Method for terminal interaction based on network security and relevant device thereof

A network security and interaction method technology, which is applied in the field of network security-based terminal interaction methods and related equipment, can solve the problems of long connection establishment and transmission time, complicated user operations, information leakage, etc., and achieves improved efficiency and privacy. Strong and safe effect

Inactive Publication Date: 2016-08-17
袁斌
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, in order to solve the problems in the prior art that user operations are complex, connection establishment and transmission time are long, and information leakage is likely to occur, the purpose of the present invention is to propose a terminal interaction method based on network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for terminal interaction based on network security and relevant device thereof
  • Method for terminal interaction based on network security and relevant device thereof
  • Method for terminal interaction based on network security and relevant device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims. These embodiments of the present invention may be referred to herein, individually or collectively, by the term "invention", which is for convenience only and is not intended to automatically limit the application if in fact more than one invention is disclosed The scope is any individual invention or inventive concept.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network security-based terminal interaction method and related equipment, wherein the method includes: setting the local network to a point-to-point mode, generating and displaying coded graphics according to network access information; after receiving a network access request sent by a mobile terminal, and Establish a network connection; establish and monitor a service port that provides a command transmission channel, and establish a port connection with the mobile terminal after listening to the port connection request sent by the mobile terminal; receive the service information sent by the mobile terminal through the service port, and the service information Provide service parameters for multimedia data interaction with the mobile terminal. By adopting the above-mentioned method and related equipment, it has the characteristics of high network security and strong privacy when resource sharing and exchange control are performed, and the resource transmission speed is fast.

Description

technical field [0001] The invention belongs to the field of wireless screen transfer, and in particular relates to a terminal interaction method based on network security and related equipment. Background technique [0002] Wireless screen transmission refers to the transmission of the content to be displayed on a source to the display terminal through a wireless transmission protocol, such as displaying the content to be displayed on the screen of a mobile phone on a TV or a projector. Micacast, airplay, widi and other protocols can be used for wireless screen transfer authentication. In the actual application process, complex operations are required. Compared with ordinary users, it is more difficult to realize wireless screen transfer authentication based on this protocol, and in During the authentication process, broadcasting is generally used to find the other party, which not only makes connection establishment and transmission time longer, but also easily leads to in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0876H04L65/60H04L67/02H04L67/141H04L69/162
Inventor 袁斌韩庆忠申恒
Owner 袁斌
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products