CN110290526A - A kind of data access method, device and medium - Google Patents
A kind of data access method, device and medium Download PDFInfo
- Publication number
- CN110290526A CN110290526A CN201910558892.XA CN201910558892A CN110290526A CN 110290526 A CN110290526 A CN 110290526A CN 201910558892 A CN201910558892 A CN 201910558892A CN 110290526 A CN110290526 A CN 110290526A
- Authority
- CN
- China
- Prior art keywords
- terminal
- hotspot
- access
- data access
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The disclosure is directed to a kind of data access method, device and medium are applied to first terminal, comprising: detect trigger event, start access module;Open Wifi;Specified SSID hotspot are searched by Wifi signal, connection is established with the second terminal for being connected to the hotspot by the hotspot;Receive the verification information for the access request that the second terminal is sent;Verification information such as the access request is correct, prompts to be verified and the second terminal is authorized to carry out data access.It by the data access method of the disclosure, can access to the data in terminal, especially in the case where terminal screen damage can not operate, quickly access the data in terminal.
Description
Technical field
This disclosure relates to the data access of data communication field more particularly to mobile terminal.
Background technique
In the related technology, smart machine only supports visualized data to access or grasped by PC using special-purpose software
Make, instant PC connects smart machine by USB, it is also desirable in the enterprising row information confirmation of the screen of smart machine.If intelligence is set
Standby damaged completely in screen and in the case that user is not intended to repair smart machine, user will be unable to intelligently setting
Data in standby access, and specialized maintenance personnel can only be entrusted to carry out relevant operation, caused damages to user, and there are secrets
The risk of leaking data.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of data access method, device and medium.
According to the first aspect of the embodiments of the present disclosure, a kind of data access method is provided, comprising:
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot
Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
Trigger event includes::
Entity key is determined by fingertip according to preset order.
After starting access module, further includes:
It opens volume and passes through the current state of auditory tone cues first terminal.
The verification information of access request includes: screen-lock password and/or device coding information.
Prompt, which is verified, includes:
It sends and is verified information to second terminal or the voice being verified by audible device broadcasting.
According to the second aspect of an embodiment of the present disclosure, a kind of data access method is provided, comprising:
Specified SSID hotspot are opened, is established and is connected with the first terminal for being connected to hotspot by hotspot
It connects;
The verification information of access request is sent to first terminal;
If first terminal authorization is verified and obtained by first terminal, the data of first terminal are accessed.
According to the third aspect of an embodiment of the present disclosure, a kind of data access device is provided, comprising:
Access module starting module starts access module for detecting trigger event;
Wifi opening module, for opening Wifi;
Scan module, for searching specified SSID hotspot by Wifi signal;
First link block, for searching specified SSID hotspot by Wifi signal, by hotspot and
The second terminal for being connected to hotspot establishes connection;
Receiving module, the verification information of the access request for receiving second terminal transmission;
Authentication module, for when the verification information for judging access request is correct, prompting to be verified and authorizing for the second end
Hold into
Row data access.
Trigger event includes:
Entity key is determined by fingertip according to preset order.
Data access device further include:
Sound module, for opening volume and by the current state of auditory tone cues first terminal.
The verification information of access request includes: screen-lock password and/or device coding information.
Prompt, which is verified, includes:
It sends and is verified information to second terminal or the voice being verified by audible device broadcasting.
According to a fourth aspect of embodiments of the present disclosure, a kind of data access device is provided, further includes:
Second link block by hotspot and is connected to wireless heat for opening specified SSID of hotspot
The first terminal of point establishes connection;
Sending module, for sending the verification information of access request to first terminal;
Access modules, for accessing the number of first terminal after verifying by first terminal and obtaining first terminal authorization
According to.
According to a fifth aspect of the embodiments of the present disclosure, a kind of data access device, including processor are provided;
Memory for storage processor executable instruction;
Wherein, processor is configured as:
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot
Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
According to a sixth aspect of an embodiment of the present disclosure, a kind of non-transitorycomputer readable storage medium is provided, storage is worked as
Medium
In instruction by mobile terminal processor execute when so that mobile terminal is able to carry out a kind of data access side
Method, side
Method includes:
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot
Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
The technical scheme provided by this disclosed embodiment can include the following benefits: damage completely in intelligent terminal screen
, can be by disclosed method if user is not intended to repair intelligent terminal under bad state, easily access intelligence is whole
Data in end after especially having purchased new intelligent terminal in user, can directly visit the data in original intelligent terminal
It asks in new intelligent terminal.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is the flow chart that a kind of data access method shown according to an exemplary embodiment is applied to first terminal.
Fig. 2 is the flow chart that a kind of data access method shown according to an exemplary embodiment is applied to second terminal.
Fig. 3 is the block diagram that a kind of data access device shown according to an exemplary embodiment is applied to first terminal.
Fig. 4 is the block diagram that a kind of data access device shown according to an exemplary embodiment is applied to first terminal.
Fig. 5 is the block diagram that a kind of data access device shown according to an exemplary embodiment is applied to second terminal.
Fig. 6 is a kind of block diagram of device shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of data access method shown according to an exemplary embodiment, applied to the flow chart of first terminal,
As shown in Figure 1, data access method the following steps are included:
In step s101, it detects trigger event, starts access module;Wherein, detect that trigger event refers to detection
To the event for determining entity key by fingertip according to preset order.Before this method execution, user needs to be previously set starting and visits
Ask the entity key of mode by touching order, such as: while pinning volume+key and power key, then 3 volume-keys of adopting consecutive click chemical reaction, make
Equipment enters access module;
In step s 102, Wifi is opened;If the Wifi function of smart machine is not opened before starting access module
It opens, then can open Wifi switch after entering access module;
In step s 103, the hotspot that specified SSID are searched by Wifi signal, by hotspot with connect
Second terminal to hotspot establishes connection;In step s 103, the SSID name of specified hotspot is to enter visit
It asks and has set before mode, can be the title of system default, be also possible to the title of user's sets itself;Meanwhile the wireless heat
Point can be provided by other intelligent terminals, can also be provided by wireless router;If hotspot is mentioned by other intelligent terminals
For then other intelligent terminals are the second terminal in this method;If hotspot is provided by wireless router, we
Described second terminal can be one or multiple terminal devices for being connected to the wireless router in method;
In step S104, the verification information for the access request that second terminal is sent is received;In order to guarantee the safety of data,
It after second terminal and first terminal establish connection, needs first to send the verification information of access request to first terminal, and verifies
By rear, step subsequent in this method could be executed;Wherein, the verification information of access request includes: the screen locking of first terminal
Password and/or device coding information.
In step s105, it as the verification information of access request is correct, prompts to be verified and second terminal is authorized to carry out
Data access.When second terminal be it is multiple when, only send the verification information of correct access request and be verified second
Terminal can just be allowed to access to the data in first terminal, the safety of data is effectively ensured.
The data access method of the disclosure further include:
After starting access module, opens volume and pass through the current state of auditory tone cues first terminal;Opening volume includes,
It sets maximum for volume, and loudspeaker is set, earpiece, earphone sounding simultaneously.In order to which user starts access mould on first terminal
After formula, the state of first terminal is understood at any time, carries out auditory tone cues;Than such as whether successfully start up access module, and access mould
Formula enters the information such as which in stage.Enter access module, before or after opening Wifi, opens volume setting, and by sound
Tone is to maximum, then by the loudspeaker of first terminal, earpiece, earphone is set as while sounding, and prevent in first terminal above-mentioned sets
It is standby damage situation occur, cause smoothly send auditory tone cues.
Prompt be verified include: transmission be verified information to second terminal or by audible device play verifying lead to
The voice crossed.Receive second terminal transmission access request verification information, and determine verification information it is accurate after, prompt
User can carry out the relevant operation of data access, can also send the information being verified by sending auditory tone cues
To second terminal, or the content of first terminal is thrown into screen and arrives second terminal.
Fig. 2 is a kind of data access method shown according to an exemplary embodiment, applied to the flow chart of second terminal,
Include:
In step s 201, specified SSID hotspot are opened, by hotspot and are connected to the hotspot
First terminal establish connection;
In step S202, the verification information of access request is sent to first terminal;For example, the verification information of access request
It can be set to the screen-lock password of first terminal, then verifying of the second terminal using the screen-lock password of first terminal as access request
Information;It may be set to be the device coding of first terminal, then second terminal is asked using the device coding of first terminal as access
The verification information asked.Further, the screen-lock password and device coding of first terminal be may be arranged as.
In step S203, if first terminal authorization is verified and obtained by first terminal, the number of first terminal is accessed
According to.
It is existing to better understand the above method for example:
Example one:
The mobile phone of A is used for 2 years, prepares the mobile phone that more renews at any time, but A is on the road of working, accidentally
Mobile phone is fallen, the complete fragmentation of mobile phone screen, if someone telephones in, mobile phone can issue vibration or sound, only can not
Further operated.A worries very much, because of the data for having A usually to work in mobile phone, there are also the photos of household, such as
If mobile phone is sent to the maintenance of specialized maintenance department by fruit, A worries that the information in mobile phone is leaked, moreover, A is ready for replacing
Mobile phone, the expense for repairing mobile phone is entirely waste.
A expects that the mobile phone of oneself can carry out the access of data by starting access module suddenly;Then A is found
The specification of the mobile phone of damage, and new cell-phone is had purchased on the day of, the hotspot of new cell-phone is opened, by the name of hotspot
Claim the title for the hotspot marked being changed in old mobile phone specification;Then by the operation side on old mobile phone specification
Method, while volume+key and power key are pinned, then 3 volume-keys of adopting consecutive click chemical reaction, old mobile phone make a sound prompt: have been started up visit
Ask mode;Then prompt A again: the mobile phone establishes connection with other terminals, and A inputs the lock of old mobile phone on new cell-phone
After shielding password, information alert is received again on new cell-phone, prompt can carry out data access.Then A is by answering in old mobile phone
With data, information, address list, image etc. copied in new cell-phone.
Example two;
Zhang has purchased certain brand mobile phone two months ago, and using effect enables Zhang very satisfied, unique insufficient, exactly opens
When certain feels to choose mobile phone at that time, the memory headroom of selection is smaller;Due to working, Zhang need oneself
A large amount of operational data is stored on mobile phone, although the mobile phone is not long using the time, estimation has more than is needed six months, mobile phone
Memory headroom will be not enough.
At this point, just failure occurs in the mobile phone of Zhang household, frequent power-off restarting needs replacing mobile phone, it is contemplated that house
People use mobile phone the case where, typically just make a phone call and video seen in online, the demand to memory headroom is simultaneously little, then Zhang and
After household discusses, the mobile phone for buying the big memory headroom of a same brand again is determined, it, will to replace oneself present mobile phone
Present mobile phone is supplied to household's use.
After Zhang buys new cell-phone, the data in old mobile phone are exactly transferred to new mobile phone by first thing to be done
In, then Zhang is according to the operating method on mobile phone specification, first opens hotspot on new cell-phone, and by the title of hot spot
It is set as " MIBACKUPHOTPOT ";Then volume+key and power key, then 3 secondary noise of adopting consecutive click chemical reaction are pinned simultaneously on the old handsets
Amount-key, after old mobile phone blank screen, issue prompt tone: " starting access module, just a moment,please ", after several seconds, screen is lighted, and
Be simultaneously emitted by text and auditory tone cues: " having been started up access module, connecting hot spot ", then prompt again: " hot spot has connected
Connect, please validation information on the access device ", new cell-phone also issues prompt at this time: " connection of access other equipment is built
It is vertical, ask validation information." after Zhang inputs the startup password of old mobile phone on new cell-phone, old mobile phone issues prompt again:
" verification information is correct, allows to access ", while the selection of screen pop-up " I wants downloading data " and " I will exit " of new cell-phone
Key, after Zhang selects " I wants downloading data ", new cell-phone shows data access interface, and the Memory Data Display of old mobile phone is new
On the screen of mobile phone, Zhang has selected the data and file of oneself needs, then reselection " being moved to same position " button,
Old mobile phone makes a sound prompt: " just in mobile data ", while display data transmissions simultaneously on the screen of old mobile phone and new cell-phone
Animation, and prompt schedule percentage.After bearing with a few minutes, old mobile phone makes a sound prompt: " data are mobile to be completed,
Other please be select to operate or exit ".Zhang clicks on new cell-phone exit icon after, new hand exits data access interface, switching
Return original state.Zhang picks up new cell-phone again, and by the habit using old mobile phone, is operated, find original data
The same position in new hand is all had been copied to, does not have unused feeling completely.
Through above-mentioned example it can be found that under the complete distress condition of screen of intelligent device, if user is not intended to intelligence
Energy equipment repairs, and can easily access the data in smart machine by disclosed method.Meanwhile this method is not
It is limited to use in the state that screen of intelligent device is damaged, after user has purchased new smart machine, can directly accesses original
Smart machine, and by the data copy in original equipment into new smart machine, compared to the access mode of connection PC, more simply
Fast.
Fig. 3 is a kind of data access device shown according to an exemplary embodiment, the block diagram applied to first terminal.Ginseng
Fig. 3 is examined, data access device includes: access module starting module 301, and Wifi opening module 302, scan module 303, first connects
Connection module 304, receiving module 305, authentication module 306;
The access module starting module 301 is configurable for detecting trigger event, starts access module;
The Wifi opening module 302 is configurable for opening Wifi;
The scan module 303 is configurable for searching specified SSID hotspot by Wifi signal;
First link block 304 is configurable for searching specified SSID hotspot by Wifi signal, leads to
It crosses the hotspot and establishes connection with the second terminal for being connected to the hotspot;
The receiving module 305 is configurable for the verification information of the access request for receiving second terminal transmission;
The authentication module 306 is configured in when judging that the verification information of access request is correct, and prompt is verified
And second terminal is authorized to carry out data access.
It includes: to determine entity key by fingertip according to preset order that access module starting module, which starts access module,.
Fig. 4 is a kind of data access device shown according to an exemplary embodiment, the block diagram applied to first terminal.Ginseng
Examine Fig. 4, data access device further include: sound module 401, the sound module 401 are arranged to be used for opening volume and pass through
The current state of auditory tone cues first terminal.
The verification information of access request includes: screen-lock password and/or device coding information.
Prompt be verified include: transmission be verified information to second terminal or by audible device play verifying lead to
The voice crossed.
Fig. 5 is a kind of data access device shown according to an exemplary embodiment, the block diagram applied to second terminal.Ginseng
Examine Fig. 5, data access device further include: the second link block 501, sending module 502, access modules 503.
Second link block 501 is configurable for opening specified SSID of hotspot, by hotspot with
The first terminal for being connected to the hotspot establishes connection;
The sending module 502 is configurable for sending the verification information of access request to first terminal;
The access modules 503 are configured in pass through a terminal authentication and obtain first terminal authorization after, access the
The data of one terminal.
The disclosure additionally provides a kind of data access device, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, processor is configured as:
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot
Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 6 is a kind of block diagram that device 600 is asked for data shown according to an exemplary embodiment.For example, device 600
It can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices,
Body-building equipment, personal digital assistant etc..
Referring to Fig. 6, device 600 may include following one or more components: processing component 602, memory 604, electric power
Component 606, multimedia component 608, audio component 610, the interface 612 of input/output (I/O), sensor module 614, and
Communication component 616.
The integrated operation of the usual control device 600 of processing component 602, such as with display, telephone call, data communication, phase
Machine operation and record operate associated operation.Processing component 602 may include that one or more processors 620 refer to execute
It enables, to perform all or part of the steps of the methods described above.In addition, processing component 602 may include one or more modules, just
Interaction between processing component 602 and other assemblies.For example, processing component 602 may include multi-media module, it is more to facilitate
Interaction between media component 608 and processing component 602.
Memory 604 is configured as storing various types of data to support the operation in equipment 600.These data are shown
Example includes the instruction of any application or method for operating on device 600, contact data, and telephone book data disappears
Breath, picture, video etc..Memory 604 can be by any kind of volatibility or non-volatile memory device or their group
It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile
Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash
Device, disk or CD.
Electric power assembly 606 provides electric power for the various assemblies of device 600.Electric power assembly 606 may include power management system
System, one or more power supplys and other with for device 600 generate, manage, and distribute the associated component of electric power.
Multimedia component 608 includes the screen of one output interface of offer between described device 600 and user.One
In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings
Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action
Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers
Body component 608 includes a front camera and/or rear camera.When equipment 600 is in operation mode, such as screening-mode or
When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 610 is configured as output and/or input audio signal.For example, audio component 610 includes a Mike
Wind (MIC), when device 600 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched
It is set to reception external audio signal.The received audio signal can be further stored in memory 604 or via communication set
Part 616 is sent.In some embodiments, audio component 610 further includes a loudspeaker, is used for output audio signal.
I/O interface 612 provides interface between processing component 602 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock
Determine button.
Sensor module 614 includes one or more sensors, and the state for providing various aspects for device 600 is commented
Estimate.For example, sensor module 614 can detecte the state that opens/closes of equipment 600, and the relative positioning of component, for example, it is described
Component is the display and keypad of device 600, and sensor module 614 can be with 600 1 components of detection device 600 or device
Position change, the existence or non-existence that user contacts with device 600,600 orientation of device or acceleration/deceleration and device 600
Temperature change.Sensor module 614 may include proximity sensor, be configured to detect without any physical contact
Presence of nearby objects.Sensor module 614 can also include optical sensor, such as CMOS or ccd image sensor, at
As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 616 is configured to facilitate the communication of wired or wireless way between device 600 and other equipment.Device
600 can access the wireless network based on communication standard, such as Wifi, 2G or 3G or their combination.In an exemplary implementation
In example, communication component 616 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 616 further includes near-field communication (NFC) module, to promote short range communication.Example
Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 600 can be believed by one or more application specific integrated circuit (ASIC), number
Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 604 of instruction, above-metioned instruction can be executed by the processor 620 of device 600 to complete the above method.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device executes, so that mobile terminal is able to carry out a kind of data access method, which comprises
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot
Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or
Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.
Claims (14)
1. a kind of data access method is applied to first terminal characterized by comprising
It detects trigger event, starts access module;
Open Wifi;
Specified SSID hotspot are searched by Wifi signal, by the hotspot and are connected to the hotspot
Second terminal establish connection;
Receive the verification information for the access request that the second terminal is sent;
Verification information such as the access request is correct, prompts to be verified and the second terminal is authorized to carry out data access.
2. data access method according to claim 1, which is characterized in that the trigger event includes::
Entity key is determined by fingertip according to preset order.
3. data access method according to claim 1, which is characterized in that after the starting access module, further includes:
Open volume and by the current state of first terminal described in auditory tone cues.
4. data access method according to claim 1, which is characterized in that the verification information include: screen-lock password and/
Or device coding information.
5. data access method according to claim 1, which is characterized in that the prompt, which is verified, includes:
It sends and is verified information to the second terminal or the voice being verified by audible device broadcasting.
6. a kind of data access method is applied to second terminal characterized by comprising
Specified SSID hotspot are opened, are built by the hotspot with the first terminal for being connected to the hotspot
Vertical connection;
The verification information of access request is sent to the first terminal;
If the first terminal authorization is verified and obtained by the first terminal, the data of the first terminal are accessed.
7. a kind of data access device characterized by comprising
Access module starting module starts access module for detecting trigger event;
Wifi opening module, for opening Wifi;
Scan module, for searching specified SSID hotspot by Wifi signal;
First link block, for searching specified SSID hotspot by Wifi signal, by the hotspot and
The second terminal for being connected to the hotspot establishes connection;
Receiving module, for receiving the verification information for the access request that the second terminal is sent;
Authentication module is prompted to be verified and authorizes described for when the verification information for judging the access request is correct
Two terminals carry out data access.
8. data access device according to claim 7, which is characterized in that the trigger event includes:
Entity key is determined by fingertip according to preset order.
9. data access device according to claim 7, which is characterized in that further include:
Sound module, for opening volume and by the current state of first terminal described in auditory tone cues.
10. data access device according to claim 7, which is characterized in that the verification information of the access request includes:
Screen-lock password and/or device coding information.
11. data access device according to claim 7, which is characterized in that the prompt, which is verified, includes:
It sends and is verified information to the second terminal or the voice being verified by audible device broadcasting.
12. a kind of data access device characterized by comprising
Second link block by the hotspot and is connected to the nothing for opening specified SSID of hotspot
The first terminal of line hot spot establishes connection;
Sending module, for sending the verification information of access request to the first terminal;
Access modules, for accessing described first after verifying by the first terminal and obtaining the first terminal authorization
The data of terminal.
13. a kind of data access device characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
It detects trigger event, starts access module;
Open Wifi;
Specified SSID hotspot are searched by Wifi signal, by the hotspot and are connected to the hotspot
Second terminal establish connection;
Receive the verification information for the access request that the second terminal is sent;
Verification information such as the access request is correct, prompts to be verified and the second terminal is authorized to carry out data access.
14. a kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device executes, so that mobile terminal is able to carry out a kind of data access method, which comprises
It detects trigger event, starts access module;
Open Wifi;
Specified SSID hotspot are searched by Wifi signal, by the hotspot and are connected to the hotspot
Second terminal establish connection;
Receive the verification information for the access request that the second terminal is sent;
Verification information such as the access request is correct, prompts to be verified and the second terminal is authorized to carry out data access.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910558892.XA CN110290526B (en) | 2019-06-26 | 2019-06-26 | Data access method, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910558892.XA CN110290526B (en) | 2019-06-26 | 2019-06-26 | Data access method, device and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110290526A true CN110290526A (en) | 2019-09-27 |
CN110290526B CN110290526B (en) | 2023-10-24 |
Family
ID=68005907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910558892.XA Active CN110290526B (en) | 2019-06-26 | 2019-06-26 | Data access method, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110290526B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113986075A (en) * | 2021-10-22 | 2022-01-28 | 维沃移动通信有限公司 | Information display method and device, verification method and device and electronic equipment |
CN115580677A (en) * | 2022-09-26 | 2023-01-06 | 荣耀终端有限公司 | Method for controlling equipment, electronic equipment and storage medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130159456A1 (en) * | 2008-05-19 | 2013-06-20 | Tandem Diabetes Care, Inc. | Therapy management system |
CN105681261A (en) * | 2014-11-19 | 2016-06-15 | 小米科技有限责任公司 | Security authentication method and apparatus |
CN106027557A (en) * | 2016-07-01 | 2016-10-12 | 惠州Tcl移动通信有限公司 | Data backup method |
CN106203035A (en) * | 2016-06-28 | 2016-12-07 | 广东欧珀移动通信有限公司 | A kind of data access control method and mobile terminal |
CN106358318A (en) * | 2016-09-14 | 2017-01-25 | 广东欧珀移动通信有限公司 | Hotspot building method and terminal equipment |
US20170055150A1 (en) * | 2015-08-18 | 2017-02-23 | Xiaomi Inc. | Method and device for acquiring using authority |
CN106507279A (en) * | 2016-10-31 | 2017-03-15 | 努比亚技术有限公司 | Hotspot attachment means and method |
CN106534467A (en) * | 2015-09-10 | 2017-03-22 | 中兴通讯股份有限公司 | Screen abnormity processing method and processing device, and terminal |
CN107168821A (en) * | 2017-04-28 | 2017-09-15 | 北京小米移动软件有限公司 | Data back up method and device |
CN107678884A (en) * | 2017-09-27 | 2018-02-09 | 维沃移动通信有限公司 | A kind of data transmission method, mobile terminal and computer-readable recording medium |
WO2018049886A1 (en) * | 2016-09-14 | 2018-03-22 | 广东欧珀移动通信有限公司 | Hotspot establishment method and terminal device |
US20190034283A1 (en) * | 2016-02-16 | 2019-01-31 | Lg Electronics Inc. | Mobile terminal and data backup and restoration method thereof |
-
2019
- 2019-06-26 CN CN201910558892.XA patent/CN110290526B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130159456A1 (en) * | 2008-05-19 | 2013-06-20 | Tandem Diabetes Care, Inc. | Therapy management system |
CN105681261A (en) * | 2014-11-19 | 2016-06-15 | 小米科技有限责任公司 | Security authentication method and apparatus |
US20170055150A1 (en) * | 2015-08-18 | 2017-02-23 | Xiaomi Inc. | Method and device for acquiring using authority |
CN106534467A (en) * | 2015-09-10 | 2017-03-22 | 中兴通讯股份有限公司 | Screen abnormity processing method and processing device, and terminal |
US20190034283A1 (en) * | 2016-02-16 | 2019-01-31 | Lg Electronics Inc. | Mobile terminal and data backup and restoration method thereof |
CN106203035A (en) * | 2016-06-28 | 2016-12-07 | 广东欧珀移动通信有限公司 | A kind of data access control method and mobile terminal |
CN106027557A (en) * | 2016-07-01 | 2016-10-12 | 惠州Tcl移动通信有限公司 | Data backup method |
CN106358318A (en) * | 2016-09-14 | 2017-01-25 | 广东欧珀移动通信有限公司 | Hotspot building method and terminal equipment |
WO2018049886A1 (en) * | 2016-09-14 | 2018-03-22 | 广东欧珀移动通信有限公司 | Hotspot establishment method and terminal device |
CN106507279A (en) * | 2016-10-31 | 2017-03-15 | 努比亚技术有限公司 | Hotspot attachment means and method |
CN107168821A (en) * | 2017-04-28 | 2017-09-15 | 北京小米移动软件有限公司 | Data back up method and device |
CN107678884A (en) * | 2017-09-27 | 2018-02-09 | 维沃移动通信有限公司 | A kind of data transmission method, mobile terminal and computer-readable recording medium |
Non-Patent Citations (2)
Title |
---|
ARYE, M等: "A formally-verified migration protocol for mobile, multi-homed hosts", 《 2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2012)》 * |
王晓妮等: "基于云计算的数据安全风险及防御策略研究", 《计算机测量与控制》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113986075A (en) * | 2021-10-22 | 2022-01-28 | 维沃移动通信有限公司 | Information display method and device, verification method and device and electronic equipment |
CN115580677A (en) * | 2022-09-26 | 2023-01-06 | 荣耀终端有限公司 | Method for controlling equipment, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110290526B (en) | 2023-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105354489B (en) | Permission giving method and device | |
CN106487584B (en) | Management method, router and the mobile terminal of router | |
CN106547663B (en) | Key management method and device | |
CN105160239A (en) | Application program access restriction method and apparatus | |
CN104965448A (en) | Intelligent device control method and device | |
CN104219644A (en) | Emergency communication method and device | |
CN105335062B (en) | Information editing's operation processing method and device | |
CN105786609A (en) | Control method and device of terminal | |
CN105653236A (en) | Sound volume control method and device and mobile terminal | |
CN105072079A (en) | Account logon method, account logon device and terminal device | |
CN105187667A (en) | Incoming call processing method and device | |
CN104063654A (en) | Monitoring method and device for application program | |
CN105550568A (en) | Mobile terminal data protection method and apparatus | |
CN105487857A (en) | Method and apparatus for prompting image shooting part to be started | |
CN107635231A (en) | Control method, device and the mobile terminal of focus WIFI switches | |
CN105101202A (en) | Information processing method and device | |
CN110290526A (en) | A kind of data access method, device and medium | |
CN106357610B (en) | Communication means and device | |
CN105430639B (en) | Information processing method and device | |
CN105188024B (en) | Access the method, apparatus and system of network | |
CN105450861A (en) | Information prompt method and information prompt device | |
CN106062762B (en) | Using encryption method and device | |
CN108766427A (en) | Sound control method and device | |
CN105955635B (en) | Interface display method and device | |
CN106096442B (en) | Applications trigger method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |