CN106372521B - A kind of data run method and device - Google Patents
A kind of data run method and device Download PDFInfo
- Publication number
- CN106372521B CN106372521B CN201610862171.4A CN201610862171A CN106372521B CN 106372521 B CN106372521 B CN 106372521B CN 201610862171 A CN201610862171 A CN 201610862171A CN 106372521 B CN106372521 B CN 106372521B
- Authority
- CN
- China
- Prior art keywords
- data
- terminal equipment
- run
- designated identification
- operation permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
This application involves mobile communication technology field more particularly to a kind of data run method and devices, when solving the user data of transmission between terminal devices existing in the prior art, the low problem of safety;Method provided by the embodiments of the present application includes: that first terminal equipment receives data and designated identification corresponding with the operation permission of the data that second terminal equipment is sent;Judge the first terminal equipment identify whether it is consistent with the designated identification;If consistent, the data are then run according to the operation permission of the data, in this way, first terminal equipment be only capable of operation second terminal equipment send with the consistent data of self identification, if it is the data of other terminal devices forwardings that first terminal equipment is received, it can then cause because designated identification corresponding to forwarding data is inconsistent with first terminal device identification, first terminal equipment does not have permission operation forwarding data, thus can improve safety when transmitting user data between terminal device well.
Description
Technical field
This application involves field of communication technology more particularly to a kind of data run method and devices.
Background technique
It takes pictures currently, terminal device can be used in user, and the picture of shooting can be sent to good friend.For example,
Sometimes user can select to shoot the certificate information of oneself with terminal device, and send it to good friend, so that good friend is based on being somebody's turn to do
Certificate information is that the user handles some affairs.
The picture of terminal device shooting is related to privacy sometimes, such as the identity card picture shot.User may only want to
Specified recipient checks the identity card picture, and the identity card picture is not intended to be forwarded to other terminal devices, causes body
Part information leakage.Currently, terminal device after the picture of shooting is sent to specified receiving device, can not also limit the reception
Equipment is forwarded.
As it can be seen that how to improve safety when transmitting user data between terminal device, becomes urgently to be solved at present and ask
Topic.
Summary of the invention
The embodiment of the present application provides a kind of data run method and device, to solve in the prior art terminal device it
Between transmit user data when, the low problem of safety.
A kind of method of data run provided by the embodiments of the present application, comprising:
First terminal equipment receives the data and corresponding with the operation permission of the data that second terminal equipment is sent
Designated identification;
Judge first terminal equipment identify whether it is consistent with designated identification;
If consistent, the data are run according to the operation permission of the data.
Optionally, the method also includes:
If the mark of first terminal equipment is inconsistent with designated identification, the data are deleted.
Optionally, the data are run according to the operation permission of the data, comprising:
The encrypted data are decrypted, the data are run after successful decryption.
Optionally, the data are run according to the operation permission of the data, comprising:
The data after coding are decoded, the data are run after successfully decoded.
The embodiment of the present application also provides a kind of method of data run, comprising:
Second terminal equipment generates data and designated identification corresponding with the operation permission of the data to be sent;
The data and designated identification are sent to first terminal equipment.
Optionally, data to be sent are generated, comprising:
The data after generating the encrypted data, or coding.
A kind of device of data run provided by the embodiments of the present application, comprising:
Receiving module, for receiving the data and corresponding with the operation permission of the data of second terminal equipment transmission
Designated identification;
Judgment module, for judge the first terminal equipment identify whether it is consistent with the designated identification;
Module is run, for after the mark for determining the first terminal equipment is consistent with the designated identification, according to institute
The operation permission for stating data runs the data.
Optionally, described device further include:
Removing module, for deleting after the mark and the designated identification for determining the first terminal equipment are inconsistent
The data.
Optionally, operation module is specifically used for:
The encrypted data are decrypted, the data are run after successful decryption.
Optionally, operation module is specifically used for:
The data after coding are decoded, the data are run after successfully decoded.
The device of another data run provided by the embodiments of the present application, comprising:
Generation module, for generating data to be sent and specified mark corresponding with the operation permission of the data
Know;
Sending module, for the data and the designated identification to be sent to first terminal equipment.
Optionally, generation module is specifically used for:
The data after generating the encrypted data, or coding.
In the embodiment of the present application, when first terminal equipment receives the data that second terminal equipment is sent, also receive and the number
According to the corresponding designated identification of operation permission, if it is determined that the mark of first terminal equipment is consistent with designated identification, then can root
The data are run according to the operation permission of the data.In the embodiment of the present application, first terminal equipment is for the data that receive, only
When the corresponding designated identification of operation permission of the data is consistent with the mark of first terminal equipment, the number can be just run
According to, that is, first terminal equipment is only capable of the specified data for being sent to oneself of operation second terminal equipment;If first terminal equipment connects
What is received is the data of other terminal device forwardings, then can be because of designated identification and first corresponding to the operation permission for forwarding data
The mark of terminal device is inconsistent, and first terminal equipment is caused to be unable to run the forwarding data;Similarly, if first terminal
Equipment is by the specified data forwarding for sending oneself of second terminal equipment to other terminal devices, and other terminal devices are as number
According to operation permission corresponding to designated identification and the mark of itself it is inconsistent and be unable to run the data.As it can be seen that the application is real
The method for applying example can avoid well user data from arbitrarily being forwarded by other terminal devices and user information is caused to be revealed, and
Safety when transmitting user data between terminal device can be improved.
Detailed description of the invention
Fig. 1 is data run method flow diagram provided by the embodiments of the present application;
Fig. 2 is data run structure drawing of device provided by the embodiments of the present application;
Fig. 3 is another data run structure drawing of device provided by the embodiments of the present application.
Specific embodiment
In the embodiment of the present application, when first terminal equipment receives the data that second terminal equipment is sent, also receive and the number
According to the corresponding designated identification of operation permission, if it is determined that the mark of first terminal equipment is consistent with designated identification, then can root
The data are run according to the operation permission of the data.In the embodiment of the present application, first terminal equipment is for the data that receive, only
When the corresponding designated identification of operation permission of the data is consistent with the mark of first terminal equipment, the number can be just run
According to, that is, first terminal equipment is only capable of the specified data for being sent to oneself of operation second terminal equipment;If first terminal equipment connects
What is received is the data of other terminal device forwardings, then can be because of designated identification and first corresponding to the operation permission for forwarding data
The mark of terminal device is inconsistent, and first terminal equipment is caused to be unable to run the forwarding data;Similarly, if first terminal
Equipment is by the specified data forwarding for sending oneself of second terminal equipment to other terminal devices, and other terminal devices are as number
According to operation permission corresponding to designated identification and the mark of itself it is inconsistent and be unable to run the data.As it can be seen that the application is real
The method for applying example can avoid well user data from arbitrarily being forwarded by other terminal devices and user information is caused to be revealed, and
Safety when transmitting user data between terminal device can be improved.
The embodiment of the present application is described in further detail with reference to the accompanying drawings of the specification.
As shown in Figure 1, being data run method flow diagram provided by the embodiments of the present application, comprising the following steps:
S101: first terminal equipment receives the data that second terminal equipment is sent and the operation permission phase with the data
Corresponding designated identification.
In the specific implementation process, it when second terminal equipment sends data to first terminal equipment, can not only treat
It sends data to be handled, the data that obtain that treated, and can determine corresponding with the operation permission of data to be sent
Designated identification, finally, treated data and designated identification corresponding with the operation permission of the data are sent to first eventually
End equipment.Wherein, data to be sent are carried out handling can be encrypting data to be sent, is also possible to number to be sent
It is encoded according to according to preset coding mode;Designated identification can carry in the recognize program code of automatic running,
The recognize program code has the permission for running the data.Preferably, designated identification can be the world of first terminal equipment
Mobile device identifies (International Mobile Equipment Identity, IMEI), alternatively, sequence number (Serial
Number, S/N).
In above process, designated identification is carried in the recognize program code of automatic running, can be and specifies this
Mark directly carries in recognize program code, is also possible to first handle the designated identification using default processing mode,
By treated, designated identification information is carried in recognize program code again.It specifically, for example, can be straight by designated identification AAA
Carrying is connect in recognize program code, designated identification AAA can also be handled, for example calculate the cryptographic Hash of the designated identification
BB later carries cryptographic Hash BB in recognize program code, and then by recognize program code and treated one starting of data
Give first terminal equipment.
Preferably, first terminal equipment receives the data that second terminal equipment is sent and the operation permission with the data
After corresponding designated identification, the recognize program code for carrying designated identification be can be automatically operated.Specifically, recognize program code
Can first terminal equipment user select check data when automatic running, identification journey can also be received in first terminal equipment
It is automatic running after sequence code.
In the specific implementation process, if the received data of first terminal equipment include pictorial information, running permission can
To refer to the permission for opening the picture;If the received data packet of first terminal equipment contains bank account information, running permission can
To refer to the permission for checking the bank account information.
S102: judge first terminal equipment identify whether it is consistent with designated identification.
Preferably, the mark of first terminal equipment can be IMEI or S/N, and in the specific implementation process, the mark of use
Type is consistent with above-mentioned designated identification.In addition, two kinds in S101 are carried with the side of designated identification using recognize program code
Formula, judge first terminal equipment identify whether it is different with the consistent process of designated identification.In the following, to both modes
Deterministic process is introduced respectively.
It uses the example above, if designated identification directly carries in recognize program code, recognize program code is extracted specified
AAA is identified, and reads the mark of first terminal equipment, and then judges designated identification AAA and the mark of first terminal equipment is
It is no consistent;If designated identification AAA is carried in recognize program code after treatment, recognize program code can read
The mark of one terminal device does same processing to the mark of first terminal equipment, for example calculates its cryptographic Hash, later, compares
Whether the cryptographic Hash of designated identification AAA is consistent with the cryptographic Hash of the mark of first terminal equipment.
S103: it if the mark of first terminal equipment is consistent with designated identification, is run according to the operation permission of the data
The data.
In the specific implementation process, according to data run permission operation data, it can be and encrypted data are solved
It is close, the data are run after successful decryption;It is also possible to be decoded the data after coding, the number is run after successfully decoded
According to.
Specifically, if it is encrypted data that first terminal equipment is received, in the mark for determining first terminal equipment
After knowledge is consistent with designated identification, recognize program code can be decrypted encrypted data;If first terminal equipment
Received is using the data after preset coding mode coding, then recognize program code can also use preset
Decoding process is decoded the data after coding.
In the specific implementation process, it when the mark of first terminal equipment and designated identification are inconsistent, can delete described
Data, at this point it is possible to which running the recognize program code deletes the data.In addition, working as the mark and finger of first terminal equipment
When calibration knows inconsistent, the data can not also be deleted, only prevent the data from showing in first terminal equipment, this
When, it can show a cartoon picture, in first terminal equipment to prompt user's data to be unable to run.
In the embodiment of the present application, when first terminal equipment receives the data that second terminal equipment is sent, also receive and the number
According to the corresponding designated identification of operation permission, if it is determined that the mark of first terminal equipment is consistent with designated identification, then can root
The data are run according to the operation permission of the data.In the embodiment of the present application, first terminal equipment is for the data that receive, only
When the corresponding designated identification of operation permission of the data is consistent with the mark of first terminal equipment, the number can be just run
According to, that is, first terminal equipment is only capable of the specified data for being sent to oneself of operation second terminal equipment;If first terminal equipment connects
What is received is the data of other terminal device forwardings, then can be because of designated identification and first corresponding to the operation permission for forwarding data
The mark of terminal device is inconsistent, and first terminal equipment is caused to be unable to run the forwarding data;Similarly, if first terminal
Equipment is by the specified data forwarding for sending oneself of second terminal equipment to other terminal devices, and other terminal devices are as number
According to operation permission corresponding to designated identification and the mark of itself it is inconsistent and be unable to run the data.As it can be seen that the application is real
The method for applying example can avoid well user data from arbitrarily being forwarded by other terminal devices and user information is caused to be revealed, and
Safety when transmitting user data between terminal device can be improved.
Embodiment two
Below by taking first terminal equipment receives the pictorial information that second terminal equipment is sent as an example, the above process is carried out detailed
It describes in detail bright.
It in the specific implementation process, can be with when second terminal equipment is before sending pictorial information to first terminal equipment
Picture is encoded using preset mode, later, is believed according to the picture of first terminal equipment being identified as after encoding
Breath generates designated identification, finally, the pictorial information after coding and the recognize program code for carrying designated identification are sent to first
Terminal device;Wherein, preset coding mode is different from daily widely applied coding mode, only using specific solution
Code mode can just be decoded the pictorial information after above-mentioned coding, and specific decoding process can be carried in recognizer
In code, i.e., the picture after above-mentioned coding can be just only opened using the recognize program code for carrying specific decoding process
Information.
In addition, when second terminal equipment to first terminal equipment transmission be plurality of pictures information when because for coding after
Pictorial information generate designated identification it is the same, second terminal equipment may be specified quantity pictorial information generate one finger
Calibration know, at this point, second terminal equipment can also the pictorial information to specified quantity only send a recognize program code, this
Sample, the picture after can greatly reducing second terminal equipment repeatedly and being coding generate designated identification, generate recognize program code
Operation, and the memory space of first terminal equipment can be saved.
In the specific implementation process, first terminal equipment receive second terminal equipment send coding after pictorial information with
And after recognize program code, the recognize program code for carrying designated identification be can be automatically operated, and be executed: read first terminal equipment
Mark, and compared with the designated identification of carrying, if the mark of first terminal equipment is consistent with designated identification, first
Terminal device possesses the permission for opening the pictorial information, and further, recognize program code can be using specific decoding side
Formula is decoded the pictorial information, and then opens picture;If the mark of first terminal equipment and designated identification are inconsistent,
Then determine that first terminal equipment does not have the permission for opening the pictorial information, recognize program code can be straight by the pictorial information
Connect deletion.
It, can be with when second terminal equipment sends pictorial information to first terminal equipment in addition, in the specific implementation process
Picture is encrypted using designated identification, and designated identification is carried in recognize program code, with encrypted picture
Information sends jointly to first terminal equipment, and after receiving pictorial information and designated identification, carrying refers to first terminal equipment
Calibrate know recognize program code, can in first terminal equipment automatic running, read first terminal equipment mark, it
Afterwards, encrypted picture is decrypted in the mark of the first terminal equipment based on reading, if the mark of first terminal equipment
It is consistent with designated identification, then successful decryption, then user can check the picture in first terminal equipment;If first
The mark of terminal device is inconsistent with designated identification, then decrypts and fail, then user cannot just look into first terminal equipment
See the picture.
Preferably, the combination as both the above mode, second terminal equipment sends pictorial information to first terminal equipment
When, the picture can be encoded in such a way that first use is preset, the pictorial information after coding is carried out again later
Encryption, finally, by treated pictorial information and carrying the recognize program code of designated identification again and sending jointly to first eventually
End equipment, further, first terminal equipment is in pictorial information and the recognizer generation for receiving the transmission of second terminal equipment
After code, the recognize program code for carrying designated identification be can be automatically operated, and be executed: the mark of first terminal equipment is read, and
And it compares with designated identification, if the mark of first terminal equipment is consistent with designated identification, can execute to picture
The operation that information is decoded;If the mark of first terminal equipment and designated identification are inconsistent, picture letter can be deleted
Breath.
In the embodiment of the present application, when first terminal equipment receives the data that second terminal equipment is sent, also receive and the number
According to the corresponding designated identification of operation permission, if it is determined that the mark of first terminal equipment is consistent with designated identification, then can root
The data are run according to the operation permission of the data.In the embodiment of the present application, first terminal equipment is for the data that receive, only
When the corresponding designated identification of operation permission of the data is consistent with the mark of first terminal equipment, the number can be just run
According to, that is, first terminal equipment is only capable of the specified data for being sent to oneself of operation second terminal equipment;If first terminal equipment connects
What is received is the data of other terminal device forwardings, then can be because of designated identification and first corresponding to the operation permission for forwarding data
The mark of terminal device is inconsistent, and first terminal equipment is caused to be unable to run the forwarding data;Similarly, if first terminal
Equipment is by the specified data forwarding for sending oneself of second terminal equipment to other terminal devices, and other terminal devices are as number
According to operation permission corresponding to designated identification and the mark of itself it is inconsistent and be unable to run the data.As it can be seen that the application is real
The method for applying example can avoid well user data from arbitrarily being forwarded by other terminal devices and user information is caused to be revealed, and
Safety when transmitting user data between terminal device can be improved.
Based on the same inventive concept, a kind of data fortune corresponding with data run method is additionally provided in the embodiment of the present application
Luggage is set, since the principle that the device solves the problems, such as is similar to the embodiment of the present application data run method, the reality of the device
The implementation for the method for may refer to is applied, overlaps will not be repeated.
As shown in Fig. 2, being 20 structure chart of data run device provided by the embodiments of the present application, comprising:
Receiving module 201, for receive second terminal equipment transmission data and with the operation permission phase of the data
Corresponding designated identification;
Judgment module 202, for judge the first terminal equipment identify whether it is consistent with the designated identification;
Module 203 is run, for after the mark for determining the first terminal equipment is consistent with the designated identification, according to
The operation permission of the data runs the data.
Optionally, described device further include:
Removing module 204, for deleting after the mark and the designated identification for determining the first terminal equipment are inconsistent
Except the data.
Optionally, operation module 203 is specifically used for:
The encrypted data are decrypted, the data are run after successful decryption.
Optionally, operation module 203 is specifically used for:
The data after coding are decoded, the data are run after successfully decoded.
As shown in figure 3, being another 30 schematic diagram of data run device provided by the embodiments of the present application, comprising:
Generation module 301, for generating data to be sent and corresponding with the operation permission of the data specified
Mark;
Sending module 302, for the data and the designated identification to be sent to first terminal equipment.
Optionally, generation module 301 is specifically used for:
The data after generating the encrypted data, or coding.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is process of the reference according to method, apparatus (system) and computer program product of the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
Claims (12)
1. a kind of data run method, which is characterized in that this method comprises:
First terminal equipment receives the data and finger corresponding with the operation permission of the data that second terminal equipment is sent
Calibration is known, and the designated identification carries in recognize program code;
Recognize program code described in automatic running executes: judging identifying whether and the designated identification for the first terminal equipment
Unanimously;
If consistent, the data are run according to the operation permission of the data;
Wherein, if the first terminal equipment forwards the data to other terminal devices, the operation power of the data
The corresponding designated identification of limit and the mark of other terminal devices are inconsistent, and other terminal devices are unable to run the data.
2. the method as described in claim 1, which is characterized in that the method also includes:
If the mark of the first terminal equipment is inconsistent with designated identification, the data are deleted.
3. the method as described in claim 1, which is characterized in that run the data, packet according to the operation permission of the data
It includes:
The encrypted data are decrypted, the data are run after successful decryption.
4. the method as described in claim 1, which is characterized in that run the data, packet according to the operation permission of the data
It includes:
The data after coding are decoded, the data are run after successfully decoded.
5. a kind of data run method, which is characterized in that this method comprises:
Second terminal equipment generates data and designated identification corresponding with the operation permission of the data to be sent, described
Designated identification carries in recognize program code;
The data and the recognize program code are sent to first terminal equipment, make the first terminal equipment automatic running
The recognize program code executes: judge the first terminal equipment identify whether it is consistent with the designated identification;If consistent,
The data are then run according to the operation permission of the data, wherein if the first terminal equipment forwards the data on
To other terminal devices, then designated identification and the mark of other terminal devices corresponding to the operation permission of the data are different
It causes, other terminal devices are unable to run the data.
6. method as claimed in claim 5, which is characterized in that described to generate data to be sent, comprising:
The data after generating the encrypted data, or coding.
7. a kind of data run device, which is characterized in that the device includes:
Receiving module, for receiving the data and finger corresponding with the operation permission of the data that second terminal equipment is sent
Calibration is known, and the designated identification carries in recognize program code;
Judgment module is executed for recognize program code described in automatic running: judge first terminal equipment identify whether and institute
It is consistent to state designated identification;
Module is run, for after the mark for determining the first terminal equipment is consistent with the designated identification, according to the number
According to operation permission run the data, wherein set if the first terminal equipment forwards the data to other terminals
Standby, then designated identification and the mark of other terminal devices corresponding to the operation permission of the data are inconsistent, and other terminals are set
It is standby to be unable to run the data.
8. device as claimed in claim 7, which is characterized in that described device further include:
Removing module, for after the mark that determines the first terminal equipment and the designated identification are inconsistent, described in deletion
Data.
9. device as claimed in claim 7, which is characterized in that the operation module is specifically used for:
The encrypted data are decrypted, the data are run after successful decryption.
10. device as claimed in claim 7, which is characterized in that the operation module is specifically used for:
The data after coding are decoded, the data are run after successfully decoded.
11. a kind of data run device, which is characterized in that the device includes:
Generation module, for generating data and designated identification corresponding with the operation permission of the data to be sent, institute
Designated identification is stated to carry in recognize program code;
Sending module makes first end for the data and the recognize program code to be sent to first terminal equipment
Recognize program code described in end equipment automatic running executes: judging identifying whether and the specified mark for the first terminal equipment
Know consistent;If consistent, the data are run according to the operation permission of the data, wherein if the first terminal equipment
Other terminal devices are forwarded the data to, then designated identification corresponding to the operation permission of the data is set with other terminals
Standby mark is inconsistent, and other terminal devices are unable to run the data.
12. device as claimed in claim 11, which is characterized in that the generation module is specifically used for:
The data after generating the encrypted data, or coding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610862171.4A CN106372521B (en) | 2016-09-28 | 2016-09-28 | A kind of data run method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610862171.4A CN106372521B (en) | 2016-09-28 | 2016-09-28 | A kind of data run method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106372521A CN106372521A (en) | 2017-02-01 |
CN106372521B true CN106372521B (en) | 2019-11-08 |
Family
ID=57897114
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610862171.4A Active CN106372521B (en) | 2016-09-28 | 2016-09-28 | A kind of data run method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106372521B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113254029B (en) * | 2020-12-30 | 2024-02-02 | 深圳怡化电脑股份有限公司 | Peripheral interface setting method and device of terminal equipment and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103618710A (en) * | 2013-11-25 | 2014-03-05 | 北京奇虎科技有限公司 | Individual processing method and device of file between mobile device and computing device |
CN103902916A (en) * | 2012-12-25 | 2014-07-02 | 联想(北京)有限公司 | Processing method and electronic device |
CN104507080A (en) * | 2014-11-19 | 2015-04-08 | 广东欧珀移动通信有限公司 | File processing method and terminal |
CN105187560A (en) * | 2015-09-29 | 2015-12-23 | 北京奇艺世纪科技有限公司 | Cloud server-based data pushing method and device |
-
2016
- 2016-09-28 CN CN201610862171.4A patent/CN106372521B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103902916A (en) * | 2012-12-25 | 2014-07-02 | 联想(北京)有限公司 | Processing method and electronic device |
CN103618710A (en) * | 2013-11-25 | 2014-03-05 | 北京奇虎科技有限公司 | Individual processing method and device of file between mobile device and computing device |
CN104507080A (en) * | 2014-11-19 | 2015-04-08 | 广东欧珀移动通信有限公司 | File processing method and terminal |
CN105187560A (en) * | 2015-09-29 | 2015-12-23 | 北京奇艺世纪科技有限公司 | Cloud server-based data pushing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106372521A (en) | 2017-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107749848B (en) | Internet of things data processing method and device and Internet of things system | |
US20220353085A1 (en) | Secure distributed information system for public device authentication | |
KR102477453B1 (en) | Transaction messaging | |
CN104079581B (en) | Identity identifying method and equipment | |
CN104685825B (en) | A kind of method of secure communication, computing device and non-transient computer readable storage medium storing program for executing | |
CN104980278B (en) | The method and apparatus for verifying the availability of biometric image | |
US20170142087A1 (en) | Device authentication agent | |
CN101789866B (en) | High-reliability safety isolation and information exchange method | |
CN105490997B (en) | Safe checking method, device, terminal and server | |
CN106096424B (en) | A kind of pair of local data carries out encryption method and terminal | |
CN104660589A (en) | Method and system for controlling encryption of information and analyzing information as well as terminal | |
KR101581599B1 (en) | Binding a removable module to an access terminal | |
CN105184567B (en) | Processing method, processing unit and the mobile terminal of information | |
CN105721156B (en) | Data are carried out with the method and relevant device of coding and digital signature | |
CN106817346B (en) | Data transmission method and device and electronic equipment | |
CN109729000B (en) | Instant messaging method and device | |
CN107196907A (en) | A kind of guard method of Android SO files and device | |
CN107948186A (en) | A kind of safety certifying method and device | |
CN106789024A (en) | A kind of remote de-locking method, device and system | |
CN107154916A (en) | A kind of authentication information acquisition methods, offer method and device | |
CN111031535A (en) | Secure communication method and system for smart card system | |
CN106372521B (en) | A kind of data run method and device | |
CN116455572B (en) | Data encryption method, device and equipment | |
CN105678542B (en) | payment service interaction method, payment terminal and payment cloud terminal | |
CN104883260B (en) | Certificate information processing and verification method, processing terminal and authentication server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |