WO2021197235A1 - Hotspot sharing method and electronic device - Google Patents

Hotspot sharing method and electronic device Download PDF

Info

Publication number
WO2021197235A1
WO2021197235A1 PCT/CN2021/083386 CN2021083386W WO2021197235A1 WO 2021197235 A1 WO2021197235 A1 WO 2021197235A1 CN 2021083386 W CN2021083386 W CN 2021083386W WO 2021197235 A1 WO2021197235 A1 WO 2021197235A1
Authority
WO
WIPO (PCT)
Prior art keywords
hotspot
electronic device
ciphertext
input
connection information
Prior art date
Application number
PCT/CN2021/083386
Other languages
French (fr)
Chinese (zh)
Inventor
刘海鹏
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2021197235A1 publication Critical patent/WO2021197235A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • the present invention relates to the field of communication technology, in particular to a hotspot sharing method and electronic equipment.
  • the traditional technology mainly achieves the purpose of network traffic sharing through the hotspot sharing of the wireless local area network; for data sharing, the traditional technology mainly uses methods such as connecting Bluetooth devices and connecting infrared devices to perform data sharing.
  • hotspots such as wireless hotspots, Bluetooth hotspots, infrared hotspots.
  • hotspots such as wireless hotspots, Bluetooth hotspots, infrared hotspots.
  • the electronic device connects to the hotspot the user needs to select the hotspot to be connected from among multiple nearby hotspots, which presents the problem of inconvenience to find.
  • the hotspot device needs to set the name (SSID) and password of the hotspot, and then tell the user the hotspot information, and the user searches for the hotspot Enter the correct password to successfully connect to the hotspot.
  • SSID name
  • password password
  • the hot-spot sharing scheme in traditional technology requires higher user participation, which causes the user's operation to be too cumbersome, there is a problem of inconvenience of hotspot sharing, and there are also hotspot account information leaks and inconsistent data transmission during network sharing. This has led to the problem of high failure rate of hotspot sharing.
  • the embodiments of the present invention provide a hotspot sharing method and an electronic device to solve the problems of inconvenience in hotspot sharing, data leakage, and high failure rate of hotspot sharing in the hotspot sharing solution in related technologies.
  • the present invention is implemented as follows:
  • an embodiment of the present invention provides a hotspot sharing method applied to a first electronic device, and the method includes:
  • the first ciphertext is output in audio mode.
  • an embodiment of the present invention provides a hotspot sharing method applied to a second electronic device, and the method includes:
  • connection information is used to connect the hotspot to be connected.
  • an embodiment of the present invention also provides an electronic device, the electronic device is a first electronic device, and the electronic device includes:
  • a receiving module for receiving the first input
  • An encryption module configured to, in response to the first input, encrypt the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input to generate a first ciphertext
  • the output module is used to output the first ciphertext in audio mode.
  • an embodiment of the present invention also provides an electronic device, the electronic device is a second electronic device, and the electronic device includes:
  • the first receiving module is configured to receive the first input
  • the second receiving module is configured to receive the first ciphertext in the audio format output by the first electronic device
  • a decryption module configured to decrypt the first ciphertext based on the fingerprint information of the first input in response to the first input to obtain connection information of the hotspot to be connected to the second electronic device;
  • the connection module is configured to use the connection information to connect to the hotspot to be connected.
  • an embodiment of the present invention also provides an electronic device, including: a memory, a processor, and a computer program stored on the memory and running on the processor, and the computer program is processed by the processor.
  • the steps of the hotspot sharing method described in the first aspect or the second aspect are implemented when the device is executed.
  • an embodiment of the present invention also provides a computer-readable storage medium having a computer program stored on the computer-readable storage medium, and when the computer program is executed by a processor, the first or second aspect is implemented. The steps of the hotspot sharing method described.
  • the user on the electronic device side does not need to manually notify the connection information of the hotspot to other users who need to use the hotspot, but directly triggers the connection of the hotspot through the first input
  • Information sharing avoids the leakage of hotspot account information and the inconsistency of hotspot connection information, and improves the success rate of hotspot sharing; when a hotspot needs to be shared, the user only needs to trigger the first input, which greatly simplifies user operations Step;
  • encrypt the connection information based on the first input fingerprint information (first re-encryption), and use the encrypted first ciphertext in audio mode (the first Double encryption) output which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of the theft and leakage of the connection information of the hotspot.
  • FIG. 1 is a flowchart of a hotspot sharing method according to an embodiment of the present invention
  • Figure 2 is a schematic diagram of an electronic device according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of a hotspot sharing method according to another embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an electronic device according to another embodiment of the present invention.
  • FIG. 5 is a block diagram of an electronic device according to an embodiment of the present invention.
  • Fig. 6 is a block diagram of an electronic device according to another embodiment of the present invention.
  • FIG. 7 is a schematic diagram of the hardware structure of an electronic device according to an embodiment of the present invention.
  • Step 101 Receive a first input
  • the input mode of the first input may be any input mode such as single-click input, double-click input, long-press input, and sliding input.
  • the first input is used to trigger hotspot sharing of the above-mentioned electronic device.
  • the object of the first input may be an object that can trigger the sharing of the corresponding type of hotspot.
  • the type of the shared hotspot may be a WLAN hotspot (or WiFi hotspot).
  • the user 1 can use the index finger of the right hand, for example, to long press the button 12 displayed on the screen of the mobile phone 11 (that is, the long-press input object).
  • 12 is the WLAN hotspot initiation button, then the mobile phone 11 can receive the long-press input, and can obtain the index finger fingerprint information of the long-press input.
  • the WLAN hotspot of the mobile phone 11 may be turned on.
  • the first input can also be used as a switch trigger input of the WLAN hotspot of the mobile phone 11.
  • the user wants to share the WLAN hotspot, he can press and hold the button 12 for a long time.
  • the WLAN hotspot of the mobile phone 11 is turned off, you can directly turn on the WLAN hotspot of the mobile phone 11 by long pressing the button 12, and the mobile phone 11 can transmit WLAN signals 13; if the WLAN hotspot of the mobile phone 11 is turned on, By long pressing the button 12, the WLAN hotspot of the mobile phone 11 can be directly turned off.
  • Step 102 In response to the first input, based on the fingerprint information of the first input, encrypt the connection information of the hotspot of the first electronic device to generate a first ciphertext;
  • the fingerprint information that triggers the first input can be acquired, for example, the fingerprint information of the finger that presses the button 12 in FIG. 2 for a long time.
  • the hotspot requested to be shared by the user can be determined based on the role of the first input.
  • the hotspot is the hotspot whose connection information is encrypted in step 102.
  • the shared hotspot may include one of the following: WLAN hotspot, or WiFi hotspot, or infrared hotspot, or Bluetooth hotspot.
  • the connection information of the hotspot indicates the attribute information of the hotspot for connection.
  • connection information of the hotspot can include SSID (Service Set Identifier)-namely WLAN name, BSSID (basic SSID, namely MAC address), connection password Wait.
  • SSID Service Set Identifier
  • BSSID basic SSID, namely MAC address
  • the connection information of the hotspot may include a Bluetooth name and the like.
  • connection information of the hotspot may include an infrared name and the like.
  • the corresponding preset first encryption algorithm and the corresponding The security key is used to encrypt the connection information of the hotspot corresponding to the first input of the electronic device to generate the first ciphertext.
  • the aforementioned security key may be the first input fingerprint information.
  • the aforementioned security key may also be a key determined by the first input fingerprint information, and not the fingerprint information itself. Therefore, when step 102 is performed, it may be based on the first input fingerprint information.
  • An input fingerprint information is used to generate a first key; the first key is used to encrypt the connection information of the hotspot of the first electronic device to generate a first ciphertext.
  • the fingerprint information can be encrypted by using the preset second encryption algorithm and the second key, and the fingerprint information
  • the ciphertext is used as the above-mentioned security key; the above-mentioned security key can also be generated by using a preset code to combine with the fingerprint information.
  • the security key and the preset first encryption algorithm can be used to encrypt the connection information of the hotspot to be shared by the electronic device to generate the first ciphertext, that is, the encryption of the connection information. Arts.
  • a first key may be generated based on the fingerprint information of the first input; and the first key may be used to encrypt the connection information of the hotspot of the electronic device to generate the first key.
  • the ciphertext so that the first ciphertext output in audio mode is encrypted with the first key determined by the first input fingerprint information that triggers the hotspot sharing, which not only avoids the leakage of the hotspot account information, but also prevents the account.
  • the information was stolen by malicious programs in the process of audio output; and, the first key is determined based on the first input fingerprint information triggered by the user requesting to share the hotspot, because each user’s fingerprint is the user’s unique It is more difficult for others to obtain the identification, that is, it is difficult for unauthorized users or programs to obtain the decryption key of the first ciphertext. Therefore, illegal electronic devices can be prevented from using the leaked hotspot connection information to connect to the hotspot of the electronic device.
  • Step 103 Output the first ciphertext in audio mode.
  • the encrypted connection information is a code of 1, 0, then the code can be output in audio mode, so that the second electronic device that needs to use the shared hotspot can receive the first ciphertext, and use Audio way to receive.
  • the method of the embodiment of the present invention can turn on the speaker of the electronic device to transfer audio data in audio format (expressing the first ciphertext) Output.
  • the audio data can also be output through the external device.
  • an external device for example, earphones or speakers
  • the text data of the first ciphertext may be converted into audio data and output.
  • the first ciphertext can be a coded text of 0 or 1 (for example, 10100011). Then, when converting, the 1 in the coded text can be converted into a treble, and 0 can be converted into a bass, thereby generating a combination of treble and bass
  • the audio data of the audio data (the high and low frequency sequence of the audio data is: high, low, high, low, low, high, high), the high syllables of multiple trebles in the above audio data sequence are unified, and similarly, the low syllables of multiple bass are also the same .
  • the first ciphertext can be the coded text of 0 or 1 (for example, 10100011), then during conversion, the coded text can also be directly output as audio, that is, the text corresponding to the voice of the output audio is 10100011 To play the encoded text directly.
  • connection information of the hotspot when the connection information of the hotspot is shared, by converting the first ciphertext of the connection information into audio data for output and playback, the transmission surface of the connection information can be wider, that is, the area around the electronic device Multiple electronic devices can collect the audio data, thereby facilitating multiple surrounding electronic devices to connect to the shared hotspot, which improves the efficiency of hotspot sharing and connection.
  • the user on the electronic device side does not need to manually notify the connection information of the hotspot to other users who need to use the hotspot, but directly triggers the connection of the hotspot through the first input
  • Information sharing avoids the leakage of hotspot account information and the inconsistency of hotspot connection information, and improves the success rate of hotspot sharing; when a hotspot needs to be shared, the user only needs to trigger the first input, which greatly simplifies user operations Step;
  • encrypt the connection information based on the first input fingerprint information (first re-encryption), and use the encrypted first ciphertext in audio mode (the first Double encryption) output which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of the theft and leakage of the connection information of the hotspot.
  • the first ciphertext may also be continuously output in an audio manner for a preset period of time.
  • the first ciphertext may be continuously output in an audio manner for a preset period of time, for example, 1 minute.
  • the first input of the audio format can be continuously output for a preset period of time after the finger stops triggering the first input.
  • the method according to the embodiment of the present invention may further include: if the first input is received again, pausing the output of the first ciphertext in audio mode.
  • the first input can be triggered again.
  • the button 12 can be long-pressed again to suspend the first ciphertext. Output in audio mode; then, by switching the long-press input of the button 12, you can start sharing and suspend sharing the connection information of the hotspot at any time, which improves the flexibility of hotspot sharing.
  • FIG. 3 a flowchart of a hotspot sharing method according to another embodiment of the present invention is shown, which is applied to a second electronic device, such as an electronic device that needs to use a hotspot shared by other electronic devices, and may specifically include the following steps:
  • Step 201 receive the first input
  • step 101 The detailed description of this step can be the detailed description of step 101 in the embodiment of FIG.
  • the second electronic device is the mobile phone 21 shown in FIG. 4, then the index finger of the user 1 of the first electronic device (ie, the mobile phone 11) corresponding to the embodiment in FIG. 2 can press and hold the mobile phone 21 in FIG. 4 Button 22 (WLAN hotspot receiving button), the method of the embodiment of the present invention can receive the first input.
  • the index finger of the user 1 of the first electronic device ie, the mobile phone 11
  • FIG. 4 Button 22 WLAN hotspot receiving button
  • the index finger of the user 1 needs to press the button 22 of the mobile phone 21 that needs to share the hotspot of the mobile phone 11, so that the mobile phone 21 receives the input of pressing the button 22 and obtains the input of the pressing input.
  • Fingerprint information for example, the fingerprint of the index finger of user 1).
  • Step 202 Receive the first ciphertext in the audio format output by the first electronic device
  • the first electronic device that is, the mobile phone 11 can output the first ciphertext of the hotspot of the mobile phone 11 in audio mode, and the mobile phone 21 located near the mobile phone 11 can collect audio Format of the first ciphertext.
  • the microphone for example, a microphone
  • the microphone can be turned on, so that the audio format output and played by the mobile phone 11 can be collected through the microphone.
  • the first ciphertext if it is detected that the microphone (for example, a microphone) of the mobile phone 21 is not turned on, the microphone can be turned on, so that the audio format output and played by the mobile phone 11 can be collected through the microphone.
  • the first ciphertext if it is detected that the microphone (for example, a microphone) of the mobile phone 21 is not turned on, the microphone can be turned on, so that the audio format output and played by the mobile phone 11 can be collected through the microphone.
  • the first ciphertext if it is detected that the microphone (for example, a microphone) of the mobile phone 21 is not turned on, the microphone can be turned on, so that the audio format output and played by the mobile phone 11 can be collected through the microphone.
  • the present invention does not limit the execution order of step 201 and step 202.
  • Step 203 In response to the first input, decrypt the first ciphertext based on the fingerprint information of the first input to obtain connection information of the hotspot to be connected to the second electronic device;
  • the hotspots to be connected by the user may be determined based on the target of the first input.
  • the hotspot may include one of the following: WLAN hotspot, or WiFi hotspot, or infrared hotspot, or Bluetooth hotspot.
  • the connection information of the hotspot indicates the attribute information of the hotspot for connection.
  • connection information of the hotspot can include SSID (Service Set Identifier)-namely WLAN name, BSSID (basic SSID, namely MAC address), connection password Wait.
  • SSID Service Set Identifier
  • BSSID basic SSID, namely MAC address
  • the connection information of the hotspot may include a Bluetooth name and the like.
  • connection information of the hotspot may include an infrared name and the like.
  • the corresponding preset first decryption algorithm can be directly used, and The corresponding security key is used to decrypt the first ciphertext of the hotspot corresponding to the first input of the second electronic device to obtain connection information of the hotspot to be connected to the second electronic device.
  • the hotspot to be connected is the hotspot shared by the first electronic device.
  • the aforementioned security key may be the first input fingerprint information.
  • the aforementioned security key may also be a key determined by the first input fingerprint information, not the fingerprint information itself. Therefore, when step 203 is performed, it may be based on the first input fingerprint information.
  • An input fingerprint information is used to generate a first key; the first key is used to decrypt the first ciphertext to obtain connection information of the hotspot to be connected to the second electronic device.
  • the fingerprint information can be encrypted by using the preset second encryption algorithm and the second key, and the fingerprint information
  • the ciphertext is used as the above-mentioned security key; the above-mentioned security key can also be generated by using a preset code to combine with the fingerprint information.
  • the security key and the preset first decryption algorithm can be used to decrypt the first ciphertext to generate connection information of the to-be-connected hotspot of the second electronic device.
  • a first key may be generated based on the fingerprint information of the first input; and the first key is used to decrypt the received first ciphertext to obtain the second The connection information of the hotspot to be connected to the electronic device, so that the first ciphertext output in audio mode can be decrypted using the first key determined by the first input fingerprint information that triggers the hotspot sharing and the hotspot connection, which not only avoids the hotspot
  • the account information is leaked, and the account information can be prevented from being stolen by malicious programs in the process of audio output; and the first key is determined based on the first input fingerprint information triggered by the user requesting to share the hotspot.
  • the fingerprint of each user is the unique identification of the user, which is more difficult for others to obtain, that is, the decryption key of the first ciphertext is more difficult for illegal users or programs to obtain. Therefore, illegal electronic devices can be prevented from using leaked hotspot connection information To connect to the hotspot of this electronic device.
  • the first ciphertext in the audio format may be converted into the first ciphertext in the text format; then, based on the first input fingerprint Information, decrypt the first ciphertext in text format to obtain connection information of the hotspot to be connected to the second electronic device.
  • the first ciphertext of the audio format is audio data in which the first ciphertext is encoded in the manner of treble and bass
  • the first ciphertext is the encoded text of 0 and 1 (for example, 10100011)
  • the first ciphertext in the audio format is converted into audio data
  • the 1 in the encoded text is converted to treble and 0 is converted to bass
  • the first ciphertext of the audio format here is the audio data of a combination of treble and bass
  • the treble and bass sequence of the audio data is: high, low, high, low, low, high, high), where the high syllables of multiple trebles in the sequence of the audio data are unified, and similarly, the low syllables of multiple basses are also the same.
  • the first ciphertext of the audio format that is, the text of the voice corresponding to the audio data
  • the first ciphertext of the audio format that is, the audio data
  • voice recognition To determine the number sequence 10100011, convert the number sequence to 10100011 in text format, and generate the first ciphertext in text format.
  • the connection information of the hotspot shared by other electronic devices when the connection information is the cipher text in the audio format, the first cipher text in the audio format can be converted into the first cipher text in the text format. Ciphertext, so as to accurately obtain the first ciphertext of the connection information, and use the corresponding fingerprint information to decrypt the first ciphertext, improving the security of hotspot sharing and connection.
  • the electronic device side cannot successfully and accurately obtain the electronic sharing hotspot.
  • the connection information of the hotspot shared by the device in other words, the fingerprints of other unauthorized users cannot be used to decrypt the first ciphertext, and the hotspot connection cannot be performed. Therefore, the method of the embodiment of the present invention can improve hotspot sharing Due to its security and authentication, it is difficult for illegal users to steal the connection information of the hotspot and connect to the hotspot, and thus cannot steal network traffic.
  • Step 204 Use the connection information to connect to the hotspot to be connected.
  • connection information can be used to connect to the to-be-connected hotspot of the first electronic device.
  • the connection information may be used to request security authentication of the hotspot to be connected of the first electronic device; if the security authentication is passed, the hotspot to be connected is connected.
  • the method according to the embodiment of the present invention may further include:
  • the second electronic device side may carry the SSID and password of the hotspot in the connection information in the authentication request, and send the authentication request to the first electronic device in FIG. 1, then if the SSID and password are correct (or further , The first electronic device in FIG. 1 performs an authorization operation), the authentication request can pass the security authentication, and the second electronic device in the embodiment of the present invention can connect to the hotspot shared by the first electronic device in FIG. On the contrary, if the authentication request is sent multiple times, and none of them has passed the security authentication, in order to avoid the occupation of the signaling, the second electronic device in the embodiment of the present invention can stop sending the authentication request (optionally, it can be further closed.
  • the function of the hotspot such as WLAN function).
  • the method of the embodiment of the present invention can realize the rapid sharing and connection of hotspots, and improve the convenience of hotspot sharing and connection.
  • interconnected device interconnection scenarios such as connecting Bluetooth and connecting infrared devices, and the methods in the embodiments of the present invention are all applicable.
  • the electronic device when an electronic device needs to connect to a hotspot shared by other electronic devices, only the user on the electronic device side that needs to share the hotspot uses the fingerprint used when sharing the hotspot to trigger the first input on the electronic device side , And the electronic device receives the first ciphertext in audio format sent by other electronic devices that share the hotspot, and decrypts the first ciphertext based on the fingerprint information of the first input to obtain the electronic device waiting If the connection information of the hotspot is connected, the connection information can be used to connect the hotspot to be connected.
  • the user on the electronic device side does not need to select the hotspot to be connected from the hotspot list, nor does it need to obtain the connection information of the hotspot from the user sharing the hotspot and enter the connection information, and can quickly connect to other electronic devices.
  • the shared hotspot reduces user participation and simplifies user operations.
  • the hotspot connection information is not required Manual acquisition, instead of collecting the first ciphertext in the audio format, and decrypting the first ciphertext based on the fingerprint corresponding to the first input to obtain the connection information of the hotspot to be connected, avoiding the inconsistency of the hotspot connection information in manual communication Circumstances, the success rate of hotspot sharing is improved, and the leakage of connection information is avoided; in addition, the connection information of the connected hotspot is not only encrypted (first encryption) based on the first input fingerprint information, but also The first ciphertext is also collected in audio format (the second encryption), which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of theft and leakage of the connection information of the hotspot.
  • the same electronic device can have both the function of sharing hotspots corresponding to the embodiment in FIG. 1 and the function of connecting hotspots shared by other devices in the embodiment of FIG. 3, or one electronic device has the above two functions.
  • FIG. 5 a block diagram of an electronic device according to an embodiment of the present invention is shown.
  • the electronic device of the embodiment of the present invention can implement the details of the hotspot sharing method related to the embodiment of FIG. 1 and FIG. 2 in the above embodiment, and achieve the same effect.
  • the electronic device shown in FIG. 5 is a first electronic device, and the first electronic device includes:
  • the receiving module 301 is configured to receive the first input
  • the encryption module 302 is configured to, in response to the first input, encrypt the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input to generate a first ciphertext;
  • the output module 303 is configured to output the first ciphertext in audio mode.
  • the encryption module 302 includes:
  • a generating sub-module configured to generate a first key based on the fingerprint information of the first input
  • the encryption submodule is configured to use the first key to encrypt the connection information of the hotspot of the first electronic device to generate a first ciphertext.
  • the output module 303 is further configured to convert the text data of the first ciphertext into audio data and output it.
  • the output module 303 includes:
  • the output sub-module is configured to continuously output the first ciphertext in audio mode for a preset duration in response to the first input.
  • the first electronic device further includes:
  • the pause module is configured to pause the output of the first ciphertext in audio mode if the first input is received again.
  • the first electronic device provided in the embodiment of the present invention can implement each process implemented by the first electronic device in the foregoing method embodiment. To avoid repetition, details are not described herein again.
  • the first electronic device uses the above-mentioned module.
  • the user on the first electronic device side does not need to manually notify the connection information of the hotspot to other users who need to use the hotspot.
  • Directly trigger the sharing of hotspot connection information thereby avoiding the leakage of hotspot account information and inconsistent communication of hotspot connection information, and improving the success rate of hotspot sharing; when a hotspot needs to be shared, the user only needs to trigger the first input.
  • connection information is encrypted based on the first input fingerprint information (first encryption), and the encrypted first ciphertext Outputting in audio mode (the second encryption) is equivalent to multiple encryption of the connection information, effectively avoiding the problem of theft and leakage of the connection information of the hotspot.
  • FIG. 6 a block diagram of an electronic device according to an embodiment of the present invention is shown.
  • the electronic device of the embodiment of the present invention can implement the details of the hotspot sharing method related to the embodiment of FIG. 3 and FIG. 4 in the above embodiment, and achieve the same effect.
  • the electronic device shown in FIG. 6 is a second electronic device, and the second electronic device includes:
  • the first receiving module 501 is configured to receive a first input
  • the second receiving module 502 is configured to receive the first ciphertext in the audio format output by the first electronic device;
  • the decryption module 503 is configured to decrypt the first ciphertext based on the fingerprint information of the first input in response to the first input to obtain connection information of the hotspot to be connected to the second electronic device;
  • the connection module 504 is configured to use the connection information to connect the hotspot to be connected.
  • the decryption module 503 includes:
  • a generating sub-module configured to generate a first key based on the fingerprint information of the first input
  • the first decryption submodule is used to decrypt the first ciphertext using the first key to obtain connection information of the hotspot to be connected to the second electronic device.
  • the decryption module 503 further includes:
  • the second decryption sub-module is configured to decrypt the first ciphertext in text format based on the fingerprint information of the first input to obtain connection information of the hotspot to be connected to the second electronic device.
  • connection module 504 includes:
  • the request submodule is configured to use the connection information to request security authentication for the hotspot to be connected;
  • connection sub-module is configured to connect to the hotspot to be connected if the security authentication is passed.
  • the second electronic device further includes:
  • the connection stop module is configured to stop requesting the security authentication of the hotspot to be connected if the number of requests reaches a preset number and none of the requests passes the security authentication.
  • the second electronic device provided in the embodiment of the present invention can implement each process implemented by the second electronic device in the foregoing method embodiment, and to avoid repetition, details are not described herein again.
  • the second electronic device when the second electronic device needs to connect to a hotspot shared by other electronic devices, only the user on the electronic device side that needs to share the hotspot uses the fingerprint used when sharing the hotspot to be on the second electronic device side. Trigger the first input, and the second electronic device receives the first ciphertext in audio format sent by other electronic devices sharing the hotspot, and decrypts the first ciphertext based on the fingerprint information of the first input, After obtaining the connection information of the hotspot to be connected to the second electronic device, the connection information can be used to connect to the hotspot to be connected.
  • the user on the second electronic device side does not need to select the hotspot to be connected from the hotspot list, nor does it need to obtain the connection information of the hotspot from the user side sharing the hotspot and input the connection information, and can quickly connect to other electronic devices.
  • the hotspot shared by the device reduces user participation and simplifies user operations.
  • connection information of the hotspot is not Manual acquisition is required, but the first ciphertext in the audio format is collected, and the first ciphertext is decrypted based on the fingerprint corresponding to the first input to obtain the connection information of the hotspot to be connected, which avoids the inconsistency of the hotspot connection information in manual communication
  • the success rate of hotspot sharing is improved, and the leakage of connection information is avoided
  • the connection information of the connected hotspot is not only encrypted (first encryption) based on the fingerprint information of the first input, but also the connection information
  • the first ciphertext of is also collected in audio format (the second encryption), which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of theft and leakage of the connection information of the hotspot.
  • FIG. 7 is a schematic diagram of the hardware structure of an electronic device that implements various embodiments of the present invention.
  • the electronic device 400 includes but is not limited to: a radio frequency unit 401, a network module 402, an audio output unit 403, an input unit 404, a sensor 405, a display unit 406, a user input unit 407, an interface unit 408, a memory 409, a processor 410, and Power supply 411 and other components.
  • a radio frequency unit 401 includes but is not limited to: a radio frequency unit 401, a network module 402, an audio output unit 403, an input unit 404, a sensor 405, a display unit 406, a user input unit 407, an interface unit 408, a memory 409, a processor 410, and Power supply 411 and other components.
  • Those skilled in the art can understand that the structure of the electronic device shown in FIG. 7 does not constitute a limitation on the electronic device.
  • the electronic device may include more or fewer components than those shown in the figure, or a combination of certain components, or different components. Layout.
  • electronic devices include, but are not limited to, mobile phones, tablet computers,
  • the user input unit 407 is configured to receive the first input
  • the processor 410 is configured to, in response to the first input, encrypt the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input, and generate a first ciphertext;
  • the radio frequency unit 401 is configured to output the first ciphertext in audio mode.
  • the user on the electronic device side does not need to manually notify the connection information of the hotspot to other users who need to use the hotspot, but directly triggers the connection of the hotspot through the first input
  • Information sharing avoids the leakage of hotspot account information and the inconsistency of hotspot connection information, and improves the success rate of hotspot sharing; when a hotspot needs to be shared, the user only needs to trigger the first input, which greatly simplifies user operations Step;
  • encrypt the connection information based on the first input fingerprint information (first re-encryption), and use the encrypted first ciphertext in audio mode (the first Double encryption) output which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of the theft and leakage of the connection information of the hotspot.
  • the user input unit 407 is configured to receive the first input
  • the radio frequency unit 401 is configured to receive the first ciphertext of the audio format
  • the processor 410 uses the fingerprint information based on the first input to decrypt the first cipher text to obtain the connection information of the hotspot to be connected to the electronic device; connect.
  • connection information may be used to connect the hotspot to be connected.
  • the user on the electronic device side does not need to select the hotspot to be connected from the hotspot list, nor does it need to obtain the connection information of the hotspot from the user sharing the hotspot and enter the connection information, and can quickly connect to other electronic devices.
  • the shared hotspot reduces user participation and simplifies user operations.
  • the hotspot connection information is not required Manual acquisition, instead of collecting the first ciphertext in the audio format, and decrypting the first ciphertext based on the fingerprint corresponding to the first input to obtain the connection information of the hotspot to be connected, avoiding the inconsistency of the hotspot connection information in manual communication Circumstances, the success rate of hotspot sharing is improved, and the leakage of connection information is avoided; in addition, the connection information of the connected hotspot is not only encrypted (first encryption) based on the first input fingerprint information, but also The first ciphertext is also collected in audio format (the second encryption), which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of theft and leakage of the connection information of the hotspot.
  • the radio frequency unit 401 can be used to receive and send signals during information transmission or communication. Specifically, the downlink data from the base station is received and processed by the processor 410; in addition, Uplink data is sent to the base station.
  • the radio frequency unit 401 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency unit 401 can also communicate with the network and other devices through a wireless communication system.
  • the electronic device provides users with wireless broadband Internet access through the network module 402, such as helping users to send and receive emails, browse web pages, and access streaming media.
  • the audio output unit 403 may convert the audio data received by the radio frequency unit 401 or the network module 402 or stored in the memory 409 into an audio signal and output it as sound. Moreover, the audio output unit 403 may also provide audio output related to a specific function performed by the electronic device 400 (for example, call signal reception sound, message reception sound, etc.).
  • the audio output unit 403 includes a speaker, a buzzer, a receiver, and the like.
  • the input unit 404 is used to receive audio or video signals.
  • the input unit 404 may include a graphics processing unit (GPU) 4041 and a microphone 4042.
  • the graphics processor 4041 is configured to monitor images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed.
  • the processed image frame can be displayed on the display unit 406.
  • the image frame processed by the graphics processor 4041 may be stored in the memory 409 (or other storage medium) or sent via the radio frequency unit 401 or the network module 402.
  • the microphone 4042 can receive sound, and can process such sound into audio data.
  • the processed audio data can be converted into a format that can be sent to a mobile communication base station via the radio frequency unit 401 in the case of a telephone call mode for output.
  • the electronic device 400 also includes at least one sensor 405, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor includes an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 4061 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 4061 and the display panel 4061 when the electronic device 400 is moved to the ear. / Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of electronic devices (such as horizontal and vertical screen switching, related games) , Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, percussion), etc.; sensor 405 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
  • the display unit 406 is used to display information input by the user or information provided to the user.
  • the display unit 406 may include a display panel 4061, and the display panel 4061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • the user input unit 407 may be used to receive inputted numeric or character information, and generate key signal input related to user settings and function control of the electronic device.
  • the user input unit 407 includes a touch panel 4071 and other input devices 4072.
  • the touch panel 4071 also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 4071 or near the touch panel 4071. operate).
  • the touch panel 4071 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 410, the command sent by the processor 410 is received and executed.
  • the touch panel 4071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the user input unit 407 may also include other input devices 4072.
  • other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
  • the touch panel 4071 can cover the display panel 4061.
  • the touch panel 4071 detects a touch operation on or near it, it transmits it to the processor 410 to determine the type of touch event, and then the processor 410 determines the type of touch event according to the touch The type of event provides corresponding visual output on the display panel 4061.
  • the touch panel 4071 and the display panel 4061 are used as two independent components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 4071 and the display panel 4061 can be integrated
  • the implementation of the input and output functions of the electronic device is not specifically limited here.
  • the interface unit 408 is an interface for connecting an external device and the electronic device 400.
  • the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc.
  • the interface unit 408 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the electronic device 400 or can be used to connect the electronic device 400 to an external device. Transfer data between devices.
  • the memory 409 can be used to store software programs and various data.
  • the memory 409 may mainly include a storage program area and a storage data area.
  • the storage program area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data created by the use of mobile phones (such as audio data, phone book, etc.), etc.
  • the memory 409 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the processor 410 is the control center of the electronic device. It uses various interfaces and lines to connect the various parts of the entire electronic device, runs or executes the software programs and/or modules stored in the memory 409, and calls the data stored in the memory 409 , Perform various functions of electronic equipment and process data, so as to monitor the electronic equipment as a whole.
  • the processor 410 may include one or more processing units; preferably, the processor 410 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, application programs, etc., and the modem
  • the processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 410.
  • the electronic device 400 may also include a power source 411 (such as a battery) for supplying power to various components.
  • a power source 411 such as a battery
  • the power source 411 may be logically connected to the processor 410 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system. And other functions.
  • the electronic device 400 includes some functional modules not shown, which will not be repeated here.
  • the embodiment of the present invention also provides an electronic device, including a processor 410, a memory 409, and a computer program stored on the memory 409 and running on the processor 410.
  • an electronic device including a processor 410, a memory 409, and a computer program stored on the memory 409 and running on the processor 410.
  • the computer program is executed by the processor 410,
  • Each process of the above-mentioned hotspot sharing method embodiment can be realized, and the same technical effect can be achieved. In order to avoid repetition, details are not repeated here.
  • the embodiment of the present invention also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the computer program is executed by a processor, each process of the above hotspot sharing method embodiment is realized, and the same technology can be achieved. The effect, in order to avoid repetition, will not be repeated here.
  • the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, etc.
  • the technical solution of the present invention essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes a number of instructions to enable a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the method described in each embodiment of the present invention.
  • a terminal which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiments of the present invention provide a hotspot sharing method and an electronic device, relating to the field of communication technology. Said method comprises: receiving a first input; in response to the first input, encrypting, on the basis of fingerprint information of the first input, connection information of a hotspot of a first electronic device, so as to generate a first ciphertext; and outputting the first ciphertext in the form of an audio.

Description

热点分享方法及电子设备Hotspot sharing method and electronic equipment
相关申请的交叉引用Cross-references to related applications
本申请主张在2020年03月30日在中国提交的中国专利申请号No.202010239130.6的优先权,其全部内容通过引用包含于此。This application claims the priority of Chinese Patent Application No. 202010239130.6 filed in China on March 30, 2020, the entire content of which is incorporated herein by reference.
技术领域Technical field
本发明涉及通信技术领域,尤其涉及一种热点分享方法及电子设备。The present invention relates to the field of communication technology, in particular to a hotspot sharing method and electronic equipment.
背景技术Background technique
随着电子设备用户对网络的需求也变得越来越大,所以,用户常常会遇到需要进行网络分享、数据分享等分享场景。对于网络分享而言,传统技术主要是通过对无线局域网的热点分享来达到网络流量分享的目的;对于数据分享而言,传统技术主要是通过连接蓝牙设备、连接红外设备等方式来进行数据分享。As electronic device users have greater and greater demands on the network, users often encounter sharing scenarios such as network sharing and data sharing. For network sharing, the traditional technology mainly achieves the purpose of network traffic sharing through the hotspot sharing of the wireless local area network; for data sharing, the traditional technology mainly uses methods such as connecting Bluetooth devices and connecting infrared devices to perform data sharing.
那么不论是上述网络分享还是数据分享,都涉及对热点(例如无线热点、蓝牙热点、红外热点)的分享,那么在分享热点的过程中,都需要打开热点功能来供其他设备搜索连接,而其他电子设备在连接该热点时,则需要用户从附近的多个热点中选择所需要连接的热点,存在着查找不方便的问题。Then whether it is the above network sharing or data sharing, it involves the sharing of hotspots (such as wireless hotspots, Bluetooth hotspots, infrared hotspots). Then, in the process of sharing hotspots, you need to turn on the hotspot function for other devices to search for connections. When the electronic device connects to the hotspot, the user needs to select the hotspot to be connected from among multiple nearby hotspots, which presents the problem of inconvenience to find.
而且,就无线局域网的热点的分享而言,当某个热点设备的移动网络可用时,热点设备需要设置热点的名称(SSID)以及密码,然后告诉使用者这些热点信息,使用者搜索到该热点输入正确密码才可成功连接到该热点。Moreover, as far as the sharing of hotspots in wireless LAN is concerned, when the mobile network of a hotspot device is available, the hotspot device needs to set the name (SSID) and password of the hotspot, and then tell the user the hotspot information, and the user searches for the hotspot Enter the correct password to successfully connect to the hotspot.
显然,传统技术中的热点分享方案对用户的参与度要求更高,导致用户的操作过于繁琐,存在着热点分享不方便的问题,而且网络分享时还存在着热点的账号信息泄密和数据传达不一致的情况,从而导致热点分享失败率高的问题。Obviously, the hot-spot sharing scheme in traditional technology requires higher user participation, which causes the user's operation to be too cumbersome, there is a problem of inconvenience of hotspot sharing, and there are also hotspot account information leaks and inconsistent data transmission during network sharing. This has led to the problem of high failure rate of hotspot sharing.
发明内容Summary of the invention
本发明实施例提供一种热点分享方法及电子设备,以解决相关技术中的热点分享方案所存在的热点分享不方便、数据泄密和热点分享失败率高的问题。The embodiments of the present invention provide a hotspot sharing method and an electronic device to solve the problems of inconvenience in hotspot sharing, data leakage, and high failure rate of hotspot sharing in the hotspot sharing solution in related technologies.
为了解决上述技术问题,本发明是这样实现的:In order to solve the above technical problems, the present invention is implemented as follows:
第一方面,本发明实施例提供了一种热点分享方法,应用于第一电子设备,所述方法包括:In the first aspect, an embodiment of the present invention provides a hotspot sharing method applied to a first electronic device, and the method includes:
接收第一输入;Receive the first input;
响应于所述第一输入,基于所述第一输入的指纹信息,对所述第一电子设备的热点的连接信息进行加密,生成第一密文;In response to the first input, encrypting the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input to generate a first ciphertext;
将所述第一密文以音频方式输出。The first ciphertext is output in audio mode.
第二方面,本发明实施例提供了一种热点分享方法,应用于第二电子设备,所述方法包括:In a second aspect, an embodiment of the present invention provides a hotspot sharing method applied to a second electronic device, and the method includes:
接收第一输入;Receive the first input;
接收第一电子设备输出的音频格式的第一密文;Receiving the first ciphertext in the audio format output by the first electronic device;
响应所述第一输入,基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述电子设备待连接热点的连接信息;In response to the first input, decrypt the first ciphertext based on the fingerprint information of the first input to obtain connection information of the hotspot to be connected to the electronic device;
采用所述连接信息,对所述待连接热点进行连接。The connection information is used to connect the hotspot to be connected.
第三方面,本发明实施例还提供了一种电子设备,所述电子设备为第一电子设备,所述电子设备包括:In a third aspect, an embodiment of the present invention also provides an electronic device, the electronic device is a first electronic device, and the electronic device includes:
接收模块,用于接收第一输入;A receiving module for receiving the first input;
加密模块,用于响应于所述第一输入,基于所述第一输入的指纹信息,对所述第一电子设备的热点的连接信息进行加密,生成第一密文;An encryption module, configured to, in response to the first input, encrypt the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input to generate a first ciphertext;
输出模块,用于将所述第一密文以音频方式输出。The output module is used to output the first ciphertext in audio mode.
第四方面,本发明实施例还提供了一种电子设备,所述电子设备为第二电子设备,所述电子设备包括:In a fourth aspect, an embodiment of the present invention also provides an electronic device, the electronic device is a second electronic device, and the electronic device includes:
第一接收模块,用于接收第一输入;The first receiving module is configured to receive the first input;
第二接收模块,用于接收第一电子设备输出的音频格式的第一密文;The second receiving module is configured to receive the first ciphertext in the audio format output by the first electronic device;
解密模块,用于响应所述第一输入,基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息;A decryption module, configured to decrypt the first ciphertext based on the fingerprint information of the first input in response to the first input to obtain connection information of the hotspot to be connected to the second electronic device;
连接模块,用于采用所述连接信息,对所述待连接热点进行连接。The connection module is configured to use the connection information to connect to the hotspot to be connected.
第五方面,本发明实施例还提供了一种电子设备,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现第一方面或第二方面所述的热点分享方法的步骤。In a fifth aspect, an embodiment of the present invention also provides an electronic device, including: a memory, a processor, and a computer program stored on the memory and running on the processor, and the computer program is processed by the processor. The steps of the hotspot sharing method described in the first aspect or the second aspect are implemented when the device is executed.
第六方面,本发明实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现第一方面或第二方面所述的热点分享方法的步骤。In a sixth aspect, an embodiment of the present invention also provides a computer-readable storage medium having a computer program stored on the computer-readable storage medium, and when the computer program is executed by a processor, the first or second aspect is implemented. The steps of the hotspot sharing method described.
在本发明实施例中,当电子设备分享热点时,该电子设备侧的用户无需将该热点的连接信息人工通知给其他需要使用该热点的用户,而是通过第一输入来直接触发热点的连接信息的分享,从而避免了热点的账号信息泄密和热点连接信息传达不一致的情况,提升了热点分享成功率;而在需要分享热点时,用户只需要触发第一输入即可,大幅简化了用户操作步骤;此外,在分享该热点的连接信息时,通过基于该第一输入的指纹信息来对该连接信息进行加密(第一重加密),并将加密后的第一密文以音频方式(第二重加密)输出,相当于对连接信息进行了多重加密,有效避免了热点的连接信息被窃取和泄密的问题。In the embodiment of the present invention, when an electronic device shares a hotspot, the user on the electronic device side does not need to manually notify the connection information of the hotspot to other users who need to use the hotspot, but directly triggers the connection of the hotspot through the first input Information sharing avoids the leakage of hotspot account information and the inconsistency of hotspot connection information, and improves the success rate of hotspot sharing; when a hotspot needs to be shared, the user only needs to trigger the first input, which greatly simplifies user operations Step; In addition, when sharing the connection information of the hotspot, encrypt the connection information based on the first input fingerprint information (first re-encryption), and use the encrypted first ciphertext in audio mode (the first Double encryption) output, which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of the theft and leakage of the connection information of the hotspot.
附图说明Description of the drawings
为了更清楚地说明本发明实施例的技术方案,下面将对本发明实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to explain the technical solutions of the embodiments of the present invention more clearly, the following will briefly introduce the drawings that need to be used in the description of the embodiments of the present invention. Obviously, the drawings in the following description are only some embodiments of the present invention. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without creative labor.
图1是本发明一个实施例的热点分享方法的流程图;FIG. 1 is a flowchart of a hotspot sharing method according to an embodiment of the present invention;
图2是本发明一个实施例的电子设备的示意图;Figure 2 is a schematic diagram of an electronic device according to an embodiment of the present invention;
图3是本发明另一个实施例的热点分享方法的流程图;FIG. 3 is a flowchart of a hotspot sharing method according to another embodiment of the present invention;
图4是本发明另一个实施例的电子设备的示意图;4 is a schematic diagram of an electronic device according to another embodiment of the present invention;
图5是本发明一个实施例的电子设备的框图;Figure 5 is a block diagram of an electronic device according to an embodiment of the present invention;
图6是本发明另一个实施例的电子设备的框图;Fig. 6 is a block diagram of an electronic device according to another embodiment of the present invention;
图7是本发明一个实施例的电子设备的硬件结构示意图。FIG. 7 is a schematic diagram of the hardware structure of an electronic device according to an embodiment of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
参照图1,示出了本发明一个实施例的热点分享方法的流程图,应用于第一电子设备,例如分享热点的电子设备,所述方法具体可以包括如下步骤:1, there is shown a flowchart of a hotspot sharing method according to an embodiment of the present invention, which is applied to a first electronic device, such as an electronic device that shares a hotspot, and the method may specifically include the following steps:
步骤101,接收第一输入;Step 101: Receive a first input;
其中,该第一输入的输入方式可以是单击输入、双击输入、长按输入、滑动输入等任意一种输入方式。Wherein, the input mode of the first input may be any input mode such as single-click input, double-click input, long-press input, and sliding input.
此外,该第一输入用于触发对上述电子设备的热点分享。In addition, the first input is used to trigger hotspot sharing of the above-mentioned electronic device.
由于所分享的热点在类型可以是无线局域网的热点,或者蓝牙热点,或者红外热点,因此,该第一输入作用的对象可以是能够触发相应类型的热点分享的对象。Since the type of the shared hotspot may be a wireless local area network hotspot, or a Bluetooth hotspot, or an infrared hotspot, the object of the first input may be an object that can trigger the sharing of the corresponding type of hotspot.
在一个示例中,用户想要使用该电子设备分享网络流量,那么所分享的热点的类型可以为WLAN热点(或者WiFi热点)。In an example, if the user wants to use the electronic device to share network traffic, the type of the shared hotspot may be a WLAN hotspot (or WiFi hotspot).
如图2所示的电子设备(这里为手机11)的示意图,用户1可以使用例如右手的食指来长按手机11的屏幕所显示的按钮12(即为长按输入的作用对象),该按钮12为WLAN热点发起按钮,那么手机11可以接收到该长按输入,并可以获取到该长按输入的食指指纹信息。As shown in the schematic diagram of the electronic device (here, the mobile phone 11) as shown in FIG. 2, the user 1 can use the index finger of the right hand, for example, to long press the button 12 displayed on the screen of the mobile phone 11 (that is, the long-press input object). 12 is the WLAN hotspot initiation button, then the mobile phone 11 can receive the long-press input, and can obtain the index finger fingerprint information of the long-press input.
可选地,在一个实施例中,可以在接收到第一输入之后,开启该手机11的WLAN热点。Optionally, in one embodiment, after receiving the first input, the WLAN hotspot of the mobile phone 11 may be turned on.
可选地,在另一个实施例中,该第一输入也可以作为该手机11的WLAN热点的开关触发输入,例如图2,当用户想要分享WLAN热点时,可以长按该按钮12,若该手机11的WLAN热点处于关闭状态时,则通过长按该按钮12,可以直接打开该手机11的WLAN热点,那么手机11可以发射WLAN信号13;若该手机11的WLAN热点处于开启状态时,则通过长按该按钮12,可以直接关闭该手机11的WLAN热点。Optionally, in another embodiment, the first input can also be used as a switch trigger input of the WLAN hotspot of the mobile phone 11. For example, as shown in Figure 2, when the user wants to share the WLAN hotspot, he can press and hold the button 12 for a long time. When the WLAN hotspot of the mobile phone 11 is turned off, you can directly turn on the WLAN hotspot of the mobile phone 11 by long pressing the button 12, and the mobile phone 11 can transmit WLAN signals 13; if the WLAN hotspot of the mobile phone 11 is turned on, By long pressing the button 12, the WLAN hotspot of the mobile phone 11 can be directly turned off.
步骤102,响应于所述第一输入,基于所述第一输入的指纹信息,对所述第一电子设备的热点的连接信息进行加密,生成第一密文;Step 102: In response to the first input, based on the fingerprint information of the first input, encrypt the connection information of the hotspot of the first electronic device to generate a first ciphertext;
其中,可以获取触发该第一输入的指纹信息,例如长按图2中的按钮12的手指的指纹信息。Wherein, the fingerprint information that triggers the first input can be acquired, for example, the fingerprint information of the finger that presses the button 12 in FIG. 2 for a long time.
在一个实施例中,当电子设备支持多种类型的热点时,则可以基于该第一输入的作用对象来确定用户所请求分享的热点,该热点即为步骤102中连接信息被加密的热点。In one embodiment, when the electronic device supports multiple types of hotspots, the hotspot requested to be shared by the user can be determined based on the role of the first input. The hotspot is the hotspot whose connection information is encrypted in step 102.
其中,分享的热点可以包括以下之一:WLAN热点、或者WiFi热点、或者红外热点,或者蓝牙热点。Among them, the shared hotspot may include one of the following: WLAN hotspot, or WiFi hotspot, or infrared hotspot, or Bluetooth hotspot.
而热点的连接信息,则表示该热点的用于连接的属性信息。The connection information of the hotspot indicates the attribute information of the hotspot for connection.
当第一输入对应的需要分享的热点为WLAN热点时,则该热点的连接信息可以包括 SSID(服务集标识,Service Set Identifier)-即WLAN名称、BSSID(basic SSID,即MAC地址)、连接密码等。When the hotspot to be shared corresponding to the first input is a WLAN hotspot, the connection information of the hotspot can include SSID (Service Set Identifier)-namely WLAN name, BSSID (basic SSID, namely MAC address), connection password Wait.
当第一输入对应的需要分享的热点为蓝牙热点时,则该热点的连接信息可以包括蓝牙名称等。When the hotspot to be shared corresponding to the first input is a Bluetooth hotspot, the connection information of the hotspot may include a Bluetooth name and the like.
当第一输入对应的需要分享的热点为红外热点时,则该热点的连接信息可以包括红外名称等。When the hotspot to be shared corresponding to the first input is an infrared hotspot, the connection information of the hotspot may include an infrared name and the like.
可选地,当对热点的连接信息进行加密的加密方式,以及解密的解密方式,在电子设备侧是预先配置好的时,则可以直接采用相应的预设的第一加密算法,和相应的安全密钥,来对该电子设备的与该第一输入对应的热点的连接信息进行加密,生成第一密文。Optionally, when the encryption method for encrypting the connection information of the hotspot and the decryption method for decryption are pre-configured on the electronic device side, the corresponding preset first encryption algorithm and the corresponding The security key is used to encrypt the connection information of the hotspot corresponding to the first input of the electronic device to generate the first ciphertext.
可选地,在一个实施例中,上述安全密钥可以是该第一输入的指纹信息。Optionally, in an embodiment, the aforementioned security key may be the first input fingerprint information.
可选地,在另一个实施例中,上述安全密钥也可以是由第一输入的指纹信息所确定的密钥,非该指纹信息本身,因此,在执行步骤102时,可以基于所述第一输入的指纹信息,生成第一密钥;采用所述第一密钥,对所述第一电子设备的热点的连接信息进行加密,生成第一密文。Optionally, in another embodiment, the aforementioned security key may also be a key determined by the first input fingerprint information, and not the fingerprint information itself. Therefore, when step 102 is performed, it may be based on the first input fingerprint information. An input fingerprint information is used to generate a first key; the first key is used to encrypt the connection information of the hotspot of the first electronic device to generate a first ciphertext.
其中,在基于指纹信息,来生成第一密钥(即上述安全密钥)时,可以通过采用预设的第二加密算法和第二密钥来对该指纹信息进行加密,将该指纹信息的密文作为上述安全密钥;还可以通过采用预设编码来与该指纹信息进行组合,来生成上述安全密钥等方式。Wherein, when the first key (ie, the aforementioned security key) is generated based on the fingerprint information, the fingerprint information can be encrypted by using the preset second encryption algorithm and the second key, and the fingerprint information The ciphertext is used as the above-mentioned security key; the above-mentioned security key can also be generated by using a preset code to combine with the fingerprint information.
在确定了安全密钥后,就可以采用该安全密钥和预设的第一加密算法来对该电子设备待分享的热点的连接信息进行加密,生成第一密文,即该连接信息的密文。After the security key is determined, the security key and the preset first encryption algorithm can be used to encrypt the connection information of the hotspot to be shared by the electronic device to generate the first ciphertext, that is, the encryption of the connection information. Arts.
在本发明实施例中,可以基于所述第一输入的指纹信息,来生成第一密钥;并采用所述第一密钥,对所述电子设备的热点的连接信息进行加密,生成第一密文,使得以音频方式输出的第一密文是采用由触发热点分享的第一输入的指纹信息而确定的第一密钥加密的,不仅避免了热点的账号信息泄密,而且可以防止该账号信息在以音频方式输出的过程中被恶意程序窃取;并且,该第一密钥是基于请求分享热点的用户触发的第一输入的指纹信息而确定的,由于每个用户的指纹是用户的唯一性标识,他人较难获取到,即第一密文的解密密钥非法用户或程序较难获取,因此,可以避免非法电子设备使用泄密后的热点的连接信息来连接该电子设备的热点。In the embodiment of the present invention, a first key may be generated based on the fingerprint information of the first input; and the first key may be used to encrypt the connection information of the hotspot of the electronic device to generate the first key. The ciphertext, so that the first ciphertext output in audio mode is encrypted with the first key determined by the first input fingerprint information that triggers the hotspot sharing, which not only avoids the leakage of the hotspot account information, but also prevents the account The information was stolen by malicious programs in the process of audio output; and, the first key is determined based on the first input fingerprint information triggered by the user requesting to share the hotspot, because each user’s fingerprint is the user’s unique It is more difficult for others to obtain the identification, that is, it is difficult for unauthorized users or programs to obtain the decryption key of the first ciphertext. Therefore, illegal electronic devices can be prevented from using the leaked hotspot connection information to connect to the hotspot of the electronic device.
步骤103,将所述第一密文以音频方式输出。Step 103: Output the first ciphertext in audio mode.
其中,加密后的连接信息为一段1、0的编码,那么可以将该编码以音频方式来输出,从而达到需要使用该分享的热点的第二电子设备可以接收到该第一密文,并以音频方式来接收。Wherein, the encrypted connection information is a code of 1, 0, then the code can be output in audio mode, so that the second electronic device that needs to use the shared hotspot can receive the first ciphertext, and use Audio way to receive.
可选地,为了提升使用该分享的热点的电子设备对热点的连接效率,本发明实施例的方法可以开启该电子设备的扬声器,来将音频格式的音频数据(表达的是第一密文)输出。Optionally, in order to improve the connection efficiency of the electronic device using the shared hotspot to the hotspot, the method of the embodiment of the present invention can turn on the speaker of the electronic device to transfer audio data in audio format (expressing the first ciphertext) Output.
当然,在其他实施例中,如果该电子设备连接有外放设备(例如耳机或音箱),也可以通过外放设备来输出该音频数据。Of course, in other embodiments, if the electronic device is connected to an external device (for example, earphones or speakers), the audio data can also be output through the external device.
可选地,在执行步骤103时,可以将所述第一密文的文本数据转换为音频数据并输出。Optionally, when step 103 is performed, the text data of the first ciphertext may be converted into audio data and output.
在一个示例中,第一密文可以为0、1的编码文本(例如10100011),那么在转换时,可以将该编码文本中的1转换为高音,将0转换为低音,从而生成高音低音组合的音频数据(该音频数据的高低音序列为:高低高低低低高高),对于上述音频数据的序列中多个 高音的高音节是统一的,类似的,多个低音的低音节也是相同的。In an example, the first ciphertext can be a coded text of 0 or 1 (for example, 10100011). Then, when converting, the 1 in the coded text can be converted into a treble, and 0 can be converted into a bass, thereby generating a combination of treble and bass The audio data of the audio data (the high and low frequency sequence of the audio data is: high, low, high, low, low, high, high), the high syllables of multiple trebles in the above audio data sequence are unified, and similarly, the low syllables of multiple bass are also the same .
在另一个示例中,第一密文可以为0、1的编码文本(例如10100011),那么在转换时,还可以将该编码文本直接输出为音频,即输出的音频的语音对应的文本为10100011,即直接播放该编码文本。In another example, the first ciphertext can be the coded text of 0 or 1 (for example, 10100011), then during conversion, the coded text can also be directly output as audio, that is, the text corresponding to the voice of the output audio is 10100011 To play the encoded text directly.
在本发明实施例中,在分享的热点的连接信息时,通过将该连接信息的第一密文转换为音频数据进行输出播放,可以使得连接信息的传输面更广,即该电子设备周围的多个电子设备都可以采集到该音频数据,从而便于周围的多个电子设备连接该分享的热点,提升了热点分享和连接效率。In the embodiment of the present invention, when the connection information of the hotspot is shared, by converting the first ciphertext of the connection information into audio data for output and playback, the transmission surface of the connection information can be wider, that is, the area around the electronic device Multiple electronic devices can collect the audio data, thereby facilitating multiple surrounding electronic devices to connect to the shared hotspot, which improves the efficiency of hotspot sharing and connection.
在本发明实施例中,当电子设备分享热点时,该电子设备侧的用户无需将该热点的连接信息人工通知给其他需要使用该热点的用户,而是通过第一输入来直接触发热点的连接信息的分享,从而避免了热点的账号信息泄密和热点连接信息传达不一致的情况,提升了热点分享成功率;而在需要分享热点时,用户只需要触发第一输入即可,大幅简化了用户操作步骤;此外,在分享该热点的连接信息时,通过基于该第一输入的指纹信息来对该连接信息进行加密(第一重加密),并将加密后的第一密文以音频方式(第二重加密)输出,相当于对连接信息进行了多重加密,有效避免了热点的连接信息被窃取和泄密的问题。In the embodiment of the present invention, when an electronic device shares a hotspot, the user on the electronic device side does not need to manually notify the connection information of the hotspot to other users who need to use the hotspot, but directly triggers the connection of the hotspot through the first input Information sharing avoids the leakage of hotspot account information and the inconsistency of hotspot connection information, and improves the success rate of hotspot sharing; when a hotspot needs to be shared, the user only needs to trigger the first input, which greatly simplifies user operations Step; In addition, when sharing the connection information of the hotspot, encrypt the connection information based on the first input fingerprint information (first re-encryption), and use the encrypted first ciphertext in audio mode (the first Double encryption) output, which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of the theft and leakage of the connection information of the hotspot.
可选地,在执行步骤103时,还可以将所述第一密文以音频方式持续输出预设时长。Optionally, when step 103 is performed, the first ciphertext may also be continuously output in an audio manner for a preset period of time.
其中,为了避免想要连接该热点的电子设备没有及时地接收到上述热点的连接信息,可以将该第一密文以音频方式持续地输出预设时长,例如1分钟。Wherein, in order to avoid that the electronic device that wants to connect to the hotspot does not receive the connection information of the hotspot in time, the first ciphertext may be continuously output in an audio manner for a preset period of time, for example, 1 minute.
在一个示例中,如图2所示,当用户手指对按钮12按压之后,从按钮12离开,则可以在手指停止触发该第一输入之后的预设时长内持续的输出该音频格式的第一密文。In an example, as shown in FIG. 2, when the user leaves the button 12 after pressing the button 12 with the finger, the first input of the audio format can be continuously output for a preset period of time after the finger stops triggering the first input. Ciphertext.
可选地,在步骤103之后,根据本发明实施例的方法还可以包括:若再次接收到所述第一输入,则暂停所述第一密文以音频方式输出。Optionally, after step 103, the method according to the embodiment of the present invention may further include: if the first input is received again, pausing the output of the first ciphertext in audio mode.
在一个示例中,当用户想要暂停分享上述热点时,则用户触发上述第一输入之后,可以再次触发该第一输入,例如图2可以再次长按该按钮12,来暂停该第一密文以音频方式输出;那么通过切换对该按钮12的长按输入,则可以随时地开始分享和暂停分享该热点的连接信息,提升了热点分享的灵活性。In an example, when the user wants to suspend sharing of the above-mentioned hotspot, after the user triggers the above-mentioned first input, the first input can be triggered again. For example, in FIG. 2, the button 12 can be long-pressed again to suspend the first ciphertext. Output in audio mode; then, by switching the long-press input of the button 12, you can start sharing and suspend sharing the connection information of the hotspot at any time, which improves the flexibility of hotspot sharing.
参照图3,示出了本发明另一个实施例的热点分享方法的流程图,应用于第二电子设备,例如需要使用其他电子设备分享的热点的电子设备,具体可以包括如下步骤:Referring to FIG. 3, a flowchart of a hotspot sharing method according to another embodiment of the present invention is shown, which is applied to a second electronic device, such as an electronic device that needs to use a hotspot shared by other electronic devices, and may specifically include the following steps:
步骤201,接收第一输入; Step 201, receive the first input;
关于本步骤的具体描述可以上述图1实施例的步骤101的具体阐述,原理类似,这里不再赘述。The detailed description of this step can be the detailed description of step 101 in the embodiment of FIG.
在一个示例中,例如该第二电子设备为图4所示的手机21,那么图2实施例对应的第一电子设备(即手机11)的用户1的食指可以长按该图4中手机21的按钮22(WLAN热点接收按钮),本发明实施例的方法就可以接收到该第一输入。In an example, for example, the second electronic device is the mobile phone 21 shown in FIG. 4, then the index finger of the user 1 of the first electronic device (ie, the mobile phone 11) corresponding to the embodiment in FIG. 2 can press and hold the mobile phone 21 in FIG. 4 Button 22 (WLAN hotspot receiving button), the method of the embodiment of the present invention can receive the first input.
也就是说,为了实现热点的分享,用户1的食指需要按压需要分享该手机11的热点的手机21的按钮22,从而使得手机21接收到对按钮22的按压输入,并获取到该按压输入的指纹信息(例如为用户1的食指的指纹)。That is to say, in order to share the hotspot, the index finger of the user 1 needs to press the button 22 of the mobile phone 21 that needs to share the hotspot of the mobile phone 11, so that the mobile phone 21 receives the input of pressing the button 22 and obtains the input of the pressing input. Fingerprint information (for example, the fingerprint of the index finger of user 1).
步骤202,接收第一电子设备输出的音频格式的第一密文;Step 202: Receive the first ciphertext in the audio format output by the first electronic device;
如上述图1和图2实施例所述,第一电子设备,即手机11可以将手机11的热点的第 一密文以音频方式输出,那么位于该手机11附近的手机21就可以采集到音频格式的该第一密文。As described in the above embodiments of FIGS. 1 and 2, the first electronic device, that is, the mobile phone 11 can output the first ciphertext of the hotspot of the mobile phone 11 in audio mode, and the mobile phone 21 located near the mobile phone 11 can collect audio Format of the first ciphertext.
可选地,在步骤201后,如果检测到该手机21的送话器(例如麦克风)没有开启,则可以开启该送话器,从而通过该送话器来采集手机11输出播放的音频格式的第一密文。Optionally, after step 201, if it is detected that the microphone (for example, a microphone) of the mobile phone 21 is not turned on, the microphone can be turned on, so that the audio format output and played by the mobile phone 11 can be collected through the microphone. The first ciphertext.
其中,本发明对于步骤201和步骤202的执行顺序不做限制。Among them, the present invention does not limit the execution order of step 201 and step 202.
步骤203,响应所述第一输入,基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息;Step 203: In response to the first input, decrypt the first ciphertext based on the fingerprint information of the first input to obtain connection information of the hotspot to be connected to the second electronic device;
在一个实施例中,当该第二电子设备支持多种类型的热点时,则可以基于该第一输入的作用对象来确定用户要连接的热点。In an embodiment, when the second electronic device supports multiple types of hotspots, the hotspots to be connected by the user may be determined based on the target of the first input.
其中,该热点可以包括以下之一:WLAN热点、或者WiFi热点、或者红外热点,或者蓝牙热点。Wherein, the hotspot may include one of the following: WLAN hotspot, or WiFi hotspot, or infrared hotspot, or Bluetooth hotspot.
而热点的连接信息,则表示该热点的用于连接的属性信息。The connection information of the hotspot indicates the attribute information of the hotspot for connection.
当第一输入对应的需要连接的热点为WLAN热点时,则该热点的连接信息可以包括SSID(服务集标识,Service Set Identifier)-即WLAN名称、BSSID(basic SSID,即MAC地址)、连接密码等。When the hotspot to be connected corresponding to the first input is a WLAN hotspot, the connection information of the hotspot can include SSID (Service Set Identifier)-namely WLAN name, BSSID (basic SSID, namely MAC address), connection password Wait.
当第一输入对应的需要连接的热点为蓝牙热点时,则该热点的连接信息可以包括蓝牙名称等。When the hotspot to be connected corresponding to the first input is a Bluetooth hotspot, the connection information of the hotspot may include a Bluetooth name and the like.
当第一输入对应的需要连接的热点为红外热点时,则该热点的连接信息可以包括红外名称等。When the hotspot to be connected corresponding to the first input is an infrared hotspot, the connection information of the hotspot may include an infrared name and the like.
可选地,当对热点的连接信息进行加密的加密方式,以及解密的解密方式,在第二电子设备侧是预先配置好的时,则可以直接采用相应的预设的第一解密算法,和相应的安全密钥,来对该第二电子设备的与该第一输入对应的热点的第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。Optionally, when the encryption method for encrypting the connection information of the hotspot and the decryption method for decryption are pre-configured on the second electronic device side, the corresponding preset first decryption algorithm can be directly used, and The corresponding security key is used to decrypt the first ciphertext of the hotspot corresponding to the first input of the second electronic device to obtain connection information of the hotspot to be connected to the second electronic device.
其中,该待连接热点即为该第一电子设备分享的热点。Wherein, the hotspot to be connected is the hotspot shared by the first electronic device.
可选地,在一个实施例中,上述安全密钥可以是该第一输入的指纹信息。Optionally, in an embodiment, the aforementioned security key may be the first input fingerprint information.
可选地,在另一个实施例中,上述安全密钥也可以是由第一输入的指纹信息所确定的密钥,非该指纹信息本身,因此,在执行步骤203时,可以基于所述第一输入的指纹信息,生成第一密钥;采用所述第一密钥,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。Optionally, in another embodiment, the aforementioned security key may also be a key determined by the first input fingerprint information, not the fingerprint information itself. Therefore, when step 203 is performed, it may be based on the first input fingerprint information. An input fingerprint information is used to generate a first key; the first key is used to decrypt the first ciphertext to obtain connection information of the hotspot to be connected to the second electronic device.
其中,在基于指纹信息,来生成第一密钥(即上述安全密钥)时,可以通过采用预设的第二加密算法和第二密钥来对该指纹信息进行加密,将该指纹信息的密文作为上述安全密钥;还可以通过采用预设编码来与该指纹信息进行组合,来生成上述安全密钥等方式。Wherein, when the first key (ie, the aforementioned security key) is generated based on the fingerprint information, the fingerprint information can be encrypted by using the preset second encryption algorithm and the second key, and the fingerprint information The ciphertext is used as the above-mentioned security key; the above-mentioned security key can also be generated by using a preset code to combine with the fingerprint information.
在确定了安全密钥后,就可以采用该安全密钥和预设的第一解密算法来对第一密文进行解密,生成该第二电子设备的待连接热点的连接信息。After the security key is determined, the security key and the preset first decryption algorithm can be used to decrypt the first ciphertext to generate connection information of the to-be-connected hotspot of the second electronic device.
在本发明实施例中,可以基于所述第一输入的指纹信息,来生成第一密钥;并采用所述第一密钥,对接收到的第一密文进行解密,得到所述第二电子设备待连接热点的连接信息,使得以音频方式输出的第一密文能够采用由触发热点分享以及热点连接的第一输入的指纹信息而确定的第一密钥进行解密,不仅避免了热点的账号信息泄密,而且可以防止该账号信息在以音频方式输出的过程中被恶意程序窃取;并且,该第一密钥是基于请求分享 热点的用户触发的第一输入的指纹信息而确定的,由于每个用户的指纹是用户的唯一性标识,他人较难获取到,即第一密文的解密密钥非法用户或程序较难获取,因此,可以避免非法电子设备使用泄密后的热点的连接信息来连接本电子设备的热点。In the embodiment of the present invention, a first key may be generated based on the fingerprint information of the first input; and the first key is used to decrypt the received first ciphertext to obtain the second The connection information of the hotspot to be connected to the electronic device, so that the first ciphertext output in audio mode can be decrypted using the first key determined by the first input fingerprint information that triggers the hotspot sharing and the hotspot connection, which not only avoids the hotspot The account information is leaked, and the account information can be prevented from being stolen by malicious programs in the process of audio output; and the first key is determined based on the first input fingerprint information triggered by the user requesting to share the hotspot. The fingerprint of each user is the unique identification of the user, which is more difficult for others to obtain, that is, the decryption key of the first ciphertext is more difficult for illegal users or programs to obtain. Therefore, illegal electronic devices can be prevented from using leaked hotspot connection information To connect to the hotspot of this electronic device.
因此,当进行热点分享时,用户只需要在分享热点的电子设备侧以指纹来触发第一输入,然后,再以相同的指纹在需要连接该热点的另一台电子设备侧同样触发第一输入,从而可以实现热点连接信息的传输,不仅实现了热点的连接信息的认证,还简化了需要连接该热点的另一台电子设备侧的用户的操作,该另一台电子设备侧的用户不需要从热点列表中筛选所需要连接的热点,也不需要从分享热点的用户侧获取热点的账号密码等连接信息,而只需要由分享该热点的电子设备侧的用户,在该另一台电子设备侧再次以相同指纹触发第一输入,就可以实现热点的分享和连接,对用户的参与度要求大幅降低,简化了用户侧的操作,提升了热点的分享和连接的便捷性,还不存在数据泄密的情况。Therefore, when performing hotspot sharing, the user only needs to trigger the first input with a fingerprint on the side of the electronic device sharing the hotspot, and then use the same fingerprint to trigger the first input on the side of another electronic device that needs to connect to the hotspot. , Which can realize the transmission of hotspot connection information, which not only realizes the authentication of the hotspot connection information, but also simplifies the operation of the user on the side of another electronic device that needs to connect to the hotspot, and the user on the other electronic device does not need To filter the hotspots to be connected from the hotspot list, there is no need to obtain the hotspot account password and other connection information from the user side of the hotspot, but only the user on the side of the electronic device sharing the hotspot on the other electronic device When the first input is triggered by the same fingerprint on the side again, hotspot sharing and connection can be realized, which greatly reduces user participation requirements, simplifies user-side operations, and improves the convenience of hotspot sharing and connection. There is no data yet Circumstances of leaks.
可选地,在上述任意一个实施例中,在执行步骤203时,可以将所述音频格式的第一密文,转换为文本格式的第一密文;然后,基于所述第一输入的指纹信息,对文本格式的所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。Optionally, in any of the foregoing embodiments, when step 203 is performed, the first ciphertext in the audio format may be converted into the first ciphertext in the text format; then, based on the first input fingerprint Information, decrypt the first ciphertext in text format to obtain connection information of the hotspot to be connected to the second electronic device.
在一个示例中,当音频格式的第一密文是按照高音和低音的方式来对第一密文进行编码的音频数据时,例如第一密文为0、1的编码文本(例如10100011),那么如果该第一密文在转换音频格式的音频数据时,该编码文本中的1转换为高音,将0转换为低音,那么这里的音频格式的第一密文为高音低音组合的音频数据(该音频数据的高低音序列为:高低高低低低高高),其中,上述音频数据的序列中多个高音的高音节是统一的,类似的,多个低音的低音节也是相同的。那么在将音频格式的第一密文转换为文本格式的第一密文时,只需要将音频数据中高音位置改为1,低音位置改为0,从而得到10100011的文本格式的第一密文。In an example, when the first ciphertext of the audio format is audio data in which the first ciphertext is encoded in the manner of treble and bass, for example, the first ciphertext is the encoded text of 0 and 1 (for example, 10100011), Then if the first ciphertext in the audio format is converted into audio data, the 1 in the encoded text is converted to treble and 0 is converted to bass, then the first ciphertext of the audio format here is the audio data of a combination of treble and bass ( The treble and bass sequence of the audio data is: high, low, high, low, low, high, high), where the high syllables of multiple trebles in the sequence of the audio data are unified, and similarly, the low syllables of multiple basses are also the same. Then when converting the first ciphertext in the audio format to the first ciphertext in the text format, you only need to change the treble position in the audio data to 1 and the bass position to 0 to obtain the first ciphertext in the text format of 10100011 .
在另一个示例中,当音频格式的第一密文,即音频数据对应的语音的文本为数字序列时,例如10100011,则可以直接对音频格式的第一密文,即音频数据进行语音识别,来确定数字序列10100011,将该数字序列转换为文本格式的10100011,生成文本格式的第一密文。In another example, when the first ciphertext of the audio format, that is, the text of the voice corresponding to the audio data, is a digital sequence, such as 10100011, the first ciphertext of the audio format, that is, the audio data can be directly subjected to voice recognition. To determine the number sequence 10100011, convert the number sequence to 10100011 in text format, and generate the first ciphertext in text format.
在本发明实施例中,在获取其他电子设备所分享的热点的连接信息时,由于采集的连接信息是音频格式的密文,则可以将音频格式的第一密文转换为文本格式的第一密文,从而准确地获取到连接信息的第一密文,并采用的相应的指纹信息来对第一密文进行解密,提升热点分享和连接的安全性。In the embodiment of the present invention, when the connection information of the hotspot shared by other electronic devices is obtained, since the collected connection information is the cipher text in the audio format, the first cipher text in the audio format can be converted into the first cipher text in the text format. Ciphertext, so as to accurately obtain the first ciphertext of the connection information, and use the corresponding fingerprint information to decrypt the first ciphertext, improving the security of hotspot sharing and connection.
其中,当步骤201中的第一输入对应的指纹信息,并不是与音频格式的第一密文所采用的加密密钥相匹配时,则电子设备侧无法成功并准确地获取到分享热点的电子设备所分享的热点的连接信息,换句话说,其他非授权用户的指纹并不可以用于对第一密文进行解密,进而无法进行热点连接,所以,本发明实施例的方法可以提升热点分享的安全性和认证性,非法用户难以窃取热点的连接信息并进行热点的连接,进而无法窃取网络流量。Wherein, when the fingerprint information corresponding to the first input in step 201 does not match the encryption key used in the first cipher text of the audio format, the electronic device side cannot successfully and accurately obtain the electronic sharing hotspot. The connection information of the hotspot shared by the device, in other words, the fingerprints of other unauthorized users cannot be used to decrypt the first ciphertext, and the hotspot connection cannot be performed. Therefore, the method of the embodiment of the present invention can improve hotspot sharing Due to its security and authentication, it is difficult for illegal users to steal the connection information of the hotspot and connect to the hotspot, and thus cannot steal network traffic.
步骤204,采用所述连接信息,对所述待连接热点进行连接。Step 204: Use the connection information to connect to the hotspot to be connected.
其中,可以采用该连接信息,来对第一电子设备的该待连接热点进行连接。Wherein, the connection information can be used to connect to the to-be-connected hotspot of the first electronic device.
可选地,在执行步骤204时,可以采用所述连接信息,请求对第一电子设备的所述待连接热点进行安全认证;若通过所述安全认证,则连接所述待连接热点。Optionally, when step 204 is performed, the connection information may be used to request security authentication of the hotspot to be connected of the first electronic device; if the security authentication is passed, the hotspot to be connected is connected.
可选地,根据本发明实施例的方法还可以包括:Optionally, the method according to the embodiment of the present invention may further include:
若所述请求的次数达到预设次数,且所述请求(即对该待连接热点进行安全认证的请求)均未通过所述安全认证,则停止请求对所述待连接热点的安全认证。If the number of requests reaches the preset number, and none of the requests (that is, the request for security authentication of the hotspot to be connected) has not passed the security authentication, stop requesting the security authentication of the hotspot to be connected.
其中,第二电子设备侧可以将连接信息中的例如热点的SSID和密码等携带在认证请求中,并向图1的第一电子设备发送该认证请求,那么如果SSID和密码正确(或进一步地,图1的第一电子设备侧作了授权操作),则该认证请求可以通过安全认证,那么本发明实施例的第二电子设备就可以连接图1的第一电子设备所分享的热点。相反,若该认证请求发送了多次,且均未通过安全认证,则为了避免信令的占用,本发明实施例的第二电子设备可以停止发送该认证请求(可选地,还可以进一步关闭该热点的功能,例如WLAN功能)。Wherein, the second electronic device side may carry the SSID and password of the hotspot in the connection information in the authentication request, and send the authentication request to the first electronic device in FIG. 1, then if the SSID and password are correct (or further , The first electronic device in FIG. 1 performs an authorization operation), the authentication request can pass the security authentication, and the second electronic device in the embodiment of the present invention can connect to the hotspot shared by the first electronic device in FIG. On the contrary, if the authentication request is sent multiple times, and none of them has passed the security authentication, in order to avoid the occupation of the signaling, the second electronic device in the embodiment of the present invention can stop sending the authentication request (optionally, it can be further closed. The function of the hotspot, such as WLAN function).
在本发明实施例中,本发明实施例的方法能够实现热点的快速分享和连接,提高了热点分享及连接的便捷性。而且除了WLAN热点分享的场景,还有连接蓝牙、连接红外设备等互联型设备互联场景,本发明实施例的方法都适用。In the embodiment of the present invention, the method of the embodiment of the present invention can realize the rapid sharing and connection of hotspots, and improve the convenience of hotspot sharing and connection. In addition to the WLAN hotspot sharing scenario, there are also interconnected device interconnection scenarios such as connecting Bluetooth and connecting infrared devices, and the methods in the embodiments of the present invention are all applicable.
在本发明实施例中,当电子设备需要连接其他电子设备分享的热点时,只需要分享该热点的电子设备侧的用户,采用分享该热点时所用的指纹来在本电子设备侧触发第一输入,以及由本电子设备接收其他分享该热点的电子设备发送的音频格式的第一密文,并基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述电子设备待连接热点的连接信息,就可以采用所述连接信息,对所述待连接热点进行连接。在这个过程中,本电子设备侧的用户无需从热点列表中选取所需要连接的热点,也不需要从分享热点的用户侧获取热点的连接信息并输入连接信息,就可以快速的连接其他电子设备所分享的热点,降低了用户参与度,简化了用户操作,且在连接其他设备所分享热点时,用户只需要触发第一输入即可,大幅简化了用户操作步骤;而且热点的连接信息不需要人工获取,而是采集音频格式的第一密文,并基于第一输入对应的指纹对第一密文进行解密来得到待连接热点的连接信息,避免了热点连接信息在人工传达上的不一致的情况,提升了热点分享成功率,并避免了连接信息的泄密;此外,所连接的热点的连接信息不仅经过基于该第一输入的指纹信息的加密(第一重加密),而且该连接信息的第一密文还以音频格式被采集到(第二重加密),相当于对连接信息进行了多重加密,有效避免了热点的连接信息被窃取和泄密的问题。In the embodiment of the present invention, when an electronic device needs to connect to a hotspot shared by other electronic devices, only the user on the electronic device side that needs to share the hotspot uses the fingerprint used when sharing the hotspot to trigger the first input on the electronic device side , And the electronic device receives the first ciphertext in audio format sent by other electronic devices that share the hotspot, and decrypts the first ciphertext based on the fingerprint information of the first input to obtain the electronic device waiting If the connection information of the hotspot is connected, the connection information can be used to connect the hotspot to be connected. In this process, the user on the electronic device side does not need to select the hotspot to be connected from the hotspot list, nor does it need to obtain the connection information of the hotspot from the user sharing the hotspot and enter the connection information, and can quickly connect to other electronic devices. The shared hotspot reduces user participation and simplifies user operations. When connecting to the shared hotspots of other devices, the user only needs to trigger the first input, which greatly simplifies the user's operation steps; and the hotspot connection information is not required Manual acquisition, instead of collecting the first ciphertext in the audio format, and decrypting the first ciphertext based on the fingerprint corresponding to the first input to obtain the connection information of the hotspot to be connected, avoiding the inconsistency of the hotspot connection information in manual communication Circumstances, the success rate of hotspot sharing is improved, and the leakage of connection information is avoided; in addition, the connection information of the connected hotspot is not only encrypted (first encryption) based on the first input fingerprint information, but also The first ciphertext is also collected in audio format (the second encryption), which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of theft and leakage of the connection information of the hotspot.
需要说明的是,同一个电子设备可以同时具备图1实施例对应的分享热点的功能,以及图3实施例对应的连接其他设备分享的热点的功能,或者,一个电子设备具备上述两个功能中的一个功能。It should be noted that the same electronic device can have both the function of sharing hotspots corresponding to the embodiment in FIG. 1 and the function of connecting hotspots shared by other devices in the embodiment of FIG. 3, or one electronic device has the above two functions. One of the features.
参照图5,示出了本发明一个实施例的电子设备的框图。本发明实施例的电子设备能实现上述实施例中与图1和图2实施例相关的热点分享方法的细节,并达到相同的效果。图5所示电子设备为第一电子设备,该第一电子设备包括:Referring to Fig. 5, a block diagram of an electronic device according to an embodiment of the present invention is shown. The electronic device of the embodiment of the present invention can implement the details of the hotspot sharing method related to the embodiment of FIG. 1 and FIG. 2 in the above embodiment, and achieve the same effect. The electronic device shown in FIG. 5 is a first electronic device, and the first electronic device includes:
接收模块301,用于接收第一输入;The receiving module 301 is configured to receive the first input;
加密模块302,用于响应于所述第一输入,基于所述第一输入的指纹信息,对所述第一电子设备的热点的连接信息进行加密,生成第一密文;The encryption module 302 is configured to, in response to the first input, encrypt the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input to generate a first ciphertext;
输出模块303,用于将所述第一密文以音频方式输出。The output module 303 is configured to output the first ciphertext in audio mode.
可选地,所述加密模块302包括:Optionally, the encryption module 302 includes:
生成子模块,用于基于所述第一输入的指纹信息,生成第一密钥;A generating sub-module, configured to generate a first key based on the fingerprint information of the first input;
加密子模块,用于采用所述第一密钥,对所述第一电子设备的热点的连接信息进行加密,生成第一密文。The encryption submodule is configured to use the first key to encrypt the connection information of the hotspot of the first electronic device to generate a first ciphertext.
可选地,所述输出模块303,还用于将所述第一密文的文本数据转换为音频数据并输出。Optionally, the output module 303 is further configured to convert the text data of the first ciphertext into audio data and output it.
可选地,所述输出模块303包括:Optionally, the output module 303 includes:
输出子模块,用于响应于所述第一输入,将所述第一密文以音频方式持续输出预设时长。The output sub-module is configured to continuously output the first ciphertext in audio mode for a preset duration in response to the first input.
可选地,所述第一电子设备还包括:Optionally, the first electronic device further includes:
暂停模块,用于若再次接收到所述第一输入,则暂停所述第一密文以音频方式输出。The pause module is configured to pause the output of the first ciphertext in audio mode if the first input is received again.
本发明实施例提供的第一电子设备能够实现上述方法实施例中第一电子设备实现的各个过程,为避免重复,这里不再赘述。The first electronic device provided in the embodiment of the present invention can implement each process implemented by the first electronic device in the foregoing method embodiment. To avoid repetition, details are not described herein again.
第一电子设备通过上述模块,当第一电子设备分享热点时,该第一电子设备侧的用户无需将该热点的连接信息人工通知给其他需要使用该热点的用户,而是通过第一输入来直接触发热点的连接信息的分享,从而避免了热点的账号信息泄密和热点连接信息传达不一致的情况,提升了热点分享成功率;而在需要分享热点时,用户只需要触发第一输入即可,大幅简化了用户操作步骤;此外,在分享该热点的连接信息时,通过基于该第一输入的指纹信息来对该连接信息进行加密(第一重加密),并将加密后的第一密文以音频方式(第二重加密)输出,相当于对连接信息进行了多重加密,有效避免了热点的连接信息被窃取和泄密的问题。The first electronic device uses the above-mentioned module. When the first electronic device shares the hotspot, the user on the first electronic device side does not need to manually notify the connection information of the hotspot to other users who need to use the hotspot. Directly trigger the sharing of hotspot connection information, thereby avoiding the leakage of hotspot account information and inconsistent communication of hotspot connection information, and improving the success rate of hotspot sharing; when a hotspot needs to be shared, the user only needs to trigger the first input. Significantly simplifies the user's operation steps; in addition, when sharing the connection information of the hotspot, the connection information is encrypted based on the first input fingerprint information (first encryption), and the encrypted first ciphertext Outputting in audio mode (the second encryption) is equivalent to multiple encryption of the connection information, effectively avoiding the problem of theft and leakage of the connection information of the hotspot.
参照图6,示出了本发明一个实施例的电子设备的框图。本发明实施例的电子设备能实现上述实施例中与图3和图4实施例相关的热点分享方法的细节,并达到相同的效果。图6所示的电子设备为第二电子设备,该第二电子设备包括:Referring to Fig. 6, a block diagram of an electronic device according to an embodiment of the present invention is shown. The electronic device of the embodiment of the present invention can implement the details of the hotspot sharing method related to the embodiment of FIG. 3 and FIG. 4 in the above embodiment, and achieve the same effect. The electronic device shown in FIG. 6 is a second electronic device, and the second electronic device includes:
第一接收模块501,用于接收第一输入;The first receiving module 501 is configured to receive a first input;
第二接收模块502,用于接收第一电子设备输出的音频格式的第一密文;The second receiving module 502 is configured to receive the first ciphertext in the audio format output by the first electronic device;
解密模块503,用于响应于所述第一输入,基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息;The decryption module 503 is configured to decrypt the first ciphertext based on the fingerprint information of the first input in response to the first input to obtain connection information of the hotspot to be connected to the second electronic device;
连接模块504,用于采用所述连接信息,对所述待连接热点进行连接。The connection module 504 is configured to use the connection information to connect the hotspot to be connected.
可选地,所述解密模块503包括:Optionally, the decryption module 503 includes:
生成子模块,用于基于所述第一输入的指纹信息,生成第一密钥;A generating sub-module, configured to generate a first key based on the fingerprint information of the first input;
第一解密子模块,用于采用所述第一密钥,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。The first decryption submodule is used to decrypt the first ciphertext using the first key to obtain connection information of the hotspot to be connected to the second electronic device.
可选地,所述解密模块503还包括:Optionally, the decryption module 503 further includes:
转换子模块,用于将所述音频格式的第一密文,转换为文本格式的第一密文;A conversion sub-module for converting the first ciphertext of the audio format into the first ciphertext of the text format;
第二解密子模块,用于基于所述第一输入的指纹信息,对文本格式的所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。The second decryption sub-module is configured to decrypt the first ciphertext in text format based on the fingerprint information of the first input to obtain connection information of the hotspot to be connected to the second electronic device.
可选地,所述连接模块504包括:Optionally, the connection module 504 includes:
请求子模块,用于采用所述连接信息,请求对所述待连接热点进行安全认证;The request submodule is configured to use the connection information to request security authentication for the hotspot to be connected;
连接子模块,用于若通过所述安全认证,则连接所述待连接热点。The connection sub-module is configured to connect to the hotspot to be connected if the security authentication is passed.
可选地,所述第二电子设备还包括:Optionally, the second electronic device further includes:
停止连接模块,用于若所述请求的次数达到预设次数,且所述请求均未通过所述安全认证,则停止请求对所述待连接热点的安全认证。The connection stop module is configured to stop requesting the security authentication of the hotspot to be connected if the number of requests reaches a preset number and none of the requests passes the security authentication.
本发明实施例提供的第二电子设备能够实现上述方法实施例中第二电子设备实现的各个过程,为避免重复,这里不再赘述。The second electronic device provided in the embodiment of the present invention can implement each process implemented by the second electronic device in the foregoing method embodiment, and to avoid repetition, details are not described herein again.
第二电子设备通过上述模块,当第二电子设备需要连接其他电子设备分享的热点时,只需要分享该热点的电子设备侧的用户,采用分享该热点时所用的指纹来在第二电子设备侧触发第一输入,以及由第二电子设备接收其他分享该热点的电子设备发送的音频格式的第一密文,并基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息,就可以采用所述连接信息,对所述待连接热点进行连接。在这个过程中,第二电子设备侧的用户无需从热点列表中选取所需要连接的热点,也不需要从分享热点的用户侧获取热点的连接信息并输入连接信息,就可以快速的连接其他电子设备所分享的热点,降低了用户参与度,简化了用户操作,且在连接其他设备所分享热点时,用户只需要触发第一输入即可,大幅简化了用户操作步骤;而且热点的连接信息不需要人工获取,而是采集音频格式的第一密文,并基于第一输入对应的指纹对第一密文进行解密来得到待连接热点的连接信息,避免了热点连接信息在人工传达上的不一致的情况,提升了热点分享成功率,并避免了连接信息的泄密;此外,所连接的热点的连接信息不仅经过基于该第一输入的指纹信息的加密(第一重加密),而且该连接信息的第一密文还以音频格式被采集到(第二重加密),相当于对连接信息进行了多重加密,有效避免了热点的连接信息被窃取和泄密的问题。Through the above modules, when the second electronic device needs to connect to a hotspot shared by other electronic devices, only the user on the electronic device side that needs to share the hotspot uses the fingerprint used when sharing the hotspot to be on the second electronic device side. Trigger the first input, and the second electronic device receives the first ciphertext in audio format sent by other electronic devices sharing the hotspot, and decrypts the first ciphertext based on the fingerprint information of the first input, After obtaining the connection information of the hotspot to be connected to the second electronic device, the connection information can be used to connect to the hotspot to be connected. In this process, the user on the second electronic device side does not need to select the hotspot to be connected from the hotspot list, nor does it need to obtain the connection information of the hotspot from the user side sharing the hotspot and input the connection information, and can quickly connect to other electronic devices. The hotspot shared by the device reduces user participation and simplifies user operations. When connecting to the hotspot shared by other devices, the user only needs to trigger the first input, which greatly simplifies the user operation steps; and the connection information of the hotspot is not Manual acquisition is required, but the first ciphertext in the audio format is collected, and the first ciphertext is decrypted based on the fingerprint corresponding to the first input to obtain the connection information of the hotspot to be connected, which avoids the inconsistency of the hotspot connection information in manual communication In the case of, the success rate of hotspot sharing is improved, and the leakage of connection information is avoided; in addition, the connection information of the connected hotspot is not only encrypted (first encryption) based on the fingerprint information of the first input, but also the connection information The first ciphertext of is also collected in audio format (the second encryption), which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of theft and leakage of the connection information of the hotspot.
图7为实现本发明各个实施例的一种电子设备的硬件结构示意图。FIG. 7 is a schematic diagram of the hardware structure of an electronic device that implements various embodiments of the present invention.
该电子设备400包括但不限于:射频单元401、网络模块402、音频输出单元403、输入单元404、传感器405、显示单元406、用户输入单元407、接口单元408、存储器409、处理器410、以及电源411等部件。本领域技术人员可以理解,图7中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本发明实施例中,电子设备包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载终端、可穿戴设备、以及计步器等。The electronic device 400 includes but is not limited to: a radio frequency unit 401, a network module 402, an audio output unit 403, an input unit 404, a sensor 405, a display unit 406, a user input unit 407, an interface unit 408, a memory 409, a processor 410, and Power supply 411 and other components. Those skilled in the art can understand that the structure of the electronic device shown in FIG. 7 does not constitute a limitation on the electronic device. The electronic device may include more or fewer components than those shown in the figure, or a combination of certain components, or different components. Layout. In the embodiment of the present invention, electronic devices include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminals, wearable devices, and pedometers.
可选地,在一个实施例中,用户输入单元407,用于接收第一输入;Optionally, in an embodiment, the user input unit 407 is configured to receive the first input;
处理器410,用于响应于所述第一输入,基于所述第一输入的指纹信息,对所述第一电子设备的热点的连接信息进行加密,生成第一密文;The processor 410 is configured to, in response to the first input, encrypt the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input, and generate a first ciphertext;
射频单元401,用于将所述第一密文以音频方式输出。The radio frequency unit 401 is configured to output the first ciphertext in audio mode.
在本发明实施例中,当电子设备分享热点时,该电子设备侧的用户无需将该热点的连接信息人工通知给其他需要使用该热点的用户,而是通过第一输入来直接触发热点的连接信息的分享,从而避免了热点的账号信息泄密和热点连接信息传达不一致的情况,提升了热点分享成功率;而在需要分享热点时,用户只需要触发第一输入即可,大幅简化了用户操作步骤;此外,在分享该热点的连接信息时,通过基于该第一输入的指纹信息来对该连接信息进行加密(第一重加密),并将加密后的第一密文以音频方式(第二重加密)输出,相当于对连接信息进行了多重加密,有效避免了热点的连接信息被窃取和泄密的问题。In the embodiment of the present invention, when an electronic device shares a hotspot, the user on the electronic device side does not need to manually notify the connection information of the hotspot to other users who need to use the hotspot, but directly triggers the connection of the hotspot through the first input Information sharing avoids the leakage of hotspot account information and the inconsistency of hotspot connection information, and improves the success rate of hotspot sharing; when a hotspot needs to be shared, the user only needs to trigger the first input, which greatly simplifies user operations Step; In addition, when sharing the connection information of the hotspot, encrypt the connection information based on the first input fingerprint information (first re-encryption), and use the encrypted first ciphertext in audio mode (the first Double encryption) output, which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of the theft and leakage of the connection information of the hotspot.
可选地,在另一个实施例中,用户输入单元407,用于接收第一输入;Optionally, in another embodiment, the user input unit 407 is configured to receive the first input;
射频单元401,用于接收音频格式的第一密文;The radio frequency unit 401 is configured to receive the first ciphertext of the audio format;
处理器410,用基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述电子设备待连接热点的连接信息;采用所述连接信息,对所述待连接热点进行连接。The processor 410 uses the fingerprint information based on the first input to decrypt the first cipher text to obtain the connection information of the hotspot to be connected to the electronic device; connect.
当电子设备需要连接其他电子设备分享的热点时,只需要分享该热点的电子设备侧的用户,采用分享该热点时所用的指纹来在本电子设备侧触发第一输入,以及由本电子设备接收其他分享该热点的电子设备发送的音频格式的第一密文,并基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述电子设备待连接热点的连接信息,就可以采用所述连接信息,对所述待连接热点进行连接。在这个过程中,本电子设备侧的用户无需从热点列表中选取所需要连接的热点,也不需要从分享热点的用户侧获取热点的连接信息并输入连接信息,就可以快速的连接其他电子设备所分享的热点,降低了用户参与度,简化了用户操作,且在连接其他设备所分享热点时,用户只需要触发第一输入即可,大幅简化了用户操作步骤;而且热点的连接信息不需要人工获取,而是采集音频格式的第一密文,并基于第一输入对应的指纹对第一密文进行解密来得到待连接热点的连接信息,避免了热点连接信息在人工传达上的不一致的情况,提升了热点分享成功率,并避免了连接信息的泄密;此外,所连接的热点的连接信息不仅经过基于该第一输入的指纹信息的加密(第一重加密),而且该连接信息的第一密文还以音频格式被采集到(第二重加密),相当于对连接信息进行了多重加密,有效避免了热点的连接信息被窃取和泄密的问题。When an electronic device needs to connect to a hotspot shared by other electronic devices, only the user on the electronic device side that needs to share the hotspot uses the fingerprint used when sharing the hotspot to trigger the first input on the electronic device side, and the electronic device receives other Share the first ciphertext in the audio format sent by the electronic device of the hotspot, and decrypt the first ciphertext based on the fingerprint information of the first input to obtain the connection information of the hotspot to be connected to the electronic device, then The connection information may be used to connect the hotspot to be connected. In this process, the user on the electronic device side does not need to select the hotspot to be connected from the hotspot list, nor does it need to obtain the connection information of the hotspot from the user sharing the hotspot and enter the connection information, and can quickly connect to other electronic devices. The shared hotspot reduces user participation and simplifies user operations. When connecting to the shared hotspots of other devices, the user only needs to trigger the first input, which greatly simplifies the user's operation steps; and the hotspot connection information is not required Manual acquisition, instead of collecting the first ciphertext in the audio format, and decrypting the first ciphertext based on the fingerprint corresponding to the first input to obtain the connection information of the hotspot to be connected, avoiding the inconsistency of the hotspot connection information in manual communication Circumstances, the success rate of hotspot sharing is improved, and the leakage of connection information is avoided; in addition, the connection information of the connected hotspot is not only encrypted (first encryption) based on the first input fingerprint information, but also The first ciphertext is also collected in audio format (the second encryption), which is equivalent to multiple encryption of the connection information, which effectively avoids the problem of theft and leakage of the connection information of the hotspot.
应理解的是,本发明实施例中,射频单元401可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处理器410处理;另外,将上行的数据发送给基站。通常,射频单元401包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元401还可以通过无线通信系统与网络和其他设备通信。It should be understood that, in the embodiment of the present invention, the radio frequency unit 401 can be used to receive and send signals during information transmission or communication. Specifically, the downlink data from the base station is received and processed by the processor 410; in addition, Uplink data is sent to the base station. Generally, the radio frequency unit 401 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 401 can also communicate with the network and other devices through a wireless communication system.
电子设备通过网络模块402为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。The electronic device provides users with wireless broadband Internet access through the network module 402, such as helping users to send and receive emails, browse web pages, and access streaming media.
音频输出单元403可以将射频单元401或网络模块402接收的或者在存储器409中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元403还可以提供与电子设备400执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元403包括扬声器、蜂鸣器以及受话器等。The audio output unit 403 may convert the audio data received by the radio frequency unit 401 or the network module 402 or stored in the memory 409 into an audio signal and output it as sound. Moreover, the audio output unit 403 may also provide audio output related to a specific function performed by the electronic device 400 (for example, call signal reception sound, message reception sound, etc.). The audio output unit 403 includes a speaker, a buzzer, a receiver, and the like.
输入单元404用于接收音频或视频信号。输入单元404可以包括图形处理器(Graphics Processing Unit,GPU)4041和麦克风4042,图形处理器4041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元406上。经图形处理器4041处理后的图像帧可以存储在存储器409(或其它存储介质)中或者经由射频单元401或网络模块402进行发送。麦克风4042可以接收声音,并且能够将这样的声音处理为音频数据。处理后的音频数据可以在电话通话模式的情况下转换为可经由射频单元401发送到移动通信基站的格式输出。The input unit 404 is used to receive audio or video signals. The input unit 404 may include a graphics processing unit (GPU) 4041 and a microphone 4042. The graphics processor 4041 is configured to monitor images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed. The processed image frame can be displayed on the display unit 406. The image frame processed by the graphics processor 4041 may be stored in the memory 409 (or other storage medium) or sent via the radio frequency unit 401 or the network module 402. The microphone 4042 can receive sound, and can process such sound into audio data. The processed audio data can be converted into a format that can be sent to a mobile communication base station via the radio frequency unit 401 in the case of a telephone call mode for output.
电子设备400还包括至少一种传感器405,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板4061的亮度,接近传感器可在电子设备400移动到耳边时,关闭显示面板4061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上 (一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别电子设备姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器405还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。The electronic device 400 also includes at least one sensor 405, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor. The ambient light sensor can adjust the brightness of the display panel 4061 according to the brightness of the ambient light. The proximity sensor can close the display panel 4061 and the display panel 4061 when the electronic device 400 is moved to the ear. / Or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of electronic devices (such as horizontal and vertical screen switching, related games) , Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, percussion), etc.; sensor 405 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
显示单元406用于显示由用户输入的信息或提供给用户的信息。显示单元406可包括显示面板4061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板4061。The display unit 406 is used to display information input by the user or information provided to the user. The display unit 406 may include a display panel 4061, and the display panel 4061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
用户输入单元407可用于接收输入的数字或字符信息,以及产生与电子设备的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元407包括触控面板4071以及其他输入设备4072。触控面板4071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板4071上或在触控面板4071附近的操作)。触控面板4071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器410,接收处理器410发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板4071。除了触控面板4071,用户输入单元407还可以包括其他输入设备4072。具体地,其他输入设备4072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。The user input unit 407 may be used to receive inputted numeric or character information, and generate key signal input related to user settings and function control of the electronic device. Specifically, the user input unit 407 includes a touch panel 4071 and other input devices 4072. The touch panel 4071, also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 4071 or near the touch panel 4071. operate). The touch panel 4071 may include two parts: a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch position, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 410, the command sent by the processor 410 is received and executed. In addition, the touch panel 4071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 4071, the user input unit 407 may also include other input devices 4072. Specifically, other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
进一步的,触控面板4071可覆盖在显示面板4061上,当触控面板4071检测到在其上或附近的触摸操作后,传送给处理器410以确定触摸事件的类型,随后处理器410根据触摸事件的类型在显示面板4061上提供相应的视觉输出。虽然在图7中,触控面板4071与显示面板4061是作为两个独立的部件来实现电子设备的输入和输出功能,但是在某些实施例中,可以将触控面板4071与显示面板4061集成而实现电子设备的输入和输出功能,具体此处不做限定。Further, the touch panel 4071 can cover the display panel 4061. When the touch panel 4071 detects a touch operation on or near it, it transmits it to the processor 410 to determine the type of touch event, and then the processor 410 determines the type of touch event according to the touch The type of event provides corresponding visual output on the display panel 4061. Although in FIG. 7, the touch panel 4071 and the display panel 4061 are used as two independent components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 4071 and the display panel 4061 can be integrated The implementation of the input and output functions of the electronic device is not specifically limited here.
接口单元408为外部装置与电子设备400连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元408可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到电子设备400内的一个或多个元件或者可以用于在电子设备400和外部装置之间传输数据。The interface unit 408 is an interface for connecting an external device and the electronic device 400. For example, the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc. The interface unit 408 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the electronic device 400 or can be used to connect the electronic device 400 to an external device. Transfer data between devices.
存储器409可用于存储软件程序以及各种数据。存储器409可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器409可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 409 can be used to store software programs and various data. The memory 409 may mainly include a storage program area and a storage data area. The storage program area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data created by the use of mobile phones (such as audio data, phone book, etc.), etc. In addition, the memory 409 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
处理器410是电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或执行存储在存储器409内的软件程序和/或模块,以及调用存储在存储器409内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。处理器410可包括一个或多个处理单元;优选的,处理器410可集成应用处理器和调制解调 处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器410中。The processor 410 is the control center of the electronic device. It uses various interfaces and lines to connect the various parts of the entire electronic device, runs or executes the software programs and/or modules stored in the memory 409, and calls the data stored in the memory 409 , Perform various functions of electronic equipment and process data, so as to monitor the electronic equipment as a whole. The processor 410 may include one or more processing units; preferably, the processor 410 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, application programs, etc., and the modem The processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 410.
电子设备400还可以包括给各个部件供电的电源411(比如电池),优选的,电源411可以通过电源管理系统与处理器410逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The electronic device 400 may also include a power source 411 (such as a battery) for supplying power to various components. Preferably, the power source 411 may be logically connected to the processor 410 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system. And other functions.
另外,电子设备400包括一些未示出的功能模块,在此不再赘述。In addition, the electronic device 400 includes some functional modules not shown, which will not be repeated here.
优选的,本发明实施例还提供一种电子设备,包括处理器410,存储器409,存储在存储器409上并可在所述处理器410上运行的计算机程序,该计算机程序被处理器410执行时实现上述热点分享方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Preferably, the embodiment of the present invention also provides an electronic device, including a processor 410, a memory 409, and a computer program stored on the memory 409 and running on the processor 410. When the computer program is executed by the processor 410, Each process of the above-mentioned hotspot sharing method embodiment can be realized, and the same technical effect can be achieved. In order to avoid repetition, details are not repeated here.
本发明实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述热点分享方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等。The embodiment of the present invention also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, each process of the above hotspot sharing method embodiment is realized, and the same technology can be achieved. The effect, in order to avoid repetition, will not be repeated here. Wherein, the computer-readable storage medium, such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, etc.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that in this article, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements not only includes those elements, It also includes other elements that are not explicitly listed, or elements inherent to the process, method, article, or device. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, article, or device that includes the element.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above implementation manners, those skilled in the art can clearly understand that the above-mentioned embodiment method can be implemented by means of software plus the necessary general hardware platform, of course, it can also be implemented by hardware, but in many cases the former is better.的实施方式。 Based on this understanding, the technical solution of the present invention essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes a number of instructions to enable a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the method described in each embodiment of the present invention.
上面结合附图对本发明的实施例进行了描述,但是本发明并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本发明的启示下,在不脱离本发明宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本发明的保护之内。The embodiments of the present invention are described above with reference to the accompanying drawings, but the present invention is not limited to the above-mentioned specific embodiments. The above-mentioned specific embodiments are only illustrative and not restrictive. Those of ordinary skill in the art are Under the enlightenment of the present invention, many forms can be made without departing from the purpose of the present invention and the scope of protection of the claims, and they all fall within the protection of the present invention.

Claims (20)

  1. 一种热点分享方法,应用于第一电子设备,所述方法包括:A hotspot sharing method applied to a first electronic device, and the method includes:
    接收第一输入;Receive the first input;
    响应于所述第一输入,基于所述第一输入的指纹信息,对所述第一电子设备的热点的连接信息进行加密,生成第一密文;In response to the first input, encrypting the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input to generate a first ciphertext;
    将所述第一密文以音频方式输出。The first ciphertext is output in audio mode.
  2. 根据权利要求1所述的方法,其中,所述基于所述第一输入的指纹信息,对所述第一电子设备的热点的连接信息进行加密,生成第一密文,包括:The method according to claim 1, wherein the encrypting the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input to generate the first ciphertext comprises:
    基于所述第一输入的指纹信息,生成第一密钥;Generating a first key based on the first input fingerprint information;
    采用所述第一密钥,对所述第一电子设备的热点的连接信息进行加密,生成第一密文。The first key is used to encrypt the connection information of the hotspot of the first electronic device to generate a first ciphertext.
  3. 根据权利要求1所述的方法,其中,所述将所述第一密文以音频方式输出,包括:The method according to claim 1, wherein said outputting said first ciphertext in audio mode comprises:
    将所述第一密文的文本数据转换为音频数据并输出。The text data of the first ciphertext is converted into audio data and output.
  4. 根据权利要求1所述的方法,其中,所述将所述第一密文以音频方式输出,包括:The method according to claim 1, wherein said outputting said first ciphertext in audio mode comprises:
    将所述第一密文以音频方式持续输出预设时长。The first ciphertext is continuously output in an audio manner for a preset period of time.
  5. 一种热点分享方法,应用于第二电子设备,所述方法包括:A hotspot sharing method applied to a second electronic device, the method including:
    接收第一输入;Receive the first input;
    接收第一电子设备输出的音频格式的第一密文;Receiving the first ciphertext in the audio format output by the first electronic device;
    响应所述第一输入,基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息;In response to the first input, decrypt the first ciphertext based on the fingerprint information of the first input to obtain connection information of the hotspot to be connected to the second electronic device;
    采用所述连接信息,对所述待连接热点进行连接。The connection information is used to connect the hotspot to be connected.
  6. 根据权利要求5所述的方法,其中,所述基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息,包括:The method according to claim 5, wherein the decrypting the first ciphertext based on the fingerprint information of the first input to obtain the connection information of the hotspot to be connected to the second electronic device comprises:
    基于所述第一输入的指纹信息,生成第一密钥;Generating a first key based on the first input fingerprint information;
    采用所述第一密钥,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。Using the first key to decrypt the first ciphertext, the connection information of the hotspot to be connected to the second electronic device is obtained.
  7. 根据权利要求5或6所述的方法,其中,所述基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息,还包括:The method according to claim 5 or 6, wherein the first ciphertext is decrypted based on the fingerprint information of the first input to obtain the connection information of the hotspot to be connected to the second electronic device, and include:
    将所述音频格式的第一密文,转换为文本格式的第一密文;Converting the first ciphertext in the audio format into the first ciphertext in the text format;
    基于所述第一输入的指纹信息,对文本格式的所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。Based on the first input fingerprint information, decrypt the first ciphertext in text format to obtain connection information of the hotspot to be connected to the second electronic device.
  8. 根据权利要求5所述的方法,其中,所述采用所述连接信息,对所述待连接热点进行连接,包括:The method according to claim 5, wherein said using said connection information to connect said hotspot to be connected comprises:
    采用所述连接信息,请求对所述待连接热点进行安全认证;Using the connection information to request security authentication for the hotspot to be connected;
    若通过所述安全认证,则连接所述待连接热点。If the security authentication is passed, then the hotspot to be connected is connected.
  9. 一种电子设备,所述电子设备为第一电子设备,所述第一电子设备包括:An electronic device, the electronic device is a first electronic device, and the first electronic device includes:
    接收模块,用于接收第一输入;A receiving module for receiving the first input;
    加密模块,用于响应于所述第一输入,基于所述第一输入的指纹信息,对所述第一电子设备的热点的连接信息进行加密,生成第一密文;An encryption module, configured to, in response to the first input, encrypt the connection information of the hotspot of the first electronic device based on the fingerprint information of the first input to generate a first ciphertext;
    输出模块,用于将所述第一密文以音频方式输出。The output module is used to output the first ciphertext in audio mode.
  10. 根据权利要求9所述的电子设备,其中,所述加密模块包括:The electronic device according to claim 9, wherein the encryption module comprises:
    生成子模块,用于基于所述第一输入的指纹信息,生成第一密钥;A generating sub-module, configured to generate a first key based on the fingerprint information of the first input;
    加密子模块,用于采用所述第一密钥,对所述第一电子设备的热点的连接信息进行加密,生成第一密文。The encryption submodule is configured to use the first key to encrypt the connection information of the hotspot of the first electronic device to generate a first ciphertext.
  11. 根据权利要求9所述的电子设备,其中,所述输出模块,还用于将所述第一密文的文本数据转换为音频数据并输出。9. The electronic device according to claim 9, wherein the output module is further configured to convert the text data of the first ciphertext into audio data and output it.
  12. 根据权利要求9所述的电子设备,其中,所述输出模块包括:The electronic device according to claim 9, wherein the output module comprises:
    输出子模块,用于响应于所述第一输入,将所述第一密文以音频方式持续输出预设时长。The output sub-module is configured to continuously output the first ciphertext in audio mode for a preset duration in response to the first input.
  13. 一种电子设备,所述电子设备为第二电子设备,所述第二电子设备包括:An electronic device, the electronic device is a second electronic device, and the second electronic device includes:
    第一接收模块,用于接收第一输入;The first receiving module is configured to receive the first input;
    第二接收模块,用于接收第一电子设备输出的音频格式的第一密文;The second receiving module is configured to receive the first ciphertext in the audio format output by the first electronic device;
    解密模块,用于响应所述第一输入,基于所述第一输入的指纹信息,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息;A decryption module, configured to decrypt the first ciphertext based on the fingerprint information of the first input in response to the first input to obtain connection information of the hotspot to be connected to the second electronic device;
    连接模块,用于采用所述连接信息,对所述待连接热点进行连接。The connection module is configured to use the connection information to connect to the hotspot to be connected.
  14. 根据权利要求13所述的电子设备,其中,所述解密模块包括:The electronic device according to claim 13, wherein the decryption module comprises:
    生成子模块,用于基于所述第一输入的指纹信息,生成第一密钥;A generating sub-module, configured to generate a first key based on the fingerprint information of the first input;
    第一解密子模块,用于采用所述第一密钥,对所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。The first decryption submodule is used to decrypt the first ciphertext using the first key to obtain connection information of the hotspot to be connected to the second electronic device.
  15. 根据权利要求13或14所述的电子设备,其中,所述解密模块还包括:The electronic device according to claim 13 or 14, wherein the decryption module further comprises:
    转换子模块,用于将所述音频格式的第一密文,转换为文本格式的第一密文;A conversion sub-module for converting the first ciphertext of the audio format into the first ciphertext of the text format;
    第二解密子模块,用于基于所述第一输入的指纹信息,对文本格式的所述第一密文进行解密,得到所述第二电子设备待连接热点的连接信息。The second decryption sub-module is configured to decrypt the first ciphertext in text format based on the fingerprint information of the first input to obtain connection information of the hotspot to be connected to the second electronic device.
  16. 根据权利要求13所述的电子设备,其中,所述连接模块包括:The electronic device according to claim 13, wherein the connection module comprises:
    请求子模块,用于采用所述连接信息,请求对所述待连接热点进行安全认证;The request submodule is configured to use the connection information to request security authentication for the hotspot to be connected;
    连接子模块,用于若通过所述安全认证,则连接所述待连接热点。The connection sub-module is configured to connect to the hotspot to be connected if the security authentication is passed.
  17. 一种电子设备,所述电子设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求1至4中任一项、或5至8中任一项所述的热点分享方法的步骤。An electronic device, the electronic device comprising: a memory, a processor, and a computer program stored on the memory and capable of running on the processor, and the computer program is executed by the processor as claimed in the claims Steps of the hotspot sharing method described in any one of 1 to 4, or any one of 5 to 8.
  18. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至4中任一项、或5至8中任一项所述的热点分享方法的步骤。A computer-readable storage medium having a computer program stored on the computer-readable storage medium, and when the computer program is executed by a processor, implements any one of claims 1 to 4 or any one of 5 to 8 The steps of the hotspot sharing method.
  19. 一种计算机程序产品,所述计算机程序产品存储在存储介质中,所述计算机程序产品被处理器执行时实现如权利要求1至4中任一项、或5至8中任一项所述的热点分享方法的步骤。A computer program product, the computer program product is stored in a storage medium, and when the computer program product is executed by a processor, the computer program product implements any one of claims 1 to 4 or any one of claims 5 to 8 Steps of the hotspot sharing method.
  20. 一种电子设备,其中,所述电子设备用于执行如权利要求1至4中任一项、 或5至8中任一项所述的热点分享方法中的步骤。An electronic device, wherein the electronic device is used to execute the steps in the hotspot sharing method according to any one of claims 1 to 4, or any one of claims 5 to 8.
PCT/CN2021/083386 2020-03-30 2021-03-26 Hotspot sharing method and electronic device WO2021197235A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010239130.6A CN111465005A (en) 2020-03-30 2020-03-30 Hotspot sharing method and electronic equipment
CN202010239130.6 2020-03-30

Publications (1)

Publication Number Publication Date
WO2021197235A1 true WO2021197235A1 (en) 2021-10-07

Family

ID=71680111

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/083386 WO2021197235A1 (en) 2020-03-30 2021-03-26 Hotspot sharing method and electronic device

Country Status (2)

Country Link
CN (1) CN111465005A (en)
WO (1) WO2021197235A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111465005A (en) * 2020-03-30 2020-07-28 维沃移动通信有限公司 Hotspot sharing method and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014105114A1 (en) * 2012-12-27 2014-07-03 Intel Corporation Secure on-line signup and provisioning of wireless devices
CN104853405A (en) * 2015-05-12 2015-08-19 浙江生辉照明有限公司 Intelligent networking method and intelligent device
CN106412907A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Network access methods and system, and related devices
CN107509195A (en) * 2017-08-17 2017-12-22 珠海市魅族科技有限公司 Data transmission method and device, terminal and readable storage medium storing program for executing
CN108243481A (en) * 2018-01-19 2018-07-03 腾讯科技(深圳)有限公司 Document transmission method and device
CN109145552A (en) * 2018-07-09 2019-01-04 维沃移动通信有限公司 Information ciphering method and terminal device
CN111465005A (en) * 2020-03-30 2020-07-28 维沃移动通信有限公司 Hotspot sharing method and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699847A (en) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 Fingerprint encryption method and device, and encrypted shooting method and device
CN106714162A (en) * 2016-11-29 2017-05-24 维沃移动通信有限公司 Hotspot sharing method and mobile terminals
CN108966313A (en) * 2018-05-24 2018-12-07 奇酷互联网络科技(深圳)有限公司 Sharing files method, apparatus, readable storage medium storing program for executing and mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014105114A1 (en) * 2012-12-27 2014-07-03 Intel Corporation Secure on-line signup and provisioning of wireless devices
CN104853405A (en) * 2015-05-12 2015-08-19 浙江生辉照明有限公司 Intelligent networking method and intelligent device
CN106412907A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Network access methods and system, and related devices
CN107509195A (en) * 2017-08-17 2017-12-22 珠海市魅族科技有限公司 Data transmission method and device, terminal and readable storage medium storing program for executing
CN108243481A (en) * 2018-01-19 2018-07-03 腾讯科技(深圳)有限公司 Document transmission method and device
CN109145552A (en) * 2018-07-09 2019-01-04 维沃移动通信有限公司 Information ciphering method and terminal device
CN111465005A (en) * 2020-03-30 2020-07-28 维沃移动通信有限公司 Hotspot sharing method and electronic equipment

Also Published As

Publication number Publication date
CN111465005A (en) 2020-07-28

Similar Documents

Publication Publication Date Title
CN109257740B (en) Profile downloading method, mobile terminal and readable storage medium
EP3605989A1 (en) Information sending method, information receiving method, apparatus, and system
WO2020164526A1 (en) Control method for nodes in distributed system and related device
CN107147656B (en) Method and system for establishing remote control and readable storage medium
CN109257336B (en) Block chain-based password information processing method and terminal equipment
WO2021129529A1 (en) Device switching method and related device
CN108449114B (en) Bluetooth connection method and mobile terminal
CN109157841B (en) Game team forming method, terminal, server and computer readable storage medium
WO2020233218A1 (en) Information encryption method, information decryption method, and terminal
CN110677851B (en) Terminal network access method and network access equipment access method
CN108616878B (en) Encryption and decryption method, equipment and computer storage medium
CN107317680B (en) Method and system for marking safety account and computer readable storage medium
CN107563158B (en) Method, device and computer readable storage medium for displaying hidden application icon
CN109376519B (en) Fingerprint unlocking method and terminal equipment
CN108601062B (en) WiFi connection sharing method, terminal and computer storage medium
WO2021190373A1 (en) Interaction method, interaction system, and display device
US20160242107A1 (en) Apparatus and method for accessing electronic device having hot spot function
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN107786739B (en) Information acquisition method and mobile terminal
CN107358083B (en) Information processing method, terminal and computer readable storage medium
WO2020156440A1 (en) Application control method and terminal device
CN106303085B (en) Mobile terminal and method and device for secure call
CN110830262A (en) Authorization management method and electronic equipment
WO2021083108A1 (en) File compression method, file decompression method, and electronic device
WO2021197235A1 (en) Hotspot sharing method and electronic device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21782029

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21782029

Country of ref document: EP

Kind code of ref document: A1