CN105956418A - File processing method, sending terminal and receiving terminal - Google Patents

File processing method, sending terminal and receiving terminal Download PDF

Info

Publication number
CN105956418A
CN105956418A CN201610244751.7A CN201610244751A CN105956418A CN 105956418 A CN105956418 A CN 105956418A CN 201610244751 A CN201610244751 A CN 201610244751A CN 105956418 A CN105956418 A CN 105956418A
Authority
CN
China
Prior art keywords
file
receiving terminal
module
access
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610244751.7A
Other languages
Chinese (zh)
Inventor
张泳发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201610244751.7A priority Critical patent/CN105956418A/en
Publication of CN105956418A publication Critical patent/CN105956418A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities

Abstract

The invention discloses a file processing method, a sending terminal and a receiving terminal, wherein the file processing method comprises the following steps: the sending terminal generates a an access safety code and sending the generated access safety code to the receiving terminal according to time information at present when a file is required to be transmitted by a user; the receiving terminal arranges an encrypted storage area corresponding to the received access safety code and notifies the sending terminal send the file required for transmitting by the user; the receiving terminal receives the file required for transmitting by the user sent by the user and stores the received file to an encrypted storage area corresponding to the received access safety code. According to the embodiment, virus risk and file divulgence risk is reduced, and user experience is improved.

Description

A kind of process the method for file, transmitting terminal and receiving terminal
Technical field
The present embodiments relate to but be not limited to intelligent terminal's technology, a kind of process file method, Transmitting terminal and receiving terminal.
Background technology
Shared multimedia equipment (computer and projector all can be had at company's meeting room or classroom Deng), when generally using shared multimedia equipment, first by user in External memory equipment (USB flash disk etc.) The file copy needed, to sharing in multimedia equipment, then accesses (opening) in shared multimedia equipment The file that copy comes, the flow process of above-mentioned process file is loaded down with trivial details, and (outside is deposited to there is the viral risk of infection The propagation of virus between storage equipment and shared multimedia equipment) and if file on shared device delete There is also the risk divulged a secret not in time.
Summary of the invention
This application provides and a kind of process the method for file, transmitting terminal and receiving terminal, it is possible to reduce and infect disease The risk that the risk of poison and reduction file get compromised, promotes Consumer's Experience.
In order to reach the application purpose, this application provides a kind of method processing file, including:
When transmitting terminal detects that user needs to transmit file, transmitting terminal generates according to current time information and visits Pay one's respects all-key the access safety code of generation is sent to receiving terminal;
Receiving terminal arranges the memory area of the encryption corresponding with the access safety code received and notifies to send End sends user needs the file of transmission;
Receiving terminal receives the user sent from transmitting terminal needs the file transmitted the file that will receive Store the memory area to the encryption corresponding with the access safety code received.
Alternatively, when receiving terminal detects that self restarts, the memory area of encryption is entered by receiving terminal Formatting lines.
Alternatively, described transmitting terminal passes through near-field communication NFC function by the access safety code of described generation It is sent to described receiving terminal.
Alternatively, user is needed the file of transmission to be sent to institute by bluetooth or Wifi by described transmitting terminal State receiving terminal.
Alternatively, described receiving terminal the file received stored to the access safety code pair received After the memory area of the encryption answered, at the access safety code pair that described receiving terminal will be stored in and receives Before the memory area of the encryption answered formats, the method also includes:
Described receiving terminal obtains the type of the described file stored in the memory area of described encryption;
Described receiving terminal determines the application program corresponding with the type of the described file obtained;
The memory area of the described application program described encryption of access that described receiving terminal is determined by out is deposited The described file of storage.
Alternatively, the described application program that described receiving terminal is determined by out accesses the memory block of described encryption In territory, the described file of storage includes:
Described receiving terminal is visited according to the described access safety code received and the described application program determined Ask the described file of storage in the memory area of described encryption.
Present invention also provides a kind of transmitting terminal, including: detection module, generation module, the first transmission mould Block and the first receiver module;Wherein,
Detection module, for when detecting that user needs to transmit file, notifying generation module;
Generation module, for receiving the notice of self-detection module, generates according to current time information and visits Pay one's respects all-key notify the first sending module;
First sending module, for receiving the notice from generation module, the access safety code that will generate It is sent to receiving terminal;Receive the notice from receiver module, user needs the file of transmission be sent to Receiving terminal;
First receiver module, needs leading to of the file transmitted for receiving the transmission user from receiving terminal Know, notify the first sending module.
Alternatively, described first sending module includes the first near-field communication NFC unit, for by described The access safety code generated is sent to described receiving terminal.
Alternatively, described first sending module also includes the first bluetooth unit, for user needs transmission File be sent to described receiving terminal;Or,
Described first sending module also includes a Wifi unit, for user needs the file of transmission It is sent to described receiving terminal.
Present invention also provides a kind of receiving terminal, including: the second receiver module, module and second are set Send module;Wherein,
Second receiver module, for receiving the access safety code from transmitting terminal, notice arranges module;Connect Receive from the user of transmitting terminal need the file of transmission and the file received is stored to receive Access the memory area of encryption corresponding to safety code;
Module is set, for receiving the notice from the second receiver module, the access arranging and receiving The memory area of the encryption that safety code is corresponding;
Second sending module, for notifying that transmitting terminal sends user and needs the file of transmission.
Alternatively, described receiving terminal also includes processing module, for when self affiliated receiving terminal being detected When restarting, the memory area of encryption is formatted.
Alternatively, described second receiver module includes the second near-field communication NFC module, is used for receiving From the access safety code of described transmitting terminal.
Alternatively, described second receiver module also includes the second bluetooth unit, is used for receiving described receiving terminal The user sent by bluetooth needs the file of transmission;Or,
Described second receiver module also includes the 2nd Wifi unit, is used for receiving described receiving terminal and passes through Wifi The user sent needs the file of transmission.
Alternatively, described receiving terminal also includes acquisition module, determines module and access modules;Wherein,
Described acquisition module, the class of the described file of storage in the memory area obtaining described encryption Type;
Described determine module, for determining the application program corresponding with the type of the described file of acquisition;
Described access modules, the described application program for being determined by out accesses the memory block of described encryption The described file of storage in territory.
Alternatively, described access modules, specifically for: according to the described access safety code received with true The described application program made accesses the described file stored in the memory area of described encryption.
The embodiment of the present invention includes: when transmitting terminal detect user need transmit file time, transmitting terminal according to Current time information generates and accesses safety code and the access safety code of generation is sent to receiving terminal;Receiving terminal The memory area accessing encryption corresponding to safety code that arranges and receive also notifies transmitting terminal transmission user Need the file of transmission;Receiving terminal receives the user sent from transmitting terminal to be needed the file of transmission and will connect The file received stores the memory area to the encryption corresponding with the access safety code received.The present invention is real Execute example reduce the risk of infection virus and reduce the risk that file gets compromised, improve user's body Test.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes of the application Point, the schematic description and description of the present invention is used for explaining the present invention, is not intended that the present invention's Improper restriction.In the accompanying drawings:
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention;
Fig. 2 is the schematic diagram of the communication system communicated between support mobile terminal of the present invention;
Fig. 3 is the flow chart that the present invention processes the method for file;
Fig. 4 is the schematic diagram of prompting frame of the present invention;
Fig. 5 is the flow chart that the present invention processes the embodiment of the method for file;
Fig. 6 is the schematic diagram that the present invention arranges the memory area of encryption;
Fig. 7 is the structural representation of transmitting terminal of the present invention;
Fig. 8 is the structural representation of transmitting terminal of the present invention.
Detailed description of the invention
Below in conjunction with drawings and Examples, technical scheme is described in detail.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description In, use for represent element such as " module ", " parts " or " unit " suffix only for Be conducive to the explanation of the present invention, itself do not have specific meaning.Therefore, " module " and " parts " can Mixedly to use.
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can include Such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (individual digital Assistant), PAD (panel computer), PMP (portable media player), guider etc. Mobile terminal and such as numeral TV, desk computer etc. fixed terminal.Hereinafter it is assumed that eventually End is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for mobile purpose Element outside, structure according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention.
Mobile terminal 100 can include wireless communication unit 110, A/V (audio/video) input block 120, user input unit 130, sensing unit 140, output unit 150, memorizer 160, interface Unit 170, controller 180 and power subsystem 190 etc..Fig. 1 shows the shifting with various assembly Dynamic terminal, it should be understood that be not required for implementing all assemblies illustrated.Can alternatively implement More or less of assembly.Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows mobile terminal 100 and nothing Radio communication between line communication system or network.Such as, wireless communication unit can include that broadcast connects Receive module 111, mobile communication module 112, wireless Internet module 113, short range communication module 114 With at least one in positional information module 115.
Broadcast reception module 111 receives broadcast singal via broadcast channel from external broadcasting management server And/or broadcast related information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast control Server can be to generate and send broadcast singal and/or the server of broadcast related information or receive it The broadcast singal of front generation and/or broadcast related information and send it to the server of terminal.Broadcast Signal can include TV broadcast singal, radio signals, data broadcasting signal etc..And, Broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Pass information can also provide via mobile communications network, and in this case, broadcast related information is permissible Received by mobile communication module 112.Broadcast singal can exist in a variety of manners, and such as, it is permissible Electronic program guides (EPG), digital video broadcast-handheld with DMB (DMB) (DVB-H) form of electronic service guidebooks (ESG) etc. and exist.Broadcast reception module 111 Can broadcast by using various types of broadcast systems to receive signal.Especially, broadcast reception module 111 can be by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), DVB-hand-held (DVB-H), forward link media (MediaFLO@) Radio Data System, the digit broadcasting system of received terrestrial digital broadcasting integrated service (ISDB-T) etc. Receive digital broadcasting.Broadcast reception module 111 may be constructed such that be adapted to provide for broadcast singal various extensively Broadcast system and above-mentioned digit broadcasting system.Via broadcast reception module 111 receive broadcast singal and/ Or broadcast related information can be stored in memorizer 160 (or other type of storage medium).
Mobile communication module 112 sends radio signals to base station (such as, access point, node B Etc.), in exterior terminal and server at least one and/or receive from it radio signal.This The radio signal of sample can include voice call signal, video calling signal or according to text and/ Or various types of data that Multimedia Message sends and/or receives.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be internal Or externally it is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave access), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some of short-range communication technology are shown Example includes bluetoothTM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), Purple honeybeeTMEtc..
Positional information module 115 is the module of positional information for checking or obtain mobile terminal.Position The typical case of information module is GPS (global positioning system).According to current technology, GPS module 115 calculate from the range information of three or more satellites and correct time information and for calculating Information application triangulation, thus according to longitude, latitude and highly accurately calculating three-dimensional current location Information.Currently, for calculating method three satellites of use of position and temporal information and by using separately An outer satellite corrects the position and the error of temporal information calculated.Additionally, GPS module 115 Velocity information can be calculated by Continuous plus current location information in real time.
A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can wrap Include camera 121 and mike 122, camera 121 in Video Capture pattern or image capture mode by Static images or the view data of video that image capture apparatus obtains process.Picture frame after process May be displayed on display unit 151.Picture frame after camera 121 processes can be stored in memorizer It is transmitted in 160 (or other storage mediums) or via wireless communication unit 110, can basis The structure of mobile terminal provides two or more cameras 121.Mike 122 can telephone calling model, Logging mode, speech recognition mode etc. operational mode receives sound (voice data) via mike, And can be voice data by such acoustic processing.Audio frequency (voice) data after process can be Be converted in the case of telephone calling model to be sent to mobile communication base via mobile communication module 112 The form output stood.Mike 122 can implement various types of noise eliminate (or suppression) algorithm with Eliminate noise or interference that (or suppression) produces during receiving and send audio signal.
User input unit 130 can generate key input data to control to move according to the order of user's input The various operations of dynamic terminal.User input unit 130 allows user to input various types of information, and Can include that keyboard, metal dome, touch pad (such as, detect resistance, the pressure caused owing to being touched The sensitive component of the change of power, electric capacity etc.), roller, rocking bar etc..Especially, when touch pad with When the form of layer is superimposed upon on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (such as, mobile terminal 100 Open or close state), the position of mobile terminal 100, user for mobile terminal 100 contact (i.e., Touch input) presence or absence, the orientation of mobile terminal 100, the acceleration or deceleration of mobile terminal 100 move With direction etc., and generate the order of operation for controlling mobile terminal 100 or signal.Such as, When mobile terminal 100 is embodied as sliding-type mobile phone, sensing unit 140 can sense this sliding-type Phone opens or cuts out.It addition, sensing unit 140 can detect whether power subsystem 190 provides Whether electric power or interface unit 170 couple with external device (ED).Sensing unit 140 can include close to biography This is described by sensor 1410 by combining touch screen below.
Interface unit 170 is used as at least one external device (ED) and is connected connecing of can passing through with mobile terminal 100 Mouthful.Such as, external device (ED) can include wired or wireless head-band earphone port, external power source (or electricity Electrolytic battery charger) port, wired or wireless FPDP, memory card port, there is for connection identification mould The port of the device of block, audio frequency input/output (I/O) port, video i/o port, ear port etc. Deng.Identification module can be store for verify user use mobile terminal 100 various information and can To include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) etc..It addition, the device (hereinafter referred to as " identifying device ") with identification module is permissible Take the form of smart card, therefore, identify that device can be whole with mobile via port or other attachment means End 100 connection.Interface unit 170 may be used for receiving input (such as, the data from external device (ED) Information, electric power etc.) and the input received is transferred in mobile terminal 100 one or more Element or may be used between mobile terminal and external device (ED) transmit data.
It addition, when mobile terminal 100 is connected with external base, interface unit 170 can serve as allowing There is provided the path of mobile terminal 100 by electric power from base by it or can serve as allowing from base The various command signals of input are transferred to the path of mobile terminal by it.Various orders from base input Signal or electric power may serve as identifying whether mobile terminal is accurately fitted within the signal on base.Defeated Go out unit 150 to be configured to provide output signal (such as, sound with vision, audio frequency and/or tactile manner Frequently signal, video signal, alarm signal, vibration signal etc.).Output unit 150 can include showing Show unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 100.Such as, when mobile whole When end 100 is in telephone calling model, display unit 151 can show and call or other (example that communicates As, text messaging, multimedia file download etc.) relevant user interface (UI) or figure use Interface, family (GUI).When mobile terminal 100 is in video calling pattern or image capture mode, Display unit 151 can show capture image and/or the image of reception, illustrate video or image and UI or GUI of correlation function etc..
Meanwhile, when display unit 151 and touch pad the most superposed on one another with formed touch screen time, Display unit 151 can serve as input equipment and output device.Display unit 151 can include liquid crystal Show device (LCD), thin film transistor (TFT) LCD (TFT-LCD), Organic Light Emitting Diode (OLED) At least one in display, flexible display, three-dimensional (3D) display etc..These display In some may be constructed such that transparence with allow user from outside watch, this is properly termed as Transparence Display Device, typical transparent display can for example, TOLED (transparent organic light emitting diode) display Etc..According to the specific embodiment wanted, mobile terminal 100 can include that two or more displays are single Unit's (or other display device), such as, mobile terminal can include outernal display unit (not shown) With inner display unit (not shown).Touch screen can be used for detecting touch input pressure and touch input Position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal receive pattern, call mode, Time under the isotypes such as logging mode, speech recognition mode, broadcast reception mode, by wireless communication unit 110 receive or in memorizer 160 storage voice data transducing audio signal and be output as sound Sound.And, the specific function that dio Output Modules 152 can provide to mobile terminal 100 performs is relevant Audio frequency output (such as, call signal receive sound, message sink sound etc.).Audio frequency output mould Block 152 can include speaker, buzzer etc..
Alarm unit 153 can provide output to notify event to mobile terminal 100.Typical case Event can include calling receptions, message sink, key signals input, touch input etc..Except sound Outside frequency or video frequency output, alarm unit 153 can provide output with notification event in a different manner Occur.Such as, alarm unit 153 can provide output with the form of vibration, when receiving calling, disappearing When breath or some other entrance communication (incoming communication), alarm unit 153 is permissible There is provided sense of touch output (that is, vibration) to notify to user.By providing such sense of touch to export, Even if when the mobile phone of user is in the pocket of user, user also is able to identify various event Occur.Alarm unit 153 can also provide notice via display unit 151 or dio Output Modules 152 The output of the generation of event.
Memorizer 160 can store the process performed by controller 180 and control the software program etc. of operation Deng, or can temporarily store oneself through output maybe will export data (such as, telephone directory, message, Still image, video etc.).And, memorizer 160 can store and be applied to touch about when touch The vibration of the various modes exported during screen and the data of audio signal.
Memorizer 160 can include that the storage medium of at least one type, described storage medium include dodging Deposit, hard disk, multimedia card, card-type memorizer (such as, SD or DX memorizer etc.), random Access memorizer (RAM), static random-access memory (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), Magnetic storage, disk, CD etc..And, mobile terminal 100 can be connected with by network to be held The network storage device cooperation of the storage function of line storage 160.
Controller 180 generally controls the overall operation of mobile terminal.Such as, controller 180 performs and language Control that sound call, data communication, video calling etc. are relevant and process.It addition, controller 180 can To include the multi-media module 181 for reproducing (or playback) multi-medium data, multi-media module 181 Can construct in controller 180, or it is so structured that separate with controller 180.Controller 180 Pattern recognition process can be performed, draw input with the handwriting input that will perform on the touchscreen or picture It is identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides Operate the suitable electric power needed for each element and assembly.
Various embodiment described herein can be to use such as computer software, hardware or its any group The computer-readable medium closed is implemented.Implementing for hardware, embodiment described herein can pass through Use application-specific IC (ASIC), digital signal processor (DSP), Digital Signal Processing Device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), Processor, controller, microcontroller, microprocessor, it is designed to perform the electricity of function described herein At least one in subelement is implemented, and in some cases, such embodiment can be at controller Implement in 180.Implementing for software, the embodiment of such as process or function can perform extremely with permission The single software module of few a kind of function or operation is implemented.Software code can be by with any suitable The software application (or program) that programming language is write is implemented, and software code can be stored in storage Perform in device 160 and by controller 180.
So far, oneself is through describing mobile terminal according to its function.Below, for the sake of brevity, will describe Various types of mobile terminals of such as folded form, board-type, oscillating-type, slide type mobile terminal etc. In slide type mobile terminal as example.Therefore, the present invention can be applied to any kind of mobile whole End, and it is not limited to slide type mobile terminal.
Mobile terminal 100 may be constructed such that utilization is via frame or packet transmission data as shown in Figure 1 The most wired and wireless communication system and satellite-based communication system operate.
The communication system being wherein operable to according to the mobile terminal of the present invention is described referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer.Such as, by communicating System use air interface include such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and UMTS (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, below Description relates to cdma communication system, but such teaching is equally applicable to other type of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 100, multiple base station (BS) 270, base station controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 It is configured to form interface with Public Switched Telephony Network (PSTN) 290.MSC280 is also structured to With the BSC275 formation interface that can be couple to base station 270 via back haul link.Back haul link can root If constructing according to any one in the interface that Ganji knows, described interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system as shown in Figure 2 Multiple BSC2750 can be included.
Each BS270 can service one or more subregion (or region), by multidirectional antenna or sensing Each subregion that the antenna of specific direction covers is radially away from BS270.Or, each subregion is permissible Covered by two or more antennas for diversity reception.Each BS270 may be constructed such that support is many Individual frequency is distributed, and the distribution of each frequency has specific frequency spectrum (such as, 1.25MHz, 5MHz etc.).
Intersecting that subregion and frequency are distributed can be referred to as CDMA Channel.BS270 can also be referred to as Base station transceiver subsystem (BTS) or other equivalent terms.In this case, term " base Stand and " may be used for broadly representing single BSC275 and at least one BS270.Base station can also be claimed For " cellular station ".Or, each subregion of specific BS270 can be referred to as multiple cellular station.
As shown in Figure 2, broadcast singal is sent in system operate by broadcsting transmitter (BT) 295 Mobile terminal 100.Broadcast reception module 111 is arranged on mobile terminal 100 as shown in Figure 1 Sentence and receive the broadcast singal sent by BT295.In fig. 2 it is shown that several global positioning systems (GPS) satellite 300.Satellite 300 helps to position at least one in multiple mobile terminals 100.
In fig. 2, depict multiple satellite 300, it is understood that be, it is possible to use any number of Satellite obtains useful location information.As shown in Figure 1 GPS module 115 be generally configured to Satellite 300 coordinates the location information wanted with acquisition.Substitute GPS tracking technique or follow the tracks of at GPS Outside technology, it is possible to use other technology of the position of mobile terminal can be followed the tracks of.It addition, at least one Gps satellite 300 can optionally or additionally process satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives from various mobile terminals 100 Reverse link signal.Mobile terminal 100 generally participates in call, information receiving and transmitting communicates with other type of. Each reverse link signal that certain base station 270 receives is processed in specific BS270.Obtain Data be forwarded to the BSC275 that is correlated with.BSC provides call resource distribution and includes between BS270 The mobile management function of coordination of soft switching process.The data received also are routed to by BSC275 MSC280, it provides the extra route service for forming interface with PSTN290.Similarly, PSTN290 Yu MSC280 forms interface, MSC Yu BSC275 forms interface, and BSC275 Correspondingly control BS270 forward link signals to be sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each is implemented to propose the inventive method Example.
Fig. 3 is the flow chart that the present invention processes the method for file, as it is shown on figure 3, include:
Step 301: when transmitting terminal detects that user needs to transmit file, transmitting terminal is according to current time Information generates and accesses safety code and the access safety code of generation is sent to receiving terminal.
Wherein it is possible to according to triple DEAs (3DES) AES or message digest algorithm (MD) current time information is encrypted and accesses safety code to generate by 5 AESs.Wherein, Current time information includes current time.
It should be noted that about how according to 3DES AES or md5 encryption algorithm to currently Temporal information is encrypted and belongs to well-known to those skilled in the art used with generation access safety code By technological means, here is omitted, is not intended to limit the present invention.It addition, except above-mentioned 3DES Outside AES or md5 encryption algorithm, the application can also use other AES to current time Information is encrypted and accesses safety code to generate, and does not repeats them here.
Wherein, the access safety code of generation is sent to connect by transmitting terminal by near-field communication (NFC) function Receiving end.Such as by the Android Beam of NFC, the access safety code of generation is sent to receiving terminal, Wherein, Android Beam is a New function done based on NFC, and this function can be other The function that terminals share present terminal is currently in use.
Step 302: receiving terminal is arranged with the memory area accessing encryption corresponding to safety code received also Notice transmitting terminal sends user needs the file of transmission.
Alternatively, after step 301, before step 302, the method also includes: receiving terminal leads to Cross NFC function and receive the access safety code sent from transmitting terminal.
Wherein, receiving terminal sends user by NFC function notice transmitting terminal needs the file of transmission.
Step 303: receiving terminal receives the user sent from transmitting terminal to be needed the file of transmission and will receive To file store to the memory area accessing encryption corresponding to safety code received.
Alternatively, after step 302, before step 303, the method also includes: transmitting terminal will User needs the file of transmission to be sent to receiving terminal.Wherein, transmitting terminal by bluetooth (Bluetooth) or User is needed the file of transmission to be sent to receiving terminal by Wifi.
Wherein, receiving terminal receives, by bluetooth or Wifi, the user sent from transmitting terminal needs transmission File.
Alternatively, also include after the method: when receiving terminal detects that self restarts, receiving terminal The memory area of encryption is formatted.
It should be noted that the process that the memory area of encryption is formatted by receiving terminal is i.e. to delete to be somebody's turn to do The process of the file of storage in the memory area of encryption.
Alternatively, after step 303, before the memory area of encryption is formatted by receiving terminal, The method also includes:
Receiving terminal obtains the type of the file stored in the memory area of encryption;
Receiving terminal determines the application program corresponding with the type of the file obtained;
The application program that receiving terminal is determined by out accesses the file stored in the memory area of encryption.
Wherein, receiving terminal determines that the application program corresponding with the type of the file obtained includes: receiving terminal obtains Take the application list corresponding with the type of this document and the application list is comprised that each should With the access times of program;
The access times of each application program that the application list obtained is comprised are searched and uses The application program that number of times is most;
Using the application program that finds as the application program corresponding with the type of the file obtained.Need Bright, herein using application programs most for the access times corresponding with the type of file as with obtain The application program that the type of file is corresponding, can ensure that the most suitable application journey of use to a great extent Sequence accesses or opens file.
Alternatively, when receiving terminal does not obtains the application list corresponding with the type of this document, the party Method also includes: using the application program of acquiescence as the application program corresponding with the type of the file obtained.Need It is noted that the application program of acquiescence herein refers to by the application program of default.
Wherein, the application program that receiving terminal is determined by out accesses the file stored in the memory area of encryption Including:
Receiving terminal is according to the storage of the application program access encryption accessing safety code with determining received The file of storage in region;Including: according to the access safety code received, receiving terminal verifies that it is to this encryption The access rights of memory area;
When receiving terminal verifies it to the access rights success of the memory area of this encryption, enter this encryption Memory area also uses the application program determined to access the file of storage in the memory area of this encryption.Its In, when file during receiving terminal accesses the memory area of encryption, the prompting input of prompting frame can be ejected Access safety code and input is accessed the access safety code that safety code is corresponding with the memory area of this encryption Mate;When input being accessed the access safety code that safety code is corresponding with the memory area of this encryption When being made into merit, it is i.e. that receiving terminal is when verifying it to the access rights success of the memory area of this encryption.Such as figure Prompting frame shown in 4, prompting input password, when click determines, then receiving terminal will carry out password Checking, when being verified, then enters in the memory area of encryption, now can access (or checking) and add The file of storage in close memory area.
Illustrate, in prior art, in order to ensure the safety of a certain file, this document place can be given File (memory area) password is set, can carry when accessing this and being provided with file of password Show input password and verify, just allowing after being verified to access the file in file.
In embodiment of the present invention, the encryption corresponding with the access safety code received is set by receiving terminal Memory area and in the memory area of this encryption store file, and by when receiving terminal detect from When body restarts, the memory area of encryption is formatted by receiving terminal, thus it is outside to reduce use Storage device and make receiving terminal infect virus risk, reduce the risk that file gets compromised, improve use Family is experienced.
Fig. 5 is the flow chart that the present invention processes the embodiment of the method for file, as it is shown in figure 5, include:
Step 501: when transmitting terminal detects that user needs to transmit file, transmitting terminal is according to current time Information generates and accesses safety code.
Wherein it is possible to according to triple DEAs (3DES) AES or message digest algorithm (MD) current time information is encrypted and accesses safety code to generate by 5 AESs.Wherein, Current time information includes current time.
It should be noted that about how according to 3DES AES or md5 encryption algorithm to currently Temporal information is encrypted and belongs to well-known to those skilled in the art used with generation access safety code By technological means, here is omitted, is not intended to limit the present invention.It addition, except above-mentioned 3DES Outside AES or md5 encryption algorithm, the application can also use other AES to current time Information is encrypted and accesses safety code to generate, and does not repeats them here.
Step 502: the access safety code of generation is sent to receiving terminal by transmitting terminal.
Wherein, the access safety code of generation is sent to connect by transmitting terminal by near-field communication (NFC) function Receiving end.
Step 503: receiving terminal receives the access safety code sent from transmitting terminal by NFC function.
Step 504: receiving terminal is arranged and the memory area accessing encryption corresponding to safety code received.
This step specifically includes: receiving terminal creates a file and use receives at self memory area Access safety code to create file be encrypted.
Step 505: receiving terminal notice transmitting terminal sends user needs the file of transmission.
Wherein, receiving terminal sends user by NFC function notice transmitting terminal needs the file of transmission.
Step 506: user is needed the file of transmission to be sent to receiving terminal by transmitting terminal.
Wherein, user is needed the file of transmission to send out by bluetooth (Bluetooth) or Wifi by transmitting terminal Give receiving terminal.
Step 507: receiving terminal receives, by bluetooth or Wifi, the user sent from transmitting terminal needs transmission File.
Step 508: the file received is stored to corresponding with the access safety code received by receiving terminal The memory area of encryption.
Step 509: receiving terminal obtains the type of the file stored in the memory area of encryption.
Step 510: receiving terminal determines the application program corresponding with the type of the file obtained.
This step specifically includes: receiving terminal obtain the application list corresponding with the type of this document and The access times of each application program that the application list is comprised;
The access times of each application program that the application list obtained is comprised are searched and uses The application program that number of times is most;
Using the application program that finds as the application program corresponding with the type of the file obtained.Need Bright, herein using application programs most for the access times corresponding with the type of file as with obtain The application program that the type of file is corresponding, can ensure that the most suitable application journey of use to a great extent Sequence accesses or opens file.
Alternatively, when receiving terminal does not obtains the application list corresponding with the type of this document, the party Method also includes: using the application program of acquiescence as the application program corresponding with the type of the file obtained.Need It is noted that the application program of acquiescence herein refers to by the application program of default.
Step 511: the application program that receiving terminal is determined by out accesses storage in the memory area encrypted File.
This step specifically includes: receiving terminal accesses safety code and the application program determined according to receive Access the file of storage in the memory area of encryption;Including: receiving terminal is according to the access safety code received Verify its access rights to the memory area of this encryption;
When receiving terminal verifies it to the access rights success of the memory area of this encryption, enter this encryption Memory area also uses the application program determined to access the file of storage in the memory area of this encryption.Its In, when file during receiving terminal accesses the memory area of encryption, the prompting input of prompting frame can be ejected Access safety code and input is accessed the access safety code that safety code is corresponding with the memory area of this encryption Mate;When input being accessed the access safety code that safety code is corresponding with the memory area of this encryption When being made into merit, it is i.e. that receiving terminal is when verifying it to the access rights success of the memory area of this encryption.Such as figure Prompting frame shown in 4, prompting input password, when click determines, then receiving terminal will carry out password Checking, when being verified, then enters in the memory area of encryption, now can access (or checking) and add The file of storage in close memory area.
Illustrate, in prior art, in order to ensure the safety of a certain file, this document place can be given File (memory area) password is set, can carry when accessing this and being provided with file of password Show input password and verify, just allowing after being verified to access the file in file.
Step 512: when receiving terminal detects that self restarts, receiving terminal is by the memory area of encryption Format.
It should be noted that the process that the memory area of encryption is formatted by receiving terminal is i.e. to delete to be somebody's turn to do The process of the file of storage in the memory area of encryption.
Fig. 6 is the schematic diagram that the present invention arranges the memory area of encryption, as shown in Figure 6, and including:
First, user selects to need to transmit file on transmitting terminal;Secondly, transmitting terminal is according to current time Information generates and accesses safety code and by NFC function, the access safety code of generation be sent to receiving terminal; Then, receiving terminal is received by NFC function and accesses safety code, and arranges and the access safety received The memory area of the encryption that code is corresponding;Then, receiving terminal notice transmitting terminal sends user needs the literary composition of transmission Part;Finally, user is needed the file of transmission to send out by bluetooth (Bluetooth) or Wifi by transmitting terminal Give receiving terminal.
Fig. 7 is the structural representation of transmitting terminal of the present invention, as it is shown in fig. 7, comprises: detection module 10, Generation module the 11, first sending module 12 and the first receiver module 13.Wherein,
Detection module 10, for when detecting that user needs to transmit file, notifying generation module 11.
Generation module 11, for receiving the notice of self-detection module 10, according to current time information Generate and access safety code and notify the first sending module 12.
First sending module 12, for receiving the notice from generation module 11, the access that will generate Safety code is sent to receiving terminal;Receive the notice from the first receiver module, user is needed transmission File is sent to receiving terminal.
Alternatively, the first sending module 12 includes the first near-field communication NFC unit 220, for by raw The access safety code become is sent to receiving terminal.
Alternatively, the first sending module 12 also includes the first bluetooth unit 221, for user being needed The file of transmission is sent to receiving terminal;Or,
First sending module 12 also includes a Wifi unit 222, for user needs the literary composition of transmission Part is sent to receiving terminal.
First receiver module 13, needs the file of transmission for receiving the user that sends from receiving terminal Notice, notify the first sending module 12.
Alternatively, above-mentioned receiving terminal can be mobile terminal.As mobile phone or computer or other electronics produce Product.
Fig. 8 is the structural representation of transmitting terminal of the present invention, as shown in Figure 8, including: the second receiver module 20, module 21 and the second sending module 22 are set.Wherein,
Second receiver module 20, for receiving the access safety code from transmitting terminal, notice arranges module 21;Receive from the user of transmitting terminal need the file of transmission and the file received is stored to reception The memory area accessing encryption corresponding to safety code arrived.
Alternatively, the second receiver module 20 includes the second near-field communication NFC module 320, is used for receiving Access safety code from transmitting terminal.
Alternatively, the second receiver module 20 also includes the second bluetooth unit 321, is used for receiving receiving terminal The user sent by bluetooth needs the file of transmission;Or,
Second receiver module 20 also includes the 2nd Wifi unit 322, is used for receiving receiving terminal and passes through Wifi The user sent needs the file of transmission.
Module 21 is set, for receiving the notice from the second receiver module 20, arranges and receive The memory area accessing encryption corresponding to safety code.
Second sending module 22, for notifying that transmitting terminal sends user and needs the file of transmission.
Alternatively, this receiving terminal also includes processing module 23, for when self affiliated reception being detected When end restarts, the memory area of encryption is formatted.
Alternatively, receiving terminal also includes acquisition module 24, determines module 25 and access modules 26;Wherein,
Acquisition module 24, the type of the file of storage in the memory area obtaining encryption;
Determine module 25, for determining the application program corresponding with the type of file of acquisition;
Access modules 26, the application program for being determined by out accesses in the memory area encrypted and stores File.
Wherein, access modules 26, specifically for accessing safety code and answering of determining according to receive With the file of storage in the memory area of routine access encryption.
Wherein it is determined that module 25, specifically for obtaining the Application Column corresponding with the type of this document The access times of each application program that table and the application list are comprised;
The access times of each application program that the application list obtained is comprised are searched and uses The application program that number of times is most;
Using the application program that finds as the application program corresponding with the type of the file obtained.Need Bright, herein using application programs most for the access times corresponding with the type of file as with obtain The application program that the type of file is corresponding, can ensure that the most suitable application journey of use to a great extent Sequence accesses or opens file.
Alternatively, receiving terminal also includes application management module 27, for storing self affiliated receiving terminal In each application information and access times;Correspondingly,
Determine module 25, specifically for: to application management module 27 send carry file type please Ask;Receive the application list corresponding to the type with this document that application management module 27 returns and The access times of each application program that the application list is comprised.
Optionally it is determined that module 25, also particularly useful for ought not obtaining answer corresponding with the type of this document When using program listing, using the application program of acquiescence as the application journey corresponding with the type of the file obtained Sequence.It should be noted that the application program of acquiescence herein refers to by the application program of default.
Wherein, access modules 26, specifically for accessing safety code and answering of determining according to receive With the file of storage in the memory area of routine access encryption;Including: according to the access safety code received Verify its access rights to the memory area of this encryption;
When verifying it to the access rights success of the memory area of this encryption, enter the memory block of this encryption Territory also uses the application program determined to access the file of storage in the memory area of this encryption.
Alternatively, above-mentioned receiving terminal can be to share multimedia equipment.
It should be noted that in this article, term " include ", " comprising " or its any other become Body is intended to comprising of nonexcludability, so that include the process of a series of key element, method, article Or device not only includes those key elements, but also includes other key elements being not expressly set out, or Also include the key element intrinsic for this process, method, article or device.There is no more restriction In the case of, statement " including ... " key element limited, it is not excluded that including the mistake of this key element Journey, method, article or device there is also other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step in said method can pass through journey Sequence instructs related hardware (such as processor) and completes, and described program can be stored in computer-readable and deposit In storage media, such as read only memory, disk or CD etc..Alternatively, the whole or portion of above-described embodiment One or more integrated circuit can also be used step by step to realize.Correspondingly, each in above-described embodiment Module/unit can realize to use the form of hardware, such as, realize its corresponding function by integrated circuit, The form that can also use software function module realizes, such as, perform to be stored in memorizer by processor Program/instruction realize its corresponding function.The present invention is not restricted to the hardware of any particular form and soft The combination of part.
These are only the preferred embodiment of the application, not thereby limit the scope of the claims of the application, every Utilize equivalent structure or equivalence flow process conversion that present specification and accompanying drawing content made, or directly or Connect and be used in other relevant technical fields, be the most in like manner included in the scope of patent protection of the application.

Claims (13)

1. the method processing file, it is characterised in that including:
When transmitting terminal detects that user needs to transmit file, transmitting terminal generates according to current time information and visits Pay one's respects all-key the access safety code of generation is sent to receiving terminal;
Receiving terminal arranges the memory area of the encryption corresponding with the access safety code received and notifies to send End sends user needs the file of transmission;
Receiving terminal receives the user sent from transmitting terminal needs the file transmitted the file that will receive Store the memory area to the encryption corresponding with the access safety code received.
Method the most according to claim 1, it is characterised in that described method also includes: when connecing Receiving end detects when self restarts, and the memory area of encryption is formatted by receiving terminal.
Method the most according to claim 1, it is characterised in that described transmitting terminal is led to by near field The access safety code of described generation is sent to described receiving terminal by news NFC function.
4. according to the method described in claim 1 or 3, it is characterised in that will connect at described receiving terminal The file received stores after the memory area of the encryption corresponding with the access safety code received, in institute State receiving terminal to will be stored in carrying out form with the memory area accessing encryption corresponding to safety code received Before change, the method also includes:
Described receiving terminal obtains the type of the described file stored in the memory area of described encryption;
Described receiving terminal determines the application program corresponding with the type of the described file obtained;
The memory area of the described application program described encryption of access that described receiving terminal is determined by out is deposited The described file of storage.
Method the most according to claim 4, it is characterised in that described receiving terminal is determined by out Described application program access described encryption memory area in storage described file include:
Described receiving terminal is visited according to the described access safety code received and the described application program determined Ask the described file of storage in the memory area of described encryption.
6. a transmitting terminal, it is characterised in that including: detection module, generation module, the first transmission Module and the first receiver module;Wherein,
Detection module, for when detecting that user needs to transmit file, notifying generation module;
Generation module, for receiving the notice of self-detection module, generates according to current time information and visits Pay one's respects all-key notify the first sending module;
First sending module, for receiving the notice from generation module, the access safety code that will generate It is sent to receiving terminal;Receive the notice from the first receiver module, user needs the file of transmission send out Give receiving terminal;
First receiver module, needs leading to of the file transmitted for receiving the transmission user from receiving terminal Know, notify the first sending module.
Transmitting terminal the most according to claim 6, it is characterised in that described first sending module bag Include the first near-field communication NFC unit, for the access safety code of described generation is sent to described reception End.
Transmitting terminal the most according to claim 7, it is characterised in that described first sending module is also Including the first bluetooth unit, for user needs the file of transmission be sent to described receiving terminal;Or,
Described first sending module also includes a Wifi unit, for user needs the file of transmission It is sent to described receiving terminal.
9. a receiving terminal, it is characterised in that including: the second receiver module, module and second is set Sending module;Wherein,
Second receiver module, for receiving the access safety code from transmitting terminal, notice arranges module;Connect Receive from the user of transmitting terminal need the file of transmission and the file received is stored to receive Access the memory area of encryption corresponding to safety code;
Module is set, for receiving the notice from the second receiver module, the access arranging and receiving The memory area of the encryption that safety code is corresponding;
Second sending module, for notifying that transmitting terminal sends user and needs the file of transmission.
Receiving terminal the most according to claim 9, it is characterised in that described receiving terminal also includes: Processing module, for when detecting that self affiliated receiving terminal restarts, by the memory area of encryption Format.
11. receiving terminals according to claim 9, it is characterised in that described second receiver module bag Include the second near-field communication NFC module, for receiving the access safety code from described transmitting terminal.
12. according to the receiving terminal described in claim 9 or 11, it is characterised in that described receiving terminal is also Including acquisition module, determine module and access modules;Wherein,
Described acquisition module, the class of the described file of storage in the memory area obtaining described encryption Type;
Described determine module, for determining the application program corresponding with the type of the described file of acquisition;
Described access modules, the described application program for being determined by out accesses the memory block of described encryption The described file of storage in territory.
13. receiving terminals according to claim 12, it is characterised in that described access modules, tool Body is used for: add described in the described application program access determined according to the described access safety code received The described file of storage in close memory area.
CN201610244751.7A 2016-04-19 2016-04-19 File processing method, sending terminal and receiving terminal Pending CN105956418A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610244751.7A CN105956418A (en) 2016-04-19 2016-04-19 File processing method, sending terminal and receiving terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610244751.7A CN105956418A (en) 2016-04-19 2016-04-19 File processing method, sending terminal and receiving terminal

Publications (1)

Publication Number Publication Date
CN105956418A true CN105956418A (en) 2016-09-21

Family

ID=56917952

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610244751.7A Pending CN105956418A (en) 2016-04-19 2016-04-19 File processing method, sending terminal and receiving terminal

Country Status (1)

Country Link
CN (1) CN105956418A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905535A (en) * 2014-03-17 2014-07-02 深圳市中兴移动通信有限公司 File transmission method and device and terminal
CN104732162A (en) * 2015-04-02 2015-06-24 努比亚技术有限公司 File encryption processing method and device
CN105262790A (en) * 2015-09-08 2016-01-20 捷开通讯科技(上海)有限公司 File transmission method for mobile terminal
CN105472038A (en) * 2016-01-07 2016-04-06 腾讯科技(深圳)有限公司 Control method, control apparatus and control system for file transmission

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905535A (en) * 2014-03-17 2014-07-02 深圳市中兴移动通信有限公司 File transmission method and device and terminal
CN104732162A (en) * 2015-04-02 2015-06-24 努比亚技术有限公司 File encryption processing method and device
CN105262790A (en) * 2015-09-08 2016-01-20 捷开通讯科技(上海)有限公司 File transmission method for mobile terminal
CN105472038A (en) * 2016-01-07 2016-04-06 腾讯科技(深圳)有限公司 Control method, control apparatus and control system for file transmission

Similar Documents

Publication Publication Date Title
CN104883658B (en) The processing method of virtual card information and system
CN104811865B (en) Audio-frequency inputting method, device and system
CN106130734A (en) The control method of mobile terminal and control device
CN106231087A (en) A kind of method and apparatus of positive and negative dual-screen display device false-touch prevention
CN105760057A (en) Screenshot device and method
CN104992101A (en) Mobile terminal desktop icon display method and device
CN104731512A (en) Method, device and terminal for sharing pictures
CN104731480A (en) Image display method and device based on touch screen
CN104836900A (en) Mobile terminal unlocking method and mobile terminal
CN106413128A (en) Projection method and mobile terminal
CN106304086A (en) Pseudo-base station recognition methods and device
CN106231587A (en) The data service changing method of mobile terminal and switching device
CN104951236A (en) Wallpaper configuration method for terminal device, and terminal device
CN106028090A (en) Mobile terminal and video recording method thereof
CN105631370A (en) Regional screen locking method and mobile terminal
CN105138871A (en) Unlocking method and apparatus for mobile terminal and mobile terminal
CN106250017A (en) A kind of mobile terminal and multitask management process
CN106254617A (en) A kind of mobile terminal and control method
CN106254439A (en) A kind of method for pushing, device and a kind of mobile device management system
CN106507343A (en) A kind of information processing method, mobile terminal and server
CN106161790A (en) A kind of mobile terminal and control method thereof
CN106227454B (en) A kind of touch trajectory detection system and method
CN105100217B (en) Multisystem shared data method and apparatus
CN105898183A (en) Method for controlling video call and mobile terminal
CN106550133A (en) Calling identification device and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160921

RJ01 Rejection of invention patent application after publication