CN106657214A - Data migration method and terminal - Google Patents
Data migration method and terminal Download PDFInfo
- Publication number
- CN106657214A CN106657214A CN201610826851.0A CN201610826851A CN106657214A CN 106657214 A CN106657214 A CN 106657214A CN 201610826851 A CN201610826851 A CN 201610826851A CN 106657214 A CN106657214 A CN 106657214A
- Authority
- CN
- China
- Prior art keywords
- terminal
- security
- level
- data
- running environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data migration method and a terminal. The method comprises: a first terminal receives operational environment information feedback sent by a second terminal, wherein the operational environment information includes operational environment information of the second terminal; the first terminal determines a security level of the second terminal based on the operating environment information of the second terminal, wherein the security level includes a trusted level and a non-trusted level; the first terminal determines data corresponding to the security level; and the first terminal sends the data corresponding to the security level to the second terminal. Therefore, the data corresponding to the target terminal environment security level can be inputted into the target terminal, thereby guaranteeing the user data security and improving the user experience.
Description
Technical field
The present invention relates to field of terminal, and in particular to a kind of method and terminal of Data Migration.
Background technology
With the popularization of terminal (such as the electronic equipment such as smart mobile phone, Wearable, panel computer), terminal gradually into
For an indispensable part in people's life so that people no matter go to everywhere can carried terminal.
But with the development of science and technology, the speed that terminal updates is quickly.When user starts with a new terminal, often for
Convenient use, it is necessary to the data inside old terminal are imported in new terminal.
It is pointed out that when data are imported in from old terminal toward new terminal, if there is security risk in new terminal, that
Import past information and there is loss or compromised risk, so as to reduce Consumer's Experience.
The content of the invention
The method and terminal of a kind of Data Migration are embodiments provided, can be imported and the mesh to target terminal
The mark corresponding data of terminal environments level of security, so as to ensureing secure user data, and then improve Consumer's Experience.
Embodiment of the present invention first aspect discloses a kind of method of Data Migration, and methods described includes:
First terminal receives the running environment feedback of the information that second terminal sends, and the running environment feedback of the information includes
The running environment information of the second terminal;
The first terminal determines the level of security of the second terminal according to the running environment information of the second terminal;
Wherein, the level of security includes confidence levels and insincere rank;
The first terminal determines the data corresponding with the level of security;
The first terminal to the second terminal sends the data corresponding with the level of security.
Embodiment of the present invention second aspect discloses a kind of terminal, and the terminal includes:
Receiving unit, for receiving the running environment feedback of the information of second terminal transmission, the running environment feedback of the information
Include the running environment information of the second terminal;
First determining unit, for determining the safety of the second terminal according to the running environment information of the second terminal
Rank;Wherein, the level of security includes confidence levels and insincere rank;
Second determining unit, is additionally operable to determine the data corresponding with the level of security;
Transmitting element, for sending the data corresponding with the level of security to the second terminal.
Third aspect present invention discloses a kind of terminal, and the terminal includes:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs as described in relation to the first aspect
Method.
As can be seen that in the scheme of the embodiment of the present invention, first terminal receives the running environment information that second terminal sends
Feedback, the running environment feedback of the information includes the running environment information of the second terminal;The first terminal is according to institute
The running environment information for stating second terminal determines the level of security of the second terminal;Wherein, the level of security includes credible
Rank and insincere rank;The first terminal determines the data corresponding with the level of security;The first terminal is to institute
State second terminal and send the data corresponding with the level of security.It is hereby understood that by implementing the technical side that the present invention is provided
Case, can import the data corresponding with the target terminal Environmental security rank to target terminal, so as to ensure number of users
According to security, and then improve Consumer's Experience.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below by to be used needed for embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1-a are a kind of schematic flow sheet of the method for Data Migration provided in an embodiment of the present invention;
Fig. 1-b are a kind of network architecture diagram of data mover system provided in an embodiment of the present invention;
Fig. 1-c illustrate table for a kind of Data Migration store path provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the method for another kind of Data Migration provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 4 is the structural representation of another kind of terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of entity apparatus structural representation of terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of entity apparatus structural representation of mobile phone provided in an embodiment of the present invention.
Specific embodiment
The method and terminal of a kind of Data Migration are embodiments provided, can be imported and the mesh to target terminal
The mark corresponding data of terminal environments level of security, so as to ensureing secure user data, and then improve Consumer's Experience.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, is explicitly described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is the present invention one
The embodiment divided, rather than the embodiment of whole.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing
Go out the every other embodiment obtained under the premise of creative work, should all belong to the scope of protection of the invention.
Term " first ", " second " and " the 3rd " occurred in description of the invention, claims and accompanying drawing etc. is to use
In the different objects of difference, and it is not intended to describe specific order.Additionally, term " comprising " and " having " and they are any
Deformation, it is intended that cover non-exclusive including.For example contain process, method, system, the product of series of steps or unit
Or equipment is not limited to the step of listing or unit, but alternatively also include the step of not listing or unit, or can
Selection of land also includes other steps intrinsic for these processes, method, product or equipment or unit.
A kind of method of Data Migration is disclosed in one embodiment of the invention, and methods described includes:First terminal
The running environment feedback of the information that second terminal sends is received, wherein, data to be transmitted is included in the running environment feedback of the information
Mark;The first terminal determines target store path;The first terminal obtains depositing under the target store path
The mark of storage data;The first terminal is matched the mark of the data to be transmitted with true with the mark of data storage
The fixed mark that the match is successful;The first terminal is standby by the data under the corresponding target store path of mark that the match is successful
Part is to predeterminable area.
Fig. 1-a are referred to, Fig. 1-a are a kind of methods of Data Migration that one embodiment of the invention is provided.Wherein, as schemed
Shown in 1-a, a kind of method of Data Migration that one embodiment of the present of invention is provided includes herein below:
S101, first terminal receive the running environment feedback of the information that second terminal sends, the running environment feedback of the information
Include the running environment information of the second terminal;
Wherein, the first terminal and the second terminal can be smart mobile phone, panel computer, intelligent wearable equipment
Deng electronic equipment.
Wherein it is possible to be understood by, before first terminal receives the running environment feedback of the information that second terminal sends, the
One terminal can be set up with second terminal and be connected, and send data transfer request to second terminal;Second terminal receives first
After the data transfer request that terminal sends, to first terminal the running environment information of second terminal is fed back.
Wherein, as shown in Fig. 1-b, first terminal and second terminal can be interacted by LAN, or led to
Cross wide area network to interact.
S102, the first terminal determine the safety of the second terminal according to the running environment information of the second terminal
Rank;
Wherein, the level of security includes confidence levels and insincere rank;
, wherein it is desired to, it is noted that the running environment information of the second terminal includes antivirus software in preset time period
Scan report;
It is understood that preset time period can be even one week three days or five days.
It is understood that at least include in the scan report of antivirus software whether comprising virus in the second terminal, should
Viral whether cleaned, patch of second terminal renewal whether in need etc..
Specifically, the first terminal analyzes the scan report to determine the second terminal with the presence or absence of virus;If
The second terminal is the presence of virus, and the level of security of the second terminal is set to insincere rank by the first terminal;
If conversely, the second terminal is not the presence of virus, the first terminal is set to the level of security of the second terminal can
Letter rank.
Optionally, in addition, if not including virus in second terminal, but there is the patch not updated, although this
When second terminal level of security be confidence levels, but user had better be reminded to carry out patch renewal, with prevent hacker lead to
System vulnerability is crossed by the virus implantation second terminal.
Specifically, the first terminal analysis scan report whether there is what is do not updated to determine the second terminal
Patch;If there is the patch not updated in the second terminal, the first terminal issues the user with two terminals described in renewal the
Prompting.Wherein, the mode of prompting, can be word prompting, voice reminder, or vibration reminding etc..
S103, the first terminal determine the data corresponding with the level of security;
Wherein it is possible to be understood by, if the level of security of second terminal is insincere rank, then now cannot send out
Private data is sent, to prevent private data leakage;, whereas if the level of security of second terminal is confidence levels, then explanation
The running environment of second terminal is safe, now can just send all data waiting for transmission.
Specifically, if the level of security of the second terminal is insincere rank, the number to be migrated that user is chosen
Determine private data and non-private data according to being analyzed;Wherein, the private data includes the account information of the user;
The non-private data is set into data corresponding with the insincere rank.
For example, first terminal can issue the user with prompting, so that the type of user's selection private data, first
The type of the private data that terminal is selected according to user generates private data list.As shown in fig 1-c, private data in the list
Type include account, address list information, short message, video information etc..
S104, the first terminal to the second terminal sends the data corresponding with the level of security.
If it is understood that the level of security of second terminal is insincere rank, then first terminal is just to second
Terminal sends non-private data;
If in addition, the level of security of the second terminal is insincere rank, the first terminal is to the second terminal
Virus treated request is sent so that the second terminal is killed virus according to virus treated request to the second terminal;
After the second terminal antivirus is finished, the processed information of a virus can be fed back to the first terminal;If described first
When terminal receives the viral processed information of second terminal feedback, the first terminal to the second terminal sends
The private data.
As can be seen that in the scheme of the embodiment of the present invention, first terminal receives the running environment information that second terminal sends
Feedback, the running environment feedback of the information includes the running environment information of the second terminal;The first terminal is according to institute
The running environment information for stating second terminal determines the level of security of the second terminal;Wherein, the level of security includes credible
Rank and insincere rank;The first terminal determines the data corresponding with the level of security;The first terminal is to institute
State second terminal and send the data corresponding with the level of security.It is hereby understood that by implementing the technical side that the present invention is provided
Case, can import the data corresponding with the target terminal Environmental security rank to target terminal, so as to ensure number of users
According to security, and then improve Consumer's Experience.
Fig. 2 is referred to, Fig. 2 is a kind of method of Data Migration that one embodiment of the invention is provided.Wherein, such as Fig. 2 institutes
Show, a kind of method of Data Migration that one embodiment of the present of invention is provided includes herein below:
S201, first terminal receive the running environment feedback of the information that second terminal sends;
The running environment feedback of the information includes the running environment information of the second terminal;
Wherein, the first terminal and the second terminal can be smart mobile phone, panel computer, intelligent wearable equipment
Deng electronic equipment.
Wherein, the running environment information of the second terminal includes the scan report of antivirus software in preset time period;
S202, the first terminal analyze the scan report to determine the second terminal with the presence or absence of virus;
If S203, the second terminal are the presence of virus, the first terminal sets the level of security of the second terminal
It is set to insincere rank;
If it is understood that the second terminal is not the presence of virus, the first terminal is by the second terminal
Level of security is set to confidence levels.
If the level of security of S204, the second terminal is insincere rank, the data to be migrated chosen to user
It is analyzed to determine private data and non-private data;
Wherein, the private data includes the account information of the user;
S205, the non-private data is set into data corresponding with the insincere rank;
S206, the first terminal to the second terminal sends the data corresponding with the level of security;
If the level of security of S207, the second terminal is insincere rank, the first terminal is to the second terminal
Virus treated request is sent so that the second terminal is killed virus according to virus treated request to the second terminal;
If S208, the first terminal receive the viral processed information of second terminal feedback, described the
One terminal to the second terminal sends the private data;
S209, the first terminal analyze the scan report to determine the second terminal with the presence or absence of the benefit not updated
Fourth;
If there is the patch not updated in S210, the second terminal, the first terminal issues the user with renewal institute
State the prompting of two terminals.
As can be seen that having expanded the step reminded second terminal cleaning virus and update patch in the scheme of the embodiment of the present invention
Suddenly, so that the running environment of second terminal is safer, so as to ensure the safety of private data.
Fig. 3 is referred to, Fig. 3 is a kind of structural representation of terminal that one embodiment of the present of invention is provided.Wherein, as schemed
Shown in 3, a kind of terminal 300 that one embodiment of the present of invention is provided, wherein, the terminal can be for smart mobile phone, flat board electricity
The electronic equipments such as brain, intelligent wearable equipment.The terminal 300 includes that receiving unit 301, the first determining unit 302, second determine
Unit 303 and transmitting element 304.
Receiving unit 301, for receiving the running environment feedback of the information of second terminal transmission, the running environment information is anti-
Feedback includes the running environment information of the second terminal;
First determining unit 302, for the running environment information according to the second terminal second terminal is determined
Level of security;Wherein, the level of security includes confidence levels and insincere rank;
Second determining unit 303, is additionally operable to determine the data corresponding with the level of security;
Transmitting element 304, for sending the data corresponding with the level of security to the second terminal.
Wherein, receiving unit 301, the first determining unit 302, the second determining unit 303 and transmitting element 304 can be used
In the method in embodiment 1 described in step S101 to S104 is performed, description of the detailed in Example 1 to methods described is specifically described,
Will not be described here.
Fig. 4 is referred to, Fig. 4 is a kind of structural representation of terminal that one embodiment of the present of invention is provided.Wherein, as schemed
Shown in 4, another kind of terminal 400 that one embodiment of the present of invention is provided, wherein, the terminal can be for smart mobile phone, flat board
The electronic equipments such as computer, intelligent wearable equipment.The terminal 400 includes that receiving unit 401, the first determining unit 402, second are true
Order unit 403, transmitting element 404, analytic unit 405 and reminding unit 406;
Receiving unit 401, for receiving the running environment feedback of the information of second terminal transmission, the running environment information is anti-
Feedback includes the running environment information of the second terminal;
First determining unit 402, for the running environment information according to the second terminal second terminal is determined
Level of security;Wherein, the level of security includes confidence levels and insincere rank;
Specifically, the running environment information of the second terminal includes the scan report of antivirus software in preset time period;
First determining unit 402 includes that the first analysis subelement and first arranges subelement;
The first analysis subelement, for analyzing the scan report to determine the second terminal with the presence or absence of disease
Poison;
Described first arranges subelement, if being the presence of virus for the second terminal, by the safety of the second terminal
Rank is set to insincere rank.
Second determining unit 403, is additionally operable to determine the data corresponding with the level of security;
Specifically, the second determining unit 403 includes that the second analysis subelement and second arranges subelement;
The second analysis subelement, if the level of security for the second terminal is insincere rank, to user
The data to be migrated chosen are analyzed to determine private data and non-private data;Wherein, the private data includes institute
State the account information of user;
Described second arranges subelement, for the non-private data to be set into number corresponding with the insincere rank
According to.
Transmitting element 404, for sending the data corresponding with the level of security to the second terminal.
Specifically, transmitting element 404, if the level of security for the second terminal is insincere rank, to described the
Two terminals send virus treated request so that the second terminal is entered according to virus treated request to the second terminal
Row antivirus;If when being additionally operable to the first terminal and receiving the viral processed information of second terminal feedback, to described
Second terminal sends the private data.
Analytic unit 405, for analyzing the scan report to determine the second terminal with the presence or absence of the benefit not updated
Fourth;
Reminding unit 406, if for there is the patch not updated in the second terminal, issuing the user with described in renewal the
The prompting of two terminals.
Wherein, receiving unit 401, the first determining unit 402, the second determining unit 403, transmitting element 404 and analysis
Unit 405 can be used for performing the method in embodiment 2 described in step S201 to S210, specifically describe 2 pairs of institutes of detailed in Example
The description of method is stated, be will not be described here.
Fig. 5 is referred to, in another embodiment of the present invention, there is provided a kind of terminal.The terminal 500 includes
CPU501, memory 502, bus 503.Wherein, the terminal 500 can be smart mobile phone, panel computer, Intelligent worn device etc.
Electronic equipment with call function.
Wherein, CPU501 performs the program being stored in advance in memory 502, and the implementation procedure is specifically included:
The running environment feedback of the information that second terminal sends is received, the running environment feedback of the information includes described second
The running environment information of terminal;
The level of security of the second terminal is determined according to the running environment information of the second terminal;Wherein, the peace
Full rank includes confidence levels and insincere rank;
It is determined that the data corresponding with the level of security;
The data corresponding with the level of security are sent to the second terminal.
Optionally, the running environment information of the second terminal includes the scan report of antivirus software in preset time period;
Determine that the level of security of the second terminal includes according to the running environment information of the second terminal:
Analyze the scan report to determine the second terminal with the presence or absence of virus;
If the second terminal is the presence of virus, the level of security of the second terminal is set into insincere rank.
Optionally, the first terminal determines the data corresponding with the level of security, including:
If the level of security of the second terminal is insincere rank, the data to be migrated chosen to user are carried out point
Analyse to determine private data and non-private data;Wherein, the private data includes the account information of the user;
The non-private data is set into data corresponding with the insincere rank.
Optionally, the implementation procedure also includes:
If the level of security of the second terminal is insincere rank, the first terminal to the second terminal sends disease
Poison processes request so that the second terminal is killed virus according to virus treated request to the second terminal;
If the first terminal receives the viral processed information of second terminal feedback, the first terminal
The private data is sent to the second terminal.
Optionally, the implementation procedure also includes:
The first terminal analyzes the scan report to determine the second terminal with the presence or absence of the patch not updated;
If there is the patch not updated in the second terminal, the first terminal issues the user with described in renewal the two eventually
The prompting at end.
As can be seen that in the scheme of the embodiment of the present invention, first terminal receives the running environment information that second terminal sends
Feedback, the running environment feedback of the information includes the running environment information of the second terminal;The first terminal is according to institute
The running environment information for stating second terminal determines the level of security of the second terminal;Wherein, the level of security includes credible
Rank and insincere rank;The first terminal determines the data corresponding with the level of security;The first terminal is to institute
State second terminal and send the data corresponding with the level of security.It is hereby understood that by implementing the technical side that the present invention is provided
Case, can import the data corresponding with the target terminal Environmental security rank to target terminal, so as to ensure number of users
According to security, and then improve Consumer's Experience.
Fig. 6 is referred to, Fig. 6 is the frame of the part-structure of the mobile phone of the terminal correlation that one embodiment of the present of invention is provided
Figure.With reference to Fig. 6, mobile phone includes:It is radio frequency (Radio Frequency, RF) circuit 610, memory 620, input block 630, aobvious
Show unit 640, sensor 650, voicefrequency circuit 660, Wireless Fidelity (Wireless Fidelity, WiFi) module 670, process
The part such as device 680 and power supply 690.It will be understood by those skilled in the art that the handset structure illustrated in Fig. 6 do not constitute it is right
The restriction of mobile phone, can include part more more or less of than diagram, or combine some parts, or different part cloth
Put.
Each component parts of mobile phone is specifically introduced with reference to Fig. 6:
RF circuits 610 can be used for the reception and transmission of information.Generally, RF circuits 610 include but is not limited to antenna, at least one
Individual amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally,
RF circuits 610 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use arbitrary communication
Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile
Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division it is many
Location (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division
Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service
(Short Messaging Service, SMS) etc..
Memory 620 can be used to store software program and module, and processor 680 is stored in memory 620 by operation
Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 620 can mainly include
Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function
Sequence (such as Data Migration function, touch control operation detection function etc.) etc.;Storage data field can be stored to be created according to using for mobile phone
Data (such as store path table data etc.) built etc..Additionally, memory 620 can include high-speed random access memory, also
Nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state storages can be included
Device.
Input block 630 can be used for the numeral or character information of receives input, and produce with the user of mobile phone arrange with
And the key signals input that function control is relevant.Specifically, input block 630 may include that fingerprint module 631 and other inputs set
Standby 632.Fingerprint module 631, can gather user's finger print data thereon.Optionally, fingerprint module 631 may include that optical profile type refers to
Line module, capacitance type fingerprint module and RF-type fingerprint module.So that fingerprint module 631 is capacitance type fingerprint module as an example, tool
Body includes induction electrode (n1 abnormal induction electrode and n2 normal induction electrode) and the signal being connected with the induction electrode
Process circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.).Except fingerprint module 631, input block
630 can also include other input equipments 632.Specifically, other input equipments 632 can include but is not limited to physical keyboard,
One or more in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 640 can be used for show by user input information or be supplied to user information and mobile phone it is various
Menu.Display unit 640 may include display screen 641, optionally, can adopt liquid crystal display (Liquid Crystal
Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Display screen 641.Although in figure 6, fingerprint module 631 and display screen 641 are realizing the defeated of mobile phone as two independent parts
Enter and input function, but it is in some embodiments it is possible to fingerprint module 631 and display screen 641 is integrated and realize mobile phone
Input and output function.
Mobile phone may also include at least one sensor 650, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjusting the brightness of display screen 641, proximity transducer can when mobile phone is moved in one's ear, close display screen 641 and/or
Backlight.Used as one kind of motion sensor, (generally three axles) acceleration is big in the detectable all directions of accelerometer sensor
It is little, size and the direction of gravity is can detect that when static, can be used to recognize application (such as horizontal/vertical screen switching, the phase of mobile phone attitude
Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Can also configure as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be described here.
Voicefrequency circuit 660, loudspeaker 661, microphone 662 can provide the COBBAIF between user and mobile phone.Audio-frequency electric
Electric signal after the voice data for receiving conversion can be transferred to loudspeaker 761 by road 660, and by loudspeaker 661 sound is converted to
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, is turned after being received by voicefrequency circuit 660
Be changed to voice data, then after voice data output processor 680 is processed, Jing RF circuits 610 to be sent to such as another mobile phone,
Or voice data is exported to memory 620 so as to further process.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 670
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 6 shows
WiFi module 670, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely
Become in the essential scope of invention and omit.
Processor 680 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform the software program and/or module that are stored in memory 620, and call and be stored in memory 620
Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 680 can be wrapped
Include one or more processing units;Preferably, processor 680 can integrated application processor and modem processor, wherein, should
Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Mobile phone also includes the power supply 690 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system is logically contiguous with processor 680, so as to realize management charging, electric discharge and power managed by power-supply management system
Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be described here.
In embodiment shown in aforementioned Fig. 1, Fig. 2, each step method flow process can be based on the structure of the mobile phone and realize.
In embodiment shown in aforementioned Fig. 3, Fig. 4, each unit function can be based on the structure of the mobile phone and realize.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, without the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way
Realize.For example, device embodiment described above is only schematic, such as division of described unit, is only one kind
Division of logic function, can there is an other dividing mode when actually realizing, such as multiple units or component can with reference to or can
To be integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or discussed each other
Coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication connection by some interfaces, device or unit,
Can be electrical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can according to the actual needs be selected to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used
When, during a computer read/write memory medium can be stored in.Based on such understanding, technical scheme is substantially
The part for contributing to prior art in other words or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or network equipment etc.) perform the whole of each embodiment methods described of the invention or
Part steps.And aforesaid storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. are various can be with store program codes
Medium.
The above, above example only to illustrate technical scheme, rather than a limitation;Although with reference to front
State embodiment to be described in detail the present invention, it will be understood by those within the art that:It still can be to front
State the technical scheme described in each embodiment to modify, or equivalent is carried out to which part technical characteristic;And these
Modification is replaced, and does not make the scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution.
Claims (11)
1. a kind of method of Data Migration, it is characterised in that methods described includes:
First terminal receives the running environment feedback of the information that second terminal sends, and the running environment feedback of the information includes described
The running environment information of second terminal;
The first terminal determines the level of security of the second terminal according to the running environment information of the second terminal;Its
In, the level of security includes confidence levels and insincere rank;
The first terminal determines the data corresponding with the level of security;
The first terminal to the second terminal sends the data corresponding with the level of security.
2. method according to claim 1, it is characterised in that when the running environment information of the second terminal includes default
Between in section antivirus software scan report;
The first terminal determines that the level of security of the second terminal includes according to the running environment information of the second terminal:
The first terminal analyzes the scan report to determine the second terminal with the presence or absence of virus;
If the second terminal is the presence of virus, the first terminal is set to the level of security of the second terminal insincere
Rank.
3. method according to claim 2, it is characterised in that the first terminal determines corresponding with the level of security
Data, including:
If the level of security of the second terminal be insincere rank, the data to be migrated that user is chosen be analyzed with
Determine private data and non-private data;Wherein, the private data includes the account information of the user;
The non-private data is set into data corresponding with the insincere rank.
4. method according to claim 3, it is characterised in that methods described also includes:
If the level of security of the second terminal is insincere rank, the first terminal to the second terminal is sent at virus
Reason request is so that the second terminal is killed virus according to virus treated request to the second terminal;
If the first terminal receives the viral processed information of second terminal feedback, the first terminal is to institute
State second terminal and send the private data.
5. according to the arbitrary described method of claim 2 to 4, it is characterised in that methods described also includes:
The first terminal analyzes the scan report to determine the second terminal with the presence or absence of the patch not updated;
If there is the patch not updated in the second terminal, the first terminal is issued the user with and updates two terminals described in the
Remind.
6. a kind of terminal, it is characterised in that the terminal includes:
Receiving unit, for receiving the running environment feedback of the information of second terminal transmission, wraps in the running environment feedback of the information
Include the running environment information of the second terminal;
First determining unit, for determining the safe level of the second terminal according to the running environment information of the second terminal
Not;Wherein, the level of security includes confidence levels and insincere rank;
Second determining unit, is additionally operable to determine the data corresponding with the level of security;
Transmitting element, for sending the data corresponding with the level of security to the second terminal.
7. terminal according to claim 6, it is characterised in that when the running environment information of the second terminal includes default
Between in section antivirus software scan report;
First determining unit includes that the first analysis subelement and first arranges subelement;
The first analysis subelement, for analyzing the scan report to determine the second terminal with the presence or absence of virus;
Described first arranges subelement, if being the presence of virus for the second terminal, by the level of security of the second terminal
It is set to insincere rank.
8. terminal according to claim 7, it is characterised in that second determining unit include the second analysis subelement and
Second arranges subelement;
The second analysis subelement, if the level of security for the second terminal is insincere rank, chooses to user
Data to be migrated be analyzed to determine private data and non-private data;Wherein, the private data includes the use
The account information at family;
Described second arranges subelement, for the non-private data to be set into data corresponding with the insincere rank.
9. terminal according to claim 8, it is characterised in that
The transmitting element, if the level of security for the second terminal is insincere rank, sends to the second terminal
Virus treated is asked so that the second terminal is killed virus according to virus treated request to the second terminal;
The transmitting element, if being additionally operable to the viral processed information that the first terminal receives the second terminal feedback
When, send the private data to the second terminal.
10. according to the arbitrary described terminal of claim 7 to 9, it is characterised in that the terminal also includes analytic unit and prompting
Unit;
The analytic unit, for analyzing the scan report to determine the second terminal with the presence or absence of the patch not updated;
The reminding unit, if for there is the patch not updated in the second terminal, issuing the user with two described in renewal the
The prompting of terminal.
11. a kind of terminals, it is characterised in that include:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs if claim 1 is to right
Require the method described in 5 any one.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610826851.0A CN106657214A (en) | 2016-09-14 | 2016-09-14 | Data migration method and terminal |
PCT/CN2017/095055 WO2018049936A2 (en) | 2016-09-14 | 2017-07-28 | Data migration method and terminals |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610826851.0A CN106657214A (en) | 2016-09-14 | 2016-09-14 | Data migration method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106657214A true CN106657214A (en) | 2017-05-10 |
Family
ID=58852496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610826851.0A Pending CN106657214A (en) | 2016-09-14 | 2016-09-14 | Data migration method and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106657214A (en) |
WO (1) | WO2018049936A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018049936A3 (en) * | 2016-09-14 | 2018-05-03 | 广东欧珀移动通信有限公司 | Data migration method and terminals |
CN111597533A (en) * | 2020-04-27 | 2020-08-28 | 维沃移动通信有限公司 | Information display method and device and electronic equipment |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112765605A (en) * | 2020-12-31 | 2021-05-07 | 浙江中控技术股份有限公司 | Data processing method and related equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110314279A1 (en) * | 2010-06-21 | 2011-12-22 | Microsoft Corporation | Single-Use Authentication Methods for Accessing Encrypted Data |
CN103886263A (en) * | 2014-03-19 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for protecting data in mobile terminal |
CN105577662A (en) * | 2015-12-22 | 2016-05-11 | 深圳前海微众银行股份有限公司 | Terminal environmental security control method and server |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4613094B2 (en) * | 2005-05-13 | 2011-01-12 | パナソニック株式会社 | Communication terminal and communication method |
DE102011080467A1 (en) * | 2011-08-04 | 2013-02-07 | Siemens Aktiengesellschaft | Access control for data or applications of a network |
CN105577730A (en) * | 2014-10-24 | 2016-05-11 | 腾讯数码(深圳)有限公司 | Data transfer method and device |
CN105188015A (en) * | 2015-08-07 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | Mobile terminal private data migration backup method and mobile terminal |
CN106657214A (en) * | 2016-09-14 | 2017-05-10 | 广东欧珀移动通信有限公司 | Data migration method and terminal |
-
2016
- 2016-09-14 CN CN201610826851.0A patent/CN106657214A/en active Pending
-
2017
- 2017-07-28 WO PCT/CN2017/095055 patent/WO2018049936A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110314279A1 (en) * | 2010-06-21 | 2011-12-22 | Microsoft Corporation | Single-Use Authentication Methods for Accessing Encrypted Data |
CN103886263A (en) * | 2014-03-19 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for protecting data in mobile terminal |
CN105577662A (en) * | 2015-12-22 | 2016-05-11 | 深圳前海微众银行股份有限公司 | Terminal environmental security control method and server |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018049936A3 (en) * | 2016-09-14 | 2018-05-03 | 广东欧珀移动通信有限公司 | Data migration method and terminals |
CN111597533A (en) * | 2020-04-27 | 2020-08-28 | 维沃移动通信有限公司 | Information display method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2018049936A2 (en) | 2018-03-22 |
WO2018049936A3 (en) | 2018-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106446111B (en) | Data migration method and terminal | |
CN106412033A (en) | Data migration method and terminal | |
CN104407804A (en) | Screen capturing method and screen capturing device as well as electronic device | |
CN108255683A (en) | The method and terminal of message notifying in terminal | |
CN106200970A (en) | A kind of method of split screen display available and terminal | |
CN104618223A (en) | Information recommendation management method, device and system | |
CN106714333A (en) | Data migration method and terminal | |
CN106648455A (en) | Data migration method and mobile terminal | |
CN106569916A (en) | Data backup method and mobile terminal | |
CN106534288A (en) | Data transmission method and mobile terminal | |
CN106657214A (en) | Data migration method and terminal | |
CN104133693B (en) | Installment state detection method, device and terminal | |
CN105868598A (en) | Method and terminal for fingerprint unlocking | |
CN106656978A (en) | Account login method and server | |
CN106453571A (en) | Data migration method and terminal | |
CN104391629A (en) | Method for sending message in orientation manner, method for displaying message, server and terminal | |
CN106529256A (en) | Terminal unlocking method and mobile terminal | |
CN106487878A (en) | A kind of method of Data Migration and terminal | |
CN106792583B (en) | Multimedia message sending method, terminal and computer readable storage medium | |
CN106330684B (en) | A kind of method and terminal of synchronizing information | |
CN106254630A (en) | A kind of method received calls and terminal | |
CN106411864A (en) | Information synchronization method, and terminals | |
CN106527980A (en) | Data migration method and terminal | |
CN106686704A (en) | Terminal monitoring method and mobile terminal | |
CN106357767B (en) | The method and server of a kind of synchronizing information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |
|
RJ01 | Rejection of invention patent application after publication |