CN105847272A - Method and device for personal information exchange - Google Patents

Method and device for personal information exchange Download PDF

Info

Publication number
CN105847272A
CN105847272A CN201610250987.1A CN201610250987A CN105847272A CN 105847272 A CN105847272 A CN 105847272A CN 201610250987 A CN201610250987 A CN 201610250987A CN 105847272 A CN105847272 A CN 105847272A
Authority
CN
China
Prior art keywords
terminal
information
authentication
request
personal information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610250987.1A
Other languages
Chinese (zh)
Inventor
马宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610250987.1A priority Critical patent/CN105847272A/en
Publication of CN105847272A publication Critical patent/CN105847272A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to the field of information technologies, and discloses a method and a device for personal information exchange. The method is applied to a first terminal, and comprises the steps of: receiving an authentication request sent by a second terminal in a network; carrying out authentication verification on the second terminal which sends the authentication request; acquiring information for transmission from stored personal information when the second terminal which sends the authentication request passes the authentication verification; and sending the acquired information for transmission to the second terminal. The method and the device can complete personal information exchange conveniently, and increase efficiency of personal information exchange; moreover, since manual operation of inputting information into the terminal is avoided, errors caused by inputting the information manually are avoided, and correctness of the information in the terminal is increased.

Description

The method and apparatus of personal information exchange
Technical field
The present invention relates to areas of information technology, in particular it relates to the method for a kind of personal information exchange and dress Put.
Background technology
In the occasion that or commercial affairs private at some are got together, it usually needs carry out the exchange of personal information.At present The mode being exchanged with each other business card is generally used to carry out.It is mutual that user carries out business card the most between any two.User Also need to after receiving business card the information in business card be manually entered in terminal (such as, mobile phone).
The defect of the mode of existing exchange of personal information is, whole process needs user to manually complete, Make the inefficient of the exchange of personal information between user.Further, behaviour information being manually entered in terminal Easily cause typing mistake, add the error rate of personal information in terminal.
Summary of the invention
The method and apparatus that it is an object of the invention to provide personal information exchange, is used for solving the problems referred to above, Solve the problems referred to above at least in part.
To achieve these goals, the present invention provides a kind of method that personal information exchanges, for first eventually End, the method includes: receive the authentication request that in network, the second terminal sends;To sending authentication request The second terminal carry out authentication verification;After the second terminal sending authentication request passes through authentication verification, from The personal information of storage obtains the information for transmission;The information being used for transmission obtained is sent to institute State the second terminal.
Preferably, described method also includes: after authentication verification completes, to described second terminal replies mirror Power the result;Receive the second terminal to be sent when described authentication verification result instruction authentication verification is passed through Exchange information request;Described after the second terminal sending authentication request passes through authentication verification, from storage Personal information in obtain for transmission information include: when receive described second terminal send exchange After information request, from the personal information of storage, obtain the information for transmission.
Preferably, described method also includes: parse the second terminal from the exchange information request received The personal information of middle storage, stores described personal information.
Preferably, described method also includes: after described second terminal is by authentication verification, determines described The authentication rank of the second terminal;Described acquisition from the personal information of storage includes for the information transmitted: Obtain from the personal information of storage the information corresponding with the authentication rank of described second terminal as with Information in transmission.
Preferably, described the second terminal to sending authentication request carries out authentication verification and includes following at least one Person:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described Second terminal passes through authentication verification.
Preferably, described the information being used for transmission obtained is sent to described second terminal includes: according to It is sent to described second terminal after the information encryption being used for transmission that the cipher mode of configuration will obtain.
According to an aspect of the present invention, it is provided that the method for a kind of personal information exchange, for the second terminal, The method includes: send authentication request;Receive first terminal receiving authentication request and confirming described the Two terminals are by the personal information replied after authentication verification;The personal information replying first terminal is deposited Storage.
Preferably, described method also includes: receives first terminal and is receiving authentication request and to the second end The authentication verification result replied after having held authentication verification;The second terminal is indicated in described authentication verification result During by authentication verification, send exchange information request to first terminal.
Preferably, described method also includes: carry in the second terminal in exchange information request storage People's information;The described exchange information request that sends includes to first terminal: will hand over according to the cipher mode of configuration It is sent to described second terminal after changing information request encryption.
According to another aspect of the invention, it is provided that the device of a kind of personal information exchange, for first eventually End, this device includes: receiver module, for receiving the authentication request that in network, the second terminal sends; Authentication module, for carrying out authentication verification to the second terminal sending authentication request;Acquisition module, is used for After the second terminal sending authentication request passes through authentication verification, obtain from the personal information of storage and be used for The information of transmission;Sending module, for being sent to described second terminal by the information being used for transmission obtained.
Preferably, described sending module is additionally operable to after authentication verification completes, to described second terminal replies Authentication verification result;Described receiver module is additionally operable to receive the second terminal and indicates in described authentication verification result The exchange information request sent when authentication verification is passed through;Described acquisition module is for when described receiver module After receiving the exchange information request that described second terminal sends, obtain from the personal information of storage and be used for The information of transmission.
Preferably, described device also includes: memory module, for the friendship received from described receiver module Change and information request parses the personal information of storage in the second terminal, described personal information is stored.
Preferably, described authentication module is additionally operable to, after described second terminal is by authentication verification, determine institute State the authentication rank of the second terminal;Described acquisition module obtains with described for the personal information from storage The corresponding information of the authentication rank of the second terminal is as the information for transmission.
Preferably, described authentication module uses following at least one to authenticate:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described Second terminal passes through authentication verification.
Preferably, the letter being used for transmission that described sending module will obtain for the cipher mode according to configuration Described second terminal it is sent to after encryption for information.
Provide the device of a kind of personal information exchange according to another aspect of the invention, for the second terminal, This device includes: information sending module, is used for sending authentication request;Information receiving module, is used for receiving First terminal receive authentication request and confirm described second terminal by reply after authentication verification People's information;Information storage module, stores for the personal information replying first terminal.
Preferably, described information receiving module is additionally operable to receive first terminal and is receiving authentication request right The authentication verification result that second terminal is replied after completing authentication verification;Described information sending module is additionally operable to When described authentication verification result indicates the second terminal by authentication verification, send exchange information request to first Terminal.
Preferably, described information sending module is additionally operable to carry in the second terminal in exchange information request deposit The personal information of storage, is sent to described second after exchange information request being encrypted according to the cipher mode of configuration Terminal.
By technique scheme, the method includes receiving the authentication request that in network, the second terminal sends; The second terminal sending authentication request is carried out authentication verification;When the second terminal sending authentication request is passed through After authentication verification, from the personal information of storage, obtain the information for transmission;By obtain be used for transmit Information be sent to the second terminal.So, it is possible to complete personal information exchange easily, improve individual's letter The efficiency of breath exchange.Further, because avoiding the artificial operation of typing information in terminal, it is to avoid because of The mistake caused by manual entry information, improves the correctness of information in terminal.
Other features and advantages of the present invention will be described in detail in detailed description of the invention part subsequently.
Accompanying drawing explanation
Accompanying drawing is used to provide a further understanding of the present invention, and constitutes the part of description, with Detailed description below is used for explaining the present invention together, but is not intended that limitation of the present invention.? In accompanying drawing:
Fig. 1 is the method that the personal information for first terminal according to an embodiment of the present invention exchanges Flow chart;
Fig. 2 is the method that the personal information for first terminal according to an embodiment of the present invention exchanges Flow chart;
Fig. 3 is the method that the personal information for the second terminal according to an embodiment of the present invention exchanges Flow chart;
Fig. 4 is the stream of method of personal information exchange according to an embodiment of the present invention in application scenarios Cheng Tu;
Fig. 5 is the device that the personal information for first terminal according to an embodiment of the present invention exchanges Structure chart;
Fig. 6 is the device that the personal information for first terminal according to an embodiment of the present invention exchanges Structure chart;And
Fig. 7 is the device that the personal information for the second terminal according to an embodiment of the present invention exchanges Structure chart.
Detailed description of the invention
Below in conjunction with accompanying drawing, the detailed description of the invention of the present invention is described in detail.It should be appreciated that Detailed description of the invention described herein is merely to illustrate and explains the present invention, is not limited to the present invention.
Fig. 1 is the flow chart of the method for personal information exchange according to an embodiment of the present invention.The method Can be used for first terminal, such as mobile phone, panel computer etc., as described in Figure 1, the method can include as follows Step.
In step s 110, the authentication request that in network, the second terminal sends is received.
For example, in the second accessing terminal to network, such as WLAN (WLAN), Ke Yi Global challenge request in network.So, the first terminal in network receives the authentication that the second terminal sends Request.Second terminal send authentication request mode be not limited to this, the second terminal can by any mode to First terminal sends authentication request, for example with the mode of unicast or multicast.
The authentication request that second terminal is sent can include the information for authentication.
In the step s 120, the second terminal sending authentication request is carried out authentication verification.
Wherein it is possible to use various ways to carry out authentication verification.
In one embodiment, described the second terminal to sending authentication request carries out authentication verification and can include root According to information included in authentication request, the second terminal is carried out authentication verification.
For example, in meeting-place, between user, agreement is for the password of personal information exchange, and user is at end End (such as, first terminal and the second terminal) inputs this password.Second terminal is taken in authentication request With this for the password of personal information exchange, send authentication request.After first terminal receives authentication request, Compared with the password being used for personal information exchange of password in authentication request and user setup, when both Timing, determines that the second terminal passes through authentication verification.
In one embodiment, described to send authentication request the second terminal carry out authentication verification can include by Information included in authentication request is sent to server, receives the authentication verification result that server is replied.
For example, the second terminal can obtain the authentication card for personal information exchange by server from meeting-place Book, the second terminal is carried this authentication certificate in authentication request, is sent authentication request.First terminal receives After authentication request, therefrom parse authentication certificate, authentication certificate is sent to server, by server Carry out authentication verification according to authentication certificate, and authentication verification result is replied to first terminal.First terminal Authentication verification result according to receiving determines whether the second terminal passes through authentication verification.
In one embodiment, described the second terminal to sending authentication request carries out authentication verification and can include defeated Go out authentication verification information, receive the authentication verification result of input.
For example, authentication request includes requesting party's relevant information (such as, requesting party's name, message Deng), first terminal generates authentication verification information according to requesting party's relevant information, and at display module (such as terminal panel) showing, (such as, xx says " xxxx " to this authentication verification information;Whether Pass through authentication verification?) and " acceptance " button and " refusal " button are provided simultaneously." connect when user clicks on Be subject to " button time, receive the second terminal by the authentication verification result of authentication verification;" refuse when user clicks on Absolutely " during button, receive the second terminal not by the authentication verification result of authentication verification.
In one embodiment, described to send authentication request the second terminal carry out authentication verification can include work as When second terminal of transmission authentication request is positioned at consolidated network with first terminal, determine that the second terminal is by mirror Power checking.
For example, first terminal can determine that the according to the packet middle wrapping head of carrying authentication request received Whether two terminals and described first terminal are positioned at consolidated network (such as, same WLAN).Such as, when SSID (service set) corresponding to the second terminal is identical with the SSID of first terminal place WLAN, Then determine that the second terminal and first terminal, in same WLAN, now, determine that the second terminal is by mirror Power checking.
In step s 130, after the second terminal sending authentication request passes through authentication verification, from storage Personal information in obtain for transmission information.
In one embodiment, described method may additionally include the second terminal by, after authentication verification, determining The authentication rank of the second terminal;Described acquisition from the personal information of storage can include for the information transmitted The information corresponding with the authentication rank of the second terminal is obtained as being used for passing from the personal information of storage Defeated information.
For example, first terminal can include multinomial information in the personal information of storage, such as, name, Academic title, unit one belongs to, office telephone, phone number, E-mail address, photo, previous graduate college etc..Right In authentication verification, multiple authentication rank can be set.Such as, when according to the second terminal sending authentication request When being positioned at consolidated network with first terminal and confirm the second terminal by authentication verification, determine the second terminal Authentication rank is rudimentary;When determining that the second terminal authentication checking is logical according to information included in authentication request Out-of-date, determine that the authentication rank of the second terminal is middle rank;When the authentication replied according to the server received is tested Card result determines when the second terminal authentication is verified, and determines that the authentication rank of the second terminal is senior.Respectively Individual authentication rank has a personal information item of correspondence, such as, rudimentary corresponding personal information comprise the steps that name, Academic title, unit one belongs to, office telephone;The corresponding personal information of middle rank comprises the steps that name, academic title, place Unit, office telephone, phone number, E-mail address;The whole personal information of senior correspondence, i.e. name, Academic title, unit one belongs to, office telephone, phone number, E-mail address, photo, previous graduate college.First Terminal obtain from the personal information of storage the information corresponding with the authentication rank of the second terminal as with Information in transmission.
In addition it is also possible to determine the authentication rank of the second terminal by the way of configuring, such as, second After terminal authentication is verified, output authentication rank allocation window, " XX is tested by authentication in prompting Card, please select the authentication rank of its correspondence ", optional authentication rank except can include rudimentary, intermediate, Outside senior, may also include secret level, work level, regular grade.Such as, personal information includes: name, Academic title, unit one belongs to, office telephone, phone number, E-mail address, photo, previous graduate college, the birthday, Blood group, home address.Work level correspondence personal information includes: name, academic title, unit one belongs to, office Phone;Regular grade correspondence personal information includes: name, unit one belongs to, office telephone, phone number, E-mail address, photo;Secret level correspondence personal information includes: name, unit one belongs to, phone number, E-mail address, photo, previous graduate college, birthday, blood group, home address.First terminal is individual from store People's information obtains the information corresponding with the authentication rank of the second terminal as the information for transmission.
Corresponding relation between the classification of above-mentioned authentication rank, and authentication rank and personal information is merely illustrative Property explanation, in the case of being that the spirit of the present invention is consistent, the classification of any authentication rank can be used, And the corresponding relation between authentication rank and personal information.
In step S140, the information being used for transmission obtained is sent to the second terminal.
In one embodiment, described the information being used for transmission obtained is sent to described terminal comprises the steps that It is sent to the second terminal after the information encryption being used for transmission that cipher mode according to configuration will obtain.
By using cipher mode to carry out personal information transmission, ensure the peace of exchange of personal information further Quan Xing.
Fig. 2 is the flow chart of the method for personal information exchange according to an embodiment of the present invention.The method Can be used for first terminal, such as mobile phone, panel computer etc., as described in Figure 2, the method can include as follows Step.
In step S210, receive the authentication request that in network, the second terminal sends.
In step S220, the second terminal sending authentication request is carried out authentication verification.
In step S230, after authentication verification completes, to the second terminal replies authentication verification result.
In step S240, receive the second terminal and pass through time institute in authentication verification result instruction authentication verification The exchange information request sent.
Wherein, exchange information request can include the personal information of storage in the second terminal.
In one embodiment, method may also include and parses second from the exchange information request received In terminal, the personal information of storage, stores personal information.
In step s 250, from the personal information of storage, the information for transmission is obtained.
In step S260, the information being used for transmission obtained is sent to the second terminal.
For example, first terminal receives the authentication request that in network, the second terminal sends, to sending mirror Second terminal of power request carries out authentication verification, and aforementioned either type can be used to carry out authentication verification.Work as mirror After power checking completes, first terminal is to the second terminal replies authentication verification result.Second terminal is receiving Authentication verification result after determining by the authentication verification of first terminal, sends and includes storing in the second terminal The exchange information request of personal information, exchange information request can include personal information in the second terminal Completely or partially.Such as, user, before proceeding by personal information exchange, arranges friendship in the second terminal Changing rank, each switch-level has the personal information of correspondence, according to the switch-level arranged at exchange letter Breath request is carried the personal information of correspondence.First terminal parses from the exchange information request received In second terminal, the personal information of storage, stores personal information, such as by user in the second terminal Personal information storage in address list.After receiving the exchange information request that the second terminal sends, the One terminal obtains the information for transmission from the personal information of the local user of storage, such as, may determine that The authentication rank of the second terminal, obtains corresponding personal information as the letter for transmission according to authentication rank Breath.First terminal can use the cipher mode of configuration that the information being used for transmission obtained is sent to second eventually End.Second terminal is it is thus possible to the user profile that receives in first terminal storing.
Fig. 3 is the flow chart of the method for personal information exchange according to an embodiment of the present invention.The method Can be used for the second terminal, such as mobile phone, panel computer etc., as described in Figure 3, the method can include as follows Step.
In step S310, send authentication request.
As it was previously stated, in the second accessing terminal to network, such as WLAN (WLAN), Ke Yi Global challenge request in network.So, the first terminal in network receives the authentication that the second terminal sends Request.Second terminal sends authentication request also by other modes to first terminal, for example with clean culture Or the mode of multicast.
In step s 320, receive first terminal receiving authentication request and confirming that the second terminal is passed through The personal information replied after authentication verification.
After first terminal receives the authentication request that the second terminal sends, carry out authentication, authentication By rear, from the personal information of storage, obtain information, the information of acquisition is sent to the second terminal, the Two terminals thus obtain in first terminal the part or all of of the personal information of the transmission of storage.When first is whole When end uses cipher mode transmission personal information, the second terminal can use the manner of decryption of correspondence to be decrypted Obtain personal information.On the premise of consistent with the purport of present invention spirit, any in this area add Manner of decryption can be used, and this is not particularly limited by the present invention.
In step S330, the personal information replying first terminal stores.
Personal information in the first terminal that second end-on is received stores, and is possibly stored to address list In, it is also possible to store in special good friend record, also can carry out in the way of electronic business card by arranging format Storage.
In one embodiment, described method may also include reception first terminal and receiving authentication request right The authentication verification result that second terminal is replied after completing authentication verification;In described authentication verification result instruction the When two terminals are by authentication verification, send exchange information request to first terminal.
Further, method carries the individual of storage in the second terminal in may additionally include exchange information request Information;To first terminal, the described exchange information request that sends can include that the cipher mode according to configuration will exchange It is sent to the second terminal after information request encryption.
Locally stored personal information can also be sent to first by exchange information request by the second terminal Terminal so that first terminal obtains the personal information in the second terminal and stores.And, first eventually End can also obtain after receiving the exchange information request that the second terminal sends from the personal information of storage The information of obtaining, sends it to the second terminal.So, it is possible to achieve first terminal and the second terminal room both sides Personal information exchange, and be not only that personal information is exchanged to the second terminal by first terminal.
Fig. 4 is the stream of method of personal information exchange according to an embodiment of the present invention in application scenarios Cheng Tu.For making technical scheme readily appreciate, below from two terminals, first terminal and second Terminal room, the angle interacting operation is described.As shown in Figure 4, it may include following steps.
In step S402, the second terminal sends authentication request to first terminal.In step s 404, After first terminal receives authentication request, the second terminal is carried out authentication verification, and by authentication verification result It is sent to the second terminal.In this application scene, authentication verification result is for passing through authentication verification.In step In S406, the second terminal, after determining that authentication verification result is for by checking, uses cipher mode to the One terminal sends exchange information request, and exchange information request includes the personal information of storage in the second terminal. In step S408, first terminal receives exchange information request, determines the authentication that the second terminal is corresponding Rank, obtains the information corresponding with the authentication rank of the second terminal from the personal information of storage.In step In rapid S410, first terminal uses cipher mode to send information to the second terminal.In step S412, Second terminal receives the information that first terminal sends, and stores this information.In step S414, Personal information in the second terminal included in exchange information request is stored by first terminal.
Use technical scheme in present embodiment, it is achieved that terminal room personal information is exchanged with each other automatically, carries The high efficiency of personal information exchange, and avoid the mistake that personal information causes because being manually entered.
Fig. 5 is the structure chart of the device of personal information exchange according to an embodiment of the present invention.For One terminal, such as mobile phone, panel computer etc., as it is shown in figure 5, this device can include such as lower module.
Receiver module 510, for receiving the authentication request that in network, the second terminal sends.Authentication module 520, for the second terminal sending authentication request is carried out authentication verification.Acquisition module 530, for working as Second terminal of transmission authentication request, by after authentication verification, obtains from the personal information of storage and is used for passing Defeated information.Sending module 540, for being sent to described second eventually by the information being used for transmission obtained End.
In one embodiment, sending module 540 is additionally operable to after authentication verification completes, to described second eventually End replys authentication verification result;Receiver module 510 is additionally operable to receive the second terminal and ties in described authentication verification The exchange information request that fruit instruction authentication verification is sent when passing through;Acquisition module 530 is for when receiving mould After block 510 receives the exchange information request that described second terminal sends, obtain from the personal information of storage Take in the information of transmission.
In one embodiment, as shown in Figure 6, device also includes memory module 610, for from receiving mould The exchange information request that block 510 receives parses the personal information of storage in the second terminal, by described Personal information stores.
In one embodiment, authentication module 520 is additionally operable to, after the second terminal is by authentication verification, determine The authentication rank of described second terminal;Acquisition module 530 obtains and institute for the personal information from storage State the corresponding information of the authentication rank of the second terminal as the information for transmission.
In one embodiment, authentication module 520 uses following at least one to authenticate:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described Second terminal passes through authentication verification.
In one embodiment, being used for of obtaining is passed by sending module 540 for the cipher mode according to configuration It is sent to described second terminal after defeated information encryption.
Said apparatus is corresponding with preceding method, and detailed description of the invention can be found in preceding method and describes in detail, Do not repeat them here.
Fig. 7 is the structure chart of the device of personal information exchange according to an embodiment of the present invention.For Two terminals, such as mobile phone, panel computer etc., as it is shown in fig. 7, this device can include such as lower module.
Information sending module 710, is used for sending authentication request;Information receiving module 720, is used for receiving First terminal receive authentication request and confirm described second terminal by reply after authentication verification People's information;Information storage module 730, stores for the personal information replying first terminal.
In one embodiment, information receiving module 720 be additionally operable to receive first terminal receive authentication please The authentication verification result replied after asking and the second terminal being completed authentication verification;Information sending module 710 is also For when described authentication verification result indicates the second terminal by authentication verification, send exchange information request To first terminal.
In one embodiment, information sending module 710 is additionally operable to carry second eventually in exchange information request The personal information of storage in end, is sent to institute after exchange information request being encrypted according to the cipher mode of configuration State the second terminal.
Said apparatus is corresponding with preceding method, and detailed description of the invention can be found in preceding method and describes in detail, Do not repeat them here.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention does not limit Detail in above-mentioned embodiment, in the technology concept of the present invention, can be to the present invention Technical scheme carry out multiple simple variant, these simple variant belong to protection scope of the present invention.
It is further to note that each the concrete technical characteristic described in above-mentioned detailed description of the invention, In the case of reconcilable, can be combined by any suitable means, in order to avoid unnecessary Repeating, various possible compound modes are illustrated by the present invention the most separately.
Additionally, combination in any can also be carried out between the various different embodiment of the present invention, as long as its Without prejudice to the thought of the present invention, it should be considered as content disclosed in this invention equally.

Claims (18)

1. a method for personal information exchange, for first terminal, the method includes:
Receive the authentication request that in network, the second terminal sends;
The second terminal sending authentication request is carried out authentication verification;
After the second terminal sending authentication request passes through authentication verification, obtain from the personal information of storage Information for transmission;
The information being used for transmission obtained is sent to described second terminal.
Method the most according to claim 1, it is characterised in that described method also includes:
After authentication verification completes, to described second terminal replies authentication verification result;
Receive the exchange that the second terminal is sent when described authentication verification result instruction authentication verification is passed through Information request;
Described after the second terminal sending authentication request passes through authentication verification, from the personal information of storage The information for transmission that obtains includes:
After receiving the exchange information request that described second terminal sends, obtain from the personal information of storage Take in the information of transmission.
Method the most according to claim 2, it is characterised in that described method also includes:
The personal information of storage in the second terminal is parsed, by described from the exchange information request received Personal information stores.
Method the most according to claim 1, it is characterised in that described method also includes:
After described second terminal is by authentication verification, determine the authentication rank of described second terminal;
Described acquisition from the personal information of storage includes for the information transmitted:
From the personal information of storage, obtain the information corresponding with the authentication rank of described second terminal make For the information for transmission.
Method the most according to claim 1, it is characterised in that described to sending authentication request Second terminal carries out authentication verification and includes following at least one:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described Second terminal passes through authentication verification.
6. according to the arbitrary described method of claim 1 to 5, it is characterised in that described will obtain Information for transmission is sent to described second terminal and includes:
It is sent to described second after the information encryption being used for transmission that cipher mode according to configuration will obtain Terminal.
7. a method for personal information exchange, for the second terminal, the method includes:
Send authentication request;
Receive first terminal after receiving authentication request and confirming that described second terminal is by authentication verification The personal information replied;
The personal information replying first terminal stores.
Method the most according to claim 7, it is characterised in that described method also includes:
Receive what first terminal was replied after receiving authentication request and the second terminal is completed authentication verification Authentication verification result;
When described authentication verification result indicates the second terminal by authentication verification, send exchange information request To first terminal.
Method the most according to claim 8, it is characterised in that described method also includes:
The personal information of storage in the second terminal is carried in exchange information request;
The described exchange information request that sends includes to first terminal:
Cipher mode according to configuration is sent to described second terminal after exchange information request being encrypted.
10. a device for personal information exchange, for first terminal, this device includes:
Receiver module, for receiving the authentication request that in network, the second terminal sends;
Authentication module, for carrying out authentication verification to the second terminal sending authentication request;
Acquisition module, after passing through authentication verification when the second terminal sending authentication request, from storage Personal information obtains the information for transmission;
Sending module, for being sent to described second terminal by the information being used for transmission obtained.
11. devices according to claim 10, it is characterised in that described sending module is additionally operable to After authentication verification completes, to described second terminal replies authentication verification result;
Described receiver module is additionally operable to receive the second terminal and indicates authentication verification in described authentication verification result By time the exchange information request that sent;
Described acquisition module is for receiving, when described receiver module, the exchange letter that described second terminal sends After breath request, from the personal information of storage, obtain the information for transmission.
12. devices according to claim 11, it is characterised in that described device also includes:
Memory module, for parsing second eventually from the exchange information request that described receiver module receives In end, the personal information of storage, stores described personal information.
13. devices according to claim 10, it is characterised in that described authentication module is additionally operable to After described second terminal is by authentication verification, determine the authentication rank of described second terminal;
Described acquisition module obtains the authentication level with described second terminal for the personal information from storage Not corresponding information is as the information for transmission.
14. devices according to claim 10, it is characterised in that described authentication module uses such as Lower at least one authenticates:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described Second terminal passes through authentication verification.
15. according to the arbitrary described device of claim 10 to 14, it is characterised in that described transmission mould Block is sent to described the after the information encryption being used for transmission that the cipher mode according to configuration will obtain Two terminals.
The device of 16. 1 kinds of personal information exchanges, for the second terminal, this device includes:
Information sending module, is used for sending authentication request;
Information receiving module, is used for receiving first terminal and is receiving authentication request and confirming described second eventually Hold the personal information by replying after authentication verification;
Information storage module, stores for the personal information replying first terminal.
17. devices according to claim 16, it is characterised in that described information receiving module is also For receiving what first terminal was replied after receiving authentication request and the second terminal is completed authentication verification Authentication verification result;Described information sending module is additionally operable to indicate the second terminal in described authentication verification result During by authentication verification, send exchange information request to first terminal.
18. device according to claim 17, it is characterised in that described information sending module is also For carrying the personal information of storage in the second terminal in exchange information request, according to the encryption side of configuration Formula is sent to described second terminal after exchange information request being encrypted.
CN201610250987.1A 2016-04-21 2016-04-21 Method and device for personal information exchange Pending CN105847272A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610250987.1A CN105847272A (en) 2016-04-21 2016-04-21 Method and device for personal information exchange

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610250987.1A CN105847272A (en) 2016-04-21 2016-04-21 Method and device for personal information exchange

Publications (1)

Publication Number Publication Date
CN105847272A true CN105847272A (en) 2016-08-10

Family

ID=56590133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610250987.1A Pending CN105847272A (en) 2016-04-21 2016-04-21 Method and device for personal information exchange

Country Status (1)

Country Link
CN (1) CN105847272A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227636A (en) * 2007-01-17 2008-07-23 ***通信集团公司 Information sharing method
CN101360142A (en) * 2008-08-29 2009-02-04 深圳华为通信技术有限公司 Method and terminal for information exchange
CN104125485A (en) * 2014-07-02 2014-10-29 深圳创维数字技术股份有限公司 Method, equipment and system for sharing user information
CN104539422A (en) * 2014-12-01 2015-04-22 魅族科技(中国)有限公司 Authentication control method for application client, server and terminals
CN104580103A (en) * 2013-10-24 2015-04-29 中国电信股份有限公司 Method and system of exchanging electronic identification cards

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227636A (en) * 2007-01-17 2008-07-23 ***通信集团公司 Information sharing method
CN101360142A (en) * 2008-08-29 2009-02-04 深圳华为通信技术有限公司 Method and terminal for information exchange
CN104580103A (en) * 2013-10-24 2015-04-29 中国电信股份有限公司 Method and system of exchanging electronic identification cards
CN104125485A (en) * 2014-07-02 2014-10-29 深圳创维数字技术股份有限公司 Method, equipment and system for sharing user information
CN104539422A (en) * 2014-12-01 2015-04-22 魅族科技(中国)有限公司 Authentication control method for application client, server and terminals

Similar Documents

Publication Publication Date Title
CN104378145B (en) The matching method and system of bluetooth equipment
CN107040922B (en) Wireless network connecting method, apparatus and system
CN101005359B (en) Method and device for realizing safety communication between terminal devices
CN104767715B (en) Access control method and equipment
CN104836787B (en) System and method for Authentication Client website
CN103039053B (en) For the method and apparatus using the secure registration of the groups of clients of single registration process
US8356179B2 (en) Entity bi-directional identificator method and system based on trustable third party
CN101478753B (en) Security management method and system for IMS network access by WAPI terminal
CN103124266B (en) Mobile terminal and carry out the method, system and the cloud server that log in by it
JP4170912B2 (en) Use of public key pairs at terminals to authenticate and authorize telecommunications subscribers to network providers and business partners
CN107733852A (en) A kind of auth method and device, electronic equipment
US20180034635A1 (en) GPRS System Key Enhancement Method, SGSN Device, UE, HLR/HSS, and GPRS System
CN106302391A (en) A kind of enciphered data transmission method and proxy server
CN103037366B (en) Mobile phone users authentication method based on asymmetric cryptographic technique and mobile terminal
CN104735027B (en) A kind of safety certifying method and authentication server
JP2016506152A (en) Device authentication by tagging
CN101401465A (en) Method and system for recursive authentication in a mobile network
US20120284335A1 (en) Methods and Systems For Associating Users Through Network Societies
WO2021047276A1 (en) Key generation method and device
CN101946455A (en) One-pass authentication mechanism and system for heterogeneous networks
CN101309143A (en) Method and system for interactive sharing data between mobile terminals
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN112640387B (en) non-SI device, method, and computer readable and/or microprocessor executable medium for wireless connection
CN107086979A (en) A kind of user terminal method for verifying login and device
CN109495503A (en) A kind of SSL VPN authentication method, client, server and gateway

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160810