CN106372521B - A kind of data run method and device - Google Patents

A kind of data run method and device Download PDF

Info

Publication number
CN106372521B
CN106372521B CN201610862171.4A CN201610862171A CN106372521B CN 106372521 B CN106372521 B CN 106372521B CN 201610862171 A CN201610862171 A CN 201610862171A CN 106372521 B CN106372521 B CN 106372521B
Authority
CN
China
Prior art keywords
data
terminal equipment
run
designated identification
operation permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610862171.4A
Other languages
Chinese (zh)
Other versions
CN106372521A (en
Inventor
李艳红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201610862171.4A priority Critical patent/CN106372521B/en
Publication of CN106372521A publication Critical patent/CN106372521A/en
Application granted granted Critical
Publication of CN106372521B publication Critical patent/CN106372521B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

This application involves mobile communication technology field more particularly to a kind of data run method and devices, when solving the user data of transmission between terminal devices existing in the prior art, the low problem of safety;Method provided by the embodiments of the present application includes: that first terminal equipment receives data and designated identification corresponding with the operation permission of the data that second terminal equipment is sent;Judge the first terminal equipment identify whether it is consistent with the designated identification;If consistent, the data are then run according to the operation permission of the data, in this way, first terminal equipment be only capable of operation second terminal equipment send with the consistent data of self identification, if it is the data of other terminal devices forwardings that first terminal equipment is received, it can then cause because designated identification corresponding to forwarding data is inconsistent with first terminal device identification, first terminal equipment does not have permission operation forwarding data, thus can improve safety when transmitting user data between terminal device well.

Description

A kind of data run method and device
Technical field
This application involves field of communication technology more particularly to a kind of data run method and devices.
Background technique
It takes pictures currently, terminal device can be used in user, and the picture of shooting can be sent to good friend.For example, Sometimes user can select to shoot the certificate information of oneself with terminal device, and send it to good friend, so that good friend is based on being somebody's turn to do Certificate information is that the user handles some affairs.
The picture of terminal device shooting is related to privacy sometimes, such as the identity card picture shot.User may only want to Specified recipient checks the identity card picture, and the identity card picture is not intended to be forwarded to other terminal devices, causes body Part information leakage.Currently, terminal device after the picture of shooting is sent to specified receiving device, can not also limit the reception Equipment is forwarded.
As it can be seen that how to improve safety when transmitting user data between terminal device, becomes urgently to be solved at present and ask Topic.
Summary of the invention
The embodiment of the present application provides a kind of data run method and device, to solve in the prior art terminal device it Between transmit user data when, the low problem of safety.
A kind of method of data run provided by the embodiments of the present application, comprising:
First terminal equipment receives the data and corresponding with the operation permission of the data that second terminal equipment is sent Designated identification;
Judge first terminal equipment identify whether it is consistent with designated identification;
If consistent, the data are run according to the operation permission of the data.
Optionally, the method also includes:
If the mark of first terminal equipment is inconsistent with designated identification, the data are deleted.
Optionally, the data are run according to the operation permission of the data, comprising:
The encrypted data are decrypted, the data are run after successful decryption.
Optionally, the data are run according to the operation permission of the data, comprising:
The data after coding are decoded, the data are run after successfully decoded.
The embodiment of the present application also provides a kind of method of data run, comprising:
Second terminal equipment generates data and designated identification corresponding with the operation permission of the data to be sent;
The data and designated identification are sent to first terminal equipment.
Optionally, data to be sent are generated, comprising:
The data after generating the encrypted data, or coding.
A kind of device of data run provided by the embodiments of the present application, comprising:
Receiving module, for receiving the data and corresponding with the operation permission of the data of second terminal equipment transmission Designated identification;
Judgment module, for judge the first terminal equipment identify whether it is consistent with the designated identification;
Module is run, for after the mark for determining the first terminal equipment is consistent with the designated identification, according to institute The operation permission for stating data runs the data.
Optionally, described device further include:
Removing module, for deleting after the mark and the designated identification for determining the first terminal equipment are inconsistent The data.
Optionally, operation module is specifically used for:
The encrypted data are decrypted, the data are run after successful decryption.
Optionally, operation module is specifically used for:
The data after coding are decoded, the data are run after successfully decoded.
The device of another data run provided by the embodiments of the present application, comprising:
Generation module, for generating data to be sent and specified mark corresponding with the operation permission of the data Know;
Sending module, for the data and the designated identification to be sent to first terminal equipment.
Optionally, generation module is specifically used for:
The data after generating the encrypted data, or coding.
In the embodiment of the present application, when first terminal equipment receives the data that second terminal equipment is sent, also receive and the number According to the corresponding designated identification of operation permission, if it is determined that the mark of first terminal equipment is consistent with designated identification, then can root The data are run according to the operation permission of the data.In the embodiment of the present application, first terminal equipment is for the data that receive, only When the corresponding designated identification of operation permission of the data is consistent with the mark of first terminal equipment, the number can be just run According to, that is, first terminal equipment is only capable of the specified data for being sent to oneself of operation second terminal equipment;If first terminal equipment connects What is received is the data of other terminal device forwardings, then can be because of designated identification and first corresponding to the operation permission for forwarding data The mark of terminal device is inconsistent, and first terminal equipment is caused to be unable to run the forwarding data;Similarly, if first terminal Equipment is by the specified data forwarding for sending oneself of second terminal equipment to other terminal devices, and other terminal devices are as number According to operation permission corresponding to designated identification and the mark of itself it is inconsistent and be unable to run the data.As it can be seen that the application is real The method for applying example can avoid well user data from arbitrarily being forwarded by other terminal devices and user information is caused to be revealed, and Safety when transmitting user data between terminal device can be improved.
Detailed description of the invention
Fig. 1 is data run method flow diagram provided by the embodiments of the present application;
Fig. 2 is data run structure drawing of device provided by the embodiments of the present application;
Fig. 3 is another data run structure drawing of device provided by the embodiments of the present application.
Specific embodiment
In the embodiment of the present application, when first terminal equipment receives the data that second terminal equipment is sent, also receive and the number According to the corresponding designated identification of operation permission, if it is determined that the mark of first terminal equipment is consistent with designated identification, then can root The data are run according to the operation permission of the data.In the embodiment of the present application, first terminal equipment is for the data that receive, only When the corresponding designated identification of operation permission of the data is consistent with the mark of first terminal equipment, the number can be just run According to, that is, first terminal equipment is only capable of the specified data for being sent to oneself of operation second terminal equipment;If first terminal equipment connects What is received is the data of other terminal device forwardings, then can be because of designated identification and first corresponding to the operation permission for forwarding data The mark of terminal device is inconsistent, and first terminal equipment is caused to be unable to run the forwarding data;Similarly, if first terminal Equipment is by the specified data forwarding for sending oneself of second terminal equipment to other terminal devices, and other terminal devices are as number According to operation permission corresponding to designated identification and the mark of itself it is inconsistent and be unable to run the data.As it can be seen that the application is real The method for applying example can avoid well user data from arbitrarily being forwarded by other terminal devices and user information is caused to be revealed, and Safety when transmitting user data between terminal device can be improved.
The embodiment of the present application is described in further detail with reference to the accompanying drawings of the specification.
As shown in Figure 1, being data run method flow diagram provided by the embodiments of the present application, comprising the following steps:
S101: first terminal equipment receives the data that second terminal equipment is sent and the operation permission phase with the data Corresponding designated identification.
In the specific implementation process, it when second terminal equipment sends data to first terminal equipment, can not only treat It sends data to be handled, the data that obtain that treated, and can determine corresponding with the operation permission of data to be sent Designated identification, finally, treated data and designated identification corresponding with the operation permission of the data are sent to first eventually End equipment.Wherein, data to be sent are carried out handling can be encrypting data to be sent, is also possible to number to be sent It is encoded according to according to preset coding mode;Designated identification can carry in the recognize program code of automatic running, The recognize program code has the permission for running the data.Preferably, designated identification can be the world of first terminal equipment Mobile device identifies (International Mobile Equipment Identity, IMEI), alternatively, sequence number (Serial Number, S/N).
In above process, designated identification is carried in the recognize program code of automatic running, can be and specifies this Mark directly carries in recognize program code, is also possible to first handle the designated identification using default processing mode, By treated, designated identification information is carried in recognize program code again.It specifically, for example, can be straight by designated identification AAA Carrying is connect in recognize program code, designated identification AAA can also be handled, for example calculate the cryptographic Hash of the designated identification BB later carries cryptographic Hash BB in recognize program code, and then by recognize program code and treated one starting of data Give first terminal equipment.
Preferably, first terminal equipment receives the data that second terminal equipment is sent and the operation permission with the data After corresponding designated identification, the recognize program code for carrying designated identification be can be automatically operated.Specifically, recognize program code Can first terminal equipment user select check data when automatic running, identification journey can also be received in first terminal equipment It is automatic running after sequence code.
In the specific implementation process, if the received data of first terminal equipment include pictorial information, running permission can To refer to the permission for opening the picture;If the received data packet of first terminal equipment contains bank account information, running permission can To refer to the permission for checking the bank account information.
S102: judge first terminal equipment identify whether it is consistent with designated identification.
Preferably, the mark of first terminal equipment can be IMEI or S/N, and in the specific implementation process, the mark of use Type is consistent with above-mentioned designated identification.In addition, two kinds in S101 are carried with the side of designated identification using recognize program code Formula, judge first terminal equipment identify whether it is different with the consistent process of designated identification.In the following, to both modes Deterministic process is introduced respectively.
It uses the example above, if designated identification directly carries in recognize program code, recognize program code is extracted specified AAA is identified, and reads the mark of first terminal equipment, and then judges designated identification AAA and the mark of first terminal equipment is It is no consistent;If designated identification AAA is carried in recognize program code after treatment, recognize program code can read The mark of one terminal device does same processing to the mark of first terminal equipment, for example calculates its cryptographic Hash, later, compares Whether the cryptographic Hash of designated identification AAA is consistent with the cryptographic Hash of the mark of first terminal equipment.
S103: it if the mark of first terminal equipment is consistent with designated identification, is run according to the operation permission of the data The data.
In the specific implementation process, according to data run permission operation data, it can be and encrypted data are solved It is close, the data are run after successful decryption;It is also possible to be decoded the data after coding, the number is run after successfully decoded According to.
Specifically, if it is encrypted data that first terminal equipment is received, in the mark for determining first terminal equipment After knowledge is consistent with designated identification, recognize program code can be decrypted encrypted data;If first terminal equipment Received is using the data after preset coding mode coding, then recognize program code can also use preset Decoding process is decoded the data after coding.
In the specific implementation process, it when the mark of first terminal equipment and designated identification are inconsistent, can delete described Data, at this point it is possible to which running the recognize program code deletes the data.In addition, working as the mark and finger of first terminal equipment When calibration knows inconsistent, the data can not also be deleted, only prevent the data from showing in first terminal equipment, this When, it can show a cartoon picture, in first terminal equipment to prompt user's data to be unable to run.
In the embodiment of the present application, when first terminal equipment receives the data that second terminal equipment is sent, also receive and the number According to the corresponding designated identification of operation permission, if it is determined that the mark of first terminal equipment is consistent with designated identification, then can root The data are run according to the operation permission of the data.In the embodiment of the present application, first terminal equipment is for the data that receive, only When the corresponding designated identification of operation permission of the data is consistent with the mark of first terminal equipment, the number can be just run According to, that is, first terminal equipment is only capable of the specified data for being sent to oneself of operation second terminal equipment;If first terminal equipment connects What is received is the data of other terminal device forwardings, then can be because of designated identification and first corresponding to the operation permission for forwarding data The mark of terminal device is inconsistent, and first terminal equipment is caused to be unable to run the forwarding data;Similarly, if first terminal Equipment is by the specified data forwarding for sending oneself of second terminal equipment to other terminal devices, and other terminal devices are as number According to operation permission corresponding to designated identification and the mark of itself it is inconsistent and be unable to run the data.As it can be seen that the application is real The method for applying example can avoid well user data from arbitrarily being forwarded by other terminal devices and user information is caused to be revealed, and Safety when transmitting user data between terminal device can be improved.
Embodiment two
Below by taking first terminal equipment receives the pictorial information that second terminal equipment is sent as an example, the above process is carried out detailed It describes in detail bright.
It in the specific implementation process, can be with when second terminal equipment is before sending pictorial information to first terminal equipment Picture is encoded using preset mode, later, is believed according to the picture of first terminal equipment being identified as after encoding Breath generates designated identification, finally, the pictorial information after coding and the recognize program code for carrying designated identification are sent to first Terminal device;Wherein, preset coding mode is different from daily widely applied coding mode, only using specific solution Code mode can just be decoded the pictorial information after above-mentioned coding, and specific decoding process can be carried in recognizer In code, i.e., the picture after above-mentioned coding can be just only opened using the recognize program code for carrying specific decoding process Information.
In addition, when second terminal equipment to first terminal equipment transmission be plurality of pictures information when because for coding after Pictorial information generate designated identification it is the same, second terminal equipment may be specified quantity pictorial information generate one finger Calibration know, at this point, second terminal equipment can also the pictorial information to specified quantity only send a recognize program code, this Sample, the picture after can greatly reducing second terminal equipment repeatedly and being coding generate designated identification, generate recognize program code Operation, and the memory space of first terminal equipment can be saved.
In the specific implementation process, first terminal equipment receive second terminal equipment send coding after pictorial information with And after recognize program code, the recognize program code for carrying designated identification be can be automatically operated, and be executed: read first terminal equipment Mark, and compared with the designated identification of carrying, if the mark of first terminal equipment is consistent with designated identification, first Terminal device possesses the permission for opening the pictorial information, and further, recognize program code can be using specific decoding side Formula is decoded the pictorial information, and then opens picture;If the mark of first terminal equipment and designated identification are inconsistent, Then determine that first terminal equipment does not have the permission for opening the pictorial information, recognize program code can be straight by the pictorial information Connect deletion.
It, can be with when second terminal equipment sends pictorial information to first terminal equipment in addition, in the specific implementation process Picture is encrypted using designated identification, and designated identification is carried in recognize program code, with encrypted picture Information sends jointly to first terminal equipment, and after receiving pictorial information and designated identification, carrying refers to first terminal equipment Calibrate know recognize program code, can in first terminal equipment automatic running, read first terminal equipment mark, it Afterwards, encrypted picture is decrypted in the mark of the first terminal equipment based on reading, if the mark of first terminal equipment It is consistent with designated identification, then successful decryption, then user can check the picture in first terminal equipment;If first The mark of terminal device is inconsistent with designated identification, then decrypts and fail, then user cannot just look into first terminal equipment See the picture.
Preferably, the combination as both the above mode, second terminal equipment sends pictorial information to first terminal equipment When, the picture can be encoded in such a way that first use is preset, the pictorial information after coding is carried out again later Encryption, finally, by treated pictorial information and carrying the recognize program code of designated identification again and sending jointly to first eventually End equipment, further, first terminal equipment is in pictorial information and the recognizer generation for receiving the transmission of second terminal equipment After code, the recognize program code for carrying designated identification be can be automatically operated, and be executed: the mark of first terminal equipment is read, and And it compares with designated identification, if the mark of first terminal equipment is consistent with designated identification, can execute to picture The operation that information is decoded;If the mark of first terminal equipment and designated identification are inconsistent, picture letter can be deleted Breath.
In the embodiment of the present application, when first terminal equipment receives the data that second terminal equipment is sent, also receive and the number According to the corresponding designated identification of operation permission, if it is determined that the mark of first terminal equipment is consistent with designated identification, then can root The data are run according to the operation permission of the data.In the embodiment of the present application, first terminal equipment is for the data that receive, only When the corresponding designated identification of operation permission of the data is consistent with the mark of first terminal equipment, the number can be just run According to, that is, first terminal equipment is only capable of the specified data for being sent to oneself of operation second terminal equipment;If first terminal equipment connects What is received is the data of other terminal device forwardings, then can be because of designated identification and first corresponding to the operation permission for forwarding data The mark of terminal device is inconsistent, and first terminal equipment is caused to be unable to run the forwarding data;Similarly, if first terminal Equipment is by the specified data forwarding for sending oneself of second terminal equipment to other terminal devices, and other terminal devices are as number According to operation permission corresponding to designated identification and the mark of itself it is inconsistent and be unable to run the data.As it can be seen that the application is real The method for applying example can avoid well user data from arbitrarily being forwarded by other terminal devices and user information is caused to be revealed, and Safety when transmitting user data between terminal device can be improved.
Based on the same inventive concept, a kind of data fortune corresponding with data run method is additionally provided in the embodiment of the present application Luggage is set, since the principle that the device solves the problems, such as is similar to the embodiment of the present application data run method, the reality of the device The implementation for the method for may refer to is applied, overlaps will not be repeated.
As shown in Fig. 2, being 20 structure chart of data run device provided by the embodiments of the present application, comprising:
Receiving module 201, for receive second terminal equipment transmission data and with the operation permission phase of the data Corresponding designated identification;
Judgment module 202, for judge the first terminal equipment identify whether it is consistent with the designated identification;
Module 203 is run, for after the mark for determining the first terminal equipment is consistent with the designated identification, according to The operation permission of the data runs the data.
Optionally, described device further include:
Removing module 204, for deleting after the mark and the designated identification for determining the first terminal equipment are inconsistent Except the data.
Optionally, operation module 203 is specifically used for:
The encrypted data are decrypted, the data are run after successful decryption.
Optionally, operation module 203 is specifically used for:
The data after coding are decoded, the data are run after successfully decoded.
As shown in figure 3, being another 30 schematic diagram of data run device provided by the embodiments of the present application, comprising:
Generation module 301, for generating data to be sent and corresponding with the operation permission of the data specified Mark;
Sending module 302, for the data and the designated identification to be sent to first terminal equipment.
Optionally, generation module 301 is specifically used for:
The data after generating the encrypted data, or coding.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is process of the reference according to method, apparatus (system) and computer program product of the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.

Claims (12)

1. a kind of data run method, which is characterized in that this method comprises:
First terminal equipment receives the data and finger corresponding with the operation permission of the data that second terminal equipment is sent Calibration is known, and the designated identification carries in recognize program code;
Recognize program code described in automatic running executes: judging identifying whether and the designated identification for the first terminal equipment Unanimously;
If consistent, the data are run according to the operation permission of the data;
Wherein, if the first terminal equipment forwards the data to other terminal devices, the operation power of the data The corresponding designated identification of limit and the mark of other terminal devices are inconsistent, and other terminal devices are unable to run the data.
2. the method as described in claim 1, which is characterized in that the method also includes:
If the mark of the first terminal equipment is inconsistent with designated identification, the data are deleted.
3. the method as described in claim 1, which is characterized in that run the data, packet according to the operation permission of the data It includes:
The encrypted data are decrypted, the data are run after successful decryption.
4. the method as described in claim 1, which is characterized in that run the data, packet according to the operation permission of the data It includes:
The data after coding are decoded, the data are run after successfully decoded.
5. a kind of data run method, which is characterized in that this method comprises:
Second terminal equipment generates data and designated identification corresponding with the operation permission of the data to be sent, described Designated identification carries in recognize program code;
The data and the recognize program code are sent to first terminal equipment, make the first terminal equipment automatic running The recognize program code executes: judge the first terminal equipment identify whether it is consistent with the designated identification;If consistent, The data are then run according to the operation permission of the data, wherein if the first terminal equipment forwards the data on To other terminal devices, then designated identification and the mark of other terminal devices corresponding to the operation permission of the data are different It causes, other terminal devices are unable to run the data.
6. method as claimed in claim 5, which is characterized in that described to generate data to be sent, comprising:
The data after generating the encrypted data, or coding.
7. a kind of data run device, which is characterized in that the device includes:
Receiving module, for receiving the data and finger corresponding with the operation permission of the data that second terminal equipment is sent Calibration is known, and the designated identification carries in recognize program code;
Judgment module is executed for recognize program code described in automatic running: judge first terminal equipment identify whether and institute It is consistent to state designated identification;
Module is run, for after the mark for determining the first terminal equipment is consistent with the designated identification, according to the number According to operation permission run the data, wherein set if the first terminal equipment forwards the data to other terminals Standby, then designated identification and the mark of other terminal devices corresponding to the operation permission of the data are inconsistent, and other terminals are set It is standby to be unable to run the data.
8. device as claimed in claim 7, which is characterized in that described device further include:
Removing module, for after the mark that determines the first terminal equipment and the designated identification are inconsistent, described in deletion Data.
9. device as claimed in claim 7, which is characterized in that the operation module is specifically used for:
The encrypted data are decrypted, the data are run after successful decryption.
10. device as claimed in claim 7, which is characterized in that the operation module is specifically used for:
The data after coding are decoded, the data are run after successfully decoded.
11. a kind of data run device, which is characterized in that the device includes:
Generation module, for generating data and designated identification corresponding with the operation permission of the data to be sent, institute Designated identification is stated to carry in recognize program code;
Sending module makes first end for the data and the recognize program code to be sent to first terminal equipment Recognize program code described in end equipment automatic running executes: judging identifying whether and the specified mark for the first terminal equipment Know consistent;If consistent, the data are run according to the operation permission of the data, wherein if the first terminal equipment Other terminal devices are forwarded the data to, then designated identification corresponding to the operation permission of the data is set with other terminals Standby mark is inconsistent, and other terminal devices are unable to run the data.
12. device as claimed in claim 11, which is characterized in that the generation module is specifically used for:
The data after generating the encrypted data, or coding.
CN201610862171.4A 2016-09-28 2016-09-28 A kind of data run method and device Active CN106372521B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610862171.4A CN106372521B (en) 2016-09-28 2016-09-28 A kind of data run method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610862171.4A CN106372521B (en) 2016-09-28 2016-09-28 A kind of data run method and device

Publications (2)

Publication Number Publication Date
CN106372521A CN106372521A (en) 2017-02-01
CN106372521B true CN106372521B (en) 2019-11-08

Family

ID=57897114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610862171.4A Active CN106372521B (en) 2016-09-28 2016-09-28 A kind of data run method and device

Country Status (1)

Country Link
CN (1) CN106372521B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254029B (en) * 2020-12-30 2024-02-02 深圳怡化电脑股份有限公司 Peripheral interface setting method and device of terminal equipment and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103618710A (en) * 2013-11-25 2014-03-05 北京奇虎科技有限公司 Individual processing method and device of file between mobile device and computing device
CN103902916A (en) * 2012-12-25 2014-07-02 联想(北京)有限公司 Processing method and electronic device
CN104507080A (en) * 2014-11-19 2015-04-08 广东欧珀移动通信有限公司 File processing method and terminal
CN105187560A (en) * 2015-09-29 2015-12-23 北京奇艺世纪科技有限公司 Cloud server-based data pushing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902916A (en) * 2012-12-25 2014-07-02 联想(北京)有限公司 Processing method and electronic device
CN103618710A (en) * 2013-11-25 2014-03-05 北京奇虎科技有限公司 Individual processing method and device of file between mobile device and computing device
CN104507080A (en) * 2014-11-19 2015-04-08 广东欧珀移动通信有限公司 File processing method and terminal
CN105187560A (en) * 2015-09-29 2015-12-23 北京奇艺世纪科技有限公司 Cloud server-based data pushing method and device

Also Published As

Publication number Publication date
CN106372521A (en) 2017-02-01

Similar Documents

Publication Publication Date Title
CN107749848B (en) Internet of things data processing method and device and Internet of things system
US20220353085A1 (en) Secure distributed information system for public device authentication
KR102477453B1 (en) Transaction messaging
CN104079581B (en) Identity identifying method and equipment
CN104685825B (en) A kind of method of secure communication, computing device and non-transient computer readable storage medium storing program for executing
CN104980278B (en) The method and apparatus for verifying the availability of biometric image
US20170142087A1 (en) Device authentication agent
CN101789866B (en) High-reliability safety isolation and information exchange method
CN105490997B (en) Safe checking method, device, terminal and server
CN106096424B (en) A kind of pair of local data carries out encryption method and terminal
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
KR101581599B1 (en) Binding a removable module to an access terminal
CN105184567B (en) Processing method, processing unit and the mobile terminal of information
CN105721156B (en) Data are carried out with the method and relevant device of coding and digital signature
CN106817346B (en) Data transmission method and device and electronic equipment
CN109729000B (en) Instant messaging method and device
CN107196907A (en) A kind of guard method of Android SO files and device
CN107948186A (en) A kind of safety certifying method and device
CN106789024A (en) A kind of remote de-locking method, device and system
CN107154916A (en) A kind of authentication information acquisition methods, offer method and device
CN111031535A (en) Secure communication method and system for smart card system
CN106372521B (en) A kind of data run method and device
CN116455572B (en) Data encryption method, device and equipment
CN105678542B (en) payment service interaction method, payment terminal and payment cloud terminal
CN104883260B (en) Certificate information processing and verification method, processing terminal and authentication server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant