CN106446110B - Method and device for realizing connection security of terminal moving - Google Patents

Method and device for realizing connection security of terminal moving Download PDF

Info

Publication number
CN106446110B
CN106446110B CN201610826598.9A CN201610826598A CN106446110B CN 106446110 B CN106446110 B CN 106446110B CN 201610826598 A CN201610826598 A CN 201610826598A CN 106446110 B CN106446110 B CN 106446110B
Authority
CN
China
Prior art keywords
password
terminal
moving
matched
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610826598.9A
Other languages
Chinese (zh)
Other versions
CN106446110A (en
Inventor
张海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610826598.9A priority Critical patent/CN106446110B/en
Publication of CN106446110A publication Critical patent/CN106446110A/en
Priority to PCT/CN2017/099191 priority patent/WO2018049975A1/en
Application granted granted Critical
Publication of CN106446110B publication Critical patent/CN106446110B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/119Details of migration of file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the field of communication, and provides a method and a device for realizing the connection security of terminal moving, wherein the method comprises the following steps: a communication request sent by a first terminal to a second terminal, wherein the communication request comprises: an indication of moving; the first terminal receives a communication response sent by the second terminal; the method comprises the steps that a first terminal receives a first password set by a user on a password setting page, and the first terminal sends a password input prompt to a second terminal; and the first terminal receives a second password sent by the second terminal, compares the first password with the second password, and sends the moving file to the second terminal if the first password is matched with the second password. The technical scheme provided by the invention has the advantage of good user experience.

Description

Method and device for realizing connection security of terminal moving
Technical Field
The invention relates to the field of communication, in particular to a method and a device for realizing the connection security of terminal moving.
Background
Terminals in the communication field, such as mobile phones, tablet computers and other devices, belong to devices commonly used by users, and since the devices all have their own operating systems at present, the terminals are also called smart terminals or smart phones, and smart phones (english: smartphones) are collective names for those mobile phones having higher computing power and functions than those of traditional functional mobile phones. The operating systems most used by smartphones are: windows Phone, Android, IOS and BlackBerry OS, but the application software between them is not compatible. The smart phones can be provided with third-party software like a personal computer, so that the functions of the smart phones are rich and the smart phones can be expanded continuously.
Existing terminals all have a function of storing files, such as: photos, texts, videos, address books and the like, along with the increasing styles of current smart phones and the increasing frequency of mobile phone replacement, data transfer after mobile phone replacement is commonly called as mobile phone moving, for the existing mobile phone moving, how to transfer files of an old mobile phone to a new mobile phone is a problem of headache, for example, the address book is used, the existing scheme is realized through third-party software, the existing mobile phone cannot guarantee the connection safety when moving, therefore, data leakage in the mobile phone can be caused when moving the mobile phone, and the user experience degree is low.
Disclosure of Invention
The invention aims to provide a method for realizing the security of terminal moving connection, which mainly solves the defect of low experience degree in the prior art.
In a first aspect, a method for implementing security of a terminal moving connection is provided, where the method includes the following steps:
a communication request sent by a first terminal to a second terminal, wherein the communication request comprises: an indication of moving;
the first terminal receives a communication response sent by the second terminal;
the method comprises the steps that a first terminal receives a first password set by a user on a password setting page, and the first terminal sends a password input prompt to a second terminal;
and the first terminal receives a second password sent by the second terminal, compares the first password with the second password, and sends the moving file to the second terminal if the first password is matched with the second password.
Optionally, the method further includes:
and if the first password is not matched with the second password, the first terminal does not send the moving file to the second terminal.
Optionally, the first password is a mathematical calculation formula, and the matching between the first password and the second password specifically includes:
and if the second password is consistent with the result of the mathematical calculation formula, determining that the second password is matched with the result of the mathematical calculation formula, and if the second password is not consistent with the result of the mathematical calculation formula, determining that the second password is not matched with the result of the mathematical calculation formula.
Optionally, the method further includes:
judging the importance of the moving file, prompting a user to input a third password before the first terminal sends the important moving file, sending a password input prompt to the second terminal, receiving a fourth password returned by the second terminal, and transmitting the important moving file if the fourth password is matched with the third password.
Optionally, the sending, by the first terminal, the password input prompt to the second terminal specifically includes:
and the first terminal periodically sends a password input prompt to the second terminal.
In a second aspect, a device for implementing connection security of a terminal when moving a home is provided, where the device is disposed in a first terminal, and the device includes:
a sending unit, configured to send a communication request to the second terminal, where the communication request includes: an indication of moving;
the receiving unit is used for receiving a communication response sent by the second terminal; receiving a first password set by a user on a password setting page;
the sending unit is also used for sending a password input prompt to the second terminal;
the receiving unit is further configured to receive a second password sent by a second terminal;
and the processing unit is used for comparing the first password with the second password, and if the first password is matched with the second password, the moving file is sent to the second terminal.
Optionally, the processing unit is further configured to, if the first password is not matched with the second password, the first terminal does not send the moving file to the second terminal.
Optionally, the first password is a mathematical calculation formula, and the processing unit is specifically configured to determine that the first password matches the mathematical calculation formula if the second password matches the mathematical calculation formula, and determine that the second password does not match the mathematical calculation formula if the second password does not match the mathematical calculation formula.
Optionally, the processing unit is further configured to determine the importance of the moving file, prompt the user to input a third password before sending the important moving file, send a password input prompt to the second terminal, receive a fourth password returned by the second terminal, and transmit the important moving file if it is determined that the fourth password is matched with the third password.
Optionally, the sending unit is specifically configured to send a password input prompt to the second terminal periodically.
In a third aspect, a terminal is provided, which comprises the device for implementing the security of moving connection of the terminal according to any one of claims 6 to 10.
It will be appreciated by those of ordinary skill in the art that although the following detailed description will proceed with reference being made to illustrative embodiments, the present invention is not intended to be limited to these embodiments. Rather, the scope of the invention is broad and is intended to be defined only by the claims appended hereto.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a method for implementing terminal moving connection security according to a preferred embodiment of the present invention.
Fig. 2 is a flowchart of a method for implementing terminal moving connection security according to another preferred embodiment of the present invention.
Fig. 3 is a block diagram of an apparatus for implementing terminal moving connection security according to a next preferred embodiment of the present invention.
Fig. 4 is a schematic diagram of a hardware structure of the terminal provided by the present invention.
Detailed Description
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel, concurrently, or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The term "computer device" or "computer" in this context refers to an intelligent electronic device that can execute predetermined processes such as numerical calculation and/or logic calculation by running predetermined programs or instructions, and may include a processor and a memory, wherein the processor executes a pre-stored instruction stored in the memory to execute the predetermined processes, or the predetermined processes are executed by hardware such as ASIC, FPGA, DSP, or a combination thereof. Computer devices include, but are not limited to, servers, personal computers, laptops, tablets, smart phones, and the like.
The methods discussed below, some of which are illustrated by flow diagrams, may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine or computer readable medium such as a storage medium. The processor(s) may perform the necessary tasks.
Specific structural and functional details disclosed herein are merely representative and are provided for purposes of describing example embodiments of the present invention. The present invention may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element may be termed a second element, and, similarly, a second element may be termed a first element, without departing from the scope of example embodiments. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be noted that, in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed substantially concurrently, or the figures may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
The present invention is described in further detail below with reference to the attached drawing figures.
According to one aspect of the invention, a method for realizing the security of the moving connection of the terminal is provided. The method is applied to a terminal, and the terminal includes but is not limited to: the smart phone comprises a server, a computer, a tablet computer, a smart phone and the like, and certainly, in practical application, devices such as a smart watch or a smart bracelet can be added.
In an embodiment, the method for implementing the security of the terminal moving connection may be used in a terminal, and it should be noted that the terminal is merely an example, and other existing or future network devices and user devices, if applicable to the present invention, should also be included in the scope of the present invention and are included herein by reference.
Referring to fig. 1, fig. 1 is a method for implementing terminal moving connection security according to a preferred embodiment of the present invention, where the method is implemented by a terminal, and the method is shown in fig. 1 and includes the following steps:
step S101, a first terminal sends a communication request to a second terminal, where the communication request includes: an indication of moving;
the communication request sent by the first terminal to the second terminal in step S101 may be Multiple communication requests, for example, in a specific aspect of a preferred embodiment of the present invention, the communication request sent by the first terminal to the second terminal may be a communication request sent by the first terminal through Wireless Fidelity (WIFI), and the structure and definition of the communication request may refer to specific definitions in IEEE802.1, which is not described herein again, and certainly in another specific aspect of a preferred embodiment of the present invention, the communication request sent by the first terminal to the second terminal may be a communication request sent by the first terminal through bluetooth, and certainly in practical applications, the communication request may also be sent by using other communication methods, for example, the communication request sent by the first terminal through long Term Evolution (L ong Term Evolution, L TE), and certainly the communication request sent by the first terminal through Code Division Multiple Access (CDMA) may also be sent by using Code Division Multiple Access (CDMA), and is not limited to the specific communication protocol of the present invention.
The value of the moving instruction may be: moving or not moving can be realized by one bit in the extension field in the communication request, for example, setting 1 as moving and 0 as not moving, but in practical application, the above setting can be reversed, for example, setting 0 as moving and 1 as not moving. In practical application, the moving indication may be provided in other manners, for example, a special field with a set length is carried, for example, 10 fields 1, 10 fields 0, 11 fields 1, or 12 fields 0, and only the first terminal and the second terminal need to be able to recognize each other.
Step S102, the first terminal receives a communication response sent by the second terminal;
the communication response sent by the second terminal and received by the first terminal in step S102 may be Multiple communication responses, for example, in a specific scheme of a preferred embodiment of the present invention, the communication response sent by the second terminal and received by the first terminal may be a communication response sent by the second terminal through Wireless Fidelity (WIFI), the structure and definition of the communication response may refer to specific definitions in IEEE802.1, which are not described herein, and of course, in another specific scheme of a preferred embodiment of the present invention, the communication response sent by the second terminal and received by the first terminal may be a communication response sent by the second terminal through bluetooth, and of course, in practical applications, the communication response may also be sent by using other communication modes, for example, the first terminal sends the communication response through long term evolution (L ong terminal evolution, &/gtt translation "= L =/ttg/gtte), and the communication response sent by using specific CDMA protocol, and the communication request is also not limited to specific CDMA communication protocol.
Step S103, the first terminal receives a first password set by a user on the password setting page, and the first terminal sends a password input prompt to the second terminal.
The password input prompt in the above step may specifically be: a specific message, such as a short message, may also be an actual page in actual application, and may also be a prompt in other manners, and the specific implementation of the present invention is not limited to the specific representation form of the prompt.
And step S104, the first terminal receives a second password sent by the second terminal, compares the first password with the second password, and sends the moving file to the second terminal if the first password is matched with the second password.
Optionally, after step S104, the method may further include:
and if the first password is not matched with the second password, stopping sending the moving file to the second terminal.
After the communication connection is established, the first terminal displays a password input page to the user to acquire a first password input by the user, then sends a password input prompt to the second terminal, receives a second password returned by the second terminal, and compares the first password with the second password to determine whether the mobile phone of the user is moved.
Referring to fig. 2, fig. 2 is a method for implementing terminal moving connection security according to another preferred embodiment of the present invention, where the method is performed by a terminal, and the method is shown in fig. 2 and includes the following steps:
step S201, a first terminal sends a communication request to a second terminal, where the communication request includes: an indication of moving;
the communication request sent by the first terminal to the second terminal in step S201 may be Multiple communication requests, for example, in a specific scheme of a preferred embodiment of the present invention, the communication request sent by the first terminal to the second terminal may be a communication request sent by the first terminal through Wireless Fidelity (WIFI), and the structure and definition of the communication request may refer to specific definitions in IEEE802.1, which is not described herein again, and certainly in another specific scheme of a preferred embodiment of the present invention, the communication request sent by the first terminal to the second terminal may be a communication request sent by the first terminal through bluetooth, and certainly in practical applications, the communication request may also be sent by using other communication methods, for example, the communication request sent by the first terminal through long Term Evolution (L ong Term Evolution, L TE), and certainly the communication request sent by the first terminal through Code Division Multiple Access (CDMA) may also be sent by using Code Division Multiple Access (CDMA), and is not limited to the specific communication protocol of the present invention.
The value of the moving instruction may be: moving or not moving can be realized by one bit in the extension field in the communication request, for example, setting 1 as moving and 0 as not moving, but in practical application, the above setting can be reversed, for example, setting 0 as moving and 1 as not moving. In practical application, the moving indication may be provided in other manners, for example, a special field with a set length is carried, for example, 10 fields 1, 10 fields 0, 11 fields 1, or 12 fields 0, and only the first terminal and the second terminal need to be able to recognize each other.
Step S202, the first terminal receives a communication response sent by the second terminal;
the communication response sent by the second terminal and received by the first terminal in step S202 may be Multiple communication responses, for example, in a specific scheme of a preferred embodiment of the present invention, the communication response sent by the second terminal and received by the first terminal may be a communication response sent by the second terminal through Wireless Fidelity (WIFI), the structure and definition of the communication response may refer to specific definitions in IEEE802.1, which are not described herein, and of course, in another specific scheme of a preferred embodiment of the present invention, the communication response sent by the second terminal and received by the first terminal may be a communication response sent by the second terminal through bluetooth, and of course, in practical applications, the communication response may also be sent by using other communication modes, for example, the first terminal sends the communication response through long term evolution (L ong terminal evolution, &/gtt translation "= L =/ttg/gtt), the communication response sent by the first terminal may also be a Multiple Access protocol (CDMA), and the communication response is also not limited to specific communication protocol of CDMA.
Step S203, the first terminal receives a first password set by a user on a password setting page, and the first terminal sends a password input prompt to the second terminal; the first password may be: mathematical calculations (e.g., 1+1, 1+4, etc., and the like), such as addition calculations, multiplication calculations, and the like.
The password input prompt in the above step may specifically be: a specific message, such as a short message, may also be an actual page in actual application, and may also be a prompt in other manners, and the specific implementation of the present invention is not limited to the specific representation form of the prompt.
Step S204, the first terminal receives a second password sent by the second terminal, the first terminal compares the first password with the second password, if the second password is the result of the first password, the first password is determined to be matched with the second password, and the moving file is sent to the second terminal.
Optionally, after step S204, the method may further include:
and if the first password is not matched with the second password, stopping sending the moving file to the second terminal.
Optionally, after step S204, the method may further include:
judging the importance of the moving file, prompting a user to input a third password before the first terminal sends the important moving file, sending a password input prompt to the second terminal, receiving a fourth password returned by the second terminal, and transmitting the important moving file if the fourth password is matched with the third password.
Optionally, after step S204, the method may further include:
the first terminal periodically sends a password input prompt to the second terminal.
The period can be set by the user, and of course, can be set by the manufacturer.
After the communication connection is established, the first terminal displays a password input page to the user to acquire a first password input by the user, then sends a password input prompt to the second terminal, receives a second password returned by the second terminal, and compares the first password with the second password to determine whether the mobile phone of the user is moved.
Referring to fig. 3, fig. 3 is a device 300 for implementing terminal moving connection security, which is disposed in a first terminal, and includes:
a sending unit 301, configured to send a communication request to the second terminal, where the communication request includes: an indication of moving;
a receiving unit 302, configured to receive a communication response sent by the second terminal; receiving a first password set by a user on a password setting page;
the sending unit 301 is further configured to send a password input prompt to the second terminal;
a receiving unit 302, configured to receive a second password sent by a second terminal;
the processing unit 303 is configured to compare the first password with the second password, and send the moving file to the second terminal if the first password matches the second password.
Optionally, the processing unit is further configured to, if the first password is not matched with the second password, the first terminal does not send the moving file to the second terminal.
Optionally, the first password is a mathematical calculation formula, and the processing unit is specifically configured to determine that the first password matches the mathematical calculation formula if the second password matches the mathematical calculation formula, and determine that the second password does not match the mathematical calculation formula if the second password does not match the mathematical calculation formula.
Optionally, the processing unit is further configured to determine the importance of the moving file, prompt the user to input a third password before sending the important moving file, send a password input prompt to the second terminal, receive a fourth password returned by the second terminal, and transmit the important moving file if it is determined that the fourth password is matched with the third password.
Optionally, the sending unit is specifically configured to send a password input prompt to the second terminal periodically.
The invention also provides a terminal, which comprises the device 300 for realizing the moving connection safety of the terminal.
The details of particular embodiments of the invention, as well as other particular forms, may be employed to practice the invention without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Referring to fig. 4, an embodiment of the present invention further provides a terminal 400, where the terminal 400 includes, but is not limited to: as shown in fig. 4, the terminal 400 includes a smart phone, a smart watch, a tablet computer, a personal computer, a notebook computer, or a computer group: a processor 401, a memory 402, a transceiver 403, and a bus 404. The transceiver 403 is used for transmitting and receiving data to and from an external device. The number of processors 401 in the device 400 may be one or more. In some embodiments of the present application, the processor 401, the memory 402, and the transceiver 403 may be connected by a bus system or other means. The apparatus 400 may be used to perform the method shown in fig. 1. With regard to the meaning and examples of the terms related to the present embodiment, reference may be made to the corresponding description of fig. 1. And will not be described in detail herein.
Wherein the memory 402 has program code stored therein. The processor 401 is arranged to call program code stored in the memory 402 for performing the steps as shown in fig. 1.
It should be noted that the processor 401 may be a single processing element or may be a general term for a plurality of processing elements. For example, the Processing element may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present Application, such as: one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs).
The memory 403 may be a single storage device or a combination of multiple storage elements, and is used for storing executable program codes or parameters, data, etc. required by the running device of the application program. And the memory 403 may include a Random Access Memory (RAM) or a non-volatile memory (non-volatile memory), such as a magnetic disk memory, a Flash memory (Flash), and the like.
The bus 404 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
The user equipment may also include input and output devices coupled to bus 404 for interfacing with other components such as processor 401 via the bus. The input and output device can provide an input interface for an operator so that the operator can select a control item through the input interface, and can also be other interfaces through which other equipment can be externally connected.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (10)

1. A method for realizing the security of terminal moving connection is characterized by comprising the following steps:
a communication request sent by a first terminal to a second terminal, wherein the communication request comprises: a moving instruction, wherein the moving instruction is a special field with a set length carried in the communication request, and the special field with the set length is 0 or 1 in the set number;
the first terminal receives a communication response sent by the second terminal;
the method comprises the steps that a first terminal receives a first password set by a user on a password setting page, and the first terminal sends a password input prompt to a second terminal;
the first terminal receives a second password sent by the second terminal, compares the first password with the second password, and sends a moving file to the second terminal if the first password is matched with the second password;
the first password is a mathematical calculation formula, and the matching of the first password and the second password is specifically as follows:
and if the second password is consistent with the result of the mathematical calculation formula, determining that the second password is matched with the result of the mathematical calculation formula, and if the second password is not consistent with the result of the mathematical calculation formula, determining that the second password is not matched with the result of the mathematical calculation formula.
2. The method of claim 1, further comprising:
and if the first password is not matched with the second password, the first terminal does not send the moving file to the second terminal.
3. The method of claim 1, further comprising:
judging the importance of the moving file, prompting a user to input a third password before the first terminal sends the important moving file, sending a password input prompt to the second terminal, receiving a fourth password returned by the second terminal, and transmitting the important moving file if the fourth password is matched with the third password.
4. The method according to claim 1, wherein the sending, by the first terminal, the password input prompt to the second terminal specifically comprises:
and the first terminal periodically sends a password input prompt to the second terminal.
5. The device for realizing the connection safety of the terminal moving is characterized in that the device is arranged in a first terminal and comprises:
a sending unit, configured to send a communication request to the second terminal, where the communication request includes: a moving instruction, wherein the moving instruction is a special field with a set length carried in the communication request, and the special field with the set length is 0 or 1 in the set number;
the receiving unit is used for receiving a communication response sent by the second terminal; receiving a first password set by a user on a password setting page;
the sending unit is also used for sending a password input prompt to the second terminal;
the receiving unit is further configured to receive a second password sent by a second terminal;
the processing unit is used for comparing the first password with the second password, and if the first password is matched with the second password, the moving file is sent to the second terminal;
the processing unit is specifically configured to determine that the first password is matched if the second password is consistent with the result of the mathematical calculation formula, and determine that the second password is not matched if the second password is inconsistent with the result of the mathematical calculation formula.
6. The device of claim 5, wherein the processing unit is further configured to, if the first password does not match the second password, not send the move file to the second terminal.
7. The apparatus of claim 5,
the processing unit is further used for judging the importance of the moving file, prompting a user to input a third password before the important moving file is sent, sending a password input prompt to the second terminal, receiving a fourth password returned by the second terminal, and transmitting the important moving file if the fourth password is matched with the third password.
8. The apparatus according to claim 5, wherein the sending unit is specifically configured to periodically send a password input prompt to the second terminal.
9. A terminal, characterized in that the terminal comprises a device for implementing the security of moving connection of a terminal according to any one of claims 5-8.
10. A computer-readable storage medium, in which program instructions are stored, the program instructions being for causing a computer, when invoked, to perform the method of any one of claims 1 to 4.
CN201610826598.9A 2016-09-14 2016-09-14 Method and device for realizing connection security of terminal moving Active CN106446110B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610826598.9A CN106446110B (en) 2016-09-14 2016-09-14 Method and device for realizing connection security of terminal moving
PCT/CN2017/099191 WO2018049975A1 (en) 2016-09-14 2017-08-26 Data transfer method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610826598.9A CN106446110B (en) 2016-09-14 2016-09-14 Method and device for realizing connection security of terminal moving

Publications (2)

Publication Number Publication Date
CN106446110A CN106446110A (en) 2017-02-22
CN106446110B true CN106446110B (en) 2020-07-28

Family

ID=58168032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610826598.9A Active CN106446110B (en) 2016-09-14 2016-09-14 Method and device for realizing connection security of terminal moving

Country Status (2)

Country Link
CN (1) CN106446110B (en)
WO (1) WO2018049975A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446110B (en) * 2016-09-14 2020-07-28 Oppo广东移动通信有限公司 Method and device for realizing connection security of terminal moving
CN113408989B (en) * 2021-06-29 2024-04-02 奇瑞汽车股份有限公司 Automobile data comparison method and device and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006001640A1 (en) * 2004-06-25 2006-01-05 Sk Telecom. Co., Ltd. Method of connecting mobile comunication terminals having bluetooth module
CN101626256A (en) * 2008-07-07 2010-01-13 英华达(南京)科技有限公司 Method for establishing bluetooth wireless transmission
CN102255639A (en) * 2010-05-21 2011-11-23 希姆通信息技术(上海)有限公司 Method for transmitting file between mobile phones through Bluetooth
CN103414790A (en) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 File transfer system based on NFC
CN103957037A (en) * 2014-04-09 2014-07-30 北京工业大学 Method for automatic communication between PC side and Android mobile phone side based on Bluetooth

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103648180A (en) * 2013-12-04 2014-03-19 北京奇虎科技有限公司 Method and device for sharing files between terminal devices
CN105491113B (en) * 2015-11-25 2019-03-12 小米科技有限责任公司 Moving method, device and terminal
CN105656991A (en) * 2015-12-21 2016-06-08 北京金山安全软件有限公司 File sharing method and device
CN105682094B (en) * 2015-12-30 2019-01-04 天维尔信息科技股份有限公司 Traffic guidance's dispatching method and device
CN106503511B (en) * 2016-09-14 2019-06-14 Oppo广东移动通信有限公司 A kind of method and device improving mobile phone removal of home cryptographic check safety
CN106446110B (en) * 2016-09-14 2020-07-28 Oppo广东移动通信有限公司 Method and device for realizing connection security of terminal moving
CN106507268B (en) * 2016-09-14 2020-01-31 Oppo广东移动通信有限公司 Method and device for dynamic verification in mobile phone carriers

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006001640A1 (en) * 2004-06-25 2006-01-05 Sk Telecom. Co., Ltd. Method of connecting mobile comunication terminals having bluetooth module
CN101626256A (en) * 2008-07-07 2010-01-13 英华达(南京)科技有限公司 Method for establishing bluetooth wireless transmission
CN102255639A (en) * 2010-05-21 2011-11-23 希姆通信息技术(上海)有限公司 Method for transmitting file between mobile phones through Bluetooth
CN103414790A (en) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 File transfer system based on NFC
CN103957037A (en) * 2014-04-09 2014-07-30 北京工业大学 Method for automatic communication between PC side and Android mobile phone side based on Bluetooth

Also Published As

Publication number Publication date
WO2018049975A1 (en) 2018-03-22
CN106446110A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
US20160210632A1 (en) Secured payment method and relevant device and system
EP3468256B1 (en) Fast wireless fidelity connection method and apparatus
EP2825956B1 (en) Method, apparatus and system of recovering an operating system on a portable communication device
CN104320161A (en) Method and system for rapid Bluetooth pairing
CN104869043A (en) Method for establishing VPN (Virtual Private Network) connection and terminal
WO2018103466A1 (en) Method for applying wireless fidelity country code, apparatus, intelligent terminal and storage medium
CN106446110B (en) Method and device for realizing connection security of terminal moving
CN110018978B (en) Data transmission method and system
CN104270740A (en) Slot-sharing T card and SIM card detection method
CN106507268B (en) Method and device for dynamic verification in mobile phone carriers
CN104285454A (en) Switching method of wireless connection, wireless terminal and system thereof
CN104331407A (en) Multimedia file information recommending method and multimedia file information recommending device
CN106484506B (en) File storage path selection method and device in terminal moving
CN111340911A (en) Method and device for determining connecting line in k-line graph and storage medium
CN106503511B (en) A kind of method and device improving mobile phone removal of home cryptographic check safety
CN107633188B (en) Information display method and device and user equipment
JP2018508081A (en) Input serial processing method, apparatus, device, and non-executable computer storage medium
CN106231544B (en) Method and device for storage and selection of transmission path in terminal moving process
CN105991729B (en) Installation package downloading method and server
CN104951325A (en) Information display method and electronic equipment
CN104113631A (en) Data transmission method and electronic apparatus
US10872019B2 (en) Load and save recovery partition using mobile device
WO2018103446A1 (en) Method and device for wireless fidelity quick connection
CN108769236B (en) Application recommendation method, electronic device and computer-readable storage medium
CN106604304B (en) Connection method and device for accelerating wireless fidelity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant