CN110290526A - A kind of data access method, device and medium - Google Patents

A kind of data access method, device and medium Download PDF

Info

Publication number
CN110290526A
CN110290526A CN201910558892.XA CN201910558892A CN110290526A CN 110290526 A CN110290526 A CN 110290526A CN 201910558892 A CN201910558892 A CN 201910558892A CN 110290526 A CN110290526 A CN 110290526A
Authority
CN
China
Prior art keywords
terminal
hotspot
access
data access
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910558892.XA
Other languages
Chinese (zh)
Other versions
CN110290526B (en
Inventor
张颢德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201910558892.XA priority Critical patent/CN110290526B/en
Publication of CN110290526A publication Critical patent/CN110290526A/en
Application granted granted Critical
Publication of CN110290526B publication Critical patent/CN110290526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure is directed to a kind of data access method, device and medium are applied to first terminal, comprising: detect trigger event, start access module;Open Wifi;Specified SSID hotspot are searched by Wifi signal, connection is established with the second terminal for being connected to the hotspot by the hotspot;Receive the verification information for the access request that the second terminal is sent;Verification information such as the access request is correct, prompts to be verified and the second terminal is authorized to carry out data access.It by the data access method of the disclosure, can access to the data in terminal, especially in the case where terminal screen damage can not operate, quickly access the data in terminal.

Description

A kind of data access method, device and medium
Technical field
This disclosure relates to the data access of data communication field more particularly to mobile terminal.
Background technique
In the related technology, smart machine only supports visualized data to access or grasped by PC using special-purpose software Make, instant PC connects smart machine by USB, it is also desirable in the enterprising row information confirmation of the screen of smart machine.If intelligence is set Standby damaged completely in screen and in the case that user is not intended to repair smart machine, user will be unable to intelligently setting Data in standby access, and specialized maintenance personnel can only be entrusted to carry out relevant operation, caused damages to user, and there are secrets The risk of leaking data.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of data access method, device and medium.
According to the first aspect of the embodiments of the present disclosure, a kind of data access method is provided, comprising:
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
Trigger event includes::
Entity key is determined by fingertip according to preset order.
After starting access module, further includes:
It opens volume and passes through the current state of auditory tone cues first terminal.
The verification information of access request includes: screen-lock password and/or device coding information.
Prompt, which is verified, includes:
It sends and is verified information to second terminal or the voice being verified by audible device broadcasting.
According to the second aspect of an embodiment of the present disclosure, a kind of data access method is provided, comprising:
Specified SSID hotspot are opened, is established and is connected with the first terminal for being connected to hotspot by hotspot It connects;
The verification information of access request is sent to first terminal;
If first terminal authorization is verified and obtained by first terminal, the data of first terminal are accessed.
According to the third aspect of an embodiment of the present disclosure, a kind of data access device is provided, comprising:
Access module starting module starts access module for detecting trigger event;
Wifi opening module, for opening Wifi;
Scan module, for searching specified SSID hotspot by Wifi signal;
First link block, for searching specified SSID hotspot by Wifi signal, by hotspot and The second terminal for being connected to hotspot establishes connection;
Receiving module, the verification information of the access request for receiving second terminal transmission;
Authentication module, for when the verification information for judging access request is correct, prompting to be verified and authorizing for the second end Hold into
Row data access.
Trigger event includes:
Entity key is determined by fingertip according to preset order.
Data access device further include:
Sound module, for opening volume and by the current state of auditory tone cues first terminal.
The verification information of access request includes: screen-lock password and/or device coding information.
Prompt, which is verified, includes:
It sends and is verified information to second terminal or the voice being verified by audible device broadcasting.
According to a fourth aspect of embodiments of the present disclosure, a kind of data access device is provided, further includes:
Second link block by hotspot and is connected to wireless heat for opening specified SSID of hotspot The first terminal of point establishes connection;
Sending module, for sending the verification information of access request to first terminal;
Access modules, for accessing the number of first terminal after verifying by first terminal and obtaining first terminal authorization According to.
According to a fifth aspect of the embodiments of the present disclosure, a kind of data access device, including processor are provided;
Memory for storage processor executable instruction;
Wherein, processor is configured as:
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
According to a sixth aspect of an embodiment of the present disclosure, a kind of non-transitorycomputer readable storage medium is provided, storage is worked as Medium
In instruction by mobile terminal processor execute when so that mobile terminal is able to carry out a kind of data access side Method, side
Method includes:
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
The technical scheme provided by this disclosed embodiment can include the following benefits: damage completely in intelligent terminal screen , can be by disclosed method if user is not intended to repair intelligent terminal under bad state, easily access intelligence is whole Data in end after especially having purchased new intelligent terminal in user, can directly visit the data in original intelligent terminal It asks in new intelligent terminal.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is the flow chart that a kind of data access method shown according to an exemplary embodiment is applied to first terminal.
Fig. 2 is the flow chart that a kind of data access method shown according to an exemplary embodiment is applied to second terminal.
Fig. 3 is the block diagram that a kind of data access device shown according to an exemplary embodiment is applied to first terminal.
Fig. 4 is the block diagram that a kind of data access device shown according to an exemplary embodiment is applied to first terminal.
Fig. 5 is the block diagram that a kind of data access device shown according to an exemplary embodiment is applied to second terminal.
Fig. 6 is a kind of block diagram of device shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of data access method shown according to an exemplary embodiment, applied to the flow chart of first terminal, As shown in Figure 1, data access method the following steps are included:
In step s101, it detects trigger event, starts access module;Wherein, detect that trigger event refers to detection To the event for determining entity key by fingertip according to preset order.Before this method execution, user needs to be previously set starting and visits Ask the entity key of mode by touching order, such as: while pinning volume+key and power key, then 3 volume-keys of adopting consecutive click chemical reaction, make Equipment enters access module;
In step s 102, Wifi is opened;If the Wifi function of smart machine is not opened before starting access module It opens, then can open Wifi switch after entering access module;
In step s 103, the hotspot that specified SSID are searched by Wifi signal, by hotspot with connect Second terminal to hotspot establishes connection;In step s 103, the SSID name of specified hotspot is to enter visit It asks and has set before mode, can be the title of system default, be also possible to the title of user's sets itself;Meanwhile the wireless heat Point can be provided by other intelligent terminals, can also be provided by wireless router;If hotspot is mentioned by other intelligent terminals For then other intelligent terminals are the second terminal in this method;If hotspot is provided by wireless router, we Described second terminal can be one or multiple terminal devices for being connected to the wireless router in method;
In step S104, the verification information for the access request that second terminal is sent is received;In order to guarantee the safety of data, It after second terminal and first terminal establish connection, needs first to send the verification information of access request to first terminal, and verifies By rear, step subsequent in this method could be executed;Wherein, the verification information of access request includes: the screen locking of first terminal Password and/or device coding information.
In step s105, it as the verification information of access request is correct, prompts to be verified and second terminal is authorized to carry out Data access.When second terminal be it is multiple when, only send the verification information of correct access request and be verified second Terminal can just be allowed to access to the data in first terminal, the safety of data is effectively ensured.
The data access method of the disclosure further include:
After starting access module, opens volume and pass through the current state of auditory tone cues first terminal;Opening volume includes, It sets maximum for volume, and loudspeaker is set, earpiece, earphone sounding simultaneously.In order to which user starts access mould on first terminal After formula, the state of first terminal is understood at any time, carries out auditory tone cues;Than such as whether successfully start up access module, and access mould Formula enters the information such as which in stage.Enter access module, before or after opening Wifi, opens volume setting, and by sound Tone is to maximum, then by the loudspeaker of first terminal, earpiece, earphone is set as while sounding, and prevent in first terminal above-mentioned sets It is standby damage situation occur, cause smoothly send auditory tone cues.
Prompt be verified include: transmission be verified information to second terminal or by audible device play verifying lead to The voice crossed.Receive second terminal transmission access request verification information, and determine verification information it is accurate after, prompt User can carry out the relevant operation of data access, can also send the information being verified by sending auditory tone cues To second terminal, or the content of first terminal is thrown into screen and arrives second terminal.
Fig. 2 is a kind of data access method shown according to an exemplary embodiment, applied to the flow chart of second terminal, Include:
In step s 201, specified SSID hotspot are opened, by hotspot and are connected to the hotspot First terminal establish connection;
In step S202, the verification information of access request is sent to first terminal;For example, the verification information of access request It can be set to the screen-lock password of first terminal, then verifying of the second terminal using the screen-lock password of first terminal as access request Information;It may be set to be the device coding of first terminal, then second terminal is asked using the device coding of first terminal as access The verification information asked.Further, the screen-lock password and device coding of first terminal be may be arranged as.
In step S203, if first terminal authorization is verified and obtained by first terminal, the number of first terminal is accessed According to.
It is existing to better understand the above method for example:
Example one:
The mobile phone of A is used for 2 years, prepares the mobile phone that more renews at any time, but A is on the road of working, accidentally Mobile phone is fallen, the complete fragmentation of mobile phone screen, if someone telephones in, mobile phone can issue vibration or sound, only can not Further operated.A worries very much, because of the data for having A usually to work in mobile phone, there are also the photos of household, such as If mobile phone is sent to the maintenance of specialized maintenance department by fruit, A worries that the information in mobile phone is leaked, moreover, A is ready for replacing Mobile phone, the expense for repairing mobile phone is entirely waste.
A expects that the mobile phone of oneself can carry out the access of data by starting access module suddenly;Then A is found The specification of the mobile phone of damage, and new cell-phone is had purchased on the day of, the hotspot of new cell-phone is opened, by the name of hotspot Claim the title for the hotspot marked being changed in old mobile phone specification;Then by the operation side on old mobile phone specification Method, while volume+key and power key are pinned, then 3 volume-keys of adopting consecutive click chemical reaction, old mobile phone make a sound prompt: have been started up visit Ask mode;Then prompt A again: the mobile phone establishes connection with other terminals, and A inputs the lock of old mobile phone on new cell-phone After shielding password, information alert is received again on new cell-phone, prompt can carry out data access.Then A is by answering in old mobile phone With data, information, address list, image etc. copied in new cell-phone.
Example two;
Zhang has purchased certain brand mobile phone two months ago, and using effect enables Zhang very satisfied, unique insufficient, exactly opens When certain feels to choose mobile phone at that time, the memory headroom of selection is smaller;Due to working, Zhang need oneself A large amount of operational data is stored on mobile phone, although the mobile phone is not long using the time, estimation has more than is needed six months, mobile phone Memory headroom will be not enough.
At this point, just failure occurs in the mobile phone of Zhang household, frequent power-off restarting needs replacing mobile phone, it is contemplated that house People use mobile phone the case where, typically just make a phone call and video seen in online, the demand to memory headroom is simultaneously little, then Zhang and After household discusses, the mobile phone for buying the big memory headroom of a same brand again is determined, it, will to replace oneself present mobile phone Present mobile phone is supplied to household's use.
After Zhang buys new cell-phone, the data in old mobile phone are exactly transferred to new mobile phone by first thing to be done In, then Zhang is according to the operating method on mobile phone specification, first opens hotspot on new cell-phone, and by the title of hot spot It is set as " MIBACKUPHOTPOT ";Then volume+key and power key, then 3 secondary noise of adopting consecutive click chemical reaction are pinned simultaneously on the old handsets Amount-key, after old mobile phone blank screen, issue prompt tone: " starting access module, just a moment,please ", after several seconds, screen is lighted, and Be simultaneously emitted by text and auditory tone cues: " having been started up access module, connecting hot spot ", then prompt again: " hot spot has connected Connect, please validation information on the access device ", new cell-phone also issues prompt at this time: " connection of access other equipment is built It is vertical, ask validation information." after Zhang inputs the startup password of old mobile phone on new cell-phone, old mobile phone issues prompt again: " verification information is correct, allows to access ", while the selection of screen pop-up " I wants downloading data " and " I will exit " of new cell-phone Key, after Zhang selects " I wants downloading data ", new cell-phone shows data access interface, and the Memory Data Display of old mobile phone is new On the screen of mobile phone, Zhang has selected the data and file of oneself needs, then reselection " being moved to same position " button, Old mobile phone makes a sound prompt: " just in mobile data ", while display data transmissions simultaneously on the screen of old mobile phone and new cell-phone Animation, and prompt schedule percentage.After bearing with a few minutes, old mobile phone makes a sound prompt: " data are mobile to be completed, Other please be select to operate or exit ".Zhang clicks on new cell-phone exit icon after, new hand exits data access interface, switching Return original state.Zhang picks up new cell-phone again, and by the habit using old mobile phone, is operated, find original data The same position in new hand is all had been copied to, does not have unused feeling completely.
Through above-mentioned example it can be found that under the complete distress condition of screen of intelligent device, if user is not intended to intelligence Energy equipment repairs, and can easily access the data in smart machine by disclosed method.Meanwhile this method is not It is limited to use in the state that screen of intelligent device is damaged, after user has purchased new smart machine, can directly accesses original Smart machine, and by the data copy in original equipment into new smart machine, compared to the access mode of connection PC, more simply Fast.
Fig. 3 is a kind of data access device shown according to an exemplary embodiment, the block diagram applied to first terminal.Ginseng Fig. 3 is examined, data access device includes: access module starting module 301, and Wifi opening module 302, scan module 303, first connects Connection module 304, receiving module 305, authentication module 306;
The access module starting module 301 is configurable for detecting trigger event, starts access module;
The Wifi opening module 302 is configurable for opening Wifi;
The scan module 303 is configurable for searching specified SSID hotspot by Wifi signal;
First link block 304 is configurable for searching specified SSID hotspot by Wifi signal, leads to It crosses the hotspot and establishes connection with the second terminal for being connected to the hotspot;
The receiving module 305 is configurable for the verification information of the access request for receiving second terminal transmission;
The authentication module 306 is configured in when judging that the verification information of access request is correct, and prompt is verified And second terminal is authorized to carry out data access.
It includes: to determine entity key by fingertip according to preset order that access module starting module, which starts access module,.
Fig. 4 is a kind of data access device shown according to an exemplary embodiment, the block diagram applied to first terminal.Ginseng Examine Fig. 4, data access device further include: sound module 401, the sound module 401 are arranged to be used for opening volume and pass through The current state of auditory tone cues first terminal.
The verification information of access request includes: screen-lock password and/or device coding information.
Prompt be verified include: transmission be verified information to second terminal or by audible device play verifying lead to The voice crossed.
Fig. 5 is a kind of data access device shown according to an exemplary embodiment, the block diagram applied to second terminal.Ginseng Examine Fig. 5, data access device further include: the second link block 501, sending module 502, access modules 503.
Second link block 501 is configurable for opening specified SSID of hotspot, by hotspot with The first terminal for being connected to the hotspot establishes connection;
The sending module 502 is configurable for sending the verification information of access request to first terminal;
The access modules 503 are configured in pass through a terminal authentication and obtain first terminal authorization after, access the The data of one terminal.
The disclosure additionally provides a kind of data access device, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, processor is configured as:
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 6 is a kind of block diagram that device 600 is asked for data shown according to an exemplary embodiment.For example, device 600 It can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, Body-building equipment, personal digital assistant etc..
Referring to Fig. 6, device 600 may include following one or more components: processing component 602, memory 604, electric power Component 606, multimedia component 608, audio component 610, the interface 612 of input/output (I/O), sensor module 614, and Communication component 616.
The integrated operation of the usual control device 600 of processing component 602, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing component 602 may include that one or more processors 620 refer to execute It enables, to perform all or part of the steps of the methods described above.In addition, processing component 602 may include one or more modules, just Interaction between processing component 602 and other assemblies.For example, processing component 602 may include multi-media module, it is more to facilitate Interaction between media component 608 and processing component 602.
Memory 604 is configured as storing various types of data to support the operation in equipment 600.These data are shown Example includes the instruction of any application or method for operating on device 600, contact data, and telephone book data disappears Breath, picture, video etc..Memory 604 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash Device, disk or CD.
Electric power assembly 606 provides electric power for the various assemblies of device 600.Electric power assembly 606 may include power management system System, one or more power supplys and other with for device 600 generate, manage, and distribute the associated component of electric power.
Multimedia component 608 includes the screen of one output interface of offer between described device 600 and user.One In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers Body component 608 includes a front camera and/or rear camera.When equipment 600 is in operation mode, such as screening-mode or When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 610 is configured as output and/or input audio signal.For example, audio component 610 includes a Mike Wind (MIC), when device 600 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched It is set to reception external audio signal.The received audio signal can be further stored in memory 604 or via communication set Part 616 is sent.In some embodiments, audio component 610 further includes a loudspeaker, is used for output audio signal.
I/O interface 612 provides interface between processing component 602 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 614 includes one or more sensors, and the state for providing various aspects for device 600 is commented Estimate.For example, sensor module 614 can detecte the state that opens/closes of equipment 600, and the relative positioning of component, for example, it is described Component is the display and keypad of device 600, and sensor module 614 can be with 600 1 components of detection device 600 or device Position change, the existence or non-existence that user contacts with device 600,600 orientation of device or acceleration/deceleration and device 600 Temperature change.Sensor module 614 may include proximity sensor, be configured to detect without any physical contact Presence of nearby objects.Sensor module 614 can also include optical sensor, such as CMOS or ccd image sensor, at As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 616 is configured to facilitate the communication of wired or wireless way between device 600 and other equipment.Device 600 can access the wireless network based on communication standard, such as Wifi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 616 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 616 further includes near-field communication (NFC) module, to promote short range communication.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 600 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 604 of instruction, above-metioned instruction can be executed by the processor 620 of device 600 to complete the above method.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of data access method, which comprises
It detects trigger event, starts access module;
Open Wifi;
The hotspot that specified SSID are searched by Wifi signal by hotspot and is connected to the of hotspot Two terminals establish connection;
Receive the verification information for the access request that second terminal is sent;
Verification information such as access request is correct, prompts to be verified and second terminal is authorized to carry out data access.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (14)

1. a kind of data access method is applied to first terminal characterized by comprising
It detects trigger event, starts access module;
Open Wifi;
Specified SSID hotspot are searched by Wifi signal, by the hotspot and are connected to the hotspot Second terminal establish connection;
Receive the verification information for the access request that the second terminal is sent;
Verification information such as the access request is correct, prompts to be verified and the second terminal is authorized to carry out data access.
2. data access method according to claim 1, which is characterized in that the trigger event includes::
Entity key is determined by fingertip according to preset order.
3. data access method according to claim 1, which is characterized in that after the starting access module, further includes:
Open volume and by the current state of first terminal described in auditory tone cues.
4. data access method according to claim 1, which is characterized in that the verification information include: screen-lock password and/ Or device coding information.
5. data access method according to claim 1, which is characterized in that the prompt, which is verified, includes:
It sends and is verified information to the second terminal or the voice being verified by audible device broadcasting.
6. a kind of data access method is applied to second terminal characterized by comprising
Specified SSID hotspot are opened, are built by the hotspot with the first terminal for being connected to the hotspot Vertical connection;
The verification information of access request is sent to the first terminal;
If the first terminal authorization is verified and obtained by the first terminal, the data of the first terminal are accessed.
7. a kind of data access device characterized by comprising
Access module starting module starts access module for detecting trigger event;
Wifi opening module, for opening Wifi;
Scan module, for searching specified SSID hotspot by Wifi signal;
First link block, for searching specified SSID hotspot by Wifi signal, by the hotspot and The second terminal for being connected to the hotspot establishes connection;
Receiving module, for receiving the verification information for the access request that the second terminal is sent;
Authentication module is prompted to be verified and authorizes described for when the verification information for judging the access request is correct Two terminals carry out data access.
8. data access device according to claim 7, which is characterized in that the trigger event includes:
Entity key is determined by fingertip according to preset order.
9. data access device according to claim 7, which is characterized in that further include:
Sound module, for opening volume and by the current state of first terminal described in auditory tone cues.
10. data access device according to claim 7, which is characterized in that the verification information of the access request includes: Screen-lock password and/or device coding information.
11. data access device according to claim 7, which is characterized in that the prompt, which is verified, includes:
It sends and is verified information to the second terminal or the voice being verified by audible device broadcasting.
12. a kind of data access device characterized by comprising
Second link block by the hotspot and is connected to the nothing for opening specified SSID of hotspot The first terminal of line hot spot establishes connection;
Sending module, for sending the verification information of access request to the first terminal;
Access modules, for accessing described first after verifying by the first terminal and obtaining the first terminal authorization The data of terminal.
13. a kind of data access device characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
It detects trigger event, starts access module;
Open Wifi;
Specified SSID hotspot are searched by Wifi signal, by the hotspot and are connected to the hotspot Second terminal establish connection;
Receive the verification information for the access request that the second terminal is sent;
Verification information such as the access request is correct, prompts to be verified and the second terminal is authorized to carry out data access.
14. a kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of data access method, which comprises
It detects trigger event, starts access module;
Open Wifi;
Specified SSID hotspot are searched by Wifi signal, by the hotspot and are connected to the hotspot Second terminal establish connection;
Receive the verification information for the access request that the second terminal is sent;
Verification information such as the access request is correct, prompts to be verified and the second terminal is authorized to carry out data access.
CN201910558892.XA 2019-06-26 2019-06-26 Data access method, device and medium Active CN110290526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910558892.XA CN110290526B (en) 2019-06-26 2019-06-26 Data access method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910558892.XA CN110290526B (en) 2019-06-26 2019-06-26 Data access method, device and medium

Publications (2)

Publication Number Publication Date
CN110290526A true CN110290526A (en) 2019-09-27
CN110290526B CN110290526B (en) 2023-10-24

Family

ID=68005907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910558892.XA Active CN110290526B (en) 2019-06-26 2019-06-26 Data access method, device and medium

Country Status (1)

Country Link
CN (1) CN110290526B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113986075A (en) * 2021-10-22 2022-01-28 维沃移动通信有限公司 Information display method and device, verification method and device and electronic equipment
CN115580677A (en) * 2022-09-26 2023-01-06 荣耀终端有限公司 Method for controlling equipment, electronic equipment and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130159456A1 (en) * 2008-05-19 2013-06-20 Tandem Diabetes Care, Inc. Therapy management system
CN105681261A (en) * 2014-11-19 2016-06-15 小米科技有限责任公司 Security authentication method and apparatus
CN106027557A (en) * 2016-07-01 2016-10-12 惠州Tcl移动通信有限公司 Data backup method
CN106203035A (en) * 2016-06-28 2016-12-07 广东欧珀移动通信有限公司 A kind of data access control method and mobile terminal
CN106358318A (en) * 2016-09-14 2017-01-25 广东欧珀移动通信有限公司 Hotspot building method and terminal equipment
US20170055150A1 (en) * 2015-08-18 2017-02-23 Xiaomi Inc. Method and device for acquiring using authority
CN106507279A (en) * 2016-10-31 2017-03-15 努比亚技术有限公司 Hotspot attachment means and method
CN106534467A (en) * 2015-09-10 2017-03-22 中兴通讯股份有限公司 Screen abnormity processing method and processing device, and terminal
CN107168821A (en) * 2017-04-28 2017-09-15 北京小米移动软件有限公司 Data back up method and device
CN107678884A (en) * 2017-09-27 2018-02-09 维沃移动通信有限公司 A kind of data transmission method, mobile terminal and computer-readable recording medium
WO2018049886A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Hotspot establishment method and terminal device
US20190034283A1 (en) * 2016-02-16 2019-01-31 Lg Electronics Inc. Mobile terminal and data backup and restoration method thereof

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130159456A1 (en) * 2008-05-19 2013-06-20 Tandem Diabetes Care, Inc. Therapy management system
CN105681261A (en) * 2014-11-19 2016-06-15 小米科技有限责任公司 Security authentication method and apparatus
US20170055150A1 (en) * 2015-08-18 2017-02-23 Xiaomi Inc. Method and device for acquiring using authority
CN106534467A (en) * 2015-09-10 2017-03-22 中兴通讯股份有限公司 Screen abnormity processing method and processing device, and terminal
US20190034283A1 (en) * 2016-02-16 2019-01-31 Lg Electronics Inc. Mobile terminal and data backup and restoration method thereof
CN106203035A (en) * 2016-06-28 2016-12-07 广东欧珀移动通信有限公司 A kind of data access control method and mobile terminal
CN106027557A (en) * 2016-07-01 2016-10-12 惠州Tcl移动通信有限公司 Data backup method
CN106358318A (en) * 2016-09-14 2017-01-25 广东欧珀移动通信有限公司 Hotspot building method and terminal equipment
WO2018049886A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Hotspot establishment method and terminal device
CN106507279A (en) * 2016-10-31 2017-03-15 努比亚技术有限公司 Hotspot attachment means and method
CN107168821A (en) * 2017-04-28 2017-09-15 北京小米移动软件有限公司 Data back up method and device
CN107678884A (en) * 2017-09-27 2018-02-09 维沃移动通信有限公司 A kind of data transmission method, mobile terminal and computer-readable recording medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ARYE, M等: "A formally-verified migration protocol for mobile, multi-homed hosts", 《 2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2012)》 *
王晓妮等: "基于云计算的数据安全风险及防御策略研究", 《计算机测量与控制》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113986075A (en) * 2021-10-22 2022-01-28 维沃移动通信有限公司 Information display method and device, verification method and device and electronic equipment
CN115580677A (en) * 2022-09-26 2023-01-06 荣耀终端有限公司 Method for controlling equipment, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110290526B (en) 2023-10-24

Similar Documents

Publication Publication Date Title
CN105354489B (en) Permission giving method and device
CN106487584B (en) Management method, router and the mobile terminal of router
CN106547663B (en) Key management method and device
CN105160239A (en) Application program access restriction method and apparatus
CN104965448A (en) Intelligent device control method and device
CN104219644A (en) Emergency communication method and device
CN105335062B (en) Information editing's operation processing method and device
CN105786609A (en) Control method and device of terminal
CN105653236A (en) Sound volume control method and device and mobile terminal
CN105072079A (en) Account logon method, account logon device and terminal device
CN105187667A (en) Incoming call processing method and device
CN104063654A (en) Monitoring method and device for application program
CN105550568A (en) Mobile terminal data protection method and apparatus
CN105487857A (en) Method and apparatus for prompting image shooting part to be started
CN107635231A (en) Control method, device and the mobile terminal of focus WIFI switches
CN105101202A (en) Information processing method and device
CN110290526A (en) A kind of data access method, device and medium
CN106357610B (en) Communication means and device
CN105430639B (en) Information processing method and device
CN105188024B (en) Access the method, apparatus and system of network
CN105450861A (en) Information prompt method and information prompt device
CN106062762B (en) Using encryption method and device
CN108766427A (en) Sound control method and device
CN105955635B (en) Interface display method and device
CN106096442B (en) Applications trigger method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant