CN105956418A - File processing method, sending terminal and receiving terminal - Google Patents
File processing method, sending terminal and receiving terminal Download PDFInfo
- Publication number
- CN105956418A CN105956418A CN201610244751.7A CN201610244751A CN105956418A CN 105956418 A CN105956418 A CN 105956418A CN 201610244751 A CN201610244751 A CN 201610244751A CN 105956418 A CN105956418 A CN 105956418A
- Authority
- CN
- China
- Prior art keywords
- file
- receiving terminal
- module
- access
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title abstract 3
- 238000000034 method Methods 0.000 claims description 55
- 230000005540 biological transmission Effects 0.000 claims description 45
- 238000004891 communication Methods 0.000 claims description 31
- 230000006870 function Effects 0.000 claims description 23
- 238000001514 detection method Methods 0.000 claims description 9
- 241000700605 Viruses Species 0.000 abstract description 4
- 230000000875 corresponding effect Effects 0.000 description 45
- 238000005516 engineering process Methods 0.000 description 7
- 238000010295 mobile communication Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000002123 temporal effect Effects 0.000 description 4
- 230000001010 compromised effect Effects 0.000 description 3
- 230000005236 sound signal Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 208000015181 infectious disease Diseases 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001629 suppression Effects 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 206010048669 Terminal state Diseases 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 239000009730 ganji Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 239000002574 poison Substances 0.000 description 1
- 231100000614 poison Toxicity 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
- 230000002463 transducing effect Effects 0.000 description 1
- 230000003612 virological effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
Abstract
The invention discloses a file processing method, a sending terminal and a receiving terminal, wherein the file processing method comprises the following steps: the sending terminal generates a an access safety code and sending the generated access safety code to the receiving terminal according to time information at present when a file is required to be transmitted by a user; the receiving terminal arranges an encrypted storage area corresponding to the received access safety code and notifies the sending terminal send the file required for transmitting by the user; the receiving terminal receives the file required for transmitting by the user sent by the user and stores the received file to an encrypted storage area corresponding to the received access safety code. According to the embodiment, virus risk and file divulgence risk is reduced, and user experience is improved.
Description
Technical field
The present embodiments relate to but be not limited to intelligent terminal's technology, a kind of process file method,
Transmitting terminal and receiving terminal.
Background technology
Shared multimedia equipment (computer and projector all can be had at company's meeting room or classroom
Deng), when generally using shared multimedia equipment, first by user in External memory equipment (USB flash disk etc.)
The file copy needed, to sharing in multimedia equipment, then accesses (opening) in shared multimedia equipment
The file that copy comes, the flow process of above-mentioned process file is loaded down with trivial details, and (outside is deposited to there is the viral risk of infection
The propagation of virus between storage equipment and shared multimedia equipment) and if file on shared device delete
There is also the risk divulged a secret not in time.
Summary of the invention
This application provides and a kind of process the method for file, transmitting terminal and receiving terminal, it is possible to reduce and infect disease
The risk that the risk of poison and reduction file get compromised, promotes Consumer's Experience.
In order to reach the application purpose, this application provides a kind of method processing file, including:
When transmitting terminal detects that user needs to transmit file, transmitting terminal generates according to current time information and visits
Pay one's respects all-key the access safety code of generation is sent to receiving terminal;
Receiving terminal arranges the memory area of the encryption corresponding with the access safety code received and notifies to send
End sends user needs the file of transmission;
Receiving terminal receives the user sent from transmitting terminal needs the file transmitted the file that will receive
Store the memory area to the encryption corresponding with the access safety code received.
Alternatively, when receiving terminal detects that self restarts, the memory area of encryption is entered by receiving terminal
Formatting lines.
Alternatively, described transmitting terminal passes through near-field communication NFC function by the access safety code of described generation
It is sent to described receiving terminal.
Alternatively, user is needed the file of transmission to be sent to institute by bluetooth or Wifi by described transmitting terminal
State receiving terminal.
Alternatively, described receiving terminal the file received stored to the access safety code pair received
After the memory area of the encryption answered, at the access safety code pair that described receiving terminal will be stored in and receives
Before the memory area of the encryption answered formats, the method also includes:
Described receiving terminal obtains the type of the described file stored in the memory area of described encryption;
Described receiving terminal determines the application program corresponding with the type of the described file obtained;
The memory area of the described application program described encryption of access that described receiving terminal is determined by out is deposited
The described file of storage.
Alternatively, the described application program that described receiving terminal is determined by out accesses the memory block of described encryption
In territory, the described file of storage includes:
Described receiving terminal is visited according to the described access safety code received and the described application program determined
Ask the described file of storage in the memory area of described encryption.
Present invention also provides a kind of transmitting terminal, including: detection module, generation module, the first transmission mould
Block and the first receiver module;Wherein,
Detection module, for when detecting that user needs to transmit file, notifying generation module;
Generation module, for receiving the notice of self-detection module, generates according to current time information and visits
Pay one's respects all-key notify the first sending module;
First sending module, for receiving the notice from generation module, the access safety code that will generate
It is sent to receiving terminal;Receive the notice from receiver module, user needs the file of transmission be sent to
Receiving terminal;
First receiver module, needs leading to of the file transmitted for receiving the transmission user from receiving terminal
Know, notify the first sending module.
Alternatively, described first sending module includes the first near-field communication NFC unit, for by described
The access safety code generated is sent to described receiving terminal.
Alternatively, described first sending module also includes the first bluetooth unit, for user needs transmission
File be sent to described receiving terminal;Or,
Described first sending module also includes a Wifi unit, for user needs the file of transmission
It is sent to described receiving terminal.
Present invention also provides a kind of receiving terminal, including: the second receiver module, module and second are set
Send module;Wherein,
Second receiver module, for receiving the access safety code from transmitting terminal, notice arranges module;Connect
Receive from the user of transmitting terminal need the file of transmission and the file received is stored to receive
Access the memory area of encryption corresponding to safety code;
Module is set, for receiving the notice from the second receiver module, the access arranging and receiving
The memory area of the encryption that safety code is corresponding;
Second sending module, for notifying that transmitting terminal sends user and needs the file of transmission.
Alternatively, described receiving terminal also includes processing module, for when self affiliated receiving terminal being detected
When restarting, the memory area of encryption is formatted.
Alternatively, described second receiver module includes the second near-field communication NFC module, is used for receiving
From the access safety code of described transmitting terminal.
Alternatively, described second receiver module also includes the second bluetooth unit, is used for receiving described receiving terminal
The user sent by bluetooth needs the file of transmission;Or,
Described second receiver module also includes the 2nd Wifi unit, is used for receiving described receiving terminal and passes through Wifi
The user sent needs the file of transmission.
Alternatively, described receiving terminal also includes acquisition module, determines module and access modules;Wherein,
Described acquisition module, the class of the described file of storage in the memory area obtaining described encryption
Type;
Described determine module, for determining the application program corresponding with the type of the described file of acquisition;
Described access modules, the described application program for being determined by out accesses the memory block of described encryption
The described file of storage in territory.
Alternatively, described access modules, specifically for: according to the described access safety code received with true
The described application program made accesses the described file stored in the memory area of described encryption.
The embodiment of the present invention includes: when transmitting terminal detect user need transmit file time, transmitting terminal according to
Current time information generates and accesses safety code and the access safety code of generation is sent to receiving terminal;Receiving terminal
The memory area accessing encryption corresponding to safety code that arranges and receive also notifies transmitting terminal transmission user
Need the file of transmission;Receiving terminal receives the user sent from transmitting terminal to be needed the file of transmission and will connect
The file received stores the memory area to the encryption corresponding with the access safety code received.The present invention is real
Execute example reduce the risk of infection virus and reduce the risk that file gets compromised, improve user's body
Test.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes of the application
Point, the schematic description and description of the present invention is used for explaining the present invention, is not intended that the present invention's
Improper restriction.In the accompanying drawings:
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention;
Fig. 2 is the schematic diagram of the communication system communicated between support mobile terminal of the present invention;
Fig. 3 is the flow chart that the present invention processes the method for file;
Fig. 4 is the schematic diagram of prompting frame of the present invention;
Fig. 5 is the flow chart that the present invention processes the embodiment of the method for file;
Fig. 6 is the schematic diagram that the present invention arranges the memory area of encryption;
Fig. 7 is the structural representation of transmitting terminal of the present invention;
Fig. 8 is the structural representation of transmitting terminal of the present invention.
Detailed description of the invention
Below in conjunction with drawings and Examples, technical scheme is described in detail.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description
In, use for represent element such as " module ", " parts " or " unit " suffix only for
Be conducive to the explanation of the present invention, itself do not have specific meaning.Therefore, " module " and " parts " can
Mixedly to use.
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can include
Such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (individual digital
Assistant), PAD (panel computer), PMP (portable media player), guider etc.
Mobile terminal and such as numeral TV, desk computer etc. fixed terminal.Hereinafter it is assumed that eventually
End is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for mobile purpose
Element outside, structure according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention.
Mobile terminal 100 can include wireless communication unit 110, A/V (audio/video) input block
120, user input unit 130, sensing unit 140, output unit 150, memorizer 160, interface
Unit 170, controller 180 and power subsystem 190 etc..Fig. 1 shows the shifting with various assembly
Dynamic terminal, it should be understood that be not required for implementing all assemblies illustrated.Can alternatively implement
More or less of assembly.Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows mobile terminal 100 and nothing
Radio communication between line communication system or network.Such as, wireless communication unit can include that broadcast connects
Receive module 111, mobile communication module 112, wireless Internet module 113, short range communication module 114
With at least one in positional information module 115.
Broadcast reception module 111 receives broadcast singal via broadcast channel from external broadcasting management server
And/or broadcast related information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast control
Server can be to generate and send broadcast singal and/or the server of broadcast related information or receive it
The broadcast singal of front generation and/or broadcast related information and send it to the server of terminal.Broadcast
Signal can include TV broadcast singal, radio signals, data broadcasting signal etc..And,
Broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Pass information can also provide via mobile communications network, and in this case, broadcast related information is permissible
Received by mobile communication module 112.Broadcast singal can exist in a variety of manners, and such as, it is permissible
Electronic program guides (EPG), digital video broadcast-handheld with DMB (DMB)
(DVB-H) form of electronic service guidebooks (ESG) etc. and exist.Broadcast reception module 111
Can broadcast by using various types of broadcast systems to receive signal.Especially, broadcast reception module
111 can be by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite
(DMB-S), DVB-hand-held (DVB-H), forward link media (MediaFLO@)
Radio Data System, the digit broadcasting system of received terrestrial digital broadcasting integrated service (ISDB-T) etc.
Receive digital broadcasting.Broadcast reception module 111 may be constructed such that be adapted to provide for broadcast singal various extensively
Broadcast system and above-mentioned digit broadcasting system.Via broadcast reception module 111 receive broadcast singal and/
Or broadcast related information can be stored in memorizer 160 (or other type of storage medium).
Mobile communication module 112 sends radio signals to base station (such as, access point, node B
Etc.), in exterior terminal and server at least one and/or receive from it radio signal.This
The radio signal of sample can include voice call signal, video calling signal or according to text and/
Or various types of data that Multimedia Message sends and/or receives.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be internal
Or externally it is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can include WLAN
(WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave access),
HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some of short-range communication technology are shown
Example includes bluetoothTM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB),
Purple honeybeeTMEtc..
Positional information module 115 is the module of positional information for checking or obtain mobile terminal.Position
The typical case of information module is GPS (global positioning system).According to current technology, GPS module
115 calculate from the range information of three or more satellites and correct time information and for calculating
Information application triangulation, thus according to longitude, latitude and highly accurately calculating three-dimensional current location
Information.Currently, for calculating method three satellites of use of position and temporal information and by using separately
An outer satellite corrects the position and the error of temporal information calculated.Additionally, GPS module 115
Velocity information can be calculated by Continuous plus current location information in real time.
A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can wrap
Include camera 121 and mike 122, camera 121 in Video Capture pattern or image capture mode by
Static images or the view data of video that image capture apparatus obtains process.Picture frame after process
May be displayed on display unit 151.Picture frame after camera 121 processes can be stored in memorizer
It is transmitted in 160 (or other storage mediums) or via wireless communication unit 110, can basis
The structure of mobile terminal provides two or more cameras 121.Mike 122 can telephone calling model,
Logging mode, speech recognition mode etc. operational mode receives sound (voice data) via mike,
And can be voice data by such acoustic processing.Audio frequency (voice) data after process can be
Be converted in the case of telephone calling model to be sent to mobile communication base via mobile communication module 112
The form output stood.Mike 122 can implement various types of noise eliminate (or suppression) algorithm with
Eliminate noise or interference that (or suppression) produces during receiving and send audio signal.
User input unit 130 can generate key input data to control to move according to the order of user's input
The various operations of dynamic terminal.User input unit 130 allows user to input various types of information, and
Can include that keyboard, metal dome, touch pad (such as, detect resistance, the pressure caused owing to being touched
The sensitive component of the change of power, electric capacity etc.), roller, rocking bar etc..Especially, when touch pad with
When the form of layer is superimposed upon on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (such as, mobile terminal 100
Open or close state), the position of mobile terminal 100, user for mobile terminal 100 contact (i.e.,
Touch input) presence or absence, the orientation of mobile terminal 100, the acceleration or deceleration of mobile terminal 100 move
With direction etc., and generate the order of operation for controlling mobile terminal 100 or signal.Such as,
When mobile terminal 100 is embodied as sliding-type mobile phone, sensing unit 140 can sense this sliding-type
Phone opens or cuts out.It addition, sensing unit 140 can detect whether power subsystem 190 provides
Whether electric power or interface unit 170 couple with external device (ED).Sensing unit 140 can include close to biography
This is described by sensor 1410 by combining touch screen below.
Interface unit 170 is used as at least one external device (ED) and is connected connecing of can passing through with mobile terminal 100
Mouthful.Such as, external device (ED) can include wired or wireless head-band earphone port, external power source (or electricity
Electrolytic battery charger) port, wired or wireless FPDP, memory card port, there is for connection identification mould
The port of the device of block, audio frequency input/output (I/O) port, video i/o port, ear port etc.
Deng.Identification module can be store for verify user use mobile terminal 100 various information and can
To include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module
(USIM) etc..It addition, the device (hereinafter referred to as " identifying device ") with identification module is permissible
Take the form of smart card, therefore, identify that device can be whole with mobile via port or other attachment means
End 100 connection.Interface unit 170 may be used for receiving input (such as, the data from external device (ED)
Information, electric power etc.) and the input received is transferred in mobile terminal 100 one or more
Element or may be used between mobile terminal and external device (ED) transmit data.
It addition, when mobile terminal 100 is connected with external base, interface unit 170 can serve as allowing
There is provided the path of mobile terminal 100 by electric power from base by it or can serve as allowing from base
The various command signals of input are transferred to the path of mobile terminal by it.Various orders from base input
Signal or electric power may serve as identifying whether mobile terminal is accurately fitted within the signal on base.Defeated
Go out unit 150 to be configured to provide output signal (such as, sound with vision, audio frequency and/or tactile manner
Frequently signal, video signal, alarm signal, vibration signal etc.).Output unit 150 can include showing
Show unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 100.Such as, when mobile whole
When end 100 is in telephone calling model, display unit 151 can show and call or other (example that communicates
As, text messaging, multimedia file download etc.) relevant user interface (UI) or figure use
Interface, family (GUI).When mobile terminal 100 is in video calling pattern or image capture mode,
Display unit 151 can show capture image and/or the image of reception, illustrate video or image and
UI or GUI of correlation function etc..
Meanwhile, when display unit 151 and touch pad the most superposed on one another with formed touch screen time,
Display unit 151 can serve as input equipment and output device.Display unit 151 can include liquid crystal
Show device (LCD), thin film transistor (TFT) LCD (TFT-LCD), Organic Light Emitting Diode (OLED)
At least one in display, flexible display, three-dimensional (3D) display etc..These display
In some may be constructed such that transparence with allow user from outside watch, this is properly termed as Transparence Display
Device, typical transparent display can for example, TOLED (transparent organic light emitting diode) display
Etc..According to the specific embodiment wanted, mobile terminal 100 can include that two or more displays are single
Unit's (or other display device), such as, mobile terminal can include outernal display unit (not shown)
With inner display unit (not shown).Touch screen can be used for detecting touch input pressure and touch input
Position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal receive pattern, call mode,
Time under the isotypes such as logging mode, speech recognition mode, broadcast reception mode, by wireless communication unit
110 receive or in memorizer 160 storage voice data transducing audio signal and be output as sound
Sound.And, the specific function that dio Output Modules 152 can provide to mobile terminal 100 performs is relevant
Audio frequency output (such as, call signal receive sound, message sink sound etc.).Audio frequency output mould
Block 152 can include speaker, buzzer etc..
Alarm unit 153 can provide output to notify event to mobile terminal 100.Typical case
Event can include calling receptions, message sink, key signals input, touch input etc..Except sound
Outside frequency or video frequency output, alarm unit 153 can provide output with notification event in a different manner
Occur.Such as, alarm unit 153 can provide output with the form of vibration, when receiving calling, disappearing
When breath or some other entrance communication (incoming communication), alarm unit 153 is permissible
There is provided sense of touch output (that is, vibration) to notify to user.By providing such sense of touch to export,
Even if when the mobile phone of user is in the pocket of user, user also is able to identify various event
Occur.Alarm unit 153 can also provide notice via display unit 151 or dio Output Modules 152
The output of the generation of event.
Memorizer 160 can store the process performed by controller 180 and control the software program etc. of operation
Deng, or can temporarily store oneself through output maybe will export data (such as, telephone directory, message,
Still image, video etc.).And, memorizer 160 can store and be applied to touch about when touch
The vibration of the various modes exported during screen and the data of audio signal.
Memorizer 160 can include that the storage medium of at least one type, described storage medium include dodging
Deposit, hard disk, multimedia card, card-type memorizer (such as, SD or DX memorizer etc.), random
Access memorizer (RAM), static random-access memory (SRAM), read only memory (ROM),
Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM),
Magnetic storage, disk, CD etc..And, mobile terminal 100 can be connected with by network to be held
The network storage device cooperation of the storage function of line storage 160.
Controller 180 generally controls the overall operation of mobile terminal.Such as, controller 180 performs and language
Control that sound call, data communication, video calling etc. are relevant and process.It addition, controller 180 can
To include the multi-media module 181 for reproducing (or playback) multi-medium data, multi-media module 181
Can construct in controller 180, or it is so structured that separate with controller 180.Controller 180
Pattern recognition process can be performed, draw input with the handwriting input that will perform on the touchscreen or picture
It is identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides
Operate the suitable electric power needed for each element and assembly.
Various embodiment described herein can be to use such as computer software, hardware or its any group
The computer-readable medium closed is implemented.Implementing for hardware, embodiment described herein can pass through
Use application-specific IC (ASIC), digital signal processor (DSP), Digital Signal Processing
Device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA),
Processor, controller, microcontroller, microprocessor, it is designed to perform the electricity of function described herein
At least one in subelement is implemented, and in some cases, such embodiment can be at controller
Implement in 180.Implementing for software, the embodiment of such as process or function can perform extremely with permission
The single software module of few a kind of function or operation is implemented.Software code can be by with any suitable
The software application (or program) that programming language is write is implemented, and software code can be stored in storage
Perform in device 160 and by controller 180.
So far, oneself is through describing mobile terminal according to its function.Below, for the sake of brevity, will describe
Various types of mobile terminals of such as folded form, board-type, oscillating-type, slide type mobile terminal etc.
In slide type mobile terminal as example.Therefore, the present invention can be applied to any kind of mobile whole
End, and it is not limited to slide type mobile terminal.
Mobile terminal 100 may be constructed such that utilization is via frame or packet transmission data as shown in Figure 1
The most wired and wireless communication system and satellite-based communication system operate.
The communication system being wherein operable to according to the mobile terminal of the present invention is described referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer.Such as, by communicating
System use air interface include such as frequency division multiple access (FDMA), time division multiple acess (TDMA),
CDMA (CDMA) and UMTS (UMTS) (especially, Long Term Evolution
(LTE)), global system for mobile communications (GSM) etc..As non-limiting example, below
Description relates to cdma communication system, but such teaching is equally applicable to other type of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 100, multiple base station
(BS) 270, base station controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280
It is configured to form interface with Public Switched Telephony Network (PSTN) 290.MSC280 is also structured to
With the BSC275 formation interface that can be couple to base station 270 via back haul link.Back haul link can root
If constructing according to any one in the interface that Ganji knows, described interface includes such as E1/T1, ATM, IP,
PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system as shown in Figure 2
Multiple BSC2750 can be included.
Each BS270 can service one or more subregion (or region), by multidirectional antenna or sensing
Each subregion that the antenna of specific direction covers is radially away from BS270.Or, each subregion is permissible
Covered by two or more antennas for diversity reception.Each BS270 may be constructed such that support is many
Individual frequency is distributed, and the distribution of each frequency has specific frequency spectrum (such as, 1.25MHz, 5MHz etc.).
Intersecting that subregion and frequency are distributed can be referred to as CDMA Channel.BS270 can also be referred to as
Base station transceiver subsystem (BTS) or other equivalent terms.In this case, term " base
Stand and " may be used for broadly representing single BSC275 and at least one BS270.Base station can also be claimed
For " cellular station ".Or, each subregion of specific BS270 can be referred to as multiple cellular station.
As shown in Figure 2, broadcast singal is sent in system operate by broadcsting transmitter (BT) 295
Mobile terminal 100.Broadcast reception module 111 is arranged on mobile terminal 100 as shown in Figure 1
Sentence and receive the broadcast singal sent by BT295.In fig. 2 it is shown that several global positioning systems
(GPS) satellite 300.Satellite 300 helps to position at least one in multiple mobile terminals 100.
In fig. 2, depict multiple satellite 300, it is understood that be, it is possible to use any number of
Satellite obtains useful location information.As shown in Figure 1 GPS module 115 be generally configured to
Satellite 300 coordinates the location information wanted with acquisition.Substitute GPS tracking technique or follow the tracks of at GPS
Outside technology, it is possible to use other technology of the position of mobile terminal can be followed the tracks of.It addition, at least one
Gps satellite 300 can optionally or additionally process satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives from various mobile terminals 100
Reverse link signal.Mobile terminal 100 generally participates in call, information receiving and transmitting communicates with other type of.
Each reverse link signal that certain base station 270 receives is processed in specific BS270.Obtain
Data be forwarded to the BSC275 that is correlated with.BSC provides call resource distribution and includes between BS270
The mobile management function of coordination of soft switching process.The data received also are routed to by BSC275
MSC280, it provides the extra route service for forming interface with PSTN290.Similarly,
PSTN290 Yu MSC280 forms interface, MSC Yu BSC275 forms interface, and BSC275
Correspondingly control BS270 forward link signals to be sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each is implemented to propose the inventive method
Example.
Fig. 3 is the flow chart that the present invention processes the method for file, as it is shown on figure 3, include:
Step 301: when transmitting terminal detects that user needs to transmit file, transmitting terminal is according to current time
Information generates and accesses safety code and the access safety code of generation is sent to receiving terminal.
Wherein it is possible to according to triple DEAs (3DES) AES or message digest algorithm
(MD) current time information is encrypted and accesses safety code to generate by 5 AESs.Wherein,
Current time information includes current time.
It should be noted that about how according to 3DES AES or md5 encryption algorithm to currently
Temporal information is encrypted and belongs to well-known to those skilled in the art used with generation access safety code
By technological means, here is omitted, is not intended to limit the present invention.It addition, except above-mentioned 3DES
Outside AES or md5 encryption algorithm, the application can also use other AES to current time
Information is encrypted and accesses safety code to generate, and does not repeats them here.
Wherein, the access safety code of generation is sent to connect by transmitting terminal by near-field communication (NFC) function
Receiving end.Such as by the Android Beam of NFC, the access safety code of generation is sent to receiving terminal,
Wherein, Android Beam is a New function done based on NFC, and this function can be other
The function that terminals share present terminal is currently in use.
Step 302: receiving terminal is arranged with the memory area accessing encryption corresponding to safety code received also
Notice transmitting terminal sends user needs the file of transmission.
Alternatively, after step 301, before step 302, the method also includes: receiving terminal leads to
Cross NFC function and receive the access safety code sent from transmitting terminal.
Wherein, receiving terminal sends user by NFC function notice transmitting terminal needs the file of transmission.
Step 303: receiving terminal receives the user sent from transmitting terminal to be needed the file of transmission and will receive
To file store to the memory area accessing encryption corresponding to safety code received.
Alternatively, after step 302, before step 303, the method also includes: transmitting terminal will
User needs the file of transmission to be sent to receiving terminal.Wherein, transmitting terminal by bluetooth (Bluetooth) or
User is needed the file of transmission to be sent to receiving terminal by Wifi.
Wherein, receiving terminal receives, by bluetooth or Wifi, the user sent from transmitting terminal needs transmission
File.
Alternatively, also include after the method: when receiving terminal detects that self restarts, receiving terminal
The memory area of encryption is formatted.
It should be noted that the process that the memory area of encryption is formatted by receiving terminal is i.e. to delete to be somebody's turn to do
The process of the file of storage in the memory area of encryption.
Alternatively, after step 303, before the memory area of encryption is formatted by receiving terminal,
The method also includes:
Receiving terminal obtains the type of the file stored in the memory area of encryption;
Receiving terminal determines the application program corresponding with the type of the file obtained;
The application program that receiving terminal is determined by out accesses the file stored in the memory area of encryption.
Wherein, receiving terminal determines that the application program corresponding with the type of the file obtained includes: receiving terminal obtains
Take the application list corresponding with the type of this document and the application list is comprised that each should
With the access times of program;
The access times of each application program that the application list obtained is comprised are searched and uses
The application program that number of times is most;
Using the application program that finds as the application program corresponding with the type of the file obtained.Need
Bright, herein using application programs most for the access times corresponding with the type of file as with obtain
The application program that the type of file is corresponding, can ensure that the most suitable application journey of use to a great extent
Sequence accesses or opens file.
Alternatively, when receiving terminal does not obtains the application list corresponding with the type of this document, the party
Method also includes: using the application program of acquiescence as the application program corresponding with the type of the file obtained.Need
It is noted that the application program of acquiescence herein refers to by the application program of default.
Wherein, the application program that receiving terminal is determined by out accesses the file stored in the memory area of encryption
Including:
Receiving terminal is according to the storage of the application program access encryption accessing safety code with determining received
The file of storage in region;Including: according to the access safety code received, receiving terminal verifies that it is to this encryption
The access rights of memory area;
When receiving terminal verifies it to the access rights success of the memory area of this encryption, enter this encryption
Memory area also uses the application program determined to access the file of storage in the memory area of this encryption.Its
In, when file during receiving terminal accesses the memory area of encryption, the prompting input of prompting frame can be ejected
Access safety code and input is accessed the access safety code that safety code is corresponding with the memory area of this encryption
Mate;When input being accessed the access safety code that safety code is corresponding with the memory area of this encryption
When being made into merit, it is i.e. that receiving terminal is when verifying it to the access rights success of the memory area of this encryption.Such as figure
Prompting frame shown in 4, prompting input password, when click determines, then receiving terminal will carry out password
Checking, when being verified, then enters in the memory area of encryption, now can access (or checking) and add
The file of storage in close memory area.
Illustrate, in prior art, in order to ensure the safety of a certain file, this document place can be given
File (memory area) password is set, can carry when accessing this and being provided with file of password
Show input password and verify, just allowing after being verified to access the file in file.
In embodiment of the present invention, the encryption corresponding with the access safety code received is set by receiving terminal
Memory area and in the memory area of this encryption store file, and by when receiving terminal detect from
When body restarts, the memory area of encryption is formatted by receiving terminal, thus it is outside to reduce use
Storage device and make receiving terminal infect virus risk, reduce the risk that file gets compromised, improve use
Family is experienced.
Fig. 5 is the flow chart that the present invention processes the embodiment of the method for file, as it is shown in figure 5, include:
Step 501: when transmitting terminal detects that user needs to transmit file, transmitting terminal is according to current time
Information generates and accesses safety code.
Wherein it is possible to according to triple DEAs (3DES) AES or message digest algorithm
(MD) current time information is encrypted and accesses safety code to generate by 5 AESs.Wherein,
Current time information includes current time.
It should be noted that about how according to 3DES AES or md5 encryption algorithm to currently
Temporal information is encrypted and belongs to well-known to those skilled in the art used with generation access safety code
By technological means, here is omitted, is not intended to limit the present invention.It addition, except above-mentioned 3DES
Outside AES or md5 encryption algorithm, the application can also use other AES to current time
Information is encrypted and accesses safety code to generate, and does not repeats them here.
Step 502: the access safety code of generation is sent to receiving terminal by transmitting terminal.
Wherein, the access safety code of generation is sent to connect by transmitting terminal by near-field communication (NFC) function
Receiving end.
Step 503: receiving terminal receives the access safety code sent from transmitting terminal by NFC function.
Step 504: receiving terminal is arranged and the memory area accessing encryption corresponding to safety code received.
This step specifically includes: receiving terminal creates a file and use receives at self memory area
Access safety code to create file be encrypted.
Step 505: receiving terminal notice transmitting terminal sends user needs the file of transmission.
Wherein, receiving terminal sends user by NFC function notice transmitting terminal needs the file of transmission.
Step 506: user is needed the file of transmission to be sent to receiving terminal by transmitting terminal.
Wherein, user is needed the file of transmission to send out by bluetooth (Bluetooth) or Wifi by transmitting terminal
Give receiving terminal.
Step 507: receiving terminal receives, by bluetooth or Wifi, the user sent from transmitting terminal needs transmission
File.
Step 508: the file received is stored to corresponding with the access safety code received by receiving terminal
The memory area of encryption.
Step 509: receiving terminal obtains the type of the file stored in the memory area of encryption.
Step 510: receiving terminal determines the application program corresponding with the type of the file obtained.
This step specifically includes: receiving terminal obtain the application list corresponding with the type of this document and
The access times of each application program that the application list is comprised;
The access times of each application program that the application list obtained is comprised are searched and uses
The application program that number of times is most;
Using the application program that finds as the application program corresponding with the type of the file obtained.Need
Bright, herein using application programs most for the access times corresponding with the type of file as with obtain
The application program that the type of file is corresponding, can ensure that the most suitable application journey of use to a great extent
Sequence accesses or opens file.
Alternatively, when receiving terminal does not obtains the application list corresponding with the type of this document, the party
Method also includes: using the application program of acquiescence as the application program corresponding with the type of the file obtained.Need
It is noted that the application program of acquiescence herein refers to by the application program of default.
Step 511: the application program that receiving terminal is determined by out accesses storage in the memory area encrypted
File.
This step specifically includes: receiving terminal accesses safety code and the application program determined according to receive
Access the file of storage in the memory area of encryption;Including: receiving terminal is according to the access safety code received
Verify its access rights to the memory area of this encryption;
When receiving terminal verifies it to the access rights success of the memory area of this encryption, enter this encryption
Memory area also uses the application program determined to access the file of storage in the memory area of this encryption.Its
In, when file during receiving terminal accesses the memory area of encryption, the prompting input of prompting frame can be ejected
Access safety code and input is accessed the access safety code that safety code is corresponding with the memory area of this encryption
Mate;When input being accessed the access safety code that safety code is corresponding with the memory area of this encryption
When being made into merit, it is i.e. that receiving terminal is when verifying it to the access rights success of the memory area of this encryption.Such as figure
Prompting frame shown in 4, prompting input password, when click determines, then receiving terminal will carry out password
Checking, when being verified, then enters in the memory area of encryption, now can access (or checking) and add
The file of storage in close memory area.
Illustrate, in prior art, in order to ensure the safety of a certain file, this document place can be given
File (memory area) password is set, can carry when accessing this and being provided with file of password
Show input password and verify, just allowing after being verified to access the file in file.
Step 512: when receiving terminal detects that self restarts, receiving terminal is by the memory area of encryption
Format.
It should be noted that the process that the memory area of encryption is formatted by receiving terminal is i.e. to delete to be somebody's turn to do
The process of the file of storage in the memory area of encryption.
Fig. 6 is the schematic diagram that the present invention arranges the memory area of encryption, as shown in Figure 6, and including:
First, user selects to need to transmit file on transmitting terminal;Secondly, transmitting terminal is according to current time
Information generates and accesses safety code and by NFC function, the access safety code of generation be sent to receiving terminal;
Then, receiving terminal is received by NFC function and accesses safety code, and arranges and the access safety received
The memory area of the encryption that code is corresponding;Then, receiving terminal notice transmitting terminal sends user needs the literary composition of transmission
Part;Finally, user is needed the file of transmission to send out by bluetooth (Bluetooth) or Wifi by transmitting terminal
Give receiving terminal.
Fig. 7 is the structural representation of transmitting terminal of the present invention, as it is shown in fig. 7, comprises: detection module 10,
Generation module the 11, first sending module 12 and the first receiver module 13.Wherein,
Detection module 10, for when detecting that user needs to transmit file, notifying generation module 11.
Generation module 11, for receiving the notice of self-detection module 10, according to current time information
Generate and access safety code and notify the first sending module 12.
First sending module 12, for receiving the notice from generation module 11, the access that will generate
Safety code is sent to receiving terminal;Receive the notice from the first receiver module, user is needed transmission
File is sent to receiving terminal.
Alternatively, the first sending module 12 includes the first near-field communication NFC unit 220, for by raw
The access safety code become is sent to receiving terminal.
Alternatively, the first sending module 12 also includes the first bluetooth unit 221, for user being needed
The file of transmission is sent to receiving terminal;Or,
First sending module 12 also includes a Wifi unit 222, for user needs the literary composition of transmission
Part is sent to receiving terminal.
First receiver module 13, needs the file of transmission for receiving the user that sends from receiving terminal
Notice, notify the first sending module 12.
Alternatively, above-mentioned receiving terminal can be mobile terminal.As mobile phone or computer or other electronics produce
Product.
Fig. 8 is the structural representation of transmitting terminal of the present invention, as shown in Figure 8, including: the second receiver module
20, module 21 and the second sending module 22 are set.Wherein,
Second receiver module 20, for receiving the access safety code from transmitting terminal, notice arranges module
21;Receive from the user of transmitting terminal need the file of transmission and the file received is stored to reception
The memory area accessing encryption corresponding to safety code arrived.
Alternatively, the second receiver module 20 includes the second near-field communication NFC module 320, is used for receiving
Access safety code from transmitting terminal.
Alternatively, the second receiver module 20 also includes the second bluetooth unit 321, is used for receiving receiving terminal
The user sent by bluetooth needs the file of transmission;Or,
Second receiver module 20 also includes the 2nd Wifi unit 322, is used for receiving receiving terminal and passes through Wifi
The user sent needs the file of transmission.
Module 21 is set, for receiving the notice from the second receiver module 20, arranges and receive
The memory area accessing encryption corresponding to safety code.
Second sending module 22, for notifying that transmitting terminal sends user and needs the file of transmission.
Alternatively, this receiving terminal also includes processing module 23, for when self affiliated reception being detected
When end restarts, the memory area of encryption is formatted.
Alternatively, receiving terminal also includes acquisition module 24, determines module 25 and access modules 26;Wherein,
Acquisition module 24, the type of the file of storage in the memory area obtaining encryption;
Determine module 25, for determining the application program corresponding with the type of file of acquisition;
Access modules 26, the application program for being determined by out accesses in the memory area encrypted and stores
File.
Wherein, access modules 26, specifically for accessing safety code and answering of determining according to receive
With the file of storage in the memory area of routine access encryption.
Wherein it is determined that module 25, specifically for obtaining the Application Column corresponding with the type of this document
The access times of each application program that table and the application list are comprised;
The access times of each application program that the application list obtained is comprised are searched and uses
The application program that number of times is most;
Using the application program that finds as the application program corresponding with the type of the file obtained.Need
Bright, herein using application programs most for the access times corresponding with the type of file as with obtain
The application program that the type of file is corresponding, can ensure that the most suitable application journey of use to a great extent
Sequence accesses or opens file.
Alternatively, receiving terminal also includes application management module 27, for storing self affiliated receiving terminal
In each application information and access times;Correspondingly,
Determine module 25, specifically for: to application management module 27 send carry file type please
Ask;Receive the application list corresponding to the type with this document that application management module 27 returns and
The access times of each application program that the application list is comprised.
Optionally it is determined that module 25, also particularly useful for ought not obtaining answer corresponding with the type of this document
When using program listing, using the application program of acquiescence as the application journey corresponding with the type of the file obtained
Sequence.It should be noted that the application program of acquiescence herein refers to by the application program of default.
Wherein, access modules 26, specifically for accessing safety code and answering of determining according to receive
With the file of storage in the memory area of routine access encryption;Including: according to the access safety code received
Verify its access rights to the memory area of this encryption;
When verifying it to the access rights success of the memory area of this encryption, enter the memory block of this encryption
Territory also uses the application program determined to access the file of storage in the memory area of this encryption.
Alternatively, above-mentioned receiving terminal can be to share multimedia equipment.
It should be noted that in this article, term " include ", " comprising " or its any other become
Body is intended to comprising of nonexcludability, so that include the process of a series of key element, method, article
Or device not only includes those key elements, but also includes other key elements being not expressly set out, or
Also include the key element intrinsic for this process, method, article or device.There is no more restriction
In the case of, statement " including ... " key element limited, it is not excluded that including the mistake of this key element
Journey, method, article or device there is also other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step in said method can pass through journey
Sequence instructs related hardware (such as processor) and completes, and described program can be stored in computer-readable and deposit
In storage media, such as read only memory, disk or CD etc..Alternatively, the whole or portion of above-described embodiment
One or more integrated circuit can also be used step by step to realize.Correspondingly, each in above-described embodiment
Module/unit can realize to use the form of hardware, such as, realize its corresponding function by integrated circuit,
The form that can also use software function module realizes, such as, perform to be stored in memorizer by processor
Program/instruction realize its corresponding function.The present invention is not restricted to the hardware of any particular form and soft
The combination of part.
These are only the preferred embodiment of the application, not thereby limit the scope of the claims of the application, every
Utilize equivalent structure or equivalence flow process conversion that present specification and accompanying drawing content made, or directly or
Connect and be used in other relevant technical fields, be the most in like manner included in the scope of patent protection of the application.
Claims (13)
1. the method processing file, it is characterised in that including:
When transmitting terminal detects that user needs to transmit file, transmitting terminal generates according to current time information and visits
Pay one's respects all-key the access safety code of generation is sent to receiving terminal;
Receiving terminal arranges the memory area of the encryption corresponding with the access safety code received and notifies to send
End sends user needs the file of transmission;
Receiving terminal receives the user sent from transmitting terminal needs the file transmitted the file that will receive
Store the memory area to the encryption corresponding with the access safety code received.
Method the most according to claim 1, it is characterised in that described method also includes: when connecing
Receiving end detects when self restarts, and the memory area of encryption is formatted by receiving terminal.
Method the most according to claim 1, it is characterised in that described transmitting terminal is led to by near field
The access safety code of described generation is sent to described receiving terminal by news NFC function.
4. according to the method described in claim 1 or 3, it is characterised in that will connect at described receiving terminal
The file received stores after the memory area of the encryption corresponding with the access safety code received, in institute
State receiving terminal to will be stored in carrying out form with the memory area accessing encryption corresponding to safety code received
Before change, the method also includes:
Described receiving terminal obtains the type of the described file stored in the memory area of described encryption;
Described receiving terminal determines the application program corresponding with the type of the described file obtained;
The memory area of the described application program described encryption of access that described receiving terminal is determined by out is deposited
The described file of storage.
Method the most according to claim 4, it is characterised in that described receiving terminal is determined by out
Described application program access described encryption memory area in storage described file include:
Described receiving terminal is visited according to the described access safety code received and the described application program determined
Ask the described file of storage in the memory area of described encryption.
6. a transmitting terminal, it is characterised in that including: detection module, generation module, the first transmission
Module and the first receiver module;Wherein,
Detection module, for when detecting that user needs to transmit file, notifying generation module;
Generation module, for receiving the notice of self-detection module, generates according to current time information and visits
Pay one's respects all-key notify the first sending module;
First sending module, for receiving the notice from generation module, the access safety code that will generate
It is sent to receiving terminal;Receive the notice from the first receiver module, user needs the file of transmission send out
Give receiving terminal;
First receiver module, needs leading to of the file transmitted for receiving the transmission user from receiving terminal
Know, notify the first sending module.
Transmitting terminal the most according to claim 6, it is characterised in that described first sending module bag
Include the first near-field communication NFC unit, for the access safety code of described generation is sent to described reception
End.
Transmitting terminal the most according to claim 7, it is characterised in that described first sending module is also
Including the first bluetooth unit, for user needs the file of transmission be sent to described receiving terminal;Or,
Described first sending module also includes a Wifi unit, for user needs the file of transmission
It is sent to described receiving terminal.
9. a receiving terminal, it is characterised in that including: the second receiver module, module and second is set
Sending module;Wherein,
Second receiver module, for receiving the access safety code from transmitting terminal, notice arranges module;Connect
Receive from the user of transmitting terminal need the file of transmission and the file received is stored to receive
Access the memory area of encryption corresponding to safety code;
Module is set, for receiving the notice from the second receiver module, the access arranging and receiving
The memory area of the encryption that safety code is corresponding;
Second sending module, for notifying that transmitting terminal sends user and needs the file of transmission.
Receiving terminal the most according to claim 9, it is characterised in that described receiving terminal also includes:
Processing module, for when detecting that self affiliated receiving terminal restarts, by the memory area of encryption
Format.
11. receiving terminals according to claim 9, it is characterised in that described second receiver module bag
Include the second near-field communication NFC module, for receiving the access safety code from described transmitting terminal.
12. according to the receiving terminal described in claim 9 or 11, it is characterised in that described receiving terminal is also
Including acquisition module, determine module and access modules;Wherein,
Described acquisition module, the class of the described file of storage in the memory area obtaining described encryption
Type;
Described determine module, for determining the application program corresponding with the type of the described file of acquisition;
Described access modules, the described application program for being determined by out accesses the memory block of described encryption
The described file of storage in territory.
13. receiving terminals according to claim 12, it is characterised in that described access modules, tool
Body is used for: add described in the described application program access determined according to the described access safety code received
The described file of storage in close memory area.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610244751.7A CN105956418A (en) | 2016-04-19 | 2016-04-19 | File processing method, sending terminal and receiving terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610244751.7A CN105956418A (en) | 2016-04-19 | 2016-04-19 | File processing method, sending terminal and receiving terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105956418A true CN105956418A (en) | 2016-09-21 |
Family
ID=56917952
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610244751.7A Pending CN105956418A (en) | 2016-04-19 | 2016-04-19 | File processing method, sending terminal and receiving terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105956418A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905535A (en) * | 2014-03-17 | 2014-07-02 | 深圳市中兴移动通信有限公司 | File transmission method and device and terminal |
CN104732162A (en) * | 2015-04-02 | 2015-06-24 | 努比亚技术有限公司 | File encryption processing method and device |
CN105262790A (en) * | 2015-09-08 | 2016-01-20 | 捷开通讯科技(上海)有限公司 | File transmission method for mobile terminal |
CN105472038A (en) * | 2016-01-07 | 2016-04-06 | 腾讯科技(深圳)有限公司 | Control method, control apparatus and control system for file transmission |
-
2016
- 2016-04-19 CN CN201610244751.7A patent/CN105956418A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905535A (en) * | 2014-03-17 | 2014-07-02 | 深圳市中兴移动通信有限公司 | File transmission method and device and terminal |
CN104732162A (en) * | 2015-04-02 | 2015-06-24 | 努比亚技术有限公司 | File encryption processing method and device |
CN105262790A (en) * | 2015-09-08 | 2016-01-20 | 捷开通讯科技(上海)有限公司 | File transmission method for mobile terminal |
CN105472038A (en) * | 2016-01-07 | 2016-04-06 | 腾讯科技(深圳)有限公司 | Control method, control apparatus and control system for file transmission |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104883658B (en) | The processing method of virtual card information and system | |
CN104811865B (en) | Audio-frequency inputting method, device and system | |
CN106130734A (en) | The control method of mobile terminal and control device | |
CN106231087A (en) | A kind of method and apparatus of positive and negative dual-screen display device false-touch prevention | |
CN105760057A (en) | Screenshot device and method | |
CN104992101A (en) | Mobile terminal desktop icon display method and device | |
CN104731512A (en) | Method, device and terminal for sharing pictures | |
CN104731480A (en) | Image display method and device based on touch screen | |
CN104836900A (en) | Mobile terminal unlocking method and mobile terminal | |
CN106413128A (en) | Projection method and mobile terminal | |
CN106304086A (en) | Pseudo-base station recognition methods and device | |
CN106231587A (en) | The data service changing method of mobile terminal and switching device | |
CN104951236A (en) | Wallpaper configuration method for terminal device, and terminal device | |
CN106028090A (en) | Mobile terminal and video recording method thereof | |
CN105631370A (en) | Regional screen locking method and mobile terminal | |
CN105138871A (en) | Unlocking method and apparatus for mobile terminal and mobile terminal | |
CN106250017A (en) | A kind of mobile terminal and multitask management process | |
CN106254617A (en) | A kind of mobile terminal and control method | |
CN106254439A (en) | A kind of method for pushing, device and a kind of mobile device management system | |
CN106507343A (en) | A kind of information processing method, mobile terminal and server | |
CN106161790A (en) | A kind of mobile terminal and control method thereof | |
CN106227454B (en) | A kind of touch trajectory detection system and method | |
CN105100217B (en) | Multisystem shared data method and apparatus | |
CN105898183A (en) | Method for controlling video call and mobile terminal | |
CN106550133A (en) | Calling identification device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160921 |
|
RJ01 | Rejection of invention patent application after publication |