CN106572101A - Server, terminal and data management method - Google Patents

Server, terminal and data management method Download PDF

Info

Publication number
CN106572101A
CN106572101A CN201610949743.2A CN201610949743A CN106572101A CN 106572101 A CN106572101 A CN 106572101A CN 201610949743 A CN201610949743 A CN 201610949743A CN 106572101 A CN106572101 A CN 106572101A
Authority
CN
China
Prior art keywords
managed
data
memory block
user
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610949743.2A
Other languages
Chinese (zh)
Inventor
双强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201610949743.2A priority Critical patent/CN106572101A/en
Publication of CN106572101A publication Critical patent/CN106572101A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Abstract

The invention discloses a server, a terminal and a data management method. The server receives a locking instruction from a terminal side, and carries out the locking of a to-be-managed storage region of a cloud terminal according to the locking instruction. During the locking time, the server refuses an access request from the terminal side when the server receives the access request for visiting to-be-managed data in the to-be-managed storage region from the terminal side, and enables the terminal side not to operate the to-be-managed data in the to-be-managed storage region during the locking time, thereby guaranteeing the safety of to-be-managed data during the locking time. Moreover, because the to-be-managed data in the to-be-managed storage region just can be checked after locking is over, the mysterious feeling of the to-be-managed data is improved, the interestingness of data storage is improved, and the user experience is improved.

Description

Server, terminal and data managing method
Technical field
The present invention relates to communication technical field, more particularly, it relates to server, terminal and data managing method.
Background technology
In order to avoid terminal is limited in storage capacity, the concept of " cloud storage " is proposed in the prior art, it is various The cloud disk of type occurs like the mushrooms after rain, has provided the user the considerable memory space of capacity, solves user empty in storage Between on worry.For storage is to the partial document in cloud disk, user, generally may be to right for the consideration of Information Security The file or file answered is encrypted, after to file or file encryption, if user needs to access This document is pressed from both sides or file, then need to input correct password, by could normally to file or file after checking Operated.
It is obvious that in the middle of existing encryption handling mode, password is unique guarantee of safety.When password is cracked it Afterwards, storage file beyond the clouds will there is no longer safety and can say, therefore, in order to solve prior art in by Crypted password to high in the clouds The way that the safety of file is ensured password leakage after, the problem that easily file security is threatened, now urgently A kind of new scheme for securing documents need to be proposed.
The content of the invention
The technical problem to be solved in the present invention is:Propose to ensure high in the clouds data storage safety in a kind of and prior art Scheme, to solve prior art in file is encrypted by Crypted password, the easy prestige after Crypted password is revealed The problem of cloud data safe is coerced, for the technical problem, there is provided a kind of server, terminal and data managing method.
To solve above-mentioned technical problem, the present invention provides a kind of server, including:
Receiver module, for receive from end side lock instruction and end side for be managed in memory block to be managed The access request of data;
Processing module, for being treated to high in the clouds according to the lock instruction after the receiver module receives lock instruction Management storage region is locked, and the identification information of memory block to be managed is at least included in the lock instruction and waits to manage for described The locking time of reason memory block;
The processing module is additionally operable to when the receiver module receives access request, judges current whether in described In locking time;When being, access request described in refusal respond;When no, the access request is responded.
The present invention also provides a kind of terminal, including:
Generation module, for generating lock instruction, the lock instruction is used to indicate that server is refused within locking time Access request of the end side for data to be managed in the memory block to be managed of high in the clouds;
Sending module, for the lock instruction to be sent to into the server.
The present invention also provides a kind of data managing method, including:
Receive the lock instruction from end side and the memory block to be managed in high in the clouds is locked according to the lock instruction It is fixed, when at least including the identification information of memory block to be managed and the locking for the memory block to be managed in the lock instruction Between;
Access request of the receiving terminal side to data to be managed in the memory block to be managed;
Judge current whether within the locking time;
When being, access request described in refusal respond;When no, the access request is responded.
Alternatively, also include:After the locking of memory block to be managed is released from, information is sent to terminal, it is described to carry Show information for characterizing the data to be managed that user currently can be accessed in the memory block to be managed.
Alternatively, also include:
Obtain the data to be managed of end side upload and store in the memory block to be managed;
And/or,
Obtain the data to be managed of other memory blocks of high in the clouds and store in the memory block to be managed.
The present invention also provides a kind of data managing method, including:
Lock instruction is generated, the lock instruction is used to indicate that server refuses end side for high in the clouds within locking time The access request of data to be managed in memory block to be managed;
The lock instruction is sent to into the server.
Alternatively, the lock instruction is sent to after server also includes:Pass to memory block to be managed described in high in the clouds Defeated data to be managed.
Alternatively, also include:
Number and current network bandwidth based on other bandwidth occupancy processes of current operation determines that transmission is described to be managed The transmission available bandwidth of data, described other bandwidth occupancy processes need to take net when being the operation in addition to data to be managed are transmitted The process of network bandwidth.
Alternatively, the number and current network bandwidth based on current other bandwidth occupancy processes run determines that transmission is described The transmission available bandwidth of data to be managed includes:
It is if the number of current other bandwidth occupancy processes is zero, the presently described network bandwidth is available as the transmission Bandwidth;
If the number of current other bandwidth occupancy processes is not zero, according to pre-set bandwidths accounting and presently described Netowrk tape Width determines the transmission available bandwidth, the transmission available bandwidth=pre-set bandwidths accounting described in presently described network bandwidth *.
Alternatively, transmit to memory block to be managed described in high in the clouds also includes before data to be managed:
The screening instruction of receive user, and data to be managed waiting for transmission are determined according to the screening instruction.
Beneficial effect
Data managing method provided in an embodiment of the present invention, server and terminal, server is by receiving from end side Lock instruction, and the memory block to be managed in high in the clouds is locked according to lock instruction, within locking time, server is received Arrival self terminal side in memory block to be managed during the access request of data to be managed, refusing end side access request, make End side can not all treat the data to be managed of management storage region within locking time and be operated, so as to ensure that during locking The safety of interior data to be managed.Due within locking time being refused from end side for be managed in this scenario Whole access requests of data to be managed in memory block, therefore, other people beyond user can not only be prevented to number to be managed According to malicious operation, but also user can be avoided from performing irreversible behaviour to data to be managed in the case of inconsiderate Situation about regretting after work, not only ensure that the safety of data to be managed;On the other hand, due to memory block to be managed in wait manage Manage data just can only can check after locking terminates, and which increase the mystique of data to be managed, improve data storage Interest, improves Consumer's Experience.
Description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is a kind of flow chart of the data managing method in end side of first embodiment of the invention proposition;
Fig. 2 is a kind of flow chart of the data managing method in server side of first embodiment of the invention proposition;
Fig. 3 is a kind of flow chart of the data managing method that second embodiment of the invention is proposed;
Fig. 4 is a kind of structural representation of the terminal that each embodiment of the invention is proposed;
Fig. 5 is a kind of structural representation of the server that each embodiment of the invention is proposed;
Fig. 6 is the hardware architecture diagram for realizing the optional mobile terminal of each embodiment one of the invention;
Fig. 7 is the hardware architecture diagram for realizing the optional server of each embodiment one of the invention.
Specific embodiment
It should be appreciated that specific embodiment described herein is not intended to limit the present invention only to explain the present invention.
Each embodiment of the invention proposes a kind of data management scheme, enters for the data to be managed to storage beyond the clouds Row management, ensures to be treated in high in the clouds in the case of being encrypted data to be managed using Crypted password in prior art is not adopted The safety of management data.Hereinafter each embodiment will be to data managing method, and the service for performing the data managing method Device is introduced with terminal:
First embodiment:
The present embodiment provides a kind of data managing method, when the method is performed, needs terminal mutual with server Coordinate, the flow process of the data managing method end side in the present embodiment is described in detail below in conjunction with Fig. 1:
S102, terminal generate lock instruction.
When user needs to be managed certain memory block in high in the clouds, can send instructions under end side, by end End generates corresponding management and instructs and be transferred to corresponding server, server is performed to management instruction according to terminal transmission The desired management action of user.Therefore, when user want ensure its high in the clouds some memory block in data in the scheduled time It is interior when will not be accessed by anyone, lock instruction can be sent by terminal to server.Lock instruction by terminal according to The instruction of user is generated, and user can specify it to wish which the memory block of locking is in terminal, and wish to deposit this How long is storage area locking.Therefore, the mark of the memory block to be managed that locking user specifies should be included in lock instruction Information and the locking time for the memory block to be managed.
Mainly carried out in the form of file when due to storing to data beyond the clouds, therefore, the present embodiment In memory block to be managed can be the file in high in the clouds, and go up beyond the clouds, different files has different store paths, because This, is for this memory block to be managed, can be directly using the store path of memory block to be managed as identification information.In addition, If All Files folder in user high in the clouds does not have the situation of duplication of name, directly this document folder is referred to as using the name of file Identification information is also feasible.In addition, user can also arrange a unique corresponding identification number for each file, Then using the unique identifying number of file as identification information.
Lock instruction is sent to server by S104, terminal.
Terminal is generated after lock instruction, lock instruction is transferred to into server, by server according to lock instruction to cloud The lock management that the memory block to be managed at end is responded.With reference to Fig. 2 to data managing method server in the present embodiment The flow process of side is introduced:
S202, server receive the lock instruction from end side and the to be managed of high in the clouds is deposited according to the lock instructions Storage area is locked.
Because a high in the clouds account can be used over multiple terminals, for example, after one high in the clouds account of user's registration, The data that can be stored to it from its notebook computer beyond the clouds are managed, it is also possible to log in high in the clouds account by mobile phone and allow Its management operation for wanting to carry out is performed afterwards.Therefore in the present embodiment, the lock instruction that server is received may be from using The mobile terminal at family, such as, mobile phone, PAD, PDA etc., it is also possible to from the fixed terminal of user, such as desktop computer.
After server receives the lock instruction of end side, user can be parsed from lock instruction and expects locking Object and corresponding locking time.
Locking time primarily to indicate that server treats locking initial time and the finish time of management storage region, because This, if server is after lock instruction is received, locks memory block to be managed according to lock instruction immediately, and the moment is made To lock initial time, then it will be appreciated by those skilled in the art that, in order to specify locking finish time, one can be passed through Individual duration or a time point are carried out.During by locking duration to characterize, such as 15 days, 1 year, 10 years etc., then it represents that from clothes Business device is locked after memory block to be managed, and after continuing 15 days, 1 year or 10 the locking for treating management storage region could be released. When the way that locking finish time is indicated by time point is also very common, for example, at the end of the locking that user specifies Quarter is on December 12nd, 2017, then server treats locking time of management storage region will last till on December 12nd, 2017 0 point.Locking initial time and locking finish time can also simultaneously be included in locking time simultaneously.Include that locking is initial when simultaneously When moment and finish time, the time that user can be started with self-defined locking, the autonomy of user can be further ensured that.
The access request of S204, server receiving terminal side to data to be managed in the memory block to be managed.
It is understood that the terminal for now sending access request can be the ends different from the terminal for sending lock instruction End.Such as user have sent after lock instruction by desktop computer to server, can be directed to by sending on other-end The access request of data to be managed in memory block to be managed.Simultaneously it will be appreciated by those skilled in the art that, by terminal to Server sends access request and is also not necessarily user, and is likely to be that other want illegally to obtain user data People.
When server is treated after management storage region locked according to the lock instruction of end side, in memory block to be managed Storing data to be managed cannot be accessed by any user of end side.When the device that server is locked in memory block to be managed The access request treated for data to be managed in memory block to be managed is received in part, shall not be responded.
Whether S206, server judge current within locking time.
So server is after the access request for receiving end side, need first to determine whether to be deposited in be managed In the locking time of storage area, decide whether that access should be received with this.If it is determined that result is yes, then S208 is gone to, otherwise turned To S210.
S208, server refusal respond access request.
If the server determine that receiving in locking time of the moment of access request also in memory block to be managed, then treat Data to be managed do not receive any type of access in management storage region, therefore, server should refusal respond end side should Access request.
S210, server response access request.
If server is through judging, when finding to receive the moment locking of memory block no longer to be managed of access request Interior, then server can be with the access request of normal response user.
Access for memory block to be managed data to be managed can be divided into various ways, for example, data to be managed be entered Row is downloaded, collection etc. of checking online, delete and classify.Therefore, end side is sent to the access request of server and may also divide For different types, when server beyond the locking moment of memory block to be managed after access request is received, can be according to visit Ask the type of request that determine should be to the management mode of operation of data to be managed.
In the present embodiment, when memory block to be managed is within locking time, anyone can be avoided to storage Data to be managed wherein conduct interviews, therefore, if user deposits more important data storage beyond the clouds to be managed Storage area, and after by lock instruction is locked memory block to be managed, it is possible to number to be managed is fully ensured that within locking time According to safety.Within locking time, can not only avoid beyond user other people maliciously obtain the to be managed of user's storage Data, even user can not access, therefore, the data managing method that the present embodiment is provided can also prevent user because It is that misoperation or the situation for deleting after data to be managed and regretting for pondering over inconsiderate and rashness are produced.
User might have some files or data are extremely important, if storing it in terminal, can cause terminal Insufficient memory, but if storage is to if high in the clouds, it may and be extremely to pacify to be encrypted by the way of Crypted password Entirely, especially when security protection is carried out to the vital document of user by the way of Crypted password, user can not be protected completely certainly Oneself because user also can be using cryptographic acess vital document or data, and user perform access operation during, can Accidentally these files or data can be changed or delete because of the reason for oneself.Therefore, the method in the present embodiment is very It is adapted to manage those data that can not be made known publicly within certain time limit, if user needs to ensure text document in 1 year Do not distorted by anyone acquisition, then user can store this document in a file in high in the clouds, then using its terminal This document folder is locked, and locking time was defined to from server according to 1 term after lock instruction lock file folder It is interior.Then in this 1 year, nobody is able to access that this document, that is to say, that interior in this year that file can be completely secured Safety.
Second embodiment:
In the present embodiment, a kind of data managing method is also to provide, the present embodiment will be on the basis of first embodiment The introduction of more details is done to the data managing method.
By the agency of mistake in the first embodiment, during beyond the clouds memory block to be managed is locked, server will not be responded Any access request of to be managed data of the end side to having stored in the memory block to be managed, that is to say, that deposit to be managed In the locking time of storage area, anyone can not carry out any operation by the access request of end side to data to be managed.But This is not that restriction can not treat management storage region and be operated.Because in the present embodiment, when memory block to be managed is locked Afterwards, user also can be by lateral its transmission data to be managed of terminal.
That is, end side by server transport lock instruction lock a memory block to be managed after, or Can continue to transmit data to be managed from lateral this locked memory block to be managed of terminal, data to be managed are once stored To after memory block to be managed, just no longer receive the access in locking time.
In the present embodiment, data to be managed can be document data and various types of media datas, such as video counts According to, voice data, image data etc..
Before intelligent terminal popularizes, people are to adopt when needing to sometime being regarded as memory or being recorded, generally Take pictures photocopy photo, recording make tape or video recording and imprinting laser disc mode.After year in year out, these photos, tape or Laser disc can all become people and commemorate past support, and due to scarcity of resources, the chance take pictures, record, recorded a video than sparser, So the photo obtained after regarding as memory each time, tape and laser disc also all seem precious, therefore, people would generally retain for a long time These have collected past object, to browse appreciation often.
But with the arriving in intelligent terminal's epoch, people can be regarded as memory whenever and wherever possible using the intelligent terminal of oneself, therefore, So the file such as photo stored in terminal is magnanimity, for a user, termination function is powerful, photo, video or audio frequency Itself is readily available, therefore is also just no longer worth with collection as the past.Particularly when the memory space inadequate of terminal, And user is when accommodating new data in the urgent need to vacateing memory space, user when photo, the audio or video of past storage The primary object deleted, for example, when user needs the new photo of shooting or installs new application program, terminal notifying is used Family memory space inadequate, then what user may expect first is exactly to delete video, audio frequency or the photo files for shooting in the past, with Just it is new data vacating space.
After user deletes past video, audio frequency or photo files, situation about regretting may again occurs.Although leading Applying, to delete souvenir file and the immediate cause easily regretted easily be that the restriction of terminal storage space and user make decision at family Carelessness, but after all, mainly due to the photo in the epoch of intelligent terminal, audio frequency the reason for cause these phenomenons to occur Or video file is readily available, therefore lose the interest of its script.And, can preserve photo, recording, record in former user The files such as picture, wait until that the regular hour goes over, and the file such as photo is returned because have recorded the past years into guiding user Recall one of past thing few in number, therefore can more seem more valuable, user also will more cannily carry out treasure Hide.And it is present, user can delete the files such as photo not with regard to before sometimes for memory space is saved, usually, due to user The time of these files of distance acquisition is not remote when photo or recording, video file is deleted, therefore at this When, the file such as photo also lacks due collection value, and user also can't be by the emotion do not given up when deletion.
Therefore, in the present embodiment, can be by by these photos, recording or video file storage storage beyond the clouds Area, and memory block is locked, unlock again after some days for user appreciate the photo being stored therein, recording or Video file.Because user has no chance to delete or even be to look at the chance of these files during locking, intelligently wait until Locking time could again obtain the operations access rights to file after terminating.In this case, locked storage to be managed Area is equivalent to one " time capsule ", and the locking time of user's setting can determine the time that this " time capsule " is opened. When memory block to be managed is unlocked, the data to be managed being stored in memory block to be managed, such as photo, recording, video recording Etc. the implication that will be endowed beyond digital information.
It is this obvious when preserving to article by virtual time capsule compared to real time capsule More advantage, because no matter the article in actual time capsule is preserved by which type of mode, is always not fee from and receives To the erosion in years, such as photo may mouldy or jaundice, and be stored in the file of memory block to be managed without with year Month transition and there is any change, the past dribs and drabs of record user that can be permanent.
Due to the photo of end side, recording, video recording or document etc. be all sporadically increasing, therefore, if with Family take pictures each time, record, record a video or write will be manual after document control terminal to server transport file, that The burden of user will be very big, and particularly as the so common convenient epoch of taking pictures now, user will may clap for one day According to many times, and will be to if server transport photo after shot every time, user may relatively be sick of.So In the present embodiment, the data under which storage catalogue can be actively specified to be to need to be transferred to high in the clouds memory block to be managed by user Data, those storage catalogues that then terminal-pair user specifies are monitored, when finding there is new in these storage catalogues Data update after, terminal just can lock newly-increased data to high in the clouds without startling user as data transfer to be managed Memory block to be managed in.It is automatically that the photo of user, recording, video recording and document etc. is automatic that this process is equivalent to terminal It is added in the middle of time capsule.
Terminal can be carried out, it is not necessary to Yong Hucan when data to be managed are transmitted to high in the clouds memory block to be managed on backstage With operation management, at the same time, user can be running other processes in terminal.And because terminal is transmitting data to be managed When, the network bandwidth can be taken, if other processes of user's currently operation are because be subject to terminal to high in the clouds transmission data Affect, Consumer's Experience may be influenced whether, therefore, in the present embodiment, again to be managed when terminal can select the free time Transmit data to be managed in memory block, it is also possible to shared by transmission data the and network bandwidth when data to be managed are transmitted Real-time control is carried out, for the scheme that real-time control transmits the network bandwidth shared by data to be managed, can further be carried out below Introduce:
For those behave the process for needing to take the network bandwidth, bandwidth occupancy is referred to as in the present embodiment and is entered Journey, so it is also a bandwidth occupancy process that terminal transmits data to be managed to memory block to be managed, except to storage to be managed Transmit the needs process of the occupancy network bandwidth beyond data to be managed and be referred to as " other bandwidth occupancy processes " in area.In order to not affect Other bandwidth occupancy processes that terminal is currently running, other bandwidth occupancies that current operation can be based in the present embodiment enter Journey and current network bandwidth determine the transmission available bandwidth of transmission data to be managed.
If current in terminal do not run other bandwidth occupancy processes, i.e., the number of current other bandwidth occupancy processes Be zero, then using the current network bandwidth as terminal transmission data to be managed transmission available bandwidth.
If currently having run other bandwidth occupancy processes in terminal, i.e. the number of other bandwidth occupancy processes is not zero, Then determine transmission available bandwidth according to pre-set bandwidths accounting and current network bandwidth:
Transmission available bandwidth=current network bandwidth * pre-set bandwidths accountings.
The size of pre-set bandwidths accounting can be by User Defined, it is also possible to is preset by developer and is completed, if By developer in development period just by pre-set bandwidths accounting, then developer can consider the experience of a large number of users, so as to arrange One value for not interfering with Consumer's Experience as far as possible is used as pre-set bandwidths accounting.And if carrying out self-defined setting by user presets band The value of wide accounting, then user can be at any time according to the service condition of oneself come the size of adjusted value:If other of current operation If bandwidth occupancy process is not particularly significant, can be by the bigger than normal of pre-set bandwidths accounting setting, so that terminal can be fast Fast ground will go in data transfer to be managed to high in the clouds.
Generally, the data to be managed of terminal transmission may all than larger, if being transmitted using data traffic, then User may need to pay substantial amounts of campus network.So it is not a kind of good biography that data to be managed are transmitted using data on flows Defeated mode, therefore, in the middle of a kind of example of the present embodiment, terminal to high in the clouds memory block to be managed transmit data to be managed it Before, can first determine that it is current whether under WIFI (WIreless-Fidelity, Wireless Fidelity) network environment.
Although user can be specified the data transfer to be managed under storage catalogue to high in the clouds, this area by terminal automatically Technical staff should be understood that if the user thinks that some data to be managed need not be stored to high in the clouds, then user can be to terminal Screening instruction is sent, filtering out needs to transmit data to be managed, so as to avoid terminal from all transmitting all data without filtration Situation to high in the clouds occurs.
For server, after the lock instruction according to end side is locked memory block to be managed, although Can not respond the access that data to be managed in management storage region are treated in end side within locking time, but this not GC group connector The access of management storage region is treated in side, and end side also can be to be stored in new data to be managed to memory block to be managed.For clothes For business device, it can be obtained in the data Cun Chudao to be managed memory block to be managed of end side upload, or server also may be used To obtain the data to be managed of other memory blocks of high in the clouds and store in memory block to be managed, beyond all doubt, both are obtained The mode for taking data to be managed can be and deposit.
Cite a plain example below, the data managing method in the present embodiment is further described:
Generally father and mother miss potter the point point recorded by photo in child's developmental process after the child's birth of oneself Drop drop, in the past, takes a picture unlike at present so when an opportunity arises, some father and mother may shoot one when child's birthday Photo makes photograph album, after child grows up, it will be appreciated that the growth change of oneself.And not only digital camera popularization now, and And the effect of taking pictures of the electronic product such as mobile phone, PAD also increasingly convergence is perfect, therefore, the photo that father and mother shoot is also just more , long term accumulation gets off, and the quantity of photo is very huge.In order to ensure that camera terminal can at any time shoot photo, photographer is led to The photo that will be shot can be often selected to preserve beyond the clouds.In the present embodiment can also be thus, specific process may refer to Fig. 3:
S302, generation virtual time capsule.
User just can beyond the clouds register an account before oneself child birth or when just birth, and with this Account sets up a virtual time capsule, and this virtual time capsule can be a memory area in high in the clouds, such as a file Folder, this file can be sky, or store media data or document data.
User using file as generate virtual time capsule it is basic when, it is only necessary to from terminal log in high in the clouds account, And by terminal to server send a lock instruction, contain in lock instruction selected file identification information and This document is pressed from both sides into the line-locked time, for the locking time of file server can be allowed to determine that the virtual time capsule is beaten The time opened.
User can also carry out personalized name, with body when virtual time capsule is generated to virtual time capsule The collection theme of existing virtual time capsule, for example, be named as virtual time capsule " the growth diary of XX ".
S304, terminal determine the strategy of transmission photo according to the setting of user.
User can specify the photo under those storage catalogues to need to be transferred in virtual time capsule in terminal, while User can also arrange terminal and time, pre-set bandwidths accounting of photo etc. are transmitted to cloud virtual time capsule.
For example user specifies, and terminal carries all photos under the storage catalogue of camera, in addition to special screening, will In being synchronized to virtual time capsule, terminal can be daily 00:00 to 06:Photo transmission process is run between 00.Due to In this time period, user substantially all in sleep state, will not using terminal, therefore, terminal can be with this time period Photo is transmitted using whole network bandwidths.
S306, terminal to the virtual time capsule in high in the clouds transmits photo.
It is understood that multiple terminals of user can transmit photo in virtual capsule, as long as this multiple terminal All logged in using the account of user's registration, so it is easy to understand that mobile phone or PAD, notebook computer of a user etc. Photo can be filled in virtual time capsule, while in one family, father can also use identical with the mobile phone of mother Account to transmission data in the time capsule.
S308, latch-release, management of the receive user to photo in virtual time capsule.
When user finishes initially set locking time, then user can be looked into the photo in virtual time capsule The operation such as see, download, deleting.Due to the locking time of virtual time capsule it is very long, therefore except non-user arrange it is virtual when Between capsule when be switched on corresponding memorandum and remind, otherwise year in year out after, user is likely to forget that virtual time capsule is beaten The time opened.And, memorandum is reminded and is generally all provided on electronic equipment, and the locking time of virtual time capsule is basic All relatively long, what is had is probably 10 years, and what is had is probably 20 years, and within the so long time, electronic equipment may be already Manager is updated.Therefore even if user is provided with memorandum prompting on a certain electronic equipment, but have can for the electronic equipment pole Can just be eliminated before virtual time capsule is opened.So, in the middle of a kind of example of the present embodiment, when a void At the moment that pseudotime capsule is opened, server can actively issue the user with information, it is to avoid when user cannot know virtual Between capsule open-interval problem.For example when passing through user's registration reserved telephone number or E-mail address etc. send short to user Letter or mail, to point out user to check the file in virtual time capsule.
It is understood that it can be photo, audio frequency, video etc. to be stored in virtual time capsule, text is can also be Shelves, such as father and mother in child before birth or child was as a child write to the letter of child, pregnancy period diary of mother etc..
It is assumed that a user establishes a virtual time capsule in child this day of being born, and the virtual time capsule is set Locking time be 18 years.Significant record will be compared in child's developmental process later to be stored in virtual time capsule, After child grows up, this day of gift of being for example grown up, virtual time capsule is just opened, and user will can in these years record Dribs and drabs give child as present, those he understands or the uncomprehending years to allow child to look back, and this will be one non- Normal significant thing.
This data managing method that the present embodiment is proposed, by locking memory block to be managed, can not only be in locking Interior other people data to be managed do not treated in management storage region ensured beyond user and user cause any destruction, and Because during memory block to be managed is locked, data can only be stored in it, it is impossible to check, therefore maintain treating of being stored therein The mystique of management data, adds the interest of data storage management.
3rd embodiment:
The present embodiment will be introduced to the server and terminal of realizing above-mentioned data managing method, first, refer to Terminal structure schematic diagram and server structural representation that Fig. 4 and Fig. 5 are shown respectively:
In the present embodiment, terminal 40 includes generation module 402 and sending module 404.Generation module 402 is used to generate lock Fixed instruction, and sending module 404 is used to for the lock instruction that generation module 402 is generated to be transferred to server.
Server 50 includes receiver module 502 and processing module 504, and receiver module 502 is used to receive from end side Lock instruction and end side are directed to the access request of data to be managed in memory block to be managed.And processing module 504 is then according to connecing The lock instruction that receipts module 502 is received is locked to the memory block to be managed in high in the clouds, and receiver module 502 is received Access request judged, determines that receiver module 502 receives whether the moment of the request to be managed is locked in memory block to be managed In the fixed time.
When user needs to be managed certain memory block in high in the clouds, can send instructions under end side, by end The generation module 402 at end 40 generates corresponding management instruction and is transferred to the receiver module of server 50 by sending module 404 502, the processing module 504 for making server 50 performs the desired management of user according to what sending module 404 was transmitted to management instruction Action.Therefore, when user wants to ensure that the data in some memory block in its high in the clouds in the given time will not be by anyone When access, lock instruction can be sent to server 50 by terminal 40.Lock instruction by terminal 40 generation module 402 Generated according to the instruction of user, user can specify it to wish which the memory block of locking is in terminal 40, and wish To memory block locking how long.Therefore, the memory block to be managed that locking user specifies should be included in lock instruction Identification information and the locking time for the memory block to be managed.
Mainly carried out in the form of file when due to storing to data beyond the clouds, therefore, the present embodiment In memory block to be managed can be the file in high in the clouds, and go up beyond the clouds, different files has different store paths, because This, is for this memory block to be managed, can be directly using the store path of memory block to be managed as identification information.In addition, If All Files folder in user high in the clouds does not have the situation of duplication of name, directly this document folder is referred to as using the name of file Identification information is also feasible.In addition, user can also arrange a unique corresponding identification number for each file, Then using the unique identifying number of file as identification information.
The generation module 402 of terminal 40 is generated after lock instruction, and lock instruction is transferred to server by sending module 404 50, the lock management by server 50 memory block to be managed in high in the clouds responded according to lock instruction.
Because a high in the clouds account can be used over multiple terminals, for example, after one high in the clouds account of user's registration, The data that can be stored to it from its notebook computer beyond the clouds are managed, it is also possible to log in high in the clouds account by mobile phone and allow Its management operation for wanting to carry out is performed afterwards.Therefore in the present embodiment, the lock instruction that server 50 is received may be from The mobile terminal of user, such as, mobile phone, PAD, PDA etc., it is also possible to from the fixed terminal of user, such as desktop computer.
After server 50 receives the lock instruction of terminal 40, user can be parsed from lock instruction and expects lock Fixed object and corresponding locking time.
Locking time is primarily to when indicating that the processing module 504 of server 50 treats the locking starting of management storage region Carve and finish time, therefore, if after receiver module 502 receives lock instruction, processing module 504 is immediately according to locking Instruction locking memory block to be managed, and the moment is used as locking initial time, then it will be appreciated by those skilled in the art that, In order to specify locking finish time, can be carried out by a duration or a time point.During by locking duration to characterize, Such as 15 days, 1 year, 10 years etc., then it represents that lock after memory block to be managed from processing module 504, to continue 15 days, 1 year or The locking for treating management storage region could be released after 10.When the way also right and wrong for indicating to lock finish time by time point Usually see, for example, the locking finish time that user specifies is on December 12nd, 2017, then processing module 504 is deposited to be managed The locking time of storage area will last till 0 point of on December 12nd, 2017.Locking can also simultaneously be included in locking time simultaneously Initial time and locking finish time.When locking initial time and finish time is included simultaneously, user can be with self-defined locking The time of beginning, the autonomy of user can be further ensured that.
Receiver module 502 is additionally operable to receiving terminal side to data to be managed in the memory block to be managed in server 50 Access request.
It is understood that the terminal for now sending access request can be different from the terminal 40 for sending lock instruction Terminal.For example user have sent after lock instruction by desktop computer to server 50, can be by sending on other-end For the access request of data to be managed in memory block to be managed.While it will be appreciated by those skilled in the art that, by end Hold to the transmission access request of server 50 and be also not necessarily user, and be likely to be that other want illegally to obtain user The people of data.
When server 50 is treated after management storage region locked according to the lock instruction of the side of terminal 40, storage to be managed Data to be managed are stored in area cannot be accessed by any user of end side.When the receiver module 502 of server 50 is being treated The access request treated for data to be managed in memory block to be managed is received in the locked device in management storage region, shall not Response.
So after the access request that receiver module 502 receives end side, processing module 504 needs first to determine currently Whether within the locking time of memory block to be managed, decide whether that access should be received with this.
If processing module 504 determines locking time of the moment also in memory block to be managed for receiving access request Interior, then data to be managed do not receive any type of access in memory block to be managed, therefore, server 50 should refusal respond end The access request of side.
If processing module 504 through judging, finds to receive moment of access request memory block no longer to be managed In locking time, then processing module 504 can be with the access request of normal response user.
Access for memory block to be managed data to be managed can be divided into various ways, for example, data to be managed be entered Row is downloaded, collection etc. of checking online, delete and classify.Therefore, end side is sent to the access request possibility of receiver module 502 Different types are also classified into, when receiver module 502 beyond the locking moment of memory block to be managed after access request is received, can So that determined according to the type of access request should be to the management mode of operation of data to be managed.
In the present embodiment, when memory block to be managed is within locking time, anyone can be avoided to storage Data to be managed wherein conduct interviews, therefore, if user deposits more important data storage beyond the clouds to be managed Storage area, and after by lock instruction is locked memory block to be managed, it is possible to number to be managed is fully ensured that within locking time According to safety.Within locking time, can not only avoid beyond user other people maliciously obtain the to be managed of user's storage Data, even user can not access, therefore, the data management scheme that the present embodiment is provided can also prevent user because It is that misoperation or the situation for deleting after data to be managed and regretting for pondering over inconsiderate and rashness are produced.
User might have some files or data are extremely important, if storing it in terminal, can cause terminal Insufficient memory, but if storage is to if high in the clouds, it may and be extremely to pacify to be encrypted by the way of Crypted password Entirely, especially when security protection is carried out to the vital document of user by the way of Crypted password, user can not be protected completely certainly Oneself because user also can be using cryptographic acess vital document or data, and user perform access operation during, can Accidentally these files or data can be changed or delete because of the reason for oneself.Therefore, the method in the present embodiment is very It is adapted to manage those data that can not be made known publicly within certain time limit, if user needs to ensure text document in 1 year Do not distorted by anyone acquisition, then user can store this document in a file in high in the clouds, then using its terminal This document folder is locked, and locking time was defined to from server according to 1 term after lock instruction lock file folder It is interior.Then in this 1 year, nobody is able to access that this document, that is to say, that interior in this year that file can be completely secured Safety.
Fourth embodiment:
In the present embodiment, the server 50 and terminal 40 or to providing in 3rd embodiment is described further:
Already explained above, during beyond the clouds memory block to be managed is locked, server 50 will not respond end side pair Any access request of the data to be managed stored in the memory block to be managed, that is to say, that in the lock of memory block to be managed In fixing time, anyone can not carry out any operation by the access request of end side to data to be managed.But this is not Restriction can not treat management storage region and be operated.Since in the present embodiment, after memory block to be managed is locked, user Terminal also be can be by its transmission data to be managed.
That is, end side is locked after a memory block to be managed by transmitting lock instruction to server 50, also Can be to continue to transmit data to be managed from lateral this locked memory block to be managed of terminal, data to be managed are once deposited After storing up memory block to be managed, just no longer receive the access in locking time.
It will be appreciated by persons skilled in the art that memory block to be managed be locked it is rear to its transmission data to be managed Terminal can send lock instruction terminal, or send lock instruction outside other-end.Below will be with transmission The terminal transmission data to be managed of lock instruction are introduced to as a example by memory block to be managed:
The terminal 40 includes generation module 402 and sending module 404, and sending module is applied not only to be locked to the transmission of server 50 Fixed instruction, and data to be managed can also be transmitted as server 50, the data to be managed that terminal 40 is transmitted are deposited by server 50 In storing up memory block to be managed.
In the present embodiment, data to be managed can be document data and various types of media datas, such as video counts According to, voice data, image data etc..
Before intelligent terminal popularizes, people are to adopt when needing to sometime being regarded as memory or being recorded, generally Take pictures photocopy photo, recording make tape or video recording and imprinting laser disc mode.After year in year out, these photos, tape or Laser disc can all become people and commemorate past support, and due to scarcity of resources, the chance take pictures, record, recorded a video than sparser, So the photo obtained after regarding as memory each time, tape and laser disc also all seem precious, therefore, people would generally retain for a long time These have collected past object, to browse appreciation often.
But with the arriving in intelligent terminal's epoch, people can be regarded as memory whenever and wherever possible using the intelligent terminal of oneself, therefore, So the file such as photo stored in terminal 40 is magnanimity, for a user, terminal 40 is powerful, photo, video or Audio frequency is readily available in itself, therefore is also just no longer worth with collection as the past.Particularly when the storage of terminal 40 is empty Between it is not enough, and user is when accommodating new data in the urgent need to vacateing memory space, photo, audio or video that the past stores When the primary object deleted of user, for example, when user needs to shoot new photo or install new application program, terminal 40 prompting user storage spaces are not enough, then what user may expect first is exactly to delete video, audio frequency or the photograph for shooting in the past Piece file, so as to for new data vacating space.
After user deletes past video, audio frequency or photo files, situation about regretting may again occurs.Although leading Applying, to delete souvenir file and the immediate cause easily regretted easily be that the restriction of the memory space of terminal 40 and user make certainly at family Fixed carelessness, but after all, mainly due to the photo in the epoch of intelligent terminal, sound the reason for cause these phenomenons to occur Frequency or video file are readily available, therefore lose the interest of its script.And, former user can preserve photo, recording, The files such as video recording, wait until that the regular hour goes over, the file such as photo because have recorded the past years, into user can be guided Recall one of past thing few in number, therefore can more seem more valuable, user also will more cannily be carried out Collection.And it is present, user sometimes for memory space is saved, usually can by not just before the file such as photo delete, due to The time that family distance when photo or recording, video file is deleted obtains these files is not remote, therefore at this When individual, the file such as photo also lacks due collection value, and user also can't be by the emotion do not given up when deletion.
Therefore, in the present embodiment, can be by by these photos, recording or video file storage storage beyond the clouds Area, and memory block is locked, unlock again after some days for user appreciate the photo being stored therein, recording or Video file.Because user has no chance to delete or even be to look at the chance of these files during locking, intelligently wait until Locking time could again obtain the operations access rights to file after terminating.In this case, locked storage to be managed Area is equivalent to one " time capsule ", and the locking time of user's setting can determine the time that this " time capsule " is opened. When memory block to be managed is unlocked, the data to be managed being stored in memory block to be managed, such as photo, recording, video recording Etc. the implication that will be endowed beyond digital information.
It is this obvious when preserving to article by virtual time capsule compared to real time capsule More advantage, because no matter the article in actual time capsule is preserved by which type of mode, is always not fee from and receives To the erosion in years, such as photo may mouldy or jaundice, and be stored in the file of memory block to be managed without with year Month transition and there is any change, the past dribs and drabs of record user that can be permanent.
Due to the photo in terminal 40, recording, video recording or document etc. be all sporadically increasing, therefore, if User takes pictures each time, records, records a video or writes the sending module 404 in control terminal 40 that will be manual after document File is transmitted to server 50, then the burden of user will be very big, it is particularly so common convenient as taking pictures now Epoch, user will may take pictures many times for one day, and if will transmitting photo to server 50 after shooting every time, use Family may be relatively sick of.So in the present embodiment, the data under which storage catalogue can be actively specified to be to need by user The data of high in the clouds memory block to be managed are transferred to, those storage catalogues that then terminal 40 is specified to user are monitored, when It was found that after having new data to update in these storage catalogues, sending module 404 just be able to will be increased newly without startling user The memory block to be managed that locks as data transfer to be managed to high in the clouds of data in.This process is equivalent to sending module 404 are automatically automatically added to the photo of user, recording, video recording and document etc. in the middle of time capsule.
Sending module 404 can be carried out when data to be managed are transmitted to high in the clouds memory block to be managed on backstage, it is not necessary to User's Attended Operation is managed, and at the same time, user can be running other processes in terminal 40.And due to sending module 404 When data to be managed are transmitted, the network bandwidth can be taken, if other processes of user's currently operation are because sent Module 404 may influence whether Consumer's Experience to the impact of high in the clouds transmission data, therefore, in the present embodiment, sending module 404 transmit data to be managed to memory block to be managed again when can selecting the free time, it is also possible to transmitting data to be managed When to shared by transmission data and the network bandwidth carries out real-time control, for real-time control is transmitted shared by data to be managed The scheme of the network bandwidth, can further be introduced below:
For those behave the process for needing to take the network bandwidth, bandwidth occupancy is referred to as in the present embodiment and is entered Journey, so it is also a bandwidth occupancy process that sending module 404 transmits data to be managed to memory block to be managed, except to waiting to manage Transmit the needs process of the occupancy network bandwidth beyond data to be managed and be referred to as " other bandwidth occupancy processes " in reason memory block.In order to Other bandwidth occupancy processes that terminal 40 is currently running are not affected, other bands of current operation can be based in the present embodiment Wide occupancy process and current network bandwidth determine the transmission available bandwidth of transmission data to be managed.
If current in terminal 40 do not run other bandwidth occupancy processes, i.e., the number of current other bandwidth occupancy processes Mesh is zero, then the current network bandwidth is transmitted into the transmission available bandwidth of data to be managed as sending module 404.
If currently having run other bandwidth occupancy processes in terminal 40, i.e. the number of other bandwidth occupancy processes is not Zero, then determine transmission available bandwidth according to pre-set bandwidths accounting and current network bandwidth:
Transmission available bandwidth=current network bandwidth * pre-set bandwidths accountings.
The size of pre-set bandwidths accounting can be by User Defined, it is also possible to is preset by developer and is completed, if By developer in development period just by pre-set bandwidths accounting, then developer can consider the experience of a large number of users, so as to arrange One value for not interfering with Consumer's Experience as far as possible is used as pre-set bandwidths accounting.And if carrying out self-defined setting by user presets band The value of wide accounting, then user can be at any time according to the service condition of oneself come the size of adjusted value:If other of current operation If bandwidth occupancy process is not particularly significant, can be by the bigger than normal of pre-set bandwidths accounting setting, so as to sending module 404 Rapidly will can go in data transfer to be managed to high in the clouds.
Generally, the data to be managed of the transmission of sending module 404 may all than larger, if be transmitted using data traffic If, then user may need to pay substantial amounts of campus network.So it is not one that data to be managed are transmitted using data on flows The transmission means planted, therefore, in the middle of a kind of example of the present embodiment, pass to high in the clouds memory block to be managed in sending module 404 Before defeated data to be managed, terminal 40 can first determine that it is current whether under WIFI network environment.
Although user can be specified the data transfer to be managed under storage catalogue to high in the clouds by sending module 404 automatically, Be it will be appreciated by those skilled in the art that, if the user thinks that some data to be managed need not be stored to high in the clouds, then user can To send screening instruction to terminal 40, filtering out needs to transmit data to be managed, so as to avoid terminal from owning without filtration Data are all transferred to the situation in high in the clouds to be occurred.
Although send lock instruction and transmission data to be managed to server 50 in the example is same terminal, It will be appreciated by those skilled in the art that, perform the two processes terminal can not be it is same.
For server 50, after the lock instruction according to end side is locked memory block to be managed, though So the access that data to be managed in management storage region are treated in end side can not be responded within locking time, but this does not represent end The access of management storage region is treated in side, and end side also can be to be stored in new data to be managed to memory block to be managed.For For server 50, it can be obtained in the data Cun Chudao to be managed memory block to be managed of end side upload, or server The data to be managed of other memory blocks of high in the clouds can also be obtained and stored in memory block to be managed, beyond all doubt, this two The mode for planting acquisition data to be managed can be and deposit.When server 50 can be by receiver module 502 in the first manner Obtain data to be managed.If server 50 is needed in the second in memory block to be managed during mobile data to be managed, By processing module 504 data to be managed can be moved in memory block to be managed from other memory blocks.For example user is at end Indicate that processing module 504 moves to three photos that script is stored in the first file in memory block to be managed on end.
When user finishes initially set locking time, then user can be looked into the photo in virtual time capsule The operation such as see, download, deleting.Due to the locking time of virtual time capsule it is very long, therefore except non-user arrange it is virtual when Between capsule when be switched on corresponding memorandum and remind, otherwise year in year out after, user is likely to forget that virtual time capsule is beaten The time opened.And, memorandum is reminded and is generally all provided on electronic equipment, and the locking time of virtual time capsule is basic All relatively long, what is had is probably 10 years, and what is had is probably 20 years, and within the so long time, electronic equipment may be already Manager is updated.Therefore even if user is provided with memorandum prompting on a certain electronic equipment, but have can for the electronic equipment pole Can just be eliminated before virtual time capsule is opened.So, in the middle of a kind of example of the present embodiment, when a void The moment that pseudotime capsule is opened, server can actively issue the user with information by sending with module, it is to avoid user Virtual time capsule open-interval problem cannot be known.For example pass through telephone number or E-mail address reserved during user's registration Note or mail are sent Deng to user, to point out user to check the file in virtual time capsule.
The terminal and server of each embodiment of the invention are realized referring now to Description of Drawings.In follow-up description, Using the suffix of such as " module ", " part " or " unit " that are used to represent element only for being conducive to explanation of the invention, its Itself does not have specific meaning.Therefore, " module " can be used mixedly with " part ".
Terminal described in various embodiments of the present invention can include such as mobile phone, smart phone, notebook computer, number Word radio receiver, PDA (personal digital assistant), PAD (panel computer), PMP (portable media player), guider Etc. mobile terminal and the such as fixed terminal of numeral TV, desk computer etc..Hereinafter it is assumed that terminal is mobile whole End.However, it will be understood by those skilled in the art that, it is of the invention in addition to being used in particular for moving the element of purpose The construction of embodiment can also apply to the terminal of fixed type.
Fig. 6 is the hardware architecture diagram for realizing the optional mobile terminal of each embodiment one of the invention.
Mobile terminal 600 can include wireless communication unit 610, A/V (audio/video) input block 620, user input Unit 630, memorizer 640, controller 650 etc..Fig. 6 shows the mobile terminal with various assemblies, it should be understood that It is, it is not required that implement all components for illustrating.More or less of component can alternatively be implemented.Will be discussed in more detail below The element of mobile terminal.
Wireless communication unit 610 generally includes one or more assemblies, and it allows mobile terminal 600 and wireless communication system Or the radio communication between network.For example, wireless communication unit 610 at least can include mobile communication module 611, it is wireless mutually Networking module 612.
Mobile communication module 611 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 612 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
A/V input blocks 620 are used to receive audio or video signal.A/V input blocks 620 can include the He of camera 621 Mike 622, the static images that 621 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus Or the view data of video is processed.Picture frame Jing after the process of camera 621 can be stored in memorizer 640, and (or other are deposited Storage media) in or be transmitted via wireless communication unit 610, two or more can be provided according to the construction of mobile terminal Camera 621.Mike 622 can be in telephone calling model, logging mode, speech recognition mode etc. operational mode via wheat Gram wind receives sound (voice data), and can be voice data by such acoustic processing.Audio frequency (voice) after process Data can be converted in the case of telephone calling model can be sent to mobile communication base station via mobile communication module 611 Form is exported.Mike 622 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception With the noise or interference produced during transmission audio signal.
User input unit 630 can generate key input data to control each of mobile terminal according to the order of user input Plant operation.User input unit 630 allows the various types of information of user input, and can include keyboard, metal dome, touch Plate (for example, detection is due to the sensitive component of the change of touched and caused resistance, pressure, electric capacity etc.), roller, rocking bar etc. Deng.
Memorizer 640 can store software program for the process and control operation performed by controller 650 etc., Huo Zheke With the data (for example, telephone directory, message, still image, video etc.) for temporarily storing own Jing outputs or will export.And And, memorizer 640 can be storing the vibration of various modes with regard to exporting when touching and being applied to touch screen and audio signal Data.
Memorizer 640 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many Media card, card-type memorizer (for example, SD or DX memorizeies etc.), random access storage device (RAM), static random-access storage Device (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 600 can perform memorizer with by network connection The network storage device cooperation of 640 store function.
The overall operation of the generally control mobile terminal of controller 650.For example, controller 650 is performed and voice call, data The related control of communication, video calling etc. and process.Controller 650 can be with execution pattern identifying processing, will be in touch screen The handwriting input of upper execution or picture draw input and are identified as character or image.
Various embodiments described herein can be with using such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implementing.For hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein Implementing, in some cases, such embodiment can be implemented at least one in electronic unit in controller 650. For software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation Software module is implementing.Software code can be come by the software application (or program) write with any appropriate programming language Implement, software code can be stored in memorizer 640 and be performed by controller 650.
So far, own Jing describes mobile terminal according to its function.Below, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is used as showing Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
In the present embodiment, the data to be managed in mobile terminal 600 can pass through A/V (audio/video) input block 620 and user input unit 630 obtaining, for example, by the camera 621 in A/V (audio/video) input block 620 and wheat Gram wind 622 can respectively obtain photo to be managed and recording, coordinated jointly and can be obtained by camera 621 and mike 622 Video.And passing through user input unit 630 can then obtain document data to be managed etc..
Simultaneously user input unit 630 can also receive user instruction, the instruction of user for indicate to high in the clouds which One memory block carries out locking how long, and user input unit 630 is after the input for receiving user by the finger of user Order is transferred to controller 650, and by controller 650 lock instruction is generated.
Controller 650 is generated after lock instruction, can control wireless communication unit 610 and lock instruction is sent to into service Device.Specifically lock instruction can be sent to server from mobile communication module 611 or wireless Internet module 612.
In addition wireless communication unit 610 can also to server transport data to be managed, when data to be managed are transmitted, Commonly transmitted by WiFi network using wireless Internet module 612.
The hardware configuration of server in various embodiments of the present invention is introduced below, Fig. 7 is illustrated that the realization present invention The structural representation of the optional server of each embodiment one:
The server 700 at least includes:Input and output (IO) bus 710, processor 720, memorizer 730, the and of internal memory 740 Communicator 750.Wherein,
Input and output (IO) bus 710 respectively with other part (processors 720, memorizer of the server belonging to itself 730th, internal memory 740 and communicator 750) connection, and provide transmission lines for other parts.
Processor 720 generally controls the overall operation of the server belonging to itself.For example, processor 720 perform calculate and The operation such as confirmation.Wherein, processor 720 can be central processing unit (CPU).
Communicator 750, generally includes one or more assemblies, and it allows the server belonging to itself and radio communication system Radio communication between system or network.
The storage processor of memorizer 730 is readable, the executable software code of processor, and it is included for control process device 720 instructions (i.e. software perform function) for performing functions described herein.
Receiver module can be realized by communicator 750 in server shown in Fig. 5, and processing module is then by processing Lock instruction after communicator receives the lock instruction of terminal transmission, is passed through input/output bus realizing by device 720 710 are transferred to processor 720, and the data to be managed that processor 720 is controlled in memory block to be managed according to lock instruction are being locked Can not be accessed in time.Memorizer 730 can store various types of data of the upload of end side, and processor 720 is also Can control to mark off multiple storage catalogues in memorizer 730.When communicator 750 receives the to be managed of end side transmission When data, can be according to the control of processor 720 by the corresponding storage mesh in data Cun Chudao to be managed memory block to be managed Under record.It is understood that the memorizer 730 for being not necessarily the server 700 of storage user data, or other expansions The storage medium of exhibition.
When communicator 750 receives the access request of end side, communicator 750 first transmits access request To processor, judge whether current memory block to be managed has relieved locking by processor 720, if it is, normal response Access request, if current memory block to be managed is still in the lock state down, is not responding to access request.
The data management scheme that the server that the present embodiment is proposed can be supported with terminal, by locking storage to be managed Area, can not only treat the number to be managed in management storage region in other people beyond guarantee user in locking time and user According to causing any destruction, and because memory block to be managed is locked during, data can only be stored in it, it is impossible to check, therefore The mystique of the data to be managed being stored therein is maintained, the interest of data storage management is added.
It should be noted that herein, term " including ", "comprising" or its any other variant are intended to non-row His property is included, so that a series of process, method, article or device including key elements not only include those key elements, and And also include other key elements being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element for being limited by sentence "including a ...", it is not excluded that including being somebody's turn to do Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer takes Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but be the invention is not limited in above-mentioned concrete Embodiment, above-mentioned specific embodiment is only schematic, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of without departing from present inventive concept and scope of the claimed protection, can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of server, it is characterised in that include:
Receiver module, for receive from end side lock instruction and end side for data to be managed in memory block to be managed Access request;
Processing module, for after the receiver module receives lock instruction according to the lock instruction to the to be managed of high in the clouds Memory block is locked, and identification information in the lock instruction at least including memory block to be managed and to be managed is deposited for described The locking time of storage area;
The processing module is additionally operable to when the receiver module receives access request, judges current whether in the locking In time;When being, access request described in refusal respond;When no, the access request is responded.
2. a kind of terminal, it is characterised in that include:
Generation module, for generating lock instruction, the lock instruction is used to indicate that server refuses terminal within locking time Access request of the side for data to be managed in the memory block to be managed of high in the clouds;
Sending module, for the lock instruction to be sent to into the server.
3. a kind of data managing method, including:
Receive the lock instruction from end side and the memory block to be managed in high in the clouds is locked according to the lock instruction, institute State the identification information in lock instruction at least including memory block to be managed and the locking time for the memory block to be managed;
Access request of the receiving terminal side to data to be managed in the memory block to be managed;
Judge current whether within the locking time;
When being, access request described in refusal respond;When no, the access request is responded.
4. data managing method as claimed in claim 3, it is characterised in that also include:
After the locking of memory block to be managed is released from, information is sent to terminal, the information is used to characterize user The data to be managed in the memory block to be managed can currently be accessed.
5. the data managing method as described in claim 3 or 4, it is characterised in that also include:
Obtain the data to be managed of end side upload and store in the memory block to be managed;
And/or,
Obtain the data to be managed of other memory blocks of high in the clouds and store in the memory block to be managed.
6. a kind of data managing method, including:
Lock instruction is generated, the lock instruction is used to indicate that server refuses end side within locking time and waits to manage for high in the clouds The access request of data to be managed in reason memory block;
The lock instruction is sent to into the server.
7. data managing method as claimed in claim 6, it is characterised in that the lock instruction is sent to after server Also include:Data to be managed are transmitted to memory block to be managed described in high in the clouds.
8. data managing method as claimed in claim 7, it is characterised in that also include:
Number and current network bandwidth based on other bandwidth occupancy processes of current operation determines the transmission data to be managed Transmission available bandwidth, described other bandwidth occupancy processes need to take Netowrk tape when being the operation in addition to data to be managed are transmitted Wide process.
9. data managing method as claimed in claim 8, it is characterised in that other bandwidth occupancy processes based on current operation Number and current network bandwidth determine that the transmission available bandwidth of the transmission data to be managed includes:
If the number of current other bandwidth occupancy processes is zero, using the presently described network bandwidth as the available band of the transmission It is wide;
If the number of current other bandwidth occupancy processes is not zero, true according to pre-set bandwidths accounting and the presently described network bandwidth The fixed transmission available bandwidth, the transmission available bandwidth=pre-set bandwidths accounting described in presently described network bandwidth *.
10. the data managing method as described in any one of claim 7-9, it is characterised in that to storage to be managed described in high in the clouds Area transmits also to be included before data to be managed:
The screening instruction of receive user, and data to be managed waiting for transmission are determined according to the screening instruction.
CN201610949743.2A 2016-10-26 2016-10-26 Server, terminal and data management method Pending CN106572101A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610949743.2A CN106572101A (en) 2016-10-26 2016-10-26 Server, terminal and data management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610949743.2A CN106572101A (en) 2016-10-26 2016-10-26 Server, terminal and data management method

Publications (1)

Publication Number Publication Date
CN106572101A true CN106572101A (en) 2017-04-19

Family

ID=58536641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610949743.2A Pending CN106572101A (en) 2016-10-26 2016-10-26 Server, terminal and data management method

Country Status (1)

Country Link
CN (1) CN106572101A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109308605A (en) * 2018-09-12 2019-02-05 莆田市烛火信息技术有限公司 A kind of electronic time capsule management method and system based on block chain
CN111491322A (en) * 2019-01-28 2020-08-04 中国移动通信有限公司研究院 Processing method and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559456A (en) * 2013-10-24 2014-02-05 广东明创软件科技有限公司 Data protecting method and terminal based on time
CN103596026A (en) * 2013-11-21 2014-02-19 乐视致新电子科技(天津)有限公司 Encryption and decryption method and device for video playing equipment
CN103793663A (en) * 2013-12-26 2014-05-14 北京奇虎科技有限公司 Folder locking and unlocking methods and folder locking and unlocking devices
CN104700037A (en) * 2013-12-10 2015-06-10 杭州海康威视系统技术有限公司 Method for protecting cloud storage video data and system thereof
CN104702655A (en) * 2014-03-21 2015-06-10 杭州海康威视系统技术有限公司 Cloud storage resource distribution method and system
CN105740717A (en) * 2016-01-29 2016-07-06 四川效率源信息安全技术股份有限公司 Method and apparatus for performing electronic data file protection based on encrypted partition

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559456A (en) * 2013-10-24 2014-02-05 广东明创软件科技有限公司 Data protecting method and terminal based on time
CN103596026A (en) * 2013-11-21 2014-02-19 乐视致新电子科技(天津)有限公司 Encryption and decryption method and device for video playing equipment
CN104700037A (en) * 2013-12-10 2015-06-10 杭州海康威视系统技术有限公司 Method for protecting cloud storage video data and system thereof
CN103793663A (en) * 2013-12-26 2014-05-14 北京奇虎科技有限公司 Folder locking and unlocking methods and folder locking and unlocking devices
CN104702655A (en) * 2014-03-21 2015-06-10 杭州海康威视系统技术有限公司 Cloud storage resource distribution method and system
CN105740717A (en) * 2016-01-29 2016-07-06 四川效率源信息安全技术股份有限公司 Method and apparatus for performing electronic data file protection based on encrypted partition

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109308605A (en) * 2018-09-12 2019-02-05 莆田市烛火信息技术有限公司 A kind of electronic time capsule management method and system based on block chain
CN109308605B (en) * 2018-09-12 2021-04-23 莆田市烛火信息技术有限公司 Electronic time capsule management method and system based on block chain
CN111491322A (en) * 2019-01-28 2020-08-04 中国移动通信有限公司研究院 Processing method and equipment

Similar Documents

Publication Publication Date Title
US10701069B2 (en) Online identity verification platform and process
US8510848B1 (en) Method and system for managing data in a communication network
CN108111585A (en) Distributed storage method based on block chain
US8683552B2 (en) Information distribution system and terminal device
WO2017143879A1 (en) File permission management method and device
KR20140143725A (en) Image correlation method and electronic device therof
TW201141125A (en) System for remotely erasing data, method, server, and mobile device thereof, and computer program product
WO2022143081A1 (en) Data synchronization method and apparatus
CN105099867B (en) Information processing equipment, communication system and information processing method
CN102238102B (en) Based on the method and system of the file of quota
CN107370604A (en) A kind of more granularity access control methods under big data environment
CN101211367A (en) Information processor, information processing method, and program
CN110858191A (en) File processing method and device, electronic equipment and readable storage medium
CN109493224A (en) A kind of block chain picture social intercourse system
CN105988897A (en) Recovery method and device of backup data of mobile terminal
US20180204018A1 (en) Methods and systems for management of data stored in discrete data containers
CN114239503A (en) Online document cooperation method and device, electronic equipment and storage medium
CN106572101A (en) Server, terminal and data management method
JP5898712B2 (en) Image forming apparatus and control method thereof
CN102932443A (en) HDFS (hadoop distributed file system) cluster based distributed cloud storage system
US8229400B1 (en) Granular control over access to data by a device
CN115357942B (en) Content self-protection method and device based on online document and storage medium
US10380075B2 (en) Limiting sharing of a stored file
CN108648365A (en) A kind of express delivery delivery method and system based on router
WO2018000658A1 (en) Information processing method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170419