CN112218293A - Mobile terminal secure communication method, device, terminal equipment and storage medium - Google Patents

Mobile terminal secure communication method, device, terminal equipment and storage medium Download PDF

Info

Publication number
CN112218293A
CN112218293A CN202011140194.7A CN202011140194A CN112218293A CN 112218293 A CN112218293 A CN 112218293A CN 202011140194 A CN202011140194 A CN 202011140194A CN 112218293 A CN112218293 A CN 112218293A
Authority
CN
China
Prior art keywords
time slot
redundant data
data
transmitting
slot interval
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011140194.7A
Other languages
Chinese (zh)
Other versions
CN112218293B (en
Inventor
俞斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Nuke Information Technology Co ltd
Original Assignee
TCL Communication Ningbo Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCL Communication Ningbo Ltd filed Critical TCL Communication Ningbo Ltd
Priority to CN202011140194.7A priority Critical patent/CN112218293B/en
Publication of CN112218293A publication Critical patent/CN112218293A/en
Application granted granted Critical
Publication of CN112218293B publication Critical patent/CN112218293B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a mobile terminal secure communication method, a device, terminal equipment and a storage medium. The sending equipment of the embodiment of the invention sets at least one time slot interval in a plurality of time slots in the transmission process of communication data; transmitting redundant data to a receiving device in the time slot adjacent to the time slot interval; and sending the time slot interval including the number of the time slots and the sequence of the time slots for transmitting the redundant data and the time slot interval to the receiving equipment. The receiving equipment receives communication data, redundant data, the number of time slots included in a time slot interval and the sequence of the time slots for transmitting the redundant data and the time slot interval transmitted by the transmitting equipment; determining a location of the redundant data relative to the communication data; and the redundant data is deleted, so that the safety in the communication process is enhanced, and the possibility of eavesdropping, modifying and losing the communication data is reduced.

Description

Mobile terminal secure communication method, device, terminal equipment and storage medium
Technical Field
The invention relates to the technical field of mobile communication, in particular to a mobile terminal secure communication method, a mobile terminal secure communication device, a mobile terminal device and a storage medium.
Background
A call is one of the most basic functions of a mobile terminal, and at present, a communication link of a voice call of a mobile terminal is generally implemented by time division multiplexing, that is, for a time division multiplexed communication link, time is divided into frames of a fixed interval, and each frame is divided into a fixed number of time slots, and when a network creates a connection across a link, the network assigns a time slot for the connection in each frame, the time slot being exclusively used by the connection alone. For example, as shown in fig. 1, time is divided into frames of fixed intervals, one frame is divided into 128 time slots, and when a communication connection is established, one time slot in each frame is dedicated to the communication, such as the 2 nd time slot in each frame in fig. 1. In the research and practice process of the prior art, the inventor of the present invention finds that when a call is established, a time slot is allocated to be specially used for transmission of voice data in the call process, and some lawless persons can intercept, modify and delete data in a certain specific time slot through special equipment, which will cause the communication content to be intercepted, modified and lost, thereby affecting normal communication and bringing inconvenience and loss to users.
Disclosure of Invention
The embodiment of the invention provides a mobile terminal secure communication method, a mobile terminal secure communication device, a mobile terminal device and a storage medium, wherein a data sending rule is preset in a sending device, and real data content cannot be acquired even if the data is stolen in the data transmission process, so that the security in the communication process is enhanced, the possibility that communication data is intercepted, modified and lost is reduced, and inconvenience and loss brought to a user are reduced.
The embodiment of the invention provides a mobile terminal secure communication method, which comprises the following steps:
setting at least one time slot interval in a plurality of time slots in the communication data transmission process;
transmitting redundant data to a receiving device in the time slot adjacent to the time slot interval;
and sending the time slot interval including the number of the time slots and the sequence of the time slots for transmitting the redundant data and the time slot interval to the receiving equipment.
Optionally, in some embodiments of the present invention, the timeslot interval includes at least one continuous timeslot, and at least one timeslot interval includes the same number of timeslots and/or different number of timeslots.
Optionally, in some embodiments of the present invention, the transmitting redundant data to the receiving device in the time slot adjacent to the time slot interval includes:
transmitting the redundant data to the receiving device at the time slot prior to the time slot interval; and/or
Transmitting the redundant data to the receiving device in the time slot after the time slot interval.
The embodiment of the invention provides a mobile terminal secure communication method, which comprises the following steps:
receiving communication data, redundant data and the number of time slots included in a time slot interval transmitted by a transmitting device and the sequence of the time slots for transmitting the redundant data and the time slot interval;
determining a location of the redundant data relative to the communication data;
and deleting the redundant data.
Optionally, in some embodiments of the present invention, the timeslot interval includes at least one continuous timeslot, and at least one timeslot interval includes the same number of timeslots and/or different number of timeslots.
Optionally, in some embodiments of the present invention, the precedence order includes that the time slot for transmitting the redundant data precedes the time slot interval, and/or that the time slot for transmitting the redundant data succeeds the time slot interval.
Correspondingly, an embodiment of the present invention further provides a mobile terminal secure communication device, including:
a setting unit, configured to set at least one slot interval in a plurality of slots during communication data transmission;
a transmission unit, configured to transmit redundant data to a receiving device in the time slot adjacent to the time slot interval;
and the sending unit is used for sending the time slot intervals including the number of the time slots and the sequence of the time slots for transmitting the redundant data and the time slot intervals to the receiving equipment.
Correspondingly, an embodiment of the present invention further provides a mobile terminal secure communication device, including:
a receiving unit, configured to receive communication data, redundant data, the number of time slots included in a time slot interval, and a sequence of the time slots for transmitting the redundant data and the time slot interval, where the communication data and the redundant data are transmitted by a transmitting device;
a determination unit configured to determine a position of the redundant data with respect to the communication data;
and the deleting unit is used for deleting the redundant data.
Similarly, an embodiment of the present invention further provides a terminal device, including:
a memory for storing an application program;
and the processor is used for realizing the steps of any one of the mobile terminal secure communication methods when the application program is executed.
In addition, an embodiment of the present invention further provides a readable storage medium, where an application program is stored on the readable storage medium, and the application program, when executed by a processor, implements the steps of any one of the secure communication methods of the mobile terminal.
The embodiment of the invention provides a safe communication method of a mobile terminal.A sending device sets at least one time slot interval in a plurality of time slots in the transmission process of communication data, then transmits redundant data to a receiving device in the time slots adjacent to the time slot interval, and then sends the time slot interval including the number of the time slots and the sequence of the time slots for transmitting the redundant data and the time slot interval to the receiving device. The receiving equipment receives the communication data, the redundant data, the number of time slots included in the time slot interval and the sequence of the time slots for transmitting the redundant data and the time slot interval transmitted by the transmitting equipment, then determines the position of the redundant data relative to the communication data, and finally deletes the redundant data. The embodiment of the invention can enhance the safety of the mobile terminal in the communication process, reduce the possibility of eavesdropping, modifying and losing the communication data, and reduce the inconvenience and loss brought to the user.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of timeslot division according to an embodiment of the present invention;
fig. 2 is a system diagram of a secure communication device of a mobile terminal according to an embodiment of the present invention;
fig. 3 is a flowchart of a secure communication method of a mobile terminal according to an embodiment of the present invention;
fig. 4 is another flowchart of a secure communication method of a mobile terminal according to an embodiment of the present invention;
fig. 5 is an interaction diagram of a secure communication method of a mobile terminal according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a secure communication apparatus of a mobile terminal according to an embodiment of the present invention;
fig. 7 is another schematic structural diagram of a secure communication apparatus of a mobile terminal according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a mobile terminal secure communication method, a mobile terminal secure communication device, a terminal device and a storage medium. The device can be integrated in a terminal, and the terminal can be a mobile phone, a tablet computer, a notebook computer, an intelligent watch and other equipment.
Referring to fig. 2, fig. 2 is a system diagram of a secure communication apparatus of a mobile terminal according to an embodiment of the present invention. The system may include two terminal devices, which are a sending device and a receiving device, respectively, where the sending device held by the sending party may be connected to the receiving device held by the receiving party through different networks, for example, the network may be a wireless network or a wired network, the wireless network may be a Wireless Local Area Network (WLAN), a Local Area Network (LAN), a cellular network, a 2G network, a 3G network, a 4G network, a 5G network, and the like, and the sending device is configured to set at least one slot interval in a plurality of slots in a communication data transmission process; transmitting redundant data to a receiving device in the time slot adjacent to the time slot interval; and sending the time slot interval including the number of the time slots and the sequence of the time slots for transmitting the redundant data and the time slot interval to the receiving equipment.
The receiving equipment is used for receiving the communication data, the redundant data and the number of time slots included in the time slot intervals transmitted by the sending equipment and the sequence of the time slots for transmitting the redundant data and the time slot intervals; determining a location of the redundant data relative to the communication data; and deleting the redundant data.
The following are detailed below. It should be noted that the following description of the embodiments is not intended to limit the preferred order of the embodiments.
The embodiment will be described from the perspective of a mobile terminal secure communicator, which may be specifically integrated in a terminal device, which may include a notebook Computer, a tablet Computer, a smart phone, a Personal Computer (PC), and the like.
As shown in fig. 3, the specific flow of the secure communication method of the mobile terminal is as follows:
step 301, at least one slot interval is set in a plurality of slots in the communication data transmission process.
For example, when a terminal device communicates with another terminal device, a communication link generally uses a time division multiplexing method, time is divided into frames of a fixed interval, each frame is divided into a fixed number of time slots, the transmitting device communicates with another receiving device using a specified time slot, and the transmitting device sets at least one time slot interval among a plurality of time slots.
Optionally, each time slot interval includes at least one continuous time slot, the number of time slots included in each time slot interval is the same, and the number of time slots included in each time slot interval is set to be N, that is, when the sending device transmits communication data every N time slots, the next time slot transmits redundant data until all communication data are transmitted.
Optionally, each slot interval includes at least one slot, and the number of slots included in each slot interval is set as a sequence t1, t2, t3 … … tn, that is, t1 slots of the transmitting device transmit communication data, the next slot transmits redundant data, then t2 slots transmit communication data, the next slot transmits redundant data, then t3 slots transmit communication data, the next slot transmits redundant data, and so on, tn slots transmit communication data, and the next slot transmits redundant data, until all communication data are completely transmitted.
Alternatively, if the number of slots included in each slot interval is different, the sequences t1, t2, t3 … … tn may be any number, and t1, t2, t3 … … tn are different from each other.
Optionally, if the number of slots included in each slot interval is partially the same and partially different, any two or more of the sequences t1, t2, t3 … … tn may be the same, and the positions where the same two or more slot numbers are distributed in the sequences may be regular, for example, the first 100 slot intervals include the same number of slots, the following slot intervals include different numbers of slots, or the base number position in the sequences is the same, the even number position in the sequences is the same, and the like, and the positions where the same two or more slot numbers are distributed in the sequences may be irregular.
Alternatively, when the sequences t1, t2, and t3 … … tn are different from each other, the sequences t1, t2, and t3 … … tn may be irregular, and the sequences t1, t2, and t3 … … tn may also be regular, for example, the sequences t1, t2, and t3 … … tn may be an arithmetic sequence, an geometric sequence, an ascending sequence, a descending sequence, and the like.
Alternatively, the sending device may encrypt the communication data using an encryption algorithm, that is, the sending device encrypts the communication data using an encryption algorithm to make the communication data become an unreadable "ciphertext," and then transmits the encrypted communication data to the receiving device.
Alternatively, the transmitting device may utilize a symmetric encryption algorithm, e.g., DES encryption algorithm, 3DES encryption algorithm, AES encryption algorithm, etc., which is also referred to as a shared key encryption algorithm. In a symmetric encryption algorithm, only one key is used, and both the transmitting device and the receiving device use this key to encrypt and decrypt data, which requires that both the encrypting and decrypting parties must know the encrypted key in advance. The transmitting device performs special encryption processing on the communication data and the encryption key to generate a complex encryption ciphertext, and transmits the encryption ciphertext to the receiving device.
Alternatively, the sending device may utilize an asymmetric encryption algorithm, also known as a public key encryption algorithm. Asymmetric encryption algorithms require two keys, one called public key (public key), i.e. a public key, and the other called private key (private key), i.e. a private key, two different keys being used for encryption and decryption. The receiving device generates a pair of keys, one of the keys is used as a public key to be disclosed, the transmitting device acquires the public key, encrypts communication data by using the public key to generate a complex encrypted ciphertext, and the encrypted ciphertext is transmitted to the receiving device.
Alternatively, the transmitting device may utilize a signature encryption algorithm, such as the MD5 algorithm, the SHA1 algorithm, the HMAC algorithm, or the like.
Optionally, the sending device may exchange the sending sequence of the communication data, and then notify the receiving device of the specific exchange process, that is, the sending device caches the communication data, and sets the exchange rule.
Step 302, transmitting redundant data to the receiving device in the time slot adjacent to the time slot interval.
For example, after the transmitting device sets the slot interval, the transmitting device generates the redundant data, transmits the redundant data to the receiving device in the adjacent slot of the slot interval, and transmits the communication data in the slot included in the slot interval.
The redundant data is arbitrary data.
Optionally, the sending device transmits the redundant data to the receiving device in a time slot before the time slot interval, that is, the sending device transmits the redundant data in the first time slot of communication, then transmits the communication data by using the time slot included in the time slot interval, and then transmits the redundant data by using one time slot, and so on until all the communication data are transmitted.
Optionally, the sending device transmits the redundant data to the receiving device in a time slot after the time slot interval, that is, the sending device transmits the communication data in a time slot included in the time slot interval as the first time slot in communication, and then transmits the redundant data by using one time slot, and so on until all the communication data are transmitted.
Step 303, sending the number of the time slots included in the time slot interval and the sequence of the time slots for transmitting the redundant data and the time slot interval to the receiving device.
For example, after the sending device determines the time slot interval and the sequence of the time slot and the time slot interval for transmitting the redundant data, the sending device sends the time slot interval including the number of the time slots and the sequence of the time slot and the time slot interval for transmitting the redundant data to the receiving device.
Optionally, if the sending device encrypts the communication data by using the encryption algorithm, the sending device selects the encryption algorithm, generates an encrypted ciphertext according to a rule of the encryption algorithm, and sends the encrypted ciphertext to the receiving device.
Optionally, if the sending device determines to exchange the sending order of the communication data, the sending device buffers the communication data, and sends the communication data to the receiving device according to the designated sending order.
Referring to fig. 4, another flow chart of the secure communication method of the mobile terminal is as follows:
step 401, receiving communication data, redundant data, the number of time slots included in a time slot interval, and the sequence of the time slots for transmitting the redundant data and the time slot interval transmitted by a transmitting device.
For example, the receiving device receives the communication data, the redundant data, the number of time slots included in the time slot interval, and the sequence of the time slots for transmitting the redundant data and the time slot interval transmitted by the transmitting device by using a specific time slot.
Step 402, determining the position of the redundant data relative to the communication data.
For example, the receiving device determines the position of the redundant data relative to the communication data according to the number of time slots included in the received time slot interval and the sequence of the time slots for transmitting the redundant data and the time slot interval.
Optionally, if the number of time slots included in each time slot interval is the same as N, the receiving device sets data of every received N time slots, where the data of the N time slots are communication data, stores the communication data, and the data received in the next time slot is redundant data until the data transmitted by the transmitting device is no longer received.
Optionally, the receiving device determines whether the first data is redundant data according to a sequence of time slots for transmitting the redundant data and time slot intervals, if the time slot for transmitting the redundant data is before the time slot interval, the first data is the redundant data, and if the time slot for transmitting the redundant data is after the time slot interval, the first data is not the redundant data.
Optionally, if the number of slots included in each slot interval is different, and a sequence of the number of slots t1, t2, and t3 … … tn is obtained, the receiving device receives data transmitted by t1 slots as communication data, data received by the next slot is redundant data, then data received by t2 slots is communication data, data received by the next slot is redundant data, then data received by t3 slots is communication data, data received by the next slot is redundant data, and so on, data received by tn slots is communication data, and data received by the next slot is redundant data, until all data are received completely.
Optionally, if it is identified that the sending device encrypts the communication data by using the encryption algorithm, the receiving device determines the used encryption algorithm, and decrypts the encrypted ciphertext transmitted by the sending device by using the corresponding decryption algorithm, so as to obtain the real communication data.
Optionally, if the sending device uses a symmetric encryption algorithm, the receiving device decrypts the encrypted ciphertext using a key known in advance, so as to obtain the real communication data.
Optionally, if the sending device uses an asymmetric encryption algorithm, the receiving device uses a private key corresponding to the public key to decrypt an encrypted ciphertext transmitted by the sending device, so as to obtain real communication data.
Optionally, if the sending order of exchanging the communication data by the sending device is identified, the receiving device exchanges the received communication data again after receiving the communication data according to the exchange order of the communication data set by the sending device, and restores the original order of the communication data, thereby obtaining the real communication data.
And step 403, deleting the redundant data.
For example, after the receiving device determines the positions of the communication data and the redundant data, the redundant data is deleted and the communication data is saved.
Referring to fig. 5, an interaction diagram of the secure communication method of the mobile terminal is as follows:
the method comprises the steps that a sending device and a receiving device are communicated, the sending device sets at least one continuous time slot interval in a plurality of time slots in the transmission process of communication data according to an allocated fixed time slot, then the time slot after the time slot interval is determined to transmit redundant data to the receiving device, the sending device sends the time slot interval including the number of the time slots and the sequence of the time slots for transmitting the redundant data to the receiving device, the receiving device receives the communication data, the redundant data and the time slots included by the time slot interval and the sequence of the time slots for transmitting the redundant data to the receiving device, then the position of the redundant data relative to the communication data is determined, the redundant data are deleted, the communication data are stored, and the real communication data are obtained.
In order to better implement the secure communication method of the mobile terminal according to the embodiment of the present invention, an embodiment of the present invention further provides a secure communication device of the mobile terminal, please refer to fig. 6, where fig. 6 is a schematic structural diagram of the secure communication device of the mobile terminal according to the embodiment of the present invention, and the secure communication device of the mobile terminal may include a setting unit 601, a transmission unit 602, and a sending unit 603.
The setting unit 601 is configured to set at least one slot interval in a plurality of slots of a communication data transmission process.
Optionally, the timeslot interval includes at least one continuous timeslot, and the number of timeslots included in at least one timeslot interval is the same and/or different.
Alternatively, the setting unit 601 may encrypt the communication data using an encryption algorithm and/or exchange the transmission order of the communication data.
Optionally, the transmitting unit 602 is configured to transmit redundant data to the receiving device in the time slot adjacent to the time slot interval.
Optionally, the transmitting unit 602 is configured to transmit the redundant data to the receiving device in the timeslot before the timeslot interval; and/or
Transmitting the redundant data to the receiving device in the time slot after the time slot interval.
Optionally, the sending unit 603 is configured to send, to the receiving device, the number of the time slot intervals including the number of the time slots, and a sequence of the time slots for transmitting the redundant data and the time slot intervals.
Referring to fig. 7, fig. 7 is another schematic structural diagram of a mobile terminal secure communication apparatus according to an embodiment of the present invention, where the mobile terminal secure communication apparatus may include a receiving unit 701, a determining unit 702, and a deleting unit 703.
The first receiving unit 701 is configured to receive communication data, redundant data, the number of time slots included in a time slot interval, and a sequence of the time slots for transmitting the redundant data and the time slot interval transmitted by a transmitting device.
Optionally, the timeslot interval includes at least one continuous timeslot, and the number of timeslots included in at least one timeslot interval is the same and/or different.
Optionally, the precedence order includes that the time slot for transmitting the redundant data is before the time slot interval, and/or that the time slot for transmitting the redundant data is after the time slot interval.
Optionally, the determining unit 702 is configured to determine a position of the redundant data relative to the communication data.
Optionally, the deleting unit 703 is configured to delete the redundant data.
Accordingly, an embodiment of the present invention further provides a terminal, as shown in fig. 8, where the terminal may include a Radio Frequency (RF) circuit 801, a memory 802 including one or more computer-readable storage media, an input unit 803, a display unit 804, a sensor 805, an audio circuit 806, a Wireless Fidelity (WiFi) module 807, a processor 808 including one or more processing cores, and a power supply 809. Those skilled in the art will appreciate that the terminal structure shown in fig. 8 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the RF circuit 801 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receive downlink information from a base station and then send the received downlink information to one or more processors 808 for processing; in addition, data relating to uplink is transmitted to the base station. In general, the RF circuitry 801 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 801 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Message Service (SMS), and the like.
The memory 802 may be used to store software programs and modules, and the processor 808 may execute various functional applications and data processing by operating the software programs and modules stored in the memory 802. The memory 802 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal, etc. Further, the memory 802 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 802 may also include a memory controller to provide the processor 808 and the input unit 803 access to the memory 802.
The input unit 803 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, in a particular embodiment, the input unit 803 may include a touch-sensitive surface as well as other input devices. The touch-sensitive surface, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (e.g., operations by a user on or near the touch-sensitive surface using a finger, a stylus, or any other suitable object or attachment) thereon or nearby, and drive the corresponding connection device according to a predetermined program. Alternatively, the touch sensitive surface may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 808, and can receive and execute commands sent by the processor 808. In addition, touch sensitive surfaces may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input unit 803 may include other input devices in addition to the touch-sensitive surface. In particular, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 804 may be used to display information input by or provided to a user and various graphical user interfaces of the terminal, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 804 may include a Display panel, and optionally, the Display panel may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch-sensitive surface may overlay the display panel, and when a touch operation is detected on or near the touch-sensitive surface, the touch operation is transmitted to the processor 808 to determine the type of touch event, and the processor 808 then provides a corresponding visual output on the display panel according to the type of touch event. Although in FIG. 8 the touch sensitive surface and the display panel are two separate components to implement input and output functions, in some embodiments the touch sensitive surface may be integrated with the display panel to implement input and output functions.
The terminal may also include at least one sensor 805, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel according to the brightness of ambient light, and a proximity sensor that may turn off the display panel and/or the backlight when the terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal, detailed description is omitted here.
Audio circuitry 806, a speaker, and a microphone may provide an audio interface between the user and the terminal. The audio circuit 806 may transmit the electrical signal converted from the received audio data to a speaker, and convert the electrical signal into an audio signal for output; on the other hand, the microphone converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 806, and then outputs the audio data to the processor 808 for processing, and then passes through the RF circuit 801 to be transmitted to, for example, another terminal, or outputs the audio data to the memory 802 for further processing. The audio circuit 806 may also include an earbud jack to provide peripheral headset communication with the terminal.
WiFi belongs to short distance wireless transmission technology, and the terminal can help the user to send and receive e-mail, browse web page and access streaming media etc. through WiFi module 807, which provides wireless broadband internet access for the user. Although fig. 8 shows the WiFi module 807, it is understood that it does not belong to the essential constitution of the terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 808 is a control center of the terminal, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 802 and calling data stored in the memory 802, thereby integrally monitoring the mobile phone. Optionally, processor 808 may include one or more processing cores; preferably, the processor 808 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 808.
The terminal also includes a power supply 809 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 808 via a power management system to manage charging, discharging, and power consumption via the power management system. The power supply 809 may also include one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, or any other component.
Although not shown, the terminal may further include a camera, a bluetooth module, and the like, which will not be described herein. Specifically, in this embodiment, the processor 808 in the terminal loads the executable file corresponding to the process of one or more application programs into the memory 802 according to the following instructions, and the processor 808 runs the application programs stored in the memory 802, thereby implementing various functions: setting at least one time slot interval in a plurality of time slots in the communication data transmission process; transmitting redundant data to a receiving device in the time slot adjacent to the time slot interval; and sending the time slot interval including the number of the time slots and the sequence of the time slots for transmitting the redundant data and the time slot interval to the receiving equipment. Receiving communication data, redundant data and the number of time slots included in a time slot interval transmitted by a transmitting device and the sequence of the time slots for transmitting the redundant data and the time slot interval; determining a location of the redundant data relative to the communication data; and deleting the redundant data.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The above detailed description is provided for a secure communication method, apparatus, terminal device and storage medium of a mobile terminal according to the embodiments of the present invention, and a specific example is applied in this document to explain the principle and implementation manner of the present invention, and the description of the above embodiments is only used to help understanding the technical solution and the core idea of the present invention; those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A secure communication method of a mobile terminal is characterized by comprising the following steps:
setting at least one time slot interval in a plurality of time slots in the communication data transmission process;
transmitting redundant data to a receiving device in the time slot adjacent to the time slot interval;
and sending the time slot interval including the number of the time slots and the sequence of the time slots for transmitting the redundant data and the time slot interval to the receiving equipment.
2. The method of claim 1, wherein the slot interval comprises at least one consecutive slot, and at least one of the slot intervals comprises the same and/or different number of slots.
3. The method of claim 1, wherein said transmitting redundant data to a receiving device in said time slot adjacent to said time slot interval comprises:
transmitting the redundant data to the receiving device at the time slot prior to the time slot interval; and/or
Transmitting the redundant data to the receiving device in the time slot after the time slot interval.
4. A secure communication method of a mobile terminal is characterized by comprising the following steps:
receiving communication data, redundant data and the number of time slots included in a time slot interval transmitted by a transmitting device and the sequence of the time slots for transmitting the redundant data and the time slot interval;
determining a location of the redundant data relative to the communication data;
and deleting the redundant data.
5. The method according to claim 4, wherein said time slot interval comprises at least one consecutive time slot, and at least one of said time slot intervals comprises the same number of time slots and/or different numbers of time slots.
6. The method according to claim 4, wherein the precedence order comprises the time slot for transmitting the redundant data preceding the time slot interval and/or the time slot for transmitting the redundant data following the time slot interval.
7. A secure communication apparatus for a mobile terminal, comprising:
a setting unit, configured to set at least one slot interval in a plurality of slots during communication data transmission;
a transmission unit, configured to transmit redundant data to a receiving device in the time slot adjacent to the time slot interval;
and the sending unit is used for sending the time slot intervals including the number of the time slots and the sequence of the time slots for transmitting the redundant data and the time slot intervals to the receiving equipment.
8. A secure communication apparatus for a mobile terminal, comprising:
a receiving unit, configured to receive communication data, redundant data, the number of time slots included in a time slot interval, and a sequence of the time slots for transmitting the redundant data and the time slot interval, where the communication data and the redundant data are transmitted by a transmitting device;
a determination unit configured to determine a position of the redundant data with respect to the communication data;
and the deleting unit is used for deleting the redundant data.
9. A terminal device, comprising:
a memory for storing an application program;
a processor for implementing the steps in the secure communication method of the mobile terminal according to any one of claims 1 to 6 when executing the application program.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon an application program, which when executed by a processor implements the steps in the secure communication method of the mobile terminal according to any one of claims 1 to 6.
CN202011140194.7A 2020-10-22 2020-10-22 Mobile terminal secure communication method, device, terminal equipment and storage medium Active CN112218293B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011140194.7A CN112218293B (en) 2020-10-22 2020-10-22 Mobile terminal secure communication method, device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011140194.7A CN112218293B (en) 2020-10-22 2020-10-22 Mobile terminal secure communication method, device, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112218293A true CN112218293A (en) 2021-01-12
CN112218293B CN112218293B (en) 2023-04-18

Family

ID=74054922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011140194.7A Active CN112218293B (en) 2020-10-22 2020-10-22 Mobile terminal secure communication method, device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112218293B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116682339A (en) * 2023-03-21 2023-09-01 海信视像科技股份有限公司 Data communication method, display device and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5648967A (en) * 1994-03-07 1997-07-15 Siemens Aktiengesellschaft Method and arrangement for transmitting information in a digital radio system
EP1159828A1 (en) * 1999-12-13 2001-12-05 Motorola, Inc. Method and system for reducing data errors in digital communications
JP2002271313A (en) * 2001-03-14 2002-09-20 Sony Disc Technology Inc Encipherment communication system, its encipherment communication method and forming method of its encipherment key
US20020191563A1 (en) * 1998-04-23 2002-12-19 Mitsubishi Denki Kabusiki Kaisha Mobile radio communication system, communication apparatus applied in mobile radio communication system, and mobile radio communication method
CN1640161A (en) * 2002-01-07 2005-07-13 诺泰网络有限公司 Method for controlling communication channels and base station and implementation of same method
CN101917393A (en) * 2010-05-26 2010-12-15 中兴通讯股份有限公司 Information transmission method and system as well as data card
CN104468255A (en) * 2014-06-13 2015-03-25 国家电网公司 Redundant data interaction system for channel detection and management information transfer
CN105915737A (en) * 2016-06-15 2016-08-31 Tcl移动通信科技(宁波)有限公司 Circuit switching method and system
CN105959921A (en) * 2016-07-20 2016-09-21 矽力杰半导体技术(杭州)有限公司 Network controller, node equipment and grid network system with network controller and node equipment
CN110266612A (en) * 2018-03-12 2019-09-20 中兴通讯股份有限公司 Data transmission method and device, the network equipment and storage medium
CN111585701A (en) * 2020-05-09 2020-08-25 哈尔滨海能达科技有限公司 Data transmission method, device, system and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5648967A (en) * 1994-03-07 1997-07-15 Siemens Aktiengesellschaft Method and arrangement for transmitting information in a digital radio system
US20020191563A1 (en) * 1998-04-23 2002-12-19 Mitsubishi Denki Kabusiki Kaisha Mobile radio communication system, communication apparatus applied in mobile radio communication system, and mobile radio communication method
EP1159828A1 (en) * 1999-12-13 2001-12-05 Motorola, Inc. Method and system for reducing data errors in digital communications
JP2002271313A (en) * 2001-03-14 2002-09-20 Sony Disc Technology Inc Encipherment communication system, its encipherment communication method and forming method of its encipherment key
CN1640161A (en) * 2002-01-07 2005-07-13 诺泰网络有限公司 Method for controlling communication channels and base station and implementation of same method
CN101917393A (en) * 2010-05-26 2010-12-15 中兴通讯股份有限公司 Information transmission method and system as well as data card
CN104468255A (en) * 2014-06-13 2015-03-25 国家电网公司 Redundant data interaction system for channel detection and management information transfer
CN105915737A (en) * 2016-06-15 2016-08-31 Tcl移动通信科技(宁波)有限公司 Circuit switching method and system
CN105959921A (en) * 2016-07-20 2016-09-21 矽力杰半导体技术(杭州)有限公司 Network controller, node equipment and grid network system with network controller and node equipment
CN110266612A (en) * 2018-03-12 2019-09-20 中兴通讯股份有限公司 Data transmission method and device, the network equipment and storage medium
CN111585701A (en) * 2020-05-09 2020-08-25 哈尔滨海能达科技有限公司 Data transmission method, device, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116682339A (en) * 2023-03-21 2023-09-01 海信视像科技股份有限公司 Data communication method, display device and electronic equipment
CN116682339B (en) * 2023-03-21 2024-05-17 海信视像科技股份有限公司 Data communication method, display device and electronic equipment

Also Published As

Publication number Publication date
CN112218293B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN109257740B (en) Profile downloading method, mobile terminal and readable storage medium
CN104580167B (en) A kind of methods, devices and systems transmitting data
EP3226463B1 (en) Data encryption and decryption method and encryption and decryption device
CN106658489B (en) Terminal application processing method and device and mobile terminal
CN110417543B (en) Data encryption method, device and storage medium
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
WO2019223441A1 (en) File sharing method, apparatus, readable storage medium, and mobile terminal
CN108449114B (en) Bluetooth connection method and mobile terminal
CN106550361B (en) Data transmission method, equipment and computer readable storage medium
EP3585127B1 (en) Wireless communication-based connection method and terminal
CN108632454B (en) Information processing method and device, computer readable storage medium and terminal
JP2022512835A (en) Uplink transmission method, user equipment and network side equipment
CN107864086B (en) Information rapid sharing method, mobile terminal and computer readable storage medium
CN116541865A (en) Password input method, device, equipment and storage medium based on data security
CN106413032B (en) Hotspot establishing method and terminal equipment
EP3761724B1 (en) Power configuration method and terminal
CN112218293B (en) Mobile terminal secure communication method, device, terminal equipment and storage medium
CN110636533B (en) Scheduling transmission method and terminal
EP4117329A1 (en) Authorization and policy parameter configuration method, terminal, and network functions
CN113381966B (en) Information reporting method, information receiving method, terminal and network side equipment
CN107786423B (en) A kind of method and system of instant messaging
CN106507357B (en) Access control method and terminal equipment
CN109922440B (en) Data synchronization method, device, mobile terminal and storage medium
CN114553612B (en) Data encryption and decryption method and device, storage medium and electronic equipment
CN108880787B (en) Information key processing method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230324

Address after: Room 2416-C, Building 1, Aosheng Building, High-tech Zone, Jinan City, Shandong Province, 250098

Applicant after: Shandong nuke Information Technology Co.,Ltd.

Address before: 6 / F, No. B5, Lane 999, Yangfan Road, Meixu street, Yinzhou District, Ningbo City, Zhejiang Province

Applicant before: TCL COMMUNICATION (NINGBO) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant