CN111479263A - Communication connection method, terminal and computer storage medium - Google Patents

Communication connection method, terminal and computer storage medium Download PDF

Info

Publication number
CN111479263A
CN111479263A CN202010196695.0A CN202010196695A CN111479263A CN 111479263 A CN111479263 A CN 111479263A CN 202010196695 A CN202010196695 A CN 202010196695A CN 111479263 A CN111479263 A CN 111479263A
Authority
CN
China
Prior art keywords
terminal
connection
port information
graphic code
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010196695.0A
Other languages
Chinese (zh)
Inventor
谭成龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Shenzhen Transsion Holdings Co Ltd
Original Assignee
Shenzhen Microphone Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Microphone Holdings Co Ltd filed Critical Shenzhen Microphone Holdings Co Ltd
Priority to CN202010196695.0A priority Critical patent/CN111479263A/en
Publication of CN111479263A publication Critical patent/CN111479263A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to a communication connection method, a terminal and a computer storage medium, wherein the communication connection method comprises the following steps: the method comprises the steps that a first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code; the at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule, acquires the connection parameter and the first port information, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information. When the communication connection between the multiple terminals is established, the graphic code comprises the first port information and the connection parameters of the wireless hotspot and the like, and is encrypted, so that the connection speed and the connection safety can be improved.

Description

Communication connection method, terminal and computer storage medium
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a communication connection method, a terminal, and a computer storage medium.
Background
With the rapid development of terminal technology, the functions of mobile terminals such as mobile phones and tablet computers are also improved, and the mobile terminals become one of the common tools in daily life and work.
The communication connection based on the local area network is established among the multiple terminals, so that data transmission among the terminals is faster and safer, however, the used parameters are not encrypted in the existing connection process, the local area network is possibly maliciously connected by other equipment, and even information leakage risks occur, and the mode for acquiring port information in the existing connection process is complex and the connection speed is slower.
Disclosure of Invention
In view of the above technical problems, the present application provides a communication connection method, a terminal and a computer storage medium, which can improve connection speed and connection security.
In order to solve the above technical problem, the present application provides a method for communication connection, including:
the method comprises the steps that a first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code;
and at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule and acquires the connection parameter and the first port information, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information.
The method includes the steps that the first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code, and includes the following steps:
the first terminal runs a first preset application;
when the first preset application receives the operation of establishing the local area network, establishing wireless hot spot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule corresponding to the first preset application;
and generating a corresponding graphic code and displaying the graphic code on a preset interface of the first preset application.
The scanning of the graphic code by the at least one second terminal, the decryption of the graphic code according to a preset decryption rule and the acquisition of the connection parameter and the first port information by the at least one second terminal include:
the at least one second terminal runs a second preset application, and the second preset application and the first preset application are the same application;
when the second preset application receives an operation of joining the local area network, displaying a code scanning interface;
and after scanning the graphic code, decrypting the graphic code according to a preset decryption rule corresponding to the second preset application and acquiring the connection parameter and the first port information.
Wherein, the method further comprises:
the at least one second terminal monitors whether the preset application quits running or not;
and if so, disconnecting the network connection with the first terminal.
Wherein, the establishing communication connection with the first terminal according to the first port information includes:
the at least one second terminal sends a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and the first terminal stores the second port information and sends response information of successful connection to the at least one second terminal.
Wherein, the method further comprises:
the first terminal monitors a device connection list of the wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
The application also provides a communication connection method, which is applied to the first terminal and comprises the following steps:
creating wireless hotspot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule to generate a corresponding graphic code;
and displaying the graphic code for scanning by at least one second terminal, decrypting the graphic code according to a preset decryption rule and acquiring the connection parameter and the first port information after the at least one second terminal scans the graphic code, connecting a wireless hotspot of the first terminal according to the connection parameter, and establishing communication connection between the at least one second terminal and the first terminal according to the first port information.
The method applied to the first terminal further comprises the following steps:
receiving a port connection request sent by the at least one second terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and storing the second port information and sending response information of successful connection to the at least one second terminal.
The method applied to the first terminal further comprises the following steps:
monitoring a device connection list of the wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
The application also provides a communication connection method, which is applied to a second terminal and comprises the following steps:
scanning a graphic code displayed by a first terminal, wherein the graphic code is generated by encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule after the first terminal creates the wireless hotspot and the first port information;
decrypting the graphic code according to a preset decryption rule and acquiring the connection parameter and the first port information;
connecting the wireless hotspot of the first terminal according to the connection parameter;
and establishing communication connection with the first terminal according to the first port information.
In the method applied to the second terminal, the establishing a communication connection with the first terminal according to the first port information includes:
and sending a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the second terminal, so that the first terminal stores the second port information and sends response information of successful connection to the second terminal.
The method applied to the second terminal further comprises the following steps:
monitoring whether the preset application exits from running;
and if so, disconnecting the network connection with the first terminal.
The application also provides a terminal, which comprises a memory and a processor, wherein the memory is used for storing at least one program instruction, and the processor is used for realizing the operation control method of the application by loading and executing the at least one program instruction.
The present application further provides a computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement a method of controlling the operation of an application as described above.
As described above, the method, terminal and computer storage medium for communication connection according to the present invention have the following advantageous effects:
the method comprises the steps that a first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code, then, at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule, acquires the connection parameters and the first port information, connects the wireless hotspot of the first terminal according to the connection parameters, and establishes communication connection with the first terminal according to the first port information. By the method, when the communication connection between the multiple terminals is established, the graphic code comprises the first port information and the connection parameters of the wireless hotspot and the like and is encrypted, so that the connection speed and the connection safety can be improved.
Drawings
Fig. 1 is a schematic flow chart of a communication connection shown according to a first embodiment;
fig. 2 is a schematic flow chart of a communication connection shown according to a second embodiment;
fig. 3 is a flowchart illustrating a communication connection according to the third embodiment.
Fig. 4 is one of the schematic structural diagrams of a terminal shown according to the fourth embodiment;
fig. 5 is a second schematic structural diagram of the terminal shown in fig. 4.
Detailed Description
The following description of the embodiments of the present application is provided for illustrative purposes, and other advantages and capabilities of the present application will become apparent to those skilled in the art from the present disclosure.
In the following description, reference is made to the accompanying drawings that describe several embodiments of the application. It is to be understood that other embodiments may be utilized and that mechanical, structural, electrical, and operational changes may be made without departing from the spirit and scope of the present application. The following detailed description is not to be taken in a limiting sense. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
Although the terms first, second, etc. may be used herein to describe various elements in some instances, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
First embodiment
Fig. 1 is a flowchart illustrating a communication connection according to the first embodiment. Referring to fig. 1, the method for communication connection of the present embodiment includes:
and 110, the first terminal creates the wireless hotspot and the first port information, encrypts the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule, and generates and displays a corresponding graphic code.
The first terminal is a creation terminal of a local area network, the wireless hotspot is a WIFI hotspot for example, and when the wireless hotspot is created, information such as a corresponding hotspot name and a hotspot password is configured as a connection parameter of the wireless hotspot so as to be searched and accessed by other terminals. The first port information is port information used by the first terminal for realizing data communication with other terminals, and includes a network address (IP) and a port number of the first terminal, and when Java is used as a realization language, a process of creating the first port information is also a process of creating a ServerSocket.
After the wireless hotspot and the first port information are created, the first port information and the connection parameters of the wireless hotspot are encrypted in a specified encryption mode, and the ciphertext is generated into a two-dimensional code or other graphic codes to be displayed for other equipment to scan codes to obtain.
During actual implementation, the first terminal creates the wireless hotspot and the first port information, encrypts the first port information and the connection parameter of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code, and includes:
the first terminal runs a first preset application;
when the first preset application receives the operation of establishing the local area network, establishing wireless hot spot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule corresponding to the first preset application;
and generating a corresponding graphic code and displaying the graphic code on a preset interface of a first preset application.
The first preset application is, for example, a shared player, and may be a system application or a third-party application downloaded by a user, and a code of the first preset application includes an encryption rule for encrypting the first port information and the connection parameter of the wireless hotspot, so that the wireless hotspot and the first port information may be directly created when the first preset application is used, and the information is encrypted in a specific encryption manner, and the first port information is used to implement data communication between the first preset application and a corresponding application in another terminal. And after encryption is finished, displaying a corresponding graphic code on a preset interface of the first preset application, and prompting a user to provide an object needing to join in a sharing activity for code scanning.
And step 120, at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule, acquires the connection parameter and the first port information, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information.
The number of the second terminals is one, two or more, the second terminals are decrypted through the code scanning graphic code, and a local area network communication system is established with the first terminals. The preset decryption rule and the preset encryption rule are corresponding rules, after the connection parameter and the first port information are obtained through decryption, the wireless hotspot of the first terminal is connected according to the connection parameter, and then communication connection is established with the first terminal according to the first port information, so that data communication is achieved.
During actual implementation, at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule and acquires the connection parameter and the first port information, including:
at least one second terminal runs a second preset application, and the second preset application and the first preset application are the same application;
when the second preset application receives the operation of joining the local area network, displaying a code scanning interface;
and after scanning the graphic code, decrypting the graphic code according to a preset decryption rule corresponding to a second preset application and acquiring the connection parameter and the first port information.
The second preset application and the first preset application are the same application, for example, the same shared player, which may be a system application or a third-party application downloaded by a user, and a code of the second preset application includes a decryption rule for decrypting the first port information and the connection parameter of the wireless hotspot, so that when the second preset application is used, the connection parameter of the wireless hotspot and the first port information are obtained through direct code scanning decryption, and then an activity is added.
In this embodiment, the step 120 of establishing, by the second terminal, a communication connection with the first terminal according to the first port information includes:
the at least one second terminal sends a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
the first terminal stores the second port information and sends response information of successful connection to at least one second terminal.
After the network connection is established, because the graphic code contains the first port information, the second terminal can directly send a port connection request to the first terminal according to the first port information, the port connection request comprises the second port information established by at least one second terminal, then, the first terminal stores the second port information and sends response information of successful connection to at least one second terminal, and the preparation work of bidirectional communication is completed, so that the connection speed is higher. The second port information is port information used by the second terminal to realize data communication with other terminals, and includes a network address (IP) and a port number of the second terminal, and when Java is used as a realization language, a process of creating the second port information is also a process of creating a ServerSocket.
In this embodiment, since the port connection request is first sent to the first terminal by the second terminal, the second terminal can be in an active position in the interactive process, so as to provide more choices for the second terminal user. In the process of bidirectional communication, the second terminal may send a network request to the ServerSocket of the first terminal, the first terminal executes the corresponding processing logic and sends response information to the second terminal after receiving the request, the first terminal may also send a network request to the ServerSocket of the second terminal, and the second terminal executes the corresponding processing logic and sends response information to the first terminal after receiving the request. The local area network communication between the first terminal and the second terminal includes functions not limited to bidirectional file transmission, bidirectional instant message transmission, time synchronization between devices, and operation sharing of similar remote control functions. By encrypting the graphic code and combining the Serversocket verification mode, the connection safety is effectively improved.
Further, the communication connection may further include:
monitoring whether the preset application exits from running or not by at least one second terminal;
and if so, disconnecting the network connection with the first terminal.
The preset application includes, but is not limited to, the first preset application or the second preset application, and when the preset application is monitored to exit from operation, the second terminal disconnects the network connection with the first terminal, so that the second terminal can be prevented from continuing to use the traffic of the first terminal when the preset application is not used, normal communication between the first terminal and other terminals is influenced, and traffic consumption is reduced.
Further, the communication connection may further include:
a first terminal monitors a device connection list of a wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
The first terminal monitors a device list connected with the hot spot of the first terminal in a polling mode after the wireless hot spot is created, and if abnormal devices are monitored, the abnormal devices are forbidden to be connected if the abnormal devices include devices which are not communicated with a server socket created by the first terminal or devices with abnormal information during communication with the server socket, so that the phenomenon that two-dimensional code information is cracked maliciously and network rubbing and other risks are avoided.
In the communication connection method of this embodiment, a first terminal creates wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule to generate and display a corresponding graphic code, then, at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule and acquires the connection parameters and the first port information, connects the wireless hotspot of the first terminal according to the connection parameters, and establishes communication connection with the first terminal according to the first port information. By the method, when the communication connection between the multiple terminals is established, the graphic code comprises the first port information and the connection parameters of the wireless hotspot and the like and is encrypted, so that the connection speed and the connection safety can be improved.
In addition, communication between terminals is carried out through the wireless hot spot, the application range is wide, the connection stability is high, the transmission distance is long, connection is carried out through scanning graphic codes, graphic code information comprises connection parameters and port information and is encrypted, the method is fast, efficient and safe, malicious linking of other equipment is not prone to occurring, the first terminal is connected through timing detection, abnormal equipment is prevented from being connected, and the risk of the graphic code information being maliciously cracked is further reduced.
Second embodiment
Fig. 2 is a flow chart illustrating a communication connection according to a second embodiment. Referring to fig. 2, the method for communication connection of the present embodiment is applied to a first terminal, and includes:
step 210, creating wireless hotspot and first port information;
step 220, encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule to generate a corresponding graphic code;
and step 230, displaying the graphic code for the at least one second terminal to scan, so that the at least one second terminal decrypts the graphic code according to a preset decryption rule and obtains the connection parameter and the first port information after scanning the graphic code, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information.
During actual implementation, the first terminal creates the wireless hotspot and the first port information, encrypts the first port information and the connection parameter of the wireless hotspot according to a preset encryption rule, and generates and displays a corresponding graphic code on a first preset application. After the first terminal runs the first preset application, when the first preset application receives an operation of creating a local area network, the wireless hotspot and the first port information are created, the first port information and the connection parameters of the wireless hotspot are encrypted according to a preset encryption rule corresponding to the first preset application, a corresponding graphic code is generated, and the graphic code is displayed on a preset interface of the first preset application.
In one embodiment, step 230 includes:
receiving a port connection request sent by at least one second terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and storing the second port information and sending response information of successful connection to at least one second terminal.
In one embodiment, the method further comprises the following steps:
monitoring a device connection list of wireless hotspots;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
The specific implementation process of the method of this embodiment is described in detail in the related description of the first embodiment, and is not described herein again.
According to the communication connection method, communication between the terminals is carried out through the wireless hot spot, the application range is wide, the connection stability is high, the transmission distance is long, connection is carried out through scanning the graphic codes, the graphic code information comprises the connection parameters and the port information and is encrypted, the method is fast, efficient and safe, malicious linking by other equipment is not prone to happen, the first terminal is connected through timing detection, abnormal equipment is prevented from being connected, and the risk that the graphic code information is maliciously cracked is further reduced.
Third embodiment
Fig. 3 is a flowchart illustrating a communication connection according to the third embodiment. Referring to fig. 3, the method for communication connection of the present embodiment, applied to a second terminal, includes:
step 310, scanning a graphic code displayed by a first terminal, wherein the graphic code is generated by encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule after the first terminal creates the wireless hotspot and the first port information;
step 320, decrypting the graphic code according to a preset decryption rule and acquiring a connection parameter and first port information;
step 330, connecting the wireless hotspot of the first terminal according to the connection parameters;
and step 340, establishing communication connection with the first terminal according to the first port information.
During actual implementation, the process of scanning the graphic code, decrypting the graphic code according to the preset decryption rule and acquiring the connection parameter and the first port information is performed based on a second preset application. And the second terminal runs a second preset application, the second preset application is the same as the first preset application in the second embodiment, when the second preset application receives the operation of joining the local area network, a code scanning interface is displayed, and after the graphic code is scanned, the graphic code is decrypted according to a preset decryption rule corresponding to the second preset application and the connection parameter and the first port information are obtained.
In one embodiment, step 340 includes:
and sending a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the second terminal, so that the first terminal stores the second port information and sends response information of successful connection to the second terminal.
In one embodiment, the method further comprises the following steps:
monitoring whether the preset application exits from running;
and if so, disconnecting the network connection with the first terminal.
The specific implementation process of the method of this embodiment is described in detail in the related description of the first embodiment, and is not described herein again.
According to the communication connection method, communication between the terminals is carried out through the wireless hot spot, the application range is wide, the connection stability is high, the transmission distance is long, connection is carried out through scanning the graphic codes, the graphic code information comprises the connection parameters and the port information and is encrypted, the method is fast, efficient and safe, malicious linking by other equipment is not prone to happen, the first terminal is connected through timing detection, abnormal equipment is prevented from being connected, and the risk that the graphic code information is maliciously cracked is further reduced.
Fourth embodiment
Fig. 4 is one of the structural diagrams of the terminal shown according to the fourth embodiment. Referring to fig. 4, the terminal 10 of the present embodiment includes a memory 102 and a processor 106, the memory 102 is used for storing at least one program instruction, and the processor 106 is used for implementing the communication connection of the above embodiments by loading and executing the at least one program instruction.
Referring to fig. 5, in actual implementation, the terminal 10 includes a memory 102, a memory controller 104, one or more processors 106 (only one of which is shown), a peripheral interface 108, a radio frequency module 150, a positioning module 112, a camera module 114, an audio module 116, a screen 118, and a key module 160. These components communicate with each other via one or more communication buses/signal lines 122.
It will be appreciated that the configuration shown in FIG. 5 is merely illustrative and that terminal 10 may include more or fewer components than shown in FIG. 5 or may have a different configuration than shown in FIG. 5. The components shown in fig. 5 may be implemented in hardware, software, or a combination thereof.
The memory 102 may be used for storing software programs and modules, such as program instructions/modules corresponding to the communication connection in the embodiment of the present application, and the processor 106 executes various functional applications and data processing by executing the software programs and modules stored in the storage controller 104, so as to implement the communication connection.
The memory 102 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 102 may further include memory located remotely from the processor 106, which may be connected to the terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. Access to the memory 102 by the processor 106, and possibly other components, may be under the control of the memory controller 104.
Peripheral interface 108 couples various input/output devices to the CPU and memory 102. The processor 106 executes various software, instructions within the memory 102 to perform various functions of the terminal 10 and to perform data processing.
In some embodiments, the peripheral interface 108, the processor 106, and the memory controller 104 may be implemented in a single chip. In other examples, they may be implemented separately from the individual chips.
The rf module 150 is used for receiving and transmitting electromagnetic waves, and implementing interconversion between the electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices. Rf module 150 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The rf module 150 may communicate with various networks such as the internet, an intranet, a wireless network, or with other devices via a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. The Wireless network may use various Communication standards, protocols, and technologies, including, but not limited to, Global System for Mobile Communication (GSM), Enhanced Data GSM Environment (EDGE), wideband Code division multiple Access (W-CDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), bluetooth, Wireless Fidelity (WiFi) (e.g., Institute of Electrical and Electronics Engineers (IEEE) standard IEEE802.11 a, IEEE802.11 b, IEEE 802.2.1 g, and/or IEEE802.11 n), Voice over Internet Protocol (VoIP), world wide Internet Microwave Access (Microwave for Wireless Communication), other suitable protocols for short message service (Max), and any other suitable Communication protocols, and may even include those protocols that have not yet been developed.
The positioning module 112 is used for acquiring the current position of the terminal 10. Examples of the positioning module 112 include, but are not limited to, a global positioning satellite system (GPS), a wireless local area network-based positioning technology, or a mobile communication network-based positioning technology.
The camera module 114 is used to take a picture or video. The pictures or videos taken may be stored in the memory 102 and transmitted through the radio frequency module 150.
Audio module 116 provides an audio interface to a user that may include one or more microphones, one or more speakers, and audio circuitry. The audio circuitry receives audio data from the peripheral interface 108, converts the audio data to electrical information, and transmits the electrical information to the speaker. The speaker converts the electrical information into sound waves that the human ear can hear. The audio circuitry also receives electrical information from the microphone, converts the electrical information to voice data, and transmits the voice data to the peripheral interface 108 for further processing. The audio data may be retrieved from the memory 102 or through the radio frequency module 150. In addition, the audio data may also be stored in the memory 102 or transmitted through the radio frequency module 150. In some examples, the audio module 116 may also include an earphone jack for providing an audio interface to a headset or other device.
The screen 118 provides an output interface between the terminal 10 and the user. In particular, screen 118 displays video output to the user, the content of which may include text, graphics, video, and any combination thereof. Some of the output results are for some of the user interface objects. It is understood that the screen 118 may also include a touch screen. The touch screen provides both an output and an input interface between the terminal 10 and a user. In addition to displaying video output to users, touch screens also receive user input, such as user clicks, swipes, and other gesture operations, so that user interface objects respond to these user input. The technique of detecting user input may be based on resistive, capacitive, or any other possible touch detection technique. Specific examples of touch screen display units include, but are not limited to, liquid crystal displays or light emitting polymer displays.
The key module 160 also provides an interface for user input to the terminal 10, and the user can press different keys to cause the terminal 10 to perform different functions.
The present application further provides a computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by the processor, implement the communication connections as above.
In actual implementation, the computer storage medium is applied to the terminal shown in fig. 4 or fig. 5, so that connection speed and connection security can be improved.
The above embodiments are merely illustrative of the principles and utilities of the present application and are not intended to limit the application. Any person skilled in the art can modify or change the above-described embodiments without departing from the spirit and scope of the present application. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical concepts disclosed in the present application shall be covered by the claims of the present application.

Claims (14)

1. A method of communication connection, comprising:
the method comprises the steps that a first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code;
and at least one second terminal scans the graphic code, decrypts the graphic code according to a preset decryption rule and acquires the connection parameter and the first port information, connects the wireless hotspot of the first terminal according to the connection parameter, and establishes communication connection with the first terminal according to the first port information.
2. The method according to claim 1, wherein the first terminal creates a wireless hotspot and first port information, encrypts the first port information and connection parameters of the wireless hotspot according to a preset encryption rule, generates and displays a corresponding graphic code, and includes:
the first terminal runs a first preset application;
when the first preset application receives the operation of establishing the local area network, establishing wireless hot spot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule corresponding to the first preset application;
and generating a corresponding graphic code and displaying the graphic code on a preset interface of the first preset application.
3. The method according to claim 2, wherein the scanning of the graphic code by the at least one second terminal, the decryption of the graphic code according to a preset decryption rule, and the obtaining of the connection parameter and the first port information comprise:
the at least one second terminal runs a second preset application, and the second preset application and the first preset application are the same application;
when the second preset application receives an operation of joining the local area network, displaying a code scanning interface;
and after scanning the graphic code, decrypting the graphic code according to a preset decryption rule corresponding to the second preset application and acquiring the connection parameter and the first port information.
4. The method of claim 1, further comprising:
the at least one second terminal monitors whether the preset application quits running or not;
and if so, disconnecting the network connection with the first terminal.
5. The method of claim 1, wherein the establishing a communication connection with the first terminal according to the first port information comprises:
the at least one second terminal sends a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and the first terminal stores the second port information and sends response information of successful connection to the at least one second terminal.
6. The method of claim 1, further comprising:
the first terminal monitors a device connection list of the wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
7. A method for communication connection applied to a first terminal, comprising:
creating wireless hotspot and first port information;
encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule to generate a corresponding graphic code;
and displaying the graphic code for scanning by at least one second terminal, decrypting the graphic code according to a preset decryption rule and acquiring the connection parameter and the first port information after the at least one second terminal scans the graphic code, connecting a wireless hotspot of the first terminal according to the connection parameter, and establishing communication connection between the at least one second terminal and the first terminal according to the first port information.
8. The method of claim 7, further comprising:
receiving a port connection request sent by the at least one second terminal according to the first port information, wherein the port connection request comprises second port information created by the at least one second terminal;
and storing the second port information and sending response information of successful connection to the at least one second terminal.
9. The method of claim 7, further comprising:
monitoring a device connection list of the wireless hotspot;
determining abnormal equipment of which the communication parameters between the equipment connection list and the first terminal do not accord with preset conditions;
and disconnecting the network connection with the abnormal equipment.
10. A method for communication connection applied to a second terminal, comprising:
scanning a graphic code displayed by a first terminal, wherein the graphic code is generated by encrypting the first port information and the connection parameters of the wireless hotspot according to a preset encryption rule after the first terminal creates the wireless hotspot and the first port information;
decrypting the graphic code according to a preset decryption rule and acquiring the connection parameter and the first port information;
connecting the wireless hotspot of the first terminal according to the connection parameter;
and establishing communication connection with the first terminal according to the first port information.
11. The method of claim 10, wherein the establishing a communication connection with the first terminal according to the first port information comprises:
and sending a port connection request to the first terminal according to the first port information, wherein the port connection request comprises second port information created by the second terminal, so that the first terminal stores the second port information and sends response information of successful connection to the second terminal.
12. The method of claim 10, wherein the method further comprises:
monitoring whether the preset application exits from running;
and if so, disconnecting the network connection with the first terminal.
13. A terminal, characterized in that it comprises a memory for storing at least one program instruction and a processor for implementing the method of communication connection according to any of claims 7 to 12 by loading and executing the at least one program instruction.
14. A computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement a method of communication connection as claimed in any one of claims 7 to 12.
CN202010196695.0A 2020-03-19 2020-03-19 Communication connection method, terminal and computer storage medium Pending CN111479263A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010196695.0A CN111479263A (en) 2020-03-19 2020-03-19 Communication connection method, terminal and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010196695.0A CN111479263A (en) 2020-03-19 2020-03-19 Communication connection method, terminal and computer storage medium

Publications (1)

Publication Number Publication Date
CN111479263A true CN111479263A (en) 2020-07-31

Family

ID=71747950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010196695.0A Pending CN111479263A (en) 2020-03-19 2020-03-19 Communication connection method, terminal and computer storage medium

Country Status (1)

Country Link
CN (1) CN111479263A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112399392A (en) * 2020-09-30 2021-02-23 音数汇元(上海)智能科技有限公司 Communication connection method, device, equipment and storage medium of home care terminal
CN114040412A (en) * 2021-11-09 2022-02-11 湖南新云网科技有限公司 Method, device and equipment for establishing connection communication and readable storage medium
CN114385262A (en) * 2021-12-31 2022-04-22 北京康斯特仪表科技股份有限公司 Communication parameter configuration method and data processing terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112399392A (en) * 2020-09-30 2021-02-23 音数汇元(上海)智能科技有限公司 Communication connection method, device, equipment and storage medium of home care terminal
CN114040412A (en) * 2021-11-09 2022-02-11 湖南新云网科技有限公司 Method, device and equipment for establishing connection communication and readable storage medium
CN114385262A (en) * 2021-12-31 2022-04-22 北京康斯特仪表科技股份有限公司 Communication parameter configuration method and data processing terminal
CN114385262B (en) * 2021-12-31 2024-05-17 北京康斯特仪表科技股份有限公司 Communication parameter configuration method and data processing terminal

Similar Documents

Publication Publication Date Title
US20220303276A1 (en) Network connection method, hotspot terminal and management terminal
US11627205B2 (en) Information processing method and apparatus, communication device and storage medium
JP7204792B2 (en) WI-FI hotspot connection method and terminal
WO2017198161A1 (en) Network connection method, apparatus, storage medium, and terminal
EP3627777B1 (en) Message transmission method and device, terminal and storage medium
CN105704837B (en) Method and equipment for establishing wireless connection
US20150256352A1 (en) Method and device for sharing content between different terminals
CN107567017B (en) Wireless connection system, device and method
CN111479263A (en) Communication connection method, terminal and computer storage medium
CN104333643B (en) Add the method for contact person, system and terminal
CN109886010B (en) Verification picture sending method, verification picture synthesizing method and device, storage medium and terminal
KR20140113253A (en) Method of application connection for devices in a network
CN113840266A (en) Bluetooth pairing method, device, system, electronic equipment and storage medium
KR20140128764A (en) Method for connectivity information control and an electronic device thereof
CN103413091B (en) The method for supervising of malicious act and device
CN105704106A (en) Visualization IVR realization method and mobile terminal
KR100789668B1 (en) Mobile communications terminal having both general communication mode and secret communication service mode
CN112866995B (en) Connection method, device, electronic equipment and storage medium
KR20150129082A (en) Apparatus and method for link setting using electrolic-field
US12074848B2 (en) Efficient and secure universal/app links
WO2019051647A1 (en) Method for sharing wifi password, first terminal, second terminal, and system
WO2023005898A1 (en) Multi-terminal joint session management method, network side device and terminal
CN116782234B (en) WiFi connection method and related equipment
CN111090894B (en) Method and device for reconstructing data of lock card
WO2023202631A1 (en) Subscription method and apparatus, and communication device, internet of things device and network element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination