CN110290526B - Data access method, device and medium - Google Patents

Data access method, device and medium Download PDF

Info

Publication number
CN110290526B
CN110290526B CN201910558892.XA CN201910558892A CN110290526B CN 110290526 B CN110290526 B CN 110290526B CN 201910558892 A CN201910558892 A CN 201910558892A CN 110290526 B CN110290526 B CN 110290526B
Authority
CN
China
Prior art keywords
terminal
data
access
starting
hot spot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910558892.XA
Other languages
Chinese (zh)
Other versions
CN110290526A (en
Inventor
张颢德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201910558892.XA priority Critical patent/CN110290526B/en
Publication of CN110290526A publication Critical patent/CN110290526A/en
Application granted granted Critical
Publication of CN110290526B publication Critical patent/CN110290526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure relates to a data access method, a device and a medium, which are applied to a first terminal and comprise the following steps: detecting a trigger event, and starting an access mode; starting Wifi; searching a wireless hot spot with a specified SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hot spot through the wireless hot spot; receiving verification information of an access request sent by the second terminal; if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access. By the data access method, the data in the terminal can be accessed, and particularly, the data in the terminal can be accessed quickly under the condition that the screen of the terminal is damaged and cannot be operated.

Description

Data access method, device and medium
Technical Field
The present disclosure relates to the field of data communications, and in particular to data access for mobile terminals.
Background
In the related art, the intelligent device only supports visual data access or operates through a PC using special software, and even if the PC is connected with the intelligent device through a USB, information confirmation is also required to be performed on the screen of the intelligent device. If the screen of the intelligent device is completely damaged and the user does not want to maintain the intelligent device, the user cannot access the data in the intelligent device, and only entrusts professional maintenance personnel to perform related operations, so that loss is caused to the user and the risk of private data leakage exists.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a data access method, apparatus, and medium.
According to a first aspect of an embodiment of the present disclosure, there is provided a data access method, including:
detecting a trigger event, and starting an access mode;
starting Wifi;
searching a wireless hotspot with a designated SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hotspot through the wireless hotspot;
receiving verification information of an access request sent by a second terminal;
if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access.
The triggering event includes: :
the designated entity keys are pressed in a preset order.
After the access mode is started, the method further comprises the following steps:
turning on the volume and prompting the current state of the first terminal through sound.
The authentication information of the access request includes: screen lock passwords and/or device encoded information.
Prompt verification includes:
and sending verification passing information to the second terminal or playing the verified voice through the sounding device.
According to a second aspect of the embodiments of the present disclosure, there is provided a data access method, including:
starting a wireless hot spot with a designated SSID name, and establishing connection with a first terminal connected to the wireless hot spot through the wireless hot spot;
sending verification information of the access request to the first terminal;
if the first terminal is authenticated and the first terminal authorization is obtained, accessing the data of the first terminal.
According to a third aspect of embodiments of the present disclosure, there is provided a data access apparatus comprising:
the access mode starting module is used for detecting a trigger event and starting an access mode;
the Wifi opening module is used for opening Wifi;
the scanning module is used for searching the wireless hot spot with the appointed SSID name through the Wifi signal;
the first connection module is used for searching a wireless hot spot with a specified SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hot spot through the wireless hot spot;
the receiving module is used for receiving verification information of the access request sent by the second terminal;
the verification module is used for prompting the verification to pass and authorizing the second terminal to enter when judging that the verification information of the access request is correct
And accessing data.
The triggering event includes:
the designated entity keys are pressed in a preset order.
The data access device further includes:
and the sound module is used for starting the volume and prompting the current state of the first terminal through sound.
The authentication information of the access request includes: screen lock passwords and/or device encoded information.
Prompt verification includes:
and sending verification passing information to the second terminal or playing the verified voice through the sounding device.
According to a fourth aspect of embodiments of the present disclosure, there is provided a data access apparatus, further comprising:
the second connection module is used for starting a wireless hot spot with a designated SSID name and establishing connection with a first terminal connected to the wireless hot spot through the wireless hot spot;
the sending module is used for sending verification information of the access request to the first terminal;
and the access module is used for accessing the data of the first terminal after the first terminal is authenticated and the authorization of the first terminal is obtained.
According to a fifth aspect of embodiments of the present disclosure, there is provided a data access apparatus comprising a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
detecting a trigger event, and starting an access mode;
starting Wifi;
searching a wireless hotspot with a designated SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hotspot through the wireless hotspot;
receiving verification information of an access request sent by a second terminal;
if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access.
According to a sixth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium, when the storage medium
The instructions of which, when executed by the processor of the mobile terminal, enable the mobile terminal to perform a data access method, method
The method comprises the following steps:
detecting a trigger event, and starting an access mode;
starting Wifi;
searching a wireless hotspot with a designated SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hotspot through the wireless hotspot;
receiving verification information of an access request sent by a second terminal;
if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: in the state that the screen of the intelligent terminal is completely damaged, if a user does not want to maintain the intelligent terminal, the data in the intelligent terminal can be easily accessed through the method, and particularly after the user purchases a new intelligent terminal, the data in the original intelligent terminal can be directly accessed into the new intelligent terminal.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a flowchart illustrating a data access method applied to a first terminal according to an exemplary embodiment.
Fig. 2 is a flowchart illustrating a data access method applied to a second terminal according to an exemplary embodiment.
Fig. 3 is a block diagram illustrating an application of a data access apparatus to a first terminal according to an exemplary embodiment.
Fig. 4 is a block diagram illustrating an application of a data access apparatus to a first terminal according to an exemplary embodiment.
Fig. 5 is a block diagram illustrating an application of a data access apparatus to a second terminal according to an exemplary embodiment.
Fig. 6 is a block diagram of an apparatus according to an example embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the application. Rather, they are merely examples of apparatus and methods consistent with aspects of the application as detailed in the accompanying claims.
Fig. 1 is a flowchart of a data access method applied to a first terminal according to an exemplary embodiment, and as shown in fig. 1, the data access method includes the steps of:
in step S101, a trigger event is detected, and an access mode is started; wherein, the detection of the trigger event refers to the detection of an event of pressing a designated entity key according to a preset sequence. Before the method is executed, the user needs to set the pressing order of the entity keys for starting the access mode in advance, for example: simultaneously pressing the volume + key and the power key, and continuously clicking the volume-key for 3 times to enable the equipment to enter an access mode;
in step S102, wifi is turned on; if the Wifi function of the intelligent device is not started before the access mode is started, a Wifi switch is turned on after the access mode is entered;
in step S103, searching for a wireless hotspot with a specified SSID name through a Wifi signal, and establishing a connection with a second terminal connected to the wireless hotspot through the wireless hotspot; in step S103, the SSID name of the designated wireless hotspot is set before entering the access mode, and may be a default name of the system or a name set by the user; meanwhile, the wireless hot spot can be provided by other intelligent terminals and also can be provided by a wireless router; if the wireless hotspot is provided by other intelligent terminals, the other intelligent terminals are second terminals in the method; if the wireless hotspot is provided by a wireless router, the second terminal in the method may be one or more terminal devices connected to the wireless router;
in step S104, receiving verification information of the access request sent by the second terminal; in order to ensure the safety of data, after the second terminal and the first terminal are connected, the verification information of the access request is required to be sent to the first terminal, and after the verification is passed, the subsequent steps in the method can be executed; wherein the authentication information of the access request includes: the screen locking password and/or the equipment coding information of the first terminal.
In step S105, if the authentication information of the access request is correct, the authentication is prompted to pass and the second terminal is authorized to perform data access. When the number of the second terminals is multiple, only the second terminals which send the correct verification information of the access request and pass the verification can be allowed to access the data in the first terminal, so that the safety of the data is effectively ensured.
The data access method of the present disclosure further includes:
after the access mode is started, starting the volume and prompting the current state of the first terminal through sound; opening the volume includes setting the volume to be maximum, and setting a loudspeaker, a receiver and an earphone to sound simultaneously. In order to enable a user to know the state of the first terminal at any time after an access mode is started on the first terminal, voice prompt is carried out; such as whether the access mode was successfully initiated and to which stage the access mode entered. Before or after the access mode is started, starting volume setting, maximizing sound tones, and setting the loudspeaker, the receiver and the earphone of the first terminal to sound simultaneously, so that the equipment in the first terminal is prevented from being damaged, and the sound prompt cannot be smoothly sent.
Prompt verification includes: and sending verification passing information to the second terminal or playing the verified voice through the sounding device. After receiving the verification information of the access request sent by the second terminal and determining that the verification information is accurate, prompting the user to perform related operation of data access, and sending a voice prompt, or sending information passing verification to the second terminal, or projecting the content of the first terminal to the second terminal.
Fig. 2 is a flowchart of a data access method applied to a second terminal according to an exemplary embodiment, including:
in step S201, a wireless hotspot with a specified SSID name is opened, and a connection is established between the wireless hotspot and a first terminal connected to the wireless hotspot;
in step S202, authentication information of an access request is transmitted to a first terminal; for example, the verification information of the access request may be set as a screen locking password of the first terminal, and the second terminal uses the screen locking password of the first terminal as the verification information of the access request; the device code of the first terminal may also be set, and the second terminal uses the device code of the first terminal as authentication information of the access request. Further, the screen locking password and the device code of the first terminal can be set.
In step S203, if the first terminal is authenticated and the first terminal authorization is obtained, the data of the first terminal is accessed.
For a better understanding of the above method, an example will now be described:
example one:
a, a certain mobile phone is used for two years, and a new mobile phone is ready to be replaced at any time, but the mobile phone is carelessly dropped on a business road, the screen of the mobile phone is completely broken, and if someone calls in, the mobile phone can make vibration or sound, and no further operation can be performed. A is very urgent, because the mobile phone has information of A working at ordinary times and pictures of family, if the mobile phone is sent to a professional maintenance department for maintenance, A is worried that the information in the mobile phone is leaked, and A is ready to replace the mobile phone, so that the cost of maintaining the mobile phone is completely wasted.
A, a certain abrupt thinking, the mobile phone of the mobile phone can access data by starting an access mode; the method includes the steps that A, a specification of a damaged mobile phone is found, a new mobile phone is purchased in the same day, a wireless hotspot of the new mobile phone is opened, and the name of the wireless hotspot is changed into the name of a marked wireless hotspot in the specification of an old mobile phone; then pressing the operation method on the old mobile phone instruction book, pressing the volume + key and the power key at the same time, and continuously clicking the volume-key for 3 times, and the old mobile phone gives out a voice prompt: the access mode has been initiated; and then prompt a: the mobile phone is connected with other terminals, and after a screen locking password of the old mobile phone is input on the new mobile phone, the new mobile phone receives an information prompt, and the prompt can be used for data access. And then the application data, information, address book, image and the like in the old mobile phone are copied into the new mobile phone.
Example two;
zhang Mou a certain brand of mobile phone is purchased two months before, the using effect is very satisfactory to Zhang Mou, and the only deficiency is that Zhang Mou is that when the mobile phone is purchased at the time, the selected memory space is smaller; for working reasons, zhang Mou needs to store a large amount of working data on its own mobile phone, and although the mobile phone is not used for a long time, the estimated time is less than half a year, and the memory space of the mobile phone is not used enough.
At this time, just Zhang Mou family's cell-phone has had the trouble, often cuts off the power supply and restarts, needs to change the cell-phone, considers the condition that the family used the cell-phone, generally only makes a call and looks video on the internet, and is not big to the demand of memory space, then Zhang Mou and family's commercial volume after, decides to purchase a cell-phone in the big memory space of same brand again, replaces own present cell-phone, provides present cell-phone for the family and uses.
Zhang Mou after purchasing a new mobile phone, the first thing to do is to transfer the data in the old mobile phone to the new mobile phone, so Zhang Mou starts the wireless hotspot on the new mobile phone according to the operation method on the mobile phone specification, and sets the name of the hotspot as 'MIBACKUPHOTPOT'; then, the volume + key and the power key are pressed on the old mobile phone at the same time, the volume-key is continuously clicked for 3 times, and after the old mobile phone is blacked out, a prompt tone is sent out: "access mode is being activated, please wait a few seconds later, the screen lights up and simultaneously sends out text and audible prompts: "access mode has been initiated, hot spot is being connected", then prompt again: "hotspot connected please enter authentication information on the access device", the new handset also sends a prompt: "connection to other device is established, please input authentication information. "Zhang Mou after entering the startup password of the old mobile phone on the new mobile phone, the old mobile phone sends out a prompt again: the method comprises the steps that verification information is correct, access is allowed, meanwhile, a screen of a new mobile phone pops up a selection button of 'I want to download data' and 'I want to exit', after Zhang Mou selects 'I want to download data', the new mobile phone displays a data access interface, memory data of an old mobile phone is displayed on the screen of the new mobile phone, zhang Mou selects data and folders required by the old mobile phone, then a button of 'move to the same position' is selected, and the old mobile phone gives out a voice prompt: and (3) moving data, simultaneously displaying data transmission animations on the screens of the old mobile phone and the new mobile phone, and prompting the completion progress percentage. After waiting for a few minutes, the old mobile phone gives out a sound prompt: "data movement complete, please select other operations or exit". Zhang Mou after clicking the exit icon on the new mobile phone, the novice exits the data access interface and switches back to the original state. Zhang Mou again picks up the new handset and operates according to the habit of using the old handset, finding that the original data has been copied to the same position in the new handset, completely without the feeling of being unaccustomed.
As can be seen from the above examples, in a completely damaged state of the smart device screen, if the user does not wish to repair the smart device, the data in the smart device can be easily accessed by the method of the present disclosure. Meanwhile, the method is not limited to being used in a state that the screen of the intelligent device is damaged, after a user purchases a new intelligent device, the user can directly access the original intelligent device and copy data in the original device into the new intelligent device, and compared with an access mode of connecting a PC, the method is simpler and faster.
Fig. 3 is a block diagram illustrating a data access apparatus applied to a first terminal according to an exemplary embodiment. Referring to fig. 3, the data access apparatus includes: an access mode starting module 301, a wifi starting module 302, a scanning module 303, a first connecting module 304, a receiving module 305 and a verifying module 306;
the access mode initiation module 301 is configured to detect a trigger event, initiating an access mode;
the Wifi opening module 302 is configured to open Wifi;
the scanning module 303 is configured to find a wireless hotspot with a specified SSID name through a Wifi signal;
the first connection module 304 is configured to search for a wireless hotspot with a specified SSID name through a Wifi signal, and establish a connection with a second terminal connected to the wireless hotspot through the wireless hotspot;
the receiving module 305 is configured to receive authentication information of an access request sent by the second terminal;
the authentication module 306 is configured to prompt authentication to pass and authorize the second terminal for data access when the authentication information of the access request is determined to be correct.
The access mode starting module starts the access mode including: the designated entity keys are pressed in a preset order.
Fig. 4 is a block diagram illustrating a data access apparatus applied to a first terminal according to an exemplary embodiment. Referring to fig. 4, the data access apparatus further includes: a sound module 401, the sound module 401 being arranged to turn on the volume and to sound the current state of the first terminal.
The authentication information of the access request includes: screen lock passwords and/or device encoded information.
Prompt verification includes: and sending verification passing information to the second terminal or playing the verified voice through the sounding device.
Fig. 5 is a block diagram illustrating a data access apparatus applied to a second terminal according to an exemplary embodiment. Referring to fig. 5, the data access apparatus further includes: a second connection module 501, a sending module 502, an accessing module 503.
The second connection module 501 is configured to turn on a wireless hotspot with a specified SSID name, and establish a connection with a first terminal connected to the wireless hotspot through the wireless hotspot;
the sending module 502 is configured to send authentication information of an access request to a first terminal;
the access module 503 is configured to access data of the first terminal after authentication by the first terminal and obtaining authorization of the first terminal.
The present disclosure also provides a data access apparatus, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
detecting a trigger event, and starting an access mode;
starting Wifi;
searching a wireless hotspot with a designated SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hotspot through the wireless hotspot;
receiving verification information of an access request sent by a second terminal;
if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 6 is a block diagram illustrating a method for a data query device 600, according to an example embodiment. For example, apparatus 600 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, exercise device, personal digital assistant, or the like.
Referring to fig. 6, apparatus 600 may include one or more of the following components: a processing component 602, a memory 604, a power component 606, a multimedia component 608, an audio component 610, an input/output (I/O) interface 612, a sensor component 614, and a communication component 616.
The processing component 602 generally controls overall operation of the apparatus 600, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 602 may include one or more processors 620 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 602 can include one or more modules that facilitate interaction between the processing component 602 and other components. For example, the processing component 602 may include a multimedia module to facilitate interaction between the multimedia component 608 and the processing component 602.
The memory 604 is configured to store various types of data to support operations at the device 600. Examples of such data include instructions for any application or method operating on the apparatus 600, contact data, phonebook data, messages, pictures, videos, and the like. The memory 604 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power component 606 provides power to the various components of the device 600. The power components 606 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 600.
The multimedia component 608 includes a screen between the device 600 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 608 includes a front camera and/or a rear camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 600 is in an operational mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 610 is configured to output and/or input audio signals. For example, the audio component 610 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 600 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 604 or transmitted via the communication component 616. In some embodiments, audio component 610 further includes a speaker for outputting audio signals.
The I/O interface 612 provides an interface between the processing component 602 and peripheral interface modules, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 614 includes one or more sensors for providing status assessment of various aspects of the apparatus 600. For example, the sensor assembly 614 may detect the on/off state of the device 600, the relative positioning of the components, such as the display and keypad of the apparatus 600, the sensor assembly 614 may also detect a change in position of the apparatus 600 or one of the components of the apparatus 600, the presence or absence of user contact with the apparatus 600, the orientation or acceleration/deceleration of the apparatus 600, and a change in temperature of the apparatus 600. The sensor assembly 614 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. The sensor assembly 614 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 614 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 616 is configured to facilitate communication between the apparatus 600 and other devices in a wired or wireless manner. The device 600 may access a wireless network based on a communication standard, such as Wifi,2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 616 receives broadcast signals or broadcast-related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 616 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 600 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for executing the methods described above.
In an exemplary embodiment, a non-transitory computer-readable storage medium is also provided, such as memory 604, including instructions executable by processor 620 of apparatus 600 to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
A non-transitory computer readable storage medium, which when executed by a processor of a mobile terminal, causes the mobile terminal to perform a data access method, the method comprising:
detecting a trigger event, and starting an access mode;
starting Wifi;
searching a wireless hotspot with a designated SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hotspot through the wireless hotspot;
receiving verification information of an access request sent by a second terminal;
if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (12)

1. A data access method applied to a first terminal, comprising:
detecting a trigger event, and starting an access mode;
starting Wifi;
searching a wireless hot spot with a specified SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hot spot through the wireless hot spot;
receiving verification information of an access request sent by the second terminal;
if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access;
transmitting the data and the storage information of the data to the second terminal;
and starting the volume and prompting the current state of the first terminal through sound, wherein the starting the volume comprises setting the volume to be maximum, setting a loudspeaker, a receiver and a headset to sound simultaneously, and the current state comprises whether to start the access mode and the stage where the access mode is located.
2. The data access method of claim 1, wherein the trigger event comprises:
the designated entity keys are pressed in a preset order.
3. The data access method according to claim 1, wherein the authentication information includes: screen lock passwords and/or device encoded information.
4. The data access method of claim 1, wherein the hint verification includes:
and sending verification passing information to the second terminal or playing the verified voice through the sounding device.
5. A data access method applied to the second terminal in the data access method according to any one of claims 1 to 4, comprising:
starting a wireless hot spot with a designated SSID name, and establishing connection with a first terminal connected to the wireless hot spot through the wireless hot spot;
sending verification information of an access request to the first terminal;
if the first terminal is authenticated and the first terminal authorization is obtained, accessing the data of the first terminal;
and receiving the data and the storage information of the data sent by the first terminal, and correspondingly storing the data according to the storage information.
6. A data access device, comprising:
the access mode starting module is used for detecting a trigger event and starting an access mode; the Wifi opening module is used for opening Wifi;
the scanning module is used for searching the wireless hot spot with the appointed SSID name through the Wifi signal;
the first connection module is used for searching a wireless hot spot with a specified SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hot spot through the wireless hot spot;
the receiving module is used for receiving verification information of the access request sent by the second terminal;
the verification module is used for prompting the verification to pass and authorizing the second terminal to perform data access when judging that the verification information of the access request is correct;
the sending module is used for sending the data and the storage information of the data to the second terminal;
the sound module is used for starting the volume and prompting the current state of the first terminal through sound, the starting of the volume comprises setting the volume to be maximum, and setting a loudspeaker, a receiver and a headset to sound simultaneously, and the current state comprises whether the access mode is started or not and the stage where the access mode is located.
7. The data access device of claim 6, wherein the trigger event comprises:
the designated entity keys are pressed in a preset order.
8. The data access device of claim 6, wherein the authentication information of the access request comprises: screen lock passwords and/or device encoded information.
9. The data access device of claim 6, wherein the hint verification includes:
and sending verification passing information to the second terminal or playing the verified voice through the sounding device.
10. A data access device for use in the second terminal in the data access device according to any one of claims 6 to 9, comprising:
the second connection module is used for starting a wireless hot spot with a designated SSID name, and establishing connection with a first terminal connected to the wireless hot spot through the wireless hot spot;
the sending module is used for sending verification information of the access request to the first terminal;
the access module is used for accessing the data of the first terminal after the first terminal is authenticated and the first terminal authorization is obtained;
and the receiving module is used for receiving the data and the storage information of the data sent by the first terminal and correspondingly storing the data according to the storage information.
11. A data access device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
detecting a trigger event, and starting an access mode;
starting Wifi;
searching a wireless hot spot with a specified SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hot spot through the wireless hot spot;
receiving verification information of an access request sent by the second terminal;
if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access;
transmitting the data and the storage information of the data to the second terminal;
and starting the volume and prompting the current state of the first terminal through sound, wherein the starting the volume comprises setting the volume to be maximum, setting a loudspeaker, a receiver and an earphone to sound simultaneously, and the current state comprises whether to start the access mode and the stage where the access mode is located.
12. A non-transitory computer readable storage medium, which when executed by a processor of a mobile terminal, causes the mobile terminal to perform a data access method, the method comprising:
detecting a trigger event, and starting an access mode;
starting Wifi;
searching a wireless hot spot with a specified SSID name through a Wifi signal, and establishing connection with a second terminal connected to the wireless hot spot through the wireless hot spot;
receiving verification information of an access request sent by the second terminal;
if the verification information of the access request is correct, prompting that the verification is passed and authorizing the second terminal to perform data access;
transmitting the data and the storage information of the data to the second terminal;
and starting the volume and prompting the current state of the mobile terminal through sound, wherein the starting the volume comprises setting the volume to be maximum, setting a loudspeaker, a receiver and an earphone to sound simultaneously, and the current state comprises whether to start the access mode and the stage where the access mode is located.
CN201910558892.XA 2019-06-26 2019-06-26 Data access method, device and medium Active CN110290526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910558892.XA CN110290526B (en) 2019-06-26 2019-06-26 Data access method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910558892.XA CN110290526B (en) 2019-06-26 2019-06-26 Data access method, device and medium

Publications (2)

Publication Number Publication Date
CN110290526A CN110290526A (en) 2019-09-27
CN110290526B true CN110290526B (en) 2023-10-24

Family

ID=68005907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910558892.XA Active CN110290526B (en) 2019-06-26 2019-06-26 Data access method, device and medium

Country Status (1)

Country Link
CN (1) CN110290526B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113986075A (en) * 2021-10-22 2022-01-28 维沃移动通信有限公司 Information display method and device, verification method and device and electronic equipment
CN115580677A (en) * 2022-09-26 2023-01-06 荣耀终端有限公司 Method for controlling equipment, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681261A (en) * 2014-11-19 2016-06-15 小米科技有限责任公司 Security authentication method and apparatus
WO2018049886A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Hotspot establishment method and terminal device

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013019852A2 (en) * 2011-08-01 2013-02-07 Tandem Diabetes Care, Inc. Therapy management system
CN105101339A (en) * 2015-08-18 2015-11-25 小米科技有限责任公司 Use permission obtaining method and device
CN106534467A (en) * 2015-09-10 2017-03-22 中兴通讯股份有限公司 Screen abnormity processing method and processing device, and terminal
US10684917B2 (en) * 2016-02-16 2020-06-16 Lg Electronics Inc. Mobile terminal and data backup and restoration method thereof
CN106203035B (en) * 2016-06-28 2019-04-02 Oppo广东移动通信有限公司 A kind of data access control method and mobile terminal
CN106027557A (en) * 2016-07-01 2016-10-12 惠州Tcl移动通信有限公司 Data backup method
CN106358318A (en) * 2016-09-14 2017-01-25 广东欧珀移动通信有限公司 Hotspot building method and terminal equipment
CN106507279A (en) * 2016-10-31 2017-03-15 努比亚技术有限公司 Hotspot attachment means and method
CN107168821A (en) * 2017-04-28 2017-09-15 北京小米移动软件有限公司 Data back up method and device
CN107678884A (en) * 2017-09-27 2018-02-09 维沃移动通信有限公司 A kind of data transmission method, mobile terminal and computer-readable recording medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681261A (en) * 2014-11-19 2016-06-15 小米科技有限责任公司 Security authentication method and apparatus
WO2018049886A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Hotspot establishment method and terminal device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A formally-verified migration protocol for mobile, multi-homed hosts;Arye, M等;《 2012 20th IEEE International Conference on Network Protocols (ICNP 2012)》;全文 *
基于云计算的数据安全风险及防御策略研究;王晓妮等;《计算机测量与控制》;全文 *

Also Published As

Publication number Publication date
CN110290526A (en) 2019-09-27

Similar Documents

Publication Publication Date Title
US10104599B2 (en) Device binding methods and apparatuses
EP3070905B1 (en) Method and apparatus for binding device
RU2663828C2 (en) Warning method and device
EP3151507B1 (en) Methods and apparatuses for controlling device
EP3300407B1 (en) Method and device for processing verification code
CN105847243B (en) Method and device for accessing intelligent camera
CN106528081B (en) Operation execution method and device
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
CN110049062B (en) Verification code verification method, device, system, server, electronic equipment and storage medium
WO2016155231A1 (en) Network access method and device
JP6101863B2 (en) Information transmission method, apparatus, program, and recording medium for voice service
CN104717622A (en) Information forwarding method and device, terminal and server
KR20170126388A (en) Method, device and system for executing business process
CN110290526B (en) Data access method, device and medium
CN107205198B (en) Microphone unlocking method and device
US9667784B2 (en) Methods and devices for providing information in voice service
CN107145771B (en) Application program unlocking method and device and terminal
CN105791409B (en) Remote connection establishing method and device
US20220408238A1 (en) Verification information processing method and apparatus, terminal device and storage medium
CN109246094B (en) User terminal verification method, device and storage medium
CN108766427B (en) Voice control method and device
CN106302342B (en) User account switching method and device
CN107911380B (en) Identity verification method and device
CN106712960B (en) Processing method and device of verification code information
CN114124462B (en) Verification code transmission method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant