CN105847272A - Method and device for personal information exchange - Google Patents
Method and device for personal information exchange Download PDFInfo
- Publication number
- CN105847272A CN105847272A CN201610250987.1A CN201610250987A CN105847272A CN 105847272 A CN105847272 A CN 105847272A CN 201610250987 A CN201610250987 A CN 201610250987A CN 105847272 A CN105847272 A CN 105847272A
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- authentication
- request
- personal information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to the field of information technologies, and discloses a method and a device for personal information exchange. The method is applied to a first terminal, and comprises the steps of: receiving an authentication request sent by a second terminal in a network; carrying out authentication verification on the second terminal which sends the authentication request; acquiring information for transmission from stored personal information when the second terminal which sends the authentication request passes the authentication verification; and sending the acquired information for transmission to the second terminal. The method and the device can complete personal information exchange conveniently, and increase efficiency of personal information exchange; moreover, since manual operation of inputting information into the terminal is avoided, errors caused by inputting the information manually are avoided, and correctness of the information in the terminal is increased.
Description
Technical field
The present invention relates to areas of information technology, in particular it relates to the method for a kind of personal information exchange and dress
Put.
Background technology
In the occasion that or commercial affairs private at some are got together, it usually needs carry out the exchange of personal information.At present
The mode being exchanged with each other business card is generally used to carry out.It is mutual that user carries out business card the most between any two.User
Also need to after receiving business card the information in business card be manually entered in terminal (such as, mobile phone).
The defect of the mode of existing exchange of personal information is, whole process needs user to manually complete,
Make the inefficient of the exchange of personal information between user.Further, behaviour information being manually entered in terminal
Easily cause typing mistake, add the error rate of personal information in terminal.
Summary of the invention
The method and apparatus that it is an object of the invention to provide personal information exchange, is used for solving the problems referred to above,
Solve the problems referred to above at least in part.
To achieve these goals, the present invention provides a kind of method that personal information exchanges, for first eventually
End, the method includes: receive the authentication request that in network, the second terminal sends;To sending authentication request
The second terminal carry out authentication verification;After the second terminal sending authentication request passes through authentication verification, from
The personal information of storage obtains the information for transmission;The information being used for transmission obtained is sent to institute
State the second terminal.
Preferably, described method also includes: after authentication verification completes, to described second terminal replies mirror
Power the result;Receive the second terminal to be sent when described authentication verification result instruction authentication verification is passed through
Exchange information request;Described after the second terminal sending authentication request passes through authentication verification, from storage
Personal information in obtain for transmission information include: when receive described second terminal send exchange
After information request, from the personal information of storage, obtain the information for transmission.
Preferably, described method also includes: parse the second terminal from the exchange information request received
The personal information of middle storage, stores described personal information.
Preferably, described method also includes: after described second terminal is by authentication verification, determines described
The authentication rank of the second terminal;Described acquisition from the personal information of storage includes for the information transmitted:
Obtain from the personal information of storage the information corresponding with the authentication rank of described second terminal as with
Information in transmission.
Preferably, described the second terminal to sending authentication request carries out authentication verification and includes following at least one
Person:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied
Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described
Second terminal passes through authentication verification.
Preferably, described the information being used for transmission obtained is sent to described second terminal includes: according to
It is sent to described second terminal after the information encryption being used for transmission that the cipher mode of configuration will obtain.
According to an aspect of the present invention, it is provided that the method for a kind of personal information exchange, for the second terminal,
The method includes: send authentication request;Receive first terminal receiving authentication request and confirming described the
Two terminals are by the personal information replied after authentication verification;The personal information replying first terminal is deposited
Storage.
Preferably, described method also includes: receives first terminal and is receiving authentication request and to the second end
The authentication verification result replied after having held authentication verification;The second terminal is indicated in described authentication verification result
During by authentication verification, send exchange information request to first terminal.
Preferably, described method also includes: carry in the second terminal in exchange information request storage
People's information;The described exchange information request that sends includes to first terminal: will hand over according to the cipher mode of configuration
It is sent to described second terminal after changing information request encryption.
According to another aspect of the invention, it is provided that the device of a kind of personal information exchange, for first eventually
End, this device includes: receiver module, for receiving the authentication request that in network, the second terminal sends;
Authentication module, for carrying out authentication verification to the second terminal sending authentication request;Acquisition module, is used for
After the second terminal sending authentication request passes through authentication verification, obtain from the personal information of storage and be used for
The information of transmission;Sending module, for being sent to described second terminal by the information being used for transmission obtained.
Preferably, described sending module is additionally operable to after authentication verification completes, to described second terminal replies
Authentication verification result;Described receiver module is additionally operable to receive the second terminal and indicates in described authentication verification result
The exchange information request sent when authentication verification is passed through;Described acquisition module is for when described receiver module
After receiving the exchange information request that described second terminal sends, obtain from the personal information of storage and be used for
The information of transmission.
Preferably, described device also includes: memory module, for the friendship received from described receiver module
Change and information request parses the personal information of storage in the second terminal, described personal information is stored.
Preferably, described authentication module is additionally operable to, after described second terminal is by authentication verification, determine institute
State the authentication rank of the second terminal;Described acquisition module obtains with described for the personal information from storage
The corresponding information of the authentication rank of the second terminal is as the information for transmission.
Preferably, described authentication module uses following at least one to authenticate:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied
Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described
Second terminal passes through authentication verification.
Preferably, the letter being used for transmission that described sending module will obtain for the cipher mode according to configuration
Described second terminal it is sent to after encryption for information.
Provide the device of a kind of personal information exchange according to another aspect of the invention, for the second terminal,
This device includes: information sending module, is used for sending authentication request;Information receiving module, is used for receiving
First terminal receive authentication request and confirm described second terminal by reply after authentication verification
People's information;Information storage module, stores for the personal information replying first terminal.
Preferably, described information receiving module is additionally operable to receive first terminal and is receiving authentication request right
The authentication verification result that second terminal is replied after completing authentication verification;Described information sending module is additionally operable to
When described authentication verification result indicates the second terminal by authentication verification, send exchange information request to first
Terminal.
Preferably, described information sending module is additionally operable to carry in the second terminal in exchange information request deposit
The personal information of storage, is sent to described second after exchange information request being encrypted according to the cipher mode of configuration
Terminal.
By technique scheme, the method includes receiving the authentication request that in network, the second terminal sends;
The second terminal sending authentication request is carried out authentication verification;When the second terminal sending authentication request is passed through
After authentication verification, from the personal information of storage, obtain the information for transmission;By obtain be used for transmit
Information be sent to the second terminal.So, it is possible to complete personal information exchange easily, improve individual's letter
The efficiency of breath exchange.Further, because avoiding the artificial operation of typing information in terminal, it is to avoid because of
The mistake caused by manual entry information, improves the correctness of information in terminal.
Other features and advantages of the present invention will be described in detail in detailed description of the invention part subsequently.
Accompanying drawing explanation
Accompanying drawing is used to provide a further understanding of the present invention, and constitutes the part of description, with
Detailed description below is used for explaining the present invention together, but is not intended that limitation of the present invention.?
In accompanying drawing:
Fig. 1 is the method that the personal information for first terminal according to an embodiment of the present invention exchanges
Flow chart;
Fig. 2 is the method that the personal information for first terminal according to an embodiment of the present invention exchanges
Flow chart;
Fig. 3 is the method that the personal information for the second terminal according to an embodiment of the present invention exchanges
Flow chart;
Fig. 4 is the stream of method of personal information exchange according to an embodiment of the present invention in application scenarios
Cheng Tu;
Fig. 5 is the device that the personal information for first terminal according to an embodiment of the present invention exchanges
Structure chart;
Fig. 6 is the device that the personal information for first terminal according to an embodiment of the present invention exchanges
Structure chart;And
Fig. 7 is the device that the personal information for the second terminal according to an embodiment of the present invention exchanges
Structure chart.
Detailed description of the invention
Below in conjunction with accompanying drawing, the detailed description of the invention of the present invention is described in detail.It should be appreciated that
Detailed description of the invention described herein is merely to illustrate and explains the present invention, is not limited to the present invention.
Fig. 1 is the flow chart of the method for personal information exchange according to an embodiment of the present invention.The method
Can be used for first terminal, such as mobile phone, panel computer etc., as described in Figure 1, the method can include as follows
Step.
In step s 110, the authentication request that in network, the second terminal sends is received.
For example, in the second accessing terminal to network, such as WLAN (WLAN), Ke Yi
Global challenge request in network.So, the first terminal in network receives the authentication that the second terminal sends
Request.Second terminal send authentication request mode be not limited to this, the second terminal can by any mode to
First terminal sends authentication request, for example with the mode of unicast or multicast.
The authentication request that second terminal is sent can include the information for authentication.
In the step s 120, the second terminal sending authentication request is carried out authentication verification.
Wherein it is possible to use various ways to carry out authentication verification.
In one embodiment, described the second terminal to sending authentication request carries out authentication verification and can include root
According to information included in authentication request, the second terminal is carried out authentication verification.
For example, in meeting-place, between user, agreement is for the password of personal information exchange, and user is at end
End (such as, first terminal and the second terminal) inputs this password.Second terminal is taken in authentication request
With this for the password of personal information exchange, send authentication request.After first terminal receives authentication request,
Compared with the password being used for personal information exchange of password in authentication request and user setup, when both
Timing, determines that the second terminal passes through authentication verification.
In one embodiment, described to send authentication request the second terminal carry out authentication verification can include by
Information included in authentication request is sent to server, receives the authentication verification result that server is replied.
For example, the second terminal can obtain the authentication card for personal information exchange by server from meeting-place
Book, the second terminal is carried this authentication certificate in authentication request, is sent authentication request.First terminal receives
After authentication request, therefrom parse authentication certificate, authentication certificate is sent to server, by server
Carry out authentication verification according to authentication certificate, and authentication verification result is replied to first terminal.First terminal
Authentication verification result according to receiving determines whether the second terminal passes through authentication verification.
In one embodiment, described the second terminal to sending authentication request carries out authentication verification and can include defeated
Go out authentication verification information, receive the authentication verification result of input.
For example, authentication request includes requesting party's relevant information (such as, requesting party's name, message
Deng), first terminal generates authentication verification information according to requesting party's relevant information, and at display module
(such as terminal panel) showing, (such as, xx says " xxxx " to this authentication verification information;Whether
Pass through authentication verification?) and " acceptance " button and " refusal " button are provided simultaneously." connect when user clicks on
Be subject to " button time, receive the second terminal by the authentication verification result of authentication verification;" refuse when user clicks on
Absolutely " during button, receive the second terminal not by the authentication verification result of authentication verification.
In one embodiment, described to send authentication request the second terminal carry out authentication verification can include work as
When second terminal of transmission authentication request is positioned at consolidated network with first terminal, determine that the second terminal is by mirror
Power checking.
For example, first terminal can determine that the according to the packet middle wrapping head of carrying authentication request received
Whether two terminals and described first terminal are positioned at consolidated network (such as, same WLAN).Such as, when
SSID (service set) corresponding to the second terminal is identical with the SSID of first terminal place WLAN,
Then determine that the second terminal and first terminal, in same WLAN, now, determine that the second terminal is by mirror
Power checking.
In step s 130, after the second terminal sending authentication request passes through authentication verification, from storage
Personal information in obtain for transmission information.
In one embodiment, described method may additionally include the second terminal by, after authentication verification, determining
The authentication rank of the second terminal;Described acquisition from the personal information of storage can include for the information transmitted
The information corresponding with the authentication rank of the second terminal is obtained as being used for passing from the personal information of storage
Defeated information.
For example, first terminal can include multinomial information in the personal information of storage, such as, name,
Academic title, unit one belongs to, office telephone, phone number, E-mail address, photo, previous graduate college etc..Right
In authentication verification, multiple authentication rank can be set.Such as, when according to the second terminal sending authentication request
When being positioned at consolidated network with first terminal and confirm the second terminal by authentication verification, determine the second terminal
Authentication rank is rudimentary;When determining that the second terminal authentication checking is logical according to information included in authentication request
Out-of-date, determine that the authentication rank of the second terminal is middle rank;When the authentication replied according to the server received is tested
Card result determines when the second terminal authentication is verified, and determines that the authentication rank of the second terminal is senior.Respectively
Individual authentication rank has a personal information item of correspondence, such as, rudimentary corresponding personal information comprise the steps that name,
Academic title, unit one belongs to, office telephone;The corresponding personal information of middle rank comprises the steps that name, academic title, place
Unit, office telephone, phone number, E-mail address;The whole personal information of senior correspondence, i.e. name,
Academic title, unit one belongs to, office telephone, phone number, E-mail address, photo, previous graduate college.First
Terminal obtain from the personal information of storage the information corresponding with the authentication rank of the second terminal as with
Information in transmission.
In addition it is also possible to determine the authentication rank of the second terminal by the way of configuring, such as, second
After terminal authentication is verified, output authentication rank allocation window, " XX is tested by authentication in prompting
Card, please select the authentication rank of its correspondence ", optional authentication rank except can include rudimentary, intermediate,
Outside senior, may also include secret level, work level, regular grade.Such as, personal information includes: name,
Academic title, unit one belongs to, office telephone, phone number, E-mail address, photo, previous graduate college, the birthday,
Blood group, home address.Work level correspondence personal information includes: name, academic title, unit one belongs to, office
Phone;Regular grade correspondence personal information includes: name, unit one belongs to, office telephone, phone number,
E-mail address, photo;Secret level correspondence personal information includes: name, unit one belongs to, phone number,
E-mail address, photo, previous graduate college, birthday, blood group, home address.First terminal is individual from store
People's information obtains the information corresponding with the authentication rank of the second terminal as the information for transmission.
Corresponding relation between the classification of above-mentioned authentication rank, and authentication rank and personal information is merely illustrative
Property explanation, in the case of being that the spirit of the present invention is consistent, the classification of any authentication rank can be used,
And the corresponding relation between authentication rank and personal information.
In step S140, the information being used for transmission obtained is sent to the second terminal.
In one embodiment, described the information being used for transmission obtained is sent to described terminal comprises the steps that
It is sent to the second terminal after the information encryption being used for transmission that cipher mode according to configuration will obtain.
By using cipher mode to carry out personal information transmission, ensure the peace of exchange of personal information further
Quan Xing.
Fig. 2 is the flow chart of the method for personal information exchange according to an embodiment of the present invention.The method
Can be used for first terminal, such as mobile phone, panel computer etc., as described in Figure 2, the method can include as follows
Step.
In step S210, receive the authentication request that in network, the second terminal sends.
In step S220, the second terminal sending authentication request is carried out authentication verification.
In step S230, after authentication verification completes, to the second terminal replies authentication verification result.
In step S240, receive the second terminal and pass through time institute in authentication verification result instruction authentication verification
The exchange information request sent.
Wherein, exchange information request can include the personal information of storage in the second terminal.
In one embodiment, method may also include and parses second from the exchange information request received
In terminal, the personal information of storage, stores personal information.
In step s 250, from the personal information of storage, the information for transmission is obtained.
In step S260, the information being used for transmission obtained is sent to the second terminal.
For example, first terminal receives the authentication request that in network, the second terminal sends, to sending mirror
Second terminal of power request carries out authentication verification, and aforementioned either type can be used to carry out authentication verification.Work as mirror
After power checking completes, first terminal is to the second terminal replies authentication verification result.Second terminal is receiving
Authentication verification result after determining by the authentication verification of first terminal, sends and includes storing in the second terminal
The exchange information request of personal information, exchange information request can include personal information in the second terminal
Completely or partially.Such as, user, before proceeding by personal information exchange, arranges friendship in the second terminal
Changing rank, each switch-level has the personal information of correspondence, according to the switch-level arranged at exchange letter
Breath request is carried the personal information of correspondence.First terminal parses from the exchange information request received
In second terminal, the personal information of storage, stores personal information, such as by user in the second terminal
Personal information storage in address list.After receiving the exchange information request that the second terminal sends, the
One terminal obtains the information for transmission from the personal information of the local user of storage, such as, may determine that
The authentication rank of the second terminal, obtains corresponding personal information as the letter for transmission according to authentication rank
Breath.First terminal can use the cipher mode of configuration that the information being used for transmission obtained is sent to second eventually
End.Second terminal is it is thus possible to the user profile that receives in first terminal storing.
Fig. 3 is the flow chart of the method for personal information exchange according to an embodiment of the present invention.The method
Can be used for the second terminal, such as mobile phone, panel computer etc., as described in Figure 3, the method can include as follows
Step.
In step S310, send authentication request.
As it was previously stated, in the second accessing terminal to network, such as WLAN (WLAN), Ke Yi
Global challenge request in network.So, the first terminal in network receives the authentication that the second terminal sends
Request.Second terminal sends authentication request also by other modes to first terminal, for example with clean culture
Or the mode of multicast.
In step s 320, receive first terminal receiving authentication request and confirming that the second terminal is passed through
The personal information replied after authentication verification.
After first terminal receives the authentication request that the second terminal sends, carry out authentication, authentication
By rear, from the personal information of storage, obtain information, the information of acquisition is sent to the second terminal, the
Two terminals thus obtain in first terminal the part or all of of the personal information of the transmission of storage.When first is whole
When end uses cipher mode transmission personal information, the second terminal can use the manner of decryption of correspondence to be decrypted
Obtain personal information.On the premise of consistent with the purport of present invention spirit, any in this area add
Manner of decryption can be used, and this is not particularly limited by the present invention.
In step S330, the personal information replying first terminal stores.
Personal information in the first terminal that second end-on is received stores, and is possibly stored to address list
In, it is also possible to store in special good friend record, also can carry out in the way of electronic business card by arranging format
Storage.
In one embodiment, described method may also include reception first terminal and receiving authentication request right
The authentication verification result that second terminal is replied after completing authentication verification;In described authentication verification result instruction the
When two terminals are by authentication verification, send exchange information request to first terminal.
Further, method carries the individual of storage in the second terminal in may additionally include exchange information request
Information;To first terminal, the described exchange information request that sends can include that the cipher mode according to configuration will exchange
It is sent to the second terminal after information request encryption.
Locally stored personal information can also be sent to first by exchange information request by the second terminal
Terminal so that first terminal obtains the personal information in the second terminal and stores.And, first eventually
End can also obtain after receiving the exchange information request that the second terminal sends from the personal information of storage
The information of obtaining, sends it to the second terminal.So, it is possible to achieve first terminal and the second terminal room both sides
Personal information exchange, and be not only that personal information is exchanged to the second terminal by first terminal.
Fig. 4 is the stream of method of personal information exchange according to an embodiment of the present invention in application scenarios
Cheng Tu.For making technical scheme readily appreciate, below from two terminals, first terminal and second
Terminal room, the angle interacting operation is described.As shown in Figure 4, it may include following steps.
In step S402, the second terminal sends authentication request to first terminal.In step s 404,
After first terminal receives authentication request, the second terminal is carried out authentication verification, and by authentication verification result
It is sent to the second terminal.In this application scene, authentication verification result is for passing through authentication verification.In step
In S406, the second terminal, after determining that authentication verification result is for by checking, uses cipher mode to the
One terminal sends exchange information request, and exchange information request includes the personal information of storage in the second terminal.
In step S408, first terminal receives exchange information request, determines the authentication that the second terminal is corresponding
Rank, obtains the information corresponding with the authentication rank of the second terminal from the personal information of storage.In step
In rapid S410, first terminal uses cipher mode to send information to the second terminal.In step S412,
Second terminal receives the information that first terminal sends, and stores this information.In step S414,
Personal information in the second terminal included in exchange information request is stored by first terminal.
Use technical scheme in present embodiment, it is achieved that terminal room personal information is exchanged with each other automatically, carries
The high efficiency of personal information exchange, and avoid the mistake that personal information causes because being manually entered.
Fig. 5 is the structure chart of the device of personal information exchange according to an embodiment of the present invention.For
One terminal, such as mobile phone, panel computer etc., as it is shown in figure 5, this device can include such as lower module.
Receiver module 510, for receiving the authentication request that in network, the second terminal sends.Authentication module
520, for the second terminal sending authentication request is carried out authentication verification.Acquisition module 530, for working as
Second terminal of transmission authentication request, by after authentication verification, obtains from the personal information of storage and is used for passing
Defeated information.Sending module 540, for being sent to described second eventually by the information being used for transmission obtained
End.
In one embodiment, sending module 540 is additionally operable to after authentication verification completes, to described second eventually
End replys authentication verification result;Receiver module 510 is additionally operable to receive the second terminal and ties in described authentication verification
The exchange information request that fruit instruction authentication verification is sent when passing through;Acquisition module 530 is for when receiving mould
After block 510 receives the exchange information request that described second terminal sends, obtain from the personal information of storage
Take in the information of transmission.
In one embodiment, as shown in Figure 6, device also includes memory module 610, for from receiving mould
The exchange information request that block 510 receives parses the personal information of storage in the second terminal, by described
Personal information stores.
In one embodiment, authentication module 520 is additionally operable to, after the second terminal is by authentication verification, determine
The authentication rank of described second terminal;Acquisition module 530 obtains and institute for the personal information from storage
State the corresponding information of the authentication rank of the second terminal as the information for transmission.
In one embodiment, authentication module 520 uses following at least one to authenticate:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied
Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described
Second terminal passes through authentication verification.
In one embodiment, being used for of obtaining is passed by sending module 540 for the cipher mode according to configuration
It is sent to described second terminal after defeated information encryption.
Said apparatus is corresponding with preceding method, and detailed description of the invention can be found in preceding method and describes in detail,
Do not repeat them here.
Fig. 7 is the structure chart of the device of personal information exchange according to an embodiment of the present invention.For
Two terminals, such as mobile phone, panel computer etc., as it is shown in fig. 7, this device can include such as lower module.
Information sending module 710, is used for sending authentication request;Information receiving module 720, is used for receiving
First terminal receive authentication request and confirm described second terminal by reply after authentication verification
People's information;Information storage module 730, stores for the personal information replying first terminal.
In one embodiment, information receiving module 720 be additionally operable to receive first terminal receive authentication please
The authentication verification result replied after asking and the second terminal being completed authentication verification;Information sending module 710 is also
For when described authentication verification result indicates the second terminal by authentication verification, send exchange information request
To first terminal.
In one embodiment, information sending module 710 is additionally operable to carry second eventually in exchange information request
The personal information of storage in end, is sent to institute after exchange information request being encrypted according to the cipher mode of configuration
State the second terminal.
Said apparatus is corresponding with preceding method, and detailed description of the invention can be found in preceding method and describes in detail,
Do not repeat them here.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention does not limit
Detail in above-mentioned embodiment, in the technology concept of the present invention, can be to the present invention
Technical scheme carry out multiple simple variant, these simple variant belong to protection scope of the present invention.
It is further to note that each the concrete technical characteristic described in above-mentioned detailed description of the invention,
In the case of reconcilable, can be combined by any suitable means, in order to avoid unnecessary
Repeating, various possible compound modes are illustrated by the present invention the most separately.
Additionally, combination in any can also be carried out between the various different embodiment of the present invention, as long as its
Without prejudice to the thought of the present invention, it should be considered as content disclosed in this invention equally.
Claims (18)
1. a method for personal information exchange, for first terminal, the method includes:
Receive the authentication request that in network, the second terminal sends;
The second terminal sending authentication request is carried out authentication verification;
After the second terminal sending authentication request passes through authentication verification, obtain from the personal information of storage
Information for transmission;
The information being used for transmission obtained is sent to described second terminal.
Method the most according to claim 1, it is characterised in that described method also includes:
After authentication verification completes, to described second terminal replies authentication verification result;
Receive the exchange that the second terminal is sent when described authentication verification result instruction authentication verification is passed through
Information request;
Described after the second terminal sending authentication request passes through authentication verification, from the personal information of storage
The information for transmission that obtains includes:
After receiving the exchange information request that described second terminal sends, obtain from the personal information of storage
Take in the information of transmission.
Method the most according to claim 2, it is characterised in that described method also includes:
The personal information of storage in the second terminal is parsed, by described from the exchange information request received
Personal information stores.
Method the most according to claim 1, it is characterised in that described method also includes:
After described second terminal is by authentication verification, determine the authentication rank of described second terminal;
Described acquisition from the personal information of storage includes for the information transmitted:
From the personal information of storage, obtain the information corresponding with the authentication rank of described second terminal make
For the information for transmission.
Method the most according to claim 1, it is characterised in that described to sending authentication request
Second terminal carries out authentication verification and includes following at least one:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied
Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described
Second terminal passes through authentication verification.
6. according to the arbitrary described method of claim 1 to 5, it is characterised in that described will obtain
Information for transmission is sent to described second terminal and includes:
It is sent to described second after the information encryption being used for transmission that cipher mode according to configuration will obtain
Terminal.
7. a method for personal information exchange, for the second terminal, the method includes:
Send authentication request;
Receive first terminal after receiving authentication request and confirming that described second terminal is by authentication verification
The personal information replied;
The personal information replying first terminal stores.
Method the most according to claim 7, it is characterised in that described method also includes:
Receive what first terminal was replied after receiving authentication request and the second terminal is completed authentication verification
Authentication verification result;
When described authentication verification result indicates the second terminal by authentication verification, send exchange information request
To first terminal.
Method the most according to claim 8, it is characterised in that described method also includes:
The personal information of storage in the second terminal is carried in exchange information request;
The described exchange information request that sends includes to first terminal:
Cipher mode according to configuration is sent to described second terminal after exchange information request being encrypted.
10. a device for personal information exchange, for first terminal, this device includes:
Receiver module, for receiving the authentication request that in network, the second terminal sends;
Authentication module, for carrying out authentication verification to the second terminal sending authentication request;
Acquisition module, after passing through authentication verification when the second terminal sending authentication request, from storage
Personal information obtains the information for transmission;
Sending module, for being sent to described second terminal by the information being used for transmission obtained.
11. devices according to claim 10, it is characterised in that described sending module is additionally operable to
After authentication verification completes, to described second terminal replies authentication verification result;
Described receiver module is additionally operable to receive the second terminal and indicates authentication verification in described authentication verification result
By time the exchange information request that sent;
Described acquisition module is for receiving, when described receiver module, the exchange letter that described second terminal sends
After breath request, from the personal information of storage, obtain the information for transmission.
12. devices according to claim 11, it is characterised in that described device also includes:
Memory module, for parsing second eventually from the exchange information request that described receiver module receives
In end, the personal information of storage, stores described personal information.
13. devices according to claim 10, it is characterised in that described authentication module is additionally operable to
After described second terminal is by authentication verification, determine the authentication rank of described second terminal;
Described acquisition module obtains the authentication level with described second terminal for the personal information from storage
Not corresponding information is as the information for transmission.
14. devices according to claim 10, it is characterised in that described authentication module uses such as
Lower at least one authenticates:
According to information included in authentication request, described second terminal is carried out authentication verification;Or
Information included in authentication request is sent to server, receives the authentication verification that server is replied
Result;Or
Output authentication verification information, receives the authentication verification result of input;Or
When the second terminal sending authentication request is positioned at consolidated network with described first terminal, determine described
Second terminal passes through authentication verification.
15. according to the arbitrary described device of claim 10 to 14, it is characterised in that described transmission mould
Block is sent to described the after the information encryption being used for transmission that the cipher mode according to configuration will obtain
Two terminals.
The device of 16. 1 kinds of personal information exchanges, for the second terminal, this device includes:
Information sending module, is used for sending authentication request;
Information receiving module, is used for receiving first terminal and is receiving authentication request and confirming described second eventually
Hold the personal information by replying after authentication verification;
Information storage module, stores for the personal information replying first terminal.
17. devices according to claim 16, it is characterised in that described information receiving module is also
For receiving what first terminal was replied after receiving authentication request and the second terminal is completed authentication verification
Authentication verification result;Described information sending module is additionally operable to indicate the second terminal in described authentication verification result
During by authentication verification, send exchange information request to first terminal.
18. device according to claim 17, it is characterised in that described information sending module is also
For carrying the personal information of storage in the second terminal in exchange information request, according to the encryption side of configuration
Formula is sent to described second terminal after exchange information request being encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610250987.1A CN105847272A (en) | 2016-04-21 | 2016-04-21 | Method and device for personal information exchange |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610250987.1A CN105847272A (en) | 2016-04-21 | 2016-04-21 | Method and device for personal information exchange |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105847272A true CN105847272A (en) | 2016-08-10 |
Family
ID=56590133
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610250987.1A Pending CN105847272A (en) | 2016-04-21 | 2016-04-21 | Method and device for personal information exchange |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105847272A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227636A (en) * | 2007-01-17 | 2008-07-23 | ***通信集团公司 | Information sharing method |
CN101360142A (en) * | 2008-08-29 | 2009-02-04 | 深圳华为通信技术有限公司 | Method and terminal for information exchange |
CN104125485A (en) * | 2014-07-02 | 2014-10-29 | 深圳创维数字技术股份有限公司 | Method, equipment and system for sharing user information |
CN104539422A (en) * | 2014-12-01 | 2015-04-22 | 魅族科技(中国)有限公司 | Authentication control method for application client, server and terminals |
CN104580103A (en) * | 2013-10-24 | 2015-04-29 | 中国电信股份有限公司 | Method and system of exchanging electronic identification cards |
-
2016
- 2016-04-21 CN CN201610250987.1A patent/CN105847272A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227636A (en) * | 2007-01-17 | 2008-07-23 | ***通信集团公司 | Information sharing method |
CN101360142A (en) * | 2008-08-29 | 2009-02-04 | 深圳华为通信技术有限公司 | Method and terminal for information exchange |
CN104580103A (en) * | 2013-10-24 | 2015-04-29 | 中国电信股份有限公司 | Method and system of exchanging electronic identification cards |
CN104125485A (en) * | 2014-07-02 | 2014-10-29 | 深圳创维数字技术股份有限公司 | Method, equipment and system for sharing user information |
CN104539422A (en) * | 2014-12-01 | 2015-04-22 | 魅族科技(中国)有限公司 | Authentication control method for application client, server and terminals |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104378145B (en) | The matching method and system of bluetooth equipment | |
CN107040922B (en) | Wireless network connecting method, apparatus and system | |
CN101005359B (en) | Method and device for realizing safety communication between terminal devices | |
CN104767715B (en) | Access control method and equipment | |
CN104836787B (en) | System and method for Authentication Client website | |
CN103039053B (en) | For the method and apparatus using the secure registration of the groups of clients of single registration process | |
US8356179B2 (en) | Entity bi-directional identificator method and system based on trustable third party | |
CN101478753B (en) | Security management method and system for IMS network access by WAPI terminal | |
CN103124266B (en) | Mobile terminal and carry out the method, system and the cloud server that log in by it | |
JP4170912B2 (en) | Use of public key pairs at terminals to authenticate and authorize telecommunications subscribers to network providers and business partners | |
CN107733852A (en) | A kind of auth method and device, electronic equipment | |
US20180034635A1 (en) | GPRS System Key Enhancement Method, SGSN Device, UE, HLR/HSS, and GPRS System | |
CN106302391A (en) | A kind of enciphered data transmission method and proxy server | |
CN103037366B (en) | Mobile phone users authentication method based on asymmetric cryptographic technique and mobile terminal | |
CN104735027B (en) | A kind of safety certifying method and authentication server | |
JP2016506152A (en) | Device authentication by tagging | |
CN101401465A (en) | Method and system for recursive authentication in a mobile network | |
US20120284335A1 (en) | Methods and Systems For Associating Users Through Network Societies | |
WO2021047276A1 (en) | Key generation method and device | |
CN101946455A (en) | One-pass authentication mechanism and system for heterogeneous networks | |
CN101309143A (en) | Method and system for interactive sharing data between mobile terminals | |
CN102143492B (en) | Method for establishing virtual private network (VPN) connection, mobile terminal and server | |
CN112640387B (en) | non-SI device, method, and computer readable and/or microprocessor executable medium for wireless connection | |
CN107086979A (en) | A kind of user terminal method for verifying login and device | |
CN109495503A (en) | A kind of SSL VPN authentication method, client, server and gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160810 |