CN112398812A - Method and device for multi-terminal collaborative safe work - Google Patents

Method and device for multi-terminal collaborative safe work Download PDF

Info

Publication number
CN112398812A
CN112398812A CN202011127536.1A CN202011127536A CN112398812A CN 112398812 A CN112398812 A CN 112398812A CN 202011127536 A CN202011127536 A CN 202011127536A CN 112398812 A CN112398812 A CN 112398812A
Authority
CN
China
Prior art keywords
terminal device
terminal
cooperative work
cooperative
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011127536.1A
Other languages
Chinese (zh)
Inventor
李瑞华
陈华
霍大伟
肖玮
许剑峰
廖衡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN112398812A publication Critical patent/CN112398812A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • H04W12/55Secure pairing of devices involving three or more devices, e.g. group pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/403Arrangements for multi-party communication, e.g. for conferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1831Tracking arrangements for later retrieval, e.g. recording contents, participants activities or behavior, network status
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a method for multi-terminal collaborative safe work, which is applied to a network where a plurality of terminal devices collaboratively play and/or collaboratively record, the plurality of terminal devices comprise a first terminal device, and the method comprises the following steps: when a first terminal device accesses a network, the first terminal device determines a security mechanism; the method comprises the steps that a first terminal device obtains cooperative work information, wherein the cooperative work information is information played and/or recorded by a plurality of terminal devices; and the first terminal equipment executes security processing on the cooperative work information according to the security mechanism, wherein the security mechanism is used for forbidding processes except the cooperative work process to access the cooperative work information. After the first terminal device acquires the cooperative work information, the first terminal device performs security processing on the cooperative work information according to a security mechanism, so that processes except the cooperative work process cannot access the cooperative work information, and the security of the cooperative work information is guaranteed.

Description

Method and device for multi-terminal collaborative safe work
Technical Field
The present application relates to the field of communications, and in particular, to a method and an apparatus for secure cooperative work of multiple terminals.
Background
A plurality of terminal devices are utilized to provide online service for users together, and the cooperation and uniform experience is realized, so that the limitation of a single terminal device in the aspects of function, performance, processing capacity and the like is eliminated, the processing mode becomes cooperative work, and information transmitted in the cooperative work is called cooperative work information. For example, in a teleconference scene, a plurality of mobile phones in the same conference place can be used for playing recording files with different sound channels, so that a stereo effect is realized, and the plurality of mobile phones in the same conference place can be used for recording sound, so that a weak sound recording effect is improved.
The cooperative work information is usually confidential information, however, in a scenario of multi-terminal cooperative work, there is a risk that the played or recorded information is forwarded, and one solution is to manually check whether each terminal is installed with recording software, however, each terminal usually belongs to a different user, and manually check whether the terminal is installed with the recording software infringes the privacy of the user, and even if the terminal is installed with the recording software, the user cannot be said to record the cooperative work information, so how to provide a secure cooperative work method is a problem that needs to be solved at present.
Disclosure of Invention
The application provides a method and a device for multi-terminal collaborative safety work, which can reduce the risk of the collaborative work information being leaked.
In a first aspect, a method for multi-terminal collaborative secure work is provided, where the method is applied to a network where multiple terminal devices collaboratively play and/or collaboratively record, where the multiple terminal devices include a first terminal device, and the method includes: when a first terminal device accesses a network, the first terminal device determines a security mechanism; the method comprises the steps that a first terminal device obtains cooperative work information, wherein the cooperative work information is information played and/or recorded by a plurality of terminal devices; and the first terminal equipment executes security processing on the cooperative work information according to the security mechanism, wherein the security mechanism is used for forbidding processes except the cooperative work process to access the cooperative work information.
The plurality of terminal devices refer to at least two terminal devices, and the security mechanism refers to an operation to be executed in the cooperative work defined by the cooperative work software installed in the first terminal device. After the first terminal device obtains the cooperative work information, the first terminal device performs security processing on the cooperative work information according to a security mechanism, for example, encryption or access permission is set, so that processes except for the cooperative work process cannot access the cooperative work information, and thus the security of the cooperative work information is guaranteed.
Optionally, the performing, by the first terminal device, security processing on the cooperative work information according to a security mechanism includes: the first terminal device stores the cooperative work information in a security folder, wherein the security folder is a folder which cannot be read by processes other than the cooperative work process, and the security mechanism is a mode of storing the cooperative work information.
Optionally, the secure folder is a folder with random paths. Thereby, the safety of the cooperative work information can be further enhanced.
Optionally, the method further comprises: and the first terminal equipment prohibits processes except the cooperative work process from forwarding the cooperative work information.
Even if the cooperative work information is read by a process other than the cooperative work process, the first terminal device may prevent the leakage of the cooperative work information by prohibiting the process other than the cooperative work process from forwarding the cooperative work information, for example, may prohibit the process other than the cooperative work process from calling the communication module of the first terminal device, so that the security of the cooperative work information may be further enhanced.
Optionally, the performing, by the first terminal device, security processing on the cooperative work information according to a security mechanism includes: and deleting the first frame immediately after the first frame in the cooperative work information is sent or played.
The first terminal equipment can send the cooperative work information in a frame-by-frame sending mode, and the frame is deleted immediately when sending one frame; the first terminal device may also play the cooperative work information in a frame-by-frame play manner, and delete the frame immediately when playing a frame, so that it is not necessary to wait for all the cooperative work information to be sent or delete the cooperative work information after playing, which reduces the time for storing the cooperative work information in the first terminal device, thereby reducing the risk of forwarding the cooperative work information.
Optionally, the method further comprises: the first terminal equipment detects the signal intensity of the network; and when the signal intensity of the network is less than or equal to the preset intensity threshold value, the first terminal equipment deletes the cooperative work information.
Even if the slave cannot decode information sent by other terminal equipment (for example, an exit command sent by the master) due to a communication failure of the current network, the embodiment can prevent the slave from carrying the cooperative work information to leave the cooperative work area.
Optionally, the method further comprises: the method comprises the steps that a first terminal device detects the distance between the first terminal device and a second terminal device, wherein the first terminal device is a slave terminal device, and the second terminal device is a master terminal device; and when the distance between the first terminal equipment and the second terminal equipment is greater than a preset distance threshold value, the first terminal equipment deletes the cooperative work information.
The slave machine can detect the distance between the slave machine and the host machine, and when the distance between the slave machine and the host machine is larger, the slave machine determines that the slave machine leaves the cooperative work area, and immediately deletes the cooperative work information and the configuration information of the network, so that the safety of the cooperative work information is enhanced.
Optionally, the method further comprises: the method comprises the steps that a first terminal device receives a first quitting command sent by a third terminal device, wherein the first terminal device is a slave terminal device, and the third terminal device is a master terminal device in a plurality of terminal devices; and the first terminal equipment deletes the cooperative work information according to the first quit command.
When the first terminal device is a slave, the first terminal device may delete the cooperative work information and the configuration information of the network according to a received exit command (i.e., a first exit command) sent by the master, so that the slave may be forced to exit the cooperative work through a command of the master when a mechanism of exiting the cooperative work of the slave fails, thereby enhancing the security of the cooperative work information.
Optionally, the method further comprises: the method comprises the steps that a first terminal device determines that a fourth terminal device leaves a collaborative work area, wherein the collaborative work area is an area where a plurality of terminal devices are collaboratively played and/or collaboratively recorded, the fourth terminal device is a slave terminal device in the plurality of terminal devices, and the first terminal device is a master terminal device in the plurality of terminal devices; and the first terminal equipment sends a second quitting command to the fourth terminal equipment according to the fact that the fourth terminal equipment leaves the cooperative work area, wherein the second quitting command is used for commanding the fourth terminal equipment to delete the cooperative work information.
When the first terminal device is the master, the first terminal device may send a second quit command to the slave according to that the slave is about to leave the cooperative work area, so that the slave may be forced to quit the cooperative work through the command of the master when the mechanism of quitting the cooperative work of the slave fails, and the safety of the cooperative work information is enhanced.
Optionally, the method further comprises: the first terminal device acquires a third quitting command, wherein the third quitting command is used for commanding a fifth terminal device to quit the network, the fifth terminal device is a slave terminal device in the plurality of terminal devices, and the first terminal device is a master terminal device in the plurality of terminal devices; and the first terminal equipment sends a fourth quitting command to the fifth terminal equipment according to the third quitting command, wherein the fourth quitting command is used for commanding the fifth terminal equipment to delete the cooperative work information.
The third quit command is, for example, a command input by a user of the master, and when the user of the master finds that the slave leaves the cooperative work area, the user of the master may input the third quit command to the master, where the third quit command is used to command the slave to quit the network, and after receiving the third quit command, the master sends a fourth quit command to the slave according to the third quit command, and commands the slave to quit the network, and deletes the cooperative work information and the configuration information of the network.
Optionally, the method further comprises: the first terminal equipment receives incoming call indication information; and the first terminal equipment deletes the cooperative work information according to the incoming call indication information.
The incoming call indication information is used for indicating that an incoming call is about to be accessed, and in order to ensure the safety of the cooperative work information, the communication between the first terminal device and the network needs to be disconnected and the cooperative work information stored in the first terminal device needs to be deleted.
Optionally, the method further comprises: the first terminal device receives an access request sent by a sixth terminal device through a network, wherein the access request is used for requesting to access information except the cooperative work information of the first terminal device; the first terminal device denies the access request.
When the first terminal device performs the cooperative work, the first terminal device may receive an access request sent by another terminal device, where the access request is used to access information stored in the first terminal device, for example, when the first terminal device is a host, the access request may be to read a certain memory segment of the host, and if the information stored in the memory segment includes information other than the cooperative work information, the first terminal device rejects the access request, so that the privacy of the user of the first terminal device may be protected.
Optionally, the method further comprises: the first terminal device receives an internet access request from a seventh terminal device, wherein the internet access request is used for requesting to acquire information except the cooperative work information, and the seventh terminal device is one of the plurality of terminal devices; the first terminal equipment refuses the internet surfing request.
For example, the internet access request is a request that a browser of the slave computer requests to obtain internet information through a hotspot of the host computer, and the internet information does not belong to the cooperative work information, and the first terminal device rejects the request after receiving the request, so that the first terminal device can be prevented from being stolen.
Optionally, the method further comprises: and when the first terminal equipment is in the cooperative play state and/or the cooperative recording state, forbidding processes except the cooperative work process to call the recorder of the first terminal equipment.
When the first terminal device is in the cooperative play state, the first terminal device may play the audio related to the cooperative work, and when the first terminal device is in the cooperative recording state, the first terminal device may record the audio related to the cooperative work.
Optionally, the method further comprises: the method comprises the steps that first terminal equipment obtains first indication information, wherein the first indication information is used for indicating that a network is about to be disconnected; and the first terminal equipment plays prompt voice according to the first indication information, wherein the prompt voice is used for prompting to upload the cooperative work information to the server, and the cooperative work information is recorded by the first terminal equipment.
The embodiment can reduce the risk of loss of the cooperative work information caused by forgetting to upload.
Optionally, the method further comprises: and when the network is disconnected, the first terminal equipment deletes the folder for storing the collaborative work information.
Regardless of whether the cooperative work information is deleted after being played or not and regardless of whether the cooperative work information is uploaded after being recorded or not, when the network is disconnected, the first terminal device immediately deletes the folder for storing the cooperative work information and the configuration information of the network, so that the risk of leakage of the cooperative work information can be reduced.
Optionally, the method further comprises: and the first terminal equipment deletes the configuration information of the network.
In a second aspect, the present application provides a device for secure work of multiple terminals in cooperation, where the device may implement a function executed by the first terminal device in the method according to the first aspect, where the function may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more units or modules corresponding to the above functions.
In one possible design, the apparatus includes a processor and a transceiver, and the processor is configured to support the apparatus to perform corresponding functions in the method according to the first aspect. The transceiver is for supporting communication between the apparatus and other network elements. The apparatus may also include a memory, coupled to the processor, that retains program instructions and data necessary for the apparatus.
In a third aspect, a computer-readable storage medium is provided, having stored thereon computer program code, which, when executed by a processing unit or processor, causes a first terminal device to perform the method of the first aspect.
In a fourth aspect, a chip is provided, in which instructions are stored which, when run on a first terminal device, cause the chip to perform the method of the first aspect described above.
In a fifth aspect, there is provided a computer program product comprising: computer program code which, when run by the acquisition unit and the processing unit of the first terminal device, causes the first terminal device to perform the method of the first aspect described above.
Drawings
FIG. 1 is a schematic diagram of a collaborative network to which the present application is applicable;
FIG. 2 is a schematic diagram of a method for multi-terminal collaborative security provided by the present application;
fig. 3 is a schematic diagram of a possible first terminal device provided in the present application;
fig. 4 is a schematic diagram of another possible first terminal device provided in the present application;
FIG. 5 is a schematic diagram of a security mechanism provided in the present application;
fig. 6 is a manner of networking a plurality of terminal devices according to the present application;
fig. 7 is another way of networking multiple terminal devices provided by the present application.
Detailed Description
The technical solution of the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of a collaborative network to which the present application is applicable.
As shown in fig. 1, five mobile phones form a cooperative network, wherein one of the five mobile phones may form the cooperative network by using a mobile phone as a hot spot, or form the cooperative network by using a router. T1 may be set as a master (master), the rest of the handsets are slaves (slave), and one handset (for example, T2) may also be selected from T2 to T5 as a backup master, when T1 fails, T2 serves as a master to maintain normal operation of the cooperative network, and the functions of the master include but are not limited to: sending broadcast to carry out cooperative networking; sending a synchronous time tick message for synchronization; and sending a pickup instruction or a playback instruction. The functions of the slave include, but are not limited to: receiving broadcast, and joining the cooperative network; responding the synchronous time setting message and synchronizing; and receiving a sound pickup instruction or a sound reproduction instruction, and completing sound pickup or sound reproduction cooperatively according to the sound pickup instruction or the sound reproduction instruction.
The five handsets shown in fig. 1 can cooperatively play different channels of the same audio, for example, T1 plays a front left channel (abbreviated as "front left"), T2 plays a center channel (abbreviated as "center"), T3 plays a front right channel (abbreviated as "front right"), T4 plays a rear left channel (abbreviated as "rear left"), and T5 plays a rear right channel (abbreviated as "rear right"), thereby realizing the effect of surround multi-channel.
The above examples are only examples, and the five mobile phones may also cooperatively play a sound source of the same sound track, may cooperatively record, may cooperatively perform a video conference, and may cooperatively complete other tasks. In addition, the number of terminal devices performing the cooperative work is not limited to the number shown in fig. 1, and the terminal devices performing the cooperative work are not limited to the mobile phone shown in fig. 1, and may also be other types of terminal devices, such as a tablet computer.
Fig. 2 illustrates a method for collaborative security operation of multiple terminals provided by the present application. The method 200 is applied to a network in which a plurality of terminal devices cooperatively play and/or cooperatively record, the plurality of terminal devices including a first terminal device, and the method 200 includes:
s201, when the first terminal device accesses to the network, the first terminal device determines a preset security mechanism.
S202, the first terminal device obtains the cooperative work information, and the cooperative work information is information played and/or recorded by the plurality of terminal devices.
S203, the first terminal device executes security processing on the cooperative work information according to a security mechanism, wherein the security mechanism is to prohibit processes other than the cooperative work process from accessing the cooperative work information.
In the present application, unless otherwise stated, the first terminal device may be a master or a slave.
When the first terminal device is a host, the first terminal device may send a broadcast message, where the broadcast message is used to establish a cooperative network, and when the first terminal device receives at least one Acknowledgement (ACK) of the broadcast message, it may be determined that the first terminal device accesses the network. The first terminal device may also establish a network with other terminal devices through Near Field Communication (NFC) technology or two-dimensional code technology.
When the first terminal device is a slave, the first terminal device may access the network by receiving a broadcast message sent by the master, where the broadcast message carries a configuration parameter of the network, and after accessing the network, the first terminal device may send an ACK to the slave to notify the master that the first terminal device has accessed the network. The first terminal device may also establish a network with the host through the NFC technology or the two-dimensional code technology.
For example, a plurality of terminal devices are respectively located in different rooms, and each room may be provided with one host, where the host that creates the network is the host with the highest authority, and may determine the identities of other terminal devices (slave machines or low-authority host machines), and each host may also have a backup host, that is, when the host fails, the backup host is upgraded to the host to maintain normal operation of the network.
The network referred to in this application refers to a network for cooperative work (referred to as a "cooperative network" for short), for example, when a plurality of terminal devices are connected through a router to perform cooperative work, a wireless fidelity (WiFi) network is the cooperative network, and when a plurality of terminal devices pass through a fourth generation mobile communication system (the 4)thgeneration mobile communication, 4G) cellular network, the Long Term Evolution (LTE) network is the cooperative network. The cooperative network may also be a set of networks of different types, for example, if some terminal devices in the plurality of terminal devices use the WiFi network to perform cooperative work, and some terminal devices use the LTE network to perform cooperative work, the cooperative network is the WiFi network and the LTE network at this time. The above examples are merely illustrative, and the present application is not limited to the specific form of the cooperative network.
After the first terminal device determines to access the network, a security mechanism may be determined, where the security mechanism refers to a manner in which the first terminal device performs security processing on the cooperative work information.
In S202, the first terminal device may receive the cooperative work information from the cloud, may receive the cooperative work information from a terminal device (hereinafter, referred to as "other terminal device") other than the first terminal device among the plurality of terminal devices, and may record the cooperative work information by itself. The cooperative work information may be one or more of text information, audio information, picture information and video information, and may also be other types of information, and the content of the cooperative work information is not limited in the present application.
After the first terminal device acquires the cooperative work information, the first terminal device performs security processing on the cooperative work information according to a security mechanism, so that processes except the cooperative work process cannot access the cooperative work information, and the security of the cooperative work information is guaranteed. The cooperative process is, for example, a process generated when cooperative software installed in the first terminal device runs.
Optionally, the performing, by the first terminal device, security processing on the cooperative work information according to a security mechanism includes:
and S204, the first terminal device stores the cooperative work information in a security folder, wherein the security folder is a folder which cannot be read by processes except the cooperative work process, and the security mechanism is a mode of storing the cooperative work information.
The secure folder is, for example, a folder to which a specific authority is set, and the specific authority refers to that only the collaborative process is allowed to access the folder, and the access of other processes to the folder is denied. The secure folder is for example a private folder or a hidden folder or an encrypted folder.
Optionally, a security folder with a random path is generated when the security folder is generated, so that the security of the cooperative work information can be further enhanced.
Optionally, the method 200 further comprises:
s205, the first terminal equipment prohibits processes except the cooperative work process from forwarding the cooperative work information.
Even if the cooperative work information is read by a process other than the cooperative work process, the first terminal device may prevent the leakage of the cooperative work information by prohibiting the process other than the cooperative work process from forwarding the cooperative work information, for example, may prohibit the process other than the cooperative work process from calling the communication module of the first terminal device, so that the security of the cooperative work information may be further enhanced.
Optionally, the performing, by the first terminal device, security processing on the cooperative work information according to a security mechanism includes:
s206, the first terminal device sends or plays the first frame in the cooperative work information through the cooperative work process.
S207, the first terminal device deletes the first frame in the cooperative work information.
And S208, the first terminal equipment sends or plays the second frame in the cooperative work information through the cooperative work process.
S209, the first terminal device deletes the second frame in the cooperative work information.
The first terminal equipment can send the cooperative work information in a frame-by-frame sending mode, and the frame is deleted immediately when sending one frame; the first terminal device may also play the cooperative work information in a frame-by-frame play manner, and delete the frame immediately when playing a frame, so that it is not necessary to wait for all the cooperative work information to be sent or delete the cooperative work information after playing, which reduces the time for storing the cooperative work information in the first terminal device, thereby reducing the risk of forwarding the cooperative work information.
Optionally, the method 200 further comprises:
s210, the first terminal device detects the signal intensity of the network.
And S211, when the signal intensity of the network is less than or equal to a preset intensity threshold value, the first terminal equipment deletes the cooperative work information.
Since a user of the first terminal device may leave the cooperative area with the first terminal device, the first terminal device needs to detect the signal strength of the network during the cooperative work to determine whether the first terminal device leaves the cooperative area, when the signal strength of the network is less than or equal to a preset strength threshold, it is indicated that the first terminal device has left the cooperative area, and the first terminal device deletes the stored cooperative information according to the above condition, and optionally, the first terminal device may also delete the configuration information of the network (for example, a WiFi password or a conference access password).
The magnitude of the intensity threshold may be set according to the range of the cooperative working area, and when the cooperative working area is smaller, the intensity threshold is set to a larger value, for example, the intensity threshold may be set to-60 decibel milliwatts (dBm), and when the signal intensity detected by the first terminal device is smaller than-60 dBm, the first terminal device determines that the first terminal device has left the cooperative working area, and the cooperative working information and the configuration information of the network need to be deleted; when the cooperative work area is large, in order to prevent the terminal device located at the edge of the cooperative work area from being kicked out of the network due to weak signals, the intensity threshold may be set to a small value, for example, the intensity threshold may be set to-90 decibel milliwatt (dBm), and when the signal intensity detected by the first terminal device is less than-90 dBm, the first terminal device determines that the first terminal device has left the cooperative work area, and the cooperative work information and the configuration information of the network need to be deleted.
The above examples are merely illustrative, and the intensity threshold may also be set to a value in decibel watts (dBw).
Even if the slave cannot decode information sent by other terminal equipment (for example, an exit command sent by the master) due to a communication failure of the current network, the embodiment can prevent the slave from carrying the cooperative work information to leave the cooperative work area.
For example, the first terminal device may determine the strength of the network signal according to Received Signal Strength Indication (RSSI), and when the RSSI is less than or equal to a preset strength threshold, the first terminal device determines that the first terminal device has left the cooperative working area, and then the first terminal device deletes the cooperative working information and the configuration information of the network. For another example, the first terminal device may further determine the strength of the network signal according to a signal-to-noise ratio (SNR), and when the value of the SNR is less than or equal to a preset strength threshold, it indicates that the first terminal device has left the cooperative working area, and then the first terminal device deletes the cooperative working information and the configuration information of the network. For another example, the first terminal device may further determine the strength of the network signal according to the packet loss rate, and when the value of the packet loss rate is smaller than or equal to a preset packet loss rate threshold, the first terminal device determines that the first terminal device has left the cooperative working area, and then the first terminal device deletes the cooperative working information and the configuration information of the network.
Optionally, the method 200 further comprises:
s212, the first terminal device detects a distance between the first terminal device and a second terminal device, where the first terminal device is a slave terminal device (i.e., a slave device), and the second terminal device is a master terminal device of the plurality of terminal devices.
S213, when the distance between the first terminal device and the second terminal device is greater than a preset distance threshold, the first terminal device deletes the cooperative work information and the configuration information of the network.
For the slave machine, the slave machine can detect the distance between the slave machine and the host machine, when the distance between the slave machine and the host machine is larger, the slave machine determines that the slave machine leaves the cooperative work area, and then deletes the cooperative work information and the configuration information of the network, so that the safety of the cooperative work information is enhanced.
The method for detecting the distance between the first terminal device and the second terminal device may be the method described in S210 and S211, for example, when the strength of the signal received by the first terminal device and sent to the second terminal device is smaller than a preset threshold, it may be determined that the distance between the first terminal device and the second terminal device is greater than the preset distance threshold, and then the first terminal device may delete the cooperative work information and the configuration information of the network.
For example, the first terminal device may determine the distance between the first terminal device and the second terminal device according to the number of steps counted by the step counting module of the first terminal device, and after the cooperative work starts, when the number of steps counted by the step counting module of the first terminal device exceeds a preset step threshold, the first terminal device may determine that the first terminal device has left the cooperative work area. In order to prevent the misjudgment, the first terminal device may further set a period of time (e.g., 60 seconds), and if the number of steps counted by the step counting module of the first terminal device in the period of time exceeds a preset step threshold (e.g., 20 steps), the first terminal device may judge that the first terminal device has left the cooperative work area.
The first terminal device may further determine whether the cooperative work information needs to be deleted according to the signal strength and the distance couple. For example, setting a signal strength threshold to be-90 dBm and a step number threshold to be 20 steps, when the step number counted by the first terminal device exceeds 20 steps, if the signal strength threshold is greater than-90 dBm, it indicates that the first terminal device is likely to move the position in the cooperative work area, but does not leave the cooperative work area, and therefore, the cooperative play and/or the cooperative recording is continued without deleting the cooperative work information; when the counted number of steps of the first terminal device exceeds 20 steps, if the signal intensity threshold is smaller than-90 dBm, it is indicated that the first terminal device has left the cooperative working area, and therefore the cooperative working information is deleted, so that misjudgment caused by judging whether the first terminal device leaves the cooperative working area by a single factor (signal intensity or distance) can be avoided.
Optionally, the method 200 further comprises:
and S214, the first terminal device receives a first quit command sent by a third terminal device, wherein the first terminal device is a slave terminal device, and the third terminal device is a master terminal device in the plurality of terminal devices.
S215, the first terminal device deletes the cooperative work information and the configuration information of the network according to the first quit command.
When the first terminal device is a slave, the first terminal device may delete the cooperative work information and the configuration information of the network according to a received exit command (i.e., a first exit command) sent by the master, so that the slave may be forced to exit the cooperative work through a command of the master when a mechanism of exiting the cooperative work of the slave fails, thereby enhancing the security of the cooperative work information.
Optionally, the method 200 further comprises:
s216, the first terminal device determines that a fourth terminal device is about to leave a cooperative working area, where the cooperative working area is an area where a plurality of terminal devices cooperatively play and/or cooperatively record, where the fourth terminal device is a slave terminal device in the plurality of terminal devices, and the first terminal device is a master terminal device in the plurality of terminal devices.
And S217, the first terminal device sends a second quitting command to the fourth terminal device according to the fact that the fourth terminal device is about to leave the cooperative work area, wherein the second quitting command is used for commanding the fourth terminal device to delete the cooperative work information.
In this application, the cooperative work area refers to an area where a plurality of terminal devices cooperatively play and/or cooperatively record, for example: a conference room, a recording room or a studio. The plurality of terminal devices may be located in one cooperative working area or in a plurality of cooperative working areas, for example, when the terminal devices respectively located in conference rooms of two cities are performing cooperative working, the conference rooms of the two cities are two cooperative working areas.
When the first terminal device is the master, the first terminal device may send a second quit command to the slave according to that the slave is about to leave the cooperative work area, so that the slave may be forced to quit the cooperative work through the command of the master when the mechanism of quitting the cooperative work of the slave fails, and the safety of the cooperative work information is enhanced.
For example, when the slave is poisoned, the function of the slave for measuring the network signal strength and the function of the slave for measuring the distance may fail, and at this time, if the master monitors that the signal strength of the slave is smaller than the preset strength threshold, the master may send a second quit command to the slave to command the slave to quit the cooperative network, and delete the cooperative work information and the network configuration information.
Optionally, the method 200 further comprises:
s218, the first terminal device receives a third quit command, where the third quit command is used to command a fifth terminal device to quit the network, where the fifth terminal device is a slave terminal device in the multiple terminal devices, and the first terminal device is a master terminal device in the multiple terminal devices.
And S219, the first terminal device sends a fourth quitting command to the fifth terminal device according to the third quitting command, wherein the fourth quitting command is used for commanding the fifth terminal device to delete the cooperative work information.
The third quit command is, for example, a command input by a user of the master, and when the user of the master finds that the slave leaves the cooperative work area, the user of the master may input the third quit command to the master, where the third quit command is used to command the slave to quit the network, and after receiving the third quit command, the master sends a fourth quit command to the slave according to the third quit command, and commands the slave to quit the network, and deletes the cooperative work information and the configuration information of the network.
Optionally, the method 200 further comprises:
s220, the first terminal equipment receives the incoming call indication information.
And S221, the first terminal equipment deletes the cooperative work information and the configuration information of the network according to the incoming call indication information.
The incoming call indication information is used for indicating that an incoming call is about to be accessed, and in order to ensure the safety of the cooperative work information, the communication between the first terminal device and the network needs to be disconnected and the cooperative work information stored in the first terminal device needs to be deleted.
The incoming call indication information may be, for example, a paging message (paging) sent by the base station, a Radio Resource Control (RRC) connection establishment message sent by the base station, or other air interface signaling received by the first terminal device when the first terminal device is called.
Optionally, the method 200 further comprises:
s222, a first terminal device receives an access request sent by a sixth terminal device through a network, wherein the access request is used for requesting to access information except the cooperative work information of the first terminal device;
s223, the first terminal device rejects the access request.
When the first terminal device performs the cooperative work, the first terminal device may receive an access request sent by another terminal device, where the access request is used to access information stored in the first terminal device, for example, when the first terminal device is a host, the access request may be to read a certain memory segment of the host, and if the information stored in the memory segment includes information other than the cooperative work information, the first terminal device rejects the access request, so that the privacy of the user of the first terminal device may be protected.
The access request may be rejected by sending information of access rejection or access failure to the sixth terminal device, or by not responding.
Optionally, the method 200 further comprises:
s224, the first terminal device receives an internet access request from a seventh terminal device, where the internet access request is used to request to obtain information other than the cooperative work information, and the seventh terminal device is one of the plurality of terminal devices.
And S225, the first terminal equipment refuses the internet surfing request.
For example, the internet access request is a request that a browser of the slave computer requests to obtain internet information through a hotspot of the host computer, and the internet information does not belong to the cooperative work information, and the first terminal device rejects the request after receiving the request, so that the first terminal device can be prevented from being stolen.
Optionally, the method 200 further comprises:
s226, when the first terminal device is in the cooperative play state and/or the cooperative recording state, prohibiting a process other than the cooperative process from calling the recorder of the first terminal device.
When the first terminal device is in the cooperative play state, the first terminal device may play the audio related to the cooperative work, and when the first terminal device is in the cooperative recording state, the first terminal device may record the audio related to the cooperative work.
Optionally, the method 200 further comprises:
s227, the first terminal device obtains first indication information, and the first indication information is used for indicating that the network is about to be disconnected.
And S228, the first terminal device plays a prompt voice according to the first indication information, wherein the prompt voice is used for prompting to upload the cooperative work information to the server, and the cooperative work information is recorded by the first terminal device.
For example, when the first terminal device is the host, if the user of the host presses the end button, the first terminal device is triggered to generate the first indication information, and the first terminal device may play a prompt voice according to the first indication information to prompt the first terminal device to upload the recorded cooperative work information.
For another example, when the first terminal device is a slave device and receives the first indication information sent by the host device, the first terminal device plays a prompt voice according to the first indication information to prompt the first terminal device to upload the recorded cooperative work information.
The embodiment can reduce the risk of loss of the cooperative work information caused by forgetting to upload.
Optionally, the method 200 further comprises:
s229, when the network is disconnected, the first terminal device deletes the configuration information of the network and the folder storing the cooperative work information.
Regardless of whether the cooperative work information is deleted after being played or not and regardless of whether the cooperative work information is uploaded after being recorded or not, when the network is disconnected, the first terminal device immediately deletes the folder for storing the cooperative work information and the configuration information of the network, so that the risk of leakage of the cooperative work information can be reduced.
The above details an example of the method for secure cooperative operation of multiple terminals provided by the present application. It is understood that the first terminal device includes a hardware structure and/or a software module for performing the respective functions in order to implement the above functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The first terminal device may be divided into functional units according to the above method examples, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the units in the present application is schematic, and is only one division of logic functions, and there may be another division manner in actual implementation.
Fig. 3 shows a possible structural diagram of the first terminal device involved in the above-described embodiment, in the case of an integrated unit. The first terminal device 300 includes: a processing unit 302 and an acquisition unit 303. The processing unit 302 is configured to control and manage actions of the first terminal device 300, for example, the processing unit 302 is configured to support the first terminal device 300 to perform the steps of fig. 2 and/or other processes for the techniques described herein. The obtaining unit 303 is configured to support communication between the first terminal device 300 and another communication device, for example, obtain cooperative work information sent by the other device. The first terminal device 300 may further include a storage unit 301 for storing program codes and data of the first terminal device 300.
For example, when a first terminal device accesses a network, the processing unit 302 is configured to determine a security mechanism preset in the first terminal device; the obtaining unit 303 is configured to obtain cooperative work information, where the cooperative work information is information played and/or recorded by multiple terminal devices; the processing unit 302 is further configured to perform security processing on the cooperative work information according to a security mechanism, where the security mechanism is to prohibit a process other than the cooperative work process from accessing the cooperative work information.
The processing unit 302 may be a processor or a controller, such as a Central Processing Unit (CPU), a general purpose processor, a Digital Signal Processor (DSP), an application-specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The obtaining unit 303 may be, for example, one or more of a transceiver, a transceiver circuit, a communication interface, and a sound recorder, for example, when the first terminal device receives the cooperative work information from the other terminal device, the obtaining unit 303 may be the transceiver, when the information obtained by the first terminal device is information input by a user, the obtaining unit 303 may be a touch screen, when the information obtained by the first terminal device is recorded information, the obtaining unit 303 may be the sound recorder, and the obtaining unit 303 may also be another module or unit capable of obtaining information. The storage unit 301 may be a memory.
When the processing unit 302 is a processor, the obtaining unit 303 is a transceiver and a recorder, and the storage unit 301 is a memory, the first terminal device according to the present application may be the first terminal device shown in fig. 4.
Referring to fig. 4, the first terminal device 400 includes: a processor 402, a transceiver 403, a voice recorder 404, and a memory 401. The transceiver 403, the processor 402, the recorder 404, and the memory 401 may communicate with each other via internal communication paths to transmit control and/or data signals.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the apparatuses and units described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
According to the first terminal device 300 and the first terminal device 400 provided by the application, after the cooperative work information is acquired, the cooperative work information is safely processed according to the safety mechanism, so that processes except the cooperative work process cannot access the cooperative work information, and the safety of the cooperative work information is guaranteed.
The structure of the first terminal device is only the structure required for illustrating the method for cooperative security work provided in the present application, and the device actually included in the first terminal device is not limited to the device shown in fig. 4.
It should be understood that the above-described transceiver may include a transmitter and a receiver. The transceiver may further include an antenna, and the number of antennas may be one or more. The memory may be a separate device or may be integrated into the processor. The above-mentioned devices or parts of the devices may be implemented by being integrated into a chip, such as a baseband chip.
The first terminal device in the apparatus and method embodiments corresponds to the first terminal device, and the corresponding module executes corresponding steps, for example, the sending module method or the transmitter executes the sending step in the method embodiment, the receiving module or the receiver executes the receiving step in the method embodiment, and other steps except for sending and receiving may be executed by the processing module or the processor. The functions of the specific modules can be referred to corresponding method embodiments, and are not described in detail.
Some examples provided in this application are given below.
Corresponding embodiments are designed in the networking stage, the cooperative network operation process and the network quitting stage. In the invention, the confidentiality mechanism under the relevant scene independently exists, and the user can select all or part of the confidentiality mechanism.
The guarantee mechanism main points that contain in this application include:
after the cooperative network is established, the recording temporary file and the playing file are temporarily locked (file encryption or directory number randomization), and cannot be forwarded or cannot be resolved after successful forwarding
-testing wifi intensity after the user walks away while playing the recording cooperatively; when the password is lower than the threshold value, the network is disconnected after the password and the temporary file of the user are destroyed; after the user comes back, he can add again.
Forgetting the wifi password and clearing the temporary file before the end of the collaborative network.
During the cooperative network, the master can only access or request messages to specific memory segments in the slave (in the case of android, only the drive audiolinger module can be called, and the mic or spk can be called)
The guarantee mechanism main points contained in this application still include:
after the Master is set, only the participator mobile phone is ensured to access the conference through on-site NFC or code scanning.
In the processes of cooperative playing, recording and the like, a built-in recorder of the mobile phone or other processes needing microphone response and a third-party APP are locked.
In the cooperative network, after the Slave completes local sound pickup or signal enhancement frame by frame, the data frame is sent to the Master, that is, the memory of the segment is cleared.
In the cooperative network, the Master receives the data frames transmitted by the Slave frame by frame and writes the data frames into the private files in the private folders. Other applications and processes cannot access the folder; the path of the private folder can be generated at any time and cannot be simply obtained by a user; alternatively, Master cannot access the private folder.
In the cooperative network, the Slave receives data frames transmitted by the Master frame by frame and writes the data frames into private files in the private folders. Other applications and processes cannot access the folder; the path of the private folder can be generated at any time and cannot be simply obtained by a user; or, Master cannot access the private folder
And under the conference scene, before the conference is finished, the voice prompt uploads the voice memo and uploads the voice memo to the cloud server.
After the cooperative application is finished, all information of the Master and the Slave which are connected at this time, including wifi passwords, private folders for storing sound records or playing files, are completely removed. Even if the current user wants to start a new process, the full flow of joining the collaborative network needs to be repeated.
Fig. 5 is a schematic diagram of a security mechanism provided in the present application.
The invention designs a corresponding security mechanism from 3 stages, and reduces the leakage of key information and security information in the cooperative operation process. Wherein the collaborative operations include, but are not limited to: collaborative play, collaborative pickup, collaborative conferences, etc.
Stage one: networking
Fig. 6 and 7 are two typical ways of networking, respectively.
The networking mode of fig. 6 is: the host sets an AP hotspot, and the slave accesses the AP hotspot; the networking mode of fig. 7 is: the master and the slave access routers. The former is suitable for a small number of terminal applications, and the latter is suitable for a large number of terminal applications. Through the K-ary tree and the packet network, the networking mode can be expanded, and the details are not expanded. Collaborative applications include, but are not limited to: collaborative play, collaborative recording, collaborative meeting, and the like.
According to the position of the user, the invention is decomposed into 2 scenes:
all users are in the same area, such as an office. The user can select the networking mode according to the number of the access terminals. The general flow includes:
the host establishes or accesses a cooperative network, and the cooperative network sets a password for the access.
The slave can join the encrypted network by NFC 'connection on touch', 'shaking' or scanning the two-dimensional code on the screen of the host.
Another software implementation method is that all the cooperative machines use the same software platform, such as: music player or stylus software. When the network is established, the Master adds other users nearby to a collaborative group in a friend adding manner. In the adding process, channel configuration is completed, for example: taking 5 sound heads as an example, according to the adding sequence, the Master and the newly added Slave default to play sound channels or pick-up sound channels according to the sequence of left-right-middle-left-back-right-back, and the like.
Because all users are in the same area and can see the access, other users are prevented from illegally joining the network. The scene is suitable for scenes such as music cooperatively played by small teams.
All users are divided into several groups, each group being in a different area, including remote access. The general flow includes:
the host establishes or accesses a cooperative network, and the cooperative network sets a password for the access.
The host transmits access information such as passwords to a remote local host through a network.
The slave machines in each area can be connected and shaken once by touch through NFC or scan the two-dimensional code on the screen of the local host machine to join the encrypted network.
Local masters and auxiliary masters are arranged in all the areas except the areas where the masters are located, and specific functions are shown below.
And a second stage: collaborative application phase
During the operation of the collaborative application, the relatively sensitive information includes:
taking cooperative play as an example, if the host downloads a stereo or multi-channel sound source from the cloud service through streaming, and forwards a specific sound channel or all sound sources to other mobile phones through a cooperative network, the risk of intellectual property exists; from the subjective perspective, the host user does not want the copyright purchased by the host user to be simply copied by others
Taking the collaborative recording as an example, in the recording process, part of participants transfer the conference content to the external network through other applications; or after the recording is finished, the transcription voice is copied to the external network. A special scenario is the conference recorder function, which in principle avoids any leakage for sensitive content.
Therefore, for the sensitive information, the invention is at least described from two application scenes of cooperative play and cooperative recording; from technical relevance, the related mechanisms can be extended to scenarios such as collaborative multi-party conferencing.
As described above, in the process of collaborative playing or collaborative recording, there are groups divided into 2 or more than 2 according to regions; each team comprises a plurality of cooperative members, and the teams form a large cooperative network. The invention will also relate to this scenario in the scenario description.
Sound reproduction
[ suppose that the members of the collaborative network are in the same physical area, such as the same room ]
Taking cooperative play as an example, in the cooperative play process, the master forwards a stereo sound or a multichannel sound source stored locally or downloaded from a music cloud to the Slave, and the Slave clears the segment of memory after completing the local play frame by frame. The processing mechanism may be frame processing or post-processing after playing is completed.
Or, the Slave receives data frames transferred by the Master frame by frame, writes the data frames into a private file in a private folder, or hides the private file or encrypts the file. Other applications and processes cannot access the folder; the path of the private folder can be generated at any time and cannot be easily accessed by a user.
And in the process of cooperative playing, locking a built-in recorder of the mobile phone or other processes needing microphone response and a third-party APP.
If the player mode is adopted, the Master adopts a sharing mode on a main interface of the player to share the files to be cooperatively played in a group; and when the Slave clicks to confirm the received file, the time synchronization of the Master and the Slave is completed. After the synchronization is completed and the Master clicks the playing, the Master and the Slave can simultaneously perform multi-machine cooperative playing according to the sound channel confirmed at the network access stage and the playing start time after the synchronization.
In the playing process, the Slave user can synchronously carry out applications such as mail searching, webpage browsing and the like; however, if the user answers the incoming call or needs to leave the current environment for any reason, the distance detection process and the related information are reflected in the process of periodic Master and Slave message transmission. One specific scheme comprises the following steps: and mapping the time delay to wifi intensity or distance parameters through a network. When the wifi intensity is weaker than the predefined threshold or the distance parameter is larger than the predefined threshold, the content clearing mechanism is started, which specifically includes: accessing private files in the private folder or hidden folders or encrypted files (including the situation that the path of the folder can be generated at any time), and deleting the sound source files which are stored in the Slave locally; and then, deleting the information such as wifi passwords left during networking, and prompting the Slave user that the Slave user is to be cleared out of the cooperative network. If the Slave user returns to the room again, the Slave user can refer to the networking mode and rejoin the cooperative network again.
Suppose that the collaboration network members are in different physical areas, such as two different rooms at a remote location
When the cooperative members are distributed in different physical areas, most of the security functions of the cooperative play may refer to the method of the cooperative network members in the same physical area.
The main difference point is that when the Slave leaves for any reason, the local Slave completes the relevant validation and clearing operations. In the playing process, the Slave user can synchronously carry out applications such as mail searching, webpage browsing and the like; however, if the user answers the incoming call or needs to leave the current environment for any reason, the distance detection process and the related information are reflected in the process of periodic local Master and Slave message transmission. One specific scheme comprises the following steps: and mapping the time delay to wifi intensity or distance parameters through a network. When the wifi intensity is weaker than the predefined threshold or the distance parameter is larger than the predefined threshold, the content clearing mechanism is started, which specifically includes: accessing private files in the private folder or hidden folders or encrypted files (including the situation that the path of the folder can be generated at any time), and deleting the sound source files which are stored in the Slave locally; and then, deleting the information such as wifi passwords left during networking, and prompting the Slave user that the Slave user is to be cleared out of the cooperative network. The verification and the operation are completed by the local Slave, the refreshing condition is transmitted to the Master, and the user list is refreshed. If the Slave user returns to the room again, the Slave user can refer to the networking mode and rejoin the cooperative network again.
Sound pickup
Taking the cooperative recording as an example, in the cooperative network, after the Slave completes local sound pickup or signal enhancement frame by frame, the data frame is sent to the Master, that is, the segment of the memory is cleared.
Or, the Master receives the data frame transmitted by the Slave and writes the data frame into a private file or an encrypted file in the private folder. Other applications and processes cannot access the folder; the path of the private folder can be generated at any time and cannot be easily accessed by a user.
In the processes of cooperative playing, recording and the like, a built-in recorder of the mobile phone or other processes needing microphone response and a third-party APP are locked.
If the recording pen software mode is adopted, the Master shares the recording instruction icons in the group on the main interface of the recording pen; and when the Slave clicks the recording instruction icon, the time synchronization of the Master and the Slave is completed. After the synchronization is completed and the Master clicks to pick up sound, the Master and the Slave can simultaneously carry out multi-machine cooperative recording according to the sound channel confirmed in the network access stage and the start time after the synchronization, and the Slave starts to transmit the local sound pickup and the processed data to the Master.
[ suppose that the members of the collaborative network are in the same physical area, such as the same room ]
In general, local recordings are assumed to be in the same room. Therefore, the present invention only describes in detail the case where the members of the collaborative network are in the same physical area. For the case of multiple zones, reference may be made to the example of sound reproduction.
Taking the cooperative recording as an example, in the cooperative recording process, the Slave forwards the locally recorded sound channel (if the sound channel is multi-channel recording) to the Master through corresponding signal processing (for example, noise reduction), and the Slave clears the segment of memory after completing the recording frame by frame. The processing mechanism can be frame processing or post-processing after the recording is finished.
Or the Slave writes the sound recording data into a private file in a private folder or a hidden folder or an encrypted file. Other applications and processes cannot access the folder; the path of the private folder can be generated at any time and cannot be easily accessed by a user. And after the whole recording is finished, sending the recording to a Master.
In any of the above forms, the Master writes data into a private file in a private folder or a hidden folder or an encrypted file when receiving the recorded data. Other applications and processes cannot access the folder; the path of the private folder can be generated at any time and cannot be easily accessed by a user.
In the process of cooperative recording, a built-in recorder of the mobile phone or other processes needing microphone response and a third-party APP are locked.
In the recording process, the Slave user can synchronously carry out applications such as mail searching, webpage browsing and the like; however, if the user answers the incoming call or needs to leave the current environment for any reason, the distance detection process and the related information are reflected in the process of periodic Master and Slave message transmission. One specific scheme comprises the following steps: and mapping the time delay to wifi intensity or distance parameters through a network. When the wifi intensity is weaker than the predefined threshold or the distance parameter is larger than the predefined threshold, the content clearing mechanism is started, which specifically includes: accessing private files in the private folder or hidden folders or encrypted files (including the condition that the path of the folder can be generated at any time), and deleting the audio record files stored in the Slave locally; and then, deleting the information such as wifi passwords left during networking, and prompting the Slave user that the Slave user is to be cleared out of the cooperative network. If the Slave user returns to the room again, the Slave user can refer to the networking mode and rejoin the cooperative network again.
Another security guarantee is for the Slave machine, whether collaborative playback or collaborative recording, or other collaborative functions. In particular, the Slave gives a certain authority to the Master, but only collects sound or plays sound (for example, calling a microphone or a loudspeaker). The corresponding message mechanism is limited to the functions of sound pickup or sound reproduction. Other processes from Master require masking directly.
And a third stage: network release phase
After the cooperative application is finished, deleting all information of the Master and the Slave which are connected at this time, including wifi passwords; and accessing the private files in the private folder or hiding the folder or encrypting the files (including the condition that the path of the folder can be generated at any time), and deleting the sound recording files which are stored in the Slave locally. Even if the current user wants to start a new process, the user needs to establish a new network, which is equivalent to restarting a new flow.
Particularly, in a recording scene, before the recording scene is finished, the voice or interface prompts to upload the voice memo and upload the voice memo to the cloud server. And then, automatically and completely removing all information connected by the Master and the Slave at this time, including wifi passwords and private folders for storing the recording or playing files. Even if the current user wants to start a new process, the user needs to establish a new network, which is equivalent to restarting a new flow.
Example 1, a method for secure work of multi-terminal cooperation is applied to a network where multiple terminal devices cooperatively play and/or cooperatively record, where the multiple terminal devices include a first terminal device, and the method includes:
when the first terminal equipment accesses the network, the first terminal equipment determines a security mechanism;
the first terminal equipment acquires cooperative work information, wherein the cooperative work information is information played and/or recorded by the plurality of terminal equipment;
and the first terminal equipment executes security processing on the cooperative work information according to the security mechanism, wherein the security mechanism is used for forbidding processes except the cooperative work process to access the cooperative work information.
Example 2, the method of example 1, where the first terminal device performs security processing on the cooperative work information according to the security mechanism, includes:
and the first terminal equipment stores the cooperative work information in a safety folder, wherein the safety folder is a folder which can not be read by processes except the cooperative work process, and the safety mechanism is a mode of storing the cooperative work information.
Example 3, the method of example 1 or 2, further comprising:
and the first terminal equipment prohibits processes except the cooperative work process from forwarding the cooperative work information.
Example 4, the method of any one of examples 1 to 3, wherein the performing, by the first terminal device, security processing on the cooperative work information according to the security mechanism includes:
and deleting the first frame immediately after the first frame in the cooperative work information is sent or played.
Example 5, the method of any of examples 1-4, further comprising:
the first terminal equipment detects the signal strength of the network;
and when the signal intensity of the network is smaller than or equal to a preset intensity threshold value, the first terminal equipment deletes the cooperative work information.
Example 6, the method of any of examples 1-5, further comprising:
the first terminal device detects a distance between the first terminal device and a second terminal device, wherein the first terminal device is a slave terminal device in the plurality of terminal devices, and the second terminal device is a master terminal device in the plurality of terminal devices;
and when the distance between the first terminal equipment and the second terminal equipment is larger than a preset distance threshold value, the first terminal equipment deletes the cooperative work information.
Example 7, the method of any of examples 1-4, further comprising:
the first terminal device receives a first quitting command sent by a third terminal device, wherein the first terminal device is a slave terminal device in the plurality of terminal devices, and the third terminal device is a master terminal device in the plurality of terminal devices;
and the first terminal equipment deletes the cooperative work information according to the first quitting command.
Example 8, the method of any of examples 1-4, further comprising:
the first terminal device determines that a fourth terminal device leaves a collaborative work area, where the collaborative work area is an area where the plurality of terminal devices collaboratively play and/or collaboratively record, where the fourth terminal device is a slave terminal device in the plurality of terminal devices, and the first terminal device is a master terminal device in the plurality of terminal devices;
and the first terminal equipment sends a second quitting command to the fourth terminal equipment according to the fact that the fourth terminal equipment leaves the cooperative work area, wherein the second quitting command is used for commanding the fourth terminal equipment to delete the cooperative work information.
Example 9, the method of any of examples 1-4, further comprising:
the first terminal device obtains a third quitting command, wherein the third quitting command is used for commanding a fifth terminal device to quit the network, the fifth terminal device is a slave terminal device in the plurality of terminal devices, and the first terminal device is a master terminal device in the plurality of terminal devices;
and the first terminal equipment sends a fourth quitting command to the fifth terminal equipment according to the third quitting command, wherein the fourth quitting command is used for commanding the fifth terminal equipment to delete the cooperative work information.
Example 10, the method of any of examples 1-4, further comprising:
the first terminal equipment receives incoming call indication information;
and the first terminal equipment deletes the cooperative work information according to the incoming call indication information.
Example 11, the method of any of examples 1-10, further comprising:
the first terminal device receives an access request sent by a sixth terminal device through the network, wherein the access request is used for requesting access to information of the first terminal device except the cooperative work information, and the sixth terminal device is one of the plurality of terminal devices;
the first terminal device denies the access request.
Example 12, the method of any of examples 1-11, further comprising:
the first terminal device receives an internet access request from a seventh terminal device, wherein the internet access request is used for requesting to acquire information except the cooperative work information, and the seventh terminal device is one of the plurality of terminal devices;
and the first terminal equipment refuses the internet surfing request.
Example 13, the method of any of examples 1-12, further comprising:
and when the first terminal equipment is in a cooperative play state and/or a cooperative recording state, prohibiting processes except the cooperative work process from calling the recorder of the first terminal equipment.
Example 14, the method of any of examples 1-13, further comprising:
the first terminal equipment acquires first indication information, wherein the first indication information is used for indicating that the network is about to be disconnected;
and the first terminal equipment plays prompt voice according to the first indication information, wherein the prompt voice is used for prompting to upload the cooperative work information to a server, and the cooperative work information is recorded by the first terminal equipment.
Example 15, the method of any of examples 1-14, further comprising:
and when the network is disconnected, the first terminal equipment deletes the folder for storing the collaborative work information.
Example 16, the method of example 15, further comprising:
and the first terminal equipment deletes the configuration information of the network.
Example 17, an apparatus for secure cooperative operation of multiple terminals, configured in a network in which multiple terminal devices cooperatively play and/or cooperatively record, includes a processing unit and an obtaining unit,
the processing unit is configured to: determining a security mechanism when the device accesses the network;
the acquisition unit is configured to: acquiring cooperative work information, wherein the cooperative work information is information played and/or recorded by the plurality of terminal devices;
the processing unit is further to: and executing security processing on the cooperative work information obtained by the obtaining unit according to the security mechanism, wherein the security mechanism is used for forbidding processes except the cooperative work process to access the cooperative work information.
Example 18, the apparatus of example 17, the processing unit to:
and storing the cooperative work information in a safety folder, wherein the safety folder is a folder which can not be read by processes except the cooperative work process, and the safety mechanism is a mode for storing the cooperative work information.
Example 19, the apparatus of examples 17 or 18, the processing unit to further:
and forbidding the processes except the cooperative work process to forward the cooperative work information.
Example 20, the apparatus of any one of examples 17 to 19, the processing unit to:
and deleting the first frame immediately after the first frame in the cooperative work information is sent or played.
Example 21, the apparatus of any one of examples 17 to 20, the processing unit to further:
detecting a signal strength of the network;
and deleting the cooperative work information when the signal intensity of the network is less than or equal to a preset intensity threshold value.
Example 22, the apparatus of any one of examples 17 to 21, the processing unit to further:
detecting the distance between the device and second terminal equipment, wherein the device is slave terminal equipment, and the second terminal equipment is master terminal equipment;
and when the distance between the device and the second terminal equipment is greater than a preset distance threshold value, deleting the cooperative work information.
Example 23, the apparatus of any one of examples 17 to 20, the processing unit to further:
receiving a first quitting command sent by a third terminal device through the obtaining unit, wherein the device is a slave terminal device in the plurality of terminal devices, and the third terminal device is a master terminal device in the plurality of terminal devices;
and deleting the cooperative work information according to the first exit command.
Example 24, the apparatus of any one of examples 17 to 20, the processing unit to further:
determining that a fourth terminal device leaves a cooperative working area, where the cooperative working area is an area where the plurality of terminal devices cooperatively play and/or cooperatively record, where the fourth terminal device is a slave terminal device in the plurality of terminal devices, and the apparatus is a master terminal device in the plurality of terminal devices;
and sending a second quitting command to the fourth terminal equipment according to the fact that the fourth terminal equipment leaves the cooperative work area, wherein the second quitting command is used for commanding the fourth terminal equipment to delete the cooperative work information.
Example 25, the apparatus of any one of examples 17 to 20, the processing unit to further:
acquiring a third quitting command through the acquiring unit, wherein the third quitting command is used for commanding a fifth terminal device to quit the network, the fifth terminal device is a slave terminal device in the plurality of terminal devices, and the device is a master terminal device in the plurality of terminal devices;
and sending a fourth quitting command to the fifth terminal equipment according to the third quitting command, wherein the fourth quitting command is used for commanding the fifth terminal equipment to delete the cooperative work information.
Example 26, the apparatus of any one of examples 17 to 20, the processing unit to further:
receiving incoming call indication information through the acquisition unit;
and deleting the cooperative work information according to the incoming call indication information.
Example 27, the apparatus of any one of examples 17 to 26, the obtaining unit to further: receiving an access request sent by a sixth terminal device through the network, wherein the access request is used for requesting to access information of the device except the cooperative work information, and the sixth terminal device is one of the plurality of terminal devices;
the processing unit is further configured to deny the access request.
Example 28, the apparatus of any one of examples 17 to 27, the apparatus further comprising:
the first terminal device receives an internet access request from a seventh terminal device, wherein the internet access request is used for requesting to acquire information except the cooperative work information, and the seventh terminal device is one of the plurality of terminal devices;
and the first terminal equipment refuses the internet surfing request.
Example 29, the apparatus of any one of examples 17 to 28, the processing unit to further:
and when the device is in a cooperative play state and/or a cooperative recording state, prohibiting processes except the cooperative work process from calling the recorder of the device.
Example 30, the apparatus of any one of examples 17 to 29, the processing unit to further:
acquiring first indication information through the acquisition unit, wherein the first indication information is used for indicating that the network is about to be disconnected;
and playing prompt voice according to the first indication information, wherein the prompt voice is used for prompting to upload the cooperative work information to a server, and the cooperative work information is recorded by the device.
Example 31, the apparatus of any one of examples 17 to 30, the processing unit to further:
and when the network is disconnected, deleting the folder for storing the cooperative work information.
Example 32, the apparatus of example 31, the processing unit to further:
and deleting the configuration information of the network.
In the embodiments of the present application, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the inherent logic of the processes, and should not limit the implementation processes of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied in hardware or in software instructions executed by a processor. The software instructions may be comprised of corresponding software modules that may be stored in Random Access Memory (RAM), flash memory, Read Only Memory (ROM), Erasable Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), registers, a hard disk, a removable disk, a compact disc read only memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. In addition, the ASIC may reside in a terminal device. Of course, the processor and the storage medium may reside as discrete components in a terminal device.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedures or functions described in accordance with the present application are generated, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in or transmitted over a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)), or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., Digital Versatile Disk (DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), etc.
The above-mentioned embodiments, objects, technical solutions and advantages of the present application are further described in detail, it should be understood that the above-mentioned embodiments are only examples of the present application, and are not intended to limit the scope of the present application, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present application should be included in the scope of the present application.

Claims (40)

1. A method for multi-terminal collaborative security work is characterized in that the method comprises the following steps:
the method comprises the steps that a first terminal device and a plurality of terminal devices form a network;
the first terminal equipment determines a safety mechanism, and the safety mechanism indicates a mode of safety processing on the cooperative work information by the first terminal equipment;
the first terminal equipment acquires cooperative work information, wherein the cooperative work information is information played and/or recorded by the plurality of terminal equipment;
and the first terminal equipment executes security processing on the cooperative work information according to the security mechanism.
2. The method of claim 1, wherein the first terminal device networking with a plurality of terminal devices comprises:
taking the first terminal equipment as a hotspot to establish the network; or
The first terminal device and the plurality of terminal devices establish the network through a router.
3. The method of claim 1, wherein the first terminal device networking with a plurality of terminal devices comprises:
the first terminal equipment and the plurality of terminal equipment form the network through a near field communication technology or a two-dimensional code technology;
or
The first terminal device and the plurality of terminal devices constitute the network by broadcasting messages.
4. The method of claim 1, wherein the first terminal device networking with the plurality of terminal devices comprises:
the first terminal device and the plurality of terminal devices use the same software platform, and the first terminal device adds the plurality of terminal devices to a cooperative group; the first terminal device configures a sound channel.
5. The method according to any of claims 1-4, wherein the network is a WIFI network or a long term evolution LTE network.
6. The method according to any one of claims 1-5, further comprising:
and the first terminal equipment shares the cooperative work information in a group on a player main interface.
7. The method according to any one of claims 1-6, further comprising:
performing time synchronization on the first terminal device and the plurality of terminal devices;
and according to the sound channel confirmed in the network access stage and the synchronized play starting time, the first terminal equipment and the plurality of terminal equipment perform cooperative play or cooperative recording.
8. The method according to any one of claims 1 to 7, wherein the performing, by the first terminal device, security processing on the cooperative work information according to the security mechanism includes:
and the first terminal equipment stores the cooperative work information in a safety folder, wherein the safety folder is a folder which can not be read by processes except the cooperative work process, and the safety mechanism is a mode of storing the cooperative work information.
9. The method according to any one of claims 1-7, further comprising:
and the first terminal equipment prohibits processes except the cooperative work process from forwarding the cooperative work information.
10. The method according to any one of claims 1 to 9, further comprising:
the first terminal equipment detects the signal strength of the network;
and when the signal intensity of the network is smaller than or equal to a preset intensity threshold value, the first terminal equipment deletes the cooperative work information.
11. The method according to any one of claims 1 to 10, further comprising:
the first terminal device detects a distance between the first terminal device and a second terminal device, wherein the first terminal device is a slave terminal device in the plurality of terminal devices, and the second terminal device is a master terminal device in the plurality of terminal devices;
and when the distance between the first terminal equipment and the second terminal equipment is larger than a preset distance threshold value, the first terminal equipment deletes the cooperative work information.
12. The method according to any one of claims 1 to 10, further comprising:
the first terminal device receives a first quitting command sent by a third terminal device, wherein the first terminal device is a slave terminal device in the plurality of terminal devices, and the third terminal device is a master terminal device in the plurality of terminal devices;
and the first terminal equipment deletes the cooperative work information according to the first quitting command.
13. The method according to any one of claims 1 to 10, further comprising:
the first terminal device determines that a fourth terminal device leaves a collaborative work area, where the collaborative work area is an area where the plurality of terminal devices collaboratively play and/or collaboratively record, where the fourth terminal device is a slave terminal device in the plurality of terminal devices, and the first terminal device is a master terminal device in the plurality of terminal devices;
and the first terminal equipment sends a second quitting command to the fourth terminal equipment according to the fact that the fourth terminal equipment leaves the cooperative work area, wherein the second quitting command is used for commanding the fourth terminal equipment to delete the cooperative work information.
14. The method according to any one of claims 1 to 10, further comprising:
the first terminal device obtains a third quitting command, wherein the third quitting command is used for commanding a fifth terminal device to quit the network, the fifth terminal device is a slave terminal device in the plurality of terminal devices, and the first terminal device is a master terminal device in the plurality of terminal devices;
and the first terminal equipment sends a fourth quitting command to the fifth terminal equipment according to the third quitting command, wherein the fourth quitting command is used for commanding the fifth terminal equipment to delete the cooperative work information.
15. The method according to any one of claims 1 to 10, further comprising:
the first terminal equipment receives incoming call indication information;
and the first terminal equipment deletes the cooperative work information according to the incoming call indication information.
16. The method according to any one of claims 1 to 15, further comprising:
the first terminal device receives an access request sent by a sixth terminal device through the network, wherein the access request is used for requesting access to information of the first terminal device except the cooperative work information, and the sixth terminal device is one of the plurality of terminal devices;
the first terminal device denies the access request.
17. The method according to any one of claims 1 to 16, further comprising:
the first terminal device receives an internet access request from a seventh terminal device, wherein the internet access request is used for requesting to acquire information except the cooperative work information, and the seventh terminal device is one of the plurality of terminal devices;
and the first terminal equipment refuses the internet surfing request.
18. The method according to any one of claims 1 to 17, further comprising:
and when the first terminal equipment is in a cooperative play state and/or a cooperative recording state, prohibiting processes except the cooperative work process from calling the recorder of the first terminal equipment.
19. The method according to any one of claims 1 to 18, further comprising:
the first terminal equipment acquires first indication information, wherein the first indication information is used for indicating that the network is about to be disconnected;
and the first terminal equipment plays prompt voice according to the first indication information, wherein the prompt voice is used for prompting to upload the cooperative work information to a server, and the cooperative work information is recorded by the first terminal equipment.
20. The method according to any one of claims 1 to 19, further comprising:
and when the network is disconnected, the first terminal equipment deletes the folder for storing the collaborative work information.
21. The device for the cooperative safe work of the multiple terminals is characterized by comprising a processing unit and an acquisition unit,
the processing unit is configured to: establishing a network, and determining a security mechanism, wherein the security mechanism indicates a way of security processing on the cooperative work information by the first terminal device;
the acquisition unit is configured to: acquiring cooperative work information, wherein the cooperative work information is information played and/or recorded by the plurality of terminal devices;
the processing unit is further to: and executing safety processing on the cooperative work information obtained by the obtaining unit according to the safety mechanism.
22. The apparatus according to claim 21, wherein the processing unit is configured to establish the network with the apparatus as a hotspot; or the network is constructed by routers.
23. The apparatus according to claim 21, wherein the processing unit is configured to,
establishing the network through a near field communication technology or a two-dimension code technology;
or
The network is constructed by broadcasting messages.
24. The apparatus of claim 21, wherein the processing unit is configured to configure the channels.
25. The apparatus of any of claims 21-24, wherein the network is a WIFI network or a long term evolution LTE network.
26. The apparatus of any of claims 21-25, wherein the presence unit is further configured to share the collaborative work information in a group at a player host interface.
27. The apparatus according to any of claims 21-26, wherein the processing unit is further configured to:
carrying out time synchronization;
and performing cooperative play or cooperative recording according to the sound channel confirmed in the network access stage and the synchronized play starting time.
28. The apparatus according to any one of claims 21 to 27, wherein the processing unit is specifically configured to:
and storing the cooperative work information in a safety folder, wherein the safety folder is a folder which can not be read by processes except the cooperative work process, and the safety mechanism is a mode for storing the cooperative work information.
29. The apparatus according to any of claims 21-28, wherein the processing unit is further configured to:
and forbidding the processes except the cooperative work process to forward the cooperative work information.
30. The apparatus according to any one of claims 21 to 29, wherein the processing unit is further configured to:
detecting a signal strength of the network;
and deleting the cooperative work information when the signal intensity of the network is less than or equal to a preset intensity threshold value.
31. The apparatus according to any one of claims 21 to 30, wherein the processing unit is further configured to:
detecting the distance between the device and second terminal equipment, wherein the device is slave terminal equipment, and the second terminal equipment is master terminal equipment;
and when the distance between the device and the second terminal equipment is greater than a preset distance threshold value, deleting the cooperative work information.
32. The apparatus according to any one of claims 21 to 30, wherein the processing unit is further configured to:
receiving a first quitting command sent by a third terminal device through the obtaining unit, wherein the device is a slave terminal device in the plurality of terminal devices, and the third terminal device is a master terminal device in the plurality of terminal devices;
and deleting the cooperative work information according to the first exit command.
33. The apparatus according to any one of claims 21 to 30, wherein the processing unit is further configured to:
determining that a fourth terminal device leaves a cooperative working area, where the cooperative working area is an area where the plurality of terminal devices cooperatively play and/or cooperatively record, where the fourth terminal device is a slave terminal device in the plurality of terminal devices, and the apparatus is a master terminal device in the plurality of terminal devices;
and sending a second quitting command to the fourth terminal equipment according to the fact that the fourth terminal equipment leaves the cooperative work area, wherein the second quitting command is used for commanding the fourth terminal equipment to delete the cooperative work information.
34. The apparatus according to any one of claims 21 to 30, wherein the processing unit is further configured to:
acquiring a third quitting command through the acquiring unit, wherein the third quitting command is used for commanding a fifth terminal device to quit the network, the fifth terminal device is a slave terminal device in the plurality of terminal devices, and the device is a master terminal device in the plurality of terminal devices;
and sending a fourth quitting command to the fifth terminal equipment according to the third quitting command, wherein the fourth quitting command is used for commanding the fifth terminal equipment to delete the cooperative work information.
35. The apparatus according to any one of claims 21 to 30, wherein the processing unit is further configured to:
receiving incoming call indication information through the acquisition unit;
and deleting the cooperative work information according to the incoming call indication information.
36. The apparatus according to any one of claims 21 to 35, wherein:
the acquisition unit is further configured to: receiving an access request sent by a sixth terminal device through the network, wherein the access request is used for requesting to access information of the device except the cooperative work information, and the sixth terminal device is one of the plurality of terminal devices;
the processing unit is further configured to deny the access request.
37. The apparatus according to any one of claims 21 to 35, wherein the processing unit is further configured to:
and when the device is in a cooperative play state and/or a cooperative recording state, prohibiting processes except the cooperative work process from calling the recorder of the device.
38. The apparatus according to any one of claims 21 to 37, wherein the processing unit is further configured to:
acquiring first indication information through the acquisition unit, wherein the first indication information is used for indicating that the network is about to be disconnected;
and playing prompt voice according to the first indication information, wherein the prompt voice is used for prompting to upload the cooperative work information to a server, and the cooperative work information is recorded by the device.
39. The apparatus according to any one of claims 21 to 38, wherein the processing unit is further configured to:
and when the network is disconnected, deleting the folder for storing the cooperative work information.
40. A computer-readable storage medium having stored therein computer program code for performing the method of any of the preceding claims 1-20 when executed by a processing unit or processor.
CN202011127536.1A 2017-11-27 2017-11-28 Method and device for multi-terminal collaborative safe work Pending CN112398812A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201711206282 2017-11-27
CN2017112062820 2017-11-27
CN201711217742.XA CN109842658B (en) 2017-11-27 2017-11-28 Method and device for multi-terminal collaborative safe work

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201711217742.XA Division CN109842658B (en) 2017-11-27 2017-11-28 Method and device for multi-terminal collaborative safe work

Publications (1)

Publication Number Publication Date
CN112398812A true CN112398812A (en) 2021-02-23

Family

ID=66881142

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011127536.1A Pending CN112398812A (en) 2017-11-27 2017-11-28 Method and device for multi-terminal collaborative safe work
CN201711217742.XA Active CN109842658B (en) 2017-11-27 2017-11-28 Method and device for multi-terminal collaborative safe work

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201711217742.XA Active CN109842658B (en) 2017-11-27 2017-11-28 Method and device for multi-terminal collaborative safe work

Country Status (1)

Country Link
CN (2) CN112398812A (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112752048B (en) * 2019-10-31 2022-04-12 华为技术有限公司 Cooperative work method, device, storage medium and cooperative system
CN113676560B (en) * 2021-10-25 2022-02-22 天津嘉萱智财云科技有限公司 Data sharing method and system based on Internet of things
CN116033057B (en) * 2021-10-27 2024-06-11 荣耀终端有限公司 Method for synchronizing sound recordings based on distributed conversation, electronic equipment and readable storage medium
CN117879153A (en) * 2023-12-12 2024-04-12 东莞莱姆森科技建材有限公司 Collaborative synchronous control system of multiple power utilization modules

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7130807B1 (en) * 1999-11-22 2006-10-31 Accenture Llp Technology sharing during demand and supply planning in a network-based supply chain environment
CN102375947A (en) * 2010-08-16 2012-03-14 伊姆西公司 Method and system for isolating computing environment
US20120191980A1 (en) * 2011-01-21 2012-07-26 Software Ag, Inc. System and method for a secure data collection system
CN102970589A (en) * 2012-11-26 2013-03-13 中国联合网络通信集团有限公司 Control method and device for multi-terminal-based synergetic media stream play
CN104580151A (en) * 2014-12-03 2015-04-29 中国科学院信息工程研究所 Method for preventing confidential conference information from leakage and terminal
CN104581834A (en) * 2013-10-16 2015-04-29 华为技术有限公司 Method, corresponding device and system for cooperative processing of wireless data
US20150271264A1 (en) * 2012-09-21 2015-09-24 Zte Corporation Service Processing Method and Device
CN106375997A (en) * 2016-08-22 2017-02-01 努比亚技术有限公司 Terminal control device, method and terminal
CN107070981A (en) * 2017-01-23 2017-08-18 努比亚技术有限公司 The equipment collaboration control system and method for multiple terminals
US20170332239A1 (en) * 2014-12-19 2017-11-16 Intel Corporation Cooperative security in wireless sensor networks

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7143288B2 (en) * 2002-10-16 2006-11-28 Vormetric, Inc. Secure file system server architecture and methods
CN103413095B (en) * 2013-08-21 2016-08-10 北京网秦天下科技有限公司 The method and apparatus of management mobile terminal
CN104519034B (en) * 2013-09-30 2018-01-26 大唐终端设备有限公司 Control device and its communication means for multiple terminals collaboration amusement
CN103533054B (en) * 2013-10-15 2017-02-01 中国联合网络通信集团有限公司 Method for realizing coordinated processing among multiple terminals and multi-terminal coordinated processing device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7130807B1 (en) * 1999-11-22 2006-10-31 Accenture Llp Technology sharing during demand and supply planning in a network-based supply chain environment
CN102375947A (en) * 2010-08-16 2012-03-14 伊姆西公司 Method and system for isolating computing environment
US20120191980A1 (en) * 2011-01-21 2012-07-26 Software Ag, Inc. System and method for a secure data collection system
US20150271264A1 (en) * 2012-09-21 2015-09-24 Zte Corporation Service Processing Method and Device
CN102970589A (en) * 2012-11-26 2013-03-13 中国联合网络通信集团有限公司 Control method and device for multi-terminal-based synergetic media stream play
CN104581834A (en) * 2013-10-16 2015-04-29 华为技术有限公司 Method, corresponding device and system for cooperative processing of wireless data
CN104580151A (en) * 2014-12-03 2015-04-29 中国科学院信息工程研究所 Method for preventing confidential conference information from leakage and terminal
US20170332239A1 (en) * 2014-12-19 2017-11-16 Intel Corporation Cooperative security in wireless sensor networks
CN106375997A (en) * 2016-08-22 2017-02-01 努比亚技术有限公司 Terminal control device, method and terminal
CN107070981A (en) * 2017-01-23 2017-08-18 努比亚技术有限公司 The equipment collaboration control system and method for multiple terminals

Also Published As

Publication number Publication date
CN109842658A (en) 2019-06-04
CN109842658B (en) 2020-11-10

Similar Documents

Publication Publication Date Title
CN109842658B (en) Method and device for multi-terminal collaborative safe work
US10051648B2 (en) Selective prioritization of voice over data
US8620337B2 (en) Selective establishment of radio access bearers to support simultaneous voice and data communications in a mobile telecommunications network
US11246039B2 (en) Method and apparatus for secure multi-terminal cooperative working
US11601429B2 (en) Network service control for access to wireless radio networks
US20140324591A1 (en) Selectively authenticating a group of devices as being in a shared environment based on locally captured ambient sound
CN115883901A (en) Synchronized playback and control of media
KR20160088325A (en) Using sensor data to provide information for proximally-relevant group communications
US10178238B2 (en) Method and system for dynamic cellular networking activation for virtual SIM service
US9392057B2 (en) Selectively exchanging data between P2P-capable client devices via a server
CN104954361B (en) Contact person's verification method, apparatus and system
CN113411759B (en) Voice call transfer method and electronic equipment
KR101184246B1 (en) Method and apparatus for retrieving data from one or more wireless communication devices
US9628633B2 (en) Method and apparatus for virtual SIM service activation and deactivation via subscription tracking
CN109041145B (en) Communication method, communication device, terminal and storage medium
CN111787538A (en) Host resource allocation device, method and computer readable storage medium
TWI533657B (en) Methods for barring incoming calls and apparatuses using the same
US20160073231A1 (en) Dispatch console client functionality
US20230275892A1 (en) Auto-switching content between devices based on meeting conditions
CN112910906A (en) Data access method and device, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210223

RJ01 Rejection of invention patent application after publication