WO2019128179A1 - Method and apparatus for data transmission between mobile terminals, and mobile terminal - Google Patents
Method and apparatus for data transmission between mobile terminals, and mobile terminal Download PDFInfo
- Publication number
- WO2019128179A1 WO2019128179A1 PCT/CN2018/094120 CN2018094120W WO2019128179A1 WO 2019128179 A1 WO2019128179 A1 WO 2019128179A1 CN 2018094120 W CN2018094120 W CN 2018094120W WO 2019128179 A1 WO2019128179 A1 WO 2019128179A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- identifier
- data transmission
- receiving
- transmission channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Definitions
- the present invention relates to the field of Internet application technologies, and in particular, to a method, an apparatus, and a mobile terminal for data transmission between mobile terminals.
- mobile terminals such as smart phones, tablets, etc.
- smartphones are becoming more and more frequent.
- One user may have multiple terminal devices. After replacing a new mobile phone, users will consider how to synchronize the data in the old mobile phone to the new mobile phone.
- the first is to copy the data of the old mobile phone to the memory card, then install the memory card in the new mobile phone, and restore the data to the new mobile phone.
- the second is to connect the old mobile phone to the network, log in to the cloud server with an account, upload the data from the old mobile phone to the cloud server, and then log in to the cloud server with the new mobile phone to download the data to the new mobile phone.
- the mobile phone with the built-in memory card is not universal; in the second mode, the connection to the network is required, the operation process is cumbersome, and the security is not high. Therefore, how to efficiently and securely implement data transmission between mobile terminals has become an urgent technical problem to be solved.
- an object of the embodiments of the present invention is to provide a method, an apparatus, and a mobile terminal for data transmission between mobile terminals that can overcome the above problems or at least partially solve the above problems.
- a method for data transmission between mobile terminals is provided, which is applied to a data transmitting end, and includes:
- a graphic identifier containing the encrypted information is generated and displayed to be provided for scanning and identification by an identifier in a specific system of the data receiving end;
- a method for data transmission between mobile terminals is provided, which is applied to a data receiving end, and includes:
- a connection request for establishing a link is initiated to the data sending end, and when receiving the response message returned by the data sending end, establishing a data transmission channel with the data sending end;
- an apparatus for data transmission between mobile terminals which is applied to a data transmitting end, and includes:
- a system loading module adapted to enter a particular system from a current system
- a graphic identifier generating module configured to generate and display a graphic identifier including the encrypted information when the transmission request of the transmission data is received in a specific system, to provide an identifier for the specific system in the data receiving end to scan and identify;
- a first data transmission channel establishing module configured to respond to the connection request and the data receiving end when receiving the connection request initiated by the data receiving end after receiving the graphic identifier by the identifier Establish a data transmission channel
- a data transmission module configured to transmit the target data to the data receiving end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
- an apparatus for data transmission between mobile terminals which is applied to a data receiving end, and includes:
- a graphic identifier identifying module adapted to call up an identifier for identifying a graphic identifier in a specific system, and use the identifier to scan and identify a graphic identifier containing the encrypted information on the data transmitting end;
- a determining module configured to determine whether the identifier can identify a graphic identifier that includes the encrypted information on the data sending end;
- a second data transmission channel establishing module configured to: if the determining module determines that the identifier can identify the graphic identifier including the encrypted information on the data sending end, initiate a connection request to establish a link to the data sending end And, when receiving the response message returned by the data sending end, establishing a data transmission channel with the data sending end;
- the data receiving module is adapted to receive the target data transmitted by the data transmitting end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
- a mobile terminal comprising a processor and a memory, wherein the memory is configured to store a program for performing the method of data transmission between the mobile terminals described above;
- the processor is configured to execute a program stored in the memory.
- a computer storage medium storing computer program code for causing the mobile terminal to perform the above-described movement when the computer program code is run on a mobile terminal A method of data transmission between terminals.
- a graphic identifier including the encrypted information is generated and displayed to be provided to the specific system of the data receiving end.
- the identifier is scanned and identified; the data transmitting end establishes a data transmission channel with the data receiving end in response to the connection request when receiving the connection request initiated by the data receiving end after receiving the graphic identifier by the identifier;
- the data transmitting end uses the dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier, and transmits the target data to the data receiving end.
- the embodiment of the present invention can establish a dedicated data transmission channel on the basis of a specific system, and utilize the dedicated data transmission channel to efficiently and securely implement data transmission between the mobile terminal (ie, the data transmitting end and the data receiving end). Moreover, after the data sending end enters the specific system, the embodiment of the present invention generates and displays a graphic identifier including the encrypted information when the transmission request of the transmission data is received, and recognizes the graphic in the identifier of the specific system at the data receiving end. After the identifier, the data transmission channel can be established, which further improves the security of data transmission.
- FIG. 1 is a flow chart showing a method of data transmission between mobile terminals applied to a data transmitting end according to an embodiment of the present invention
- FIG. 2 is a flow chart showing a method of data transmission between mobile terminals applied to a data receiving end according to an embodiment of the present invention
- FIG. 3 is a flow chart showing a method for data transmission between mobile terminals applied to a data transmitting end and a data receiving end according to an embodiment of the present invention
- FIG. 4 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data transmitting end according to an embodiment of the present invention
- FIG. 5 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data transmitting end according to another embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data receiving end according to an embodiment of the present invention
- FIG. 7 is a block diagram showing the structure of an apparatus for data transmission between mobile terminals applied to a data receiving end according to another embodiment of the present invention.
- FIG. 8 is a block diagram showing a partial structure of a smartphone related to a mobile terminal provided by an embodiment of the present invention.
- data synchronization transmission between mobile terminals is implemented, mainly by using a memory card or using an account to log in to the cloud server.
- a memory card Taking a mobile phone as an example, the method of using a memory card is not common to a mobile phone with a built-in memory card; the method of logging in to the cloud server by using an account needs to be connected to the network, and the operation process is cumbersome and the security is not high.
- an embodiment of the present invention provides a method for data transmission between mobile terminals, which can establish a dedicated data transmission channel on a basis of a specific system (such as a private system, etc.), and utilize the dedicated data transmission channel to be efficient and secure. Realize data transmission between the data transmitting end and the data receiving end.
- FIG. 1 is a flow chart showing a method of data transmission between mobile terminals applied to a data transmitting end according to an embodiment of the present invention. As shown in FIG. 1, the method may include the following steps S102 to S106.
- Step S102 When a current system enters a specific system and receives a transmission request for transmitting data in a specific system, a graphic identifier including the encrypted information is generated and displayed to provide an identifier to the identifier in the specific system of the data receiving end for scanning and Identification.
- Step S104 when receiving the connection request initiated by the data receiving end and establishing the link after the identifier is recognized by the identifier, in response to the connection request, establishing a data transmission channel with the data receiving end.
- Step S106 The target data is transmitted to the data receiving end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
- a graphic identifier including the encrypted information is generated and displayed to be provided to the specific system of the data receiving end.
- the identifier is scanned and identified; the data transmitting end establishes a data transmission channel with the data receiving end in response to the connection request when receiving the connection request initiated by the data receiving end after receiving the graphic identifier by the identifier;
- the data transmitting end uses the dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier, and transmits the target data to the data receiving end.
- the embodiment of the present invention can establish a dedicated data transmission channel on the basis of a specific system, and utilize the dedicated data transmission channel to efficiently and securely implement data transmission between the mobile terminal (ie, the data transmitting end and the data receiving end). Moreover, after the data sending end enters the specific system, the embodiment of the present invention generates and displays a graphic identifier including the encrypted information when the transmission request of the transmission data is received, and recognizes the graphic in the identifier of the specific system at the data receiving end. After the identifier, the data transmission channel can be established, which further improves the security of data transmission.
- the current system mentioned in the above step S102 may be a desktop system when the mobile terminal is powered on, such as an Android desktop system or a Symbian desktop system.
- the mobile terminal enters a specific system from the current system.
- the specific system here is also called a private system.
- the user can freely put the application, image and document data of the mobile terminal into the private system according to the requirements, and all the applications in the private system. Programs and documentation can't be seen externally, and there are no other portals. It really means "no privacy.”
- the user can also establish a visitor channel as needed, and additionally set up a "private space" that can be seen by the visitor, and the real private file still exists in the private system, effectively preventing user privacy without affecting the user's operating experience. Give way.
- the graphic identifier mentioned in the above step S102 may be a bar code, or may be a two-dimensional code or a 2-dimensional bar code, which is not limited in the embodiment of the present invention.
- a bar code which is a plurality of black bars and spaces of different widths, arranged according to a certain coding rule to express a set of information.
- a common bar code is a black bar (abbreviated as a bar) and a white bar having a large difference in reflectance ( Referred to as empty) parallel lines pattern.
- a two-dimensional code which is a black and white graphic data symbol information distributed in a plane (two-dimensional direction) by a certain geometric pattern, and skillfully uses the "0" that constitutes the internal logic of the computer.
- the concept of "1" bit stream uses several geometric shapes corresponding to binary to represent literal numerical information, and is automatically read by an image input device or an optical scanning device to realize automatic processing of information. It has some commonalities of bar code technology, that is, each code system has its own specific character set, each character occupies a certain width, has a certain check function, etc., and also has the function of automatically recognizing information of different lines. And the ability to handle the point of rotation of the graphic rotation.
- the transmission request of the transmission data is received in the specific system, and the embodiment of the present invention provides an optional solution, in which the specified application can be started in the specific system, and the transmission request of the transmission data is initiated, thereby A transmission request for transmitting data is received in a specific system. Further, when receiving the transmission request of the transmission data in the specific system, the embodiment of the present invention may further acquire the data to be transmitted, and package the data to be transmitted, and use the packaged data as the target data.
- the user triggers the specified application in a specific system (such as clicking an icon of the specified application, etc.), at this time, the specified application is started in the specific system, and the transmission request of the transmission data is initiated.
- the user can find and select the data to be transmitted, so that the data sending end can acquire the data to be transmitted, and package the data to be transmitted, and use the packaged data as the target data.
- the target data may be encrypted by using a preset encryption and decryption algorithm to obtain the encrypted data. And then using the dedicated data transmission channel to transmit the encrypted data to the data receiving end.
- the preset encryption and decryption algorithm here may be pre-stored in a specified folder of the specified application, or may be carried by the generated graphic identifier.
- FIG. 2 is a flow chart showing a method of data transmission between mobile terminals applied to a data receiving end according to an embodiment of the present invention. As shown in FIG. 2, the method may include the following steps S202 to S208.
- Step S202 the identifier for identifying the graphic identifier is called up in the specific system, and the identifier of the graphic information containing the encrypted information on the data transmitting end is scanned and identified by the identifier.
- Step S204 determining whether the identifier can identify the graphic identifier containing the encrypted information on the data transmitting end, and if yes, proceeding to step S206.
- Step S206 initiating a connection request for establishing a link to the data sending end, and then, when receiving the response message returned by the data sending end, establishing a data transmission channel with the data transmitting end.
- Step S208 receiving the target data transmitted by the data transmitting end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
- the specific system mentioned in the above step S202 is the same as the specific system mentioned in the step S102, and the system technical architecture, the writing language, the function and the like are the same, and can be run on different mobile terminal devices, and can also be called It is a private system. Users can freely put applications, image documents and the like inside the mobile terminal into the private system according to their needs, and all the applications and documents in the private system cannot be seen externally, and there are no other entrances. It has achieved "no privacy”. At the same time, the user can also establish a visitor channel as needed, and additionally set up a "private space" that can be seen by the visitor, and the real private file still exists in the private system, effectively preventing user privacy without affecting the user's operating experience. Give way.
- step S204 it is determined whether the identifier can identify the graphic identifier including the encrypted information on the data transmitting end.
- the embodiment of the present invention provides an optional solution, that is, the identifier of the acquiring identifier is included on the transmitting end of the data.
- the recognition result of the graphic identifier of the information determines whether the recognition result satisfies the specified identity authentication condition; if the recognition result satisfies the specified identity authentication condition, it is determined that the identifier can identify the graphic identifier including the encrypted information on the data transmitting end; if the recognition result If the specified identity authentication condition is not satisfied, it is determined that the recognizer cannot identify the graphic identifier containing the encrypted information on the data transmitting end.
- the recognition result When it is specifically determined whether the recognition result satisfies the specified identity authentication condition, the recognition result may be matched with the specified identity authentication condition. If the match is satisfied, the recognition result satisfies the specified identity authentication condition; if not, the judgment result is not satisfied.
- Identity authentication conditions If the match is satisfied, the recognition result satisfies the specified identity authentication condition; if not, the judgment result is not satisfied.
- step S204 when it is determined in step S204 that the identifier is unable to identify the graphic identifier containing the encrypted information on the data transmitting end, the prompt information is generated to guide the user to re-enter the data receiving end into the specific system and re-scan and recognize.
- the target data after receiving the target data transmitted by the data transmitting end in step S208, the target data may also be parsed, and the parsed data may be saved in a specific system.
- the data sending end encrypts the target data by using a preset encryption and decryption algorithm, obtains the encrypted data, and transmits the encrypted data to the data receiving end by using a dedicated data transmission channel, then the data The receiving end receives the encrypted data transmitted by the data transmitting end.
- the data receiving end may further decrypt the encrypted data according to a preset encryption and decryption algorithm carried in the graphic identifier, and save the decrypted data in a specific system.
- FIG. 3 is a flow chart showing a method of data transmission between mobile terminals applied to a data transmitting end and a data receiving end according to an embodiment of the present invention. As shown in FIG. 3, the method may include the following steps S302 to S314.
- Step S302 the data sending end enters the specific system from the current system, and when receiving the transmission request of the transmission data in the specific system, generates and displays a graphic identifier containing the encrypted information to provide the identifier in the specific system of the data receiving end. Scan and identify.
- the current system may be a desktop system when the mobile terminal is powered on, such as an Android desktop system or a Symbian desktop system.
- the mobile terminal enters a specific system from the current system.
- the specific system here is also called a private system.
- the user can freely put the application, image and document data of the mobile terminal into the private system according to the requirements, and all the applications in the private system. Programs and documentation can't be seen externally, and there are no other portals. It really means "no privacy.”
- the graphic identifier generated by the data sending end may be a barcode, or may be a two-dimensional code or a two-dimensional barcode.
- the data transmitting end may also acquire the data to be transmitted, and package the data to be transmitted, and use the packaged data as the target data.
- Step S304 the data receiving end raises an identifier for identifying the graphic identifier in the specific system, and uses the identifier to scan and identify the graphic identifier containing the encrypted information on the data transmitting end.
- the specific system in this step is the same as the specific system in step S302.
- the system technical architecture, writing language, functions, and the like are the same, and can be run on different mobile terminal devices, and can also be called a private system.
- Step S306 the data receiving end determines whether the identifier can identify the graphic identifier containing the encrypted information on the data transmitting end, and if yes, proceeds to step S308; if not, ends the current flow.
- the data receiving end may acquire the identification result of the graphic identifier including the encrypted information on the identifier of the identifier of the identifier, and determine whether the recognition result satisfies the specified identity authentication condition; if the recognition result satisfies the specified identity authentication condition, determine The identifier can identify the graphic identifier containing the encrypted information on the data transmitting end; if the recognition result does not satisfy the specified identity authentication condition, it is determined that the identifier cannot identify the graphic identifier containing the encrypted information on the data transmitting end.
- the recognition result may be matched with the specified identity authentication condition. If the match is satisfied, the recognition result satisfies the specified identity authentication condition; if not, the judgment result is not satisfied.
- Identity authentication conditions are specifically determined whether the recognition result satisfies the specified identity authentication condition.
- Step S308 the data receiving end initiates a connection request for establishing a link to the data sending end.
- Step S310 the data sending end receives the connection request, and establishes a data transmission channel with the data receiving end in response to the connection request.
- Step S312 the data transmitting end transmits the target data to the data receiving end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
- the target data may be encrypted by using a preset encryption and decryption algorithm to obtain the encrypted data, and then the encrypted data is transmitted to the data receiving end by using the dedicated data transmission channel.
- the preset encryption and decryption algorithm here may be pre-stored in a specified folder of the specified application, or may be carried by the generated graphic identifier.
- Step S314 the data receiving end uses the dedicated data transmission channel to receive the target data transmitted by the data transmitting end.
- the data receiving end may further parse the target data and save the parsed data in a specific system.
- the data transmitting end encrypts the target data by using a preset encryption and decryption algorithm
- the encrypted data is obtained, and the encrypted data is transmitted to the data receiving end by using the dedicated data transmission channel, and the data receiving end receives the encrypted data transmitted by the data transmitting end.
- the data receiving end may further decrypt the encrypted data according to a preset encryption and decryption algorithm carried in the graphic identifier, and save the decrypted data in a specific system.
- the data sending end can be used as the old mobile phone end, and the data receiving end can be used as the new mobile phone end.
- the above steps S302 to S314 can be used to efficiently and securely synchronize the data in the old mobile phone to the new mobile phone.
- the embodiment of the present invention further provides an apparatus for data transmission between mobile terminals based on the method for data transmission between mobile terminals provided by the foregoing embodiments.
- FIG. 4 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data transmitting end according to an embodiment of the present invention.
- the apparatus may include a system loading module 410, a graphic identifier generating module 420, a first data transmission channel establishing module 430, and a data transmission module 440.
- the system loading module 410 is adapted to enter a specific system from the current system
- the graphic identifier generating module 420 is coupled to the system loading module 410, and is adapted to generate and display a graphic identifier containing the encrypted information when the transmission request of the transmission data is received in the specific system, to be provided to the specific system of the data receiving end.
- the identifier is scanned and identified;
- the first data transmission channel establishing module 430 is coupled to the graphic identifier generating module 420, and is adapted to, when receiving the connection request initiated by the data receiving end, after the identifier is recognized by the identifier, Responding to the connection request, establishing a data transmission channel with the data receiving end;
- the data transmission module 440 is coupled to the first data transmission channel establishing module 430, and is adapted to transmit the target data to the local data transmission channel obtained by encrypting the data transmission channel by using the encrypted information in the graphic identifier.
- the data receiving end is coupled to the first data transmission channel establishing module 430, and is adapted to transmit the target data to the local data transmission channel obtained by encrypting the data transmission channel by using the encrypted information in the graphic identifier.
- the graphic identifier generating module 420 is further adapted to:
- the specified application is started in a specific system, and a transmission request for transmitting data is initiated, thereby receiving a transmission request for transmitting data in a specific system.
- the data transmission module 440 is further adapted to:
- the encrypted data is transmitted to the data receiving end by using the dedicated data transmission channel.
- the preset identifier encryption and decryption algorithm is further carried in the graphic identifier.
- the apparatus shown in FIG. 4 above may further include:
- the to-be-transmitted data generating module 510 is coupled to the system loading module 410, and is adapted to acquire the data to be transmitted when the transmission request of the transmission data is received in the specific system, and package the data to be transmitted, and the packaged data is to be packaged. As the target data.
- FIG. 6 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data receiving end according to an embodiment of the present invention.
- the apparatus may include a graphic identifier identifying module 610, a determining module 620, a second data transmission channel establishing module 630, and a data receiving module 640.
- a graphic identifier identifying module 610 adapted to call up an identifier for identifying a graphic identifier in a specific system, and use the identifier to scan and identify a graphic identifier containing the encrypted information on the data transmitting end;
- the determining module 620 is coupled to the graphic identifier identifying module 610, and is adapted to determine whether the identifier can identify the graphic identifier containing the encrypted information on the data sending end;
- the second data transmission channel establishing module 630 is coupled to the determining module 620, and is adapted to: if the determining module 620 determines that the identifier can identify the graphic identifier including the encrypted information on the data sending end, then The data sending end initiates a connection request for establishing a link, and when the response message returned by the data sending end is received, establishing a data transmission channel with the data sending end;
- the data receiving module 640 is coupled to the second data transmission channel establishing module 630, and is adapted to receive the data transmission by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encryption information in the graphic identifier. The target data transmitted by the end.
- the apparatus shown in FIG. 6 above may further include:
- the first data storage module 710 is coupled to the data receiving module 640, and is adapted to parse the target data after the data receiving module 640 receives the target data transmitted by the data sending end, and parse the obtained data. Saved in a specific system.
- the data sending end encrypts the target data by using a preset encryption and decryption algorithm
- the encrypted data is obtained, and the encrypted data is transmitted by using the dedicated data transmission channel to
- the data receiving end 640 is further adapted to:
- the apparatus shown in FIG. 6 above may further include:
- the second data storage module 720 is coupled to the data receiving module 640, and is adapted to receive, according to the preset information carried in the graphic identifier, after the data receiving module 640 receives the encrypted data transmitted by the data sending end.
- the decryption algorithm decrypts the encrypted data and saves the decrypted data in a specific system.
- the determining module 620 is further adapted to:
- the recognition result satisfies the specified identity authentication condition, it is determined that the identifier can identify the graphic identifier containing the encrypted information on the data transmitting end.
- the embodiment of the present invention further provides a mobile terminal.
- the mobile terminal can be any mobile terminal including a personal computer, a smart phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a car computer, and the like, and the mobile terminal is a smart phone.
- a personal computer a smart phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a car computer, and the like
- PDA Personal Digital Assistant
- POS Point of Sales
- car computer and the like
- the mobile terminal is a smart phone. example:
- FIG. 8 is a block diagram showing a partial structure of a smartphone related to a mobile terminal provided by an embodiment of the present invention.
- the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless-fidelity (Wi-Fi) module 870, The processor 880, and the power supply 890 and the like.
- RF radio frequency
- the RF circuit 810 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, it is processed by the processor 880. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
- GSM Global System of Mobile communication
- GPRS General Packet Radio Service
- the memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820.
- the memory 820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
- memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- the input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
- the input unit 830 may include a touch panel 831 and other input devices 832.
- the touch panel 831 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 831 or near the touch panel 831. Operation), and drive the corresponding connecting device according to a preset program.
- the touch panel 831 can include two parts: a touch detection device and a touch controller.
- the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
- the processor 880 is provided and can receive commands from the processor 880 and execute them.
- the touch panel 831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
- the input unit 830 may also include other input devices 832.
- other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
- the display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
- the display unit 840 can include a display panel 841.
- the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
- the touch panel 831 can cover the display panel 841. When the touch panel 831 detects a touch operation thereon or nearby, the touch panel 831 transmits to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event. The type provides a corresponding visual output on display panel 841.
- the touch panel 831 and the display panel 841 are two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 831 can be integrated with the display panel 841. Realize the input and output functions of the phone.
- the handset can also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight.
- the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
- vibration recognition related functions such as pedometer, tapping
- the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- Audio circuitry 860, speaker 861, and microphone 862 can provide an audio interface between the user and the handset.
- the audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then processed by the audio data output processor 880, sent to the other mobile phone via the RF circuit 810, or outputted to the memory 820 for further processing.
- WiFi is a short-range wireless transmission technology
- the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access.
- FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
- the processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The phone's various functions and processing data, so that the overall monitoring of the phone.
- the processor 880 may include one or more processing units; preferably, the processor 880 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
- the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 880.
- the handset also includes a power source 890 (such as a battery) that supplies power to the various components.
- a power source 890 such as a battery
- the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
- the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
- the processor 880 included in the mobile terminal further has a function of implementing the foregoing method for data transmission between mobile terminals.
- the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer program code, when the computer program code is run on a mobile terminal, causing the mobile terminal to perform the above-mentioned data transmission between the mobile terminals.
- modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
- the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
- any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
- Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
- the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
- a microprocessor or digital signal processor can be used in practice to implement apparatus for data transmission between mobile terminals in accordance with embodiments of the present invention and some or all of the components of the mobile terminal. Some or all of the features.
- the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
- a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Toxicology (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
本发明涉及互联网应用技术领域,特别是一种移动终端间数据传输的方法、装置及移动终端。The present invention relates to the field of Internet application technologies, and in particular, to a method, an apparatus, and a mobile terminal for data transmission between mobile terminals.
随着互联网和通信技术的快速发展,移动终端(如智能手机、平板电脑等)已经成为人们日常生活中不可缺少的一部分。以智能手机为例,智能手机的更新换代越来越频繁,一个用户可能拥有多个终端设备,用户在更换新手机后会考虑如何将旧手机中的数据同步到新手机中。With the rapid development of the Internet and communication technologies, mobile terminals (such as smart phones, tablets, etc.) have become an indispensable part of people's daily lives. Taking smartphones as an example, smartphones are becoming more and more frequent. One user may have multiple terminal devices. After replacing a new mobile phone, users will consider how to synchronize the data in the old mobile phone to the new mobile phone.
目前,将旧手机中的数据同步到新手机中主要采用两种方式:第一种是将旧手机的数据拷贝到存储卡中,再将存储卡安装在新手机中,将数据恢复到新手机;第二种是将旧手机连接到网络,并用账号登录到云端服务器,将旧手机中的数据上传至云端服务器中,然后用新手机登录同一账号至云端服务器,将数据下载到新手机中。At present, there are two ways to synchronize the data in the old mobile phone to the new mobile phone: the first is to copy the data of the old mobile phone to the memory card, then install the memory card in the new mobile phone, and restore the data to the new mobile phone. The second is to connect the old mobile phone to the network, log in to the cloud server with an account, upload the data from the old mobile phone to the cloud server, and then log in to the cloud server with the new mobile phone to download the data to the new mobile phone.
然而,上述方式一中对于内置存储卡的手机并不通用;方式二中需要连接到网络,操作过程较为繁琐,且安全性不高。因此,如何高效、安全地实现移动终端间的数据传输成为亟需解决的技术问题。However, in the first mode, the mobile phone with the built-in memory card is not universal; in the second mode, the connection to the network is required, the operation process is cumbersome, and the security is not high. Therefore, how to efficiently and securely implement data transmission between mobile terminals has become an urgent technical problem to be solved.
发明内容Summary of the invention
针对现有技术中存在的缺陷,本发明实施例的目的在于提供一种能够克服上述问题或者至少能够部分地解决上述问题的移动终端间数据传输的方法、装置及移动终端。In view of the deficiencies in the prior art, an object of the embodiments of the present invention is to provide a method, an apparatus, and a mobile terminal for data transmission between mobile terminals that can overcome the above problems or at least partially solve the above problems.
根据本发明的一方面,提供了一种移动终端间数据传输的方法,应用于数据发送端,包括:According to an aspect of the present invention, a method for data transmission between mobile terminals is provided, which is applied to a data transmitting end, and includes:
从当前系统进入特定系统,并在特定系统中接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,以提供给数据接收端的特定系统中的识别器进行扫描和识别;When a current system enters a specific system and receives a transmission request for transmitting data in a specific system, a graphic identifier containing the encrypted information is generated and displayed to be provided for scanning and identification by an identifier in a specific system of the data receiving end;
当接收到所述识别器识别出所述图形标识符后所述数据接收端发起的建立链接的连接请求时,响应该连接请求,与所述数据接收端建立数据传输通道;Receiving a connection request for establishing a link initiated by the data receiving end after the identifier is recognized by the identifier, in response to the connection request, establishing a data transmission channel with the data receiving end;
利用由所述图形标识符中的加密信息对所述数据传输通道进行加密得到的专用数据传输通道,传输目标数据至所述数据接收端。And transmitting the target data to the data receiving end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
根据本发明的另一方面,提供了一种移动终端间数据传输的方法,应用于数据接收端,包括:According to another aspect of the present invention, a method for data transmission between mobile terminals is provided, which is applied to a data receiving end, and includes:
在特定系统中调起用于识别图形标识符的识别器,利用所述识别器扫描并识别数据发送端上的包含加密信息的图形标识符;Recognizing an identifier for identifying a graphic identifier in a specific system, and using the identifier to scan and identify a graphic identifier containing the encrypted information on the data transmitting end;
判断所述识别器是否能够识别所述数据发送端上的包含加密信息的图形标识符;Determining whether the identifier can identify a graphic identifier containing the encrypted information on the data transmitting end;
若是,则向所述数据发送端发起建立链接的连接请求,进而当接收到所述数据发送端返回的响应消息时,与所述数据发送端建立数据传输通道;If yes, a connection request for establishing a link is initiated to the data sending end, and when receiving the response message returned by the data sending end, establishing a data transmission channel with the data sending end;
利用由所述图形标识符中的加密信息对所述数据传输通道进行加密得到的专用数据传输通道,接收所述数据发送端传输的目标数据。Receiving the target data transmitted by the data transmitting end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
根据本发明的又一方面,还提供了一种移动终端间数据传输的装置,应用于数据发送端,包括:According to still another aspect of the present invention, an apparatus for data transmission between mobile terminals is provided, which is applied to a data transmitting end, and includes:
系统加载模块,适于从当前系统进入特定系统;a system loading module adapted to enter a particular system from a current system;
图形标识符生成模块,适于在特定系统中接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,以提供给数据接收端的特定系统中的识别器进行扫描和识别;a graphic identifier generating module, configured to generate and display a graphic identifier including the encrypted information when the transmission request of the transmission data is received in a specific system, to provide an identifier for the specific system in the data receiving end to scan and identify;
第一数据传输通道建立模块,适于当接收到所述识别器识别出所述图形标识符后所述数据接收端发起的建立链接的连接请求时,响应该连接请求,与所述数据接收端建立数据传输通道;a first data transmission channel establishing module, configured to respond to the connection request and the data receiving end when receiving the connection request initiated by the data receiving end after receiving the graphic identifier by the identifier Establish a data transmission channel;
数据传输模块,适于利用由所述图形标识符中的加密信息对所述数据传输通道进行加密得到的专用数据传输通道,传输目标数据至所述数据接收端。And a data transmission module, configured to transmit the target data to the data receiving end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
根据本发明的又一方面,还提供了一种移动终端间数据传输的装置,应用于数据接收端,包括:According to still another aspect of the present invention, an apparatus for data transmission between mobile terminals is provided, which is applied to a data receiving end, and includes:
图形标识符识别模块,适于在特定系统中调起用于识别图形标识符的识别器,利用所述识别器扫描并识别数据发送端上的包含加密信息的图形标识符;a graphic identifier identifying module adapted to call up an identifier for identifying a graphic identifier in a specific system, and use the identifier to scan and identify a graphic identifier containing the encrypted information on the data transmitting end;
判断模块,适于判断所述识别器是否能够识别所述数据发送端上的包含加密信息的图形标识符;a determining module, configured to determine whether the identifier can identify a graphic identifier that includes the encrypted information on the data sending end;
第二数据传输通道建立模块,适于若所述判断模块判断所述识别器能够识别所述数据发送端上的包含加密信息的图形标识符,则向所述数据发送端发起建立链接的连接请求,进而当接收到所述数据发送端返回的响应消息时,与所述数据发送端建立数据传输通道;a second data transmission channel establishing module, configured to: if the determining module determines that the identifier can identify the graphic identifier including the encrypted information on the data sending end, initiate a connection request to establish a link to the data sending end And, when receiving the response message returned by the data sending end, establishing a data transmission channel with the data sending end;
数据接收模块,适于利用由所述图形标识符中的加密信息对所述数据传输通道进行加密得到的专用数据传输通道,接收所述数据发送端传输的目标数据。The data receiving module is adapted to receive the target data transmitted by the data transmitting end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
根据本发明的再一方面,还提供了一种移动终端,包括处理器和存储器,其中,所述存储器用于存储执行上述的移动终端间数据传输的方法的程序;According to still another aspect of the present invention, there is also provided a mobile terminal comprising a processor and a memory, wherein the memory is configured to store a program for performing the method of data transmission between the mobile terminals described above;
所述处理器被配置为用于执行所述存储器中存储的程序。The processor is configured to execute a program stored in the memory.
根据本发明的再一方面,还提供了一种计算机存储介质,所述计算机存储介质存储有计算机程序代码,当所述计算机程序代码在移动终端上运行时,导致所述移动终端执行上述的移动终端间数据传输的方法。According to still another aspect of the present invention, there is also provided a computer storage medium storing computer program code for causing the mobile terminal to perform the above-described movement when the computer program code is run on a mobile terminal A method of data transmission between terminals.
在本发明实施例中,数据发送端从当前系统进入特定系统,并在特定系统中接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,以提供给数据接收端 的特定系统中的识别器进行扫描和识别;数据发送端在接收到识别器识别出图形标识符后数据接收端发起的建立链接的连接请求时,响应该连接请求,与数据接收端建立数据传输通道;之后,数据发送端利用由图形标识符中的加密信息对数据传输通道进行加密得到的专用数据传输通道,传输目标数据至数据接收端。可以看到,本发明实施例能够在特定系统的基础上建立专用数据传输通道,利用该专用数据传输通道高效、安全地实现移动终端(即数据发送端和数据接收端)间的数据传输。并且,本发明实施例在数据发送端进入特定系统后,在接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,并在数据接收端的特定系统中的识别器识别出图形标识符后才能够建立数据传输通道,进一步提升了数据传输的安全性。In the embodiment of the present invention, when the data sending end enters a specific system from the current system and receives a transmission request for transmitting data in a specific system, a graphic identifier including the encrypted information is generated and displayed to be provided to the specific system of the data receiving end. The identifier is scanned and identified; the data transmitting end establishes a data transmission channel with the data receiving end in response to the connection request when receiving the connection request initiated by the data receiving end after receiving the graphic identifier by the identifier; The data transmitting end uses the dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier, and transmits the target data to the data receiving end. It can be seen that the embodiment of the present invention can establish a dedicated data transmission channel on the basis of a specific system, and utilize the dedicated data transmission channel to efficiently and securely implement data transmission between the mobile terminal (ie, the data transmitting end and the data receiving end). Moreover, after the data sending end enters the specific system, the embodiment of the present invention generates and displays a graphic identifier including the encrypted information when the transmission request of the transmission data is received, and recognizes the graphic in the identifier of the specific system at the data receiving end. After the identifier, the data transmission channel can be established, which further improves the security of data transmission.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:
图1示出了根据本发明一实施例的应用于数据发送端的移动终端间数据传输的方法的流程图;1 is a flow chart showing a method of data transmission between mobile terminals applied to a data transmitting end according to an embodiment of the present invention;
图2示出了根据本发明一实施例的应用于数据接收端的移动终端间数据传输的方法的流程图;2 is a flow chart showing a method of data transmission between mobile terminals applied to a data receiving end according to an embodiment of the present invention;
图3示出了根据本发明一实施例的应用于数据发送端和数据接收端的移动终端间数据传输的方法的流程图;3 is a flow chart showing a method for data transmission between mobile terminals applied to a data transmitting end and a data receiving end according to an embodiment of the present invention;
图4示出了根据本发明一实施例的应用于数据发送端的移动终端间数据传输的装置的结构示意图;FIG. 4 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data transmitting end according to an embodiment of the present invention; FIG.
图5示出了根据本发明另一实施例的应用于数据发送端的移动终端间数据传输的装置的结构示意图;FIG. 5 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data transmitting end according to another embodiment of the present invention; FIG.
图6示出了根据本发明一实施例的应用于数据接收端的移动终端间数据传输的装置的结构示意图;FIG. 6 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data receiving end according to an embodiment of the present invention; FIG.
图7示出了根据本发明另一实施例的应用于数据接收端的移动终端间数据传输的装置的结构示意图;以及FIG. 7 is a block diagram showing the structure of an apparatus for data transmission between mobile terminals applied to a data receiving end according to another embodiment of the present invention;
图8示出了与本发明实施例提供的移动终端相关的智能手机的部分结构的框图。FIG. 8 is a block diagram showing a partial structure of a smartphone related to a mobile terminal provided by an embodiment of the present invention.
下面结合附图和具体的实施方式对本发明作进一步的描述。The invention is further described below in conjunction with the drawings and specific embodiments.
如前文介绍,现有技术中实现移动终端间的数据同步传输,主要采用存储卡或使用 账号登录到云端服务器的方式。以手机为例,采用存储卡的方式,对于内置存储卡的手机并不通用;采用账号登录到云端服务器的方式,需要连接到网络,操作过程较为繁琐,且安全性不高。As described in the foregoing, in the prior art, data synchronization transmission between mobile terminals is implemented, mainly by using a memory card or using an account to log in to the cloud server. Taking a mobile phone as an example, the method of using a memory card is not common to a mobile phone with a built-in memory card; the method of logging in to the cloud server by using an account needs to be connected to the network, and the operation process is cumbersome and the security is not high.
为解决上述技术问题,本发明实施例提供了一种移动终端间数据传输的方法,能够在特定系统(如私密系统等)的基础上建立专用数据传输通道,利用该专用数据传输通道高效、安全地实现数据发送端和数据接收端间的数据传输。To solve the above technical problem, an embodiment of the present invention provides a method for data transmission between mobile terminals, which can establish a dedicated data transmission channel on a basis of a specific system (such as a private system, etc.), and utilize the dedicated data transmission channel to be efficient and secure. Realize data transmission between the data transmitting end and the data receiving end.
图1示出了根据本发明一实施例的应用于数据发送端的移动终端间数据传输的方法的流程图。如图1所示,该方法可以包括以下步骤S102至步骤S106。1 is a flow chart showing a method of data transmission between mobile terminals applied to a data transmitting end according to an embodiment of the present invention. As shown in FIG. 1, the method may include the following steps S102 to S106.
步骤S102,从当前系统进入特定系统,并在特定系统中接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,以提供给数据接收端的特定系统中的识别器进行扫描和识别。Step S102: When a current system enters a specific system and receives a transmission request for transmitting data in a specific system, a graphic identifier including the encrypted information is generated and displayed to provide an identifier to the identifier in the specific system of the data receiving end for scanning and Identification.
步骤S104,当接收到识别器识别出图形标识符后数据接收端发起的建立链接的连接请求时,响应该连接请求,与数据接收端建立数据传输通道。Step S104, when receiving the connection request initiated by the data receiving end and establishing the link after the identifier is recognized by the identifier, in response to the connection request, establishing a data transmission channel with the data receiving end.
步骤S106,利用由图形标识符中的加密信息对数据传输通道进行加密得到的专用数据传输通道,传输目标数据至数据接收端。Step S106: The target data is transmitted to the data receiving end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
在本发明实施例中,数据发送端从当前系统进入特定系统,并在特定系统中接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,以提供给数据接收端的特定系统中的识别器进行扫描和识别;数据发送端在接收到识别器识别出图形标识符后数据接收端发起的建立链接的连接请求时,响应该连接请求,与数据接收端建立数据传输通道;之后,数据发送端利用由图形标识符中的加密信息对数据传输通道进行加密得到的专用数据传输通道,传输目标数据至数据接收端。可以看到,本发明实施例能够在特定系统的基础上建立专用数据传输通道,利用该专用数据传输通道高效、安全地实现移动终端(即数据发送端和数据接收端)间的数据传输。并且,本发明实施例在数据发送端进入特定系统后,在接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,并在数据接收端的特定系统中的识别器识别出图形标识符后才能够建立数据传输通道,进一步提升了数据传输的安全性。In the embodiment of the present invention, when the data sending end enters a specific system from the current system and receives a transmission request for transmitting data in a specific system, a graphic identifier including the encrypted information is generated and displayed to be provided to the specific system of the data receiving end. The identifier is scanned and identified; the data transmitting end establishes a data transmission channel with the data receiving end in response to the connection request when receiving the connection request initiated by the data receiving end after receiving the graphic identifier by the identifier; The data transmitting end uses the dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier, and transmits the target data to the data receiving end. It can be seen that the embodiment of the present invention can establish a dedicated data transmission channel on the basis of a specific system, and utilize the dedicated data transmission channel to efficiently and securely implement data transmission between the mobile terminal (ie, the data transmitting end and the data receiving end). Moreover, after the data sending end enters the specific system, the embodiment of the present invention generates and displays a graphic identifier including the encrypted information when the transmission request of the transmission data is received, and recognizes the graphic in the identifier of the specific system at the data receiving end. After the identifier, the data transmission channel can be established, which further improves the security of data transmission.
上文步骤S102中提及的当前系统可以是移动终端开机时的桌面系统,如安卓桌面系统或塞班桌面系统等。移动终端从当前系统进入特定系统,这里的特定系统也称为私密系统,用户可以根据需求自由将移动终端内部的应用程序、图像文档资料等放入私密系统之中,而所有私密系统内的应用程序和文件资料,都无法在外部看到,也不存在其他入口,真正做到了“隐私了无痕”。同时,用户还可以根据需要建立访客通道,额外设置一个可以让访客看的“私密空间”,而真实的私密文件依然存在于私密系统中,在不影响用户操作体验的情况下,有效防止用户隐私泄露。The current system mentioned in the above step S102 may be a desktop system when the mobile terminal is powered on, such as an Android desktop system or a Symbian desktop system. The mobile terminal enters a specific system from the current system. The specific system here is also called a private system. The user can freely put the application, image and document data of the mobile terminal into the private system according to the requirements, and all the applications in the private system. Programs and documentation can't be seen externally, and there are no other portals. It really means "no privacy." At the same time, the user can also establish a visitor channel as needed, and additionally set up a "private space" that can be seen by the visitor, and the real private file still exists in the private system, effectively preventing user privacy without affecting the user's operating experience. Give way.
进一步地,上文步骤S102中提及的图形标识符可以是条形码(bar code),也可以是二维码或者二维条码(2-dimensional bar code),本发明实施例对此不作限制。条形码,它是将宽度不等的多个黑条和空白,按照一定的编码规则排列,用以表达一组信息,常 见的条形码是由反射率相差很大的黑条(简称条)和白条(简称空)排成的平行线图案。二维码,它是用某种特定的几何图形按一定规律在平面(二维方向上)分布的黑白相间的图形记录数据符号信息,在代码编制上巧妙地利用构成计算机内部逻辑基础的“0”、“1”比特流的概念,使用若干个与二进制相对应的几何形体来表示文字数值信息,通过图像输入设备或光电扫描设备自动识读以实现信息的自动处理。它具有条码技术的一些共性,即,每种码制有其特定的字符集,每个字符占有一定的宽度,具有一定的校验功能等,同时还具有对不同行的信息进行自动识别的功能以及处理图形旋转变化点的功能。Further, the graphic identifier mentioned in the above step S102 may be a bar code, or may be a two-dimensional code or a 2-dimensional bar code, which is not limited in the embodiment of the present invention. A bar code, which is a plurality of black bars and spaces of different widths, arranged according to a certain coding rule to express a set of information. A common bar code is a black bar (abbreviated as a bar) and a white bar having a large difference in reflectance ( Referred to as empty) parallel lines pattern. A two-dimensional code, which is a black and white graphic data symbol information distributed in a plane (two-dimensional direction) by a certain geometric pattern, and skillfully uses the "0" that constitutes the internal logic of the computer. The concept of "1" bit stream uses several geometric shapes corresponding to binary to represent literal numerical information, and is automatically read by an image input device or an optical scanning device to realize automatic processing of information. It has some commonalities of bar code technology, that is, each code system has its own specific character set, each character occupies a certain width, has a certain check function, etc., and also has the function of automatically recognizing information of different lines. And the ability to handle the point of rotation of the graphic rotation.
步骤S102中在特定系统中接收到传输数据的传输请求,本发明实施例提供了一种可选的方案,在该方案中,可以在特定系统中启动指定应用,发起传输数据的传输请求,从而在特定系统中接收到传输数据的传输请求。进一步地,在特定系统中接收到传输数据的传输请求时,本发明实施例还可以获取待传输数据,并对待传输数据进行打包,将打包后的数据作为目标数据。也就是说,当数据发送端从当前系统进入特定系统后,用户在特定系统中触发指定应用(如点击指定应用的图标等),此时在特定系统中启动指定应用,发起传输数据的传输请求;在指定应用启动后,用户可以查找和选取待传输数据,这样数据发送端就可以获取待传输数据,并对待传输数据进行打包,将打包后的数据作为目标数据。In the step S102, the transmission request of the transmission data is received in the specific system, and the embodiment of the present invention provides an optional solution, in which the specified application can be started in the specific system, and the transmission request of the transmission data is initiated, thereby A transmission request for transmitting data is received in a specific system. Further, when receiving the transmission request of the transmission data in the specific system, the embodiment of the present invention may further acquire the data to be transmitted, and package the data to be transmitted, and use the packaged data as the target data. That is to say, when the data sending end enters the specific system from the current system, the user triggers the specified application in a specific system (such as clicking an icon of the specified application, etc.), at this time, the specified application is started in the specific system, and the transmission request of the transmission data is initiated. After the specified application is started, the user can find and select the data to be transmitted, so that the data sending end can acquire the data to be transmitted, and package the data to be transmitted, and use the packaged data as the target data.
在本发明的可选实施例中,为了进一步提高数据传输的安全性,在步骤S106传输目标数据至数据接收端之前,还可以采用预设加解密算法对目标数据进行加密,得到加密后的数据,进而利用专用数据传输通道传输加密后的数据至数据接收端。这里的预设加解密算法可以是预先存储在指定应用的指定文件夹中,也可以由生成的图形标识符所携带。In an optional embodiment of the present invention, in order to further improve the security of data transmission, before the target data is transmitted to the data receiving end in step S106, the target data may be encrypted by using a preset encryption and decryption algorithm to obtain the encrypted data. And then using the dedicated data transmission channel to transmit the encrypted data to the data receiving end. The preset encryption and decryption algorithm here may be pre-stored in a specified folder of the specified application, or may be carried by the generated graphic identifier.
相应地,图2示出了根据本发明一实施例的应用于数据接收端的移动终端间数据传输的方法的流程图。如图2所示,该方法可以包括以下步骤S202至步骤S208。Accordingly, FIG. 2 is a flow chart showing a method of data transmission between mobile terminals applied to a data receiving end according to an embodiment of the present invention. As shown in FIG. 2, the method may include the following steps S202 to S208.
步骤S202,在特定系统中调起用于识别图形标识符的识别器,利用识别器扫描并识别数据发送端上的包含加密信息的图形标识符。Step S202, the identifier for identifying the graphic identifier is called up in the specific system, and the identifier of the graphic information containing the encrypted information on the data transmitting end is scanned and identified by the identifier.
步骤S204,判断识别器是否能够识别数据发送端上的包含加密信息的图形标识符,若是,则继续执行步骤S206。Step S204, determining whether the identifier can identify the graphic identifier containing the encrypted information on the data transmitting end, and if yes, proceeding to step S206.
步骤S206,向数据发送端发起建立链接的连接请求,进而当接收到数据发送端返回的响应消息时,与数据发送端建立数据传输通道。Step S206, initiating a connection request for establishing a link to the data sending end, and then, when receiving the response message returned by the data sending end, establishing a data transmission channel with the data transmitting end.
步骤S208,利用由图形标识符中的加密信息对数据传输通道进行加密得到的专用数据传输通道,接收数据发送端传输的目标数据。Step S208, receiving the target data transmitted by the data transmitting end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
上文步骤S202中提及的特定系统与步骤S102中提及的特定系统是相同的,其系统技术架构、编写语言、功能等均相同,可以运行在不同的移动终端设备上,也都可以称为私密系统。用户可以根据需求自由将移动终端内部的应用程序、图像文档资料等放入私密系统之中,而所有私密系统内的应用程序和文件资料,都无法在外部看到,也不存在其他入口,真正做到了“隐私了无痕”。同时,用户还可以根据需要建立访客通道, 额外设置一个可以让访客看的“私密空间”,而真实的私密文件依然存在于私密系统中,在不影响用户操作体验的情况下,有效防止用户隐私泄露。The specific system mentioned in the above step S202 is the same as the specific system mentioned in the step S102, and the system technical architecture, the writing language, the function and the like are the same, and can be run on different mobile terminal devices, and can also be called It is a private system. Users can freely put applications, image documents and the like inside the mobile terminal into the private system according to their needs, and all the applications and documents in the private system cannot be seen externally, and there are no other entrances. It has achieved "no privacy". At the same time, the user can also establish a visitor channel as needed, and additionally set up a "private space" that can be seen by the visitor, and the real private file still exists in the private system, effectively preventing user privacy without affecting the user's operating experience. Give way.
上文步骤S204中判断识别器是否能够识别数据发送端上的包含加密信息的图形标识符,本发明实施例提供了一种可选的方案,即,获取识别器识别数据发送端上的包含加密信息的图形标识符的识别结果,判断识别结果是否满足指定身份认证条件;若识别结果满足指定身份认证条件,则确定识别器能够识别数据发送端上的包含加密信息的图形标识符;若识别结果不满足指定身份认证条件,则确定识别器不能够识别数据发送端上的包含加密信息的图形标识符。在具体判断识别结果是否满足指定身份认证条件时,可以将识别结果与指定身份认证条件进行匹配,若匹配上,则判断识别结果满足指定身份认证条件;若不匹配,则判断识别结果不满足指定身份认证条件。In the above step S204, it is determined whether the identifier can identify the graphic identifier including the encrypted information on the data transmitting end. The embodiment of the present invention provides an optional solution, that is, the identifier of the acquiring identifier is included on the transmitting end of the data. The recognition result of the graphic identifier of the information determines whether the recognition result satisfies the specified identity authentication condition; if the recognition result satisfies the specified identity authentication condition, it is determined that the identifier can identify the graphic identifier including the encrypted information on the data transmitting end; if the recognition result If the specified identity authentication condition is not satisfied, it is determined that the recognizer cannot identify the graphic identifier containing the encrypted information on the data transmitting end. When it is specifically determined whether the recognition result satisfies the specified identity authentication condition, the recognition result may be matched with the specified identity authentication condition. If the match is satisfied, the recognition result satisfies the specified identity authentication condition; if not, the judgment result is not satisfied. Identity authentication conditions.
进一步地,在步骤S204确定识别器不能够识别数据发送端上的包含加密信息的图形标识符时,则生成提示信息,以引导用户将数据接收端重新进入特定系统,并重新扫描和识别。Further, when it is determined in step S204 that the identifier is unable to identify the graphic identifier containing the encrypted information on the data transmitting end, the prompt information is generated to guide the user to re-enter the data receiving end into the specific system and re-scan and recognize.
在本发明的可选实施例中,在步骤S208接收数据发送端传输的目标数据之后,还可以对目标数据进行解析,并将解析得到的数据保存在特定系统中。In an optional embodiment of the present invention, after receiving the target data transmitted by the data transmitting end in step S208, the target data may also be parsed, and the parsed data may be saved in a specific system.
在本发明的可选实施例中,若数据发送端采用预设加解密算法对目标数据进行加密,得到加密后的数据,并利用专用数据传输通道传输加密后的数据至数据接收端,则数据接收端接收数据发送端传输的加密后的数据。In an optional embodiment of the present invention, if the data sending end encrypts the target data by using a preset encryption and decryption algorithm, obtains the encrypted data, and transmits the encrypted data to the data receiving end by using a dedicated data transmission channel, then the data The receiving end receives the encrypted data transmitted by the data transmitting end.
在接收数据发送端传输的加密后的数据之后,数据接收端还可以根据图形标识符中携带的预设加解密算法对加密后的数据进行解密,将解密得到的数据保存在特定系统中。After receiving the encrypted data transmitted by the data transmitting end, the data receiving end may further decrypt the encrypted data according to a preset encryption and decryption algorithm carried in the graphic identifier, and save the decrypted data in a specific system.
以上介绍了图1和图2所示的实施例中各个环节的多种实现方式,下面结合数据发送端和数据接收端,通过具体的实施例对本发明实施例提供的移动终端间数据传输的方法做进一步说明。The foregoing describes various implementation manners of the various links in the embodiment shown in FIG. 1 and FIG. 2, and the data transmission terminal and the data receiving end are combined with the data transmission end and the data receiving end, and the data transmission method between the mobile terminals provided by the embodiment of the present invention is provided by using a specific embodiment. Do further explanation.
图3示出了根据本发明一实施例的应用于数据发送端和数据接收端的移动终端间数据传输的方法的流程图。如图3所示,该方法可以包括以下步骤S302至步骤S314。FIG. 3 is a flow chart showing a method of data transmission between mobile terminals applied to a data transmitting end and a data receiving end according to an embodiment of the present invention. As shown in FIG. 3, the method may include the following steps S302 to S314.
步骤S302,数据发送端从当前系统进入特定系统,并在特定系统中接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,以提供给数据接收端的特定系统中的识别器进行扫描和识别。Step S302, the data sending end enters the specific system from the current system, and when receiving the transmission request of the transmission data in the specific system, generates and displays a graphic identifier containing the encrypted information to provide the identifier in the specific system of the data receiving end. Scan and identify.
在该步骤中,当前系统可以是移动终端开机时的桌面系统,如安卓桌面系统或塞班桌面系统等。移动终端从当前系统进入特定系统,这里的特定系统也称为私密系统,用户可以根据需求自由将移动终端内部的应用程序、图像文档资料等放入私密系统之中,而所有私密系统内的应用程序和文件资料,都无法在外部看到,也不存在其他入口,真正做到了“隐私了无痕”。此外,数据发送端生成的图形标识符可以是条形码,也可以是二维码或者二维条码,可以参见前文详细介绍,此处不再赘述。In this step, the current system may be a desktop system when the mobile terminal is powered on, such as an Android desktop system or a Symbian desktop system. The mobile terminal enters a specific system from the current system. The specific system here is also called a private system. The user can freely put the application, image and document data of the mobile terminal into the private system according to the requirements, and all the applications in the private system. Programs and documentation can't be seen externally, and there are no other portals. It really means "no privacy." In addition, the graphic identifier generated by the data sending end may be a barcode, or may be a two-dimensional code or a two-dimensional barcode. For details, refer to the foregoing description, and details are not described herein again.
进一步地,数据发送端在特定系统中接收到传输数据的传输请求时,还可以获取待传输数据,并对待传输数据进行打包,将打包后的数据作为目标数据。Further, when the data transmitting end receives the transmission request of the transmission data in the specific system, the data transmitting end may also acquire the data to be transmitted, and package the data to be transmitted, and use the packaged data as the target data.
步骤S304,数据接收端在特定系统中调起用于识别图形标识符的识别器,利用识别器扫描并识别数据发送端上的包含加密信息的图形标识符。Step S304, the data receiving end raises an identifier for identifying the graphic identifier in the specific system, and uses the identifier to scan and identify the graphic identifier containing the encrypted information on the data transmitting end.
该步骤中的特定系统与步骤S302中的特定系统是相同的,其系统技术架构、编写语言、功能等均相同,可以运行在不同的移动终端设备上,也都可以称为私密系统。The specific system in this step is the same as the specific system in step S302. The system technical architecture, writing language, functions, and the like are the same, and can be run on different mobile terminal devices, and can also be called a private system.
步骤S306,数据接收端判断识别器是否能够识别数据发送端上的包含加密信息的图形标识符,若是,则继续执行步骤S308;若否,则结束本次流程。Step S306, the data receiving end determines whether the identifier can identify the graphic identifier containing the encrypted information on the data transmitting end, and if yes, proceeds to step S308; if not, ends the current flow.
在该步骤中,数据接收端可以获取识别器识别数据发送端上的包含加密信息的图形标识符的识别结果,判断识别结果是否满足指定身份认证条件;若识别结果满足指定身份认证条件,则确定识别器能够识别数据发送端上的包含加密信息的图形标识符;若识别结果不满足指定身份认证条件,则确定识别器不能够识别数据发送端上的包含加密信息的图形标识符。在具体判断识别结果是否满足指定身份认证条件时,可以将识别结果与指定身份认证条件进行匹配,若匹配上,则判断识别结果满足指定身份认证条件;若不匹配,则判断识别结果不满足指定身份认证条件。In this step, the data receiving end may acquire the identification result of the graphic identifier including the encrypted information on the identifier of the identifier of the identifier, and determine whether the recognition result satisfies the specified identity authentication condition; if the recognition result satisfies the specified identity authentication condition, determine The identifier can identify the graphic identifier containing the encrypted information on the data transmitting end; if the recognition result does not satisfy the specified identity authentication condition, it is determined that the identifier cannot identify the graphic identifier containing the encrypted information on the data transmitting end. When it is specifically determined whether the recognition result satisfies the specified identity authentication condition, the recognition result may be matched with the specified identity authentication condition. If the match is satisfied, the recognition result satisfies the specified identity authentication condition; if not, the judgment result is not satisfied. Identity authentication conditions.
步骤S308,数据接收端向数据发送端发起建立链接的连接请求。Step S308, the data receiving end initiates a connection request for establishing a link to the data sending end.
步骤S310,数据发送端接收到连接请求,响应该连接请求,与数据接收端建立数据传输通道。Step S310, the data sending end receives the connection request, and establishes a data transmission channel with the data receiving end in response to the connection request.
步骤S312,数据发送端利用由图形标识符中的加密信息对数据传输通道进行加密得到的专用数据传输通道,传输目标数据至数据接收端。Step S312, the data transmitting end transmits the target data to the data receiving end by using a dedicated data transmission channel obtained by encrypting the data transmission channel by the encrypted information in the graphic identifier.
在该步骤中,在传输目标数据至数据接收端之前,还可以采用预设加解密算法对目标数据进行加密,得到加密后的数据,进而利用专用数据传输通道传输加密后的数据至数据接收端。这里的预设加解密算法可以是预先存储在指定应用的指定文件夹中,也可以由生成的图形标识符所携带。In this step, before the target data is transmitted to the data receiving end, the target data may be encrypted by using a preset encryption and decryption algorithm to obtain the encrypted data, and then the encrypted data is transmitted to the data receiving end by using the dedicated data transmission channel. . The preset encryption and decryption algorithm here may be pre-stored in a specified folder of the specified application, or may be carried by the generated graphic identifier.
步骤S314,数据接收端利用专用数据传输通道,接收数据发送端传输的目标数据。Step S314, the data receiving end uses the dedicated data transmission channel to receive the target data transmitted by the data transmitting end.
在该步骤中,数据接收端接收数据发送端传输的目标数据之后,还可以对目标数据进行解析,并将解析得到的数据保存在特定系统中。In this step, after receiving the target data transmitted by the data transmitting end, the data receiving end may further parse the target data and save the parsed data in a specific system.
若数据发送端采用预设加解密算法对目标数据进行加密,得到加密后的数据,并利用专用数据传输通道传输加密后的数据至数据接收端,则数据接收端接收数据发送端传输的加密后的数据。此时,数据接收端还可以根据图形标识符中携带的预设加解密算法对加密后的数据进行解密,将解密得到的数据保存在特定系统中。If the data transmitting end encrypts the target data by using a preset encryption and decryption algorithm, the encrypted data is obtained, and the encrypted data is transmitted to the data receiving end by using the dedicated data transmission channel, and the data receiving end receives the encrypted data transmitted by the data transmitting end. The data. At this time, the data receiving end may further decrypt the encrypted data according to a preset encryption and decryption algorithm carried in the graphic identifier, and save the decrypted data in a specific system.
在上述实施例中,可以将数据发送端作为旧手机端,数据接收端作为新手机端,采用上述步骤S302至步骤S314,可以实现高效、安全地将旧手机中的数据同步到新手机中。In the above embodiment, the data sending end can be used as the old mobile phone end, and the data receiving end can be used as the new mobile phone end. The above steps S302 to S314 can be used to efficiently and securely synchronize the data in the old mobile phone to the new mobile phone.
需要说明的是,实际应用中,上述所有可选实施方式可以采用结合的方式任意组合,形成本发明的可选实施例,在此不再一一赘述。It should be noted that, in an actual application, all the foregoing optional embodiments may be combined in any combination to form an optional embodiment of the present invention, and details are not described herein again.
基于上文各个实施例提供的移动终端间数据传输的方法,基于同一发明构思,本发明实施例还提供了一种移动终端间数据传输的装置。Based on the same inventive concept, the embodiment of the present invention further provides an apparatus for data transmission between mobile terminals based on the method for data transmission between mobile terminals provided by the foregoing embodiments.
图4示出了根据本发明一实施例的应用于数据发送端的移动终端间数据传输的装置的结构示意图。如图4所示,该装置可以包括系统加载模块410、图形标识符生成模块420、第一数据传输通道建立模块430以及数据传输模块440。FIG. 4 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data transmitting end according to an embodiment of the present invention. As shown in FIG. 4, the apparatus may include a
现介绍本发明实施例的应用于数据发送端的移动终端间数据传输的装置的各组成或器件的功能以及各部分间的连接关系:The functions of the components or devices of the apparatus for data transmission between mobile terminals applied to the data transmitting end and the connection relationship between the parts are described.
系统加载模块410,适于从当前系统进入特定系统;The
图形标识符生成模块420,与系统加载模块410相耦合,适于在特定系统中接收到传输数据的传输请求时,生成并展示包含加密信息的图形标识符,以提供给数据接收端的特定系统中的识别器进行扫描和识别;The graphic
第一数据传输通道建立模块430,与图形标识符生成模块420相耦合,适于当接收到所述识别器识别出所述图形标识符后所述数据接收端发起的建立链接的连接请求时,响应该连接请求,与所述数据接收端建立数据传输通道;The first data transmission channel establishing module 430 is coupled to the graphic
数据传输模块440,与第一数据传输通道建立模块430相耦合,适于利用由所述图形标识符中的加密信息对所述数据传输通道进行加密得到的专用数据传输通道,传输目标数据至所述数据接收端。The
在本发明的可选实施例中,所述图形标识符生成模块420还适于:In an optional embodiment of the present invention, the graphic
在特定系统中启动指定应用,发起传输数据的传输请求,从而在特定系统中接收到传输数据的传输请求。The specified application is started in a specific system, and a transmission request for transmitting data is initiated, thereby receiving a transmission request for transmitting data in a specific system.
在本发明的可选实施例中,所述数据传输模块440还适于:In an optional embodiment of the present invention, the
在传输目标数据至所述数据接收端之前,采用预设加解密算法对所述目标数据进行加密,得到加密后的数据;Before transmitting the target data to the data receiving end, encrypting the target data by using a preset encryption and decryption algorithm to obtain the encrypted data;
利用所述专用数据传输通道传输加密后的数据至所述数据接收端。The encrypted data is transmitted to the data receiving end by using the dedicated data transmission channel.
在本发明的可选实施例中,所述图形标识符中还携带所述预设加解密算法。In an optional embodiment of the present invention, the preset identifier encryption and decryption algorithm is further carried in the graphic identifier.
在本发明的可选实施例中,如图5所示,上文图4展示的装置还可以包括:In an alternative embodiment of the present invention, as shown in FIG. 5, the apparatus shown in FIG. 4 above may further include:
待传输数据生成模块510,与系统加载模块410相耦合,适于在特定系统中接收到传输数据的传输请求时,获取待传输数据,并对所述待传输数据进行打包,将打包后的数据作为所述目标数据。The to-be-transmitted
相应的,图6示出了根据本发明一实施例的应用于数据接收端的移动终端间数据传输的装置的结构示意图。如图6所示,该装置可以包括图形标识符识别模块610、判断模块620、第二数据传输通道建立模块630以及数据接收模块640。Correspondingly, FIG. 6 is a schematic structural diagram of an apparatus for data transmission between mobile terminals applied to a data receiving end according to an embodiment of the present invention. As shown in FIG. 6, the apparatus may include a graphic
现介绍本发明实施例的应用于数据接收端的移动终端间数据传输的装置的各组成或器件的功能以及各部分间的连接关系:The functions of the components or devices of the apparatus for data transmission between mobile terminals applied to the data receiving end and the connection relationship between the parts are described.
图形标识符识别模块610,适于在特定系统中调起用于识别图形标识符的识别器,利用所述识别器扫描并识别数据发送端上的包含加密信息的图形标识符;a graphic
判断模块620,与图形标识符识别模块610相耦合,适于判断所述识别器是否能够识别所述数据发送端上的包含加密信息的图形标识符;The determining
第二数据传输通道建立模块630,与判断模块620相耦合,适于若所述判断模块620判断所述识别器能够识别所述数据发送端上的包含加密信息的图形标识符,则向所述数据发送端发起建立链接的连接请求,进而当接收到所述数据发送端返回的响应消息时,与所述数据发送端建立数据传输通道;The second data transmission channel establishing module 630 is coupled to the determining
数据接收模块640,与第二数据传输通道建立模块630相耦合,适于利用由所述图形标识符中的加密信息对所述数据传输通道进行加密得到的专用数据传输通道,接收所述数据发送端传输的目标数据。The
在本发明的可选实施例中,如图7所示,上文图6展示的装置还可以包括:In an alternative embodiment of the present invention, as shown in FIG. 7, the apparatus shown in FIG. 6 above may further include:
第一数据保存模块710,与数据接收模块640相耦合,适于在所述数据接收模块640接收所述数据发送端传输的目标数据之后,对所述目标数据进行解析,并将解析得到的数据保存在特定系统中。The first
在本发明的可选实施例中,若所述数据发送端采用预设加解密算法对所述目标数据进行加密,得到加密后的数据,并利用所述专用数据传输通道传输加密后的数据至所述数据接收端,所述数据接收模块640还适于:In an optional embodiment of the present invention, if the data sending end encrypts the target data by using a preset encryption and decryption algorithm, the encrypted data is obtained, and the encrypted data is transmitted by using the dedicated data transmission channel to The
接收所述数据发送端传输的加密后的数据。Receiving the encrypted data transmitted by the data transmitting end.
在本发明的可选实施例中,如图7所示,上文图6展示的装置还可以包括:In an alternative embodiment of the present invention, as shown in FIG. 7, the apparatus shown in FIG. 6 above may further include:
第二数据保存模块720,与数据接收模块640相耦合,适于在所述数据接收模块640接收所述数据发送端传输的加密后的数据之后,根据所述图形标识符中携带的预设加解密算法对加密后的数据进行解密,将解密得到的数据保存在特定系统中。The second
在本发明的可选实施例中,所述判断模块620还适于:In an optional embodiment of the present invention, the determining
获取所述识别器识别所述数据发送端上的包含加密信息的图形标识符的识别结果;Obtaining, by the identifier, a recognition result of the graphic identifier including the encrypted information on the data transmitting end;
判断所述识别结果是否满足指定身份认证条件;Determining whether the recognition result satisfies the specified identity authentication condition;
若所述识别结果满足指定身份认证条件,则确定所述识别器能够识别所述数据发送端上的包含加密信息的图形标识符。If the recognition result satisfies the specified identity authentication condition, it is determined that the identifier can identify the graphic identifier containing the encrypted information on the data transmitting end.
本发明实施例还提供了一种移动终端,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该移动终端可以为包括个人电脑、智能手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意移动终端,以移动终端为智能手机为例:The embodiment of the present invention further provides a mobile terminal. For the convenience of description, only parts related to the embodiment of the present invention are shown. For details that are not disclosed, refer to the method part of the embodiment of the present invention. The mobile terminal can be any mobile terminal including a personal computer, a smart phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a car computer, and the like, and the mobile terminal is a smart phone. example:
图8示出了与本发明实施例提供的移动终端相关的智能手机的部分结构的框图。参考图8,手机包括:射频(Radio Frequency,RF)电路810、存储器820、输入单元830、显示单元840、传感器850、音频电路860、无线保真(wireless-fidelity,Wi-Fi)模块870、处理器880、以及电源890等部件。本领域技术人员可以理解,图8中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 8 is a block diagram showing a partial structure of a smartphone related to a mobile terminal provided by an embodiment of the present invention. Referring to FIG. 8, the mobile phone includes: a radio frequency (RF)
下面结合图8对手机的各个构成部件进行具体的介绍:The following describes the components of the mobile phone in detail with reference to FIG. 8:
RF电路810可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器880处理;另外,将设计上行的数据发送给基站。通常,RF电路810包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路810还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The
存储器820可用于存储软件程序以及模块,处理器880通过运行存储在存储器820的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器820可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器820可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The
输入单元830可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元830可包括触控面板831以及其他输入设备832。触控面板831,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板831上或在触控面板831附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板831可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器880,并能接收处理器880发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板831。除了触控面板831,输入单元830还可以包括其他输入设备832。具体地,其他输入设备832可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The
显示单元840可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元840可包括显示面板841,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板841。进一步的,触控面板831可覆盖显示面板841,当触控面板831检测到在其上或附近的触摸操作后,传送给处理器880以确定触摸事件的类型,随后处理器880根据触摸事件的类型在显示面板841上提供相应的视觉输出。虽然在图8中,触控面板831与显示面板841是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板831与显示面板841集成而实现手机的输入和输出功能。The
手机还可包括至少一种传感器850,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板841的亮度,接近传感器可在手机移动到耳边时,关闭显示面板841和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset can also include at least one type of
音频电路860、扬声器861以及传声器862可提供用户与手机之间的音频接口。音频电路860可将接收到的音频数据转换后的电信号,传输到扬声器861,由扬声器861转换为声音信号输出;另一方面,传声器862将收集的声音信号转换为电信号,由音频电路860接收后转换为音频数据,再将音频数据输出处理器880处理后,经RF电路810以发送给比如另一手机,或者将音频数据输出至存储器820以便进一步处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块870可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图8示出了WiFi模块870,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology, and the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the
处理器880是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器820内的软件程序和/或模块,以及调用存储在存储器820内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器880可包括一个或多个处理单元;优选的,处理器880可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器880中。The
手机还包括给各个部件供电的电源890(比如电池),优选的,电源可以通过电源管理系统与处理器880逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The handset also includes a power source 890 (such as a battery) that supplies power to the various components. Preferably, the power source can be logically coupled to the
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
在本发明实施例中,该移动终端所包括的处理器880还具有实现上述的移动终端间数据传输的方法的功能。In the embodiment of the present invention, the
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质存储有计算机程序代码,当所述计算机程序代码在移动终端上运行时,导致所述移动终端执行上述的移动终端间数据传输的方法。The embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer program code, when the computer program code is run on a mobile terminal, causing the mobile terminal to perform the above-mentioned data transmission between the mobile terminals. Methods.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures, and techniques are not shown in detail so as not to obscure the understanding of the description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在 上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed is not to be interpreted as reflecting the intention that the claimed invention requires more features than those recited in the claims. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that, although some embodiments described herein include certain features that are included in other embodiments and not in other features, combinations of features of different embodiments are intended to be within the scope of the present invention. Different embodiments are formed and formed. For example, in the following claims, any one of the claimed embodiments can be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的移动终端间数据传输的装置以及一种移动终端中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or digital signal processor (DSP) can be used in practice to implement apparatus for data transmission between mobile terminals in accordance with embodiments of the present invention and some or all of the components of the mobile terminal. Some or all of the features. The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。"an embodiment," or "an embodiment," or "an embodiment," In addition, it is noted that the phrase "in one embodiment" is not necessarily referring to the same embodiment.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将 这些单词解释为名称。It is to be noted that the above-described embodiments are illustrative of the invention and are not intended to be limiting, and that the invention may be devised without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。In addition, it should be noted that the language used in the specification has been selected for the purpose of readability and teaching, and is not intended to be construed or limited. Therefore, many modifications and changes will be apparent to those skilled in the art without departing from the scope of the invention. The disclosure of the present invention is intended to be illustrative, and not restrictive, and the scope of the invention is defined by the appended claims.
Claims (22)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711450423.3 | 2017-12-27 | ||
| CN201711450423.3A CN107911818B (en) | 2017-12-27 | 2017-12-27 | Method and device for data transmission between mobile terminals and mobile terminal |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019128179A1 true WO2019128179A1 (en) | 2019-07-04 |
Family
ID=61871638
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/094120 Ceased WO2019128179A1 (en) | 2017-12-27 | 2018-07-02 | Method and apparatus for data transmission between mobile terminals, and mobile terminal |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN107911818B (en) |
| WO (1) | WO2019128179A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113067826A (en) * | 2020-07-16 | 2021-07-02 | 陈杰 | Report sending system based on big data analysis |
| CN115378931A (en) * | 2022-08-15 | 2022-11-22 | 苏州单多啦科技有限公司 | Large-capacity data transmission method and system based on two-dimension code |
| CN116489645A (en) * | 2021-11-05 | 2023-07-25 | 荣耀终端有限公司 | Data transmission method and electronic equipment |
| WO2024051336A1 (en) * | 2022-09-08 | 2024-03-14 | Oppo广东移动通信有限公司 | Content collaboration method, apparatus and system, storage medium, and electronic device |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111865961B (en) * | 2020-07-15 | 2023-04-07 | 维沃移动通信有限公司 | Data processing method and device and electronic equipment |
| CN112422820A (en) * | 2020-10-30 | 2021-02-26 | 西安万像电子科技有限公司 | Image processing method, device, server and storage medium |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2014114229A1 (en) * | 2013-01-22 | 2014-07-31 | Tencent Technology (Shenzhen) Company Limited | Information transmitting method, device and system, and storage medium |
| CN104661215A (en) * | 2015-01-15 | 2015-05-27 | 天地融科技股份有限公司 | Communication method of wireless equipment and wireless equipment |
| CN106327185A (en) * | 2016-08-26 | 2017-01-11 | 维沃移动通信有限公司 | Starting method for payment application and mobile terminal |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103929411B (en) * | 2013-01-16 | 2017-05-24 | 深圳市腾讯计算机系统有限公司 | Information displaying method, terminal, safety server and system |
| CN104144034B (en) * | 2013-12-04 | 2016-04-13 | 腾讯科技(深圳)有限公司 | Password is shared and acquisition methods and device |
-
2017
- 2017-12-27 CN CN201711450423.3A patent/CN107911818B/en active Active
-
2018
- 2018-07-02 WO PCT/CN2018/094120 patent/WO2019128179A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2014114229A1 (en) * | 2013-01-22 | 2014-07-31 | Tencent Technology (Shenzhen) Company Limited | Information transmitting method, device and system, and storage medium |
| CN104661215A (en) * | 2015-01-15 | 2015-05-27 | 天地融科技股份有限公司 | Communication method of wireless equipment and wireless equipment |
| CN106327185A (en) * | 2016-08-26 | 2017-01-11 | 维沃移动通信有限公司 | Starting method for payment application and mobile terminal |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113067826A (en) * | 2020-07-16 | 2021-07-02 | 陈杰 | Report sending system based on big data analysis |
| CN116489645A (en) * | 2021-11-05 | 2023-07-25 | 荣耀终端有限公司 | Data transmission method and electronic equipment |
| CN115378931A (en) * | 2022-08-15 | 2022-11-22 | 苏州单多啦科技有限公司 | Large-capacity data transmission method and system based on two-dimension code |
| WO2024051336A1 (en) * | 2022-09-08 | 2024-03-14 | Oppo广东移动通信有限公司 | Content collaboration method, apparatus and system, storage medium, and electronic device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN107911818A (en) | 2018-04-13 |
| CN107911818B (en) | 2021-07-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| RU2628488C2 (en) | Method, terminal device and server for nfc data transfer | |
| CN110417543B (en) | Data encryption method, device and storage medium | |
| WO2019128179A1 (en) | Method and apparatus for data transmission between mobile terminals, and mobile terminal | |
| TWI512525B (en) | Method and system for associating two terminals with each other, terminal and computer-readable storage medium | |
| WO2015101273A1 (en) | Security verification method, and related device and system | |
| CN106658354B (en) | Data transmission method and equipment | |
| WO2018049886A1 (en) | Hotspot establishment method and terminal device | |
| WO2017185711A1 (en) | Method, apparatus and system for controlling smart device, and storage medium | |
| WO2016127795A1 (en) | Service processing method, server, and terminal | |
| CN106550361B (en) | Data transmission method, equipment and computer readable storage medium | |
| WO2018049893A1 (en) | Data transmission method and terminal device | |
| CN108288154A (en) | A kind of startup method, device and mobile terminal of payment application | |
| WO2018049971A1 (en) | Hotspot network switching method and terminals | |
| CN107423099B (en) | Key code programming method, server, terminal, key code programming system and storage medium | |
| EP2866187B1 (en) | Method, apparatus, and terminal device for transmitting NFC data | |
| WO2018049884A1 (en) | Data migration method and device | |
| WO2018049970A1 (en) | Hotspot network switching method and terminal | |
| CN107864086B (en) | Information rapid sharing method, mobile terminal and computer readable storage medium | |
| CN107948278B (en) | Information transmission method, terminal equipment and system | |
| CN106407771A (en) | Message management method and device | |
| CN106332058A (en) | A data transmission method and terminal equipment | |
| CN106792434B (en) | Hotspot establishing method and terminal equipment | |
| CN105703808A (en) | Method and device for transmitting data | |
| WO2018161538A1 (en) | Encryption key writing method and mobile terminal | |
| CN106507357A (en) | An access control method, and terminal equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18895347 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16/10/2020) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18895347 Country of ref document: EP Kind code of ref document: A1 |