CN111479263A - Communication connection method, terminal and computer storage medium - Google Patents
Communication connection method, terminal and computer storage medium Download PDFInfo
- Publication number
- CN111479263A CN111479263A CN202010196695.0A CN202010196695A CN111479263A CN 111479263 A CN111479263 A CN 111479263A CN 202010196695 A CN202010196695 A CN 202010196695A CN 111479263 A CN111479263 A CN 111479263A
- Authority
- CN
- China
- Prior art keywords
- terminal
- connection
- port information
- graphic code
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 77
- 230000006854 communication Effects 0.000 title claims abstract description 77
- 238000000034 method Methods 0.000 title claims abstract description 65
- 230000002159 abnormal effect Effects 0.000 claims description 19
- 230000004044 response Effects 0.000 claims description 12
- 238000012544 monitoring process Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000002093 peripheral effect Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000007175 bidirectional communication Effects 0.000 description 2
- 230000002457 bidirectional effect Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229920000642 polymer Polymers 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application relates to a communication connection method, a terminal and a computer storage medium, wherein the communication connection method comprises the following steps: the method comprises the steps that a first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code; the at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule, acquires the connection parameter and the first port information, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information. When the communication connection between the multiple terminals is established, the graphic code comprises the first port information and the connection parameters of the wireless hotspot and the like, and is encrypted, so that the connection speed and the connection safety can be improved.
Description
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a communication connection method, a terminal, and a computer storage medium.
Background
With the rapid development of terminal technology, the functions of mobile terminals such as mobile phones and tablet computers are also improved, and the mobile terminals become one of the common tools in daily life and work.
The communication connection based on the local area network is established among the multiple terminals, so that data transmission among the terminals is faster and safer, however, the used parameters are not encrypted in the existing connection process, the local area network is possibly maliciously connected by other equipment, and even information leakage risks occur, and the mode for acquiring port information in the existing connection process is complex and the connection speed is slower.
Disclosure of Invention
In view of the above technical problems, the present application provides a communication connection method, a terminal and a computer storage medium, which can improve connection speed and connection security.
In order to solve the above technical problem, the present application provides a method for communication connection, including:
the method comprises the steps that a first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code;
and at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule and acquires the connection parameter and the first port information, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information.
The method includes the steps that the first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code, and includes the following steps:
the first terminal runs a first preset application;
when the first preset application receives the operation of establishing the local area network, establishing wireless hot spot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule corresponding to the first preset application;
and generating a corresponding graphic code and displaying the graphic code on a preset interface of the first preset application.
The scanning of the graphic code by the at least one second terminal, the decryption of the graphic code according to a preset decryption rule and the acquisition of the connection parameter and the first port information by the at least one second terminal include:
the at least one second terminal runs a second preset application, and the second preset application and the first preset application are the same application;
when the second preset application receives an operation of joining the local area network, displaying a code scanning interface;
and after scanning the graphic code, decrypting the graphic code according to a preset decryption rule corresponding to the second preset application and acquiring the connection parameter and the first port information.
Wherein, the method further comprises:
the at least one second terminal monitors whether the preset application quits running or not;
and if so, disconnecting the network connection with the first terminal.
Wherein, the establishing communication connection with the first terminal according to the first port information includes:
the at least one second terminal sends a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and the first terminal stores the second port information and sends response information of successful connection to the at least one second terminal.
Wherein, the method further comprises:
the first terminal monitors a device connection list of the wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
The application also provides a communication connection method, which is applied to the first terminal and comprises the following steps:
creating wireless hotspot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule to generate a corresponding graphic code;
and displaying the graphic code for scanning by at least one second terminal, decrypting the graphic code according to a preset decryption rule and acquiring the connection parameter and the first port information after the at least one second terminal scans the graphic code, connecting a wireless hotspot of the first terminal according to the connection parameter, and establishing communication connection between the at least one second terminal and the first terminal according to the first port information.
The method applied to the first terminal further comprises the following steps:
receiving a port connection request sent by the at least one second terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and storing the second port information and sending response information of successful connection to the at least one second terminal.
The method applied to the first terminal further comprises the following steps:
monitoring a device connection list of the wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
The application also provides a communication connection method, which is applied to a second terminal and comprises the following steps:
scanning a graphic code displayed by a first terminal, wherein the graphic code is generated by encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule after the first terminal creates the wireless hotspot and the first port information;
decrypting the graphic code according to a preset decryption rule and acquiring the connection parameter and the first port information;
connecting the wireless hotspot of the first terminal according to the connection parameter;
and establishing communication connection with the first terminal according to the first port information.
In the method applied to the second terminal, the establishing a communication connection with the first terminal according to the first port information includes:
and sending a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the second terminal, so that the first terminal stores the second port information and sends response information of successful connection to the second terminal.
The method applied to the second terminal further comprises the following steps:
monitoring whether the preset application exits from running;
and if so, disconnecting the network connection with the first terminal.
The application also provides a terminal, which comprises a memory and a processor, wherein the memory is used for storing at least one program instruction, and the processor is used for realizing the operation control method of the application by loading and executing the at least one program instruction.
The present application further provides a computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement a method of controlling the operation of an application as described above.
As described above, the method, terminal and computer storage medium for communication connection according to the present invention have the following advantageous effects:
the method comprises the steps that a first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code, then, at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule, acquires the connection parameters and the first port information, connects the wireless hotspot of the first terminal according to the connection parameters, and establishes communication connection with the first terminal according to the first port information. By the method, when the communication connection between the multiple terminals is established, the graphic code comprises the first port information and the connection parameters of the wireless hotspot and the like and is encrypted, so that the connection speed and the connection safety can be improved.
Drawings
Fig. 1 is a schematic flow chart of a communication connection shown according to a first embodiment;
fig. 2 is a schematic flow chart of a communication connection shown according to a second embodiment;
fig. 3 is a flowchart illustrating a communication connection according to the third embodiment.
Fig. 4 is one of the schematic structural diagrams of a terminal shown according to the fourth embodiment;
fig. 5 is a second schematic structural diagram of the terminal shown in fig. 4.
Detailed Description
The following description of the embodiments of the present application is provided for illustrative purposes, and other advantages and capabilities of the present application will become apparent to those skilled in the art from the present disclosure.
In the following description, reference is made to the accompanying drawings that describe several embodiments of the application. It is to be understood that other embodiments may be utilized and that mechanical, structural, electrical, and operational changes may be made without departing from the spirit and scope of the present application. The following detailed description is not to be taken in a limiting sense. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
Although the terms first, second, etc. may be used herein to describe various elements in some instances, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
First embodiment
Fig. 1 is a flowchart illustrating a communication connection according to the first embodiment. Referring to fig. 1, the method for communication connection of the present embodiment includes:
and 110, the first terminal creates the wireless hotspot and the first port information, encrypts the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule, and generates and displays a corresponding graphic code.
The first terminal is a creation terminal of a local area network, the wireless hotspot is a WIFI hotspot for example, and when the wireless hotspot is created, information such as a corresponding hotspot name and a hotspot password is configured as a connection parameter of the wireless hotspot so as to be searched and accessed by other terminals. The first port information is port information used by the first terminal for realizing data communication with other terminals, and includes a network address (IP) and a port number of the first terminal, and when Java is used as a realization language, a process of creating the first port information is also a process of creating a ServerSocket.
After the wireless hotspot and the first port information are created, the first port information and the connection parameters of the wireless hotspot are encrypted in a specified encryption mode, and the ciphertext is generated into a two-dimensional code or other graphic codes to be displayed for other equipment to scan codes to obtain.
During actual implementation, the first terminal creates the wireless hotspot and the first port information, encrypts the first port information and the connection parameter of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code, and includes:
the first terminal runs a first preset application;
when the first preset application receives the operation of establishing the local area network, establishing wireless hot spot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule corresponding to the first preset application;
and generating a corresponding graphic code and displaying the graphic code on a preset interface of a first preset application.
The first preset application is, for example, a shared player, and may be a system application or a third-party application downloaded by a user, and a code of the first preset application includes an encryption rule for encrypting the first port information and the connection parameter of the wireless hotspot, so that the wireless hotspot and the first port information may be directly created when the first preset application is used, and the information is encrypted in a specific encryption manner, and the first port information is used to implement data communication between the first preset application and a corresponding application in another terminal. And after encryption is finished, displaying a corresponding graphic code on a preset interface of the first preset application, and prompting a user to provide an object needing to join in a sharing activity for code scanning.
And step 120, at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule, acquires the connection parameter and the first port information, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information.
The number of the second terminals is one, two or more, the second terminals are decrypted through the code scanning graphic code, and a local area network communication system is established with the first terminals. The preset decryption rule and the preset encryption rule are corresponding rules, after the connection parameter and the first port information are obtained through decryption, the wireless hotspot of the first terminal is connected according to the connection parameter, and then communication connection is established with the first terminal according to the first port information, so that data communication is achieved.
During actual implementation, at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule and acquires the connection parameter and the first port information, including:
at least one second terminal runs a second preset application, and the second preset application and the first preset application are the same application;
when the second preset application receives the operation of joining the local area network, displaying a code scanning interface;
and after scanning the graphic code, decrypting the graphic code according to a preset decryption rule corresponding to a second preset application and acquiring the connection parameter and the first port information.
The second preset application and the first preset application are the same application, for example, the same shared player, which may be a system application or a third-party application downloaded by a user, and a code of the second preset application includes a decryption rule for decrypting the first port information and the connection parameter of the wireless hotspot, so that when the second preset application is used, the connection parameter of the wireless hotspot and the first port information are obtained through direct code scanning decryption, and then an activity is added.
In this embodiment, the step 120 of establishing, by the second terminal, a communication connection with the first terminal according to the first port information includes:
the at least one second terminal sends a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
the first terminal stores the second port information and sends response information of successful connection to at least one second terminal.
After the network connection is established, because the graphic code contains the first port information, the second terminal can directly send a port connection request to the first terminal according to the first port information, the port connection request comprises the second port information established by at least one second terminal, then, the first terminal stores the second port information and sends response information of successful connection to at least one second terminal, and the preparation work of bidirectional communication is completed, so that the connection speed is higher. The second port information is port information used by the second terminal to realize data communication with other terminals, and includes a network address (IP) and a port number of the second terminal, and when Java is used as a realization language, a process of creating the second port information is also a process of creating a ServerSocket.
In this embodiment, since the port connection request is first sent to the first terminal by the second terminal, the second terminal can be in an active position in the interactive process, so as to provide more choices for the second terminal user. In the process of bidirectional communication, the second terminal may send a network request to the ServerSocket of the first terminal, the first terminal executes the corresponding processing logic and sends response information to the second terminal after receiving the request, the first terminal may also send a network request to the ServerSocket of the second terminal, and the second terminal executes the corresponding processing logic and sends response information to the first terminal after receiving the request. The local area network communication between the first terminal and the second terminal includes functions not limited to bidirectional file transmission, bidirectional instant message transmission, time synchronization between devices, and operation sharing of similar remote control functions. By encrypting the graphic code and combining the Serversocket verification mode, the connection safety is effectively improved.
Further, the communication connection may further include:
monitoring whether the preset application exits from running or not by at least one second terminal;
and if so, disconnecting the network connection with the first terminal.
The preset application includes, but is not limited to, the first preset application or the second preset application, and when the preset application is monitored to exit from operation, the second terminal disconnects the network connection with the first terminal, so that the second terminal can be prevented from continuing to use the traffic of the first terminal when the preset application is not used, normal communication between the first terminal and other terminals is influenced, and traffic consumption is reduced.
Further, the communication connection may further include:
a first terminal monitors a device connection list of a wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
The first terminal monitors a device list connected with the hot spot of the first terminal in a polling mode after the wireless hot spot is created, and if abnormal devices are monitored, the abnormal devices are forbidden to be connected if the abnormal devices include devices which are not communicated with a server socket created by the first terminal or devices with abnormal information during communication with the server socket, so that the phenomenon that two-dimensional code information is cracked maliciously and network rubbing and other risks are avoided.
In the communication connection method of this embodiment, a first terminal creates wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule to generate and display a corresponding graphic code, then, at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule and acquires the connection parameters and the first port information, connects the wireless hotspot of the first terminal according to the connection parameters, and establishes communication connection with the first terminal according to the first port information. By the method, when the communication connection between the multiple terminals is established, the graphic code comprises the first port information and the connection parameters of the wireless hotspot and the like and is encrypted, so that the connection speed and the connection safety can be improved.
In addition, communication between terminals is carried out through the wireless hot spot, the application range is wide, the connection stability is high, the transmission distance is long, connection is carried out through scanning graphic codes, graphic code information comprises connection parameters and port information and is encrypted, the method is fast, efficient and safe, malicious linking of other equipment is not prone to occurring, the first terminal is connected through timing detection, abnormal equipment is prevented from being connected, and the risk of the graphic code information being maliciously cracked is further reduced.
Second embodiment
Fig. 2 is a flow chart illustrating a communication connection according to a second embodiment. Referring to fig. 2, the method for communication connection of the present embodiment is applied to a first terminal, and includes:
and step 230, displaying the graphic code for the at least one second terminal to scan, so that the at least one second terminal decrypts the graphic code according to a preset decryption rule and obtains the connection parameter and the first port information after scanning the graphic code, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information.
During actual implementation, the first terminal creates the wireless hotspot and the first port information, encrypts the first port information and the connection parameter of the wireless hotspot according to a preset encryption rule, and generates and displays a corresponding graphic code on a first preset application. After the first terminal runs the first preset application, when the first preset application receives an operation of creating a local area network, the wireless hotspot and the first port information are created, the first port information and the connection parameters of the wireless hotspot are encrypted according to a preset encryption rule corresponding to the first preset application, a corresponding graphic code is generated, and the graphic code is displayed on a preset interface of the first preset application.
In one embodiment, step 230 includes:
receiving a port connection request sent by at least one second terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and storing the second port information and sending response information of successful connection to at least one second terminal.
In one embodiment, the method further comprises the following steps:
monitoring a device connection list of wireless hotspots;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
The specific implementation process of the method of this embodiment is described in detail in the related description of the first embodiment, and is not described herein again.
According to the communication connection method, communication between the terminals is carried out through the wireless hot spot, the application range is wide, the connection stability is high, the transmission distance is long, connection is carried out through scanning the graphic codes, the graphic code information comprises the connection parameters and the port information and is encrypted, the method is fast, efficient and safe, malicious linking by other equipment is not prone to happen, the first terminal is connected through timing detection, abnormal equipment is prevented from being connected, and the risk that the graphic code information is maliciously cracked is further reduced.
Third embodiment
Fig. 3 is a flowchart illustrating a communication connection according to the third embodiment. Referring to fig. 3, the method for communication connection of the present embodiment, applied to a second terminal, includes:
and step 340, establishing communication connection with the first terminal according to the first port information.
During actual implementation, the process of scanning the graphic code, decrypting the graphic code according to the preset decryption rule and acquiring the connection parameter and the first port information is performed based on a second preset application. And the second terminal runs a second preset application, the second preset application is the same as the first preset application in the second embodiment, when the second preset application receives the operation of joining the local area network, a code scanning interface is displayed, and after the graphic code is scanned, the graphic code is decrypted according to a preset decryption rule corresponding to the second preset application and the connection parameter and the first port information are obtained.
In one embodiment, step 340 includes:
and sending a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the second terminal, so that the first terminal stores the second port information and sends response information of successful connection to the second terminal.
In one embodiment, the method further comprises the following steps:
monitoring whether the preset application exits from running;
and if so, disconnecting the network connection with the first terminal.
The specific implementation process of the method of this embodiment is described in detail in the related description of the first embodiment, and is not described herein again.
According to the communication connection method, communication between the terminals is carried out through the wireless hot spot, the application range is wide, the connection stability is high, the transmission distance is long, connection is carried out through scanning the graphic codes, the graphic code information comprises the connection parameters and the port information and is encrypted, the method is fast, efficient and safe, malicious linking by other equipment is not prone to happen, the first terminal is connected through timing detection, abnormal equipment is prevented from being connected, and the risk that the graphic code information is maliciously cracked is further reduced.
Fourth embodiment
Fig. 4 is one of the structural diagrams of the terminal shown according to the fourth embodiment. Referring to fig. 4, the terminal 10 of the present embodiment includes a memory 102 and a processor 106, the memory 102 is used for storing at least one program instruction, and the processor 106 is used for implementing the communication connection of the above embodiments by loading and executing the at least one program instruction.
Referring to fig. 5, in actual implementation, the terminal 10 includes a memory 102, a memory controller 104, one or more processors 106 (only one of which is shown), a peripheral interface 108, a radio frequency module 150, a positioning module 112, a camera module 114, an audio module 116, a screen 118, and a key module 160. These components communicate with each other via one or more communication buses/signal lines 122.
It will be appreciated that the configuration shown in FIG. 5 is merely illustrative and that terminal 10 may include more or fewer components than shown in FIG. 5 or may have a different configuration than shown in FIG. 5. The components shown in fig. 5 may be implemented in hardware, software, or a combination thereof.
The memory 102 may be used for storing software programs and modules, such as program instructions/modules corresponding to the communication connection in the embodiment of the present application, and the processor 106 executes various functional applications and data processing by executing the software programs and modules stored in the storage controller 104, so as to implement the communication connection.
The memory 102 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 102 may further include memory located remotely from the processor 106, which may be connected to the terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. Access to the memory 102 by the processor 106, and possibly other components, may be under the control of the memory controller 104.
In some embodiments, the peripheral interface 108, the processor 106, and the memory controller 104 may be implemented in a single chip. In other examples, they may be implemented separately from the individual chips.
The rf module 150 is used for receiving and transmitting electromagnetic waves, and implementing interconversion between the electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices. Rf module 150 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The rf module 150 may communicate with various networks such as the internet, an intranet, a wireless network, or with other devices via a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. The Wireless network may use various Communication standards, protocols, and technologies, including, but not limited to, Global System for Mobile Communication (GSM), Enhanced Data GSM Environment (EDGE), wideband Code division multiple Access (W-CDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), bluetooth, Wireless Fidelity (WiFi) (e.g., Institute of Electrical and Electronics Engineers (IEEE) standard IEEE802.11 a, IEEE802.11 b, IEEE 802.2.1 g, and/or IEEE802.11 n), Voice over Internet Protocol (VoIP), world wide Internet Microwave Access (Microwave for Wireless Communication), other suitable protocols for short message service (Max), and any other suitable Communication protocols, and may even include those protocols that have not yet been developed.
The positioning module 112 is used for acquiring the current position of the terminal 10. Examples of the positioning module 112 include, but are not limited to, a global positioning satellite system (GPS), a wireless local area network-based positioning technology, or a mobile communication network-based positioning technology.
The camera module 114 is used to take a picture or video. The pictures or videos taken may be stored in the memory 102 and transmitted through the radio frequency module 150.
The screen 118 provides an output interface between the terminal 10 and the user. In particular, screen 118 displays video output to the user, the content of which may include text, graphics, video, and any combination thereof. Some of the output results are for some of the user interface objects. It is understood that the screen 118 may also include a touch screen. The touch screen provides both an output and an input interface between the terminal 10 and a user. In addition to displaying video output to users, touch screens also receive user input, such as user clicks, swipes, and other gesture operations, so that user interface objects respond to these user input. The technique of detecting user input may be based on resistive, capacitive, or any other possible touch detection technique. Specific examples of touch screen display units include, but are not limited to, liquid crystal displays or light emitting polymer displays.
The key module 160 also provides an interface for user input to the terminal 10, and the user can press different keys to cause the terminal 10 to perform different functions.
The present application further provides a computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by the processor, implement the communication connections as above.
In actual implementation, the computer storage medium is applied to the terminal shown in fig. 4 or fig. 5, so that connection speed and connection security can be improved.
The above embodiments are merely illustrative of the principles and utilities of the present application and are not intended to limit the application. Any person skilled in the art can modify or change the above-described embodiments without departing from the spirit and scope of the present application. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical concepts disclosed in the present application shall be covered by the claims of the present application.
Claims (14)
1. A method of communication connection, comprising:
the method comprises the steps that a first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code;
and at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule and acquires the connection parameter and the first port information, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information.
2. The method according to claim 1, wherein the first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code, and includes:
the first terminal runs a first preset application;
when the first preset application receives the operation of establishing the local area network, establishing wireless hot spot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule corresponding to the first preset application;
and generating a corresponding graphic code and displaying the graphic code on a preset interface of the first preset application.
3. The method according to claim 2, wherein the scanning of the graphic code by the at least one second terminal, the decryption of the graphic code according to a preset decryption rule, and the obtaining of the connection parameter and the first port information comprise:
the at least one second terminal runs a second preset application, and the second preset application and the first preset application are the same application;
when the second preset application receives an operation of joining the local area network, displaying a code scanning interface;
and after scanning the graphic code, decrypting the graphic code according to a preset decryption rule corresponding to the second preset application and acquiring the connection parameter and the first port information.
4. The method of claim 1, further comprising:
the at least one second terminal monitors whether the preset application quits running or not;
and if so, disconnecting the network connection with the first terminal.
5. The method of claim 1, wherein the establishing a communication connection with the first terminal according to the first port information comprises:
the at least one second terminal sends a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and the first terminal stores the second port information and sends response information of successful connection to the at least one second terminal.
6. The method of claim 1, further comprising:
the first terminal monitors a device connection list of the wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
7. A method for communication connection applied to a first terminal, comprising:
creating wireless hotspot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule to generate a corresponding graphic code;
and displaying the graphic code for scanning by at least one second terminal, decrypting the graphic code according to a preset decryption rule and acquiring the connection parameter and the first port information after the at least one second terminal scans the graphic code, connecting a wireless hotspot of the first terminal according to the connection parameter, and establishing communication connection between the at least one second terminal and the first terminal according to the first port information.
8. The method of claim 7, further comprising:
receiving a port connection request sent by the at least one second terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and storing the second port information and sending response information of successful connection to the at least one second terminal.
9. The method of claim 7, further comprising:
monitoring a device connection list of the wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
10. A method for communication connection applied to a second terminal, comprising:
scanning a graphic code displayed by a first terminal, wherein the graphic code is generated by encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule after the first terminal creates the wireless hotspot and the first port information;
decrypting the graphic code according to a preset decryption rule and acquiring the connection parameter and the first port information;
connecting the wireless hotspot of the first terminal according to the connection parameter;
and establishing communication connection with the first terminal according to the first port information.
11. The method of claim 10, wherein the establishing a communication connection with the first terminal according to the first port information comprises:
and sending a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the second terminal, so that the first terminal stores the second port information and sends response information of successful connection to the second terminal.
12. The method of claim 10, wherein the method further comprises:
monitoring whether the preset application exits from running;
and if so, disconnecting the network connection with the first terminal.
13. A terminal, characterized in that it comprises a memory for storing at least one program instruction and a processor for implementing the method of communication connection according to any of claims 7 to 12 by loading and executing the at least one program instruction.
14. A computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement a method of communication connection as claimed in any one of claims 7 to 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010196695.0A CN111479263A (en) | 2020-03-19 | 2020-03-19 | Communication connection method, terminal and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010196695.0A CN111479263A (en) | 2020-03-19 | 2020-03-19 | Communication connection method, terminal and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111479263A true CN111479263A (en) | 2020-07-31 |
Family
ID=71747950
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010196695.0A Pending CN111479263A (en) | 2020-03-19 | 2020-03-19 | Communication connection method, terminal and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111479263A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112399392A (en) * | 2020-09-30 | 2021-02-23 | 音数汇元(上海)智能科技有限公司 | Communication connection method, device, equipment and storage medium of home care terminal |
CN114040412A (en) * | 2021-11-09 | 2022-02-11 | 湖南新云网科技有限公司 | Method, device and equipment for establishing connection communication and readable storage medium |
CN114385262A (en) * | 2021-12-31 | 2022-04-22 | 北京康斯特仪表科技股份有限公司 | Communication parameter configuration method and data processing terminal |
-
2020
- 2020-03-19 CN CN202010196695.0A patent/CN111479263A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112399392A (en) * | 2020-09-30 | 2021-02-23 | 音数汇元(上海)智能科技有限公司 | Communication connection method, device, equipment and storage medium of home care terminal |
CN114040412A (en) * | 2021-11-09 | 2022-02-11 | 湖南新云网科技有限公司 | Method, device and equipment for establishing connection communication and readable storage medium |
CN114385262A (en) * | 2021-12-31 | 2022-04-22 | 北京康斯特仪表科技股份有限公司 | Communication parameter configuration method and data processing terminal |
CN114385262B (en) * | 2021-12-31 | 2024-05-17 | 北京康斯特仪表科技股份有限公司 | Communication parameter configuration method and data processing terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220303276A1 (en) | Network connection method, hotspot terminal and management terminal | |
US11627205B2 (en) | Information processing method and apparatus, communication device and storage medium | |
JP7204792B2 (en) | WI-FI hotspot connection method and terminal | |
WO2017198161A1 (en) | Network connection method, apparatus, storage medium, and terminal | |
EP3627777B1 (en) | Message transmission method and device, terminal and storage medium | |
CN105704837B (en) | Method and equipment for establishing wireless connection | |
US20150256352A1 (en) | Method and device for sharing content between different terminals | |
CN107567017B (en) | Wireless connection system, device and method | |
CN111479263A (en) | Communication connection method, terminal and computer storage medium | |
CN104333643B (en) | Add the method for contact person, system and terminal | |
CN109886010B (en) | Verification picture sending method, verification picture synthesizing method and device, storage medium and terminal | |
KR20140113253A (en) | Method of application connection for devices in a network | |
CN113840266A (en) | Bluetooth pairing method, device, system, electronic equipment and storage medium | |
KR20140128764A (en) | Method for connectivity information control and an electronic device thereof | |
CN103413091B (en) | The method for supervising of malicious act and device | |
CN105704106A (en) | Visualization IVR realization method and mobile terminal | |
KR100789668B1 (en) | Mobile communications terminal having both general communication mode and secret communication service mode | |
CN112866995B (en) | Connection method, device, electronic equipment and storage medium | |
KR20150129082A (en) | Apparatus and method for link setting using electrolic-field | |
US12074848B2 (en) | Efficient and secure universal/app links | |
WO2019051647A1 (en) | Method for sharing wifi password, first terminal, second terminal, and system | |
WO2023005898A1 (en) | Multi-terminal joint session management method, network side device and terminal | |
CN116782234B (en) | WiFi connection method and related equipment | |
CN111090894B (en) | Method and device for reconstructing data of lock card | |
WO2023202631A1 (en) | Subscription method and apparatus, and communication device, internet of things device and network element |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |