CN104507080A - File processing method and terminal - Google Patents

File processing method and terminal Download PDF

Info

Publication number
CN104507080A
CN104507080A CN201410663154.9A CN201410663154A CN104507080A CN 104507080 A CN104507080 A CN 104507080A CN 201410663154 A CN201410663154 A CN 201410663154A CN 104507080 A CN104507080 A CN 104507080A
Authority
CN
China
Prior art keywords
terminal
target terminal
identification information
source terminal
file destination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410663154.9A
Other languages
Chinese (zh)
Other versions
CN104507080B (en
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810134907.5A priority Critical patent/CN108183972B/en
Priority to CN201410663154.9A priority patent/CN104507080B/en
Publication of CN104507080A publication Critical patent/CN104507080A/en
Application granted granted Critical
Publication of CN104507080B publication Critical patent/CN104507080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention discloses a file processing method. The file processing method comprises the following steps: when a source terminal needs to transmit a target file to a target terminal, the source terminal acquires the identification information of the target terminal; the source terminal identifies whether the target terminal is a legal terminal or not according to the identification information; if the target terminal is a legal terminal, the source terminal encrypts the target file to be transmitted according to the identification information; and the source terminal transmits the encrypted target file to the target terminal. The embodiment of the invention further discloses a terminal. Through adoption of the embodiment of the invention, the source terminal automatically sets a key according to the identification information of the target terminal if the target terminal is a legal terminal identified by the source terminal, so that operation is easy.

Description

A kind of document handling method and terminal
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of document handling method and terminal.
Background technology
Along with the development of the communication technology, the transmission of information data is more and more convenient, and the approach of people's obtaining information is also more and more wider, such as, carries out file transfer etc. based on bluetooth or infrared mode.Usually, for avoiding the leakage of the significant data such as trade secret, individual privacy, user can be encrypted the data file that will transmit when transmission data file.
During existing method employing cipher mode transfer files, need transmit leg and recipient to appoint key in advance, manually this key of input encrypts and decrypts, and complex operation, affects Consumer's Experience.
Summary of the invention
The embodiment of the present invention provides a kind of document handling method and terminal, if target terminal is the legal terminal of source terminal mark, source terminal is according to the identification information Lookup protocol key of target terminal, simple to operate.
First aspect, the embodiment of the present invention provides a kind of document handling method, comprising:
Source terminal, for during to target terminal transmission objectives file, obtains the identification information of described target terminal;
Whether described source terminal target terminal according to described identification information identification is legal terminal;
If so, described source terminal is encrypted the file destination that tendency to develop is defeated according to described identification information;
Described source terminal sends the file destination encrypted to described target terminal.
In conjunction with first aspect, in the first possible implementation of first aspect, described identification information comprises phone number or instant messaging account.
In conjunction with the first possible implementation of first aspect, in the implementation that the second of first aspect is possible, if described identification information is phone number, whether described source terminal target terminal according to described identification information identification is legal terminal, comprising:
Associated person information corresponding to this phone number whether is there is in described source terminal inquiry local address book;
If exist, it is legal terminal that described source terminal identifies described target terminal;
If do not exist, it is not legal terminal that described source terminal identifies described target terminal.
In conjunction with the first possible implementation of first aspect, in the third possible implementation of first aspect, if described identification information is instant messaging account, whether described source terminal target terminal according to described identification information identification is legal terminal, comprising:
Described source terminal inquires about in the friend relation chain of described source terminal whether there is friend information corresponding to this instant messaging account according to described instant messaging account;
If exist, it is legal terminal that described source terminal identifies described target terminal;
If do not exist, it is not legal terminal that described source terminal identifies described target terminal.
In conjunction with the second or the third possible implementation of first aspect, first aspect, in the 4th kind of possible implementation of first aspect, described source terminal is after according to described identification information identification, whether target terminal is legal terminal, and described method also comprises:
If it is not legal terminal that described source terminal identifies described target terminal, export information, whether confirm to point out user to transmit.
In conjunction with the 4th kind of possible implementation of first aspect, in the 5th kind of possible implementation of first aspect, after described output information, described method also comprises:
If receive the confirmation the instruction of transmission, described source terminal is encrypted the file destination that tendency to develop is defeated according to preset-key;
Described source terminal sends the file destination and described preset-key encrypted to described target terminal.
Second aspect, the embodiment of the present invention provides a kind of document handling method, comprising:
During the file destination that target terminal needs the tendency to develop of reception source terminal defeated, obtain the identification information of described target terminal;
Described target terminal sends described identification information to described source terminal, is encrypted according to this identification information to make described source terminal to described file destination;
Described target terminal receives the described file destination that described source terminal sends;
If described target terminal is the legal terminal of described source terminal mark, described target terminal is decrypted described file destination according to described identification information.
In conjunction with second aspect, in the first possible implementation of second aspect, described method also comprises:
If described target terminal is not the legal terminal of described source terminal mark, receive file destination and the preset-key of described source terminal transmission;
According to described preset-key, described file destination is decrypted.
In conjunction with the first possible implementation of second aspect or second aspect, in the third possible implementation of second aspect, described identification information comprises phone number or instant messaging account.
The third aspect, the embodiment of the present invention provides a kind of terminal, comprising:
First acquisition module, for source terminal for during to target terminal transmission objectives file, obtains the identification information of described target terminal;
Whether identification module is legal terminal for target terminal according to described identification information identification;
Encrypting module, if be legal terminal for described target terminal, is encrypted the file destination that tendency to develop is defeated according to described identification information;
First sending module, for sending the file destination encrypted to described target terminal.
In conjunction with the third aspect, in the first possible implementation of the third aspect, described identification information comprises phone number or instant messaging account.
In conjunction with the first possible implementation of the third aspect, in the implementation that the second of the third aspect is possible, if described identification information is phone number, described identification module specifically for:
Associated person information corresponding to this phone number whether is there is in inquiry local address book;
If exist, identifying described target terminal is legal terminal;
If do not exist, identifying described target terminal is not legal terminal.
In conjunction with the first possible implementation of the third aspect, in the 4th kind of possible implementation of the third aspect, if described identification information is instant messaging account, described identification module specifically for:
Inquire about in the friend relation chain of described source terminal whether there is friend information corresponding to this instant messaging account according to described instant messaging account;
If exist, identifying described target terminal is legal terminal;
If do not exist, identifying described target terminal is not legal terminal.
In conjunction with the second or the third possible implementation of the third aspect, the third aspect, in the 5th kind of possible implementation of the third aspect, described terminal also comprises:
Whether output module, if be not legal terminal for described target terminal, exports information, confirm to transmit to point out user.
In conjunction with the 4th kind of possible implementation of the third aspect, in the 5th kind of possible implementation of the third aspect, described encrypting module, if also for receiving the confirmation the instruction of transmission, be encrypted the file destination that tendency to develop is defeated according to preset-key;
Described first sending module, also for sending the file destination and described preset-key encrypted to described target terminal.
Fourth aspect, the embodiment of the present invention provides a kind of terminal, comprising:
Second acquisition module, when needing to receive the defeated file destination of source terminal tendency to develop for target terminal, obtains the identification information of described target terminal;
Second sending module, for sending described identification information to described source terminal, is encrypted described file destination according to this identification information to make described source terminal;
Receiver module, for receiving the described file destination that described source terminal sends;
Deciphering module, if be the legal terminal that described source terminal identifies for described target terminal, described target terminal is decrypted described file destination according to described identification information.
In conjunction with fourth aspect, in the first possible implementation of fourth aspect, described receiver module, if the legal terminal for described target terminal not being also described source terminal mark, receives file destination and the preset-key of the transmission of described source terminal;
Described deciphering module, also for being decrypted described file destination according to described preset-key.
In conjunction with the first possible implementation of fourth aspect or fourth aspect, in the implementation that the second of fourth aspect is possible, described identification information comprises phone number or instant messaging account.
Implement the embodiment of the present invention, when source terminal needs to target terminal transmission objectives file, source terminal obtains the identification information of target terminal; And whether be legal terminal according to this target terminal of identification information identification of accessed target terminal; If so, then according to this identification information, the file destination that tendency to develop is defeated is encrypted; The file destination encrypted is sent to target terminal.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, not only can fail safe in safeguard file transmitting procedure, and simple to operate.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a kind of document handling method that the embodiment of the present invention provides;
Fig. 2 is another schematic flow sheet of a kind of document handling method that the embodiment of the present invention provides;
Fig. 3 is the another schematic flow sheet of a kind of document handling method that the embodiment of the present invention provides;
Fig. 4 is a schematic flow sheet again of a kind of document handling method that the embodiment of the present invention provides;
Fig. 5 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 6 is another structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 7 is the another structural representation of a kind of terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Embodiments provide a kind of document handling method, source terminal and target terminal, when source terminal needs to target terminal transmission objectives file, source terminal obtains the identification information of target terminal; And whether be legal terminal according to this target terminal of identification information identification of accessed target terminal; If so, then according to this identification information, the file destination that tendency to develop is defeated is encrypted; Send the file destination encrypted to target terminal, thus complete the transmission of file destination.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, simple to operate.A kind of document handling method, source terminal and the target terminal that there is provided below in conjunction with accompanying drawing 1-accompanying drawing 7 pairs of embodiment of the present invention describe in detail respectively.
As everyone knows; two terminals are needed during transfer files; for convenience of describing; these two terminals are called " source terminal " and " target terminal " by the embodiment of the present invention; described terminal can be the equipment such as computer, mobile phone, IPAD; the particular type of the embodiment of the present invention to terminal is not restricted, and every equipment can implementing the embodiment of the present invention all belongs to the scope of the required protection of the embodiment of the present invention.A kind of handling process of document handling method is introduced below from " source terminal " side.
Refer to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of document handling method that the embodiment of the present invention provides, and in embodiments of the present invention, the method can comprise the following steps.
S101: source terminal, for during to target terminal transmission objectives file, obtains the identification information of described target terminal.
Due to the existence of internet worm or hacker, in the process of transfer files, the fail safe moment of data file is on the hazard, if personal information or trade secret are leaked out cause irreparable damage by user, therefore, the fail safe of people to data message is more and more paid attention to.Usually, for improving the fail safe of terminal in transfer files process, cipher mode can be adopted to carry out file transfer.The scene of the embodiment of the present invention cryptographically transmission data file is example, can be to carry out file transfer by modes such as bluetooth, infrared or data wires, and concrete, the embodiment of the present invention is not restricted.
In specific implementation, source terminal, for during to target terminal transmission objectives file, obtains the identification information of target terminal.Such as, as a kind of implementation, when source terminal needs to target terminal transmission objectives file, file transfer requests is sent to target terminal, to make target terminal return the identification information of target terminal according to this request, thus source terminal gets the identification information of target terminal.What deserves to be explained is, described identification information can be phone number or the instant messaging account of target terminal, certainly, can also be the out of Memory such as identifier, as long as source terminal can set up certain information associated with target terminal by this identifier all can as this identification information.Concrete, the embodiment of the present invention is not restricted.
S102: whether described source terminal target terminal according to described identification information identification is legal terminal.
After source terminal gets the identification information of target terminal, whether be legal terminal according to accessed identification information identification target terminal, if target terminal is the legal terminal of source terminal mark, then further file destination be encrypted; If target terminal is not the legal terminal of source terminal mark, then can export information, whether prompting user determines to transmit this file destination, thus, improve the fail safe of file in transmitting procedure.
As a kind of example, suppose that identification information is phone number, after source terminal gets the phone number of target terminal, can inquire about in local address book and whether there is associated person information corresponding to this phone number; If exist, then identifying target terminal is legal terminal; If do not exist, then identifying target terminal is not legal terminal.Thus, identify whether this target terminal is legal terminal by the phone number whether storing target terminal in the address list of query source terminal, if there is not the phone number of target terminal in the address list of source terminal, then illustrate potential risks to be there are this target terminal transmission data file to when, thus, export information reminding user and whether confirm transmission objectives file.
As another kind of example, suppose that identification information is instant messaging account, after source terminal gets the instant messaging account of target terminal, whether can there is friend information corresponding to this instant messaging account in the friend relation chain of query source terminal; If exist, then identifying target terminal is legal terminal; If do not exist, then identifying target terminal is not legal terminal.Thus, by the instant messaging account of source terminal and the instant messaging account of target terminal, determine whether target terminal is the legal terminal that source terminal identifies.
What deserves to be explained is, if identification information is other identifier, then similar process can be carried out, source terminal establishes friend relation chain for identifier in advance, after getting the identifier of target terminal, whether the identifier of query aim terminal is present in this friend relation chain, if exist, then identifying target terminal is legal terminal; If do not exist, then identifying target terminal is not legal terminal.Certainly, the method whether source terminal is legal terminal according to identification information identification target terminal can also be other, and concrete, the embodiment of the present invention is not restricted, and these are only example.
S103: if so, described source terminal is encrypted the file destination that tendency to develop is defeated according to described identification information.
The legal terminal that target terminal is source terminal mark if identify, then, source terminal is encrypted the file destination that tendency to develop is defeated according to the identification information of target terminal.What deserves to be explained is, in specific implementation, can be directly using the Crypted password of identification information as file destination; Also can be using identification information as key, adopt cryptographic algorithm to arrange Crypted password according to this key, concrete, the embodiment of the present invention be restricted.According to the former encryption, target terminal is directly decrypted file destination according to identification information; If the latter, then after target terminal can adopt the cryptographic algorithm corresponding with source terminal to obtain original Crypted password according to the identification information of self, then this Crypted password is adopted to be decrypted file destination.Therefore, the latter's fail safe is higher, and the latter can be adopted when user is transmitted for very important data file to be encrypted.
S104: described source terminal sends the file destination encrypted to described target terminal.
Source terminal sends the file destination encrypted after carrying out secret to the file destination that tendency to develop is defeated to target terminal.Target terminal receives the file destination that source terminal sends, and is decrypted received file destination according to the identification information of target terminal self, thus, safe, reliably to complete data file transmission, and simple to operate.
In the document handling method that the embodiment of the present invention describes, when source terminal needs to target terminal transmission objectives file, source terminal obtains the identification information of target terminal; And whether be legal terminal according to this target terminal of identification information identification of accessed target terminal; If so, then according to this identification information, the file destination that tendency to develop is defeated is encrypted; The file destination encrypted is sent to target terminal.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, not only can fail safe in safeguard file transmitting procedure, and simple to operate.
Refer to Fig. 2, Fig. 2 is another schematic flow sheet of a kind of document handling method that the embodiment of the present invention provides, and in embodiments of the present invention, for mobile phone, the method can comprise the following steps.
S201: source terminal, for during to target terminal transmission objectives file, obtains the phone number of described target terminal.
As a kind of example, source terminal, for during to target terminal transmission objectives file, sends file transfer requests, after receiving this request to make target terminal to target terminal, according to the phone number of this acquisition request target terminal, namely SIM card information is on a target terminal installed.Consider that double-card dual-standby function supported by minority mobile phone, if this target terminal has been installed at least two SIM cards, then obtain the phone number that every SIM card is corresponding, and accessed phone number has been sent to source terminal, thus source terminal gets the phone number of target terminal.
As another kind of example, without the need to the situation of encryption when considering that unessential data file is transmitted, source terminal, for during to target terminal transmission objectives file, sends file transfer requests to target terminal, in specific implementation, this file transfer requests can also carry load mode.Such as, will situation file destination being encrypted to transmission not needed to be called " common transmission ", by needing the situation of encrypted transmission to be called " safety transmits ", in file transfer requests, identifying concrete load mode.Target terminal is resolved the relevant information of carrying in this request, is determined current load mode after receiving the file transfer requests of source terminal transmission; If " safety transmits " mode, then obtain phone number, and accessed phone number sent to source terminal." if common transmission " mode, then automatically can return a confirmation to source terminal, send file destination to target terminal in unencrypted mode to make source terminal.
What deserves to be explained is, consider the situation may not installing SIM card in target terminal, now, target terminal cannot get this information of phone number, then can send the information being similar to NULL to source terminal, after source terminal receives this information, preset password can be adopted to be encrypted file destination, and target terminal adopts preset password to be decrypted, thus, take into full account that the exception in real process uses situation, improve the compatibility of the method.
S202: whether there is associated person information corresponding to this phone number in described source terminal inquiry local address book.
After source terminal receives the phone number that target terminal returns, associated person information corresponding to this phone number whether is there is in inquiry local address book, if exist, then illustrate that target terminal is the legal terminal of source terminal mark, thus, it is legal terminal that source terminal identifies target terminal, and perform step S203, the phone number according to this target terminal is encrypted file destination.
If there is not associated person information corresponding to this phone number in local address book, then illustrate that this target terminal is not the legal terminal of source terminal mark, thus it not legal terminal that source terminal identifies target terminal.Whether, as another kind of implementation, when target terminal is not the legal terminal of source terminal mark, for improving the fail safe of data transmission procedure, can perform step S205, source terminal exports information, confirm to transmit to point out user.
S203: described source terminal is encrypted the file destination that tendency to develop is defeated according to described phone number.
If there is the associated person information that this phone number is corresponding in local address book, illustrate that target terminal is the legal terminal of source terminal mark, therefore, according to phone number, the file destination that tendency to develop is defeated is encrypted.In specific implementation, can be directly using the Crypted password of phone number as file destination; Also can be using phone number as key, adopt cryptographic algorithm to arrange Crypted password according to this key, concrete, the embodiment of the present invention be restricted.According to the former encryption, target terminal is directly decrypted file destination according to phone number; If the latter, then after target terminal can adopt the cryptographic algorithm corresponding with source terminal to obtain original Crypted password according to the phone number of self, then this Crypted password is adopted to be decrypted file destination.Therefore, the latter's fail safe is higher, and the latter can be adopted when user is transmitted for very important data file to be encrypted.
S204: described source terminal sends the file destination encrypted to described target terminal.
Whether S205: export information, confirm to point out user to transmit.
If there is not associated person information corresponding to this phone number in local address book, illustrating that this target terminal is not the legal terminal of source terminal mark, therefore, for ensureing the fail safe of file destination, exporting information, whether confirm to point out user to transmit.Wherein, the mode exporting information can be eject the mode of dialog box, and also can be voice broadcasting modes, concrete, the embodiment of the present invention be restricted.Thus, after user knows the information that source terminal exports, be confirmed whether further really to need to send file destination to this target terminal, if so, then initiate to source terminal the instruction confirming transmission, certainly, also can be after source terminal exports information, if do not receive the instruction of the confirmation transmission that user inputs in preset duration, then automatically initiate the instruction confirming transmission or cancel transmission, indicate source terminal to target terminal transmission or do not transmit file destination.Concrete, the embodiment of the present invention is not restricted.
S206: if receive the confirmation the instruction of transmission, described source terminal is encrypted the file destination that tendency to develop is defeated according to preset-key.
If receive the confirmation the instruction of transmission, illustrate that user expects to transmit file destination to this target terminal, therefore, adopt preset-key to be encrypted the file destination that tendency to develop is defeated.As a kind of implementation, preset-key can be the identifier of the Crypted password of making an appointment, and source terminal and target terminal can determine concrete Crypted password according to this identifier; Also can be the common associated person information of source terminal and target terminal, such as, suppose the phone number all storing its common contact person in the address list of source terminal and target terminal, as boss, so, can using boss as preset-key, the Crypted password that this preset-key is corresponding is the phone number that in address list, boss is corresponding, thus, after target terminal receives file destination, adopt the phone number that in address list, boss is corresponding to be decrypted file destination.
As another kind of example, if receive the confirmation the instruction of transmission, also can automatically the phone number of target terminal be added in local address book, and then, according to this phone number, file destination is encrypted.Concrete, the embodiment of the present invention is not restricted.
S207: described source terminal sends the file destination and described preset-key encrypted to described target terminal.
In specific implementation, if be not carry out according to the identification information of target terminal when source terminal is encrypted file destination, after then file destination being encrypted, do not simply need to target terminal and send the file destination encrypted, and inform target terminal because of the preset-key be encrypted by file destination, after receiving file destination to make target terminal, according to the Crypted password of this preset-key determination file destination, thus the decryption oprerations to file destination can be realized.
In the document handling method that the embodiment of the present invention describes, when source terminal needs to target terminal transmission objectives file, source terminal obtains the identification information of target terminal; And whether be legal terminal according to this target terminal of identification information identification of accessed target terminal; If so, then according to this identification information, the file destination that tendency to develop is defeated is encrypted; The file destination encrypted is sent to target terminal.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, not only can fail safe in safeguard file transmitting procedure, and simple to operate.
Refer to Fig. 3, Fig. 3 is the another schematic flow sheet of a kind of document handling method that the embodiment of the present invention provides, and in embodiments of the present invention, the method can comprise the following steps.
S301: source terminal, for during to target terminal transmission objectives file, obtains the instant messaging account of described target terminal.
Usually, when terminal is run instant communication software, user adopts the account of oneself to log in the terminal of oneself, and therefore, terminal exists the instant messaging account of association.Wherein, MSN can be QQ, micro-letter, microblogging, Fetion, credulity etc., and concrete, the embodiment of the present invention is not restricted.Source terminal is for during to target terminal transmission objectives file, file transfer requests can be sent to target terminal, after receiving this request to make target terminal, according to the instant messaging account that this acquisition request target terminal often uses, and accessed instant messaging account is returned to source terminal.
S302: described source terminal inquires about in the friend relation chain of described source terminal whether there is friend information corresponding to this instant messaging account according to described instant messaging account.
In specific implementation, whether the instant messaging account of query aim terminal is present in the friend relation chain of source terminal, described friend relation chain records the account information of all good friends in the instant messaging account of source terminal, if exist, illustrate that target terminal is legal terminal, thus it is legal terminal that source terminal identifies target terminal, perform step S303, the instant messaging account according to this target terminal is encrypted file destination.
If there is not friend information corresponding to this instant messaging account in the friend relation chain of source terminal, then illustrate that this target terminal is not the legal terminal of source terminal mark, thus it not legal terminal that source terminal identifies target terminal.Whether, as another kind of implementation, when target terminal is not the legal terminal of source terminal mark, for improving the fail safe of data transmission procedure, can perform step S305, source terminal exports information, confirm to transmit to point out user.
S303: described source terminal is encrypted the file destination that tendency to develop is defeated according to described instant messaging account.
If there is the friend information that this instant messaging account is corresponding in the friend relation chain of source terminal, illustrate that target terminal is the legal terminal of source terminal mark, therefore, according to instant messaging account, the file destination that tendency to develop is defeated is encrypted.In specific implementation, can be directly using the Crypted password of instant messaging account as file destination; Also can be using instant messaging account as key, adopt cryptographic algorithm to arrange Crypted password according to this key, concrete, the embodiment of the present invention be restricted.According to the former encryption, target terminal is directly decrypted file destination according to instant messaging account; If the latter, then after target terminal can adopt the cryptographic algorithm corresponding with source terminal to obtain original Crypted password according to the instant messaging account of self, then this Crypted password is adopted to be decrypted file destination.Therefore, the latter's fail safe is higher, and the latter can be adopted when user is transmitted for very important data file to be encrypted.
S304: described source terminal sends the file destination encrypted to described target terminal.
Whether S305: export information, confirm to point out user to transmit.
If there is not friend information corresponding to this instant messaging account in the friend relation chain of source terminal, illustrate that target terminal is not the legal terminal of source terminal mark, therefore, it is not legal terminal that described source terminal identifies described target terminal, for ensureing the fail safe of file destination, export information, whether confirm to point out user to transmit.Wherein, the mode exporting information can be eject the mode of dialog box, and also can be voice broadcasting modes, concrete, the embodiment of the present invention be restricted.Thus, after user knows the information that source terminal exports, be confirmed whether further really to need to send file destination to this target terminal, if so, then initiate to source terminal the instruction confirming transmission, certainly, also can be after source terminal exports information, if do not receive the instruction of the confirmation transmission that user inputs in preset duration, then automatically initiate the instruction confirming transmission or cancel transmission, indicate source terminal to target terminal transmission or do not transmit file destination.Concrete, the embodiment of the present invention is not restricted.
S306: if receive the confirmation the instruction of transmission, described source terminal is encrypted the file destination that tendency to develop is defeated according to preset-key.
If receive the confirmation the instruction of transmission, illustrate that user expects to transmit file destination to this target terminal, therefore, adopt preset-key to be encrypted the file destination that tendency to develop is defeated.As a kind of implementation, preset-key can be the identifier of the Crypted password of making an appointment, and source terminal and target terminal can determine concrete Crypted password according to this identifier; Also can be the common friend information of source terminal and target terminal, such as, suppose all to store its common friend information in the friend information that the instant messaging account of source terminal and target terminal is corresponding, as " Zhang San ", so, can using " Zhang San " as preset-key, the Crypted password that this preset-key is corresponding is the instant messaging account of " Zhang San " correspondence, thus, after target terminal receives file destination, adopt instant messaging account corresponding to good friend " Zhang San " to be decrypted file destination.
As another kind of example, if receive the confirmation the instruction of transmission, also automatically the instant messaging account of target terminal can be added to good friend, and then, according to this instant messaging account, file destination is encrypted.Concrete, the embodiment of the present invention is not restricted.
S307: described source terminal sends the file destination and described preset-key encrypted to described target terminal.
Concrete, refer to step S307, repeat no more herein.
In the document handling method that the embodiment of the present invention describes, when source terminal needs to target terminal transmission objectives file, source terminal obtains the identification information of target terminal; And whether be legal terminal according to this target terminal of identification information identification of accessed target terminal; If so, then according to this identification information, the file destination that tendency to develop is defeated is encrypted; The file destination encrypted is sent to target terminal.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, not only can fail safe in safeguard file transmitting procedure, and simple to operate.
It is more than the document handling method that " source terminal " side is introduced, a kind of handling process of document handling method is introduced below from " target terminal " side, what deserves to be explained is, " target terminal " side part identical or corresponding with " source terminal " side repeats no more herein, can with reference to the specific descriptions of above-described embodiment.
Refer to Fig. 4, Fig. 4 is a schematic flow sheet again of a kind of document handling method that the embodiment of the present invention provides, and in embodiments of the present invention, the method can comprise the following steps.
S401: during the file destination that target terminal needs the tendency to develop of reception source terminal defeated, obtain the identification information of described target terminal.
Such as, when target terminal receives the file transfer requests of source terminal, if target terminal needs to receive the defeated file destination of source terminal tendency to develop, then obtain the identification information of target terminal.Certainly, also can identify current load mode according to this request, if " safety transmits " mode, then obtain the identification information of target terminal.
S402: send described identification information to described source terminal, is encrypted the file destination that tendency to develop is defeated according to this identification information to make described source terminal.
Accessed identification information is sent to source terminal, according to this identification information, the file destination that tendency to develop is defeated is encrypted to make source terminal.Wherein, described identification information can be phone number or the instant messaging account of target terminal, certainly, can also be the out of Memory such as identifier, as long as source terminal can set up certain information associated with target terminal by this identifier all can as this identification information.Concrete, the embodiment of the present invention is not restricted.
S403: described target terminal receives the file destination that described source terminal sends.
S404: if described target terminal is the legal terminal of described source terminal mark, described target terminal is decrypted described file destination according to described identification information.
In specific implementation, according to the identification information of target terminal, source terminal can identify that whether target terminal is the legal terminal of source terminal, if target terminal is the legal terminal of source terminal mark, then source terminal is encrypted file destination according to the identification information of target terminal; Target terminal is decrypted described file destination according to described identification information after receiving the file destination that source terminal sends.Concrete, can with reference to above-mentioned steps S103, S203 or S303.Certainly, also can be target terminal receive to this file destination access request time, according to described identification information, described file destination is decrypted.
In the document handling method that the embodiment of the present invention describes, during the file destination that target terminal needs the tendency to develop of reception source terminal defeated, obtain the identification information of described target terminal; And this identification information is sent to source terminal, the file destination that tendency to develop is defeated is encrypted according to this identification information to make described source terminal; Receive the file destination that source terminal sends over; If described target terminal is the legal terminal of described source terminal mark, according to described identification information, described file destination is decrypted.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, not only can fail safe in safeguard file transmitting procedure, and simple to operate.
What deserves to be explained is, in the above-described embodiments, if target terminal is not the legal terminal of source terminal mark, then, when source terminal transmits file destination to target terminal, also can transmit preset-key; Target terminal receives file destination and the preset-key of source terminal transmission; According to described preset-key, described file destination is decrypted.Concrete, with reference to above-mentioned steps S206 or S306, can repeat no more herein.
Be apparatus of the present invention embodiment below, apparatus of the present invention embodiment and the inventive method embodiment belong to same design, for performing the method described in the inventive method embodiment.For convenience of explanation, apparatus of the present invention embodiment only illustrates the part relevant to apparatus of the present invention embodiment, and concrete ins and outs do not disclose, and please refer to the description of the inventive method embodiment, repeats no longer one by one herein.In the examples below, described terminal can comprise: the terminal equipments such as smart mobile phone, computer, panel computer, notebook computer, palmtop PC and mobile internet device (MID), PAD.Concrete, the embodiment of the present invention is not restricted.
Refer to Fig. 5, Fig. 5 is the structural representation of a kind of terminal that the embodiment of the present invention provides, and in embodiments of the present invention, this terminal can comprise: the first acquisition module 101, identification module 102, encrypting module 103 and the first sending module 104.
First acquisition module 101, for source terminal for during to target terminal transmission objectives file, obtains the identification information of described target terminal.
Whether identification module 102 is legal terminal for target terminal according to described identification information identification.
Encrypting module 103, if be legal terminal for described target terminal, is encrypted the file destination that tendency to develop is defeated according to described identification information.
First sending module 104, for sending the file destination encrypted to described target terminal.
In the terminal that the embodiment of the present invention describes, when source terminal needs to target terminal transmission objectives file, obtain the identification information of target terminal; And whether be legal terminal according to this target terminal of identification information identification of accessed target terminal; If so, then according to this identification information, the file destination that tendency to develop is defeated is encrypted; The file destination encrypted is sent to target terminal.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, not only can fail safe in safeguard file transmitting procedure, and simple to operate.
Refer to Fig. 6, Fig. 6 is another structural representation of a kind of terminal that the embodiment of the present invention provides, in embodiments of the present invention, this terminal can comprise: the first acquisition module 201, identification module 202, encrypting module 203, first sending module 204 and output module 205.
First acquisition module 201, for source terminal for during to target terminal transmission objectives file, obtains the identification information of described target terminal.
Whether identification module 202 is legal terminal for target terminal according to described identification information identification.
Encrypting module 203, if be legal terminal for described target terminal, is encrypted the file destination that tendency to develop is defeated according to described identification information.
First sending module 204, for sending the file destination encrypted to described target terminal.
Whether output module 205, if be not legal terminal for described target terminal, exports information, confirm to transmit to point out user.
In one implementation, described identification information comprises phone number or instant messaging account.
In one implementation, if described identification information is phone number, identification module 202 specifically for:
Associated person information corresponding to this phone number whether is there is in inquiry local address book;
If exist, identifying described target terminal is legal terminal;
If do not exist, identifying described target terminal is not legal terminal.
In one implementation, if described identification information is instant messaging account, identification module 202 specifically for:
Inquire about in the friend relation chain of described source terminal whether there is friend information corresponding to this instant messaging account according to described instant messaging account;
If exist, identifying described target terminal is legal terminal;
If do not exist, identifying described target terminal is not legal terminal.
In one implementation, encrypting module 203 also for: if receive the confirmation the instruction of transmission, according to preset-key, the file destination that tendency to develop is defeated is encrypted;
First sending module 204 also for: send the file destination and described preset-key encrypted to described target terminal.
In the terminal that the embodiment of the present invention describes, when source terminal needs to target terminal transmission objectives file, obtain the identification information of target terminal; And whether be legal terminal according to this target terminal of identification information identification of accessed target terminal; If so, then according to this identification information, the file destination that tendency to develop is defeated is encrypted; The file destination encrypted is sent to target terminal.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, not only can fail safe in safeguard file transmitting procedure, and simple to operate.
Refer to Fig. 7, Fig. 7 is the another structural representation of a kind of terminal that the embodiment of the present invention provides, and in embodiments of the present invention, this terminal can comprise: the second acquisition module 301, second sending module 302, receiver module 303 and deciphering module 304.
Second acquisition module 301, when needing to receive the defeated file destination of source terminal tendency to develop for target terminal, obtains the identification information of described target terminal.
Second sending module 302, for sending described identification information to described source terminal, is encrypted described file destination according to this identification information to make described source terminal.
Receiver module 303, for receiving the described file destination that described source terminal sends.
Deciphering module 304, if be the legal terminal that described source terminal identifies for described target terminal, described target terminal is decrypted described file destination according to described identification information.
In one implementation, receiver module 303 also for:
If described target terminal is not the legal terminal of described source terminal mark, receive file destination and the preset-key of described source terminal transmission;
Deciphering module 304 also for: according to described preset-key, described file destination is decrypted.
In one implementation, described identification information comprises phone number or instant messaging account.
In the terminal that the embodiment of the present invention describes, during the file destination that target terminal needs the tendency to develop of reception source terminal defeated, obtain the identification information of described target terminal; And this identification information is sent to source terminal, the file destination that tendency to develop is defeated is encrypted according to this identification information to make described source terminal; Receive the file destination that source terminal sends over; If described target terminal is the legal terminal of described source terminal mark, according to described identification information, described file destination is decrypted.Adopt the embodiment of the present invention, if target terminal is the legal terminal of source terminal mark, when source terminal is to target terminal transmission objectives file, identification information according to target terminal arranges key to file destination automatically, target terminal is decrypted file destination automatically according to the identification information of self, not only can fail safe in safeguard file transmitting procedure, and simple to operate.
In the description of this specification, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, not necessarily must for identical embodiment or example to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in one or more embodiment in office or example in an appropriate manner.In addition, when not conflicting, the feature of the different embodiment described in this specification or example and different embodiment or example can carry out combining and combining by those skilled in the art.
The feature of the different embodiment described in this specification and different embodiment can carry out combining and combining by those skilled in the art.Module in all embodiments of the present invention or unit, universal integrated circuit can be passed through, such as CPU (Central Processing Unit, central processing unit), or realized by ASIC (ApplicationSpecific Integrated Circuit, application-specific integrated circuit (ASIC)).
Step in all embodiment methods of the present invention can be carried out order according to actual needs and be adjusted, merges and delete; Module in all embodiment device of the present invention or unit can carry out merging, divide and deleting according to actual needs.
Describe and can be understood in flow chart or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by embodiments of the invention person of ordinary skill in the field.
In flow charts represent or in this logic otherwise described and/or step, such as, the sequencing list of the executable instruction for realizing logic function can be considered to, may be embodied in any computer-readable medium, for instruction execution system, device or equipment (as computer based system, comprise the system of processor or other can from instruction execution system, device or equipment instruction fetch and perform the system of instruction) use, or to use in conjunction with these instruction execution systems, device or equipment.With regard to this specification, " computer-readable medium " can be anyly can to comprise, store, communicate, propagate or transmission procedure for instruction execution system, device or equipment or the device that uses in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wiring, portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasablely edit read-only memory (EPROM or flash memory), fiber device, and portable optic disk read-only memory (CDROM).In addition, computer-readable medium can be even paper or other suitable media that can print described program thereon, because can such as by carrying out optical scanner to paper or other media, then carry out editing, decipher or carry out process with other suitable methods if desired and electronically obtain described program, be then stored in computer storage.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is that the hardware that can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, this program perform time, step comprising embodiment of the method one or a combination set of.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, also can be that the independent physics of unit exists, also can be integrated in a module by two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.If described integrated module using the form of software function module realize and as independently production marketing or use time, also can be stored in a computer read/write memory medium.
The above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.Although illustrate and describe embodiments of the invention above, be understandable that, above-described embodiment is exemplary, can not be interpreted as limitation of the present invention, and those of ordinary skill in the art can change above-described embodiment within the scope of the invention, revises, replace and modification.
Above disclosedly be only preferred embodiment of the present invention, certainly the interest field of the present invention can not be limited with this, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and according to the equivalent variations that the claims in the present invention are done, still belong to the scope that invention is contained.

Claims (18)

1. a document handling method, is characterized in that, comprising:
Source terminal, for during to target terminal transmission objectives file, obtains the identification information of described target terminal;
Whether described source terminal target terminal according to described identification information identification is legal terminal;
If so, described source terminal is encrypted the file destination that tendency to develop is defeated according to described identification information;
Described source terminal sends the file destination encrypted to described target terminal.
2. as right, you require the method as described in 1, it is characterized in that, described identification information comprises phone number or instant messaging account.
3. method as claimed in claim 2, it is characterized in that, if described identification information is phone number, whether described source terminal target terminal according to described identification information identification is legal terminal, comprising:
Associated person information corresponding to this phone number whether is there is in described source terminal inquiry local address book;
If exist, it is legal terminal that described source terminal identifies described target terminal;
If do not exist, it is not legal terminal that described source terminal identifies described target terminal.
4. method as claimed in claim 2, it is characterized in that, if described identification information is instant messaging account, whether described source terminal target terminal according to described identification information identification is legal terminal, comprising:
Described source terminal inquires about in the friend relation chain of described source terminal whether there is friend information corresponding to this instant messaging account according to described instant messaging account;
If exist, it is legal terminal that described source terminal identifies described target terminal;
If do not exist, it is not legal terminal that described source terminal identifies described target terminal.
5. the method as described in any one of claim 1,3,4, is characterized in that, described source terminal is after according to described identification information identification, whether target terminal is legal terminal, and described method also comprises:
If it is not legal terminal that described source terminal identifies described target terminal, export information, whether confirm to point out user to transmit.
6. method as claimed in claim 5, it is characterized in that, after described output information, described method also comprises:
If receive the confirmation the instruction of transmission, described source terminal is encrypted the file destination that tendency to develop is defeated according to preset-key;
Described source terminal sends the file destination and described preset-key encrypted to described target terminal.
7. a document handling method, is characterized in that, comprising:
During the file destination that target terminal needs the tendency to develop of reception source terminal defeated, obtain the identification information of described target terminal;
Described target terminal sends described identification information to described source terminal, is encrypted according to this identification information to make described source terminal to described file destination;
Described target terminal receives the described file destination that described source terminal sends;
If described target terminal is the legal terminal of described source terminal mark, described target terminal is decrypted described file destination according to described identification information.
8. method as claimed in claim 7, it is characterized in that, described method also comprises:
If described target terminal is not the legal terminal of described source terminal mark, receive file destination and the preset-key of described source terminal transmission;
According to described preset-key, described file destination is decrypted.
9. method as claimed in claim 7 or 8, it is characterized in that, described identification information comprises phone number or instant messaging account.
10. a terminal, is characterized in that, comprising:
First acquisition module, for source terminal for during to target terminal transmission objectives file, obtains the identification information of described target terminal;
Whether identification module is legal terminal for target terminal according to described identification information identification;
Encrypting module, if be legal terminal for described target terminal, is encrypted the file destination that tendency to develop is defeated according to described identification information;
First sending module, for sending the file destination encrypted to described target terminal.
11. terminals as claimed in claim 10, it is characterized in that, described identification information comprises phone number or instant messaging account.
12. terminals as claimed in claim 11, is characterized in that, if described identification information is phone number, described identification module specifically for:
Associated person information corresponding to this phone number whether is there is in inquiry local address book;
If exist, identifying described target terminal is legal terminal;
If do not exist, identifying described target terminal is not legal terminal.
13. terminals as claimed in claim 11, is characterized in that, if described identification information is instant messaging account, described identification module specifically for:
Inquire about in the friend relation chain of described source terminal whether there is friend information corresponding to this instant messaging account according to described instant messaging account;
If exist, identifying described target terminal is legal terminal;
If do not exist, identifying described target terminal is not legal terminal.
14. terminals as described in any one of claim 10,12,13, it is characterized in that, described terminal also comprises:
Whether output module, if be not legal terminal for described target terminal, exports information, confirm to transmit to point out user.
15. terminals as claimed in claim 14, is characterized in that, described encrypting module, if also for receiving the confirmation the instruction of transmission, be encrypted the file destination that tendency to develop is defeated according to preset-key;
Described first sending module, also for sending the file destination and described preset-key encrypted to described target terminal.
16. 1 kinds of terminals, is characterized in that, comprising:
Second acquisition module, when needing to receive the defeated file destination of source terminal tendency to develop for target terminal, obtains the identification information of described target terminal;
Second sending module, for sending described identification information to described source terminal, is encrypted described file destination according to this identification information to make described source terminal;
Receiver module, for receiving the described file destination that described source terminal sends;
Deciphering module, if be the legal terminal that described source terminal identifies for described target terminal, described target terminal is decrypted described file destination according to described identification information.
17. terminals as claimed in claim 16, is characterized in that, described receiver module, if be not also the legal terminal of described source terminal mark for described target terminal, receive file destination and the preset-key of the transmission of described source terminal;
Described deciphering module, also for being decrypted described file destination according to described preset-key.
18. terminals as described in claim 16 or 17, it is characterized in that, described identification information comprises phone number or instant messaging account.
CN201410663154.9A 2014-11-19 2014-11-19 A kind of document handling method and terminal Active CN104507080B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810134907.5A CN108183972B (en) 2014-11-19 2014-11-19 Document handling method and terminal
CN201410663154.9A CN104507080B (en) 2014-11-19 2014-11-19 A kind of document handling method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410663154.9A CN104507080B (en) 2014-11-19 2014-11-19 A kind of document handling method and terminal

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201810134907.5A Division CN108183972B (en) 2014-11-19 2014-11-19 Document handling method and terminal

Publications (2)

Publication Number Publication Date
CN104507080A true CN104507080A (en) 2015-04-08
CN104507080B CN104507080B (en) 2018-03-27

Family

ID=52948782

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810134907.5A Active CN108183972B (en) 2014-11-19 2014-11-19 Document handling method and terminal
CN201410663154.9A Active CN104507080B (en) 2014-11-19 2014-11-19 A kind of document handling method and terminal

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810134907.5A Active CN108183972B (en) 2014-11-19 2014-11-19 Document handling method and terminal

Country Status (1)

Country Link
CN (2) CN108183972B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007561A (en) * 2015-06-10 2015-10-28 广东欧珀移动通信有限公司 Bluetooth data transmission method, device and system, and mobile terminal
CN106372521A (en) * 2016-09-28 2017-02-01 珠海市魅族科技有限公司 Data operation method and device
CN106534157A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Data transmission method, device and terminal
WO2017071330A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 Data encryption and decryption method and encryption and decryption device
WO2017071324A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 File-transmission encryption and decryption method and encryption and decryption device
CN106685791A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential Information transmitting method and confidential information transmitting device
CN106707978A (en) * 2015-11-13 2017-05-24 北京奇虎科技有限公司 Method of transferring intelligent household control right through address book and the address book
WO2017206505A1 (en) * 2016-05-30 2017-12-07 宇龙计算机通信科技(深圳)有限公司 Method for accessing private information, access device, and terminal
CN107749878A (en) * 2017-10-16 2018-03-02 新华三信息安全技术有限公司 A kind of method and device of synchronous documents
CN108243161A (en) * 2016-12-26 2018-07-03 北京润信恒达科技有限公司 A kind of terminal speech encryption method and voice encryption system
CN108259412A (en) * 2016-12-28 2018-07-06 中国移动通信集团湖北有限公司 The methods, devices and systems of information processing
CN108377319A (en) * 2018-03-15 2018-08-07 北京顶象技术有限公司 picture transmission method and device
CN109802885A (en) * 2019-01-17 2019-05-24 安徽云探索网络科技有限公司 Instant message communication method based on cloud storage
CN111464531A (en) * 2020-03-31 2020-07-28 洛阳理工学院 Instant confirmation type file transmission method based on multiple encryption

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956402A (en) * 1997-03-07 1999-09-21 At&T Corp. Passwordless secure and efficient remote data update
CN1494252A (en) * 2002-10-31 2004-05-05 华为技术有限公司 Encryption communication method and device
CN1697424A (en) * 2005-05-09 2005-11-16 朱文和 Method for carrying out private security data communication base on decimal communication numbers
CN101141680A (en) * 2007-09-30 2008-03-12 中兴通讯股份有限公司 Short message encrypting transmission and reception method
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
EP1993240A1 (en) * 2007-05-18 2008-11-19 Alcatel Lucent Determination of a security assurance level of a mobile communication involving the network operator
CN101616142A (en) * 2008-06-24 2009-12-30 香港城市大学 Realize the method and system of information encryption transmission
CN102196421A (en) * 2010-03-11 2011-09-21 北京明朝万达科技有限公司 Trust-relationship-based file security transmission method for handheld terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8321690B2 (en) * 2005-08-11 2012-11-27 Microsoft Corporation Protecting digital media of various content types
CN102685119A (en) * 2012-04-28 2012-09-19 上海杰之能信息科技有限公司 Data transmitting/receiving method, data transmitting/receiving device, transmission method, transmission system and server
CN103414790A (en) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 File transfer system based on NFC

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956402A (en) * 1997-03-07 1999-09-21 At&T Corp. Passwordless secure and efficient remote data update
CN1494252A (en) * 2002-10-31 2004-05-05 华为技术有限公司 Encryption communication method and device
CN1697424A (en) * 2005-05-09 2005-11-16 朱文和 Method for carrying out private security data communication base on decimal communication numbers
EP1993240A1 (en) * 2007-05-18 2008-11-19 Alcatel Lucent Determination of a security assurance level of a mobile communication involving the network operator
CN101141680A (en) * 2007-09-30 2008-03-12 中兴通讯股份有限公司 Short message encrypting transmission and reception method
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101616142A (en) * 2008-06-24 2009-12-30 香港城市大学 Realize the method and system of information encryption transmission
CN102196421A (en) * 2010-03-11 2011-09-21 北京明朝万达科技有限公司 Trust-relationship-based file security transmission method for handheld terminal

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007561A (en) * 2015-06-10 2015-10-28 广东欧珀移动通信有限公司 Bluetooth data transmission method, device and system, and mobile terminal
US9979706B2 (en) 2015-10-28 2018-05-22 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data encryption and decryption method and encryption and decryption device
CN108200093B (en) * 2015-10-28 2021-08-24 Oppo广东移动通信有限公司 Encryption and decryption method and encryption and decryption device for transmission file
CN108200093A (en) * 2015-10-28 2018-06-22 广东欧珀移动通信有限公司 Transmit the encryption and decryption approaches and encryption and decryption devices of file
WO2017071330A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 Data encryption and decryption method and encryption and decryption device
WO2017071324A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 File-transmission encryption and decryption method and encryption and decryption device
CN106685791A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Confidential Information transmitting method and confidential information transmitting device
CN106707978A (en) * 2015-11-13 2017-05-24 北京奇虎科技有限公司 Method of transferring intelligent household control right through address book and the address book
WO2017206505A1 (en) * 2016-05-30 2017-12-07 宇龙计算机通信科技(深圳)有限公司 Method for accessing private information, access device, and terminal
CN106372521A (en) * 2016-09-28 2017-02-01 珠海市魅族科技有限公司 Data operation method and device
CN106372521B (en) * 2016-09-28 2019-11-08 珠海市魅族科技有限公司 A kind of data run method and device
CN106534157A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Data transmission method, device and terminal
CN108243161A (en) * 2016-12-26 2018-07-03 北京润信恒达科技有限公司 A kind of terminal speech encryption method and voice encryption system
CN108259412A (en) * 2016-12-28 2018-07-06 中国移动通信集团湖北有限公司 The methods, devices and systems of information processing
CN107749878B (en) * 2017-10-16 2021-05-14 新华三信息安全技术有限公司 Method and device for synchronizing files
CN107749878A (en) * 2017-10-16 2018-03-02 新华三信息安全技术有限公司 A kind of method and device of synchronous documents
CN108377319A (en) * 2018-03-15 2018-08-07 北京顶象技术有限公司 picture transmission method and device
CN108377319B (en) * 2018-03-15 2020-04-17 北京顶象技术有限公司 Picture transmission method and device
CN109802885A (en) * 2019-01-17 2019-05-24 安徽云探索网络科技有限公司 Instant message communication method based on cloud storage
CN111464531A (en) * 2020-03-31 2020-07-28 洛阳理工学院 Instant confirmation type file transmission method based on multiple encryption

Also Published As

Publication number Publication date
CN104507080B (en) 2018-03-27
CN108183972B (en) 2019-08-30
CN108183972A (en) 2018-06-19

Similar Documents

Publication Publication Date Title
CN104507080A (en) File processing method and terminal
CN104144049B (en) A kind of encryption communication method, system and device
US10154018B2 (en) Method and system for facilitating network joining
US20150264724A1 (en) Method and system of establishing wireless communication connection
KR101418797B1 (en) Security token device for cloud service, system for providing security cloud service and method thereof
CN102916869A (en) Instant messaging method and system
US9703968B2 (en) Mechanisms for controlling tag personalization
WO2015117437A1 (en) File encryption/decryption method and device
KR101479290B1 (en) Agent for providing security cloud service, security token device for security cloud service
CN111431922A (en) Internet of things data encryption transmission method and system
KR101379711B1 (en) Method for file encryption and decryption using telephone number
CN105577361A (en) Information processing method and device thereof
CN114095277A (en) Power distribution network secure communication method, secure access device and readable storage medium
CN105022965A (en) Data encryption method and apparatus
CN110995775B (en) Service data processing method, device and system
KR101719129B1 (en) Cross-platform endpoint security system
CN113961931A (en) Adb tool using method and device and electronic equipment
CN102426635B (en) Display device for file information, display method and system
CN106330897A (en) Information storage method and system
CN106685931B (en) Smart card application management method and system, terminal and smart card
CN106067875B (en) Intelligent terminal encryption method and system
CN110619236A (en) File authorization access method, device and system based on file credential information
CN105722080B (en) Bluetooth pairing method, master intelligent terminal and slave intelligent terminal
CN113785547B (en) Safety transmission method and corresponding device for Profile data
CN104182698A (en) Data clearing method and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.