WO2016177104A1 - 一种数据传输装置方法和装置、及双头线 - Google Patents
一种数据传输装置方法和装置、及双头线 Download PDFInfo
- Publication number
- WO2016177104A1 WO2016177104A1 PCT/CN2016/076275 CN2016076275W WO2016177104A1 WO 2016177104 A1 WO2016177104 A1 WO 2016177104A1 CN 2016076275 W CN2016076275 W CN 2016076275W WO 2016177104 A1 WO2016177104 A1 WO 2016177104A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- interface
- data transmission
- identity authentication
- key input
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- This paper relates to the field of data communication, especially a data transmission device method and device, and a double-headed line.
- mobile terminals such as mobile phones can communicate by wireless transmission, for example, wifi, Bluetooth, infrared, and the like.
- both mobile terminals of the transmission need to operate through the screen interface, and complete the connection preparation work before the data transmission, and the connection preparation work includes selecting the transmission mode, searching for the other party, inputting the pairing code pairing, etc., and the connection preparation work is completed. It is also done wirelessly.
- the wireless method is less secure.
- the malicious monitoring software can obtain the input pairing code by means of monitoring, thereby illegally accessing the data resources stored in the mobile terminal.
- a more secure method of data transmission between mobile phones is needed.
- the technical problem to be solved by the present invention is to provide a data transmission apparatus method and apparatus, and a double-head line to improve the security of data transmission between mobile terminals.
- a data transmission method comprising:
- the first terminal performs identity authentication on the second terminal by using a data line interface
- the data line interface is a headphone interface
- the data line interface is a USB interface.
- the second through the data line interface The steps for the terminal to perform identity authentication include:
- the first terminal acquires a corresponding key according to the received key input combination
- the first terminal detects whether the key is consistent with a pre-stored key, and determines that the identity authentication of the second terminal is successfully completed.
- the data transmission method further includes:
- the first terminal sends an identity authentication success notification message to the second terminal by using the earphone interface, and the identity authentication success notification message is used by the second terminal to initiate data transmission with the first terminal.
- the method includes:
- the first terminal receives the secret key input by the user, and generates a corresponding key input combination according to the secret key input by the user;
- the first terminal sends the key input combination to the third terminal through the data line interface, so that the third terminal performs identity authentication on the first terminal.
- a data transmission device is disposed on a terminal, the device comprising an authentication unit and a transmission unit, wherein
- the authentication unit is configured to: perform identity authentication on the second terminal by using a data line interface
- the transmission unit is configured to perform data transmission with the second terminal after the identity authentication of the second terminal is successfully completed.
- the data line interface is a headphone interface
- the data line interface is a USB interface.
- the authentication unit when the data line interface is a headphone interface, the authentication unit includes a receiving module, a key obtaining module, and a determining module, where
- the receiving module is configured to: receive, by the earphone interface, a key input combination of the second terminal;
- the key acquisition module is configured to: obtain a corresponding key according to the received key input combination
- the determining module is configured to: detect whether the key is consistent with a pre-stored key, and determine that the identity authentication of the second terminal is successfully completed.
- the authentication unit further includes a notification module, where
- the notification module is configured to: after the determining module determines that the identity authentication of the second terminal is successfully completed, send an identity authentication success notification message to the second terminal by using the headset interface, the identity authentication success notification message Used for the second terminal to initiate data transmission with the first terminal.
- the device further includes a secret key sending unit, wherein
- the key sending unit is configured to: receive a secret key input by the user, and generate a corresponding key input combination according to the secret key input by the user; and send the key input combination to the to-be-used by the data line interface
- the third terminal that performs identity authentication on the first terminal.
- a double-headed line connecting the first terminal and the second terminal, wherein the double-headed line includes: a first interface, a second interface, and a button unit;
- the first interface is connected to the data line interface of the first terminal, and the second interface is connected to the data line interface of the second terminal;
- the button unit is configured to: receive a key input by the user, and generate a corresponding key input combination according to the key input by the user; and send the key input combination to the first terminal or by using the first interface The second terminal.
- a terminal comprising any of the above data transmission devices.
- a computer program comprising program instructions that, when executed by a terminal, cause the terminal to perform any of the above described data transmission methods.
- the technical solution provided by the present invention includes: the first terminal performs the identity authentication process of the second terminal by using the data line interface; after the identity authentication of the second terminal is successfully completed, the first terminal performs the second terminal Data transfer between.
- the first terminal performs the identity authentication process of the second terminal through the data line interface, that is, the mobile terminal completes the connection preparation work before the data communication by means of the wired connection, thereby improving the security of the connection preparation work, and connecting
- the data is transmitted by means of a wired connection or a wireless connection, and the data transmission device method is used to improve the security of data transmission between the mobile terminals.
- FIG. 1 is a flowchart of a data transmission method according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a double-headed line according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention.
- an embodiment of the present invention provides a data transmission method, where the method includes:
- Step 100 The first terminal performs identity authentication on the second terminal by using a data line interface.
- Step 200 After the identity authentication of the second terminal is successfully completed, data transmission is performed between the first terminal and the second terminal.
- the data line interface is a headphone interface; or the data line interface is a USB interface.
- step 100 the step of authenticating the second terminal through the data line interface includes steps 110-130:
- Step 110 Receive a key input combination through the earphone interface
- Step 120 Acquire a corresponding key according to the received key input combination
- Step 130 Detect whether the secret key matches the pre-stored secret key, and when it is met, determine that the identity authentication of the second terminal is successfully completed.
- step 130 after the determining that the identity authentication of the second terminal is successfully completed, the step 100 further includes:
- Step 140 The first terminal sends an identity authentication success notification message to the second terminal by using the earphone interface, and the identity authentication success notification message is used by the second terminal to initiate data transmission with the first terminal.
- step 200 data transmission between the first terminal and the second terminal may be performed by using various communication methods, such as wifi, Bluetooth, infrared, and the like.
- the first terminal is the role of the active party of the identity authentication.
- the first terminal may also function as the passive party of the identity authentication during the communication process of the two terminals.
- the following describes the communication process between the first terminal and the third terminal as an example.
- the data transmission method further includes:
- Step 500 The first terminal receives identity authentication of the first terminal by the third terminal by using a data line interface.
- Step 600 After the identity authentication of the first terminal is successfully completed, the first terminal performs data transmission with the third terminal.
- the step 500 includes: the first terminal receives the key input by the user, and receives the key according to the user.
- the entered key generates a corresponding key input combination; the first terminal sends the key input combination to the third terminal through a data line interface, such as a headphone interface.
- the key input combination may also be sent to the third terminal through another data line interface.
- the role of the terminal as the active party of the identity authentication or the role of the passive party as the identity authentication may be determined according to user operations.
- the second terminal will be the active party of the identity authentication, and the second terminal will perform the first The process of identity authentication of the terminal. If the user inputs the secret key on the screen of the second terminal, the first terminal will be the active party of the identity authentication, and the first terminal will perform the process of identity authentication for the second terminal.
- the button unit of the double-headed line detects the user input key
- the button unit of the double-headed line will simultaneously secret
- the key input combination corresponding to the key is sent to the first terminal and the second terminal, and the prompt of receiving the key is performed on the screens of the first terminal and the second terminal, and the first terminal receives the confirmation of the prompt of the user to receive the key.
- the first terminal will be the active party of the identity authentication, the first terminal will perform the process of identity authentication for the second terminal; when the second terminal receives the confirmation of the user's prompt to receive the key, then the second terminal As the active party of identity authentication, the second terminal will perform the process of identity authentication for the first terminal.
- the following is a description of the specific implementation scenario, where the first terminal is the mobile phone 1 and the second terminal is the mobile phone 2.
- the embodiment of the present invention can be provided by using the embodiment of the present invention.
- the double-headed line connects the first terminal and the second terminal.
- the embodiment of the present invention provides a dual-head line for connecting the first terminal and the second terminal.
- the double-head line includes: a first interface 100, a second interface 200, and a button unit 300;
- the first interface 100 is connected to the data line interface of the first terminal, and the second interface 200 is connected to the data line interface of the second terminal;
- the button unit 300 is configured to: receive a secret key input by the user, and according to the secret input by the user Key, generating a corresponding key input combination; and transmitting the key input combination to the first terminal through the first interface 100.
- the key input combination can also be sent to the second terminal through the second interface 200.
- the communication process of the mobile phone 1 and the mobile phone 2 is as follows:
- Step 11 the button unit on the double-head line sends a key input combination to the mobile phone 1 according to the user's key input;
- the key input combination is specifically a combination of a group of pulse signals, and the button unit can convert the button signal into a corresponding pulse signal, and the mobile phone side receives the pulse signal through the earphone interface.
- Step 12 The mobile phone 1 receives the input key input combination through the earphone interface, and acquires a corresponding key according to the received key input combination.
- the mobile phone side stores the correspondence between the pulse signal and the button. Therefore, the corresponding key can be obtained according to the key input combination. For example, the corresponding key is obtained as “123” according to the received set of pulse signals.
- Step 13 The mobile phone 1 compares the obtained secret key with the pre-made secret key, and if yes, determines that the identity authentication of the mobile phone 2 is successfully completed.
- Step 14 The mobile phone 1 sends an identity authentication success notification message to the mobile phone 2 through the earphone interface.
- the mobile phone 1 and the mobile phone 2 complete the verification process before the data communication, and the data transmission between the mobile phone 1 and the mobile phone 2 can be performed.
- connection between the mobile phone 1 and the mobile phone 2 is performed by the double-headed line provided by the embodiment of the present invention.
- the connection between the mobile phone 1 and the mobile phone 2 can also be performed through the double-headed line of the related art, and the mobile phone is also connected. Touch the screen to enter the key.
- the communication process of the mobile phone 1 and the mobile phone 2 is as follows:
- Step 21 The mobile phone 2 receives the secret key input by the user through the touch screen.
- Step 22 The mobile phone 2 generates a corresponding key input combination according to the secret key input by the user, and sends the key input combination through the earphone interface.
- the key input combination is specifically a combination of a group of pulse signals.
- Step 23 The mobile phone 1 receives the key input combination sent by the mobile phone 2 through the earphone interface, and acquires a corresponding key according to the received key input combination.
- the mobile phone side stores the correspondence between the pulse signal and the button. Therefore, the corresponding key can be obtained according to the key input combination. For example, the corresponding key is obtained as “123” according to the received set of pulse signals.
- Step 24 The mobile phone 1 compares the obtained secret key with the pre-made secret key, and if yes, determines that the identity authentication of the mobile phone 2 is successfully completed.
- Step 25 The mobile phone 1 sends an identity authentication success notification message to the mobile phone 2 through the earphone interface.
- the mobile phone 1 and the mobile phone 2 complete the verification process before the data communication, and the data transmission between the mobile phone 1 and the mobile phone 2 can be performed.
- a data transmission device which is disposed on a terminal.
- a data transmission device includes:
- the authentication unit 10 is configured to: perform an identity authentication process of the second terminal by using a data line interface;
- the transmission unit 20 is configured to perform data transmission with the second terminal after the identity authentication of the second terminal is successfully completed.
- the data line interface is a headphone interface
- the data line interface is a USB interface.
- the authentication unit 10 when the data line interface is a headphone interface, the authentication unit 10 includes:
- the receiving module 11 is configured to: receive a key input combination through the earphone interface;
- the key acquisition module 12 is configured to: obtain a corresponding key according to the received key input combination;
- the determining module 13 is configured to: detect whether the secret key matches the pre-stored secret key, and when it is met, determine that the identity authentication of the second terminal is successfully completed.
- the authentication unit 10 further includes:
- the notification module 14 is configured to: after the determining that the identity authentication of the second terminal is successfully completed, And sending, by the headset interface, an identity authentication success notification message to the second terminal, where the identity authentication success notification message is used by the second terminal to initiate data transmission with the first terminal.
- the data transmission device further includes:
- the key sending unit 30 is configured to: receive a secret key input by the user, and generate a corresponding key input combination according to the secret key input by the user; and send the key input combination to the third terminal through the earphone interface.
- the embodiment of the present invention further provides a terminal, where the terminal includes any data transmission apparatus provided by the embodiment of the present invention.
- the terminal provided by the embodiment of the present invention may further include the double-headed line provided by the embodiment of the present invention.
- the embodiment of the present invention further discloses a computer program, including program instructions, when the program instructions are executed by the terminal, so that the terminal can execute any of the above data transmission methods.
- the embodiment of the present invention also discloses a carrier carrying the computer program.
- all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. Thus, the invention is not limited to any specific combination of hardware and software.
- the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
- each device/function module/functional unit in the above embodiment When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
- the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
- the technical solution provided by the present invention includes: the first terminal performs the identity authentication process of the second terminal by using the data line interface; after the identity authentication of the second terminal is successfully completed, the first terminal performs the second terminal Data transfer between.
- the first terminal performs the identity authentication process of the second terminal through the data line interface, that is, the mobile terminal completes the connection preparation work before the data communication by means of the wired connection, thereby improving the security of the connection preparation work, and connecting
- the data is transmitted by means of a wired connection or a wireless connection, and the data transmission device method is used to improve the security of data transmission between the mobile terminals. Therefore, the present invention has strong industrial applicability.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种数据传输装置方法和装置、及双头线,该方法包括:第一终端通过数据线接口进行第二终端的身份认证过程;在第二终端的身份认证成功完成之后,第一终端进行与第二终端之间的数据传输。通过本发明的方案,第一终端通过数据线接口进行第二终端的身份认证过程,即移动终端通过有线连接的方式完成数据通信之前的连接准备工作,提高了连接准备工作的安全性,在连接准备工作完成之后,通过有线连接或无线连接的方式进行数据的传输,通过上述数据传输装置方法,提高移动终端之间的数据传输的安全性。
Description
本文涉及数据通信领域,尤指一种数据传输装置方法和装置、及双头线。
目前手机之类的移动终端可以通过无线传输的方式进行通信,例如,wifi、蓝牙、红外等连接方式。
在上述传输方式中,均需要传输双方的移动终端通过屏幕界面进行操作,并完成数据传输之前的连接准备工作,连接准备工作包括选择传输方式、搜索对方、输入配对码配对等设置,连接准备工作也是通过无线的方式完成,然而,无线的方式安全性较差,例如,恶意监听软件可以通过监听的方式获取输入配对码,从而非法访问移动终端内存储的数据资源。为了提高手机之间通信的安全性,保障用户权益,需要一种更为安全的手机间的数据传输方式。
发明内容
本发明要解决的技术问题是提供一种数据传输装置方法和装置、及双头线,以提高移动终端之间的数据传输的安全性。
为了达到上述目的,采用如下技术方案:
一种数据传输方法,所述方法包括:
第一终端通过数据线接口对第二终端进行身份认证;
在所述第二终端的身份认证成功完成之后,所述第一终端与所述第二终端之间进行数据传输。
可选地,所述数据线接口为耳机接口;或,
所述数据线接口为USB接口。
可选地,当所述数据线接口为耳机接口时,所述通过数据线接口对第二
终端进行身份认证的步骤包括:
所述第一终端通过所述耳机接口接收所述第二终端的按键输入组合;
所述第一终端根据接收的按键输入组合获取对应的秘钥;
所述第一终端检测所述秘钥是否与预先存储的秘钥符合,在符合时,判定所述第二终端的身份认证成功完成。
可选地,在所述判定第二终端的身份认证成功完成之后,所述数据传输方法还包括:
所述第一终端通过所述耳机接口向所述第二终端发送身份认证成功通知消息,所述身份认证成功通知消息用于所述第二终端启动与所述第一终端之间的数据传输。
可选地,所述方法包括:
所述第一终端通过所述数据线接口接受第三终端对所述第一终端的身份认证;
在所述第一终端的身份认证成功完成之后,所述第一终端与所述第三终端之间进行数据传输;
其中,所述第一终端接收用户输入的秘钥,并根据用户输入的秘钥,生成对应的按键输入组合;
所述第一终端通过所述数据线接口将所述按键输入组合发送给所述第三终端,以便所述第三终端对所述第一终端进行身份认证。
一种数据传输装置,设置在终端上,所述装置包括认证单元和传输单元,其中
所述认证单元设置成:通过数据线接口对第二终端进行身份认证;
所述传输单元设置成:在所述第二终端的身份认证成功完成之后,与所述第二终端之间进行数据传输。
可选地,所述数据线接口为耳机接口;或,
所述数据线接口为USB接口。
可选地,当所述数据线接口为耳机接口时,所述认证单元包括接收模块、秘钥获取模块和判定模块,其中
所述接收模块设置成:通过所述耳机接口接收所述第二终端的按键输入组合;
所述秘钥获取模块设置成:根据接收的按键输入组合获取对应的秘钥;
所述判定模块设置成:检测所述秘钥是否与预先存储的秘钥符合,在符合时,判定所述第二终端的身份认证成功完成。
可选地,所述认证单元还包括通知模块,其中
所述通知模块设置成:在所述判定模块判定所述第二终端的身份认证成功完成之后,通过所述耳机接口向所述第二终端发送身份认证成功通知消息,所述身份认证成功通知消息用于所述第二终端启动与所述第一终端之间的数据传输。
可选地,所述装置还包括秘钥发送单元,其中
所述秘钥发送单元设置成:接收用户输入的秘钥,并根据用户输入的秘钥,生成对应的按键输入组合;并通过所述数据线接口将所述按键输入组合发送给将要对所述第一终端进行身份认证的第三终端。
一种双头线,连接第一终端和第二终端,其中,所述双头线包括:第一接口、第二接口以及按键单元;
所述第一接口连接至所述第一终端的数据线接口,所述第二接口连接至所述第二终端的数据线接口;
所述按键单元设置成:接收用户输入的秘钥,并根据用户输入的秘钥,生成对应的按键输入组合;并通过所述第一接口将所述按键输入组合发送给所述第一终端或所述第二终端。
一种终端,包括上述任意的数据传输装置。
一种计算机程序,包括程序指令,当该程序指令被终端执行时,使得该终端可执行上述任意的数据传输方法。
一种载有所述的计算机程序的载体。
与相关技术相比,本发明提供的技术方案包括:第一终端通过数据线接口进行第二终端的身份认证过程;在第二终端的身份认证成功完成之后,第一终端进行与第二终端之间的数据传输。通过本发明的方案,第一终端通过数据线接口进行第二终端的身份认证过程,即移动终端通过有线连接的方式完成数据通信之前的连接准备工作,提高了连接准备工作的安全性,在连接准备工作完成之后,通过有线连接或无线连接的方式进行数据的传输,通过上述数据传输装置方法,提高移动终端之间的数据传输的安全性。
附图概述
下面对本发明实施例中的附图进行说明,实施例中的附图是用于对本发明的进一步理解,与说明书一起用于解释本发明,并不构成对本发明保护范围的限制。
图1为本发明实施例提供的数据传输方法的流程图;
图2为本发明实施例提供的双头线的结构组成示意图;
图3为本发明实施例提供的数据传输装置的结构组成示意图。
本发明的较佳实施方式
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
下面结合附图对本发明作进一步的描述,并不能用来限制本发明的保护范围。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的各种方式可以相互组合。
参见图1,本发明实施例提出了一种数据传输方法,所述方法包括:
步骤100,第一终端通过数据线接口对第二终端进行身份认证;
步骤200,在第二终端的身份认证成功完成之后,第一终端与第二终端之间进行数据传输。
步骤100中,所述数据线接口为耳机接口;或,所述数据线接口为USB接口。
步骤100中,所述通过数据线接口对第二终端进行身份认证的步骤包括步骤110-130:
步骤110,通过所述耳机接口接收按键输入组合;
步骤120,根据接收的按键输入组合获取对应的秘钥;
步骤130,检测所述秘钥是否与预先存储的秘钥符合,在符合时,判定第二终端的身份认证成功完成。
本发明实施例中,步骤130中,在所述判定第二终端的身份认证成功完成之后,步骤100还包括:
步骤140,第一终端通过所述耳机接口向第二终端发送身份认证成功通知消息,身份认证成功通知消息用于第二终端启动与第一终端之间的数据传输。
步骤200中,第一终端与第二终端之间的数据传输可以通过多种通信方式进行,例如wifi、蓝牙、红外等通信方式。
在上述示例中,第一终端是作为身份认证的主动方的角色,此外,在两个终端的通信过程中,第一终端也可以作为身份认证的被动方的角色。下面以第一终端和第三终端之间的通信过程为例进行说明。
本发明实施例中,所述数据传输方法还包括:
步骤500,第一终端通过数据线接口接受第三终端对所述第一终端的身份认证;
步骤600,在第一终端的身份认证成功完成之后,第一终端进行与第三终端之间的数据传输。
其中,步骤500中包括:第一终端接收用户输入的秘钥,并根据用户输
入的秘钥,生成对应的按键输入组合;第一终端通过数据线接口,如耳机接口将所述按键输入组合发送给第三终端。
其中,也可以通过其他的数据线接口将所述按键输入组合发送给第三终端。
其中,在终端的通信过程中,终端是作为身份认证的主动方的角色还是作为身份认证的被动方的角色可以根据用户操作确定。
例如,在第一终端和第二终端通过双头线连接之后,如果用户在第一终端的屏幕上输入秘钥,那么第二终端将作为身份认证的主动方,第二终端将执行对第一终端的身份认证的过程,如果用户在第二终端的屏幕上输入秘钥,那么第一终端将作为身份认证的主动方,第一终端将执行对第二终端的身份认证的过程。
另外,如果使用本发明实施例提供的包括按键单元的双头线连接第一终端和第二终端,双头线的按键单元检测到用户输入秘钥之后,双头线的按键单元将同时将秘钥对应的按键输入组合发送给第一终端和第二终端,在第一终端和第二终端的屏幕上会进行接收秘钥的提示,当第一终端接收到用户对接收秘钥的提示的确认时,那么第一终端将作为身份认证的主动方,第一终端将执行对第二终端的身份认证的过程;当第二终端接收到用户对接收秘钥的提示的确认时,那么第二终端将作为身份认证的主动方,第二终端将执行对第一终端的身份认证的过程。
下面结合具体的实施场景进行说明,其中,第一终端为手机1,第二终端为手机2,在手机1和手机2通过本发明实施例提供的方法进行通信之前,可以用本发明实施例提供的双头线连接第一终端和第二终端。
本发明实施例提供一种双头线,用于连接第一终端和第二终端,参见图2,所述双头线包括:第一接口100、第二接口200以及按键单元300;
所述第一接口100连接至所述第一终端的数据线接口,所述第二接口200连接至所述第二终端的数据线接口;
所述按键单元300设置成:接收用户输入的秘钥,并根据用户输入的秘
钥,生成对应的按键输入组合;并通过第一接口100将所述按键输入组合发送给所述第一终端。此外,按键输入组合也可以通过第二接口200将所述按键输入组合发送给所述第二终端。
在用本发明实施例提供的双头线连接第一终端和第二终端之后,手机1和手机2的通信过程如下:
步骤11、双头线上的按键单元根据用户的按键输入,向手机1发送按键输入组合;
按键输入组合具体为一组脉冲信号的组合,按键单元可以将按键信号转化对应的脉冲信号,手机侧将通过耳机接口接收脉冲信号。
步骤12、手机1通过耳机接口接收输入的按键输入组合,并根据接收的按键输入组合获取对应的秘钥。
手机侧存储有脉冲信号与按键之间的对应关系,因此,可以根据按键输入组合获取对应的秘钥,例如,根据接收的一组脉冲信号获取对应的秘钥为“123”。
步骤13、手机1对获取的秘钥与预制的秘钥进行比对,若符合,则判定为手机2的身份认证成功完成。
步骤14、手机1通过耳机接口向手机2发送身份认证成功通知消息。
在发送身份认证成功通知消息之后,手机1和手机2完成了数据通信之前的验证过程,手机1和手机2之间可以进行数据的传输。
上述示例中,通过本发明实施例提供的双头线进行手机1和手机2之间的连接,此外,也可以通过相关技术的双头线进行手机1和手机2之间的连接,并通过手机触摸屏输入秘钥。下面结合一个具体的示例进行说明,该示例中,手机1和手机2的通信过程如下:
步骤21、手机2通过触摸屏接收用户输入的秘钥。
步骤22、手机2根据用户输入的秘钥,生成对应的按键输入组合,并通过耳机接口发送所述按键输入组合。
其中,按键输入组合具体为一组脉冲信号的组合。
步骤23、手机1通过耳机接口接收手机2发送的按键输入组合,并根据接收的按键输入组合获取对应的秘钥。
手机侧存储有脉冲信号与按键之间的对应关系,因此,可以根据按键输入组合获取对应的秘钥,例如,根据接收的一组脉冲信号获取对应的秘钥为“123”。
步骤24、手机1对获取的秘钥与预制的秘钥进行比对,若符合,则判定为手机2的身份认证成功完成。
步骤25、手机1通过耳机接口向手机2发送身份认证成功通知消息。
在发送身份认证成功通知消息之后,手机1和手机2完成了数据通信之前的验证过程,手机1和手机2之间可以进行数据的传输。
基于与上述实施例相同或相似的构思,本发明实施例还提供一种数据传输装置,设置在终端上,参见图3,本发明实施例提出的一种数据传输装置包括:
认证单元10,设置成:通过数据线接口进行第二终端的身份认证过程;
传输单元20,设置成:在第二终端的身份认证成功完成之后,进行与第二终端之间的数据传输。
本发明实施例中,所述数据线接口为耳机接口;或,
所述数据线接口为USB接口。
本发明实施例中,当所述数据线接口为耳机接口时,所述认证单元10包括:
接收模块11,设置成:通过所述耳机接口接收按键输入组合;
秘钥获取模块12,设置成:根据接收的按键输入组合获取对应的秘钥;
判定模块13,设置成:检测所述秘钥是否与预先存储的秘钥符合,在符合时,判定第二终端的身份认证成功完成。
本发明实施例中,所述认证单元10还包括:
通知模块14,设置成:在所述判定第二终端的身份认证成功完成之后,
通过所述耳机接口向第二终端发送身份认证成功通知消息,所述身份认证成功通知消息用于第二终端启动与第一终端之间的数据传输。
本发明实施例中,所述数据传输装置还包括:
秘钥发送单元30,设置成:接收用户输入的秘钥,并根据用户输入的秘钥,生成对应的按键输入组合;并通过耳机接口将所述按键输入组合发送给第三终端。
基于与上述实施例相同或相似的构思,本发明实施例还提供一种终端,所述终端包括本发明实施例提供的任一数据传输装置。本发明实施例提供的终端还可以包括本发明实施例提供的双头线。
基于与上述实施例相同或相似的构思,本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令被终端执行时,使得该终端可执行上述任意的数据传输方法。
基于与上述实施例相同或相似的构思,本发明实施例还公开了一种载有所述的计算机程序的载体。
在阅读并理解了附图和详细描述后,可以明白其他方面。
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
上述实施例中的各装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。
上述实施例中的各装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。
任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求所述的保护范围为准。
与相关技术相比,本发明提供的技术方案包括:第一终端通过数据线接口进行第二终端的身份认证过程;在第二终端的身份认证成功完成之后,第一终端进行与第二终端之间的数据传输。通过本发明的方案,第一终端通过数据线接口进行第二终端的身份认证过程,即移动终端通过有线连接的方式完成数据通信之前的连接准备工作,提高了连接准备工作的安全性,在连接准备工作完成之后,通过有线连接或无线连接的方式进行数据的传输,通过上述数据传输装置方法,提高移动终端之间的数据传输的安全性。因此本发明具有很强的工业实用性。
Claims (14)
- 一种数据传输方法,所述方法包括:第一终端通过数据线接口对第二终端进行身份认证;在所述第二终端的身份认证成功完成之后,所述第一终端与所述第二终端之间进行数据传输。
- 根据权利要求1所述的数据传输方法,其中,所述数据线接口为耳机接口;或,所述数据线接口为USB接口。
- 根据权利要求2所述的数据传输方法,其中,当所述数据线接口为耳机接口时,所述通过数据线接口对第二终端进行身份认证的步骤包括:所述第一终端通过所述耳机接口接收所述第二终端的按键输入组合;所述第一终端根据接收的按键输入组合获取对应的秘钥;所述第一终端检测所述秘钥是否与预先存储的秘钥符合,在符合时,判定所述第二终端的身份认证成功完成。
- 根据权利要求3所述的数据传输方法,其中,在所述判定第二终端的身份认证成功完成之后,所述数据传输方法还包括:所述第一终端通过所述耳机接口向所述第二终端发送身份认证成功通知消息,所述身份认证成功通知消息用于所述第二终端启动与所述第一终端之间的数据传输。
- 根据权利要求1所述的数据传输方法,所述方法包括:所述第一终端通过所述数据线接口接受第三终端对所述第一终端的身份认证;在所述第一终端的身份认证成功完成之后,所述第一终端与所述第三终端之间进行数据传输;其中,所述第一终端接收用户输入的秘钥,并根据用户输入的秘钥,生成对应的按键输入组合;所述第一终端通过所述数据线接口将所述按键输入组合发送给所述第三终端,以便所述第三终端对所述第一终端进行身份认证。
- 一种数据传输装置,设置在终端上,所述装置包括认证单元和传输单元,其中所述认证单元设置成:通过数据线接口对第二终端进行身份认证;所述传输单元设置成:在所述第二终端的身份认证成功完成之后,与所述第二终端之间进行数据传输。
- 根据权利要求6所述的数据传输装置,其中,所述数据线接口为耳机接口;或,所述数据线接口为USB接口。
- 根据权利要求7所述的数据传输装置,其中,当所述数据线接口为耳机接口时,所述认证单元包括接收模块、秘钥获取模块和判定模块,其中所述接收模块设置成:通过所述耳机接口接收所述第二终端的按键输入组合;所述秘钥获取模块设置成:根据接收的按键输入组合获取对应的秘钥;所述判定模块设置成:检测所述秘钥是否与预先存储的秘钥符合,在符合时,判定所述第二终端的身份认证成功完成。
- 根据权利要求8所述的数据传输装置,其中,所述认证单元还包括通知模块,其中所述通知模块设置成:在所述判定模块判定所述第二终端的身份认证成功完成之后,通过所述耳机接口向所述第二终端发送身份认证成功通知消息,所述身份认证成功通知消息用于所述第二终端启动与所述第一终端之间的数据传输。
- 根据权利要求6所述的数据传输装置,所述装置还包括秘钥发送单元,其中所述秘钥发送单元设置成:接收用户输入的秘钥,并根据用户输入的秘钥,生成对应的按键输入组合;并通过所述数据线接口将所述按键输入组合 发送给将要对所述第一终端进行身份认证的第三终端。
- 一种双头线,连接第一终端和第二终端,其中,所述双头线包括:第一接口、第二接口以及按键单元;所述第一接口连接至所述第一终端的数据线接口,所述第二接口连接至所述第二终端的数据线接口;所述按键单元设置成:接收用户输入的秘钥,并根据用户输入的秘钥,生成对应的按键输入组合;并通过所述第一接口将所述按键输入组合发送给所述第一终端或所述第二终端。
- 一种终端,包括如权利要求6-10中任一项所述的数据传输装置。
- 一种计算机程序,包括程序指令,当该程序指令被终端执行时,使得该终端可执行如权利要求1-5中任一项所述的数据传输方法。
- 一种载有如权利要求13所述的计算机程序的载体。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510466636.XA CN106411824A (zh) | 2015-07-31 | 2015-07-31 | 一种数据传输方法和装置、及双头线 |
CN201510466636.X | 2015-07-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016177104A1 true WO2016177104A1 (zh) | 2016-11-10 |
Family
ID=57218103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/076275 WO2016177104A1 (zh) | 2015-07-31 | 2016-03-14 | 一种数据传输装置方法和装置、及双头线 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106411824A (zh) |
WO (1) | WO2016177104A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109996235A (zh) * | 2017-12-29 | 2019-07-09 | 宝沃汽车(中国)有限公司 | 车联网终端、用于车联网终端的方法和装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050096704A (ko) * | 2004-03-31 | 2005-10-06 | 엘지전자 주식회사 | 이동통신 단말기의 pim 정보 교환 방법 및 시스템 |
CN2852576Y (zh) * | 2005-11-28 | 2006-12-27 | 中兴通讯股份有限公司 | 一种pc侧对移动终端信息进行保密处理的系统 |
CN101083537A (zh) * | 2006-05-31 | 2007-12-05 | 华为技术有限公司 | 一种实现设备管理的方法、装置和系统 |
CN101783834A (zh) * | 2009-12-31 | 2010-07-21 | 华为终端有限公司 | 一种移动终端和切换屏幕方法 |
CN105246074A (zh) * | 2015-10-29 | 2016-01-13 | 小米科技有限责任公司 | 建立连接的方法及装置 |
-
2015
- 2015-07-31 CN CN201510466636.XA patent/CN106411824A/zh active Pending
-
2016
- 2016-03-14 WO PCT/CN2016/076275 patent/WO2016177104A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050096704A (ko) * | 2004-03-31 | 2005-10-06 | 엘지전자 주식회사 | 이동통신 단말기의 pim 정보 교환 방법 및 시스템 |
CN2852576Y (zh) * | 2005-11-28 | 2006-12-27 | 中兴通讯股份有限公司 | 一种pc侧对移动终端信息进行保密处理的系统 |
CN101083537A (zh) * | 2006-05-31 | 2007-12-05 | 华为技术有限公司 | 一种实现设备管理的方法、装置和系统 |
CN101783834A (zh) * | 2009-12-31 | 2010-07-21 | 华为终端有限公司 | 一种移动终端和切换屏幕方法 |
CN105246074A (zh) * | 2015-10-29 | 2016-01-13 | 小米科技有限责任公司 | 建立连接的方法及装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109996235A (zh) * | 2017-12-29 | 2019-07-09 | 宝沃汽车(中国)有限公司 | 车联网终端、用于车联网终端的方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
CN106411824A (zh) | 2017-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4007321A1 (en) | Information sharing method, terminal apparatus, storage medium, and computer program product | |
US10070313B2 (en) | Wireless token device | |
US9413758B2 (en) | Communication session transfer between devices | |
US20220330029A1 (en) | Method for mutual recognition or mutual trust between bluetooth devices | |
US8285994B2 (en) | Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel | |
US8819445B2 (en) | Wireless token authentication | |
US9262592B2 (en) | Wireless storage device | |
JP5933827B2 (ja) | 機器同士の間の通信セッション転送 | |
US20150024688A1 (en) | Automatic Pairing of a Vehicle and a Mobile Communications Device | |
US8762715B2 (en) | Event triggered pairing of wireless communication devices based on time measurements | |
US9654981B2 (en) | Data integrity for proximity-based communication | |
US20170352090A1 (en) | Method, apparatus, and system for processing order information | |
EP2887615A1 (en) | Cloud-based scalable authentication for electronic devices | |
US9615257B2 (en) | Data integrity for proximity-based communication | |
US20150281227A1 (en) | System and method for two factor user authentication using a smartphone and nfc token and for the automatic generation as well as storing and inputting of logins for websites and web applications | |
US20130268766A1 (en) | Wireless token device | |
CN107483213B (zh) | 一种安全认证的方法、相关装置及系统 | |
KR20160129839A (ko) | 블루투스 인터페이스를 갖는 인증 장치 | |
CN111542822A (zh) | 用于共享屏幕数据的电子装置和方法 | |
JP2016504693A (ja) | 第1のデバイスから第2のデバイスへの暗号化されたアカウント資格証明の提供 | |
TWI462604B (zh) | 無線網路用戶端認證系統及其無線網路連線方法 | |
CN105468952A (zh) | 身份验证方法及装置 | |
US20190356485A1 (en) | Secure methods and systems for identifying bluetooth connected devices with installed application | |
WO2013146564A1 (ja) | 端末装置、通信方法、プログラム、および通信システム | |
TW201729562A (zh) | 伺服器、行動終端機、網路實名認證系統及方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16789098 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16789098 Country of ref document: EP Kind code of ref document: A1 |