CN112135294A - Wireless encryption method and client terminal equipment thereof - Google Patents

Wireless encryption method and client terminal equipment thereof Download PDF

Info

Publication number
CN112135294A
CN112135294A CN202010996616.4A CN202010996616A CN112135294A CN 112135294 A CN112135294 A CN 112135294A CN 202010996616 A CN202010996616 A CN 202010996616A CN 112135294 A CN112135294 A CN 112135294A
Authority
CN
China
Prior art keywords
data
sensor
preset
sensing
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010996616.4A
Other languages
Chinese (zh)
Inventor
揭骏仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202010996616.4A priority Critical patent/CN112135294A/en
Publication of CN112135294A publication Critical patent/CN112135294A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application discloses a wireless encryption method and client terminal equipment, wherein the method comprises the following steps: acquiring induction data, wherein the induction data is generated based on a target object according to a sensor, and the target object is a living body; when the sensing data is judged to be preset target data, determining that a triggering condition is met; and generating a control signal based on the trigger condition to start the wireless encryption function of the client terminal equipment. Through the mode, the wireless encryption function can be effectively started, and the operation of a user is facilitated.

Description

Wireless encryption method and client terminal equipment thereof
Technical Field
The present application relates to the field of wireless internet access protection technologies, and in particular, to a wireless encryption method and a client terminal device.
Background
With the development of Customer Premise Equipment (CPE) and the popularization of smart home devices, the networking requirements of home devices are increasing, and more attention is paid to the protection of Wi-fi (wireless fidelity) to ensure that wireless network devices have certain security.
Therefore, Wi-Fi Protected Setup (WPS) is created, is an authentication project implemented by a Wi-Fi alliance organization, mainly aims to simplify the configuration work of wireless local area network installation and security performance, and aims to enable consumers to set wireless network equipment in a simpler mode.
The WPS key of the CPE at present is opened through a physical key to achieve a wireless encryption function, if the physical key is used, a concave part area is needed on a physical structure, the key is matched with the concave part area in a welding mode, and when the WPS key is opened or closed, the WPS key can be opened or closed by using mechanical strength to press the physical key.
Disclosure of Invention
A first aspect of an embodiment of the present application provides a wireless encryption method, including: acquiring induction data, wherein the induction data is generated based on a target object according to a sensor, and the target object is a living body; when the sensing data is judged to be preset target data, determining that a triggering condition is met; and generating a control signal based on the trigger condition to start the wireless encryption function of the client terminal equipment.
A second aspect of an embodiment of the present application provides a client terminal device, including: a sensor for sensing a target object, which is a living body, and generating sensing data based on the target object; a processor electrically connected to the sensor for generating a control signal in response to the sensed data; and the communication module is electrically connected with the processor and responds to the control signal to start the wireless encryption function.
The beneficial effect of this application is: different from the prior art, the method and the device have the advantages that the problem of starting the wireless encryption function of the current CPE is solved, the induction data are generated by inducing the target object, the induction data and the preset target data are judged to determine that the triggering condition is met, the control signal is generated based on the triggering condition, and then the wireless encryption function of the client terminal equipment is started. Therefore, by the mode of starting the wireless encryption function, the wireless encryption function of the client terminal equipment can be started through the target object, so that the wireless encryption function of the client terminal equipment is effectively started, the method for starting the wireless encryption function is simplified, and the operation of a user is facilitated.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a first embodiment of a wireless encryption method of the present application;
FIG. 2 is a flowchart illustrating an embodiment of step S12 of FIG. 1;
FIG. 3 is a flowchart illustrating an embodiment of step S22 of FIG. 2;
FIG. 4 is a schematic flow chart illustrating another embodiment of step S12 in FIG. 1;
FIG. 5 is a schematic circuit diagram of a first embodiment of a client terminal apparatus of the present application;
FIG. 6 is a schematic circuit diagram of one embodiment of the sensor of FIG. 1;
FIG. 7 is a circuit schematic of one embodiment of the processor of FIG. 1;
FIG. 8 is a schematic diagram of a CPE device according to the present application;
fig. 9 is a schematic structural diagram of another CPE device of the present application;
FIG. 10 is a schematic block diagram of one embodiment of a computer-readable storage medium of the present application;
fig. 11 is a diagram of a hardware framework of a mobile terminal of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples. A first embodiment of the present application provides a wireless encryption method, please refer to fig. 1, where fig. 1 is a schematic flowchart of the first embodiment of the wireless encryption method of the present application. The method specifically comprises the following steps:
s11: acquiring induction data;
generally, in order to acquire sensing data, a mobile terminal device is provided with a sensing area for arranging a sensor, and when a target object approaches the sensor or contacts the sensor of the sensing area, the sensor can sense the target object and convert a series of operations performed on the sensor by the target object into sensing data through the sensor. That is, sensing data may be generated based on the target object according to the sensor.
The obtained sensing data may be sound, light intensity, tapping strength, tapping frequency and the like, and of course, the type of the sensing data may be determined by other types known in the art by those skilled in the art.
The target object used here is a living body, and may be a human, for example, in order to distinguish it from a general target object.
S12: when the sensing data is judged to be preset target data, determining that a triggering condition is met;
generally, the client terminal device is preset with target data, which can be used to determine whether the sensing data meets the trigger condition. Of course, those skilled in the art can fully conceive of setting other target data and trigger conditions according to actual needs in the light of the teachings of the present application.
The sensing data acquired by the sensor is compared with the preset target data, and when the sensing data is judged to be the preset target data, the triggering condition can be determined to be met.
S13: and generating a control signal based on the trigger condition to start the wireless encryption function of the client terminal equipment.
Generally, turning on the wireless encryption function sets a mode such as turning on or off, for example, turning on the wireless encryption function of the client terminal device. When the trigger condition is satisfied, a control signal may be generated based on the trigger condition, thereby turning on the wireless encryption function of the client terminal device.
By the encryption method, not only can the Wi-Fi equipment and the wireless router which both have the WPS function be quickly interconnected, but also an 8-digit character string is randomly generated to serve as a Personal Identification Number (PIN) to be encrypted. The tedious processes of manually adding a network name (SSID) and inputting a lengthy wireless encryption password when the client needs to be connected to a wireless network are omitted.
Therefore, the wireless encryption function of the customer premise equipment is started by the method, the induction data is generated by inducing the target object, and the induction data and the preset target data are judged to determine that the triggering condition is met, so that the control signal is generated based on the triggering condition, and the wireless encryption function of the customer terminal equipment is started. Therefore, by the mode of starting the wireless encryption function, the wireless encryption function of the client terminal equipment can be started through the target object, so that the wireless encryption function of the client terminal equipment is effectively started, the method for starting the wireless encryption function is simplified, and the operation of a user is facilitated.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating an embodiment of step S12 in fig. 1. That is, when it is determined that the sensed data is the preset target data, it is determined that the trigger condition is satisfied, and the method specifically includes:
s21: performing matching fitting processing on the induction data to obtain first target data;
since the client terminal device acquires undifferentiated sensing data, which often includes ambient noise data, the sensing data generated for the target object often has a certain difference, so that in order to eliminate the ambient noise data in the sensing data, the client terminal device may perform matching and fitting processing on the acquired sensing data, thereby obtaining the first target data.
Wherein the first target data is corresponding fitting data generated by the target object. Specifically, the fitting method may be performed by using fitting software, or may be performed by using a fitting hardware tool, and in this step, the method is not limited, and is specifically determined according to an actual situation.
S22: and when the first target data is judged to be within the preset induction data range threshold value, the first target data is determined to be preset target data so as to determine that the triggering condition is met.
Aiming at the processing of the induction data, the client terminal equipment is preset with an induction data range threshold value used for comparing the induction data, and the environmental noise data is removed from the induction data in a fitting mode, so that the first target data can be obtained.
Further, the client terminal device presets target data, which can be used for judging whether the first target data meets the triggering condition; and when the first target data is judged to be within the preset induction data range threshold value, the first target data is determined to be preset target data so as to determine that the triggering condition is met.
Referring to fig. 3, fig. 3 is a flowchart illustrating an embodiment of step S22 in fig. 2. Namely: when the first target data is judged to be within the preset induction data range threshold, the first target data is determined to be preset target data so as to determine that the triggering condition is met, and the method specifically comprises the following steps:
s31: judging whether the first target data is within a preset induction data range threshold value or not;
the preset induction data range threshold may be preset according to an empirical value, for example, when the acquired induction data is sound data, illumination intensity data, tapping force data or tapping frequency data, and the target object is a person, the preset induction data range threshold may be a human voice threshold, a visible illumination intensity threshold, a tapping force threshold or a tapping frequency threshold. Of course, those skilled in the art can fully appreciate other sensing data range thresholds set according to actual needs in light of the teachings of this application.
By judging whether the first target data is within the preset induction data range threshold, it can be known that: if the sensing data is within the preset sensing data range threshold, the process proceeds to step S32: judging that the first target data is preset target data to determine that a trigger condition is met; if not, the process proceeds to step S33: and judging that the first target data is not preset target data to determine that the trigger condition is not met.
Referring to fig. 4, fig. 4 is a schematic flowchart illustrating another embodiment of step S12 in fig. 1. Acquiring sensing data, wherein the sensing data is generated based on a target object according to a sensor, and the method specifically comprises the following steps:
generally, the sensor includes at least one of a tap sensor, an image sensor, a fingerprint sensor, and a proximity sensor; when the sensor types are different, different sensing data can be acquired, such as:
acquiring knocking data, wherein the knocking data is generated based on a target object according to a knocking sensor, and the knocking data at least comprises one of knocking strength data and knocking times; or
Acquiring image data, the image data being generated based on a target object according to an image sensor; or
Acquiring fingerprint data, wherein the fingerprint data is generated based on a target object according to a fingerprint sensor; or
Position data is acquired, the position data being generated based on the target object according to the proximity sensor.
The WPS function starting circuit can be explained by taking CPE equipment as an example. The CPE device is a mobile signal access device that receives a mobile signal and forwards the mobile signal using a wireless WIFI signal, and is also a device that converts a high-speed 4G or 5G signal into a WIFI signal, and the number of CPE devices that can access the internet at the same time is also large. The CPE can be widely applied to wireless network access in rural areas, towns, hospitals, units, factories, cells and the like, and the cost for laying a wire network can be saved.
Furthermore, the sensor may further include a capacitive sensor, a capacitive sensing patch is disposed on the capacitive sensor, and the wireless encryption method further includes:
as known from the above, the CPE device may be provided with the sensor 11, and the sensor 11 is provided with a capacitance sensing piece (not shown), so that when a finger strikes the capacitance sensing piece, the CPE device may sense the finger striking through the capacitance sensing piece. And responding to the knocking, and generating a capacitance value corresponding to the knocking through the capacitance induction sheet.
Wherein be provided with sensing circuit among the sensor 11, use capacitive sensor as an example, the accessible is responded to capacitive sensor's receiving channel and is produced the response data, and this response data can be for the capacitance value that produces according to strikeing from sensor circuit 11, and capacitive sensor is connected to the electric capacity response piece, so can send the capacitance value to capacitive sensor through the transmission channel of electric capacity response piece for capacitive sensor acquires the response data, also is the capacitance value.
In addition, when the CPE device is provided with a tapping sensing acquisition function, the capacitance value generated by the finger joint in correspondence can be acquired by tapping data acquisition on the finger joint, and the capacitance value can be acquired by how many tapping times or the duration of the tapping times, which is not particularly limited herein.
It should be noted that the CPE device is configured to obtain the sensed data of the tapping in real time, and the sensed data is allowed to change in real time, i.e., the magnitude of the capacitance and the frequency of the capacitance may also change over time. Therefore, for the acquisition of the sensing data, different fingers, such as an index finger, a middle finger, and a little finger, may be used, or an object that enables the CPE device to recognize the sensing data, such as a silicone finger stall, may also be used to perform tapping, which is not limited herein.
Referring to fig. 4, fig. 4 is a schematic flowchart illustrating another embodiment of step S12 in fig. 1. When the sensing data is judged to be the preset target data, determining that the triggering condition is met, wherein the method specifically comprises the following steps:
s41: generating a capacitance sensing curve based on the capacitance value;
because the variety of knocking, therefore the capacitance value that customer terminal acquireed has a plurality ofly, and the user can set up the time threshold, fits the capacitance value in the certain time for based on capacitance value generation capacitance induction curve.
S42: and when the capacitance induction curve is judged to be located in a preset capacitance induction area, determining that the triggering condition is met.
The CPE device is preset with a capacitance sensing area, and when capacitance values corresponding to capacitance sensing curves are all located in the preset capacitance sensing area, the capacitance values are different from environmental noise from the beginning, so that when the capacitance sensing curves are determined to be located in the preset capacitance sensing area, the triggering conditions are determined to be met.
Specifically, the CPE device is provided with a preset capacitance threshold for determining whether the acquired sensing data meets a trigger condition for starting the WPS function. Based on the preset capacitance value, a characteristic algorithm can be adopted to perform matching and fitting processing on the sensing data, for example, a knocking detection algorithm can be adopted to perform matching and fitting processing on the preset capacitance and the obtained capacitance value.
In addition, generating a control signal based on the trigger condition to start the wireless encryption function of the client terminal device may specifically include: and generating a control signal by utilizing the capacitance value on the capacitance induction curve based on the condition of meeting the trigger condition so as to start the wireless encryption function.
Specifically, the preset capacitance threshold value and the acquired capacitance value are subjected to matching fitting processing, so that whether the induction data are target data or not is judged, when the capacitance value is within a preset capacitance value preset range, the capacitance value can be determined to be knocking data, namely when the capacitance value is determined to be data generated by knocking correspondingly, the triggering condition for triggering the WPS function to be started is determined to be met, and a control signal is generated to start or close the WPS function.
In this way, the application sets up a plurality of trigger conditions of opening the WPS function to knocking to the capacitance value that will knock and acquire is used for matching the fit with the preset capacitance value, can discern effectively that the capacitance value that knocks corresponds satisfies the trigger condition of opening the WPS function, can simplify the method of opening the WPS function.
Further, referring to fig. 5, fig. 5 is a circuit diagram of a client terminal device according to a first embodiment of the present application. A first embodiment of a WPS function starting circuit of the present application provides a WPS function starting circuit, the starting circuit 1 including: sensor 11, processor 12 and communication module 13, wherein the input of processor 12 is connected to the output of sensor 11, and the input of communication module 13 is connected to the output of processor 12.
The sensor 11 may be configured to sense a target object and generate corresponding sensing data according to the target object; the processor 12 is electrically connected with the sensor 11 and is used for responding to the sensing data to generate a corresponding control signal; and the communication module 13 is electrically connected with the processor 12 and responds to the control signal to start the wireless encryption function.
Therefore, according to the application, aiming at the problem of starting the WPS function of the current CPE, the induction data is generated by inducing the target object, and the induction data and the preset target data are judged to determine that the triggering condition is met, so that the control signal is generated based on the triggering condition, and the wireless encryption function of the client terminal equipment is started. Therefore, by the mode of starting the wireless encryption function, the wireless encryption function of the client terminal equipment can be started through the target object, so that the wireless encryption function of the client terminal equipment is effectively started, the method for starting the wireless encryption function is simplified, and the operation of a user is facilitated. Therefore, the user does not need to start the WPS function of the communication module by using the physical key, and the user does not need to press the physical key hard.
The processor 12 may be a Micro Control Unit (MCU), also called a Single Chip Microcomputer (Single Chip Microcomputer), or a Single Chip Microcomputer (Single Chip Microcomputer), and is a Chip-level computer formed by appropriately reducing the frequency and specification of a Central Processing Unit (CPU), and integrating peripheral interfaces such as a memory (memory), a counter (Timer), a USB, an a/D conversion, a UART, a PLC, a DMA, and even an LCD driving circuit on a Single Chip, so as to perform different combination control for different applications. Such as cell phones, PC peripherals, remote controls, to automotive electronics, industrial stepper motors, robotic arm controls, etc.
Referring to fig. 6, fig. 6 is a circuit diagram of an embodiment of the sensor of fig. 1. The sensor 11 includes: a sensing element 111 and a conversion element 112. The sensing element 111 may be disposed on the housing of the client terminal device 1, and is configured to sense a target object; and the conversion element 112 is connected with the sensing element 111 and is used for generating corresponding sensing data according to the target object.
In particular, for example, the sensing element 111 may be a capacitive sensing patch, and the converting element 112 may be a capacitive sensor. Since the customer premises equipment 1, that is, the CPE device 1, may be a cube, the capacitance sensing chip 111 is disposed on the top of the cube, as a top detection surface, and when the top of the CPE device 1 is knocked, the CPE device 1 is prevented from toppling over, and the output end of the capacitance sensing chip 111 is connected to the input end of the processor 12.
The capacitance induction sheet can be used for inducing knocking; the capacitance sensor is connected with the capacitance sensing sheet and used for generating a corresponding capacitance value according to knocking; the processor 12 is used for processing the capacitance value to obtain a corresponding control signal.
The processor 12 may further include a comparator connected to the capacitive sensor for comparing the capacitance value with a predetermined capacitance value to determine whether the capacitance value matches a predetermined threshold range of capacitance value, and if so, determining that the capacitance value is knock data.
In addition, for the processing of the obtained capacitance value, the processor 12 may further distinguish the difference between the effective area and other objects according to the generated dielectric constant for the capacitance sensing sheet corresponding to the capacitance value, so as to confirm that the capacitance value is hit by a finger; and comparing the preset capacitance waveform with the acquired capacitance change condition to determine whether the knocking action is performed.
It is noted that the sensor 12 may be a capacitive sensor, and may be one of a tap sensor, an image sensor, a fingerprint sensor, and a proximity sensor, which is not limited herein and is selected according to the type of the client terminal device.
Referring to fig. 7, fig. 7 is a circuit diagram illustrating an embodiment of the processor of fig. 1. The processor 12 includes: a receiving unit 121, a judging unit 122, and a control unit 123.
Specifically, the input end of the receiving unit 121 is connected to the output end of the sensor 11, the output end of the receiving unit 121 is connected to the input end of the judging unit 122, the output end of the judging unit 122 is connected to the input end of the control unit 123, and the output end of the control unit 123 is connected to the input end of the communication module 13.
The receiving unit 121 may be configured to receive sensing data; the determining unit 122 may be configured to determine whether the sensing data is tapping data, and if so, determine that the sensing data is tapping data; the control unit 123 is connected with the judging unit 122 and the communication module 13, and is used for controlling and generating a control signal based on the tapping data.
In addition, the sensors in the sensor 12 for sensing the tapping motion of the external user may generally include an acceleration sensor, a proximity optical sensor, a capacitance sensor, and the like, but since the CPE is a fixed device and has a large volume, it is found that the tapping motion cannot be effectively distinguished by using the motion sensor, and thus the capacitance sensor may be used to generate a corresponding capacitance value for sensing the tapping.
Wherein, communication module 13 is the wiFi communication module, and this wiFi communication module includes the wiFi module, when confirming for the action of strikeing, control circuit 123 can control the wiFi module and open the WPS function.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a CPE device according to an embodiment of the present disclosure. The embodiment of the present application provides a CPE device 2, including:
an acquisition module 21 configured to acquire sensing data, the sensing data being generated based on a target object according to a sensor, the target object being a living body;
the determining module 22 is connected to the obtaining module 21, and is configured to determine that the trigger condition is met when the sensing data is determined to be the preset target data;
and the control module 23 is connected with the determination module 22 and is used for generating a control signal based on the trigger condition so as to start the wireless encryption function of the client terminal equipment.
Therefore, by the mode of starting the wireless encryption function, the wireless encryption function of the client terminal equipment can be started through the target object, so that the wireless encryption function of the client terminal equipment is effectively started, the method for starting the wireless encryption function is simplified, and the operation of a user is facilitated. Therefore, the wireless encryption function of the client terminal equipment does not need to be started by using the physical key, and the user does not need to press the physical key hard.
Further, please refer to fig. 9, where fig. 9 is a schematic structural diagram of another CPE device according to an embodiment of the present application. An embodiment of the present application provides another CPE device 3, including: the processor 31, the memory 32, and the computer program 321 stored in the memory and running on the processor, where the processor 31 is configured to execute the computer program 321 to implement the steps of the method provided in the first aspect of the embodiment of the present application, and details are not described herein again.
Referring to FIG. 10, FIG. 10 is a schematic block diagram of one embodiment of a computer-readable storage medium of the present application. The computer program 801, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in the computer-readable storage medium 4. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage device and includes instructions (computer program 401) for causing a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. The aforementioned storage device includes: various media such as a usb disk, a portable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and electronic devices such as a computer, a mobile phone, a notebook computer, a tablet computer, and a camera having the storage medium.
For the description of the execution process of the program data in the device with the storage function, reference may be made to the above description of the method for starting the WPS function of the CPE device in this application, and details are not described here again.
Referring to fig. 11, fig. 11 is a schematic block diagram of a hardware architecture of a mobile terminal according to the present application, where the mobile terminal may be a smart watch, a mobile phone, a tablet computer, a notebook computer, a wearable device, and the like, and the CPE device is taken as an example in the embodiment. The terminal device 500 may include a Radio Frequency (RF) circuit 510, a memory 520, an input unit 530, a display unit 540, a sensor 550, an audio circuit 560, a wifi (wireless fidelity) module 570, a processor 580, a power supply 590, and the like. The RF circuit 510, the memory 520, the input unit 530, the display unit 540, the sensor 550, the audio circuit 560, and the WiFi module 570 are respectively connected to the processor 580; the power supply 590 serves to supply power to the entire terminal apparatus 500.
Specifically, the RF circuit 510 is used for transmitting and receiving signals; the memory 520 is used for storing data instruction information; the input unit 5530 is used for inputting information, and may specifically include a touch screen 531 and other input devices 532 such as operation keys; the display unit 540 may include a display panel and the like; the sensor 550 includes an infrared sensor, a laser sensor, etc. for detecting a user approach signal, a distance signal, etc.; a speaker 561 and a microphone (or microphone) 562 are connected to the processor 580 through the audio circuit 560 for emitting and receiving sound signals; the WiFi module 570 is configured to receive and transmit WiFi signals, and the processor 580 is configured to process data information of the CPE device.
The above description is only a part of the embodiments of the present application, and not intended to limit the scope of the present application, and all equivalent devices or equivalent processes performed by the content of the present application and the attached drawings, or directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A wireless encryption method, the method comprising:
acquiring sensing data, wherein the sensing data is generated based on a target object according to a sensor, and the target object is a living body;
when the sensing data is judged to be preset target data, determining that a triggering condition is met;
and generating a control signal based on the trigger condition so as to start the wireless encryption function of the client terminal equipment.
2. The method of claim 1, wherein determining that a trigger condition is satisfied when the sensed data is determined to be the preset target data comprises:
performing matching fitting processing on the induction data to obtain first target data;
and when the first target data is judged to be within the preset induction data range threshold value, determining that the first target data is preset target data so as to determine that the triggering condition is met.
3. The method of claim 2, wherein when the first target data is determined to be within a preset sensing data range threshold, determining that the first target data is a preset target data to determine that the trigger condition is met comprises:
judging whether the first target data is within a preset induction data range threshold value or not;
if the first target data is within the preset induction data range threshold, judging that the first target data is the preset target data so as to determine that a triggering condition is met;
and if the first target data is not within the preset induction data range threshold, judging that the first target data is not the preset target data so as to determine that the triggering condition is not met.
4. The method of claim 1, wherein the acquiring sensing data, the sensing data generated based on a target object according to a sensor, comprises:
acquiring knocking data, wherein the knocking data is generated based on a target object according to a knocking sensor, and the knocking data at least comprises one of knocking strength data and knocking times; or
Acquiring image data, the image data being generated based on a target object according to an image sensor; or
Acquiring fingerprint data, the fingerprint data being generated based on a target object according to a fingerprint sensor; or
Acquiring position data, the position data being generated based on a target object according to a proximity sensor;
wherein the sensor includes at least one of the tap sensor, the image sensor, the fingerprint sensor, and the proximity sensor.
5. The method of claim 4, wherein the sensor further comprises a capacitive sensor having a capacitive sensing patch disposed thereon, the method further comprising:
and responding to the knocking, and generating a capacitance value corresponding to the knocking through the capacitance induction sheet.
6. The method of claim 5, wherein determining that a trigger condition is satisfied when the sensed data is determined to be the preset target data comprises:
generating a capacitance sensing curve based on the capacitance value;
and when the capacitance induction curve is judged to be located in a preset capacitance induction area, determining that the triggering condition is met.
7. The method according to claim 6, wherein the generating a control signal to start a wireless encryption function of the client terminal device based on the trigger condition comprises:
and generating a control signal by utilizing the capacitance value on the capacitance induction curve based on the condition that the triggering condition is met so as to start the wireless encryption function.
8. A client terminal device, comprising:
a sensor for sensing a target object, the target object being a living body, and generating sensing data based on the target object;
a processor electrically connected to the sensor for generating a control signal in response to the sensed data;
and the communication module is electrically connected with the processor and responds to the control signal to start the wireless encryption function.
9. The client terminal device of claim 8, wherein the processor comprises:
the receiving unit is connected with the sensor and used for receiving the sensing data;
the judging unit is connected with the receiving unit and used for judging whether the induction data is knocking data or not, and if yes, the induction data is determined to be knocking data;
and the control unit is connected with the judging unit and the communication module and is used for controlling and generating a control signal based on the knocking data.
10. The client terminal device of claim 9, wherein the sensor comprises:
the sensitive element is arranged on the shell of the client terminal equipment and is used for sensing the target object;
and the conversion element is connected with the sensitive element and used for generating corresponding induction data according to the target object.
CN202010996616.4A 2020-09-21 2020-09-21 Wireless encryption method and client terminal equipment thereof Pending CN112135294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010996616.4A CN112135294A (en) 2020-09-21 2020-09-21 Wireless encryption method and client terminal equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010996616.4A CN112135294A (en) 2020-09-21 2020-09-21 Wireless encryption method and client terminal equipment thereof

Publications (1)

Publication Number Publication Date
CN112135294A true CN112135294A (en) 2020-12-25

Family

ID=73842094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010996616.4A Pending CN112135294A (en) 2020-09-21 2020-09-21 Wireless encryption method and client terminal equipment thereof

Country Status (1)

Country Link
CN (1) CN112135294A (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103227869A (en) * 2013-04-28 2013-07-31 广东欧珀移动通信有限公司 Mobile terminal and method for opening camera of mobile terminal
CN103645845A (en) * 2013-11-22 2014-03-19 华为终端有限公司 Knocking control method and terminal
CN104158962A (en) * 2014-08-01 2014-11-19 广州华多网络科技有限公司 Mobile terminal display screen control method and mobile terminal display screen control system
CN105204730A (en) * 2015-08-27 2015-12-30 广东欧珀移动通信有限公司 Screen control method and user terminal
CN105302245A (en) * 2015-11-05 2016-02-03 小米科技有限责任公司 Terminal with touch key
CN105592524A (en) * 2014-10-23 2016-05-18 中兴通讯股份有限公司 Method of connecting wireless access point by terminal, and corresponding terminal and corresponding wireless access point
CN106095492A (en) * 2016-05-31 2016-11-09 广东欧珀移动通信有限公司 The method for closing of a kind of application program and device
CN106648421A (en) * 2016-11-16 2017-05-10 武汉斗鱼网络科技有限公司 Intelligent device control method and intelligent device
CN106775296A (en) * 2016-11-25 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of terminal control method and device
CN107122112A (en) * 2017-03-16 2017-09-01 珠海市魅族科技有限公司 Using open method and device
CN107332547A (en) * 2017-06-13 2017-11-07 里程 Control method, mobile terminal and the computer-readable recording medium of sensor button
CN108156326A (en) * 2018-01-02 2018-06-12 京东方科技集团股份有限公司 A kind of method, system and device of automatic startup recording
CN108419234A (en) * 2018-02-08 2018-08-17 广州视源电子科技股份有限公司 Wi-Fi Hotspot WPS connection methods and device
CN108509127A (en) * 2018-03-29 2018-09-07 腾讯科技(深圳)有限公司 Start the method, apparatus and computer equipment of record screen task
CN108873676A (en) * 2018-08-08 2018-11-23 广东小天才科技有限公司 A kind of control method of smartwatch
WO2019218903A1 (en) * 2018-05-14 2019-11-21 北京字节跳动网络技术有限公司 Voice control method and device
CN111093134A (en) * 2019-12-23 2020-05-01 Oppo广东移动通信有限公司 Earphone control device, earphone control method and earphone
CN111629425A (en) * 2017-07-18 2020-09-04 成都佳锂科技有限公司 Power consumption control method and system of electronic positioning equipment and electronic positioning equipment

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103227869A (en) * 2013-04-28 2013-07-31 广东欧珀移动通信有限公司 Mobile terminal and method for opening camera of mobile terminal
CN103645845A (en) * 2013-11-22 2014-03-19 华为终端有限公司 Knocking control method and terminal
CN104158962A (en) * 2014-08-01 2014-11-19 广州华多网络科技有限公司 Mobile terminal display screen control method and mobile terminal display screen control system
CN105592524A (en) * 2014-10-23 2016-05-18 中兴通讯股份有限公司 Method of connecting wireless access point by terminal, and corresponding terminal and corresponding wireless access point
CN105204730A (en) * 2015-08-27 2015-12-30 广东欧珀移动通信有限公司 Screen control method and user terminal
CN105302245A (en) * 2015-11-05 2016-02-03 小米科技有限责任公司 Terminal with touch key
CN106095492A (en) * 2016-05-31 2016-11-09 广东欧珀移动通信有限公司 The method for closing of a kind of application program and device
CN106648421A (en) * 2016-11-16 2017-05-10 武汉斗鱼网络科技有限公司 Intelligent device control method and intelligent device
CN106775296A (en) * 2016-11-25 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of terminal control method and device
CN107122112A (en) * 2017-03-16 2017-09-01 珠海市魅族科技有限公司 Using open method and device
CN107332547A (en) * 2017-06-13 2017-11-07 里程 Control method, mobile terminal and the computer-readable recording medium of sensor button
CN111629425A (en) * 2017-07-18 2020-09-04 成都佳锂科技有限公司 Power consumption control method and system of electronic positioning equipment and electronic positioning equipment
CN108156326A (en) * 2018-01-02 2018-06-12 京东方科技集团股份有限公司 A kind of method, system and device of automatic startup recording
CN108419234A (en) * 2018-02-08 2018-08-17 广州视源电子科技股份有限公司 Wi-Fi Hotspot WPS connection methods and device
CN108509127A (en) * 2018-03-29 2018-09-07 腾讯科技(深圳)有限公司 Start the method, apparatus and computer equipment of record screen task
WO2019218903A1 (en) * 2018-05-14 2019-11-21 北京字节跳动网络技术有限公司 Voice control method and device
CN108873676A (en) * 2018-08-08 2018-11-23 广东小天才科技有限公司 A kind of control method of smartwatch
CN111093134A (en) * 2019-12-23 2020-05-01 Oppo广东移动通信有限公司 Earphone control device, earphone control method and earphone

Similar Documents

Publication Publication Date Title
KR102624327B1 (en) Method for location inference of IoT device, server and electronic device supporting the same
EP3454240B1 (en) Unlocking methods and related products
CN107193471B (en) Unlocking control method and related product
EP2606449A1 (en) Method and system for access to secure resources
WO2018161743A1 (en) Fingerprint recognition method and related product
CN106970552B (en) Switch control method, intelligent switch and mobile terminal
KR102545375B1 (en) Electronic device for performing authorization using accessory and method for the same
CN110869929A (en) Earphone with fingerprint authentication
CN111149136B (en) Electronic device and method for controlling electronic device
CN110286744B (en) Information processing method and device, electronic equipment and computer readable storage medium
CN107887947B (en) Protection method for charging port and mobile terminal
CN108737638B (en) Application control method and device, mobile terminal and computer readable medium
CN108491713B (en) Safety reminding method and electronic equipment
CN107908939A (en) Terminal alarms method, apparatus and mobile terminal
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN107528970B (en) User identification method, terminal and storage medium
CN107451536B (en) Biometric pattern opening method and related product
CN109639370B (en) Near field communication antenna detection method and device, mobile terminal and storage medium
CN106055958B (en) A kind of unlocking method and device
KR20210020632A (en) Electronic device identifying characteristics of object by using millimeter wave and method for controlling thereof
CN111313114B (en) Charging method and electronic equipment
CN112135294A (en) Wireless encryption method and client terminal equipment thereof
CN110062412B (en) Wireless pairing method, system, storage medium and mobile terminal
CN107025389B (en) Fingerprint input method and terminal
CN107483705B (en) Biometric pattern opening method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201225