WO2016045167A1 - 数据传输方法、数据传输装置和数据传输系统 - Google Patents

数据传输方法、数据传输装置和数据传输系统 Download PDF

Info

Publication number
WO2016045167A1
WO2016045167A1 PCT/CN2014/090092 CN2014090092W WO2016045167A1 WO 2016045167 A1 WO2016045167 A1 WO 2016045167A1 CN 2014090092 W CN2014090092 W CN 2014090092W WO 2016045167 A1 WO2016045167 A1 WO 2016045167A1
Authority
WO
WIPO (PCT)
Prior art keywords
transmission
data
terminal
operating system
target terminal
Prior art date
Application number
PCT/CN2014/090092
Other languages
English (en)
French (fr)
Inventor
罗李敏
Original Assignee
酷派软件技术(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 酷派软件技术(深圳)有限公司 filed Critical 酷派软件技术(深圳)有限公司
Priority to EP14902723.7A priority Critical patent/EP3188445A1/en
Publication of WO2016045167A1 publication Critical patent/WO2016045167A1/zh
Priority to US15/468,345 priority patent/US10489602B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1475Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present invention relates to the field of terminal technologies, and in particular, to a data transmission method, a data transmission device, and a data transmission system.
  • the sender When the existing mobile terminal is sharing data, the sender directly establishes a connection with the receiver and sends the sender. The sender cannot determine whether the receiving environment is secure, and there is a risk of theft and eavesdropping after the content is received.
  • the invention is based on the above problems, and proposes a new technical solution, which can ensure the security of the data shared by the sender and the receiver when sharing data, and prevent the problem of theft or eavesdropping after receiving the receiver. .
  • the present invention provides a data transmission method for a terminal, the terminal includes a plurality of operating systems, wherein each operating system corresponds to one transmission module, and the method includes: when receiving the terminal Determining a target transmission mode of the data when the data in the data is transmitted to the target terminal, wherein the target transmission mode includes a normal transmission mode and a secure transmission mode; and when the target transmission mode is the secure transmission mode And switching the current operating system of the terminal to a specified operating system of the plurality of operating systems, and establishing a connection with the target terminal by using the specified operating system; determining whether the target terminal supports security Transmitting; when the result of the judgment is that the target terminal supports secure transmission, the data is transmitted to the target terminal through a secure transmission mode.
  • the terminal detects that the data transmission mode is secure transmission, if the current operating system is not the specified operating system, the user is prompted to automatically switch to the specified operating system.
  • the specified operating system can be a secure operating system. And then establishing a connection with the target terminal of the receiver, and determining whether the target terminal supports secure transmission, that is, determining whether the target terminal has a secure operating system or whether there is a secure transmission module, and when the determination result is yes, the data is passed through the secure transmission mode. Transfer to the target terminal to ensure data security during transmission and after transmission to the target terminal.
  • the method further includes: when the determination result is that the target terminal does not support the secure transmission, prompting the user of the terminal to suspend transmission of the data or transmitting the data to the Target terminal.
  • the user when the target terminal does not support secure transmission, the user is prompted to suspend transmission of data in order to ensure the security of the transmitted data, or prompt the user to directly transmit data by using the normal transmission mode.
  • determining whether the target terminal supports secure transmission comprises: transmitting a transmission environment check command to the target terminal, where the target terminal checks whether there is a corresponding according to the transmission environment check instruction. Specifying an operating system, and when the determination result is yes, sending a support response to the terminal; and determining whether the support response from the target terminal is received, and determining that the target terminal supports when the determination result is yes.
  • the secure transmission determines that the target terminal does not support secure transmission when the determination result is no.
  • the sender terminal sends a transmission environment check command to the target terminal of the receiver, and the target terminal determines, according to the instruction, whether it also has a designated operating system, that is, a secure operating system, and sends a support response when present, thereby notifying The sender terminal can perform secure transmission.
  • the data is transmitted to the target terminal by using a secure transmission mode, and specifically includes: a first transmission module corresponding to a specified operating system of the terminal, and a designated operating system of the target terminal A connection is established between the corresponding second transmission modules, and the data is transmitted from the first transmission module to the second transmission module.
  • the transmission can be performed through the secure transmission mode, indicating that both the sender and the receiver terminal have a transmission module corresponding to the specified operating system and the specified operating system, and at this time, in two A transmission channel is established between the transmission modules to ensure data transmission security.
  • an operating system such as a secure operating system
  • the secure operating system may not be allowed to directly perform data services with the outside world.
  • the data in the secure operating system may be transmitted to other common operating systems in the terminal. Then, the ordinary operating system is transferred to the external operating system of the external target terminal, and then the ordinary terminal transmits to the designated operating system, that is, the secure operating system.
  • the transmission data may be encrypted, and the target terminal receives the data and then performs decryption processing.
  • the designated operating system is an operating system with the highest security level among the plurality of operating systems.
  • the operating system with the highest security level that is, the security operating system, is used as the designated operating system to ensure the security of data transmission and data storage.
  • a data transmission apparatus for a terminal, the terminal includes a plurality of operating systems, wherein each operating system corresponds to one transmission module, and the method includes: determining a unit, when Determining a target transmission mode of the data when receiving a data transmission command for transmitting data in the terminal to a target terminal, wherein the target transmission mode includes a normal transmission mode and a secure transmission mode; When the target transmission mode is the secure transmission mode, switching a current operating system of the terminal to a specified operating system of the plurality of operating systems, and establishing, by the specified operating system, with the target terminal The determining unit determines whether the target terminal supports secure transmission; and the transmitting unit transmits the data to the target terminal by using a secure transmission mode when the determination result is that the target terminal does not support secure transmission.
  • the secure transmission mode may be selected.
  • the terminal detects that the data transmission mode is secure transmission, if the current operating system is not the designated operating system, the user is prompted. Or automatically switch to the specified operating system.
  • the specified operating system can be a secure operating system, and then the target terminal of the receiving party is built. Establish a connection and determine whether the target terminal supports secure transmission, that is, determine whether the target terminal has a secure operating system or whether there is a secure transmission module, and when the judgment result is yes, the data is transmitted to the target terminal through the secure transmission mode, thereby ensuring the data.
  • the data is safe during transmission and after transmission to the target terminal.
  • the prompting unit further includes: a prompting unit, when the determining result is that the target terminal does not support secure transmission, prompting the user of the terminal to suspend transmission of the data or transmitting the data by using a normal transmission mode To the target terminal.
  • the user when the target terminal does not support secure transmission, the user is prompted to suspend transmission of data in order to ensure the security of the transmitted data, or prompt the user to directly transmit data by using the normal transmission mode.
  • the determining unit includes: a sending unit, configured to send a transmission environment check command to the target terminal, where the target terminal checks whether a corresponding specified operating system exists according to the transmission environment check instruction. And when the determination result is yes, sending a support response to the terminal; and the determining unit determines whether the support response from the target terminal is received, and when the determination result is yes, determining that the target terminal supports security Transmission, when the determination result is no, it is determined that the target terminal does not support secure transmission.
  • a sending unit configured to send a transmission environment check command to the target terminal, where the target terminal checks whether a corresponding specified operating system exists according to the transmission environment check instruction. And when the determination result is yes, sending a support response to the terminal; and the determining unit determines whether the support response from the target terminal is received, and when the determination result is yes, determining that the target terminal supports security Transmission, when the determination result is no, it is determined that the target terminal does not support secure transmission.
  • the sender terminal sends a transmission environment check command to the target terminal of the receiver, and the target terminal determines, according to the instruction, whether it also has a designated operating system, that is, a secure operating system, and sends a support response when present, thereby notifying The sender terminal can perform secure transmission.
  • the transmission unit is configured to: establish a connection between a first transmission module corresponding to a specified operating system of the terminal and a second transmission module corresponding to a specified operating system of the target terminal. And transmitting the data from the first transmission module to the second transmission module.
  • the transmission can be performed through the secure transmission mode, and the sender and the receiver terminal both have a transmission module corresponding to the specified operating system and the specified operating system, and at this time, a transmission channel is established between the two transmission modules, thereby Ensure the security of data transmission.
  • an operating system such as a security operating system
  • the secure operating system may not be allowed to directly perform data services with the outside world.
  • the data in the secure operating system may be transmitted to other common operating systems in the terminal. Then, the ordinary operating system is transferred to the external operating system of the external target terminal, and then the ordinary terminal transmits to the designated operating system, that is, the secure operating system.
  • the transmission data may be encrypted, and the target terminal receives the data and then performs decryption processing.
  • the designated operating system is an operating system with the highest security level among the plurality of operating systems.
  • the operating system with the highest security level that is, the security operating system, is used as the designated operating system to ensure the security of data transmission and data storage.
  • a data transmission system comprising the data transmission device according to any one of the above aspects.
  • FIG. 1 shows a flow chart of a data transmission method according to an embodiment of the present invention
  • FIG. 2 shows a block diagram of a data transmission device in accordance with an embodiment of the present invention
  • FIG. 3 is a block diagram showing a data transmission system in accordance with one embodiment of the present invention.
  • FIG. 4 shows a detailed flow chart of a data transmission method in accordance with one embodiment of the present invention.
  • FIG. 1 shows a flow chart of a data transmission method in accordance with an embodiment of the present invention.
  • a data transmission method includes: Step 102: When receiving a data transmission command for transmitting data in the terminal to a target terminal, determining a target transmission mode of the data
  • the target transmission mode includes a normal transmission mode and a secure transmission mode; and in step 104, when the target transmission mode is the secure transmission mode, switching a current operating system of the terminal to the multiple operating systems Specifying an operating system, and establishing a connection with the target terminal by using the specified operating system; step 106, determining whether the target terminal supports secure transmission; and step 108, determining that the target terminal supports security When transmitting, the data is transmitted to the target terminal through a secure transmission mode.
  • the secure transmission mode may be selected.
  • the terminal detects that the data transmission mode is secure transmission, if the current operating system is not the designated operating system, the user is prompted. Or automatically switch to the specified operating system.
  • the specified operating system may be a secure operating system, and then establish a connection with the target terminal of the receiving party, and determine whether the target terminal supports secure transmission, that is, whether the target terminal has a secure operating system or whether There is a secure transmission module, and when the judgment result is yes, the data is transmitted to the target terminal through the secure transmission mode, thereby ensuring data security during transmission and after transmission to the target terminal.
  • the method further includes: when the determination result is that the target terminal does not support the secure transmission, prompting the user of the terminal to suspend transmission of the data or transmitting the data to the Target terminal.
  • the user when the target terminal does not support secure transmission, the user is prompted to suspend transmission of data in order to ensure the security of the transmitted data, or prompt the user to directly transmit data by using the normal transmission mode.
  • determining whether the target terminal supports secure transmission comprises: transmitting a transmission environment check command to the target terminal, where the target terminal checks whether there is a corresponding according to the transmission environment check instruction. Specifying an operating system, and when the determination result is yes, sending a support response to the terminal; and determining whether the target is received The support response of the terminal determines that the target terminal supports secure transmission when the determination result is yes, and determines that the target terminal does not support secure transmission when the determination result is negative.
  • the sender terminal sends a transmission environment check command to the target terminal of the receiver, and the target terminal determines, according to the instruction, whether it also has a designated operating system, that is, a secure operating system, and sends a support response when present, thereby notifying The sender terminal can perform secure transmission.
  • the data is transmitted to the target terminal by using a secure transmission mode, and specifically includes: a first transmission module corresponding to a specified operating system of the terminal, and a designated operating system of the target terminal A connection is established between the corresponding second transmission modules, and the data is transmitted from the first transmission module to the second transmission module.
  • the transmission can be performed through the secure transmission mode, and the sender and the receiver terminal both have a transmission module corresponding to the specified operating system and the specified operating system, and at this time, a transmission channel is established between the two transmission modules, thereby Ensure the security of data transmission.
  • an operating system such as a secure operating system
  • the secure operating system may not be allowed to directly perform data services with the outside world.
  • the data in the secure operating system may be transmitted to other common operating systems in the terminal. Then, the ordinary operating system is transferred to the external operating system of the external target terminal, and then the ordinary terminal transmits to the designated operating system, that is, the secure operating system.
  • the transmission data may be encrypted, and the target terminal receives the data and then performs decryption processing.
  • the designated operating system is an operating system with the highest security level among the plurality of operating systems.
  • the operating system with the highest security level that is, the security operating system, is used as the designated operating system to ensure the security of data transmission and data storage.
  • FIG. 2 shows a block diagram of a data transmission device in accordance with an embodiment of the present invention.
  • a data transmission apparatus 200 includes: determining The unit 202 determines a target transmission mode of the data when receiving a data transmission command for transmitting data in the terminal to the target terminal, where the target transmission mode includes a normal transmission mode and a secure transmission mode;
  • the unit 204 is configured to switch the current operating system of the terminal to a specified operating system of the multiple operating systems when the target transmission mode is the secure transmission mode, and establish and describe by using the specified operating system. a connection between the target terminals; the determining unit 206, determining whether the target terminal supports secure transmission; and the transmitting unit 208, when the determination result is that the target terminal does not support secure transmission, transmitting the data to the office through the secure transmission mode The target terminal.
  • the secure transmission mode may be selected.
  • the terminal detects that the data transmission mode is secure transmission, if the current operating system is not the designated operating system, the user is prompted. Or automatically switch to the specified operating system.
  • the specified operating system may be a secure operating system, and then establish a connection with the target terminal of the receiving party, and determine whether the target terminal supports secure transmission, that is, whether the target terminal has a secure operating system or whether There is a secure transmission module, and when the judgment result is yes, the data is transmitted to the target terminal through the secure transmission mode, thereby ensuring data security during transmission and after transmission to the target terminal.
  • the prompting unit 210 further prompts the user of the terminal to stop transmitting the data or use the normal transmission mode to display the data when the result of the determination is that the target terminal does not support secure transmission. Transfer to the target terminal.
  • the user when the target terminal does not support secure transmission, the user is prompted to suspend transmission of data in order to ensure the security of the transmitted data, or prompt the user to directly transmit data by using the normal transmission mode.
  • the determining unit 206 includes: a sending unit 2062, configured to send a transmission environment check instruction to the target terminal, so that the target terminal checks whether there is a corresponding designation according to the transmission environment check instruction. Operating system, and when the determination result is YES, transmitting a support response to the terminal; and determining unit 2064, determining whether the support response from the target terminal is received, and determining the target when the determination result is YES The terminal supports secure transmission. When the determination result is no, it is determined that the target terminal does not support secure transmission.
  • the sender terminal sends a transmission environment check command to the target terminal of the receiver, and the target terminal determines, according to the instruction, whether it also has a designated operating system, that is, a secure operating system, and sends a support response when present, thereby notifying The sender terminal can perform secure transmission.
  • the transmission unit 208 is specifically configured to: establish between a first transmission module corresponding to a specified operating system of the terminal and a second transmission module corresponding to a specified operating system of the target terminal. Connecting and transmitting the data from the first transmission module to the second transmission module.
  • the transmission can be performed through the secure transmission mode, and the sender and the receiver terminal both have a transmission module corresponding to the specified operating system and the specified operating system, and at this time, a transmission channel is established between the two transmission modules, thereby Ensure the security of data transmission.
  • an operating system such as a secure operating system
  • the secure operating system may not be allowed to directly perform data services with the outside world.
  • the data in the secure operating system may be transmitted to other common operating systems in the terminal. Then, the ordinary operating system is transferred to the external operating system of the external target terminal, and then the ordinary terminal transmits to the designated operating system, that is, the secure operating system.
  • the transmission data may be encrypted, and the target terminal receives the data and then performs decryption processing.
  • the designated operating system is an operating system with the highest security level among the plurality of operating systems.
  • the operating system with the highest security level that is, the security operating system, is used as the designated operating system to ensure the security of data transmission and data storage.
  • the terminal includes two transmission modules, namely, a transmission module 302 of the Android system and a transmission module 304 of the security system, and a transmission environment detection module.
  • 306 (equivalent to the judgment unit) is used to detect the transmission environment of the self and the receiver.
  • the local transmission environment detection module first checks whether the security system is currently in the system, and if not, prompts the user to switch to The security system, at the same time, establishes a connection with the other party's mobile phone in the security system transmission module.
  • the terminal After the connection is successfully established, the terminal sends a transmission environment check command to the other party's terminal. If the other party does not have a secure transmission module, the sender will determine that the transmission must be an unsecure transmission, and will remind the user to abort the transmission or switch to the normal transmission mode.
  • the receiving party When the receiving party has a secure transmission module, the receiving party receives the checking instruction and reminds the user to receive the secure transmission information.
  • the user When the user allows, the user starts the current receiving environment check, and if not in the security system, prompts the user to switch to the security system. .
  • the two parties After the security check of both parties is completed, the two parties establish a connection based on the transmission module of the security system and start transmitting data. After the transmission is completed, the system state is switched to the system state before the transfer according to the user's intention.
  • the secure transmission module and the environment checking module do not need to intervene, and the Android ordinary transmission module can be directly enabled to start transmission.
  • FIG. 4 shows a detailed flow chart of a data transmission method in accordance with one embodiment of the present invention.
  • the specific process of the data transmission method according to an embodiment of the present invention includes:
  • Step 402 it is determined whether the secure transmission is enabled. If the determination result is yes, the process proceeds to step 404. If the determination result is no, the process proceeds to step 406.
  • step 404 it is determined whether the terminal is currently in the security system. If the determination result is yes, the process proceeds to step 408. If the determination result is negative, the process proceeds to step 410.
  • step 406 the transmission module 302 of the Android system is called to start the transmission process.
  • step 408 it is determined whether the receiver terminal is in the security system. If the determination result is yes, the process proceeds to step 412. If the determination result is negative, the process proceeds to step 414.
  • Step 410 switching to the security system.
  • step 412 the transmission module 304 of the security system is invoked to initiate the transmission process.
  • Step 414 switching to the security system.
  • the technical solution of the present invention is described in detail above with reference to the accompanying drawings.
  • the technical solution of the present invention can ensure that the security data of the user can be securely transmitted and stored, and is protected from malicious attacks by other operating systems.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明提出了一种数据传输方法,用于终端,终端包括多个操作系统,其中,每个操作系统对应一个传输模块,方法包括:当接收到将终端中的数据传输至目标终端的数据传输命令时,确定数据的目标传输模式;当目标传输模式为安全传输模式时,将终端的当前操作系统切换至多个操作系统中的指定操作系统,并通过指定操作系统建立与目标终端之间的连接;判断目标终端是否支持安全传输;在判断结果为目标终端支持安全传输时,将所述数据通过安全传输模式传输至所述目标终端。相应地,本发明还提供了一种数据传输装置和数据传输系统。通过本发明的技术方案,能够确保用户的安全数据可以安全传输及存储,避免受到其他操作系统的恶意袭击。

Description

数据传输方法、数据传输装置和数据传输系统 技术领域
本发明涉及终端技术领域,具体而言,涉及一种数据传输方法、一种数据传输装置和一种数据传输系统。
背景技术
现有手机终端在共享数据时,发送方直接与接收方建立连接并发送,发送方不能确定接收方接收环境是否安全,存在内容接收后被盗、窃听等风险。
因此需要一种新的技术方案,可以保证发送方和接收方在共享数据时,所共享的数据的安全性,防止接收方接收后被盗或窃听等问题的发生。
发明内容
本发明正是基于上述问题,提出了一种新的技术方案,可以保证发送方和接收方在共享数据时,所共享的数据的安全性,防止接收方接收后被盗或窃听等问题的发生。
有鉴于此,本发明提出了一种数据传输方法,用于终端,所述终端包括多个操作系统,其中,每个操作系统对应一个传输模块,所述方法包括:当接收到将所述终端中的数据传输至目标终端的数据传输命令时,确定所述数据的目标传输模式,其中,所述目标传输模式包括普通传输模式和安全传输模式;当所述目标传输模式为所述安全传输模式时,将所述终端的当前操作系统切换至所述多个操作系统中的指定操作系统,并通过所述指定操作系统建立与所述目标终端之间的连接;判断所述目标终端是否支持安全传输;在判断结果为所述目标终端支持安全传输时,将所述数据通过安全传输模式传输至所述目标终端。
在该技术方案中,如果终端的用户需要将数据进行安全传输,则可以 选择安全传输模式,当终端检测到数据的传输模式为安全传输时,则若当前的操作系统不是指定操作系统,提示用户或自动切换至指定操作系统,具体地,指定操作系统可以为安全操作系统,继而与接收方的目标终端建立连接,并判断目标终端是否支持安全传输,即判断目标终端是否存在安全操作系统或是否存在安全传输模块,并在判断结果为是时,将数据通过安全传输模式传输至目标终端,从而保证数据在传输过程中和传输至目标终端后的数据安全。
在上述技术方案中,优选地,还包括:在判断结果为所述目标终端不支持安全传输时,提示所述终端的用户中止传输所述数据或者采用普通传输模式将所述数据传输至所述目标终端。
在该技术方案中,在目标终端不支持安全传输时,为了保证传输数据的安全提示用户中止传输数据,或者提示用户采用普通传输模式直接传输数据。
在上述技术方案中,优选地,判断所述目标终端是否支持安全传输,具体包括:发送传输环境检查指令至所述目标终端,以供所述目标终端根据所述传输环境检查指令检查是否存在对应的指定操作系统,并在判断结果为是时,发送支持响应至所述终端;以及判断是否接收到来自所述目标终端的所述支持响应,在判断结果为是时,确定所述目标终端支持安全传输,在判断结果为否时,确定所述目标终端不支持安全传输。
在该技术方案中,发送方终端发送传输环境检查指令至接收方的目标终端,目标终端根据该指令判断其是否也存在指定操作系统,即安全操作系统,并在存在时发送支持响应,从而告知发送方终端可以进行安全传输。
在上述技术方案中,优选地,将所述数据通过安全传输模式传输至所述目标终端,具体包括:在所述终端的指定操作系统对应的第一传输模块和所述目标终端的指定操作系统对应的第二传输模块之间建立连接,并将所述数据从所述第一传输模块传输至所述第二传输模块。
在该技术方案中,可通过安全传输模式传输,则说明发送方和接收方终端都具有指定操作系统和指定操作系统对应的传输模块,此时,在两个 传输模块之间建立传输通道,从而保证数据的传输安全。
具体地,指定操作系统,如安全操作系统,可以直接与其他终端的指定操作系统进行数据传输,如将数据直接从终端A的安全操作系统传输至终端B的安全操作系统。
另外,为了保证其中的数据安全,可能并不允许安全操作系统直接与外界进行数据业务,此时,在进行数据传输时,可以将安全操作系统中的数据传输至终端中的其他普通操作系统,再由普通操作系统传输至外部的目标终端的普通操作系统,进而有普通终端传输至指定操作系统,即安全操作系统。
为了进一步保证数据的安全,还可以对传输数据进行加密处理,接收方目标终端接收到数据后再进行解密处理。
在上述技术方案中,优选地,所述指定操作系统为所述多个操作系统中安全级别最高的操作系统。
在该技术方案中,将安全级别最高的操作系统,即安全操作系统作为指定操作系统,保证数据传输和数据存储的安全性。
根据本发明的另一方面,还提供了一种数据传输装置,用于终端,所述终端包括多个操作系统,其中,每个操作系统对应一个传输模块,所述方法包括:确定单元,当接收到将所述终端中的数据传输至目标终端的数据传输命令时,确定所述数据的目标传输模式,其中,所述目标传输模式包括普通传输模式和安全传输模式;连接建立单元,当所述目标传输模式为所述安全传输模式时,将所述终端的当前操作系统切换至所述多个操作系统中的指定操作系统,并通过所述指定操作系统建立与所述目标终端之间的连接;判断单元,判断所述目标终端是否支持安全传输;传输单元,在判断结果为所述目标终端不支持安全传输时,将所述数据通过安全传输模式传输至所述目标终端。
在该技术方案中,如果终端的用户需要将数据进行安全传输,则可以选择安全传输模式,当终端检测到数据的传输模式为安全传输时,则若当前的操作系统不是指定操作系统,提示用户或自动切换至指定操作系统,具体地,指定操作系统可以为安全操作系统,继而与接收方的目标终端建 立连接,并判断目标终端是否支持安全传输,即判断目标终端是否存在安全操作系统或是否存在安全传输模块,并在判断结果为是时,将数据通过安全传输模式传输至目标终端,从而保证数据在传输过程中和传输至目标终端后的数据安全。
在上述技术方案中,优选地,还包括:提示单元,在判断结果为所述目标终端不支持安全传输时,提示所述终端的用户中止传输所述数据或者采用普通传输模式将所述数据传输至所述目标终端。
在该技术方案中,在目标终端不支持安全传输时,为了保证传输数据的安全提示用户中止传输数据,或者提示用户采用普通传输模式直接传输数据。
在上述技术方案中,优选地,所述判断单元包括:发送单元,发送传输环境检查指令至所述目标终端,以供所述目标终端根据所述传输环境检查指令检查是否存在对应的指定操作系统,并在判断结果为是时,发送支持响应至所述终端;以及判定单元,判断是否接收到来自所述目标终端的所述支持响应,在判断结果为是时,判定所述目标终端支持安全传输,在判断结果为否时,判定所述目标终端不支持安全传输。
在该技术方案中,发送方终端发送传输环境检查指令至接收方的目标终端,目标终端根据该指令判断其是否也存在指定操作系统,即安全操作系统,并在存在时发送支持响应,从而告知发送方终端可以进行安全传输。
在上述技术方案中,优选地,所述传输单元具体用于:在所述终端的指定操作系统对应的第一传输模块和所述目标终端的指定操作系统对应的第二传输模块之间建立连接,并将所述数据从所述第一传输模块传输至所述第二传输模块。
在该技术方案中,可通过安全传输模式传输,则说明发送方和接收方终端都具有指定操作系统和指定操作系统对应的传输模块,此时,在两个传输模块之间建立传输通道,从而保证数据的传输安全。
具体地,指定操作系统,如安全操作系统,可以直接与其他终端的指定操作系统进行数据传输,如将数据直接从终端A的安全操作系统传输至 终端B的安全操作系统。
另外,为了保证其中的数据安全,可能并不允许安全操作系统直接与外界进行数据业务,此时,在进行数据传输时,可以将安全操作系统中的数据传输至终端中的其他普通操作系统,再由普通操作系统传输至外部的目标终端的普通操作系统,进而有普通终端传输至指定操作系统,即安全操作系统。
为了进一步保证数据的安全,还可以对传输数据进行加密处理,接收方目标终端接收到数据后再进行解密处理。
在上述技术方案中,优选地,所述指定操作系统为所述多个操作系统中安全级别最高的操作系统。
在该技术方案中,将安全级别最高的操作系统,即安全操作系统作为指定操作系统,保证数据传输和数据存储的安全性。
根据本发明的再一方面的实施例,还提供了一种数据传输系统,包括上述技术方案中任一项所述的数据传输装置。
通过以上技术方案,能够确保用户的安全数据可以安全传输及存储,避免受到其他操作系统的恶意袭击。
附图说明
图1示出了根据本发明的实施例的数据传输方法的流程图;
图2示出了根据本发明的实施例的数据传输装置的框图;
图3示出了根据本发明的一个实施例的数据传输系统的结构图;
图4示出了根据本发明的一个实施例的数据传输方法的具体流程图。
具体实施方式
为了能够更清楚地理解本发明的上述目的、特征和优点,下面结合附图和具体实施方式对本发明进行进一步的详细描述。需要说明的是,在不冲突的情况下,本申请的实施例及实施例中的特征可以相互组合。
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是,本发明还可以采用其他不同于在此描述的其他方式来实施,因此,本发明 的保护范围并不受下面公开的具体实施例的限制。
图1示出了根据本发明的实施例的数据传输方法的流程图。
如图1所示,根据本发明的实施例的数据传输方法,包括:步骤102,当接收到将所述终端中的数据传输至目标终端的数据传输命令时,确定所述数据的目标传输模式,其中,所述目标传输模式包括普通传输模式和安全传输模式;步骤104,当所述目标传输模式为所述安全传输模式时,将所述终端的当前操作系统切换至所述多个操作系统中的指定操作系统,并通过所述指定操作系统建立与所述目标终端之间的连接;步骤106,判断所述目标终端是否支持安全传输;步骤108,在判断结果为所述目标终端支持安全传输时,将所述数据通过安全传输模式传输至所述目标终端。
在该技术方案中,如果终端的用户需要将数据进行安全传输,则可以选择安全传输模式,当终端检测到数据的传输模式为安全传输时,则若当前的操作系统不是指定操作系统,提示用户或自动切换至指定操作系统,具体地,指定操作系统可以为安全操作系统,继而与接收方的目标终端建立连接,并判断目标终端是否支持安全传输,即判断目标终端是否存在安全操作系统或是否存在安全传输模块,并在判断结果为是时,将数据通过安全传输模式传输至目标终端,从而保证数据在传输过程中和传输至目标终端后的数据安全。
在上述技术方案中,优选地,还包括:在判断结果为所述目标终端不支持安全传输时,提示所述终端的用户中止传输所述数据或者采用普通传输模式将所述数据传输至所述目标终端。
在该技术方案中,在目标终端不支持安全传输时,为了保证传输数据的安全提示用户中止传输数据,或者提示用户采用普通传输模式直接传输数据。
在上述技术方案中,优选地,判断所述目标终端是否支持安全传输,具体包括:发送传输环境检查指令至所述目标终端,以供所述目标终端根据所述传输环境检查指令检查是否存在对应的指定操作系统,并在判断结果为是时,发送支持响应至所述终端;以及判断是否接收到来自所述目标 终端的所述支持响应,在判断结果为是时,确定所述目标终端支持安全传输,在判断结果为否时,确定所述目标终端不支持安全传输。
在该技术方案中,发送方终端发送传输环境检查指令至接收方的目标终端,目标终端根据该指令判断其是否也存在指定操作系统,即安全操作系统,并在存在时发送支持响应,从而告知发送方终端可以进行安全传输。
在上述技术方案中,优选地,将所述数据通过安全传输模式传输至所述目标终端,具体包括:在所述终端的指定操作系统对应的第一传输模块和所述目标终端的指定操作系统对应的第二传输模块之间建立连接,并将所述数据从所述第一传输模块传输至所述第二传输模块。
在该技术方案中,可通过安全传输模式传输,则说明发送方和接收方终端都具有指定操作系统和指定操作系统对应的传输模块,此时,在两个传输模块之间建立传输通道,从而保证数据的传输安全。
具体地,指定操作系统,如安全操作系统,可以直接与其他终端的指定操作系统进行数据传输,如将数据直接从终端A的安全操作系统传输至终端B的安全操作系统。
另外,为了保证其中的数据安全,可能并不允许安全操作系统直接与外界进行数据业务,此时,在进行数据传输时,可以将安全操作系统中的数据传输至终端中的其他普通操作系统,再由普通操作系统传输至外部的目标终端的普通操作系统,进而有普通终端传输至指定操作系统,即安全操作系统。
为了进一步保证数据的安全,还可以对传输数据进行加密处理,接收方目标终端接收到数据后再进行解密处理。
在上述技术方案中,优选地,所述指定操作系统为所述多个操作系统中安全级别最高的操作系统。
在该技术方案中,将安全级别最高的操作系统,即安全操作系统作为指定操作系统,保证数据传输和数据存储的安全性。
图2示出了根据本发明的实施例的数据传输装置的框图。
如图2所示,根据本发明的实施例的数据传输装置200,包括:确定 单元202,当接收到将所述终端中的数据传输至目标终端的数据传输命令时,确定所述数据的目标传输模式,其中,所述目标传输模式包括普通传输模式和安全传输模式;连接建立单元204,当所述目标传输模式为所述安全传输模式时,将所述终端的当前操作系统切换至所述多个操作系统中的指定操作系统,并通过所述指定操作系统建立与所述目标终端之间的连接;判断单元206,判断所述目标终端是否支持安全传输;传输单元208,在判断结果为所述目标终端不支持安全传输时,将所述数据通过安全传输模式传输至所述目标终端。
在该技术方案中,如果终端的用户需要将数据进行安全传输,则可以选择安全传输模式,当终端检测到数据的传输模式为安全传输时,则若当前的操作系统不是指定操作系统,提示用户或自动切换至指定操作系统,具体地,指定操作系统可以为安全操作系统,继而与接收方的目标终端建立连接,并判断目标终端是否支持安全传输,即判断目标终端是否存在安全操作系统或是否存在安全传输模块,并在判断结果为是时,将数据通过安全传输模式传输至目标终端,从而保证数据在传输过程中和传输至目标终端后的数据安全。
在上述技术方案中,优选地,还包括:提示单元210,在判断结果为所述目标终端不支持安全传输时,提示所述终端的用户中止传输所述数据或者采用普通传输模式将所述数据传输至所述目标终端。
在该技术方案中,在目标终端不支持安全传输时,为了保证传输数据的安全提示用户中止传输数据,或者提示用户采用普通传输模式直接传输数据。
在上述技术方案中,优选地,所述判断单元206包括:发送单元2062,发送传输环境检查指令至所述目标终端,以供所述目标终端根据所述传输环境检查指令检查是否存在对应的指定操作系统,并在判断结果为是时,发送支持响应至所述终端;以及判定单元2064,判断是否接收到来自所述目标终端的所述支持响应,在判断结果为是时,判定所述目标终端支持安全传输,在判断结果为否时,判定所述目标终端不支持安全传输。
在该技术方案中,发送方终端发送传输环境检查指令至接收方的目标终端,目标终端根据该指令判断其是否也存在指定操作系统,即安全操作系统,并在存在时发送支持响应,从而告知发送方终端可以进行安全传输。
在上述技术方案中,优选地,所述传输单元208具体用于:在所述终端的指定操作系统对应的第一传输模块和所述目标终端的指定操作系统对应的第二传输模块之间建立连接,并将所述数据从所述第一传输模块传输至所述第二传输模块。
在该技术方案中,可通过安全传输模式传输,则说明发送方和接收方终端都具有指定操作系统和指定操作系统对应的传输模块,此时,在两个传输模块之间建立传输通道,从而保证数据的传输安全。
具体地,指定操作系统,如安全操作系统,可以直接与其他终端的指定操作系统进行数据传输,如将数据直接从终端A的安全操作系统传输至终端B的安全操作系统。
另外,为了保证其中的数据安全,可能并不允许安全操作系统直接与外界进行数据业务,此时,在进行数据传输时,可以将安全操作系统中的数据传输至终端中的其他普通操作系统,再由普通操作系统传输至外部的目标终端的普通操作系统,进而有普通终端传输至指定操作系统,即安全操作系统。
为了进一步保证数据的安全,还可以对传输数据进行加密处理,接收方目标终端接收到数据后再进行解密处理。
在上述技术方案中,优选地,所述指定操作系统为所述多个操作系统中安全级别最高的操作系统。
在该技术方案中,将安全级别最高的操作系统,即安全操作系统作为指定操作系统,保证数据传输和数据存储的安全性。
下面以双系统终端(Android系统和安全系统)为例,详细说明本发明的技术方案。
如图3所示,基于双系统,终端包括两个传输模块,即Android系统的传输模块302和安全系统的传输模块304,同时还有传输环境检测模块 306(相当于判断单元)用于检测自己和接收方的传输环境,当用户需要使用安全传输功能时,本地的传输环境检测模块首先会检查当前是否处于安全系统,如果不是,则提示用户切换到安全系统,同时在安全系统传输模块建立与对方手机的连接。
连接建立成功后,终端会发送传输环境检查指令到对方终端,如果对方没有安全传输模块,则发送方会判定此次传输一定是非安全的传输,将提醒用户中止传输或是切换到正常传输模式。
当接收方存在安全传输模块时,接收方接收检查指令,并提醒用户接收到安全传输信息,在用户允许情况下,启动用当前接收环境检查,如果未运行在安全系统,提醒用户切换到安全系统。
完成双方的安全性检查后,双方基于安全系统的传输模块建立连接,并开始传输数据,传输完成后,根据用户意愿切换到转输之前的系统状态。
如果用户只是想使用Android系统的普通传输模式,那么安全传输模块和环境检查模块都不需要介入,直接启用Android普通传输模块即可开始传输。
图4示出了根据本发明的一个实施例的数据传输方法的具体流程图。
如图4所示,根据本发明的一个实施例的数据传输方法的具体流程包括:
步骤402,判断是否启用安全传输,在判断结果为是时,进入步骤404,在判断结果为否时,进入步骤406.
步骤404,判断终端当前是否处在安全系统下,在判断结果为是时,进入步骤408,在判断结果为否时,进入步骤410。
步骤406,调用Android系统的传输模块302启动传输过程。
步骤408,判断接收方终端是否在安全系统下,在判断结果为是时,进入步骤412,在判断结果为否时,进入步骤414。
步骤410,切换到安全系统。
步骤412,调用安全系统的传输模块304启动传输过程。
步骤414,切换到安全系统。
以上结合附图详细说明了本发明的技术方案,通过本发明的技术方案,能够确保用户的安全数据可以安全传输及存储,避免受到其他操作系统的恶意袭击。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (11)

  1. 一种数据传输方法,其特征在于,用于终端,所述终端包括多个操作系统,其中,每个操作系统对应一个传输模块,所述方法包括:
    当接收到将所述终端中的数据传输至目标终端的数据传输命令时,确定所述数据的目标传输模式,其中,所述目标传输模式包括普通传输模式和安全传输模式;
    当所述目标传输模式为所述安全传输模式时,将所述终端的当前操作系统切换至所述多个操作系统中的指定操作系统,并通过所述指定操作系统建立与所述目标终端之间的连接;
    判断所述目标终端是否支持安全传输;
    在判断结果为所述目标终端支持安全传输时,将所述数据通过安全传输模式传输至所述目标终端。
  2. 根据权利要求1所述的数据传输方法,其特征在于,还包括:
    在判断结果为所述目标终端不支持安全传输时,提示所述终端的用户中止传输所述数据或者采用普通传输模式将所述数据传输至所述目标终端。
  3. 根据权利要求1所述的数据传输方法,其特征在于,判断所述目标终端是否支持安全传输,具体包括:
    发送传输环境检查指令至所述目标终端,以供所述目标终端根据所述传输环境检查指令检查是否存在对应的指定操作系统,并在判断结果为是时,发送支持响应至所述终端;以及
    判断是否接收到来自所述目标终端的所述支持响应,在判断结果为是时,确定所述目标终端支持安全传输,在判断结果为否时,确定所述目标终端不支持安全传输。
  4. 根据权利要求3所述的数据传输方法,其特征在于,
    将所述数据通过安全传输模式传输至所述目标终端,具体包括:
    在所述终端的指定操作系统对应的第一传输模块和所述目标终端的指定操作系统对应的第二传输模块之间建立连接,并将所述数据从所述第一 传输模块传输至所述第二传输模块。
  5. 根据权利要求1至4中任一项所述的数据传输方法,其特征在于,
    所述指定操作系统为所述多个操作系统中安全级别最高的操作系统。
  6. 一种数据传输装置,其特征在于,用于终端,所述终端包括多个操作系统,其中,每个操作系统对应一个传输模块,所述方法包括:
    确定单元,当接收到将所述终端中的数据传输至目标终端的数据传输命令时,确定所述数据的目标传输模式,其中,所述目标传输模式包括普通传输模式和安全传输模式;
    连接建立单元,当所述目标传输模式为所述安全传输模式时,将所述终端的当前操作系统切换至所述多个操作系统中的指定操作系统,并通过所述指定操作系统建立与所述目标终端之间的连接;
    判断单元,判断所述目标终端是否支持安全传输;
    传输单元,在判断结果为所述目标终端支持安全传输时,将所述数据通过安全传输模式传输至所述目标终端。
  7. 根据权利要求6所述的数据传输装置,其特征在于,还包括:
    提示单元,在判断结果为所述目标终端不支持安全传输时,提示所述终端的用户中止传输所述数据或者采用普通传输模式将所述数据传输至所述目标终端。
  8. 根据权利要求6所述的数据传输装置,其特征在于,所述判断单元包括:
    发送单元,发送传输环境检查指令至所述目标终端,以供所述目标终端根据所述传输环境检查指令检查是否存在对应的指定操作系统,并在判断结果为是时,发送支持响应至所述终端;以及
    判定单元,判断是否接收到来自所述目标终端的所述支持响应,在判断结果为是时,判定所述目标终端支持安全传输,在判断结果为否时,判定所述目标终端不支持安全传输。
  9. 根据权利要求8所述的数据传输装置,其特征在于,所述传输单元具体用于:
    在所述终端的指定操作系统对应的第一传输模块和所述目标终端的指定操作系统对应的第二传输模块之间建立连接,并将所述数据从所述第一传输模块传输至所述第二传输模块。
  10. 根据权利要求6至9中任一项所述的数据传输装置,其特征在于,
    所述指定操作系统为所述多个操作系统中安全级别最高的操作系统。
  11. 一种数据传输系统,其特征在于,包括:如权利要求6至10中任一项所述的数据传输装置。
PCT/CN2014/090092 2014-09-26 2014-10-31 数据传输方法、数据传输装置和数据传输系统 WO2016045167A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP14902723.7A EP3188445A1 (en) 2014-09-26 2014-10-31 Data transmission method, apparatus, and system
US15/468,345 US10489602B2 (en) 2014-09-26 2017-03-24 Data transmission method, apparatus, and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410505903.5A CN104202343A (zh) 2014-09-26 2014-09-26 数据传输方法、数据传输装置和数据传输系统
CN201410505903.5 2014-09-26

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/468,345 Continuation-In-Part US10489602B2 (en) 2014-09-26 2017-03-24 Data transmission method, apparatus, and system

Publications (1)

Publication Number Publication Date
WO2016045167A1 true WO2016045167A1 (zh) 2016-03-31

Family

ID=52087568

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/090092 WO2016045167A1 (zh) 2014-09-26 2014-10-31 数据传输方法、数据传输装置和数据传输系统

Country Status (4)

Country Link
US (1) US10489602B2 (zh)
EP (1) EP3188445A1 (zh)
CN (1) CN104202343A (zh)
WO (1) WO2016045167A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161733B (zh) * 2015-03-26 2020-02-21 深圳酷派技术有限公司 一种系统切换方法、装置和移动终端
CN105631344B (zh) * 2015-04-30 2018-11-06 南京酷派软件技术有限公司 安全数据的访问控制方法及系统、终端
CN105005746A (zh) * 2015-06-04 2015-10-28 上海卓易科技股份有限公司 安卓电容屏终端数据传输方法及系统
US10320786B2 (en) 2015-09-14 2019-06-11 Samsung Electronics Co., Ltd. Electronic apparatus and method for controlling the same
KR102489918B1 (ko) * 2015-09-14 2023-01-20 삼성전자주식회사 전자 장치 및 이의 제어 방법
CN105611528B (zh) * 2015-12-28 2019-02-26 北京元心科技有限公司 多系统智能终端及其加密电话通信方法
CN107508882B (zh) * 2017-08-18 2021-03-19 珠海市魅族科技有限公司 一种数据传输的方法、相关装置以及存储介质
CN110213283A (zh) * 2019-06-11 2019-09-06 山东管理学院 一种贸易经济信息互联网传输方法
EP3822836A1 (en) * 2019-11-12 2021-05-19 Koninklijke Philips N.V. Device and method for secure communication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202075A (zh) * 2010-03-26 2011-09-28 联想(北京)有限公司 数据共享方法及便携终端
US20130191457A1 (en) * 2012-01-24 2013-07-25 International Business Machines Corporation Automatic Determining of File Transfer Mode
CN103618736A (zh) * 2013-12-09 2014-03-05 成都达信通通讯设备有限公司 移动终端自动切换不同通道联网接口的安全应用系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2391717A1 (en) * 2002-06-26 2003-12-26 Ibm Canada Limited-Ibm Canada Limitee Transferring data and storing metadata across a network
US8782405B2 (en) * 2004-03-18 2014-07-15 International Business Machines Corporation Providing transaction-level security
US20050273708A1 (en) * 2004-06-03 2005-12-08 Verity, Inc. Content-based automatic file format indetification
FR2886801B1 (fr) * 2005-06-07 2007-08-03 Alcatel Sa Equipement de reseau pour la fourniture a des terminaux mobiles multimodes de donnees necessaires a la selection automatique d'interfaces de reseau d'acces radio pendant des sessions de service
US8935677B2 (en) * 2008-04-07 2015-01-13 Microsoft Corporation Automatic reverse engineering of input formats
CN103136052A (zh) * 2011-11-25 2013-06-05 展讯通信(上海)有限公司 移动终端及安装有多个操作系统的移动终端的控制方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202075A (zh) * 2010-03-26 2011-09-28 联想(北京)有限公司 数据共享方法及便携终端
US20130191457A1 (en) * 2012-01-24 2013-07-25 International Business Machines Corporation Automatic Determining of File Transfer Mode
CN103618736A (zh) * 2013-12-09 2014-03-05 成都达信通通讯设备有限公司 移动终端自动切换不同通道联网接口的安全应用系统

Also Published As

Publication number Publication date
US10489602B2 (en) 2019-11-26
EP3188445A1 (en) 2017-07-05
US20170193242A1 (en) 2017-07-06
CN104202343A (zh) 2014-12-10

Similar Documents

Publication Publication Date Title
WO2016045167A1 (zh) 数据传输方法、数据传输装置和数据传输系统
US9654981B2 (en) Data integrity for proximity-based communication
CN105245541B (zh) 鉴权方法、设备及系统
US9615257B2 (en) Data integrity for proximity-based communication
EP3333753B1 (en) Verified privacy mode devices
US9100773B2 (en) Verifying a wireless device
US10178223B1 (en) Fraudulent subscriber identity module (SIM) swap detection
TWI571094B (zh) 具有經改良的裝置識別及傳訊鏈結安全之無線電力傳遞技術
US20140155033A1 (en) Transferring a voice call
CN104184738A (zh) 终端的信息共享方法、终端的信息共享装置和终端
US9775041B2 (en) System and method for tethering to a mobile communication device
US9894507B2 (en) Automatic data exchange between peer devices
CN105792149A (zh) 短信处理系统及其初始化方法、短信存储方法和阅读方法
EP2739072B1 (en) Verifying a wireless device
KR101729693B1 (ko) 휴대 장치를 이용한 망 분리 컴퓨터 보안 시스템 및 방법
CN106559393B (zh) 一种通话加密的方法、装置及系统
KR101542829B1 (ko) 서버를 이용한 발신자 인증방법
WO2016177104A1 (zh) 一种数据传输装置方法和装置、及双头线
US8811902B2 (en) Data protection system
US11350238B2 (en) Systems and methods for detecting the presence of a user at a computer
CN116156502A (zh) 一种基于网络隧道的网络连接系统、方法、电子设备
CN105554727A (zh) 手机卡安全验证方法、手机卡安全验证装置和终端
WO2017165043A1 (en) Mac address-bound wlan password

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14902723

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2014902723

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014902723

Country of ref document: EP