highway etc. the operating parameter also can be electronic equipment's foreground application, for example: applications including location services, applications involving neighboring networks, and the like, are not limited herein.
In an embodiment, taking a target neighboring device as an example to establish a NAN connection with an electronic device, and other neighboring devices connect to the NAN, reference may be made to the method. Specifically, the method further comprises: acquiring an access request sent by target adjacent equipment; and if the target adjacent equipment is successfully verified, establishing the NAN connection with the target adjacent equipment.
In this embodiment of the present application, the verification method is not limited, a target association value between the target neighboring device and the electronic device may be obtained, and when the target association value is greater than a threshold, it is determined that the connection verification of the target neighboring device is successful; whether the identification information of the target adjacent equipment is blacklisted or not can be judged, if yes, the connection verification of the target adjacent equipment is determined to be failed; and if the distance is less than a threshold value, the network state signal is stronger than a threshold value or is stable, the connection verification of the adjacent equipment is determined to be successful, and the like. It can be appreciated that authenticating a target neighboring device to access the NAN may improve security of the NAN.
The following describes embodiments of the present application in detail.
The embodiment of the application provides a data interaction method and a related product, which can be used for improving the security of data interaction of a NAN network.
Referring to fig. 1C, an embodiment of the present application provides a flowchart illustrating a data interaction method, where the method is applied to an electronic device, and the electronic device establishes a neighbor awareness network NAN connection with a target neighbor device. Specifically, as shown in fig. 1C, a data interaction method includes:
s101: and if receiving a data interaction request sent by the target adjacent equipment, sending verification prompt information to the target adjacent equipment.
In the embodiment of the application, the data interaction request is used for requesting the electronic equipment to perform data interaction with the target adjacent equipment; the verification prompt message is used to prompt the target proximity device for verification.
The verification prompt message may instruct the user corresponding to the target proximity device to input verification information corresponding to numbers, letters, words, or images, and may also instruct the user corresponding to the target proximity device to input identity information thereof, for example: the biometric data such as fingerprint, face image, electroencephalogram data, and voice data is not limited herein. The verification prompt information may be presented in various forms such as voice, text, light, and the like, and the present application is not limited thereto.
In an embodiment, before sending the verification prompt to the target neighboring device, the method further includes: acquiring a target association value between the target adjacent equipment and the electronic equipment; and determining the verification prompt information according to the target correlation value.
The target association value is used for describing an association relationship between the target adjacent device and the electronic device, and the larger the target association value is, the more compact the relationship between the target adjacent device and the electronic device is.
The mapping relation between the target association value and the verification prompt message can be stored in advance, and as shown in table 1, when the target association value is 4, the verification prompt message is the telephone number input into the electronic equipment.
TABLE 1
Target associated value Verifying the prompt information
(0~2] Inputting pairing information of electronic devices
(2~5] Inputting telephone number of electronic device
Greater than 5 Inputting the name of the user corresponding to the electronic equipment
It can be understood that the target correlation value between the target neighboring device and the electronic device is obtained first, and then the verification prompt information is determined according to the target correlation value, that is, the verification type is selected according to the target correlation value between the target neighboring device and the electronic device, and the user corresponding to the target neighboring device is prompted to input the information to be verified, so that the verification safety and the verification efficiency can be improved.
The present application does not limit the method for obtaining the target correlation value, and in an embodiment, the method further includes: acquiring a connection record between the target adjacent equipment and the electronic equipment; extracting connection parameters between the target proximity device and the electronic device from the connection record; and determining a target association value between the target adjacent equipment and the electronic equipment according to the connection parameters.
The connection record is record information for establishing NAN connection between the target adjacent equipment and the electronic equipment; the connection parameters include connection duration, connection times, data transmission quantity and other connection dimension information.
It can be understood that the electronic device may extract, from the connection record, a connection parameter between the target neighboring device and the electronic device, where the connection parameter reflects, to some extent, a target association between the target neighboring device and the electronic device, and thus, accuracy of determining the target association value may be improved.
The present application is not limited to the method for determining the target correlation value according to the connection parameter, and in an embodiment, the method further includes: and determining the target correlation value according to the connection dimension information and a preset connection weight value corresponding to each connection dimension information in the connection dimension information.
The sum of the preset connection weights corresponding to the connection dimension information is 1, and the sum can be determined according to the probability of data interaction between the connection dimension information and the electronic equipment.
For example, assume that a plurality of connection dimensions and their corresponding connection dimension information: the connection duration is 10min, the connection times are 2 times, the data transmission volume is 10M, and the preset connection weights corresponding to the connection duration, the connection times and the data transmission volume are 0.3, 0.4 and 0.3 respectively, so that the target correlation value is 10 × 0.3+2 × 0.4+10 × 0.3-6.8.
S102: and receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information.
S103: and if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment.
In the data interaction method shown in fig. 1C, the method is applied to an electronic device, and the electronic device establishes a NAN connection with a target neighboring device. And if the electronic equipment receives a data interaction request sent by the target adjacent equipment, sending verification prompt information to the target adjacent equipment, and receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information. And if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment. That is to say, after the NAN connection is established between the target neighboring device and the electronic device, data interaction verification is required, and when the verification is successful, the target neighboring device and the electronic device may perform data interaction, so that the security of the electronic device is improved. And one of the devices is used for verification, so that the verification efficiency can be improved.
The method for verifying the information to be verified is not limited, and different configuration information can be set for different files in advance, so that the data interaction request is a downloading request of a target file, and if the information to be verified is successfully matched with the configuration information of the target file, the target adjacent equipment is allowed to download the target file.
In one embodiment, the method further comprises: obtaining at least one first file shared by the electronic device in the NAN and at least one second file shared by the target neighboring device in the NAN; acquiring file information of each first file in the at least one first file to obtain at least one first file information, and acquiring file information of each second file in the at least one second file to obtain at least one second file information; determining preset verification information according to the at least one first file information and the at least one second file information; and if the information to be verified is successfully matched with the preset verification information, determining that the information to be verified is successfully verified.
The first file is a file shared by the electronic device in the NAN, the second file is a file shared by the target neighboring device in the NAN, and the file type may be an image, a video, an audio, an installation package, and the like, which is not limited herein. The file information includes a file type, a file memory size, a file source, a file author, and the like, which is not limited herein.
It can be understood that the files shared by the electronic device and the target adjacent device in the NAN are respectively acquired, the file information of each shared file is acquired, the preset verification information is determined according to each file information, the preset verification information and the information to be verified are matched, and if the matching is successful, the information to be verified is determined to be verified successfully. Therefore, the preset verification information is determined based on the file information shared by the electronic equipment and the target adjacent equipment, namely, the verification is carried out according to the file information respectively shared by the electronic equipment and the target adjacent equipment, so that the verification accuracy can be improved, and the safety of data interaction between the electronic equipment and the target adjacent equipment is improved.
In one embodiment, the determining the preset authentication information according to the at least one first file information and the at least one second file information includes: acquiring a first association value between the electronic equipment and the at least one piece of first file information, and acquiring a second association value between the electronic equipment and the target adjacent equipment according to the at least one piece of second file information; acquiring first verification information corresponding to the first correlation value and acquiring second verification information corresponding to the second correlation value; and generating the preset verification information according to the first verification information and the second verification information.
The first association value is an association value between at least one piece of first file information and the electronic device, the second association value is an association value between at least one piece of second file information and the target adjacent device, and the larger the association value is, the more compact the relationship between the two is.
The mapping relationship between the first correlation value and the first verification information and the mapping relationship between the second correlation value and the second verification information may be stored in advance, as shown in table 2, when the first correlation value is 4, the first verification information is the telephone number of the electronic device, and when the second correlation value is 2, the second verification information is the pairing information of the target neighboring device.
TABLE 2
Figure BDA0001742566360000081
The method and the device for generating the preset verification information are not limited by how the preset verification information is generated according to the first verification information and the second verification information, the verification sequence of the preset verification information can be determined according to the first correlation value and the second correlation value, and the first verification information and the second verification information are subjected to repeated removal operation according to the verification sequence to obtain the preset verification information, so that the verification safety can be further improved based on the verification sequence and the verification information of the first verification information and the second verification information.
For example, as shown in table 2, when the first correlation value is 4, the first verification information is a phone number of the electronic device, and when the second correlation value is 2, the second verification information is pairing information of the target neighboring device, the first correlation value is greater than the second correlation value, and no duplicate information exists between the first verification information and the second verification information, it is determined that the preset verification information is the phone number of the electronic device and the pairing information of the target neighboring device, and the order of the two is first phone number and then pairing information.
It can be understood that different file information is associated with privacy of different users and security of different electronic devices, and thus, first associated values between the first file information and the electronic devices are obtained according to the at least one first file information, second associated values between the second file information and the target neighboring devices are obtained according to the at least one second file information, then first verification information corresponding to the first associated values is obtained, second verification information corresponding to the second associated values is obtained, and then the preset verification information is generated according to the first verification information and the second verification information, so that accuracy of determining the preset verification information can be improved.
In one embodiment, the method further comprises: determining a matching threshold value according to the target correlation value; and if the matching value between the information to be verified and the preset verification information is larger than the matching threshold value, determining that the information to be verified and the preset verification information are successfully matched.
The mapping relation between the target correlation value and the matching threshold value can be prestored, as shown in table 3, when the target correlation value is 4, the matching threshold value is 0.8, and if the matching value between the information to be verified and the preset verification information is 0.84 and is greater than the matching threshold value, it is determined that the information to be verified and the preset verification information are successfully matched.
TABLE 3
Target associated value Match threshold
(0~2] 0.9
(2~5] 0.8
Greater than 5 0.7
It can be understood that a matching threshold is determined according to a target correlation value, then a matching value between the information to be verified and the preset verification information is compared with the matching threshold, if the matching value is greater than the matching threshold, it is determined that the information to be verified and the preset verification information are successfully matched, otherwise, the matching is failed, and thus, the accuracy of determining the matching threshold, that is, the accuracy of verification, can be improved.
In one embodiment, the method further comprises: determining effective duration according to the target correlation value; the allowing data interaction between the target proximity device and the electronic device comprises: and allowing data interaction between the target adjacent equipment and the electronic equipment within the valid duration range.
The valid duration is a time limit corresponding to data interaction, that is, data interaction between the target neighboring device and the electronic device is allowed within the valid duration, if the valid duration exceeds the valid duration, re-verification is required, and when verification succeeds, a valid duration is re-determined, and data interaction between the target neighboring device and the electronic device is allowed within the valid duration, so that the security of data interaction can be further improved.
The mapping relation between the target association value and the effective duration can be stored in advance, as shown in table 4, if the time for successful verification of the information to be verified is 20 minutes at 19.7.7.2018, and 14 points at 19.7.2018, and if the target association value is 4, the effective duration is 10 minutes, the electronic device can perform data interaction with the target neighboring device at 14 points at 19.7.19.2018, and if the time period is exceeded, the re-verification is needed.
TABLE 4
Target associated value Duration of validity
(0~2] 5 minutes
(2~5] 10 minutes
Greater than 5 20 minutes
It can be understood that the valid duration is determined according to the target correlation value, data interaction between the target neighboring device and the electronic device is allowed within the valid duration range, and if the valid duration is exceeded, the verification needs to be performed again, so that the security of the data interaction can be further improved.
Referring to fig. 2, fig. 2 is a flowchart illustrating another data interaction method according to an embodiment of the present application, where the method is applied to an electronic device, and the electronic device establishes a NAN connection with a target neighboring device. As shown in fig. 2, the data interaction method includes:
s201: and if a data interaction request sent by the target adjacent equipment is received, acquiring a target association value between the target adjacent equipment and the electronic equipment.
S202: and determining verification prompt information according to the target correlation value.
S203: and sending the verification prompt information to the target adjacent equipment.
S204: and receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information.
S205: and if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment.
In the data interaction method shown in fig. 2, if the electronic device receives a data interaction request sent by the target neighboring device, a target association value between the target neighboring device and the electronic device is obtained, then verification prompt information is determined according to the target association value, and the verification prompt information is sent to the target neighboring device. And then, receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information. And if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment. That is to say, after the NAN connection is established between the target neighboring device and the electronic device, data interaction verification is required, a verification type is selected based on a target association value between the target neighboring device and the electronic device, and a user corresponding to the target neighboring device is prompted to input information to be verified, and when the verification is successful, the target neighboring device and the electronic device can perform data interaction, so that the security of the electronic device is improved. And one of the devices is used for verification, so that the verification efficiency can be improved.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a data interaction apparatus according to an embodiment of the present disclosure, where the apparatus is applied to an electronic device, and the electronic device establishes a neighbor awareness network NAN connection with a target neighbor device. As shown in fig. 3, the data interaction apparatus 300 includes:
the communication unit 301 is configured to send verification prompt information to the target neighboring device if receiving the data interaction request sent by the target neighboring device; receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information;
the processing unit 302 is configured to allow data interaction between the target neighboring device and the electronic device if the information to be verified is verified successfully.
It can be understood that, if the communication unit 301 receives the data interaction request sent by the target neighboring device, it sends verification prompt information to the target neighboring device, and receives to-be-verified information sent by the target neighboring device for the verification prompt information. If the information to be verified is successfully verified, the processing unit 302 allows data interaction between the target neighboring device and the electronic device. That is to say, after the NAN connection is established between the target neighboring device and the electronic device, data interaction verification is required, and when the verification is successful, the target neighboring device and the electronic device may perform data interaction, so that the security of the electronic device is improved. And one of the devices is used for verification, so that the verification efficiency can be improved.
In a possible example, before the sending of the verification prompt information to the target proximity device, the processing unit 302 is further configured to obtain a target association value between the target proximity device and the electronic device; and determining the verification prompt information according to the target correlation value.
In one possible example, in the aspect of obtaining the target association value between the target neighboring device and the electronic device, the processing unit 302 is specifically configured to obtain a connection record between the target neighboring device and the electronic device; extracting connection parameters between the target neighboring device and the electronic device from the target connection record; and determining the target correlation value according to the connection parameter.
In one possible example, in terms of the allowing of data interaction between the target neighboring device and the electronic device, the processing unit 302 is specifically configured to determine a validity duration according to the target association value; and allowing data interaction between the target adjacent equipment and the electronic equipment within the valid duration range.
In one possible example, the processing unit 302 is further to obtain at least one first file shared by the electronic device in the NAN and at least one second file shared by the target neighboring device in the NAN; acquiring file information of each first file in the at least one first file to obtain at least one first file information, and acquiring file information of each second file in the at least one second file to obtain at least one second file information; determining preset verification information according to the at least one first file information and the at least one second file information; and if the information to be verified is successfully matched with the preset verification information, determining that the information to be verified is successfully verified.
In a possible example, in the aspect of determining the preset verification information according to the at least one first file information and the at least one second file information, the processing unit 302 is specifically configured to obtain a first association value with the electronic device according to the at least one first file information, and obtain a second association value with the target neighboring device according to the at least one second file information; acquiring first verification information corresponding to the first correlation value and acquiring second verification information corresponding to the second correlation value; and generating the preset verification information according to the first verification information and the second verification information.
In one possible example, the processing unit 302 is further configured to determine a matching threshold according to the target association value; and if the matching value between the information to be verified and the preset verification information is larger than the matching threshold value, determining that the information to be verified and the preset verification information are successfully matched.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure, which is consistent with the embodiment shown in fig. 1C. As shown in fig. 4, the electronic device 400 includes a processor 410, a memory 420, a communication interface 430, and one or more programs 440, wherein the one or more programs 440 are stored in the memory 420 and configured to be executed by the processor 410, and wherein the programs 440 include instructions for:
if a data interaction request sent by the target adjacent equipment is received, sending verification prompt information to the target adjacent equipment;
receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information;
and if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment.
It can be understood that, if the electronic device 400 receives the data interaction request sent by the target neighboring device, it sends verification prompt information to the target neighboring device, and receives to-be-verified information sent by the target neighboring device for the verification prompt information. If the information to be verified is successfully verified, allowing data interaction between the target neighboring device and the electronic device 400. That is, after the NAN connection is established between the target neighboring device and the electronic device 400, data interaction verification is required, and when the verification is successful, the target neighboring device and the electronic device 400 may perform data interaction, so that the security of the electronic device 400 is improved. And one of the devices is used for verification, so that the verification efficiency can be improved.
In one possible example, prior to said sending verification hint information to said target neighboring device, the instructions in said program 440 are further operable to:
acquiring a target association value between the target adjacent equipment and the electronic equipment;
and determining the verification prompt information according to the target correlation value.
In one possible example, in terms of the obtaining the target association value between the target neighboring device and the electronic device, the instructions in the program 440 are specifically configured to:
acquiring a connection record between the target adjacent equipment and the electronic equipment;
extracting connection parameters between the target neighboring device and the electronic device from the target connection record;
and determining the target correlation value according to the connection parameter.
In one possible example, the instructions in the program 440 are further configured to:
determining effective duration according to the target correlation value;
the allowing data interaction between the target proximity device and the electronic device comprises:
and allowing data interaction between the target adjacent equipment and the electronic equipment within the valid duration range.
In one possible example, the instructions in the program 440 are further configured to:
obtaining at least one first file shared by the electronic device in the NAN and at least one second file shared by the target neighboring device in the NAN;
acquiring file information of each first file in the at least one first file to obtain at least one first file information, and acquiring file information of each second file in the at least one second file to obtain at least one second file information;
determining preset verification information according to the at least one first file information and the at least one second file information;
and if the information to be verified is successfully matched with the preset verification information, determining that the information to be verified is successfully verified.
In one possible example, in the aspect of determining the preset verification information according to the at least one first file information and the at least one second file information, the instructions in the program 440 are specifically configured to:
acquiring a first association value between the electronic equipment and the at least one piece of first file information, and acquiring a second association value between the electronic equipment and the target adjacent equipment according to the at least one piece of second file information;
acquiring first verification information corresponding to the first correlation value and acquiring second verification information corresponding to the second correlation value;
and generating the preset verification information according to the first verification information and the second verification information.
In one possible example, the instructions in the program 440 are further configured to:
determining a matching threshold value according to the target correlation value;
and if the matching value between the information to be verified and the preset verification information is larger than the matching threshold value, determining that the information to be verified and the preset verification information are successfully matched.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for causing a computer to execute a part or all of the steps of any one of the methods as described in the method embodiments, and the computer includes an electronic device.
Embodiments of the application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as recited in the method embodiments. The computer program product may be a software installation package and the computer comprises the electronic device.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art will also appreciate that the embodiments described in this specification are presently preferred and that no particular act or mode of operation is required in the present application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a hardware mode or a software program mode.
The integrated unit, if implemented in the form of a software program module and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a read-only memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and the like.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash disk, ROM, RAM, magnetic or optical disk, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (9)

1. A data interaction method is applied to an electronic device, the electronic device establishes a Neighbor Awareness Network (NAN) connection with a target neighbor device, and the method comprises the following steps:
if a data interaction request sent by the target adjacent equipment is received, sending verification prompt information to the target adjacent equipment;
receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information;
if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment;
wherein, prior to the sending of the verification prompt message to the target proximity device, the method further comprises: acquiring a target association value between the target adjacent equipment and the electronic equipment; determining the verification prompt information according to the target correlation value; the target association value is used for describing an association relationship between the target adjacent equipment and the electronic equipment, and the larger the target association value is, the tighter the relationship between the target adjacent equipment and the electronic equipment is;
wherein the obtaining of the target association value between the target neighboring device and the electronic device comprises: acquiring a connection record between the target adjacent equipment and the electronic equipment; extracting connection parameters between the target proximity device and the electronic device from the connection record; determining the target correlation value according to the connection parameter;
wherein the method further comprises: determining effective duration according to the target correlation value; the allowing data interaction between the target proximity device and the electronic device comprises: and allowing data interaction between the target adjacent equipment and the electronic equipment within the valid duration range.
2. The method of claim 1, further comprising:
obtaining at least one first file shared by the electronic device in the NAN and at least one second file shared by the target neighboring device in the NAN;
acquiring file information of each first file in the at least one first file to obtain at least one first file information, and acquiring file information of each second file in the at least one second file to obtain at least one second file information;
determining preset verification information according to the at least one first file information and the at least one second file information;
and if the information to be verified is successfully matched with the preset verification information, determining that the information to be verified is successfully verified.
3. The method according to claim 2, wherein the determining preset authentication information according to the at least one first file information and the at least one second file information comprises:
acquiring a first association value between the electronic equipment and the at least one piece of first file information, and acquiring a second association value between the electronic equipment and the target adjacent equipment according to the at least one piece of second file information;
acquiring first verification information corresponding to the first correlation value and acquiring second verification information corresponding to the second correlation value;
and generating the preset verification information according to the first verification information and the second verification information.
4. A method according to claim 2 or 3, characterized in that the method further comprises:
determining a matching threshold value according to the target correlation value;
and if the matching value between the information to be verified and the preset verification information is larger than the matching threshold value, determining that the information to be verified and the preset verification information are successfully matched.
5. A data interaction method is applied to an electronic device, the electronic device establishes a Neighbor Awareness Network (NAN) connection with a target neighbor device, and the method comprises the following steps:
if a data interaction request sent by the target adjacent equipment is received, sending verification prompt information to the target adjacent equipment;
receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information;
if the information to be verified is verified successfully, allowing data interaction between the target adjacent equipment and the electronic equipment;
wherein, prior to the sending of the verification prompt message to the target proximity device, the method further comprises: acquiring a target association value between the target adjacent equipment and the electronic equipment; determining the verification prompt information according to the target correlation value; the target association value is used for describing an association relationship between the target adjacent equipment and the electronic equipment, and the larger the target association value is, the tighter the relationship between the target adjacent equipment and the electronic equipment is;
the method further comprises the following steps: determining a matching threshold value according to the target correlation value; and if the matching value between the information to be verified and preset verification information is larger than the matching threshold value, determining that the information to be verified and the preset verification information are successfully matched.
6. A data interaction device is applied to an electronic device, the electronic device establishes a Neighbor Awareness Network (NAN) connection with a target neighbor device, and the device comprises:
the communication unit is used for sending verification prompt information to the target adjacent equipment if receiving the data interaction request sent by the target adjacent equipment; receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information;
the processing unit is used for allowing the target adjacent equipment to perform data interaction with the electronic equipment if the information to be verified is verified successfully;
the processing unit is further configured to, before sending verification prompt information to the target neighboring device, obtain a target association value between the target neighboring device and the electronic device; determining the verification prompt information according to the target correlation value; the target association value is used for describing an association relationship between the target adjacent equipment and the electronic equipment, and the larger the target association value is, the tighter the relationship between the target adjacent equipment and the electronic equipment is;
wherein the obtaining of the target association value between the target neighboring device and the electronic device comprises: acquiring a connection record between the target adjacent equipment and the electronic equipment; extracting connection parameters between the target proximity device and the electronic device from the connection record; determining the target correlation value according to the connection parameter;
the processing unit is further configured to determine an effective duration according to the target correlation value;
the allowing data interaction between the target proximity device and the electronic device comprises: and allowing data interaction between the target adjacent equipment and the electronic equipment within the valid duration range.
7. A data interaction device is applied to an electronic device, the electronic device establishes a Neighbor Awareness Network (NAN) connection with a target neighbor device, and the device comprises:
the communication unit is used for sending verification prompt information to the target adjacent equipment if receiving the data interaction request sent by the target adjacent equipment; receiving to-be-verified information sent by the target adjacent equipment aiming at the verification prompt information;
the processing unit is used for allowing the target adjacent equipment to perform data interaction with the electronic equipment if the information to be verified is verified successfully;
the processing unit is further configured to, before sending verification prompt information to the target neighboring device, obtain a target association value between the target neighboring device and the electronic device; determining the verification prompt information according to the target correlation value; the target association value is used for describing an association relationship between the target adjacent equipment and the electronic equipment, and the larger the target association value is, the tighter the relationship between the target adjacent equipment and the electronic equipment is;
wherein the obtaining of the target association value between the target neighboring device and the electronic device comprises: acquiring a connection record between the target adjacent equipment and the electronic equipment; extracting connection parameters between the target proximity device and the electronic device from the connection record; determining the target correlation value according to the connection parameter;
the processing unit is further configured to determine a matching threshold according to the target correlation value; and if the matching value between the information to be verified and preset verification information is larger than the matching threshold value, determining that the information to be verified and the preset verification information are successfully matched.
8. An electronic device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps of the method of any of claims 1-5.
9. A computer-readable storage medium for storing a computer program, wherein the computer program causes a computer to perform the method according to any one of claims 1-5.
CN201810833143.9A 2018-07-25 2018-07-25 Data interaction method and related product Active CN109040050B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810833143.9A CN109040050B (en) 2018-07-25 2018-07-25 Data interaction method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810833143.9A CN109040050B (en) 2018-07-25 2018-07-25 Data interaction method and related product

Publications (2)

Publication Number Publication Date
CN109040050A CN109040050A (en) 2018-12-18
CN109040050B true CN109040050B (en) 2021-09-14

Family

ID=64646554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810833143.9A Active CN109040050B (en) 2018-07-25 2018-07-25 Data interaction method and related product

Country Status (1)

Country Link
CN (1) CN109040050B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111163533B (en) * 2019-12-31 2022-01-04 Oppo广东移动通信有限公司 Network connection method and related product
CN112788700A (en) * 2021-02-25 2021-05-11 芜湖美的厨卫电器制造有限公司 Communication method, terminal and readable storage medium
CN113076283B (en) * 2021-04-06 2022-02-18 中移(上海)信息通信科技有限公司 File consistency verification method and device and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1557069A (en) * 2002-07-19 2004-12-22 索尼株式会社 Radio information transmitting system, radio communication method, radio station, and radio terminal device
CN102883319A (en) * 2012-09-07 2013-01-16 大唐移动通信设备有限公司 Method and device for managing authentication vectors
CN104022874A (en) * 2013-03-01 2014-09-03 联想(北京)有限公司 Method for information processing and electronic equipment
CN104080086A (en) * 2014-07-18 2014-10-01 北京智谷睿拓技术服务有限公司 Wireless connection establishment method and wireless connection establishment device
CN106170046A (en) * 2016-09-23 2016-11-30 陕西尚品信息科技有限公司 A kind of event based on mobile device triggers implicit expression auth method
CN106534602A (en) * 2016-11-23 2017-03-22 努比亚技术有限公司 Terminal and information processing method
CN107318174A (en) * 2017-06-28 2017-11-03 广东欧珀移动通信有限公司 A kind of communication means, device and terminal
CN108256303A (en) * 2018-01-10 2018-07-06 深圳壹账通智能科技有限公司 Electronic device, auth method and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102314917B1 (en) * 2015-03-19 2021-10-21 삼성전자주식회사 Method and apparatus for configuring connection between devices in a communication system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1557069A (en) * 2002-07-19 2004-12-22 索尼株式会社 Radio information transmitting system, radio communication method, radio station, and radio terminal device
CN102883319A (en) * 2012-09-07 2013-01-16 大唐移动通信设备有限公司 Method and device for managing authentication vectors
CN104022874A (en) * 2013-03-01 2014-09-03 联想(北京)有限公司 Method for information processing and electronic equipment
CN104080086A (en) * 2014-07-18 2014-10-01 北京智谷睿拓技术服务有限公司 Wireless connection establishment method and wireless connection establishment device
CN106170046A (en) * 2016-09-23 2016-11-30 陕西尚品信息科技有限公司 A kind of event based on mobile device triggers implicit expression auth method
CN106534602A (en) * 2016-11-23 2017-03-22 努比亚技术有限公司 Terminal and information processing method
CN107318174A (en) * 2017-06-28 2017-11-03 广东欧珀移动通信有限公司 A kind of communication means, device and terminal
CN108256303A (en) * 2018-01-10 2018-07-06 深圳壹账通智能科技有限公司 Electronic device, auth method and storage medium

Also Published As

Publication number Publication date
CN109040050A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
US8594632B1 (en) Device to-device (D2D) discovery without authenticating through cloud
KR101949116B1 (en) Proximity Discovery, Authentication and Link Establishment Between Mobile Devices in 3GPP LTE
WO2017076269A1 (en) Smart device, and method and apparatus for establishing bluetooth connection between devices therefor
JP6668407B2 (en) Terminal authentication method and apparatus used in mobile communication system
CN109040050B (en) Data interaction method and related product
CN109040213B (en) File downloading method and related product
CN108419237B (en) Wireless access point connection method, wireless access point equipment and storage medium
CN110753330B (en) Bluetooth pairing method and Bluetooth headset
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN104982021A (en) Authenticating a wireless dockee to a wireless docking service
CN111132305B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN109246185B (en) File downloading method and related product
KR20190087206A (en) An electronic device providing call continuity in a weak signal environment and control method thereof
CN109347828A (en) File Upload and Download method, apparatus, electronic equipment and storage medium
CN106332000B (en) Terminal position information acquisition method and device
WO2017157290A1 (en) Interception method, core network device and base station
KR20080036446A (en) Method and system for providing user authorization service using bio information and mobile communication terminal for transmitting authorization information using bio information
CN111093196B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
JP2017539132A (en) Terminal, server, and user identification system and method
CN109120677B (en) File downloading method and related product
KR101483400B1 (en) Communication Terminal Certification Processing System, Communication Terminal, Server and Certification Processing Method
CN108990039B (en) Data transmission method and related device
CN112040057B (en) Device control method, device, electronic device, control system and storage medium
CN106357511B (en) Information synchronization method and device
CN113079505B (en) User authentication method, core network side device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant