CN108989322B - Data transmission method, mobile terminal and computer readable storage medium - Google Patents

Data transmission method, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN108989322B
CN108989322B CN201810853585.XA CN201810853585A CN108989322B CN 108989322 B CN108989322 B CN 108989322B CN 201810853585 A CN201810853585 A CN 201810853585A CN 108989322 B CN108989322 B CN 108989322B
Authority
CN
China
Prior art keywords
data transmission
data
sending
request
identification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810853585.XA
Other languages
Chinese (zh)
Other versions
CN108989322A (en
Inventor
王蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanchang Nubia Technology Co Ltd
Original Assignee
Nanchang Nubia Technology Co ltd
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanchang Nubia Technology Co ltd, Nubia Technology Co Ltd filed Critical Nanchang Nubia Technology Co ltd
Priority to CN201810853585.XA priority Critical patent/CN108989322B/en
Publication of CN108989322A publication Critical patent/CN108989322A/en
Application granted granted Critical
Publication of CN108989322B publication Critical patent/CN108989322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The invention discloses a data transmission method, a mobile terminal and a computer readable storage medium, wherein the data transmission method receives a data sending request of a sending end and verifies a biological characteristic identification code contained in the data sending request; if the biological characteristic identification code is consistent with a pre-stored biological characteristic identification code, transmitting the data sending request to a receiving end, wherein the data sending request comprises the biological characteristic identification code and a time code; and determining that the receiving end confirms that the data transmission request passes through, and establishing data transmission from the transmitting end to the receiving end. The safety verification is carried out through network transmission, the data transmission is carried out through local area network close range transmission, the safety verification speed of the network transmission is high, the operation is convenient, the data transmission is carried out through the local area network, the data transmission is avoided passing through the Internet, and the safety of the data transmission is guaranteed.

Description

Data transmission method, mobile terminal and computer readable storage medium
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a data transmission method, a mobile terminal, and a computer-readable storage medium.
Background
With the continuous development of computer technology, users are more concerned about the security of personal information and data in the digital information era, and the mobile U disk always has the risk of being eavesdropped through network transmission, and cannot meet the requirements of the users due to the limitation of body types and functionality. With the popularization of mobile terminals, more people carry mobile terminals instead of mobile USB (universal serial bus) flash disks, but network data transmission between the mobile terminals has potential safety hazards, data is stolen or lost or the transmission speed is low, and the requirement of people on data transmission safety cannot be met.
Disclosure of Invention
The invention mainly aims to provide a data transmission method, a mobile terminal and a computer readable storage medium, and aims to solve the technical problems that data information is easy to steal and the security is poor when network data is transmitted between mobile terminals in the prior art.
In order to achieve the above object, an embodiment of the present invention provides a data transmission method, where the data transmission method is applied to data transmission between mobile terminals in a local area network;
the data transmission method comprises the following steps:
receiving a data sending request of a sending end, and verifying a biological characteristic identification code contained in the data sending request;
if the biological characteristic identification code is consistent with a pre-stored biological characteristic identification code, transmitting the data sending request to a receiving end, wherein the data sending request comprises the biological characteristic identification code and a time code;
and determining that the receiving end confirms that the data transmission request passes through, and establishing data transmission from the transmitting end to the receiving end.
Optionally, before the step of receiving the sender-side data transmission request, the method further includes:
verifying whether the transmitting terminal is a registration transmitting terminal or not based on biological characteristics or non-biological characteristics;
and if the sending end is the registered sending end, receiving a sending end data sending request.
Optionally, the step of verifying the biometric identifier included in the data transmission request includes:
when the biological characteristic identification code contains the hand information;
determining finger characteristics according to the hand information, comparing the finger characteristics with matching characteristics of prestored fingers, and generating and measuring the similarity between the finger characteristics and the matching characteristics of the prestored fingers;
and verifying the hand information according to the similarity so as to verify the biological characteristic identification code contained in the data sending request.
Optionally, the step of verifying the biometric identifier included in the data transmission request includes:
when the biological characteristic identification code contains face information,
acquiring an image frame sequence of a human face according to the human face information, and comparing the image frame sequence with an image set in a preset human face database by adopting image statistics characteristics;
and determining the ratio of the image frames successfully matched to the image frame sequence so as to verify the biometric identification code contained in the data transmission request.
Optionally, the step of determining that the receiving end acknowledges the request for data transmission includes:
controlling the receiving end to generate a verification code containing a biological characteristic identification code and a time code so that the verification code can be verified by the sending end;
and determining that the receiving end confirms that the data transmission request passes based on the verification result of the transmitting end.
Optionally, the step of determining that the receiving end acknowledges the request for data transmission includes:
when a safety verification end is arranged between the data communication of the sending end and the receiving end,
controlling the receiving end to generate a verification code containing a biological characteristic identification code and a time code so that the safety verification end can verify the verification code;
and determining that the receiving end confirms that the data transmission request passes based on the verification result of the security verification end.
Optionally, the step of establishing data transmission from the sending end to the receiving end includes:
determining a local area network transmission mode of a sending end and a receiving end based on the information quantity and/or transmission signal strength requirements of data transmission;
and establishing data transmission from the sending end to the receiving end according to the local area network transmission mode, wherein the local area network transmission mode at least comprises one of WIFI, Bluetooth or NFC transmission modes.
Optionally, before the step of receiving the sender-side data transmission request, the method further includes:
determining whether the sending end is provided with an encrypted transmission component;
and if the sending end is not provided with the encryption transmission assembly, outputting a prompt for installing the encryption transmission assembly and potential safety hazards of data transmission.
The present invention also provides a mobile terminal, comprising: the data transmission method comprises a memory, a processor and a data transmission program which is stored on the memory and can run on the processor, wherein the data transmission program realizes the steps of the data transmission method when being executed by the processor.
The present invention also provides a computer-readable storage medium having stored thereon a data transmission program which, when executed by a processor, implements the steps of the data transmission method described above.
The invention provides a data transmission method, which comprises the steps of receiving a data sending request of a sending end, and verifying a biological characteristic identification code contained in the data sending request; if the biological characteristic identification code is consistent with a pre-stored biological characteristic identification code, transmitting the data sending request to a receiving end, wherein the data sending request comprises the biological characteristic identification code and a time code; and determining that the receiving end confirms that the data transmission request passes through, and establishing data transmission from the transmitting end to the receiving end. The safety verification is carried out through network transmission, the data transmission is carried out through local area network close range transmission, the safety verification speed of the network transmission is high, the operation is convenient, the data transmission is carried out through the local area network, the data transmission is avoided passing through the Internet, and the safety of the data transmission is guaranteed.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an alternative mobile terminal according to an embodiment of the present invention;
FIG. 2 is a diagram of a wireless communication device of the terminal of FIG. 1;
FIG. 3 is a flowchart illustrating a data transmission method according to an embodiment of the present invention;
FIG. 4 is a schematic view of a scenario of an embodiment of a data transmission method according to the present invention;
fig. 5 is a schematic view of another application of the data transmission method according to another embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
A mobile terminal (mobile terminal hereinafter referred to as terminal) may be implemented in various forms. For example, the terminal described in the present invention may include terminals such as a mobile phone, a tablet computer, a notebook computer, a palm top computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, an intelligent wearable device, an intelligent bracelet, a pedometer, and the like, and fixed devices such as a Digital TV, a desktop computer, and the like.
While the following description will be given taking an example of a smart wearable device, those skilled in the art will appreciate that the configuration according to the embodiment of the present invention can be applied to a fixed type device in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a terminal for implementing various embodiments of the present invention, the terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the terminal configuration shown in fig. 1 is not intended to be limiting, and that the terminal may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes the various components of the terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other terminals through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The terminal 100 also includes at least one sensor 105, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input terminals 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The user input unit 107 may include other input terminals 1072 in addition to the touch panel 1071. In particular, other input terminals 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited thereto.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 100 or may be used to transmit data between the terminal 100 and the external device.
The memory 109 may be used to store software programs and various data, and the memory 109 may be a computer storage medium, and the memory 109 stores the data transmission program of the present invention. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the terminal. Such as processor 110, executing the data transfer program stored in memory 109 to implement the steps of the various embodiments of the data transfer method of the present invention.
Processor 110 may include one or more processing units; alternatively, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and optionally, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
Although not shown in fig. 1, the terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above terminal hardware structure and communication network system, the present invention provides various embodiments of the method.
The invention provides a data transmission method, which is applied to data transmission between mobile terminals under a local area network; in an embodiment of the data transmission method, referring to fig. 3, the data transmission method includes:
step S10, receiving a data transmission request of a transmitting terminal, and verifying a biological characteristic identification code contained in the data transmission request;
the transmitting end is an intelligent terminal stored with related data information and can be terminal equipment such as a smart phone, a PAD, a computer and an intelligent bracelet. The sending end also comprises a local area network transmission function, one or more of short-distance transmission modes and one or more of Bluetooth, NFC or WIFI transmission. The data transmission request may contain a biometric code, time information of the data transmission request, i.e., a time code, a data transfer amount size, a transmission mode of the transmitting end, and the like. The biological characteristic identification code comprises a verification identifier of biological characteristic information, wherein the biological characteristic information can be fingerprint information, palm print information, face information, iris information and the like, and collected characteristic information used for human body verification and identification. The data request of the sending end can be received by a server or an intelligent terminal associated with the sending end, such as a cloud server, a computer or an intelligent bracelet.
Taking a server associated with a sending end as an example of a cloud server, a plurality of groups of biological characteristic identification codes are stored in the cloud server in advance, and the cloud server receives a data sending request of the sending end and verifies the biological characteristic identification codes in the data sending request. The sending terminal is connected with the cloud server through a network, and sends a data sending request to the cloud server through the network.
Step S20, if the biological characteristic identification code is consistent with the pre-stored biological characteristic identification code, transmitting the data sending request to a receiving end, wherein the data sending request comprises the biological characteristic identification code and a time code;
the pre-stored biometric identification codes are pre-stored in a server or an intelligent terminal associated with the sending end, and can be stored or classified according to a certain storage rule, wherein the storage rule can be sorting according to the name of an object corresponding to each biometric identification code, or sorting according to storage time or sorting according to verification frequency, and the like. The receiving end is used for receiving the data information sent by the sending end, and can be an intelligent terminal, such as a smart phone, a computer, a smart bracelet and the like, and can also move a hard disk or a server and the like. The receiving end and the sending end are correspondingly provided with a matched local area network transmission function, one or more of short-distance transmission modes and one or more of Bluetooth, NFC or WIFI transmission. And the time code comprises the time when the sending end sends the data sending request and the time when the cloud server receives the data sending request sent by the sending end.
When the biological characteristic identification code transmitted to the cloud server by the sending end is verified, the biological characteristic identification code is consistent with at least one biological characteristic identification code in the pre-stored biological characteristic identification codes, the sending end sends the biological characteristic identification code, and the biological characteristic identification code and the time code in the data sending request sent by the sending end are at least sent to the receiving end under the condition that the verification of the biological characteristic identification code is passed.
When the biological characteristic identification code transmitted to the cloud server by the transmitting end fails to pass the verification, the biological characteristic identification code in the data transmission request transmitted by the transmitting end is stored in the cloud server, and the data transmission request transmitted by the transmitting end may have potential safety hazards, so that the cloud server judges that the data transmission request fails to be verified, and does not transmit the data transmission request to the receiving end.
Step S30, determining that the receiving end confirms that the data transmission request is passed, and establishing data transmission from the transmitting end to the receiving end.
And the receiving end receives the data sending request after the cloud server verification by the sending end, further verifies whether the data sending request passes through, and establishes data transmission between the sending end and the receiving end after the receiving end confirms that the data sending request passes through, so that the data transmission is carried out between the sending end and the receiving end under the local area network.
Specifically, the step of determining that the receiving end confirms the request for transmitting data further includes:
step S31, controlling the receiving end to generate a verification code containing a biological characteristic identification code and a time code, so that the sending end can verify the verification code;
the cloud server controls the receiving end to at least generate a verification code from the biological characteristic identification code and the time code in the received data sending request, wherein the time code can comprise the time of sending the data sending request by the sending end, and the time of sending the data sending request to the receiving end after the data sending request is verified by the cloud server; the verification time code can ensure that the data sending request is the data sending request sent by the sending end at the current moment, so that data transmission is avoided after the biological feature code in the old data sending request is verified, and the safety and timeliness of the data transmission are further guaranteed. The verification code can be presented in various forms, such as a bar code, a two-dimensional code, a digital verification code, a picture verification code, and the like. The sending end can verify the verification code generated on the receiving end by scanning, manually inputting the verification code or selecting to confirm through verification and the like.
Step S32, determining that the receiving end confirms passing of the data transmission request based on the verification result of the transmitting end.
When the sending end verifies the obtained verification code, if the verification is confirmed to be passed, the receiving end confirms that the sending request of the sending end passes, and at the moment, data transmission can be carried out between the sending end and the receiving end. If the verification code displayed on the receiving end is not confirmed by the sending end, the fact that the matching between the sending end and the receiving end is unsuccessful is explained, potential safety hazards exist in data transmission between the sending end and the receiving end, and data transmission between the sending end and the receiving end cannot be established.
To assist in understanding the data verification and transmission process in the present embodiment, an example will be described. As shown in fig. 4, the transmitting end is a smart phone a, the receiving end is a smart phone B, and the smart phone a and the smart phone B can perform data transmission through bluetooth, WIFI or NFC in the same lan environment. The user of the smart phone A triggers a data sending request on the smart phone A, the data sending request is transmitted to the cloud server through the network, after the cloud server receives the data sending request, the biometric identification code in the data sending request is verified, if the authentication is passed, the data transmission request is transmitted to the receiving-end smartphone B through network transmission, generating a verification code comprising a biological characteristic identification code and a time code on the smart phone B, identifying the verification code (two-dimensional code) in the smart phone A in a scanning mode, if the verification is passed, the data transmission safety of the smart phone A and the smart phone B is indicated, the data transmission between the smart phone A and the smart phone B is established, and the smart phone A sends the data information needing to be transmitted to the smart phone B in a local area network transmission mode. The smart phone A sends a data sending request to the cloud server through the network, the cloud server sends the data sending request after verification to the smart phone B through the network, the data sending request with small data volume is transmitted through the network to accelerate the rapidity of verification, moreover, close-range data transmission is carried out between the smart phone A and the smart phone B under a local area network, the data transmission safety is improved without network transmission, and the transmitted data information is not easy to steal. And the time code is verified, so that the timeliness of the data sending request is guaranteed, and the potential safety hazard of data transmission caused by verification by using an old biological characteristic identification code is avoided.
In this embodiment, a biometric identifier included in a data transmission request is verified by receiving the data transmission request from a transmitting end; if the biological characteristic identification code is consistent with a pre-stored biological characteristic identification code, transmitting the data sending request to a receiving end, wherein the data sending request comprises the biological characteristic identification code and a time code; and determining that the receiving end confirms that the data transmission request passes through, and establishing data transmission from the transmitting end to the receiving end. The safety verification is carried out through network transmission, the data transmission is carried out through local area network close range transmission, the safety verification speed of the network transmission is high, the operation is convenient, the data transmission is carried out through the local area network, the data transmission is avoided passing through the Internet, and the safety of the data transmission is guaranteed.
Optionally, in an embodiment of the data transmission method of the present invention, before the step of receiving the sender-side data transmission request in step S10, the method further includes:
step S01, verifying whether the sender is a registration sender based on biological characteristics or non-biological characteristics;
the biological characteristics include fingerprint, palm print, face, iris, etc. The non-biological characteristics comprise characteristic information such as verification patterns, verification numbers or verification characters. The registration sending end, which may also be understood as a trusted sending end, verifies that a current user of the sending end is an owner of the sending end through biological features or non-biological features, so as to avoid potential safety hazards of data information leakage caused by sending a data sending request by using the sending end by a non-owner.
In one embodiment, the user may be prompted for authentication before sending the data transmission request, and the authentication may be in a form including at least one of biometric authentication and non-biometric authentication.
Step S02, if the sender is a registration sender, receiving a sender data sending request.
If the verification of the sending end is the registered sending end, namely the trusted sending end, the verification proves that the biological characteristic or the non-biological characteristic passes, the cloud server receives the data sending request of the sending end at the moment, and otherwise, the cloud server refuses to receive the data sending request triggered by the sending end.
In this embodiment, whether the sending end is the registered sending end is verified, so that the security of sending a data sending request by the sending end is further guaranteed, and a non-sending-end owner is prevented from sending data information in the sending end.
Optionally, in an embodiment of the data transmission method of the present invention, the step of verifying the biometric identifier included in the data transmission request in step S10 includes:
step S11, when the biological characteristic identification code contains the hand information;
the hand information includes the width of different fingers, the length of different fingers, the width of palm, the thickness of palm, fingerprint on finger, palm print on palm, etc.
Step S12, determining finger characteristics according to the hand information, comparing the finger characteristics with the matching characteristics of prestored fingers, and generating and measuring the similarity between the finger characteristics and the matching characteristics of prestored fingers;
finger features, each finger defining a respective set of features, each feature set describing a feature of the finger, such as a geometric structure. In some embodiments, the set of features includes Zernike moments, Hu moments, finger width statistics, and the like.
Step S13, verifying the human hand information according to the similarity, so as to verify the biometric identifier included in the data transmission request.
Specifically, the cloud server stores a feature set describing finger features of each hand and configures an access configuration database. The configuration database may hold data describing respective sets of features corresponding to fingers of one or more recognized persons that have been registered in the database. The cloud server may use a similarity function to generate respective similarity scores, each similarity score measuring a similarity between a hand and a hand of an identified person registered in the database. Each similarity score may be generated based on a comparison of the respective feature set corresponding to the fingers of the opponent and the respective feature set corresponding to the fingers of the identified person's hand. The cloud server determines whether the hand is matched with the hand of the identified person registered in the database based on the similarity score. That is, the biometric identification code included in the data transmission request is verified by verifying whether the hand information matches the hand of the identified person registered in the database.
Further, the step of verifying the biometric identifier included in the data transmission request in step S10 includes:
step S14, when the biometric identification code contains face information,
the face information comprises the outline, eyebrow, eye, nose, lip and other information of the face. The face information may be face image information stored in the sending end, or acquired based on a device with an image acquisition function, such as a camera and/or a scanner, in the sending end, or the sending end acquires the face information in the multimedia data stream through the device with the image acquisition function.
Step S15, obtaining an image frame sequence of a human face according to the human face information, and comparing the image frame sequence with an image set in a preset human face database by adopting image statistics characteristics;
when the moment of the target face is determined by a mathematical model of face detection and face tracking, image acquisition is started from the current moment, and the image acquisition is ended at a preset time point, so that the picture frame sequence of the target face is acquired within a preset time period. Or, the sending end can automatically start the camera at preset time, if the number of the cameras is large, the camera can be selectively started, or the angle of the camera can be automatically adjusted and set, so that the terminal equipment can acquire multimedia data streams by shooting the surrounding environment through the camera, when the moment of the target face is determined through a mathematical model of face detection and face tracking, image acquisition is carried out from the current moment, and the image acquisition is finished at a preset time point, so that the picture frame sequence of the target face is acquired in a preset time period.
After obtaining a picture frame sequence of a target face to be recognized, comparing the picture frame sequence with a picture set in a pre-established face sample library by using image statistical characteristics, specifically, extracting features such as an outline, eyebrows, eyes, a nose, lips and the like of the target face in the picture frame sequence, and comparing the features with the picture set in the pre-established face sample library by using the image statistical characteristics, wherein the image statistical characteristics include: haar feature, FisherFace feature, and LBPH feature, which can be selected by those skilled in the art according to application requirements, belong to the prior art, and are described herein.
Step S16, determining the ratio of the image frame successfully matched to the image frame sequence to verify the biometric identifier included in the data transmission request.
The scale may be specifically set according to the image frame matching system performance, and may be generally set to 90%. If the successfully matched image frames account for more than 90% of all the image frames in the image frame sequence, it is indicated that most of the image frames in the image frame sequence of the human face to be verified are matched, and the biometric identification code is verified to be passed.
In this embodiment, the biometric identification code is verified according to different biometric information contained in the biometric identification code, and the above briefly describes the process of verifying through the hand information and the face information, so as to expand the way through which the biometric identification code passes the verification and expand the application range of the data transmission method. Certainly, the hand information and the face information can also be verified based on other verification methods; other biometric information, such as iris information, DNA information, etc., can also be verified, which is used for verifying multiple biometric verification codes to ensure the correctness of the biometric identification code, and will not be described herein again.
Optionally, in an embodiment of the data transmission method of the present invention, the step of determining that the receiving end acknowledges the request sent by the data in step S30 includes:
step S33, when a safety verification end is set between the data communication of the sending end and the receiving end,
the safety verification end is an intelligent terminal device with an information verification function, can be an intelligent device such as a smart phone, a computer and an intelligent bracelet, and is mainly used for safety verification of a sending end or a receiving end under a local area network environment.
Step S34, controlling the receiving end to generate a verification code containing a biological characteristic identification code and a time code, so that the security verification end can verify the verification code;
the cloud server transmits the verified data sending request to a receiving end through a network, wherein the data sending request at least comprises a biological characteristic identification code and a time code, the cloud server controls the biological characteristic identification code and the time code to generate a verification code on the receiving end, and the verification code can be a bar code, a two-dimensional code or a pattern code. The security verification end performs scanning verification or manual verification on the verification code on the receiving end to verify the verification code.
Step S35, determining that the receiving end confirms that the data transmission request passes based on the verification result of the security verification end.
If the security verification end passes the verification code in the above steps, it can indicate that the data transmission between the sending end and the receiving end is secure, the receiving end receives the data sending request of the sending end, and the data transmission is established between the sending end and the receiving end.
If the verification of the safety verification end is not passed, the potential safety hazard exists when the data transmission is carried out between the sending end and the receiving end, and the data transmission is not recommended.
Specifically, as shown in fig. 5, a sending-end smart phone a sends a data sending request to a cloud server, the cloud server verifies a biometric identifier, the data sending request is sent to a receiving-end smart phone B after the verification is passed, the receiving-end smart phone B is controlled to generate a verification code (two-dimensional code) from the biometric identifier and a time code, a security verification end verifies the verification code in a scanning manner, and if the verification is passed, data transmission between the sending-end smart phone a and the receiving-end smart phone B is established.
In this embodiment, a security verification end is arranged between the sending end and the receiving end, so that on one hand, the data sending request of the sending end can be safely verified, on the other hand, data verification contact between the sending end and the receiving end before data transmission is confirmed to be safe is avoided, and the data information safety of the sending end and the receiving end is further guaranteed.
Optionally, in an embodiment of the data transmission method of the present invention, the step of establishing data transmission from the sending end to the receiving end in step S30 includes:
step S301, determining local area network transmission modes of a sending end and a receiving end based on the information quantity and/or transmission signal strength requirements of data transmission;
the amount of information, the amount of data to be transmitted, can generally be calculated according to the number of bytes. The transmission signal strength requirement can be determined based on the size of the information amount or the distance between the sending end and the receiving end in the current local area network transmission environment. Generally, a larger amount of information requires higher transmission signal strength, higher transmission speed, and higher transmission signal strength. According to the different information quantity or the different requirements of the transmission signal intensity, the corresponding local area network transmission modes are different. Because bluetooth, WIFI, NFC have corresponding requirements for the distance between the sending end and the receiving end in the transmission process, the transmission modes of the local area network corresponding to the distance between the sending end and the receiving end are also different.
Step S302, establishing data transmission from the sending terminal to the receiving terminal according to the local area network transmission mode, wherein the local area network transmission mode at least comprises one of WIFI, Bluetooth or NFC transmission modes.
And according to the local area network transmission mode determined in the step, establishing data transmission between the sending end and the receiving end, so that the sending end and the receiving end carry out data transmission under the local area network environment without network transmission, and the speed and the safety of data transmission are improved.
In this embodiment, the local area network transmission mode of the sending end and the receiving end is determined according to the information amount of data transmission and/or the requirement of transmission signal strength, so as to improve the rate of data transmission between the sending end and the receiving end, and make the data transmission process better meet the hardware conditions of the sending end and the receiving end.
Optionally, in an embodiment of the data transmission method of the present invention, before the step of receiving the sender-side data transmission request in step S10, the method further includes:
step S03, determining whether the sending terminal is provided with an encryption transmission component;
when a sending end triggers a data sending request, whether an encryption transmission component is installed in the sending end or not is judged, the encryption transmission component is used for enhancing the safety in the data transmission process, and the encryption transmission component can be a safety plug-in the sending end.
And step S04, if the encryption transmission component is not set at the sending end, outputting a prompt for installing the encryption transmission component and potential safety hazards of data transmission.
If the encryption transmission component is installed on the sending end, the sending end can normally trigger the data sending request. If the sending end is not provided with the encryption transmission assembly, the situation that the sending end possibly has potential safety hazards in the process of triggering the data sending request is shown, at the moment, the reminding of installing the encryption transmission assembly can be output, and the reminding of the potential safety hazards of data transmission is output, so that a user is ensured to definitely carry out data transmission under the condition in advance and the potential safety hazards exist.
Moreover, the cloud server can store a corresponding encryption transmission component, and the encryption transmission component can be downloaded from the cloud server for installation by confirming installation of the encryption transmission component on the sending end.
In addition, an embodiment of the present invention further provides a mobile terminal, where the mobile terminal includes: a memory 109, a processor 110 and a data transmission program stored on the memory 109 and operable on the processor 110, the data transmission program implementing the steps of the data transmission method described above when executed by the processor 110.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, where a data transmission program is stored on the computer-readable storage medium, and the data transmission program, when executed by a processor, implements the steps of the data transmission method described above.
The specific implementation of the mobile terminal and the computer-readable storage medium of the present invention has substantially the same expansion content as the embodiments of the data transmission method, and will not be described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A data transmission method is characterized in that the data transmission method is applied to data transmission between mobile terminals under a local area network;
the data transmission method comprises the following steps:
receiving a data sending request of a sending end, and verifying a biological characteristic identification code contained in the data sending request;
if the biological characteristic identification code is consistent with a pre-stored biological characteristic identification code, transmitting the data sending request to a receiving end, wherein the data sending request comprises the biological characteristic identification code and a time code; wherein, the time code is the time information of the data sending request;
when a safety verification end is arranged between the data communication of the sending end and the receiving end, controlling the receiving end to generate a verification code containing a biological characteristic identification code and a time code so that the safety verification end can verify the verification code;
and determining that the receiving end confirms that the data transmission request passes through based on the verification result of the security verification end, and establishing data transmission from the transmitting end to the receiving end.
2. The data transmission method according to claim 1, wherein the step of receiving the sender-side data transmission request is preceded by the step of:
verifying whether the transmitting terminal is a registration transmitting terminal or not based on biological characteristics or non-biological characteristics;
and if the sending end is the registered sending end, receiving a sending end data sending request.
3. The data transmission method according to claim 1, wherein the step of verifying the biometric identifier included in the data transmission request includes:
when the biological characteristic identification code contains the hand information;
determining finger characteristics according to the hand information, comparing the finger characteristics with matching characteristics of prestored fingers, and generating and measuring the similarity between the finger characteristics and the matching characteristics of the prestored fingers;
and verifying the hand information according to the similarity so as to verify the biological characteristic identification code contained in the data sending request.
4. A data transmission method according to claim 1 or 3, wherein the step of verifying the biometric identifier included in the data transmission request comprises:
when the biological characteristic identification code contains face information,
acquiring an image frame sequence of a human face according to the human face information, and comparing the image frame sequence with an image set in a preset human face database by adopting image statistics characteristics;
and determining the ratio of the image frames successfully matched to the image frame sequence so as to verify the biometric identification code contained in the data transmission request.
5. The data transmission method of claim 1, wherein the step of determining that the receiving end acknowledges the request for transmission of the data comprises:
controlling the receiving end to generate a verification code containing a biological characteristic identification code and a time code so that the verification code can be verified by the sending end;
and determining that the receiving end confirms that the data transmission request passes based on the verification result of the transmitting end.
6. The data transmission method of claim 1, wherein the step of establishing the data transmission from the transmitting end to the receiving end comprises:
determining a local area network transmission mode of a sending end and a receiving end based on the information quantity and/or transmission signal strength requirements of data transmission;
and establishing data transmission from the sending end to the receiving end according to the local area network transmission mode, wherein the local area network transmission mode at least comprises one of WIFI, Bluetooth or NFC transmission modes.
7. The data transmission method according to claim 1, wherein the step of receiving the sender-side data transmission request is preceded by the step of:
determining whether the sending end is provided with an encrypted transmission component;
and if the sending end is not provided with the encryption transmission assembly, outputting a prompt for installing the encryption transmission assembly and potential safety hazards of data transmission.
8. A mobile terminal, characterized in that the mobile terminal comprises: memory, processor and data transmission program stored on the memory and executable on the processor, which data transmission program, when executed by the processor, implements the steps of the data transmission method according to any one of claims 1 to 7.
9. A computer-readable storage medium, characterized in that a data transmission program is stored thereon, which when executed by a processor implements the steps of the data transmission method according to any one of claims 1 to 7.
CN201810853585.XA 2018-07-28 2018-07-28 Data transmission method, mobile terminal and computer readable storage medium Active CN108989322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810853585.XA CN108989322B (en) 2018-07-28 2018-07-28 Data transmission method, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810853585.XA CN108989322B (en) 2018-07-28 2018-07-28 Data transmission method, mobile terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108989322A CN108989322A (en) 2018-12-11
CN108989322B true CN108989322B (en) 2022-02-25

Family

ID=64552129

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810853585.XA Active CN108989322B (en) 2018-07-28 2018-07-28 Data transmission method, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108989322B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109697343B (en) * 2018-12-28 2021-08-17 联想(北京)有限公司 Verification method and system and computer system
CN109871779B (en) * 2019-01-23 2020-11-03 北京细推科技有限公司 Palm print identification method and electronic equipment
CN110188562B (en) * 2019-05-29 2022-04-08 恒宝股份有限公司 Data information moving system and method based on safety card and safety card thereof
CN110830248A (en) * 2019-11-01 2020-02-21 江苏安防科技有限公司 Internal data transmission method for pipe gallery data safety protection system
CN111931484B (en) * 2020-07-31 2022-02-25 贵州多彩宝互联网服务有限公司 Data transmission method based on big data
CN112218249B (en) * 2020-11-17 2022-06-24 深圳开立生物医疗科技股份有限公司 Data transmission method, data transmission device, data downloading method and related equipment
CN114650151A (en) * 2020-12-15 2022-06-21 宝能汽车集团有限公司 Data transmission method, device and system based on vehicle CAN bus and storage medium
CN112911003B (en) * 2021-02-03 2022-06-07 广州市高奈特网络科技有限公司 Electronic data extraction method, computer device, and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450629A (en) * 2015-10-29 2016-03-30 东莞酷派软件技术有限公司 Biological-information-verification-based router connecting method and apparatus, and router
CN105809447A (en) * 2016-03-30 2016-07-27 ***股份有限公司 Payment authentication method and system based on face recognition and HCE
CN107506039A (en) * 2017-08-28 2017-12-22 努比亚技术有限公司 Mobile terminal, data transmission method and computer-readable storage medium
CN107507003A (en) * 2017-06-26 2017-12-22 阿里巴巴集团控股有限公司 A kind of method for processing business, equipment and system
CN107767509A (en) * 2017-10-16 2018-03-06 深圳市叮咚互联科技有限公司 Authorization method, server, authoring system and storage medium
CN107784501A (en) * 2017-09-29 2018-03-09 九派天下支付有限公司 A kind of safe method of payment and system based on recognition of face
CN107786489A (en) * 2016-08-24 2018-03-09 腾讯科技(深圳)有限公司 Access request verification method and device
US9917908B1 (en) * 2017-01-30 2018-03-13 Cloudflare, Inc. Third party validation of web content

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224217A (en) * 2015-08-29 2016-01-06 宇龙计算机通信科技(深圳)有限公司 A kind of transmission method of data and terminal thereof
US10164983B2 (en) * 2017-01-20 2018-12-25 Verizon Patent And Licensing Inc. Distributed authentication for internet-of-things resources

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450629A (en) * 2015-10-29 2016-03-30 东莞酷派软件技术有限公司 Biological-information-verification-based router connecting method and apparatus, and router
CN105809447A (en) * 2016-03-30 2016-07-27 ***股份有限公司 Payment authentication method and system based on face recognition and HCE
CN107786489A (en) * 2016-08-24 2018-03-09 腾讯科技(深圳)有限公司 Access request verification method and device
US9917908B1 (en) * 2017-01-30 2018-03-13 Cloudflare, Inc. Third party validation of web content
CN107507003A (en) * 2017-06-26 2017-12-22 阿里巴巴集团控股有限公司 A kind of method for processing business, equipment and system
CN107506039A (en) * 2017-08-28 2017-12-22 努比亚技术有限公司 Mobile terminal, data transmission method and computer-readable storage medium
CN107784501A (en) * 2017-09-29 2018-03-09 九派天下支付有限公司 A kind of safe method of payment and system based on recognition of face
CN107767509A (en) * 2017-10-16 2018-03-06 深圳市叮咚互联科技有限公司 Authorization method, server, authoring system and storage medium

Also Published As

Publication number Publication date
CN108989322A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
CN108989322B (en) Data transmission method, mobile terminal and computer readable storage medium
CN107835464B (en) Video call window picture processing method, terminal and computer readable storage medium
CN108830062B (en) Face recognition method, mobile terminal and computer readable storage medium
CN108159688B (en) Game interface sharing method, mobile terminal and computer-readable storage medium
CN109067995B (en) Brightness adjusting method, mobile terminal and computer readable storage medium
CN107231470B (en) Image processing method, mobile terminal and computer readable storage medium
CN109600740B (en) File downloading method and device and computer readable storage medium
CN108206892B (en) Method and device for protecting privacy of contact person, mobile terminal and storage medium
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN109033801B (en) Method for verifying user identity by application program, mobile terminal and storage medium
CN109086582B (en) Fingerprint authentication method, terminal and computer readable storage medium
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN107124718B (en) Data transmission method, mobile terminal and storage medium
CN110677851A (en) Terminal network access method and network access equipment access method
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN108376239B (en) Face recognition method, mobile terminal and storage medium
CN107241504B (en) Image processing method, mobile terminal and computer readable storage medium
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN107395363B (en) Fingerprint sharing method and mobile terminal
CN109063444B (en) Mobile terminal screen unlocking method, mobile terminal and computer readable storage medium
CN107135498B (en) File sharing method and equipment
CN106998553B (en) Equipment identity identification method, computer equipment and storage medium
CN111967871A (en) Secure payment method, device and storage medium
CN108400994B (en) User authentication method, mobile terminal, server, and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20181205

Address after: Room 608, Venture Building No. 18, High-tech Second Road, Nanchang High-tech Industrial Development Zone, Nanchang City, Jiangxi Province

Applicant after: Nanchang Nubian Technology Co., Ltd.

Applicant after: Nubian Technologies Ltd.

Address before: 518057 Dazu Innovation Building, 9018 Beihuan Avenue, Nanshan District, Shenzhen City, Guangdong Province, 6-8, 10-11, 6 and 6-10 floors in Area A, B and C

Applicant before: Nubian Technologies Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant