CN106357639A - Data migration method and mobile terminal - Google Patents
Data migration method and mobile terminal Download PDFInfo
- Publication number
- CN106357639A CN106357639A CN201610824857.4A CN201610824857A CN106357639A CN 106357639 A CN106357639 A CN 106357639A CN 201610824857 A CN201610824857 A CN 201610824857A CN 106357639 A CN106357639 A CN 106357639A
- Authority
- CN
- China
- Prior art keywords
- terminal device
- data
- private
- preset
- private data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明实施例提供了一种数据迁移方法,所述方法包括:建立移动终端与终端设备之间的连接;对所述终端设备进行身份验证;在所述终端设备身份验证通过后,接收由所述终端设备发送的预设私密应用清单;根据所述预设私密应用清单获取相应的私密数据;将所述私密数据传输给所述终端设备。本发明实施例还提供了一种移动终端。通过本发明实施例提高私密数据传输的安全性。
The embodiment of the present invention provides a data migration method, the method comprising: establishing a connection between a mobile terminal and a terminal device; authenticating the terminal device; after the terminal device passes the identity authentication, receiving a preset private application list sent by the terminal device; acquiring corresponding private data according to the preset private application list; and transmitting the private data to the terminal device. The embodiment of the present invention also provides a mobile terminal. The security of private data transmission is improved by the embodiment of the present invention.
Description
技术领域technical field
本发明涉及互联网技术领域,具体涉及一种数据迁移方法及移动终端。The invention relates to the technical field of the Internet, in particular to a data migration method and a mobile terminal.
背景技术Background technique
随着信息技术快速发展,终端(如手机、平板电脑等等)更新换代越来越频繁。目前,市场上提供给用户换手机时,使用手机搬家的功能。该功能可以将整个旧手机资料,软件等全部原封不动的拷贝到新手机,从而,为用户换机提供方便,但是,在数据搬家过程中,该方法无法对私密数据(涉及到用户隐私的数据)进行较好保护,因此,降低了用户体验With the rapid development of information technology, terminals (such as mobile phones, tablet computers, etc.) are updated more and more frequently. At present, the market provides the function of using the mobile phone to move when the user changes the mobile phone. This function can copy the entire old mobile phone data, software, etc. to the new mobile phone intact, thereby providing convenience for the user to change the phone. However, during the data moving process, this method cannot protect private data (related to user privacy data) for better protection, therefore, reducing the user experience
发明内容Contents of the invention
本发明实施例提供了一种数据迁移方法及移动终端,以期提高私密数据传输的安全性。Embodiments of the present invention provide a data migration method and a mobile terminal in order to improve the security of private data transmission.
本发明实施例第一方面提供了一种数据迁移方法,包括:The first aspect of the embodiment of the present invention provides a data migration method, including:
建立移动终端与终端设备之间的连接;establishing a connection between the mobile terminal and the terminal device;
对所述终端设备进行身份验证;Perform identity verification on the terminal device;
在所述终端设备身份验证通过后,接收由所述终端设备发送的预设私密应用清单;After the identity verification of the terminal device is passed, receiving a preset private application list sent by the terminal device;
根据所述预设私密应用清单获取相应的私密数据;Obtain corresponding private data according to the preset private application list;
将所述私密数据传输给所述终端设备。The private data is transmitted to the terminal device.
本发明实施例第二方面提供了一种移动终端,包括:The second aspect of the embodiment of the present invention provides a mobile terminal, including:
连接单元,用于建立移动终端与终端设备之间的连接;a connection unit, configured to establish a connection between the mobile terminal and the terminal device;
验证单元,用于对所述终端设备进行身份验证;a verification unit, configured to perform identity verification on the terminal device;
接收单元,用于在所述终端设备身份验证通过后,接收由所述终端设备发送的预设私密应用清单;a receiving unit, configured to receive the preset private application list sent by the terminal device after the terminal device passes the authentication;
获取单元,用于根据所述预设私密应用清单获取相应的私密数据;An obtaining unit, configured to obtain corresponding private data according to the preset private application list;
传输单元,用于将所述私密数据传输给所述终端设备。A transmission unit, configured to transmit the private data to the terminal device.
本发明实施例第三方面提供了一种移动终端,包括:The third aspect of the embodiment of the present invention provides a mobile terminal, including:
处理器和存储器;其中,所述处理器通过调用所述存储器中的代码或指令以执行第一方面所描述的方法的部分或者全部步骤。A processor and a memory; wherein, the processor executes part or all of the steps of the method described in the first aspect by invoking codes or instructions in the memory.
实施本发明实施例,具有如下有益效果:Implementing the embodiment of the present invention has the following beneficial effects:
通过本发明实施例建立移动终端与终端设备之间的连接,对终端设备进行身份验证,在终端设备身份验证通过后,接收由终端设备发送的预设私密应用清单,根据预设私密应用清单获取相应的私密数据,将私密数据传输给终端设备。从而,在移动终端与终端设备连接之后,可对终端设备进行身份验证,在验证通过后,才可以进行私密数据迁移,因而,可提高私密数据迁移的安全性。Through the embodiment of the present invention, the connection between the mobile terminal and the terminal device is established, and the terminal device is authenticated. After the terminal device passes the identity verification, it receives the preset private application list sent by the terminal device, and obtains it according to the preset private application list. corresponding private data, and transmit the private data to the terminal device. Therefore, after the mobile terminal is connected to the terminal device, the identity verification of the terminal device can be performed, and the private data migration can only be performed after the verification is passed, thus, the security of the private data migration can be improved.
附图说明Description of drawings
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the following will briefly introduce the drawings that need to be used in the description of the embodiments. Obviously, the drawings in the following description are some embodiments of the present invention. For Those of ordinary skill in the art can also obtain other drawings based on these drawings without making creative efforts.
图1是本发明实施例提供的一种数据迁移系统的网络架构示意图;FIG. 1 is a schematic diagram of a network architecture of a data migration system provided by an embodiment of the present invention;
图2是本发明实施例提供的一种数据迁移方法的第一实施例流程示意图;FIG. 2 is a schematic flowchart of a first embodiment of a data migration method provided by an embodiment of the present invention;
图3是本发明实施例提供的一种数据迁移方法的第二实施例流程示意图;FIG. 3 is a schematic flowchart of a second embodiment of a data migration method provided by an embodiment of the present invention;
图4是本发明实施例提供的一种数据迁移方法的第三实施例流程示意图;FIG. 4 is a schematic flowchart of a third embodiment of a data migration method provided by an embodiment of the present invention;
图5a是本发明实施例提供的一种移动终端的第一实施例结构示意图;Fig. 5a is a schematic structural diagram of a first embodiment of a mobile terminal provided by an embodiment of the present invention;
图5b是本发明实施例提供的图5a所描述的移动终端的验证单元的结构示意图;Fig. 5b is a schematic structural diagram of a verification unit of the mobile terminal described in Fig. 5a provided by an embodiment of the present invention;
图5c是本发明实施例提供的图5a所描述的移动终端的传输单元的结构示意图;FIG. 5c is a schematic structural diagram of a transmission unit of the mobile terminal described in FIG. 5a provided by an embodiment of the present invention;
图5d是本发明实施例提供的图5a所描述的移动终端的又一结构示意图;FIG. 5d is another schematic structural diagram of the mobile terminal described in FIG. 5a provided by an embodiment of the present invention;
图5e是本发明实施例提供的图5a所描述的移动终端的又一结构示意图;FIG. 5e is another schematic structural diagram of the mobile terminal described in FIG. 5a provided by an embodiment of the present invention;
图6是本发明实施例提供的一种移动终端的第二实施例结构示意图。Fig. 6 is a schematic structural diagram of a second embodiment of a mobile terminal provided by an embodiment of the present invention.
具体实施方式detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
本发明的说明书和权利要求书及所述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second", "third" and "fourth" in the description and claims of the present invention and the drawings are used to distinguish different objects, rather than to describe a specific order . Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or apparatuses.
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本发明的至少一个实施例中。在说明书中的各个位置展示该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。Reference herein to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present invention. The presentation of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are independent or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described herein can be combined with other embodiments.
本发明实施例所描述的数据可以包括应用(如社交应用、视频应用、拍照应用、游戏应用等)、文件夹、文件(如文本文件、视频文件、音频文件、照片等等)、缓存数据、私密数据等,上述数据仅是举例,而非穷举,包含但不限于上述数据。The data described in the embodiments of the present invention may include applications (such as social applications, video applications, camera applications, game applications, etc.), folders, files (such as text files, video files, audio files, photos, etc.), cache data, Private data, etc., the above data are only examples, not exhaustive, including but not limited to the above data.
本发明实施例所描述的移动终端或者终端设备可以包括智能手机(如Android手机、iOS手机、Windows Phone手机等)、平板电脑、掌上电脑、笔记本电脑、移动互联网设备(MID,Mobile Internet Devices)或穿戴式设备等,上述仅是举例,而非穷举,包含但不限于上述移动终端或者终端设备。当然,本发明实施例中所提及的终端设备可与移动终端相同,例如,终端设备为手机,移动终端为另一手机;终端设备也可与移动终端不相同,例如,终端设备为手机,移动终端为平板电脑。The mobile terminals or terminal devices described in the embodiments of the present invention may include smart phones (such as Android phones, iOS phones, Windows Phone phones, etc.), tablet computers, palmtop computers, notebook computers, mobile Internet devices (MID, Mobile Internet Devices) or The above-mentioned wearable devices and the like are only examples, not exhaustive, including but not limited to the above-mentioned mobile terminals or terminal devices. Certainly, the terminal device mentioned in the embodiment of the present invention may be the same as the mobile terminal, for example, the terminal device is a mobile phone, and the mobile terminal is another mobile phone; the terminal device may also be different from the mobile terminal, for example, the terminal device is a mobile phone, The mobile terminal is a tablet computer.
本发明实施例所描述的数据传输通道可包括但不仅限于:热点、蓝牙、红外、无线保真(Wireless Fidelity,Wi-Fi)、有线等等,具体地,在移动终端打开热点,终端设备连接该移动终端,两者之间可建立数据传输信道;在移动终端打开蓝牙,终端设备连接该移动终端,两者之间可建立数据传输信道;在移动终端打开红外,终端设备连接该移动终端,两者之间可建立数据传输信道;在移动终端均连接某一Wi-Fi,终端设备间接连接该移动终端,两者之间可建立数据传输信道;在移动终端与终端设备之间通过有线进行连接,两者之间可建立数据传输信道。The data transmission channels described in the embodiments of the present invention may include, but are not limited to: hotspots, Bluetooth, infrared, wireless fidelity (Wireless Fidelity, Wi-Fi), wired, etc. The mobile terminal can establish a data transmission channel between the two; turn on Bluetooth on the mobile terminal, connect the terminal device to the mobile terminal, and establish a data transmission channel between the two; turn on the infrared on the mobile terminal, connect the terminal device to the mobile terminal, A data transmission channel can be established between the two; when the mobile terminal is connected to a certain Wi-Fi, the terminal device is indirectly connected to the mobile terminal, and a data transmission channel can be established between the two; between the mobile terminal and the terminal device through wired Connection, a data transmission channel can be established between the two.
请参见图1,图1为本发明实施例提供了一种数据迁移系统的网络架构,该网络构架可包括:移动终端和终端设备。其中,移动终端与终端设备之间可通过Wi-Fi网络、移动通信网络(如2G、3G、4G、5G等等)、有线网络建立通信连接。例如,移动终端建立该移动终端与终端设备之间的连接,对终端设备进行身份验证,在终端设备身份验证通过后,接收由终端设备发送的预设私密应用清单,根据预设私密应用清单获取相应的私密数据,将私密数据传输给终端设备。另外,上述网络架构不仅可实现对私密数据的数据迁移,还可以对移动终端中重要数据进行数据迁移,以保证数据迁移的安全性。Please refer to FIG. 1 . FIG. 1 provides a network architecture of a data migration system according to an embodiment of the present invention, and the network architecture may include: mobile terminals and terminal devices. Wherein, a communication connection can be established between the mobile terminal and the terminal device through a Wi-Fi network, a mobile communication network (such as 2G, 3G, 4G, 5G, etc.), or a wired network. For example, the mobile terminal establishes a connection between the mobile terminal and the terminal device, performs identity verification on the terminal device, receives the preset private application list sent by the terminal device after the terminal device passes the identity verification, and obtains the private application list according to the preset private application list. corresponding private data, and transmit the private data to the terminal device. In addition, the above network architecture can not only realize the data migration of private data, but also can perform data migration of important data in the mobile terminal, so as to ensure the security of data migration.
基于图1所描述的数据迁移系统的网络架构,请参阅图2,为本发明实施例提供的一种数据迁移方法的第一实施例流程示意图。本实施例中所描述的数据迁移方法,包括以下步骤:Based on the network architecture of the data migration system described in FIG. 1 , please refer to FIG. 2 , which is a schematic flowchart of a first embodiment of a data migration method provided by an embodiment of the present invention. The data migration method described in this embodiment includes the following steps:
201、建立移动终端与终端设备之间的连接。201. Establish a connection between a mobile terminal and a terminal device.
其中,移动终端可通过上述至少一个数据传输通道与终端设备之间建立连接。例如,移动终端可与终端设备进行有线连接,同时,可通过蓝牙建立移动终端与终端设备之间的连接。Wherein, the mobile terminal can establish a connection with the terminal device through the above at least one data transmission channel. For example, the mobile terminal can be connected to the terminal device by wire, and at the same time, the connection between the mobile terminal and the terminal device can be established through Bluetooth.
可选地,移动终端可在接收到迁移指令之后,启动热点,建立移动终端与终端设备之间的连接。Optionally, after receiving the migration instruction, the mobile terminal can activate the hotspot to establish a connection between the mobile terminal and the terminal device.
202、对所述终端设备进行身份验证。202. Perform identity verification on the terminal device.
可选地,可获取终端设备的身份信息,将该身份信息与预设身份信息进行匹配,若匹配成功,则身份验证通过。例如,预设身份信息为预设指纹信息,那么,可由终端设备获取指纹信息,并将该指纹信息发送给移动终端,移动终端将该指纹信息与预设指纹信息进行匹配,若匹配成功,则终端设备的身份验证通过。Optionally, the identity information of the terminal device may be obtained, and the identity information is matched with the preset identity information. If the matching is successful, the identity verification is passed. For example, if the preset identity information is preset fingerprint information, then the terminal device can obtain the fingerprint information and send the fingerprint information to the mobile terminal, and the mobile terminal will match the fingerprint information with the preset fingerprint information, and if the matching is successful, then The authentication of the terminal device is passed.
可选地,上述终端设备的身份信息可包括但不仅限于:集成电路卡识别码(Integrate Circuit Card Identity,ICCID)、国际移动设备标(International MobileEquipment Identity,IMEI)、电话号码,由用户从终端设备输入的字符串、虹膜信息、指纹信息、人脸信息等等。Optionally, the above-mentioned identity information of the terminal equipment may include but not limited to: integrated circuit card identification code (Integrate Circuit Card Identity, ICCID), International Mobile Equipment Identity (International Mobile Equipment Identity, IMEI), telephone number, by the user from the terminal equipment The input string, iris information, fingerprint information, face information, etc.
203、在所述终端设备身份验证通过后,接收由所述终端设备发送的预设私密应用清单。203. After the terminal device passes identity verification, receive a preset private application list sent by the terminal device.
可选地,预设私密应用清单可在终端设备上进行设置,由于私密数据是否由用户设置的,当然,只有用户清楚哪些是私密数据,因而,用户可在终端设备上进行操作,设置预设私密应用清单,如此,可保障私密数据的安全。Optionally, the preset private application list can be set on the terminal device. Since the private data is set by the user, of course, only the user knows what is private data, so the user can operate on the terminal device to set the preset The private application list, in this way, can guarantee the security of private data.
204、根据所述预设私密应用清单获取相应的私密数据。204. Acquire corresponding private data according to the preset private application list.
其中,预设私密应用清单可包含多个私密数据集,按照预设私密应用清单可从移动终端获取对应的多个私密数据集。Wherein, the preset private application list may include multiple private data sets, and the corresponding multiple private data sets may be obtained from the mobile terminal according to the preset private application list.
205、将所述私密数据传输给所述终端设备。205. Transmit the private data to the terminal device.
可选地,在私密数据传输给终端设备的过程中,可对私密数据进行数据压缩,从而,减小私密数据的内存空间,提高数据迁移效率。Optionally, in the process of transmitting the private data to the terminal device, data compression may be performed on the private data, thereby reducing the memory space of the private data and improving data migration efficiency.
可选地,在私密数据传输给终端设备的过程中,可按照私密数据的重要性,将私密数据划分为多个数据集,每一数据集可根据重要性确定一个传输优先级,例如,某一数据集的重要性越高,则越优先传输,相反地,若某一数据集的重要性越低,则越后传输,如此,可保证私密数据可进行有序传输。Optionally, in the process of transmitting the private data to the terminal device, the private data can be divided into multiple data sets according to the importance of the private data, and each data set can determine a transmission priority according to the importance, for example, a certain The higher the importance of a data set, the higher the priority of transmission, and on the contrary, the lower the importance of a certain data set, the later the transmission. In this way, the orderly transmission of private data can be ensured.
可选地,可采用多线程或者多进程向终端设备迁移私密数据。例如,将私密数据分成多个数据集,每个数据集均可采用一个线程或者进程,来用于向终端设备传输该数据集,如此,可提升数据迁移效率。Optionally, multiple threads or processes may be used to migrate private data to the terminal device. For example, the private data is divided into multiple data sets, and each data set can use a thread or process to transmit the data set to the terminal device. In this way, data migration efficiency can be improved.
可选地,步骤205将所述私密数据传输给所述终端设备可包含如下步骤:Optionally, step 205, transmitting the private data to the terminal device may include the following steps:
打开移动终端与终端设备之间的P个数据传输通道,P为大于1的整数;Open P data transmission channels between the mobile terminal and the terminal device, where P is an integer greater than 1;
将私密数据分为P个数据集;Divide private data into P data sets;
通过该P个数据传输通道将该P个数据集传输至终端设备,其中,每一数据传输通道对应一个数据集。The P data sets are transmitted to the terminal device through the P data transmission channels, wherein each data transmission channel corresponds to a data set.
其中,可根据P个数据传输通道的传输速率将私密数据分为P个数据集,即传输速率大,则对应的数据集的占用内存大,传输速率小,则对应的数据集的占用内存小。如此,可合理地利用多个数据传输通道传输私密数据,如此,可提升数据传输效率。当然,也可以根据每一数据传输通道的安全性,将私密数据分成P个数据集,即数据传输通道的安全性,则对应的数据集的占用内存大,数据传输通道的安全性低,则对应的数据集的占用内存小。即安全性高的数据传输通道多传输些私密数据,安全性低的数据传输通道少传输些私密数据。Among them, the private data can be divided into P data sets according to the transmission rate of the P data transmission channels, that is, the larger the transmission rate, the corresponding data set occupies a large memory, and the lower the transmission rate, the corresponding data set occupies a smaller memory . In this way, multiple data transmission channels can be rationally used to transmit private data, thus improving data transmission efficiency. Of course, the private data can also be divided into P data sets according to the security of each data transmission channel, that is, the security of the data transmission channel. If the corresponding data set occupies a large memory and the security of the data transmission channel is low, then The corresponding data set occupies less memory. That is, data transmission channels with high security transmit more private data, and data transmission channels with low security transmit less private data.
可选地,上述将所述私密数据传输给所述终端设备可包含如下步骤:Optionally, the above-mentioned transmission of the private data to the terminal device may include the following steps:
51)、将所述私密数据分成K个数据集,其中,所述K为大于1的整数;51), dividing the private data into K data sets, wherein the K is an integer greater than 1;
52)、确定所述K个数据集在所述移动终端中的使用频率;52), determining the frequency of use of the K data sets in the mobile terminal;
53)、根据使用频率高优先迁移原则向所述终端设备迁移所述K个数据集。53). Migrate the K data sets to the terminal device according to the migration principle of high usage frequency first.
其中,步骤51中,可将该私密数据分成K个数据集,其中,K为大于1的整数,其中,K可由系统统计(如K个应用,可记作K个数据集)或者由用户指定。可分别确定该K个数据集中的每一数据集的使用频率,可按照使用频率由高到低的顺序确定该K个数据集的迁移顺序,即使用频率越高的数据集则越先迁移,使用频率越低的数据集则越后迁移,则可按照该迁移顺序将待迁移数据传输给终端设备。Wherein, in step 51, the private data can be divided into K data sets, wherein K is an integer greater than 1, wherein K can be counted by the system (for example, K applications can be recorded as K data sets) or specified by the user . The frequency of use of each data set in the K data sets can be determined separately, and the migration order of the K data sets can be determined in descending order of the use frequency, that is, the data set with higher frequency of use will be migrated first, Data sets with lower frequency of use are migrated later, and the data to be migrated can be transmitted to the terminal device according to the migration order.
通过本发明实施例建立移动终端与终端设备之间的连接,对终端设备进行身份验证,在终端设备身份验证通过后,接收由终端设备发送的预设私密应用清单,根据预设私密应用清单获取相应的私密数据,将私密数据传输给终端设备。从而,在移动终端与终端设备连接之后,可对终端设备进行身份验证,在验证通过后,才可以进行私密数据迁移,因而,可提高私密数据迁移的安全性。Through the embodiment of the present invention, the connection between the mobile terminal and the terminal device is established, and the terminal device is authenticated. After the terminal device passes the identity verification, it receives the preset private application list sent by the terminal device, and obtains it according to the preset private application list. corresponding private data, and transmit the private data to the terminal device. Therefore, after the mobile terminal is connected to the terminal device, the identity verification of the terminal device can be performed, and the private data migration can only be performed after the verification is passed, thus, the security of the private data migration can be improved.
与上述一致地,请参阅图3,为本发明实施例提供的一种数据迁移方法的第二实施例流程示意图。本实施例中所描述的数据迁移方法,包括以下步骤:Consistent with the above, please refer to FIG. 3 , which is a schematic flowchart of a second embodiment of a data migration method provided by an embodiment of the present invention. The data migration method described in this embodiment includes the following steps:
301、建立移动终端与终端设备之间的连接。301. Establish a connection between a mobile terminal and a terminal device.
302、对所述终端设备进行身份验证。302. Perform identity verification on the terminal device.
303、在所述终端设备身份验证通过后,接收由所述终端设备发送的预设私密应用清单。303. After the terminal device passes identity verification, receive a preset private application list sent by the terminal device.
304、根据所述预设私密应用清单获取相应的私密数据。304. Acquire corresponding private data according to the preset private application list.
其中,上述步骤301-304可参见图2所描述的数据迁移方法的对应步骤201-204。Wherein, the above steps 301-304 may refer to the corresponding steps 201-204 of the data migration method described in FIG. 2 .
305、确定所述移动终端中当前正在运行的N个应用,所述N为大于1的整数。305. Determine N applications currently running in the mobile terminal, where N is an integer greater than 1.
其中,移动终端可确定该移动终端中当前正在运行的N个应用,当然,该N个应用可包含系统应用,或者,一般的应用,如:拍照应用,购物应用等等,通常情况下,N为大于1的整数。Wherein, the mobile terminal can determine the N applications currently running in the mobile terminal. Of course, the N applications can include system applications, or general applications, such as: camera applications, shopping applications, etc., usually, N is an integer greater than 1.
可选地,移动终端可对每一开启的应用进行监听,从而,可直接确定该移动终端中当前正在运行的N个应用。Optionally, the mobile terminal can monitor each opened application, so that the N applications currently running in the mobile terminal can be directly determined.
可以理解的是,N个应用中必然包含系统应用和驱动应用,系统应用是为了保证操作系统正常运行,驱动应用是驱动程序进行运行,当然,N个应用中还包括其他常规应用,在此,常规应用可认为是,关闭了该应用后,不会影响到操作系统的运作的应用,也可以理解为第三方应用。It can be understood that the N applications must include system applications and driver applications. The system application is to ensure the normal operation of the operating system, and the driver application is a driver program to run. Of course, the N applications also include other conventional applications. Here, A regular application can be considered as an application that does not affect the operation of the operating system after the application is closed, and can also be understood as a third-party application.
306、将所述N个应用与预设应用列表进行匹配。306. Match the N applications with a preset application list.
其中,预设应用列表可以预先在移动终端中进行设置,该预设应用列表中可包含至少一个常规应用。可将N个应用与预设应用列表进行一一匹配,即先将N个应用中的任一应用与预设应用列表进行匹配,然后,再将N个应用中的另一应用与预设应用列表进行匹配,以此类推,可以确定出N个应用中哪些应用存在于预设应用列表中,哪些不存在于预设应用列表中。Wherein, the preset application list may be pre-set in the mobile terminal, and the preset application list may include at least one regular application. N applications can be matched with the preset application list one by one, that is, any one of the N applications can be matched with the preset application list, and then another application among the N applications can be matched with the preset application list. list, and so on, it can be determined which applications among the N applications exist in the preset application list and which ones do not exist in the preset application list.
例如,N个应用包括:QQ、微信、淘宝、百度地图,预设应用列表包括:淘宝、百度地图、美团、美颜相机,那么,在将该N个应用与预设应用列表进行匹配时,可得到淘宝、百度地图存在于预设应用列表中,而QQ、微信不存在于预设应用列表中。For example, the N applications include: QQ, WeChat, Taobao, and Baidu Maps, and the preset application list includes: Taobao, Baidu Maps, Meituan, and Meiyan Camera. Then, when matching the N applications with the preset application list , it can be obtained that Taobao and Baidu Map exist in the default application list, while QQ and WeChat do not exist in the default application list.
307、若匹配出所述N个应用中包含M个应用存在于所述预设应用列表时,关闭所述M个应用,其中,所述M为大于0且小于所述N的整数。307. If it is found that M applications among the N applications exist in the preset application list, close the M applications, where the M is an integer greater than 0 and less than the N.
可选地,若N个应用与预设应用列表匹配之后,得到该N个应用中的M个应用存在于预设应用列表中,则可关闭该M个应用,该M为大于0且小于N的整数。如此,可降低移动终端的负荷,提高移动终端的处理效率,可提升迁移效率。Optionally, if after N applications are matched with the preset application list, it is obtained that M applications among the N applications exist in the preset application list, then the M applications can be closed, and the M is greater than 0 and less than N an integer of . In this way, the load of the mobile terminal can be reduced, the processing efficiency of the mobile terminal can be improved, and the migration efficiency can be improved.
308、将所述私密数据传输给所述终端设备。308. Transmit the private data to the terminal device.
其中,可在移动终端关闭了M个应用之后,可再将私密数据传输给终端设备。Wherein, the private data may be transmitted to the terminal device after the mobile terminal closes the M applications.
通过本发明实施例建立移动终端与终端设备之间的连接,对终端设备进行身份验证,在终端设备身份验证通过后,接收由终端设备发送的预设私密应用清单,根据预设私密应用清单获取相应的私密数据,可关闭掉移动终端中正在运行且属于预设应用列表的应用,并将私密数据传输给终端设备。从而,在移动终端与终端设备连接之后,可对终端设备进行身份验证,在验证通过后,才可以进行私密数据迁移,因而,可提高私密数据迁移的安全性。同时,可降低移动终端的负荷,提高了私密数据迁移效率。Through the embodiment of the present invention, the connection between the mobile terminal and the terminal device is established, and the terminal device is authenticated. After the terminal device passes the identity verification, it receives the preset private application list sent by the terminal device, and obtains it according to the preset private application list. For the corresponding private data, applications that are running in the mobile terminal and belong to the preset application list can be closed, and the private data can be transmitted to the terminal device. Therefore, after the mobile terminal is connected to the terminal device, the identity verification of the terminal device can be performed, and the private data migration can only be performed after the verification is passed, thus, the security of the private data migration can be improved. At the same time, the load of the mobile terminal can be reduced, and the efficiency of private data migration can be improved.
与上述一致地,请参阅图4,为本发明实施例提供的一种数据迁移方法的第三实施例流程示意图。本实施例中所描述的数据迁移方法,包括以下步骤:Consistent with the above, please refer to FIG. 4 , which is a schematic flowchart of a third embodiment of a data migration method provided by an embodiment of the present invention. The data migration method described in this embodiment includes the following steps:
401、建立移动终端与终端设备之间的连接。401. Establish a connection between a mobile terminal and a terminal device.
402、对所述终端设备进行身份验证。402. Perform identity verification on the terminal device.
403、在所述终端设备身份验证通过后,接收由所述终端设备发送的预设私密应用清单。403. After the terminal device passes identity verification, receive a preset private application list sent by the terminal device.
404、根据所述预设私密应用清单获取相应的私密数据。404. Acquire corresponding private data according to the preset private application list.
405、对所述私密数据进行加密,得到加密私密数据。405. Encrypt the private data to obtain encrypted private data.
其中,可对私密数据采用一定的算法进行加密,例如,对称加密算法或者非对称加密算法,异或加密算法与对称加算法或者非对称加密算法混合加密。在对私密数据进行加密之后,可得到加密私密数据,该加密私密数据可采用与上述加密对应的解密算法进行解密,才能还原私密数据,如此,可提高私密数据的安全性。Among them, the private data may be encrypted using a certain algorithm, for example, a symmetric encryption algorithm or an asymmetric encryption algorithm, or a mixed encryption of an XOR encryption algorithm and a symmetric addition algorithm or an asymmetric encryption algorithm. After encrypting the private data, the encrypted private data can be obtained, and the encrypted private data can be decrypted by using a decryption algorithm corresponding to the above-mentioned encryption to restore the private data. In this way, the security of the private data can be improved.
406、将所述加密私密数据传输给所述终端设备。406. Transmit the encrypted private data to the terminal device.
通过本发明实施例建立移动终端与终端设备之间的连接,对终端设备进行身份验证,在终端设备身份验证通过后,接收由终端设备发送的预设私密应用清单,根据预设私密应用清单获取相应的私密数据,对私密数据进行加密,再将加密后的私密数据传输给终端设备。从而,在移动终端与终端设备连接之后,可对终端设备进行身份验证,在验证通过后,才可以进行私密数据迁移,因而,可提高私密数据迁移的安全性。并且,对私密数据进行加密,更加保障私密数据的安全性。Through the embodiment of the present invention, the connection between the mobile terminal and the terminal device is established, and the terminal device is authenticated. After the terminal device passes the identity verification, it receives the preset private application list sent by the terminal device, and obtains it according to the preset private application list. The corresponding private data is encrypted, and then the encrypted private data is transmitted to the terminal device. Therefore, after the mobile terminal is connected to the terminal device, the identity verification of the terminal device can be performed, and the private data migration can only be performed after the verification is passed, thus, the security of the private data migration can be improved. In addition, the private data is encrypted to further ensure the security of the private data.
与上述一致地,以下为实施上述数据迁移方法的装置,具体如下:Consistent with the above, the following is the device for implementing the above data migration method, specifically as follows:
请参阅图5a,为本发明实施例提供的一种移动终端的第一实施例结构示意图。本实施例中所描述的移动终端,包括:连接单元501、验证单元502、接收单元503、获取单元504和传输单元505,具体如下:Please refer to FIG. 5 a , which is a schematic structural diagram of a first embodiment of a mobile terminal provided by an embodiment of the present invention. The mobile terminal described in this embodiment includes: a connection unit 501, a verification unit 502, a receiving unit 503, an acquisition unit 504, and a transmission unit 505, specifically as follows:
连接单元501,用于建立移动终端与终端设备之间的连接;a connection unit 501, configured to establish a connection between the mobile terminal and the terminal device;
验证单元502,用于对所述终端设备进行身份验证;A verification unit 502, configured to perform identity verification on the terminal device;
接收单元503,用于在所述终端设备身份验证通过后,接收由所述终端设备发送的预设私密应用清单;The receiving unit 503 is configured to receive the preset private application list sent by the terminal device after the terminal device passes the authentication;
获取单元504,用于根据所述预设私密应用清单获取相应的私密数据;An obtaining unit 504, configured to obtain corresponding private data according to the preset private application list;
传输单元505,用于将所述私密数据传输给所述终端设备。A transmitting unit 505, configured to transmit the private data to the terminal device.
可选地,如图5b,图5a中所描述的移动终端的验证单元502包括:接收模块5021和判断模块5022,具体如下:Optionally, as shown in FIG. 5b, the verification unit 502 of the mobile terminal described in FIG. 5a includes: a receiving module 5021 and a judging module 5022, specifically as follows:
接收模块5021,用于接收所述终端设备发送的身份验证信息;A receiving module 5021, configured to receive identity verification information sent by the terminal device;
判断模块5022,用于判断所述身份验证信息与预设身份验证信息是否匹配,若所述判断模块5021的判断结果为是,由所述接收单元503接收由所述终端设备发送的预设私密应用清单。A judging module 5022, configured to judge whether the identity verification information matches the preset identity verification information, and if the judging result of the judging module 5021 is yes, the receiving unit 503 receives the preset private information sent by the terminal device App manifest.
可选地,如图5c,图5a中所描述的移动终端的传输单元505可包括:划分模块5051、确定模块5052和传输模块5053,具体如下:Optionally, as shown in Figure 5c, the transmission unit 505 of the mobile terminal described in Figure 5a may include: a division module 5051, a determination module 5052, and a transmission module 5053, specifically as follows:
划分模块5051,用于将所述私密数据分成多个数据集;A division module 5051, configured to divide the private data into multiple data sets;
确定模块5052,用于确定所述多个数据集中的每一数据集的传输优先级;A determination module 5052, configured to determine the transmission priority of each data set in the plurality of data sets;
传输模块5053,用于根据所述多个数据集中的每一数据集的传输优先级将所述多个数据集传输给所述终端设备。A transmission module 5053, configured to transmit the multiple data sets to the terminal device according to the transmission priority of each data set in the multiple data sets.
可选地,如图5d,图5d为图5a的一种变型结构,图5a所描述的移动终端还包括:确定单元506、匹配单元507和关闭单元508,具体如下:Optionally, as shown in Figure 5d, Figure 5d is a modified structure of Figure 5a, and the mobile terminal described in Figure 5a further includes: a determination unit 506, a matching unit 507, and a closing unit 508, specifically as follows:
确定单元506,用于在所述获取单元504根据所述预设私密应用清单获取相应的私密数据之后,确定所述移动终端中当前正在运行的N个应用,所述N为大于1的整数;A determination unit 506, configured to determine N applications currently running in the mobile terminal after the acquisition unit 504 acquires corresponding private data according to the preset private application list, where N is an integer greater than 1;
匹配单元507,用于将所述N个应用与预设应用列表进行匹配;A matching unit 507, configured to match the N applications with a preset application list;
关闭单元508,用于若所述匹配单元507匹配出所述N个应用中包含M个应用存在于所述预设应用列表时,关闭所述M个应用,由所述传输单元将所述私密数据传输给所述终端设备,其中,所述M为大于0且小于所述N的整数。The closing unit 508 is configured to close the M applications when the matching unit 507 matches that M applications among the N applications exist in the preset application list, and the transmission unit transfers the private The data is transmitted to the terminal device, where the M is an integer greater than 0 and less than the N.
可选地,如图5e,图5e为图5a的一种变型结构,图5a所描述的移动终端还包括:加密单元509,具体如下:Optionally, as shown in Figure 5e, Figure 5e is a modified structure of Figure 5a, the mobile terminal described in Figure 5a further includes: an encryption unit 509, specifically as follows:
加密单元509,用于在所述获取单元504根据所述预设私密应用清单获取相应的私密数据之后,对所述私密数据进行加密,得到加密私密数据;An encryption unit 509, configured to encrypt the private data to obtain encrypted private data after the obtaining unit 504 obtains corresponding private data according to the preset private application list;
所述传输单元505具体用于:The transmission unit 505 is specifically used for:
将所述加密私密数据传输给所述终端设备。Transmitting the encrypted private data to the terminal device.
通过本发明实施例所描述的终端可建立移动终端与终端设备之间的连接,对终端设备进行身份验证,在终端设备身份验证通过后,接收由终端设备发送的预设私密应用清单,根据预设私密应用清单获取相应的私密数据,将私密数据传输给终端设备。从而,在移动终端与终端设备连接之后,可对终端设备进行身份验证,在验证通过后,才可以进行私密数据迁移,因而,可提高私密数据迁移的安全性。The terminal described in the embodiment of the present invention can establish a connection between the mobile terminal and the terminal device, and perform identity verification on the terminal device. Set up a private application list to obtain corresponding private data, and transmit the private data to the terminal device. Therefore, after the mobile terminal is connected to the terminal device, the identity verification of the terminal device can be performed, and the private data migration can only be performed after the verification is passed, thus, the security of the private data migration can be improved.
请参阅图6,为本发明实施例提供的一种移动终端的第二实施例结构示意图。本实施例中所描述的移动终端,包括:至少一个输入设备1000;至少一个输出设备2000;至少一个处理器3000,例如CPU;和存储器4000,上述输入设备1000、输出设备2000、处理器3000和存储器4000通过总线5000连接。Please refer to FIG. 6 , which is a schematic structural diagram of a second embodiment of a mobile terminal provided by an embodiment of the present invention. The mobile terminal described in this embodiment includes: at least one input device 1000; at least one output device 2000; at least one processor 3000, such as a CPU; and memory 4000, the above-mentioned input device 1000, output device 2000, processor 3000 and The memory 4000 is connected via a bus 5000 .
其中,上述输入设备1000具体可为触控面板、物理按键或者鼠标。Wherein, the above-mentioned input device 1000 may specifically be a touch panel, a physical button or a mouse.
上述输出设备2000具体可为显示屏。The aforementioned output device 2000 may specifically be a display screen.
上述存储器4000可以是高速RAM存储器,也可为非易失存储器(non-volatilememory),例如磁盘存储器。上述存储器4000用于存储一组程序代码,上述输入设备1000、输出设备2000和处理器3000用于调用存储器4000中存储的程序代码,执行如下操作:The above-mentioned memory 4000 may be a high-speed RAM memory, or a non-volatile memory (non-volatile memory), such as a magnetic disk memory. The above-mentioned memory 4000 is used to store a set of program codes, and the above-mentioned input device 1000, output device 2000 and processor 3000 are used to call the program codes stored in the memory 4000, and perform the following operations:
上述处理器3000,用于:The above-mentioned processor 3000 is used for:
建立移动终端与终端设备之间的连接;establishing a connection between the mobile terminal and the terminal device;
对所述终端设备进行身份验证;Perform identity verification on the terminal device;
在所述终端设备身份验证通过后,接收由所述终端设备发送的预设私密应用清单;After the identity verification of the terminal device is passed, receiving a preset private application list sent by the terminal device;
根据所述预设私密应用清单获取相应的私密数据;Obtain corresponding private data according to the preset private application list;
将所述私密数据传输给所述终端设备。The private data is transmitted to the terminal device.
可选地,上述处理器3000对所述终端设备进行身份验证,包括:Optionally, the processor 3000 performing identity verification on the terminal device includes:
接收所述终端设备发送的身份验证信息;receiving identity verification information sent by the terminal device;
判断所述身份验证信息与预设身份验证信息是否匹配,若是,执行所述接收由所述终端设备发送的预设私密应用清单。Judging whether the identity verification information matches the preset identity verification information, and if so, performing the receiving the preset private application list sent by the terminal device.
可选地,上述处理器3000将所述私密数据传输给所述终端设备,包括:Optionally, the processor 3000 transmitting the private data to the terminal device includes:
将所述私密数据分成多个数据集;dividing said private data into a plurality of data sets;
确定所述多个数据集中的每一数据集的传输优先级;determining a transmission priority for each of the plurality of data sets;
根据所述多个数据集中的每一数据集的传输优先级将所述多个数据集传输给所述终端设备。The plurality of data sets are transmitted to the terminal device according to a transmission priority of each data set in the plurality of data sets.
可选地,上述处理器3000,在所述根据所述预设私密应用清单获取相应的私密数据之后,以及所述将所述私密数据传输给所述终端设备之前,还具体用于:Optionally, the above-mentioned processor 3000, after acquiring corresponding private data according to the preset private application list and before transmitting the private data to the terminal device, is further specifically configured to:
确定所述移动终端中当前正在运行的N个应用,所述N为大于1的整数;Determine N applications currently running in the mobile terminal, where N is an integer greater than 1;
将所述N个应用与预设应用列表进行匹配;matching the N applications with a preset application list;
若匹配出所述N个应用中包含M个应用存在于所述预设应用列表时,关闭所述M个应用,执行所述将所述私密数据传输给所述终端设备,其中,所述M为大于0且小于所述N的整数。If it is found that among the N applications, M applications exist in the preset application list, close the M applications, and execute the transmission of the private data to the terminal device, wherein the M is an integer greater than 0 and less than N.
可选地,上述处理器3000根据所述预设私密应用清单获取相应的私密数据之后,还具体用于Optionally, after the processor 3000 obtains the corresponding private data according to the preset private application list, it is further specifically used to
对所述私密数据进行加密,得到加密私密数据;Encrypting the private data to obtain encrypted private data;
则上述处理器3000将所述私密数据传输给所述终端设备,包括:Then the above processor 3000 transmits the private data to the terminal device, including:
将所述加密私密数据传输给所述终端设备。Transmitting the encrypted private data to the terminal device.
本发明实施例还提供一种计算机存储介质,其中,该计算机存储介质可存储有程序,该程序执行时包括上述方法实施例中记载的任何一种数据迁移方法的部分或全部步骤。An embodiment of the present invention also provides a computer storage medium, wherein the computer storage medium can store a program, and when the program is executed, some or all steps of any data migration method described in the above method embodiments are included.
尽管在此结合各实施例对本发明进行了描述,然而,在实施所要求保护的本发明过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。Although the present invention has been described in conjunction with various embodiments herein, in the process of implementing the claimed invention, those skilled in the art can understand and Other variations of the disclosed embodiments are implemented. In the claims, the word "comprising" does not exclude other components or steps, and "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that these measures cannot be combined to advantage.
本领域技术人员应明白,本发明的实施例可提供为方法、装置(设备)、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。计算机程序存储/分布在合适的介质中,与其它硬件一起提供或作为硬件的一部分,也可以采用其他分布形式,如通过Internet或其它有线或无线电信系统。Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, devices (devices), or computer program products. Accordingly, the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein. The computer program is stored/distributed on suitable media, supplied with or as part of other hardware, and may also take other forms of distribution, such as via the Internet or other wired or wireless telecommunication systems.
本发明是参照本发明实施例的方法、装置(设备)和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to flowcharts and/or block diagrams of methods, apparatus (device) and computer program products according to embodiments of the present invention. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
尽管结合具体特征及其实施例对本发明进行了描述,显而易见的,在不脱离本发明的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本发明的示例性说明,且视为已覆盖本发明范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。Although the invention has been described in conjunction with specific features and embodiments thereof, it will be apparent that various modifications and combinations can be made therein without departing from the spirit and scope of the invention. Accordingly, the specification and drawings are merely illustrative of the invention as defined by the appended claims and are deemed to cover any and all modifications, variations, combinations or equivalents within the scope of the invention. Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. Thus, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalent technologies, the present invention also intends to include these modifications and variations.
Claims (11)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610824857.4A CN106357639A (en) | 2016-09-14 | 2016-09-14 | Data migration method and mobile terminal |
| PCT/CN2017/093462 WO2018049911A1 (en) | 2016-09-14 | 2017-07-19 | Data migration method and related products |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610824857.4A CN106357639A (en) | 2016-09-14 | 2016-09-14 | Data migration method and mobile terminal |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN106357639A true CN106357639A (en) | 2017-01-25 |
Family
ID=57859765
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610824857.4A Pending CN106357639A (en) | 2016-09-14 | 2016-09-14 | Data migration method and mobile terminal |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106357639A (en) |
| WO (1) | WO2018049911A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107608713A (en) * | 2017-08-22 | 2018-01-19 | 维沃移动通信有限公司 | A kind of application transfer method and mobile terminal |
| WO2018049911A1 (en) * | 2016-09-14 | 2018-03-22 | 广东欧珀移动通信有限公司 | Data migration method and related products |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102110031A (en) * | 2011-02-23 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Android system-based application program backup and recovery method |
| CN102497441A (en) * | 2011-12-22 | 2012-06-13 | 乐视网信息技术(北京)股份有限公司 | Information synchronization method between mobile phone and computer and system thereof |
| CN103092526A (en) * | 2011-10-31 | 2013-05-08 | 国际商业机器公司 | Method and device for transferring data between storage devices |
| CN103118171A (en) * | 2012-12-28 | 2013-05-22 | 上海斐讯数据通信技术有限公司 | Application software shared system and method |
| CN103580842A (en) * | 2013-11-04 | 2014-02-12 | 惠州Tcl移动通信有限公司 | Method and system for conducting parallel transmission through multiple types of wireless links |
| CN105188015A (en) * | 2015-08-07 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | Mobile terminal private data migration backup method and mobile terminal |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104063250B (en) * | 2014-07-02 | 2016-08-24 | 努比亚技术有限公司 | Migrate method and system and the terminal device of terminal applies |
| CN106357639A (en) * | 2016-09-14 | 2017-01-25 | 广东欧珀移动通信有限公司 | Data migration method and mobile terminal |
-
2016
- 2016-09-14 CN CN201610824857.4A patent/CN106357639A/en active Pending
-
2017
- 2017-07-19 WO PCT/CN2017/093462 patent/WO2018049911A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102110031A (en) * | 2011-02-23 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Android system-based application program backup and recovery method |
| CN103092526A (en) * | 2011-10-31 | 2013-05-08 | 国际商业机器公司 | Method and device for transferring data between storage devices |
| CN102497441A (en) * | 2011-12-22 | 2012-06-13 | 乐视网信息技术(北京)股份有限公司 | Information synchronization method between mobile phone and computer and system thereof |
| CN103118171A (en) * | 2012-12-28 | 2013-05-22 | 上海斐讯数据通信技术有限公司 | Application software shared system and method |
| CN103580842A (en) * | 2013-11-04 | 2014-02-12 | 惠州Tcl移动通信有限公司 | Method and system for conducting parallel transmission through multiple types of wireless links |
| CN105188015A (en) * | 2015-08-07 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | Mobile terminal private data migration backup method and mobile terminal |
Non-Patent Citations (1)
| Title |
|---|
| 赛贝尔资讯: "《玩转Windows 7应用技巧》", 31 July 2014 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2018049911A1 (en) * | 2016-09-14 | 2018-03-22 | 广东欧珀移动通信有限公司 | Data migration method and related products |
| CN107608713A (en) * | 2017-08-22 | 2018-01-19 | 维沃移动通信有限公司 | A kind of application transfer method and mobile terminal |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2018049911A1 (en) | 2018-03-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106412907B (en) | Network access method, related equipment and system | |
| US10454904B2 (en) | Method, apparatus and system for secure data communication | |
| US10275581B2 (en) | Method and apparatus for sharing content between electronic devices | |
| CN106375465B (en) | A data migration method and server | |
| US9614842B2 (en) | Device and method of setting or removing security on content | |
| US20180006818A1 (en) | Authentication method, device, server, and system, and storage medium | |
| CN108763917B (en) | Data encryption and decryption method and device | |
| EP3255832A1 (en) | Dynamic encryption method, terminal and server | |
| US20160180102A1 (en) | Computer program, method, and system for secure data management | |
| CN105260669B (en) | The transmission method and Transmission system of photo | |
| CN106797561A (en) | A kind of identity identifying method and wearable device | |
| CN104573551A (en) | File processing method and mobile terminal | |
| CN111143474B (en) | A method of one-click exchange and binding of mobile phone numbers based on blockchain technology | |
| CN106341811A (en) | Data migration method and server | |
| WO2013178154A1 (en) | Method for implementing encryption in storage card, and decryption method and device | |
| CN105069365A (en) | Data processing method and mobile terminal | |
| CN106484325A (en) | A data migration method and mobile terminal | |
| CN113507482B (en) | Data security transmission method, security transaction method, system, medium and equipment | |
| JP2016046799A (en) | Agent for providing security cloud service, security key device for security cloud service | |
| CN106383731B (en) | Data migration method and mobile terminal | |
| CN103618612A (en) | Method and device for achieving single sign on of applications in terminal | |
| CN106357639A (en) | Data migration method and mobile terminal | |
| CN106557708B (en) | Safety protection method and system | |
| CN116264505A (en) | Key management system and method, electronic device, and computer-readable storage medium | |
| JP2015115878A (en) | Portable terminal setting method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170125 |
|
| RJ01 | Rejection of invention patent application after publication |