CN106657214A - Data migration method and terminal - Google Patents

Data migration method and terminal Download PDF

Info

Publication number
CN106657214A
CN106657214A CN201610826851.0A CN201610826851A CN106657214A CN 106657214 A CN106657214 A CN 106657214A CN 201610826851 A CN201610826851 A CN 201610826851A CN 106657214 A CN106657214 A CN 106657214A
Authority
CN
China
Prior art keywords
terminal
security
level
data
running environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610826851.0A
Other languages
Chinese (zh)
Inventor
马志峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610826851.0A priority Critical patent/CN106657214A/en
Publication of CN106657214A publication Critical patent/CN106657214A/en
Priority to PCT/CN2017/095055 priority patent/WO2018049936A2/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data migration method and a terminal. The method comprises: a first terminal receives operational environment information feedback sent by a second terminal, wherein the operational environment information includes operational environment information of the second terminal; the first terminal determines a security level of the second terminal based on the operating environment information of the second terminal, wherein the security level includes a trusted level and a non-trusted level; the first terminal determines data corresponding to the security level; and the first terminal sends the data corresponding to the security level to the second terminal. Therefore, the data corresponding to the target terminal environment security level can be inputted into the target terminal, thereby guaranteeing the user data security and improving the user experience.

Description

A kind of method and terminal of Data Migration
Technical field
The present invention relates to field of terminal, and in particular to a kind of method and terminal of Data Migration.
Background technology
With the popularization of terminal (such as the electronic equipment such as smart mobile phone, Wearable, panel computer), terminal gradually into For an indispensable part in people's life so that people no matter go to everywhere can carried terminal.
But with the development of science and technology, the speed that terminal updates is quickly.When user starts with a new terminal, often for Convenient use, it is necessary to the data inside old terminal are imported in new terminal.
It is pointed out that when data are imported in from old terminal toward new terminal, if there is security risk in new terminal, that Import past information and there is loss or compromised risk, so as to reduce Consumer's Experience.
The content of the invention
The method and terminal of a kind of Data Migration are embodiments provided, can be imported and the mesh to target terminal The mark corresponding data of terminal environments level of security, so as to ensureing secure user data, and then improve Consumer's Experience.
Embodiment of the present invention first aspect discloses a kind of method of Data Migration, and methods described includes:
First terminal receives the running environment feedback of the information that second terminal sends, and the running environment feedback of the information includes The running environment information of the second terminal;
The first terminal determines the level of security of the second terminal according to the running environment information of the second terminal; Wherein, the level of security includes confidence levels and insincere rank;
The first terminal determines the data corresponding with the level of security;
The first terminal to the second terminal sends the data corresponding with the level of security.
Embodiment of the present invention second aspect discloses a kind of terminal, and the terminal includes:
Receiving unit, for receiving the running environment feedback of the information of second terminal transmission, the running environment feedback of the information Include the running environment information of the second terminal;
First determining unit, for determining the safety of the second terminal according to the running environment information of the second terminal Rank;Wherein, the level of security includes confidence levels and insincere rank;
Second determining unit, is additionally operable to determine the data corresponding with the level of security;
Transmitting element, for sending the data corresponding with the level of security to the second terminal.
Third aspect present invention discloses a kind of terminal, and the terminal includes:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs as described in relation to the first aspect Method.
As can be seen that in the scheme of the embodiment of the present invention, first terminal receives the running environment information that second terminal sends Feedback, the running environment feedback of the information includes the running environment information of the second terminal;The first terminal is according to institute The running environment information for stating second terminal determines the level of security of the second terminal;Wherein, the level of security includes credible Rank and insincere rank;The first terminal determines the data corresponding with the level of security;The first terminal is to institute State second terminal and send the data corresponding with the level of security.It is hereby understood that by implementing the technical side that the present invention is provided Case, can import the data corresponding with the target terminal Environmental security rank to target terminal, so as to ensure number of users According to security, and then improve Consumer's Experience.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below by to be used needed for embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1-a are a kind of schematic flow sheet of the method for Data Migration provided in an embodiment of the present invention;
Fig. 1-b are a kind of network architecture diagram of data mover system provided in an embodiment of the present invention;
Fig. 1-c illustrate table for a kind of Data Migration store path provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the method for another kind of Data Migration provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 4 is the structural representation of another kind of terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of entity apparatus structural representation of terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of entity apparatus structural representation of mobile phone provided in an embodiment of the present invention.
Specific embodiment
The method and terminal of a kind of Data Migration are embodiments provided, can be imported and the mesh to target terminal The mark corresponding data of terminal environments level of security, so as to ensureing secure user data, and then improve Consumer's Experience.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, is explicitly described to the technical scheme in the embodiment of the present invention, it is clear that described embodiment is the present invention one The embodiment divided, rather than the embodiment of whole.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under the premise of creative work, should all belong to the scope of protection of the invention.
Term " first ", " second " and " the 3rd " occurred in description of the invention, claims and accompanying drawing etc. is to use In the different objects of difference, and it is not intended to describe specific order.Additionally, term " comprising " and " having " and they are any Deformation, it is intended that cover non-exclusive including.For example contain process, method, system, the product of series of steps or unit Or equipment is not limited to the step of listing or unit, but alternatively also include the step of not listing or unit, or can Selection of land also includes other steps intrinsic for these processes, method, product or equipment or unit.
A kind of method of Data Migration is disclosed in one embodiment of the invention, and methods described includes:First terminal The running environment feedback of the information that second terminal sends is received, wherein, data to be transmitted is included in the running environment feedback of the information Mark;The first terminal determines target store path;The first terminal obtains depositing under the target store path The mark of storage data;The first terminal is matched the mark of the data to be transmitted with true with the mark of data storage The fixed mark that the match is successful;The first terminal is standby by the data under the corresponding target store path of mark that the match is successful Part is to predeterminable area.
Fig. 1-a are referred to, Fig. 1-a are a kind of methods of Data Migration that one embodiment of the invention is provided.Wherein, as schemed Shown in 1-a, a kind of method of Data Migration that one embodiment of the present of invention is provided includes herein below:
S101, first terminal receive the running environment feedback of the information that second terminal sends, the running environment feedback of the information Include the running environment information of the second terminal;
Wherein, the first terminal and the second terminal can be smart mobile phone, panel computer, intelligent wearable equipment Deng electronic equipment.
Wherein it is possible to be understood by, before first terminal receives the running environment feedback of the information that second terminal sends, the One terminal can be set up with second terminal and be connected, and send data transfer request to second terminal;Second terminal receives first After the data transfer request that terminal sends, to first terminal the running environment information of second terminal is fed back.
Wherein, as shown in Fig. 1-b, first terminal and second terminal can be interacted by LAN, or led to Cross wide area network to interact.
S102, the first terminal determine the safety of the second terminal according to the running environment information of the second terminal Rank;
Wherein, the level of security includes confidence levels and insincere rank;
, wherein it is desired to, it is noted that the running environment information of the second terminal includes antivirus software in preset time period Scan report;
It is understood that preset time period can be even one week three days or five days.
It is understood that at least include in the scan report of antivirus software whether comprising virus in the second terminal, should Viral whether cleaned, patch of second terminal renewal whether in need etc..
Specifically, the first terminal analyzes the scan report to determine the second terminal with the presence or absence of virus;If The second terminal is the presence of virus, and the level of security of the second terminal is set to insincere rank by the first terminal; If conversely, the second terminal is not the presence of virus, the first terminal is set to the level of security of the second terminal can Letter rank.
Optionally, in addition, if not including virus in second terminal, but there is the patch not updated, although this When second terminal level of security be confidence levels, but user had better be reminded to carry out patch renewal, with prevent hacker lead to System vulnerability is crossed by the virus implantation second terminal.
Specifically, the first terminal analysis scan report whether there is what is do not updated to determine the second terminal Patch;If there is the patch not updated in the second terminal, the first terminal issues the user with two terminals described in renewal the Prompting.Wherein, the mode of prompting, can be word prompting, voice reminder, or vibration reminding etc..
S103, the first terminal determine the data corresponding with the level of security;
Wherein it is possible to be understood by, if the level of security of second terminal is insincere rank, then now cannot send out Private data is sent, to prevent private data leakage;, whereas if the level of security of second terminal is confidence levels, then explanation The running environment of second terminal is safe, now can just send all data waiting for transmission.
Specifically, if the level of security of the second terminal is insincere rank, the number to be migrated that user is chosen Determine private data and non-private data according to being analyzed;Wherein, the private data includes the account information of the user; The non-private data is set into data corresponding with the insincere rank.
For example, first terminal can issue the user with prompting, so that the type of user's selection private data, first The type of the private data that terminal is selected according to user generates private data list.As shown in fig 1-c, private data in the list Type include account, address list information, short message, video information etc..
S104, the first terminal to the second terminal sends the data corresponding with the level of security.
If it is understood that the level of security of second terminal is insincere rank, then first terminal is just to second Terminal sends non-private data;
If in addition, the level of security of the second terminal is insincere rank, the first terminal is to the second terminal Virus treated request is sent so that the second terminal is killed virus according to virus treated request to the second terminal; After the second terminal antivirus is finished, the processed information of a virus can be fed back to the first terminal;If described first When terminal receives the viral processed information of second terminal feedback, the first terminal to the second terminal sends The private data.
As can be seen that in the scheme of the embodiment of the present invention, first terminal receives the running environment information that second terminal sends Feedback, the running environment feedback of the information includes the running environment information of the second terminal;The first terminal is according to institute The running environment information for stating second terminal determines the level of security of the second terminal;Wherein, the level of security includes credible Rank and insincere rank;The first terminal determines the data corresponding with the level of security;The first terminal is to institute State second terminal and send the data corresponding with the level of security.It is hereby understood that by implementing the technical side that the present invention is provided Case, can import the data corresponding with the target terminal Environmental security rank to target terminal, so as to ensure number of users According to security, and then improve Consumer's Experience.
Fig. 2 is referred to, Fig. 2 is a kind of method of Data Migration that one embodiment of the invention is provided.Wherein, such as Fig. 2 institutes Show, a kind of method of Data Migration that one embodiment of the present of invention is provided includes herein below:
S201, first terminal receive the running environment feedback of the information that second terminal sends;
The running environment feedback of the information includes the running environment information of the second terminal;
Wherein, the first terminal and the second terminal can be smart mobile phone, panel computer, intelligent wearable equipment Deng electronic equipment.
Wherein, the running environment information of the second terminal includes the scan report of antivirus software in preset time period;
S202, the first terminal analyze the scan report to determine the second terminal with the presence or absence of virus;
If S203, the second terminal are the presence of virus, the first terminal sets the level of security of the second terminal It is set to insincere rank;
If it is understood that the second terminal is not the presence of virus, the first terminal is by the second terminal Level of security is set to confidence levels.
If the level of security of S204, the second terminal is insincere rank, the data to be migrated chosen to user It is analyzed to determine private data and non-private data;
Wherein, the private data includes the account information of the user;
S205, the non-private data is set into data corresponding with the insincere rank;
S206, the first terminal to the second terminal sends the data corresponding with the level of security;
If the level of security of S207, the second terminal is insincere rank, the first terminal is to the second terminal Virus treated request is sent so that the second terminal is killed virus according to virus treated request to the second terminal;
If S208, the first terminal receive the viral processed information of second terminal feedback, described the One terminal to the second terminal sends the private data;
S209, the first terminal analyze the scan report to determine the second terminal with the presence or absence of the benefit not updated Fourth;
If there is the patch not updated in S210, the second terminal, the first terminal issues the user with renewal institute State the prompting of two terminals.
As can be seen that having expanded the step reminded second terminal cleaning virus and update patch in the scheme of the embodiment of the present invention Suddenly, so that the running environment of second terminal is safer, so as to ensure the safety of private data.
Fig. 3 is referred to, Fig. 3 is a kind of structural representation of terminal that one embodiment of the present of invention is provided.Wherein, as schemed Shown in 3, a kind of terminal 300 that one embodiment of the present of invention is provided, wherein, the terminal can be for smart mobile phone, flat board electricity The electronic equipments such as brain, intelligent wearable equipment.The terminal 300 includes that receiving unit 301, the first determining unit 302, second determine Unit 303 and transmitting element 304.
Receiving unit 301, for receiving the running environment feedback of the information of second terminal transmission, the running environment information is anti- Feedback includes the running environment information of the second terminal;
First determining unit 302, for the running environment information according to the second terminal second terminal is determined Level of security;Wherein, the level of security includes confidence levels and insincere rank;
Second determining unit 303, is additionally operable to determine the data corresponding with the level of security;
Transmitting element 304, for sending the data corresponding with the level of security to the second terminal.
Wherein, receiving unit 301, the first determining unit 302, the second determining unit 303 and transmitting element 304 can be used In the method in embodiment 1 described in step S101 to S104 is performed, description of the detailed in Example 1 to methods described is specifically described, Will not be described here.
Fig. 4 is referred to, Fig. 4 is a kind of structural representation of terminal that one embodiment of the present of invention is provided.Wherein, as schemed Shown in 4, another kind of terminal 400 that one embodiment of the present of invention is provided, wherein, the terminal can be for smart mobile phone, flat board The electronic equipments such as computer, intelligent wearable equipment.The terminal 400 includes that receiving unit 401, the first determining unit 402, second are true Order unit 403, transmitting element 404, analytic unit 405 and reminding unit 406;
Receiving unit 401, for receiving the running environment feedback of the information of second terminal transmission, the running environment information is anti- Feedback includes the running environment information of the second terminal;
First determining unit 402, for the running environment information according to the second terminal second terminal is determined Level of security;Wherein, the level of security includes confidence levels and insincere rank;
Specifically, the running environment information of the second terminal includes the scan report of antivirus software in preset time period;
First determining unit 402 includes that the first analysis subelement and first arranges subelement;
The first analysis subelement, for analyzing the scan report to determine the second terminal with the presence or absence of disease Poison;
Described first arranges subelement, if being the presence of virus for the second terminal, by the safety of the second terminal Rank is set to insincere rank.
Second determining unit 403, is additionally operable to determine the data corresponding with the level of security;
Specifically, the second determining unit 403 includes that the second analysis subelement and second arranges subelement;
The second analysis subelement, if the level of security for the second terminal is insincere rank, to user The data to be migrated chosen are analyzed to determine private data and non-private data;Wherein, the private data includes institute State the account information of user;
Described second arranges subelement, for the non-private data to be set into number corresponding with the insincere rank According to.
Transmitting element 404, for sending the data corresponding with the level of security to the second terminal.
Specifically, transmitting element 404, if the level of security for the second terminal is insincere rank, to described the Two terminals send virus treated request so that the second terminal is entered according to virus treated request to the second terminal Row antivirus;If when being additionally operable to the first terminal and receiving the viral processed information of second terminal feedback, to described Second terminal sends the private data.
Analytic unit 405, for analyzing the scan report to determine the second terminal with the presence or absence of the benefit not updated Fourth;
Reminding unit 406, if for there is the patch not updated in the second terminal, issuing the user with described in renewal the The prompting of two terminals.
Wherein, receiving unit 401, the first determining unit 402, the second determining unit 403, transmitting element 404 and analysis Unit 405 can be used for performing the method in embodiment 2 described in step S201 to S210, specifically describe 2 pairs of institutes of detailed in Example The description of method is stated, be will not be described here.
Fig. 5 is referred to, in another embodiment of the present invention, there is provided a kind of terminal.The terminal 500 includes CPU501, memory 502, bus 503.Wherein, the terminal 500 can be smart mobile phone, panel computer, Intelligent worn device etc. Electronic equipment with call function.
Wherein, CPU501 performs the program being stored in advance in memory 502, and the implementation procedure is specifically included:
The running environment feedback of the information that second terminal sends is received, the running environment feedback of the information includes described second The running environment information of terminal;
The level of security of the second terminal is determined according to the running environment information of the second terminal;Wherein, the peace Full rank includes confidence levels and insincere rank;
It is determined that the data corresponding with the level of security;
The data corresponding with the level of security are sent to the second terminal.
Optionally, the running environment information of the second terminal includes the scan report of antivirus software in preset time period; Determine that the level of security of the second terminal includes according to the running environment information of the second terminal:
Analyze the scan report to determine the second terminal with the presence or absence of virus;
If the second terminal is the presence of virus, the level of security of the second terminal is set into insincere rank.
Optionally, the first terminal determines the data corresponding with the level of security, including:
If the level of security of the second terminal is insincere rank, the data to be migrated chosen to user are carried out point Analyse to determine private data and non-private data;Wherein, the private data includes the account information of the user;
The non-private data is set into data corresponding with the insincere rank.
Optionally, the implementation procedure also includes:
If the level of security of the second terminal is insincere rank, the first terminal to the second terminal sends disease Poison processes request so that the second terminal is killed virus according to virus treated request to the second terminal;
If the first terminal receives the viral processed information of second terminal feedback, the first terminal The private data is sent to the second terminal.
Optionally, the implementation procedure also includes:
The first terminal analyzes the scan report to determine the second terminal with the presence or absence of the patch not updated;
If there is the patch not updated in the second terminal, the first terminal issues the user with described in renewal the two eventually The prompting at end.
As can be seen that in the scheme of the embodiment of the present invention, first terminal receives the running environment information that second terminal sends Feedback, the running environment feedback of the information includes the running environment information of the second terminal;The first terminal is according to institute The running environment information for stating second terminal determines the level of security of the second terminal;Wherein, the level of security includes credible Rank and insincere rank;The first terminal determines the data corresponding with the level of security;The first terminal is to institute State second terminal and send the data corresponding with the level of security.It is hereby understood that by implementing the technical side that the present invention is provided Case, can import the data corresponding with the target terminal Environmental security rank to target terminal, so as to ensure number of users According to security, and then improve Consumer's Experience.
Fig. 6 is referred to, Fig. 6 is the frame of the part-structure of the mobile phone of the terminal correlation that one embodiment of the present of invention is provided Figure.With reference to Fig. 6, mobile phone includes:It is radio frequency (Radio Frequency, RF) circuit 610, memory 620, input block 630, aobvious Show unit 640, sensor 650, voicefrequency circuit 660, Wireless Fidelity (Wireless Fidelity, WiFi) module 670, process The part such as device 680 and power supply 690.It will be understood by those skilled in the art that the handset structure illustrated in Fig. 6 do not constitute it is right The restriction of mobile phone, can include part more more or less of than diagram, or combine some parts, or different part cloth Put.
Each component parts of mobile phone is specifically introduced with reference to Fig. 6:
RF circuits 610 can be used for the reception and transmission of information.Generally, RF circuits 610 include but is not limited to antenna, at least one Individual amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 610 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use arbitrary communication Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division it is many Location (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 620 can be used to store software program and module, and processor 680 is stored in memory 620 by operation Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 620 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as Data Migration function, touch control operation detection function etc.) etc.;Storage data field can be stored to be created according to using for mobile phone Data (such as store path table data etc.) built etc..Additionally, memory 620 can include high-speed random access memory, also Nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state storages can be included Device.
Input block 630 can be used for the numeral or character information of receives input, and produce with the user of mobile phone arrange with And the key signals input that function control is relevant.Specifically, input block 630 may include that fingerprint module 631 and other inputs set Standby 632.Fingerprint module 631, can gather user's finger print data thereon.Optionally, fingerprint module 631 may include that optical profile type refers to Line module, capacitance type fingerprint module and RF-type fingerprint module.So that fingerprint module 631 is capacitance type fingerprint module as an example, tool Body includes induction electrode (n1 abnormal induction electrode and n2 normal induction electrode) and the signal being connected with the induction electrode Process circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.).Except fingerprint module 631, input block 630 can also include other input equipments 632.Specifically, other input equipments 632 can include but is not limited to physical keyboard, One or more in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 640 can be used for show by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 640 may include display screen 641, optionally, can adopt liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Display screen 641.Although in figure 6, fingerprint module 631 and display screen 641 are realizing the defeated of mobile phone as two independent parts Enter and input function, but it is in some embodiments it is possible to fingerprint module 631 and display screen 641 is integrated and realize mobile phone Input and output function.
Mobile phone may also include at least one sensor 650, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjusting the brightness of display screen 641, proximity transducer can when mobile phone is moved in one's ear, close display screen 641 and/or Backlight.Used as one kind of motion sensor, (generally three axles) acceleration is big in the detectable all directions of accelerometer sensor It is little, size and the direction of gravity is can detect that when static, can be used to recognize application (such as horizontal/vertical screen switching, the phase of mobile phone attitude Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Can also configure as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be described here.
Voicefrequency circuit 660, loudspeaker 661, microphone 662 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data for receiving conversion can be transferred to loudspeaker 761 by road 660, and by loudspeaker 661 sound is converted to Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, is turned after being received by voicefrequency circuit 660 Be changed to voice data, then after voice data output processor 680 is processed, Jing RF circuits 610 to be sent to such as another mobile phone, Or voice data is exported to memory 620 so as to further process.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 670 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 6 shows WiFi module 670, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 680 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module that are stored in memory 620, and call and be stored in memory 620 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 680 can be wrapped Include one or more processing units;Preferably, processor 680 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Mobile phone also includes the power supply 690 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system is logically contiguous with processor 680, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be described here.
In embodiment shown in aforementioned Fig. 1, Fig. 2, each step method flow process can be based on the structure of the mobile phone and realize.
In embodiment shown in aforementioned Fig. 3, Fig. 4, each unit function can be based on the structure of the mobile phone and realize.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, without the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way Realize.For example, device embodiment described above is only schematic, such as division of described unit, is only one kind Division of logic function, can there is an other dividing mode when actually realizing, such as multiple units or component can with reference to or can To be integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or discussed each other Coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication connection by some interfaces, device or unit, Can be electrical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can according to the actual needs be selected to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, during a computer read/write memory medium can be stored in.Based on such understanding, technical scheme is substantially The part for contributing to prior art in other words or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or network equipment etc.) perform the whole of each embodiment methods described of the invention or Part steps.And aforesaid storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, above example only to illustrate technical scheme, rather than a limitation;Although with reference to front State embodiment to be described in detail the present invention, it will be understood by those within the art that:It still can be to front State the technical scheme described in each embodiment to modify, or equivalent is carried out to which part technical characteristic;And these Modification is replaced, and does not make the scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution.

Claims (11)

1. a kind of method of Data Migration, it is characterised in that methods described includes:
First terminal receives the running environment feedback of the information that second terminal sends, and the running environment feedback of the information includes described The running environment information of second terminal;
The first terminal determines the level of security of the second terminal according to the running environment information of the second terminal;Its In, the level of security includes confidence levels and insincere rank;
The first terminal determines the data corresponding with the level of security;
The first terminal to the second terminal sends the data corresponding with the level of security.
2. method according to claim 1, it is characterised in that when the running environment information of the second terminal includes default Between in section antivirus software scan report;
The first terminal determines that the level of security of the second terminal includes according to the running environment information of the second terminal:
The first terminal analyzes the scan report to determine the second terminal with the presence or absence of virus;
If the second terminal is the presence of virus, the first terminal is set to the level of security of the second terminal insincere Rank.
3. method according to claim 2, it is characterised in that the first terminal determines corresponding with the level of security Data, including:
If the level of security of the second terminal be insincere rank, the data to be migrated that user is chosen be analyzed with Determine private data and non-private data;Wherein, the private data includes the account information of the user;
The non-private data is set into data corresponding with the insincere rank.
4. method according to claim 3, it is characterised in that methods described also includes:
If the level of security of the second terminal is insincere rank, the first terminal to the second terminal is sent at virus Reason request is so that the second terminal is killed virus according to virus treated request to the second terminal;
If the first terminal receives the viral processed information of second terminal feedback, the first terminal is to institute State second terminal and send the private data.
5. according to the arbitrary described method of claim 2 to 4, it is characterised in that methods described also includes:
The first terminal analyzes the scan report to determine the second terminal with the presence or absence of the patch not updated;
If there is the patch not updated in the second terminal, the first terminal is issued the user with and updates two terminals described in the Remind.
6. a kind of terminal, it is characterised in that the terminal includes:
Receiving unit, for receiving the running environment feedback of the information of second terminal transmission, wraps in the running environment feedback of the information Include the running environment information of the second terminal;
First determining unit, for determining the safe level of the second terminal according to the running environment information of the second terminal Not;Wherein, the level of security includes confidence levels and insincere rank;
Second determining unit, is additionally operable to determine the data corresponding with the level of security;
Transmitting element, for sending the data corresponding with the level of security to the second terminal.
7. terminal according to claim 6, it is characterised in that when the running environment information of the second terminal includes default Between in section antivirus software scan report;
First determining unit includes that the first analysis subelement and first arranges subelement;
The first analysis subelement, for analyzing the scan report to determine the second terminal with the presence or absence of virus;
Described first arranges subelement, if being the presence of virus for the second terminal, by the level of security of the second terminal It is set to insincere rank.
8. terminal according to claim 7, it is characterised in that second determining unit include the second analysis subelement and Second arranges subelement;
The second analysis subelement, if the level of security for the second terminal is insincere rank, chooses to user Data to be migrated be analyzed to determine private data and non-private data;Wherein, the private data includes the use The account information at family;
Described second arranges subelement, for the non-private data to be set into data corresponding with the insincere rank.
9. terminal according to claim 8, it is characterised in that
The transmitting element, if the level of security for the second terminal is insincere rank, sends to the second terminal Virus treated is asked so that the second terminal is killed virus according to virus treated request to the second terminal;
The transmitting element, if being additionally operable to the viral processed information that the first terminal receives the second terminal feedback When, send the private data to the second terminal.
10. according to the arbitrary described terminal of claim 7 to 9, it is characterised in that the terminal also includes analytic unit and prompting Unit;
The analytic unit, for analyzing the scan report to determine the second terminal with the presence or absence of the patch not updated;
The reminding unit, if for there is the patch not updated in the second terminal, issuing the user with two described in renewal the The prompting of terminal.
11. a kind of terminals, it is characterised in that include:
Be stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs if claim 1 is to right Require the method described in 5 any one.
CN201610826851.0A 2016-09-14 2016-09-14 Data migration method and terminal Pending CN106657214A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610826851.0A CN106657214A (en) 2016-09-14 2016-09-14 Data migration method and terminal
PCT/CN2017/095055 WO2018049936A2 (en) 2016-09-14 2017-07-28 Data migration method and terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610826851.0A CN106657214A (en) 2016-09-14 2016-09-14 Data migration method and terminal

Publications (1)

Publication Number Publication Date
CN106657214A true CN106657214A (en) 2017-05-10

Family

ID=58852496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610826851.0A Pending CN106657214A (en) 2016-09-14 2016-09-14 Data migration method and terminal

Country Status (2)

Country Link
CN (1) CN106657214A (en)
WO (1) WO2018049936A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018049936A3 (en) * 2016-09-14 2018-05-03 广东欧珀移动通信有限公司 Data migration method and terminals
CN111597533A (en) * 2020-04-27 2020-08-28 维沃移动通信有限公司 Information display method and device and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765605A (en) * 2020-12-31 2021-05-07 浙江中控技术股份有限公司 Data processing method and related equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110314279A1 (en) * 2010-06-21 2011-12-22 Microsoft Corporation Single-Use Authentication Methods for Accessing Encrypted Data
CN103886263A (en) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 Method and system for protecting data in mobile terminal
CN105577662A (en) * 2015-12-22 2016-05-11 深圳前海微众银行股份有限公司 Terminal environmental security control method and server

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4613094B2 (en) * 2005-05-13 2011-01-12 パナソニック株式会社 Communication terminal and communication method
DE102011080467A1 (en) * 2011-08-04 2013-02-07 Siemens Aktiengesellschaft Access control for data or applications of a network
CN105577730A (en) * 2014-10-24 2016-05-11 腾讯数码(深圳)有限公司 Data transfer method and device
CN105188015A (en) * 2015-08-07 2015-12-23 上海斐讯数据通信技术有限公司 Mobile terminal private data migration backup method and mobile terminal
CN106657214A (en) * 2016-09-14 2017-05-10 广东欧珀移动通信有限公司 Data migration method and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110314279A1 (en) * 2010-06-21 2011-12-22 Microsoft Corporation Single-Use Authentication Methods for Accessing Encrypted Data
CN103886263A (en) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 Method and system for protecting data in mobile terminal
CN105577662A (en) * 2015-12-22 2016-05-11 深圳前海微众银行股份有限公司 Terminal environmental security control method and server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018049936A3 (en) * 2016-09-14 2018-05-03 广东欧珀移动通信有限公司 Data migration method and terminals
CN111597533A (en) * 2020-04-27 2020-08-28 维沃移动通信有限公司 Information display method and device and electronic equipment

Also Published As

Publication number Publication date
WO2018049936A2 (en) 2018-03-22
WO2018049936A3 (en) 2018-05-03

Similar Documents

Publication Publication Date Title
CN106446111B (en) Data migration method and terminal
CN106412033A (en) Data migration method and terminal
CN104407804A (en) Screen capturing method and screen capturing device as well as electronic device
CN108255683A (en) The method and terminal of message notifying in terminal
CN106200970A (en) A kind of method of split screen display available and terminal
CN104618223A (en) Information recommendation management method, device and system
CN106714333A (en) Data migration method and terminal
CN106648455A (en) Data migration method and mobile terminal
CN106569916A (en) Data backup method and mobile terminal
CN106534288A (en) Data transmission method and mobile terminal
CN106657214A (en) Data migration method and terminal
CN104133693B (en) Installment state detection method, device and terminal
CN105868598A (en) Method and terminal for fingerprint unlocking
CN106656978A (en) Account login method and server
CN106453571A (en) Data migration method and terminal
CN104391629A (en) Method for sending message in orientation manner, method for displaying message, server and terminal
CN106529256A (en) Terminal unlocking method and mobile terminal
CN106487878A (en) A kind of method of Data Migration and terminal
CN106792583B (en) Multimedia message sending method, terminal and computer readable storage medium
CN106330684B (en) A kind of method and terminal of synchronizing information
CN106254630A (en) A kind of method received calls and terminal
CN106411864A (en) Information synchronization method, and terminals
CN106527980A (en) Data migration method and terminal
CN106686704A (en) Terminal monitoring method and mobile terminal
CN106357767B (en) The method and server of a kind of synchronizing information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510

RJ01 Rejection of invention patent application after publication