CN110418311B - Interconnection method and device based on multiple terminals and terminal - Google Patents
Interconnection method and device based on multiple terminals and terminal Download PDFInfo
- Publication number
- CN110418311B CN110418311B CN201810400555.3A CN201810400555A CN110418311B CN 110418311 B CN110418311 B CN 110418311B CN 201810400555 A CN201810400555 A CN 201810400555A CN 110418311 B CN110418311 B CN 110418311B
- Authority
- CN
- China
- Prior art keywords
- terminal
- address
- message
- user identity
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the application relates to an interconnection method based on a plurality of terminals. The method specifically comprises the following steps: a first terminal broadcasts a first message, wherein the first message comprises first matching information and an address of the first terminal; the first terminal receives a second message sent by the second terminal according to the address of the first terminal, wherein the second message comprises the address of the second terminal; the first terminal sends a user identity identifier to the second terminal according to the address of the second terminal, and the user identity identifier is used for the second terminal to verify the first terminal; and the first terminal receives a third message sent by the second terminal and establishes connection with the second terminal according to the third message. In the scheme, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching the IP address of the second terminal, manually inputting the IP address and the password and the like by the user are omitted, and the user can realize automatic interconnection among the multiple terminals only by sending a request connection and an authentication process.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for interconnecting a plurality of terminals, and a terminal.
Background
With the development of wireless networks and the popularization of terminals, people have higher and higher use degree and dependence on mobile phones, tablet computers and computers. In daily life and work, there is often a need for connecting multiple terminals to each other and transmitting data, for example: the mobile phone and the computer are connected with each other through hot spots; or, the mobile phone and the computer are connected through a Universal Serial Bus (USB).
Currently, common interconnection methods include: the method comprises the steps that different terminals (such as a mobile phone, a tablet computer and the like) are connected to the same local area network, then, a user needs to manually input authentication information (such as an Internet Protocol (IP) address and a verification password of interconnection between target terminal networks) of a target terminal in a terminal A, the authentication information is sent to the target terminal, and the target terminal is allowed to establish connection with the terminal A after the target terminal passes the verification according to the authentication information. However, since the above method requires the user to first find the target terminal IP address of the target terminal, it is difficult for the user who is not familiar with the usage method to find the IP address. Secondly, the process of establishing the connection requires the user to input the authentication information of the target terminal, and the operation process is complicated.
Disclosure of Invention
In order to solve the problems in the related art, embodiments of the present invention provide an interconnection method, an interconnection device, and a terminal based on multiple terminals, which solve the problems in the prior art that the method provided by the embodiments of the present invention can be used when the IP address and the user name of a target terminal are not clear, and that the connection process of multiple terminals in the same lan is complicated, and the connection is not simple and fast because the user needs to input the IP address, the user name, and the password of the target terminal.
In a first aspect, an embodiment of the present application provides an interconnection method based on multiple terminals. The method specifically comprises the following steps: a first terminal broadcasts a first message, wherein the first message comprises first matching information and the address of the first terminal, and the first matching information is used for matching a second terminal in the same local area network; the first terminal receives a second message sent by the second terminal according to the address of the first terminal, wherein the second message comprises the address of the second terminal; the first terminal sends a user identity identifier to the second terminal according to the address of the second terminal, and the user identity identifier is used for the second terminal to verify the first terminal; the first terminal receives a third message sent by the second terminal, and establishes connection with the second terminal according to the third message, wherein the third message is used for indicating that the verification is passed
In the scheme, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching the IP address of the target terminal (equivalent to a second terminal) by the user, manually inputting the IP address and the password and the like are omitted, and the user can realize the automatic interconnection among the multiple terminals only by sending the process of requesting connection and authentication.
In an optional implementation manner, the "first matching information" may include: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time.
In another alternative implementation, the above "type of terminal allowed to establish a connection" may be used to designate a matching second terminal by a first terminal in the same local area network.
The "allowed timeout" may be used to determine the timeliness of the connection established between the first terminal and the second terminal.
In yet another optional implementation manner, the "second packet" may further include: and the device type of the second terminal is used for verifying that the second terminal designates a matched terminal for the first terminal.
In yet another alternative implementation, the method may further include: the first terminal sends second matching information to the second terminal according to the address of the second terminal, wherein the second matching information comprises: at least one of an ID of the first terminal, a type of the first terminal, a port number of the second terminal, a connection request time, a time at which the first terminal enters the user identity, and an allowed timeout time.
In yet another alternative implementation, the "time when the first terminal enters the user identifier" may be used to determine the timeliness of the user identifier.
In yet another alternative implementation, the "user identity" may include: user fingerprint summary information.
In yet another optional implementation manner, before the step of "the first terminal broadcasts the first packet", the method further includes: the method comprises the steps that a first terminal and a second terminal acquire original fingerprint image information of a user; and the terminal and the second terminal sequentially perform image algorithm processing and Hash algorithm processing on the original fingerprint image information to determine the user fingerprint abstract information.
In yet another optional implementation manner, the "third packet" may further include: the authentication result is associated with at least one of an ID of the first terminal, an allowed timeout time, a device type of the first terminal, an address of the first terminal, a port number of the first terminal, an address of the second terminal, and a port number of the second terminal.
In a second aspect, an embodiment of the present application provides an interconnection method based on multiple terminals. The method specifically comprises the following steps: the second terminal receives a first message broadcasted by the first terminal, wherein the first message comprises first matching information and the address of the first terminal, and the first matching information is used for matching the second terminal in the same local area network; the second terminal sends a second message according to the address of the first terminal, wherein the second message comprises the address of the second terminal; the second terminal receives user identity information sent by the first terminal according to the address of the second terminal, and the user identity is used for the second terminal to verify the first terminal; and the second terminal verifies according to the user identity information, sends a third message according to the verification result and establishes connection with the first terminal, wherein the third message is used for indicating that the verification is passed.
In the scheme, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching the IP address of the target terminal (equivalent to a second terminal) by the user, manually inputting the IP address and the password and the like are omitted, and the user can realize the automatic interconnection among the multiple terminals only by sending the process of requesting connection and authentication.
In a third aspect, an embodiment of the present application provides an interconnection terminal based on multiple terminals. The terminal may include: a sending unit, configured to broadcast a first message, where the first message includes first matching information and an address of a first terminal, and the first matching information is used to match a second terminal in the same local area network; the receiving unit is used for receiving a second message sent by the second terminal according to the address of the first terminal, wherein the second message comprises the address of the second terminal; the sending unit is further used for sending a user identity to the second terminal according to the address of the second terminal, wherein the user identity is used for the second terminal to verify the first terminal; the receiving unit is further configured to receive a third message sent by the second terminal; the sending unit is further configured to establish a connection with the second terminal according to a third message, where the third message is used to indicate that the verification is passed.
In the scheme, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching the IP address of the target terminal (equivalent to a second terminal) by the user, manually inputting the IP address and the password and the like are omitted, and the user can realize the automatic interconnection among the multiple terminals only by sending the process of requesting connection and authentication.
In an optional implementation manner, the "first matching information" may include: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time.
In another alternative implementation, the above "type of terminal allowed to establish a connection" may be used to designate a matching second terminal by a first terminal in the same local area network.
The "allowed timeout" may be used to determine the timeliness of the connection established between the first terminal and the second terminal.
In yet another optional implementation manner, the "second packet" may further include: and the device type of the second terminal is used for verifying that the second terminal designates a matched terminal for the first terminal.
In yet another alternative implementation, the "sending unit" may be further configured to: sending second matching information to the second terminal according to the address of the second terminal, wherein the second matching information comprises: at least one of an ID of the first terminal, a type of the first terminal, a port number of the second terminal, a connection request time, a time at which the first terminal enters the user identity, and an allowed timeout time.
In yet another alternative implementation, the "time when the first terminal enters the user identifier" may be used to determine the timeliness of the user identifier.
In yet another alternative implementation, the "user identity" may include: user fingerprint summary information.
In yet another optional implementation manner, the terminal may further include: a processing unit; the receiving unit can be used for acquiring the original fingerprint image information of the user; and the processing unit is used for sequentially carrying out image algorithm processing and Hash algorithm processing on the original fingerprint image information and determining the user fingerprint abstract information.
In yet another optional implementation manner, the "third packet" may further include: the authentication result is associated with at least one of an ID of the first terminal, an allowed timeout time, a device type of the first terminal, an address of the first terminal, a port number of the first terminal, an address of the second terminal, and a port number of the second terminal.
In a fourth aspect, an embodiment of the present application provides an interconnection terminal based on multiple terminals. The terminal may include: the receiving unit is used for receiving a first message broadcasted by a first terminal, wherein the first message comprises first matching information and the address of the first terminal, and the first matching information is used for matching a second terminal in the same local area network; a sending unit, configured to send a second message according to the address of the first terminal, where the second message includes the address of the second terminal; the receiving unit is also used for receiving user identity information sent by the first terminal according to the address of the second terminal, and the user identity identifier is used for the second terminal to verify the first terminal; the processing unit is used for verifying according to the user identity information, calling the sending unit to send a third message according to the verification result, and establishing connection with the first terminal, wherein the third message is used for indicating that the verification is passed.
In the scheme, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching the IP address of the target terminal (equivalent to a second terminal) by the user, manually inputting the IP address and the password and the like are omitted, and the user can realize the automatic interconnection among the multiple terminals only by sending the process of requesting connection and authentication.
In a fifth aspect, an embodiment of the present application provides an interconnection apparatus based on multiple terminals. The apparatus may include: the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for broadcasting a first message, the first message comprises first matching information and an address of a first terminal, and the first matching information is used for matching a second terminal in the same local area network; the receiving module is used for receiving a second message sent by the second terminal according to the address of the first terminal, wherein the second message comprises the address of the second terminal; the sending module is further used for sending a user identity to the second terminal according to the address of the second terminal, wherein the user identity is used for the second terminal to verify the first terminal; the receiving module is further used for receiving a third message sent by the second terminal; the sending module is further configured to establish a connection with the second terminal according to a third message, where the third message is used to indicate that the verification is passed.
In the scheme, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching the IP address of the target terminal (equivalent to a second terminal) by the user, manually inputting the IP address and the password and the like are omitted, and the user can realize the automatic interconnection among the multiple terminals only by sending the process of requesting connection and authentication.
In an optional implementation manner, the "first matching information" may include: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time.
In another alternative implementation, the above "type of terminal allowed to establish a connection" may be used to designate a matching second terminal by a first terminal in the same local area network.
The "allowed timeout" may be used to determine the timeliness of the connection established between the first terminal and the second terminal.
In yet another optional implementation manner, the "second packet" may further include: and the device type of the second terminal is used for verifying that the second terminal designates a matched terminal for the first terminal.
In yet another alternative implementation, the "sending module" may be further configured to: sending second matching information to the second terminal according to the address of the second terminal, wherein the second matching information comprises: at least one of an ID of the first terminal, a type of the first terminal, a port number of the second terminal, a connection request time, a time at which the first terminal enters the user identity, and an allowed timeout time.
In yet another alternative implementation, the "time when the first terminal enters the user identifier" may be used to determine the timeliness of the user identifier.
In yet another alternative implementation, the "user identity" may include: user fingerprint summary information.
In yet another optional implementation manner, the terminal may further include: a processing module; the receiving module can be used for acquiring the original fingerprint image information of the user; and the processing module is used for sequentially carrying out image algorithm processing and Hash algorithm processing on the original fingerprint image information and determining the user fingerprint abstract information.
In yet another optional implementation manner, the "third packet" may further include: the authentication result is associated with at least one of an ID of the first terminal, an allowed timeout time, a device type of the first terminal, an address of the first terminal, a port number of the first terminal, an address of the second terminal, and a port number of the second terminal.
In a sixth aspect, an embodiment of the present application provides an interconnection apparatus based on multiple terminals. The apparatus may include: the receiving module is used for receiving a first message broadcasted by a first terminal, wherein the first message comprises first matching information and the address of the first terminal, and the first matching information is used for matching a second terminal in the same local area network; the sending module is used for sending a second message according to the address of the first terminal, wherein the second message comprises the address of the second terminal; the receiving module is also used for receiving user identity information sent by the first terminal according to the address of the second terminal, and the user identity identifier is used for the second terminal to verify the first terminal; the processing module is used for verifying according to the user identity information, calling the sending module according to the verification result to send a third message, and establishing connection with the first terminal, wherein the third message is used for indicating that the verification is passed.
In the scheme, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching the IP address of the target terminal (equivalent to a second terminal) by the user, manually inputting the IP address and the password and the like are omitted, and the user can realize the automatic interconnection among the multiple terminals only by sending the process of requesting connection and authentication.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, which includes instructions that, when executed on a computer, cause the computer to perform the method according to any one of the first aspect.
In an eighth aspect, embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method according to any one of the first aspect.
Drawings
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings.
FIG. 1 is an interaction diagram of terminal interconnection implemented by LAN technology;
fig. 2 is a schematic diagram of an architecture based on interconnection of multiple terminals according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an interconnection terminal based on multiple terminals according to an embodiment of the present invention;
fig. 4 is a schematic interaction diagram based on interconnection of multiple terminals according to an embodiment of the present invention;
fig. 5 is a flowchart of acquiring fingerprint summary information according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a first terminal based on interconnection of multiple terminals according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a second terminal based on interconnection of multiple terminals according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a first apparatus for interconnection based on multiple terminals according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a second apparatus for interconnection based on multiple terminals according to an embodiment of the present invention.
Detailed Description
For the convenience of understanding of the embodiments of the present invention, the following description will be further explained with reference to specific embodiments, which are not to be construed as limiting the embodiments of the present invention.
According to the interconnection method, the interconnection device and the interconnection terminal based on the multiple terminals, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching an IP address of a target terminal (equivalent to a second terminal) by a user, manually inputting the IP address and a password and the like are omitted, and the user can realize automatic interconnection among the multiple terminals only by sending a connection request and an authentication process.
Fig. 1 is an interaction diagram for implementing terminal interconnection by the lan technology. As shown in fig. 1, the terminal B receives a data command input by a user, and the data command includes: the IP address or username and password of terminal a (i.e., the second terminal to which terminal B wants to connect); and the terminal B sends request information to the terminal A according to the data instruction. The terminal A sends authentication information to the terminal B according to the request information. The terminal B prompts a user to input authentication information, determines a feedback authentication information instruction, responds to the instruction, carries the feedback authentication information to connect with the terminal A, authenticates the terminal A with the authentication information stored in the terminal according to the feedback authentication information sent by the terminal B, allows the terminal A to establish connection with the terminal B after the authentication is passed, and successfully connects with the terminal A.
At present, the steps of establishing the connection in the above method are relatively complicated, and a user needs to first determine an IP address or a user name and a password of a terminal a (i.e., a second terminal) in a network connection manner, and it is difficult to interconnect with the second terminal when the IP address or the user name and the password of the terminal a are unclear. In addition, the above method is complex in the connection process, and requires the user to determine and input the IP address of the second terminal, and then input the authentication information, which results in a more complex interconnection process between the terminal a and the terminal B and a longer connection time.
Fig. 2 is a schematic diagram of an architecture based on interconnection of multiple terminals according to an embodiment of the present invention. As shown in fig. 2, in response to the problem shown in fig. 1, fig. 2 shows a method for rapidly interconnecting a plurality of terminals in the same lan. It should be noted that the following second terminals may be multiple, specifically, the terminal a (i.e., the first terminal), the terminal B (i.e., the second terminal), and the terminal C (i.e., the second terminal) are in the same local area network, and the terminal a is connected to at least one of the terminal B and the terminal C by a fast connection, so as to realize fast data sharing and remote control on terminals of different types or models. The terminal a only needs to broadcast a first message, where the first message may include first matching information and an address of the terminal a, and the first matching information is used to match at least one of the terminal B and the terminal C (i.e., a second terminal) in the same local area network; at least one of the terminal B and the terminal C receives the first message, and sends a second message according to the address of the terminal a in the first message, where the second message may include: an address of at least one of terminal B and terminal C. And when the verification is successful and the connection with the terminal A is allowed, at least one of the terminal B and the terminal C sends a third message to the terminal A, and the third message is used for indicating the successful verification and allowing the connection, so that the interconnection of a plurality of terminals is realized.
It should be noted that the terminals in the same lan as the terminal a may include a plurality of terminals, and one or more terminals may be interconnected with the terminal a. The above-mentioned sending involving the first message, the second message and the user identity may be forwarding the respective messages by local area network connection terminals (e.g. routers and switches). The terminal (e.g., terminal A, B, C or D) may be a mobile phone, a tablet computer, a notebook computer, a Personal Digital Assistant (PDA), a point of sale (POS), a camera, a video camera, a car-mounted computer, or the like. And the involved terminals may be connected to each other.
The method provided by the embodiment of the invention can also be applied to the situation that when the terminal A and a plurality of terminals are in the same local area network, the terminal A is purposefully connected with the terminal B, and when the terminal A receives second messages sent by the plurality of terminals, the terminal A can selectively send the user identity identifier in the terminal A, namely only the user identity identifier in the terminal A is selectively sent to the terminal B.
Fig. 3 is a schematic structural diagram of an interconnection terminal based on multiple terminals according to an embodiment of the present invention. The terminal in the embodiment of the present invention includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a Personal Digital Assistant (PDA), a point of sale (POS), a camera, a video camera, a vehicle-mounted computer, and the like. For convenience of description, the terminal provided in the embodiment of the present application is described as an example of a mobile phone, where the mobile phone 100 includes: an RF (Radio Frequency) circuit 110, a memory 120, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a WiFi (wireless fidelity) module 170, a processor 180, and a power supply 190. Those skilled in the art will appreciate that the handset configuration shown in fig. 3 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes the components of the mobile phone 100 in detail with reference to fig. 3:
the RF circuit 110 may be used for receiving and transmitting signals during a message transmission or a call. The RF circuit 110 receives downlink information of a base station, and sends the downlink information of the base station to the processor 180, and the server processes the downlink information; in addition, RF circuitry 110 may also transmit data designed for uplink to the base station. Typically, the RF circuit includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, an LNA (low noise amplifier), a duplexer, and the like. In addition, the RF circuitry 110 may also communicate with networks and/or other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (global system for mobile communications), GPRS (general packet radio service), CDMA (code division multiple access), WCDMA (wideband code division multiple access), LTE (long term evolution), email, and SMS (short messaging service), among others.
Among other things, a graphics module in memory 120 for rendering and displaying graphics, including web pages, icons, digital images, videos, and animations on a touch screen or other display.
Applications in memory 120 may include contacts, telephones, video conferencing, email clients, instant messaging, personal motion, cameras, image management, video players, music players, calendars, plug-ins (weather, stock, calculator, clock, dictionary), custom plug-ins, searches, notes, maps, and online videos, and so forth. For the embodiment of the present invention, the storage 120 stores the collected user fingerprint and stores the user identification, where the user identification may include: fingerprint summary information, iris summary information, and password information.
The input unit 130 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 100. The input unit 130 may include a touch panel 131 and other input devices 132. The touch panel 131, also referred to as a touch screen, may collect touch operations of a user on or near the touch panel 131 (for example, operations of the user on or near the touch panel 131 by using any suitable object or accessory such as a finger or a stylus pen), and drive the corresponding connection device according to a preset program. In addition, the touch panel 131 may further include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 180, and can receive and execute commands sent by the processor 180. Specifically, the touch panel 131 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 130 may include other input devices 132 in addition to the touch panel 131. Other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, among others. For the embodiment of the present invention, the input unit 130 may receive numbers, character information, and fingerprint information input by a user.
The display unit 140 may be used to display information input by the user or information provided to the user, and various menus of the mobile phone 100. The display unit 140 may include a display panel 141, wherein the display panel 141 may be configured in the form of an LCD (liquid crystal display), an OLED (organic light-emitting diode), or the like. Further, the touch panel 131 can cover the display panel 141, and when the touch panel 131 detects a touch operation on or near the touch panel 131, the touch operation is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 provides a corresponding visual output on the display panel 141 according to the type of the touch event. Although in fig. 3, the touch panel 131 and the display panel 141 are two independent components to implement the input and output functions of the mobile phone 100, in some embodiments, the touch panel 131 and the display panel 141 may be integrated to implement the input and output functions of the mobile phone 100. For the embodiment of the present invention, the display module 140 may display information for prompting the user to enter the fingerprint, and display the connection result.
The handset 100 may also include at least one sensor 150, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 141 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 141 and/or the backlight when the mobile phone 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone 100, further description is omitted here. For the embodiment of the present invention, the sensor 150 further includes a fingerprint sensor for sensing fingerprint contact of a user to realize a basis of fingerprint collection.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone 100 can help the user send and receive e-mails, browse web pages, access streaming media, etc. through the WiFi module 170, which provides wireless broadband internet access for the user. Although fig. 3 shows the WiFi module 170, it is understood that it does not belong to the essential constitution of the handset 100, and can be omitted entirely as needed within the scope not changing the essence of the invention. For the embodiment of the present invention, the WiFi module 170 is used to connect to a local area network, and transmit a message and a user identity.
The processor 180 executes various functional applications and data processing of the cellular phone 100 by executing software programs and modules stored in the memory 120. The processor 180 is a control center of the mobile phone 100, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone 100 and processes data by operating or executing software programs and/or modules stored in the memory 120 and calling data stored in the memory 120, thereby performing overall monitoring of the mobile phone. Alternatively, processor 180 may include one or more processing units; the processor 180 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 180. For the embodiment of the present invention, the processor 180 executes various functions of the terminal and data processing by running the application program stored in the memory 120, mainly involving authentication of fingerprint digest information of a user and invoking of a network connection.
The handset 100 also includes a power supply 190 (e.g., a battery) for powering the various components, where the power supply may be logically coupled to the processor 180 via a power management system to manage charging, discharging, and power consumption via the power management system.
Although not shown, the mobile phone 100 may further include a camera, a bluetooth module, etc., which will not be described herein.
Fig. 4 is an interaction diagram based on interconnection of multiple terminals according to an embodiment of the present invention. As shown in fig. 4, the interaction method based on interconnection of multiple terminals may specifically include S410-S480, as follows:
s410: the first terminal broadcasts a first message.
Specifically, in the same local area network, a first terminal broadcasts a first message through a User Datagram Protocol (UDP), where the first message is used to inquire whether a second terminal meeting a certain condition in the same local area network can connect. The first packet may be transmitted through a network socket (socket) interface, where the socket is an interface for Transmission Control Protocol (TCP) and UDP programming. The first packet may specifically include: first matching information and an address of a first terminal, the first matching information being used for matching a second terminal in the same local area network, wherein the first matching information may include: at least one of an Identification (ID) of the first terminal, a device type of the first terminal, a port number of the first terminal, a time of requesting a connection, a terminal type of allowing a connection to be established, and an allowed timeout time.
It should be noted that the ID of the first terminal, the device type of the first terminal, and the port number of the first terminal are used for the second terminal to determine the identity information of the first terminal; the terminal type allowing connection establishment is used for the first terminal to designate a matched second terminal in the same local area network, namely, the terminal type can be understood as directional interconnection with the second terminal meeting the condition; the allowed timeout is used to determine the timeliness of the connection established between the first terminal and the second terminal.
S420: the second terminal receives the first message broadcast by the first terminal and judges whether to establish connection with the first terminal according to the first message.
Specifically, the second terminal may determine whether to establish a connection with the first terminal according to the type of the terminal in the first message, where the connection is allowed to be established; or, the second terminal may determine whether to establish a connection with the first terminal according to at least one of the ID of the first terminal, the port number of the first terminal, and the address of the first terminal in the first message.
And when the second terminal determines that the connection with the first terminal is not established according to the first message, abandoning the first message and ending the process.
And executing S430 when the second terminal determines to establish connection with the first terminal according to the first message.
S430: the second terminal obtains a second message, where the second message may include: the address of the second terminal is associated with at least one of an ID of the second terminal, a device type of the second terminal, a port number of the second terminal, a time when the connection is requested, a type of terminal allowed to establish the connection, and an allowed timeout time.
S440: and the second terminal sends a second message to the first terminal by using a socket interface through UDP unicast.
S450: the first terminal extracts fingerprint abstract information of the user.
Specifically, the step may include: the first terminal collects and stores fingerprint information of a user in advance, and determines fingerprint abstract information of the user according to the fingerprint information (the step of determining the fingerprint abstract information is described in detail in fig. 5); or the first terminal prompts the user to collect the fingerprint in real time and determines the abstract information of the fingerprint.
It should be noted that the fingerprint digest information of the user is only one of the user identification, and the user identification may also be iris digest information and password information.
It should be noted that the step may be performed after receiving the second message, or the first terminal may perform the step after performing S420.
S460: and the first terminal sends a user identity identifier to the second terminal through UDP unicast according to the address of the second terminal in the second message, wherein the user identity identifier is used for the second terminal to verify the first terminal.
Specifically, the first terminal further sends a user identity according to at least one of an ID of the second terminal, a device type of the second terminal, and a port number of the second terminal in the second message, where the user identity may include: fingerprint summary information.
It should be noted that, while the first terminal sends the fingerprint digest information, a fourth message may also be sent, where the fourth message may include: at least one of an ID of the first terminal, a device type of the first terminal, a port number of the first terminal, an address of the first terminal, a time of requesting a connection, a time of entering a fingerprint, an allowed timeout time, and a time of determining fingerprint digest information.
Wherein, the address of the first terminal can be understood as the IP address of the first terminal and the port number of the first terminal, and is used for other devices (for example, at least one second terminal) to connect to the first terminal; the fingerprint abstract information is used as an authentication mode between the first terminal and the second terminal; the ID of the first terminal and the equipment type of the first terminal are used for identifying the equipment type which can be established; the time of requesting connection can be used for the first terminal to inform the second terminal of the time of connecting; the time at which the fingerprint is entered can be used to ensure the accuracy of the verification, for example: the first terminal presets a time period, the fingerprint abstract information stored in the time period is valid information, the fingerprint abstract information is regarded as invalid information when the preset time period is exceeded, when the fingerprint abstract information is sent to the second terminal, the second terminal can determine whether the fingerprint abstract information is valid according to the time for inputting the fingerprint, if the fingerprint abstract information is valid, verification is carried out, otherwise, if the fingerprint abstract information is invalid, verification is not carried out.
S470: and the second terminal authenticates the received fingerprint abstract information and locally stored fingerprint abstract information and judges whether the authentication is successful or not.
Specifically, the sources of the locally stored fingerprint summary information in the second terminal may be: fingerprint information of a user is collected and stored in advance, and fingerprint abstract information of the user is determined according to the fingerprint information (the step of specifically determining the fingerprint abstract information is described in detail in fig. 5); or the second terminal prompts the user to collect the fingerprint in real time and determines the abstract information of the fingerprint.
It should be noted that, in some cases, the first terminal and the second terminal both remind the user of fingerprint acquisition in real time, specifically, the first terminal prompts the user to perform fingerprint acquisition and determines summary information of a fingerprint, the first terminal sends the fingerprint summary information to the second terminal after determining the summary information of the fingerprint, the second terminal prompts the user to perform fingerprint acquisition and determines the summary information of the fingerprint after receiving the fingerprint summary information sent by the first terminal, and the second terminal authenticates the received fingerprint summary information sent by the first terminal and the fingerprint summary information determined by the second terminal to determine whether the verification is successful.
Another possibility is that the first terminal and the second terminal both collect fingerprint information of the user in advance, determine fingerprint summary information according to the fingerprint information, and then directly call out and authenticate the fingerprint summary information when needed.
The second terminal identifies the similarity between the received fingerprint abstract information and the locally stored fingerprint abstract information through a Hash algorithm, and if the preset similarity is met, the same fingerprint of the same user can be identified, and the authentication is successful; otherwise, if the preset similarity is not satisfied, the same fingerprint of the same user is not recognized, the authentication fails, the fingerprint abstract information is discarded, and the process is ended.
S480: and the second terminal sends a third message according to the verification result and establishes connection with the first terminal, wherein the third message is used for indicating that the verification is passed.
Specifically, the second terminal sends the third message to the first terminal according to the result of successful authentication and waits for the connection request of the first terminal. The third message may include: at least one of a result of successful authentication, an allowed timeout time, an ID of the second terminal, a device type of the second terminal, an IP address of the second terminal, a port number of the second terminal, an ID of the first terminal, a device type of the first terminal, a port number of the first terminal, and an IP address of the first terminal.
And when the first terminal receives the third message, the first terminal calls the network connection interface to connect the target equipment, requests to connect the second terminal and establishes connection. Wherein the network connection interface comprises at least the following fields: at least one of an allowed timeout time, an IP address of the first terminal, a port number of the first terminal, an IP address of the target device, and a port number of the target device.
It should be noted that, when the second terminal fails to authenticate, a fourth message is sent to the first terminal, where the fourth message may include a result of authentication failure. And the second terminal deletes the received message and ends the process.
The method provided by the embodiment of the invention simplifies the connection process of a plurality of terminals, saves the steps of searching and inputting the IP address of the second terminal, inputting the user name or the password and the like by the user, can realize the automatic interconnection of the plurality of terminals by only sending the process of requesting connection and authentication by the user, and improves the connection speed. In addition, the user can also be connected with the second terminal without knowing the IP address or the user name and the password of the second terminal, so that the user experience is improved.
Fig. 5 is a flowchart of acquiring fingerprint digest information according to an embodiment of the present invention. As shown in fig. 5, specifically includes S510-S530:
s510: the terminal collects fingerprint information of a user and determines an original fingerprint image.
S520: and the terminal performs image algorithm processing on the original fingerprint image to determine fingerprint characteristic points.
S530: and the terminal generates fingerprint abstract information through a Hash algorithm according to the fingerprint characteristic points.
Fig. 6 is a schematic diagram of a first terminal based on interconnection of multiple terminals according to an embodiment of the present invention. As shown in fig. 6, the terminal may include: a sending unit 610, configured to broadcast a first packet, where the first packet includes first matching information and an address of a first terminal, and the first matching information is used to match a second terminal in the same local area network; a receiving unit 620, configured to receive a second message sent by a second terminal according to an address of a first terminal, where the second message includes the address of the second terminal; the sending unit is further used for sending a user identity to the second terminal according to the address of the second terminal, wherein the user identity is used for the second terminal to verify the first terminal; the receiving unit is further configured to receive a third message sent by the second terminal; the sending unit is further configured to establish a connection with the second terminal according to a third message, where the third message is used to indicate that the verification is passed.
Wherein the first matching information may include: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time.
In particular, the type of terminal that allows to establish a connection may be used for a first terminal to specify a matching second terminal in the same local area network. The allowed timeout may be used to determine how time-efficient the first terminal and the second terminal are to establish a connection.
The second message may further include: and the device type of the second terminal is used for verifying that the second terminal designates a matched terminal for the first terminal.
Furthermore, the sending unit 610 may be further configured to: sending second matching information to the second terminal according to the address of the second terminal, wherein the second matching information comprises: at least one of an ID of the first terminal, a type of the first terminal, a port number of the second terminal, a connection request time, a time at which the first terminal enters the user identity, and an allowed timeout time.
Specifically, the time when the first terminal enters the user identifier may be used to determine the timeliness of the user identifier. The user identity may include: user fingerprint summary information.
In addition, the terminal may further include: a processing unit 630; the receiving unit can also be used for acquiring the original fingerprint image information of the user; the processing unit 630 is configured to perform image algorithm processing and hash algorithm processing on the original fingerprint image information in sequence, and determine user fingerprint digest information.
Wherein, the third message may further include: the authentication result is associated with at least one of an ID of the first terminal, an allowed timeout time, a device type of the first terminal, an address of the first terminal, a port number of the first terminal, an address of the second terminal, and a port number of the second terminal.
Fig. 7 is a schematic diagram of a second terminal based on interconnection of multiple terminals according to an embodiment of the present invention. As shown in fig. 7, the terminal includes: the terminal may include: a receiving unit 710, configured to receive a first message broadcasted by a first terminal, where the first message includes first matching information and an address of the first terminal, and the first matching information is used to match a second terminal in the same local area network; a sending unit 720, configured to send a second message according to the address of the first terminal, where the second message includes the address of the second terminal; the receiving unit is also used for receiving user identity information sent by the first terminal according to the address of the second terminal, and the user identity identifier is used for the second terminal to verify the first terminal; the processing unit 730 is configured to perform authentication according to the user identity information, and invoke the sending unit 720 to send a third message according to the authentication result, to establish a connection with the first terminal, where the third message is used to indicate that the authentication is passed.
Fig. 8 is a schematic diagram of a first apparatus for interconnection based on multiple terminals according to an embodiment of the present invention. As shown in fig. 8, the apparatus may include: a sending module 810, configured to broadcast a first packet, where the first packet includes first matching information and an address of a first terminal, and the first matching information is used to match a second terminal in the same local area network; a receiving module 820, configured to receive a second message sent by a second terminal according to an address of a first terminal, where the second message includes the address of the second terminal; the sending module is further used for sending a user identity to the second terminal according to the address of the second terminal, wherein the user identity is used for the second terminal to verify the first terminal; the receiving module is further used for receiving a third message sent by the second terminal; the sending module is further configured to establish a connection with the second terminal according to a third message, where the third message is used to indicate that the verification is passed.
Wherein the first matching information may include: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time.
In particular, the type of terminal that allows to establish a connection may be used for a first terminal to specify a matching second terminal in the same local area network. The allowed timeout may be used to determine how time-efficient the first terminal and the second terminal are to establish a connection.
The second message may further include: and the device type of the second terminal is used for verifying that the second terminal designates a matched terminal for the first terminal.
Furthermore, the sending module may be further configured to: sending second matching information to the second terminal according to the address of the second terminal, wherein the second matching information comprises: at least one of an ID of the first terminal, a type of the first terminal, a port number of the second terminal, a connection request time, a time at which the first terminal enters the user identity, and an allowed timeout time.
Specifically, the time when the first terminal enters the user identifier may be used to determine the timeliness of the user identifier. The user identity may include: user fingerprint summary information.
In addition, the terminal may further include: a processing module 830; the receiving module can also be used for acquiring the original fingerprint image information of the user; and the processing module is used for sequentially carrying out image algorithm processing and Hash algorithm processing on the original fingerprint image information and determining the user fingerprint abstract information.
Wherein, the third message may further include: the authentication result is associated with at least one of an ID of the first terminal, an allowed timeout time, a device type of the first terminal, an address of the first terminal, a port number of the first terminal, an address of the second terminal, and a port number of the second terminal.
Fig. 9 is a schematic diagram of a second apparatus for interconnection based on multiple terminals according to an embodiment of the present invention. As shown in fig. 9, the terminal includes: the terminal may include: a receiving module 910, configured to receive a first message broadcasted by a first terminal, where the first message includes first matching information and an address of the first terminal, and the first matching information is used to match a second terminal in the same local area network; a sending module 920, configured to send a second message according to the address of the first terminal, where the second message includes the address of the second terminal; the receiving module is also used for receiving user identity information sent by the first terminal according to the address of the second terminal, and the user identity identifier is used for the second terminal to verify the first terminal; the processing module 930 is configured to perform authentication according to the user identity information, and invoke the sending module 920 to send a third message according to the authentication result, where the third message is used to indicate that the authentication passes.
In the scheme, the user identity is verified through the user identity identification, the connection process of the multiple terminals is simplified, the steps of searching the IP address of the target terminal (equivalent to a second terminal) by the user, manually inputting the IP address and the password and the like are omitted, and the user can realize the automatic interconnection among the multiple terminals only by sending the process of requesting connection and authentication.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above-mentioned embodiments, objects, technical solutions and advantages of the present application are further described in detail, it should be understood that the above-mentioned embodiments are only examples of the present application, and are not intended to limit the scope of the present application, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present application should be included in the scope of the present application.
Claims (17)
1. An interconnection method based on a plurality of terminals is characterized by comprising the following steps:
a first terminal broadcasts a first message, where the first message includes first matching information and an address of the first terminal, the first matching information is used to match a second terminal in the same local area network, and the first matching information includes: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time, where the terminal type allowing connection establishment is used for the first terminal to designate a matching second terminal in the same local area network, and the allowed timeout time is used for determining timeliness of establishing connection between the first terminal and the second terminal;
the first terminal receives a second message sent by the second terminal according to the address of the first terminal, wherein the second message comprises the address of the second terminal;
the first terminal sends a user identity identifier to the second terminal according to the address of the second terminal, wherein the user identity identifier is used for the second terminal to verify the first terminal, and the user identity identifier is acquired by the first terminal in real time or acquired and stored in advance;
and the first terminal receives a third message sent by the second terminal and establishes connection with the second terminal according to the third message, wherein the third message is used for indicating that the verification is passed.
2. The method of claim 1, wherein the second packet further comprises: and the equipment type of the second terminal is used for verifying that the second terminal designates a matched terminal for the first terminal.
3. The method of claim 1, further comprising:
the first terminal sends second matching information to the second terminal according to the address of the second terminal, wherein the second matching information comprises: at least one of an ID of the first terminal, a type of the first terminal, a port number of the second terminal, a connection request time, a time when the first terminal enters the user identity, and an allowed timeout time.
4. The method according to claim 3, wherein the time at which the first terminal entered the user identity is used to determine the timeliness of the user identity.
5. The method of claim 4, wherein the user identity comprises: user fingerprint summary information.
6. The method of claim 5, wherein before the step of the first terminal broadcasting the first packet, further comprising:
the first terminal and the second terminal acquire original fingerprint image information of a user;
and the terminal and the second terminal sequentially perform image algorithm processing and Hash algorithm processing on the original fingerprint image information to determine the user fingerprint abstract information.
7. The method of claim 1, wherein the third packet further comprises: and the authentication result is at least one of the ID of the first terminal, the allowed timeout time, the equipment type of the first terminal, the address of the first terminal, the port number of the first terminal, the address of the second terminal and the port number of the second terminal.
8. An interconnection method based on a plurality of terminals is characterized by comprising the following steps:
a second terminal receives a first message broadcasted by a first terminal, wherein the first message comprises first matching information and an address of the first terminal, the first matching information is used for matching the second terminal in the same local area network, and the first matching information comprises: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time, where the terminal type allowing connection establishment is used for the first terminal to designate a matching second terminal in the same local area network, and the allowed timeout time is used for determining timeliness of establishing connection between the first terminal and the second terminal;
the second terminal sends a second message according to the address of the first terminal, wherein the second message comprises the address of the second terminal;
the second terminal receives user identity information sent by the first terminal according to the address of the second terminal, the user identity is used for the second terminal to verify the first terminal, and the user identity is acquired by the first terminal in real time or acquired and stored in advance;
and the second terminal verifies according to the user identity information, sends a third message according to a verification result and establishes connection with the first terminal, wherein the third message is used for indicating that the verification is passed.
9. An interconnection terminal based on a plurality of terminals, comprising:
a sending unit, configured to broadcast a first packet, where the first packet includes first matching information and an address of a first terminal, the first matching information is used to match a second terminal in the same local area network, and the first matching information includes: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time, where the terminal type allowing connection establishment is used for the first terminal to designate a matching second terminal in the same local area network, and the allowed timeout time is used for determining timeliness of establishing connection between the first terminal and the second terminal;
a receiving unit, configured to receive a second packet sent by the second terminal according to the address of the first terminal, where the second packet includes the address of the second terminal;
the sending unit is further configured to send a user identity to the second terminal according to the address of the second terminal, where the user identity is used for the second terminal to verify the first terminal, and the user identity is acquired by the first terminal in real time or acquired and stored in advance;
the receiving unit is further configured to receive a third message sent by the second terminal; the sending unit is further configured to establish a connection with the second terminal according to the third packet, where the third packet is used to indicate that the verification is passed.
10. The terminal of claim 9, wherein the second packet further comprises: and the equipment type of the second terminal is used for verifying that the second terminal designates a matched terminal for the first terminal.
11. The terminal of claim 9, wherein the sending unit is further configured to send second matching information to the second terminal according to an address of the second terminal, and the second matching information includes: at least one of an ID of the first terminal, a type of the first terminal, a port number of the second terminal, a connection request time, a time when the first terminal enters the user identity, and an allowed timeout time.
12. The terminal of claim 11, wherein the time at which the first terminal entered the user identity is used to determine the timeliness of the user identity.
13. The terminal of claim 12, wherein the user identity comprises: user fingerprint summary information.
14. The terminal of claim 13, wherein the terminal further comprises: a processing unit;
the receiving unit is also used for acquiring the original fingerprint image information of the user;
and the processing unit is used for sequentially carrying out image algorithm processing and Hash algorithm processing on the original fingerprint image information and determining the user fingerprint abstract information.
15. The terminal of claim 9, wherein the third packet further comprises: and the authentication result is at least one of the ID of the first terminal, the allowed timeout time, the equipment type of the first terminal, the address of the first terminal, the port number of the first terminal, the address of the second terminal and the port number of the second terminal.
16. An interconnection terminal based on a plurality of terminals, comprising:
a receiving unit, configured to receive a first packet broadcasted by a first terminal, where the first packet includes first matching information and an address of the first terminal, the first matching information is used to match a second terminal in the same local area network, and the first matching information includes: at least one of an ID of the first terminal, a device type of the first terminal, a connection request time, a terminal type allowing connection establishment, and an allowed timeout time, where the terminal type allowing connection establishment is used for the first terminal to designate a matching second terminal in the same local area network, and the allowed timeout time is used for determining timeliness of establishing connection between the first terminal and the second terminal;
a sending unit, configured to send a second packet according to the address of the first terminal, where the second packet includes the address of the second terminal;
the receiving unit is further configured to receive user identity information sent by the first terminal according to an address of the second terminal, where the user identity is used by the second terminal to authenticate the first terminal, and the user identity is acquired by the first terminal in real time or acquired in advance and stored;
and the processing unit is used for verifying according to the user identity information, calling the sending unit to send a third message according to a verification result, and establishing connection with the first terminal, wherein the third message is used for indicating that the verification is passed.
17. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810400555.3A CN110418311B (en) | 2018-04-28 | 2018-04-28 | Interconnection method and device based on multiple terminals and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810400555.3A CN110418311B (en) | 2018-04-28 | 2018-04-28 | Interconnection method and device based on multiple terminals and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110418311A CN110418311A (en) | 2019-11-05 |
CN110418311B true CN110418311B (en) | 2021-08-31 |
Family
ID=68357009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810400555.3A Active CN110418311B (en) | 2018-04-28 | 2018-04-28 | Interconnection method and device based on multiple terminals and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110418311B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131407B (en) | 2019-12-09 | 2021-05-11 | 深圳市盛铂科技有限公司 | Network equipment connection method and network equipment |
WO2021189186A1 (en) * | 2020-03-23 | 2021-09-30 | Oppo广东移动通信有限公司 | Communication control method and related device thereof |
WO2021237527A1 (en) * | 2020-05-27 | 2021-12-02 | Oppo广东移动通信有限公司 | Information processing method and apparatus, and device and computer storage medium |
CN114257678A (en) * | 2022-03-02 | 2022-03-29 | 深圳中科智能技术有限公司 | Mobile phone data intercommunication method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104205890A (en) * | 2012-04-13 | 2014-12-10 | 索尼公司 | Wireless communication device, communication system, and communication method |
CN105430602A (en) * | 2015-11-27 | 2016-03-23 | 广东欧珀移动通信有限公司 | Networking method and system |
CN105991957A (en) * | 2015-03-04 | 2016-10-05 | 中国移动通信集团公司 | Bidirectional video transmission method and device |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1160875C (en) * | 2002-09-06 | 2004-08-04 | 联想(北京)有限公司 | Method for making connection veryfication between wireless equipments |
JP5718311B2 (en) * | 2009-03-26 | 2015-05-13 | エックスペッド ホールディングス ピーティワイ リミテッド | Configuration for managing wireless communication between devices |
CN103023989B (en) * | 2012-11-27 | 2015-11-25 | 北京百度网讯科技有限公司 | For the communication means of terminal, communication system and terminal |
CN104125654A (en) * | 2013-04-23 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Data transmission method and devices for wifi network and terminal devices |
WO2015002409A1 (en) * | 2013-07-01 | 2015-01-08 | Samsung Electronics Co., Ltd. | Method of sharing information in ultrasound imaging |
CN103401738B (en) * | 2013-07-31 | 2017-03-01 | 小米科技有限责任公司 | A kind of method and device connecting terminal |
CN104768235B (en) * | 2014-01-08 | 2019-01-01 | 中国移动通信集团公司 | A kind of method and apparatus that equipment room connects automatically |
CN104580376B (en) * | 2014-12-12 | 2019-03-08 | 百度在线网络技术(北京)有限公司 | The methods, devices and systems connected between terminal are established in a local network |
KR20170011920A (en) * | 2015-07-25 | 2017-02-02 | 엘지전자 주식회사 | Mobile terminal and method for controlling the same |
CN105100114B (en) * | 2015-08-26 | 2018-08-24 | 宇龙计算机通信科技(深圳)有限公司 | A kind of terminal interconnected method, terminal and system |
CN105578616A (en) * | 2015-12-27 | 2016-05-11 | 深圳市银河风云网络系统股份有限公司 | Wi-Fi connection state based method for determining user identity |
CN105956844B (en) * | 2016-03-18 | 2020-01-21 | 李明 | Payment method and system |
-
2018
- 2018-04-28 CN CN201810400555.3A patent/CN110418311B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104205890A (en) * | 2012-04-13 | 2014-12-10 | 索尼公司 | Wireless communication device, communication system, and communication method |
CN105991957A (en) * | 2015-03-04 | 2016-10-05 | 中国移动通信集团公司 | Bidirectional video transmission method and device |
CN105430602A (en) * | 2015-11-27 | 2016-03-23 | 广东欧珀移动通信有限公司 | Networking method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110418311A (en) | 2019-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11057376B2 (en) | Method, apparatus, and system for controlling intelligent device, and storage medium | |
CN107094294B (en) | Network connection method and device | |
CN106791892B (en) | Method, device and system for live broadcasting of wheelhouses | |
CN107430394B (en) | Method, server, mobile terminal and device for data interaction with vehicle machine | |
CN104518875B (en) | A kind of method that authentication and account obtain, mobile terminal | |
CN108040091B (en) | Data processing method, device and storage medium | |
US20170316781A1 (en) | Remote electronic service requesting and processing method, server, and terminal | |
CN110418311B (en) | Interconnection method and device based on multiple terminals and terminal | |
CN106973330B (en) | Screen live broadcasting method, device and system | |
CN106936676B (en) | Household equipment control method and device | |
CN107333162B (en) | Method and device for playing live video | |
CN109039989B (en) | Address resolution protocol spoofing detection method, host and computer-readable storage medium | |
WO2014183439A1 (en) | Method, apparatus and system for switching function mode | |
CN111357245B (en) | Information searching method, terminal, network equipment and system | |
CN109600340B (en) | Operation authorization method, device, terminal and server | |
CN107317828B (en) | File downloading method and device | |
WO2017000495A1 (en) | Method and device for adding contacts | |
CN105306244B (en) | Router management method, system and equipment | |
US20140344423A1 (en) | Method, apparatus and system for switching function mode | |
CN111314900B (en) | Wireless connection method, wireless connection device and mobile terminal | |
CN107592289B (en) | Password setting method and device | |
CN105703808A (en) | Method and device for transmitting data | |
CN106303616B (en) | Play control method, device and terminal | |
CN110891262A (en) | Bluetooth pairing method, system and terminal equipment | |
CN116980851A (en) | Method and device for sharing subroutines between locomotives, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |