CN106487878B - A kind of method and terminal of Data Migration - Google Patents

A kind of method and terminal of Data Migration Download PDF

Info

Publication number
CN106487878B
CN106487878B CN201610826853.XA CN201610826853A CN106487878B CN 106487878 B CN106487878 B CN 106487878B CN 201610826853 A CN201610826853 A CN 201610826853A CN 106487878 B CN106487878 B CN 106487878B
Authority
CN
China
Prior art keywords
terminal
data
path
private data
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610826853.XA
Other languages
Chinese (zh)
Other versions
CN106487878A (en
Inventor
马志峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610826853.XA priority Critical patent/CN106487878B/en
Publication of CN106487878A publication Critical patent/CN106487878A/en
Priority to PCT/CN2017/095056 priority patent/WO2018049937A1/en
Application granted granted Critical
Publication of CN106487878B publication Critical patent/CN106487878B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/30Routing of multiclass traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams

Abstract

The present invention provides a kind of method of Data Migration and terminals.The described method includes: first terminal determines the data to be transmitted that user chooses;The data to be transmitted are analyzed to determine private data and non-private data;The first terminal sends data transfer request to the second terminal;Receive the first path mark and the second ID of trace route path of the second terminal feedback;The mark of the private data and first path is sent to the second terminal;When the private data is sent, Xiang Suoshu second terminal sends the mark of the non-private data and the second path.To known to, by implementing technical solution provided by the invention, it can identify the private data and non-private data in data to be transmitted, and the private data and non-private data are transmitted respectively so that the private data and non-private data are stored in different paths, to facilitate user management.

Description

A kind of method and terminal of Data Migration
Technical field
The present invention relates to field of terminal, and in particular to the method and terminal of a kind of Data Migration.
Background technique
It is universal with terminal (such as the electronic equipments such as smart phone, wearable device, tablet computer), terminal gradually at Indispensable a part in for people's lives, so that no matter go to everywhere can carried terminal by people.
But with the development of science and technology, terminal update speed quickly.When user starts with a new terminal, often for It is convenient to use, it is necessary to which that the data inside old terminal imported into new terminal.
It should be pointed out that new terminal can generally be received all when importing data into new terminal from old terminal Data store one default path under.Due to including private data and non-private data, and privacy in the data of transmission The importance of data and non-private data is different, and a large amount of private data and non-private data are put together inconvenient user's pipe Reason.
Summary of the invention
The embodiment of the invention provides a kind of method of Data Migration and terminals, can identify the privacy in data to be transmitted Data and non-private data, and the private data and non-private data transmitted respectively so that the private data and Non- private data is stored in different paths, to facilitate user management.
First aspect of the embodiment of the present invention discloses a kind of method of Data Migration, which comprises
First terminal determines the data to be transmitted that user chooses;
The first terminal analyzes to determine private data and non-private data the data to be transmitted;
The first terminal sends data transfer request to the second terminal, includes establishing in the data transfer request The instruction of first path and the second path;
Receive the first path mark and the second ID of trace route path of the second terminal feedback;
The first terminal sends the mark of the private data and first path so that described to the second terminal The private data is stored to the first path and is identified under corresponding path by second terminal;
When the private data is sent, Xiang Suoshu second terminal sends the non-private data and the second path Mark is so that the second terminal will be under the non-private data storage to the corresponding path of second ID of trace route path.
Second aspect of the embodiment of the present invention discloses a kind of terminal, and the terminal includes:
Determination unit, the data to be transmitted chosen for receiving user;
Analytical unit, for being analyzed the data to be transmitted to determine private data and non-private data;
Transmission unit includes building in the data transfer request for sending data transfer request to the second terminal The instruction of vertical first path and the second path;
Receiving unit, for receiving the first path mark and the second ID of trace route path of the second terminal feedback;
The transmission unit, be also used to send the mark of the private data and first path to the second terminal so that The second terminal is obtained to store the private data under the corresponding path of first path mark;
The transmission unit is also used to when the private data is sent, and Xiang Suoshu second terminal sends described non- The mark in private data and the second path is so that the second terminal stores the non-private data to second path It identifies under corresponding path.
Third aspect present invention discloses a kind of terminal, and the terminal includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes as described in relation to the first aspect Method.
As can be seen that first terminal determines the data to be transmitted that user chooses in the scheme of the embodiment of the present invention;It is described First terminal analyzes to determine private data and non-private data the data to be transmitted;The first terminal is to institute It states second terminal and sends data transfer request, include the finger for establishing first path and the second path in the data transfer request Show;Receive the first path mark and the second ID of trace route path of the second terminal feedback;The first terminal is whole to described second End sends the mark of the private data and first path so that the second terminal stores the private data to described First path identifies under corresponding path;When the private data is sent, Xiang Suoshu second terminal sends described non-hidden Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path Know under corresponding path.It is hereby understood that can be identified hidden in data to be transmitted by implementing technical solution provided by the invention Private data and non-private data, and the private data and non-private data are transmitted respectively so that the private data It is stored in different paths with non-private data, to facilitate user management.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1-a is a kind of flow diagram of the method for Data Migration provided in an embodiment of the present invention;
Fig. 1-b is a kind of network architecture diagram of data mover system provided in an embodiment of the present invention;
Fig. 1-c is that a kind of data provided in an embodiment of the present invention store schematic table;
Fig. 2 is the flow diagram of the method for another Data Migration provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of another terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of entity apparatus structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of entity apparatus structural schematic diagram of mobile phone provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of method of Data Migration and terminals, can identify the privacy in data to be transmitted Data and non-private data, and the private data and non-private data transmitted respectively so that the private data and Non- private data is stored in different paths, to facilitate user management.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical solution in the embodiment of the present invention are explicitly described, it is clear that described embodiment is the present invention one The embodiment divided, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, should fall within the scope of the present invention.
The term " first " that occurs in description of the invention, claims and attached drawing, " second " and " third " etc. are to use In the different object of difference, and it is not intended to describe specific sequence.In addition, term " includes " and " having " and they are any Deformation, it is intended that cover and non-exclusive include.Such as contain the process, method, system, product of a series of steps or units Or equipment is not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or can Selection of land further includes the other step or units intrinsic for these process, methods, product or equipment.
A kind of method of Data Migration is disclosed in one embodiment of the invention, which comprises first terminal Determine the data to be transmitted that user chooses;The first terminal analyzes to determine privacy number the data to be transmitted According to non-private data;The first terminal sends data transfer request to the second terminal, in the data transfer request Instruction including establishing first path and the second path;Receive first path mark and the second path of the second terminal feedback Mark;The first terminal sends the mark of the private data and first path so that described second to the second terminal The private data is stored to the first path and is identified under corresponding path by terminal;When the private data is sent When, Xiang Suoshu second terminal sends the mark of the non-private data and the second path so that the second terminal will be described non- Under private data storage to the corresponding path of second ID of trace route path.
Fig. 1-a is please referred to, Fig. 1-a is a kind of method of Data Migration provided by one embodiment of the present invention.Wherein, as schemed Shown in 1-a, a kind of method for Data Migration that one embodiment of the present of invention provides includes the following contents:
S101, first terminal determine the data to be transmitted that user chooses;
It is understood that the scene are as follows: user is by the Data Migration of first terminal to second terminal, then first is whole After connection is established with second terminal in end, first terminal will remind user to select the data to be transmitted.
Wherein, as shown in Fig. 1-b, the first terminal can be established by wide area network or local area network and second terminal to be connected It connects, to obtain the data transfer request of second terminal transmission.
Wherein, the first terminal can be the electronics such as smart phone, tablet computer, intelligent wearable equipment, computer Equipment.
Wherein, the second terminal can be the electronics such as smart phone, tablet computer, intelligent wearable equipment, computer Equipment.
Wherein, data to be transmitted can be the information such as audio-video, picture, text.
It is understood that first terminal can traverse the data to be transmitted to determine whether there is duplicate number According to;Duplicate data if it exists then carry out duplicate removal processing to the data to be transmitted to prevent from transmitting duplicate information.
It should be pointed out that first terminal can be gone to traverse data to be transmitted with determination according to the mark of every part of data be No there are identical marks, and identical mark, then illustrate that there are duplicate data if it exists.
As shown in fig 1-c, first data to be transmitted are classified, such as picture category, word type, video class.Citing For, the mark of picture category data can be stored in picture category catalogue in the following, then according to the mark of picture category data to picture Class data carry out duplicate removal.For example the following Data Identification of picture category has 12345,556677,8899,12345, then picture classification Record exists under two 12345 Data Identifications, illustrates that the two data are duplicate.Certainly, it can be mentioned during duplicate removal Show whether user deletes duplicate data, if the duplicate data that do not delete, it is recommended that name of the user to duplicate data Title is renamed.
S102, the first terminal are analyzed the data to be transmitted to determine private data and non-privacy number According to;
It is understood that data relevant to account number cipher are regarded as private data.In addition, private data can be Data type that user chooses, such as short message, notepad information, photo, video etc..
For example, the first terminal analyzes to determine the number for including account information the data to be transmitted According to;Private data, and the data setting that will not include the account information are set by the data comprising the account information For non-private data.
S103, the first terminal send data transfer request to the second terminal, wrap in the data transfer request Include the instruction for establishing first path and the second path;
Wherein, first path and the second path are not same paths.
S104, the first path mark and the second ID of trace route path for receiving the second terminal feedback;
Wherein, it should be pointed out that if receiving first path mark and the second path of the second terminal feedback Mark, illustrates that second terminal has selected for the first store path and the second store path;First path mark and described first Store path is corresponding, wherein first path identifies the address that can be first path;Similarly, the second ID of trace route path and described the Two store paths are corresponding, wherein the second ID of trace route path can be the address in the second path;
S105, the first terminal to the second terminal send the private data and first path mark so that The private data is stored to the first path and is identified under corresponding path by the second terminal;
It is understood that private data can be carried out to guarantee that private data is not revealed during transmission Encryption is sent.
For example, the first terminal and the second terminal are interacted to determine symmetric key;Described first eventually End encrypts the private data using the symmetric key;The first terminal sends encryption to the second terminal The mark of private data and the first path.Wherein, it should be pointed out that second terminal receives the private data of encryption Afterwards, by under the private data storage to first path of the encryption, symmetric key can also also be stored in first path in passing, with Just the private data of encryption is decrypted at any time.
In addition, it is necessary to which, it is noted that the first terminal sends the private data and the first via to the second terminal Before the mark of diameter, the size of the private data of the encryption is also judged, if the private data of encryption is too big, and second is whole End is currently mobile flow, then biggish consumption can be caused to second terminal, for the sake of safety, still to remind whether user wants Send data so.
Specifically, the first terminal calculates the size of the private data;If the size of the private data is greater than pre- If when threshold value, the first terminal obtains the network connecting mode of the second terminal;If the network connecting mode of the second terminal is logical Cross move flow networking when, then to the user issue be confirmed whether transmission prompt;If receiving the prompt of confirmation transmission, institute It states first terminal and sends the mark of the private data and first path so that the second terminal will to the second terminal The private data is stored under the corresponding path of mark of the first path.
S106, when the private data is sent, Xiang Suoshu second terminal sends the non-private data and second The mark in path is so that the second terminal stores the non-private data to the corresponding path of second ID of trace route path Under.
As can be seen that first terminal determines the data to be transmitted that user chooses in the scheme of the embodiment of the present invention;It is described First terminal analyzes to determine private data and non-private data the data to be transmitted;The first terminal is to institute It states second terminal and sends data transfer request, include the finger for establishing first path and the second path in the data transfer request Show;Receive the first path mark and the second ID of trace route path of the second terminal feedback;The first terminal is whole to described second End sends the mark of the private data and first path so that the second terminal stores the private data to described First path identifies under corresponding path;When the private data is sent, Xiang Suoshu second terminal sends described non-hidden Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path Know under corresponding path.It is hereby understood that can be identified hidden in data to be transmitted by implementing technical solution provided by the invention Private data and non-private data, and the private data and non-private data are transmitted respectively so that the private data It is stored in different paths with non-private data, to facilitate user management.
Referring to Fig. 2, Fig. 2 is a kind of method of Data Migration provided by one embodiment of the present invention.Wherein, such as Fig. 2 institute Show, a kind of method for Data Migration that one embodiment of the present of invention provides includes the following contents:
S201, first terminal determine the data to be transmitted that user chooses;
Wherein, the first terminal and the second terminal can be smart phone, tablet computer, intelligent wearable equipment Equal electronic equipments.
S202, the first terminal traverse the data to be transmitted to determine whether there is duplicate data;If it exists Duplicate data then carry out duplicate removal processing to the data to be transmitted;
S203, the first terminal analyze to determine the data for including account information the data to be transmitted;
S204, the data comprising the account information are set to private data, and will will not include the account information Data be set as non-private data;
S205, the first terminal and the second terminal are interacted to determine symmetric key, and are utilized described symmetrical Private data described in key pair is encrypted;
S206, the first terminal calculate the size of the private data of the encryption;
If the size of private data of S207, the encryption are greater than preset threshold, the first terminal obtains described the The network connecting mode of two terminals;
If the network connecting mode of S208, the second terminal is by mobile flow networking, issued to the user true Recognize the prompt whether transmitted;
If S209, the prompt for receiving confirmation transmission, the first terminal sends data transmission to the second terminal and asks It asks, includes the instruction for establishing first path and the second path in the data transfer request;
S210, the first path mark and the second ID of trace route path for receiving the second terminal feedback;
S211, the first terminal send the private data of the encryption and the mark of first path to the second terminal It is identified under corresponding path so that the second terminal stores the private data to the first path;
S212, when the private data is sent, Xiang Suoshu second terminal sends the non-private data and second The mark in path is so that the second terminal stores the non-private data to the corresponding path of second ID of trace route path Under.
As can be seen that having expanded the duplicate removal step of data to be transmitted in the scheme of the embodiment of the present invention, to prevent from repeating Transmit data.Verification step is also expanded in the scheme of the embodiment of the present invention, to prevent from generating biggish consumption to mobile flow.
Referring to Fig. 3, Fig. 3 is a kind of structural schematic diagram for terminal that one embodiment of the present of invention provides.Wherein, as schemed Shown in 3, a kind of terminal 300 of one embodiment of the present of invention offer, wherein the terminal can be as smart phone, plate electricity The electronic equipments such as brain, intelligent wearable equipment.The terminal 300 includes determination unit 301, analytical unit 302, transmission unit 303 And receiving unit 304.
Determination unit 301, the data to be transmitted chosen for receiving user;
Analytical unit 302, for being analyzed the data to be transmitted to determine private data and non-private data;
Transmission unit 303 is used to send data transfer request to the second terminal, includes in the data transfer request Establish the instruction of first path and the second path;
Receiving unit 304, for receiving the first path mark and the second ID of trace route path of the second terminal feedback;
Transmission unit 303, be also used to send the mark of the private data and first path to the second terminal so that The second terminal is obtained to store the private data under the corresponding path of first path mark;
Transmission unit 303 is also used to when the private data is sent, and Xiang Suoshu second terminal sends described non-hidden Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path Know under corresponding path.
Wherein it is determined that unit 301, analytical unit 302, transmission unit 303 and receiving unit 304 can be used for executing reality Method described in step S101 to S106 in example 1 is applied, specifically describes description of the detailed in Example 1 to the method, herein no longer It repeats.
Referring to Fig. 4, Fig. 4 is a kind of structural schematic diagram for terminal that one embodiment of the present of invention provides.Wherein, as schemed Shown in 4, another terminal 400 of one embodiment of the present of invention offer, wherein the terminal can be as smart phone, plate The electronic equipments such as computer, intelligent wearable equipment.The terminal 400 includes determination unit 401, analytical unit 402, transmission unit 403, receiving unit 404, encryption unit 405, computing unit 406, acquiring unit 407, prompt unit 408, Traversal Unit 409 With duplicate removal unit 410.
Determination unit 401, the data to be transmitted chosen for receiving user;
Traversal Unit 409, for traversing the data to be transmitted to determine whether there is duplicate data;
Duplicate removal unit 410 then carries out duplicate removal processing to the data to be transmitted for duplicate data if it exists;
Analytical unit 402, for being analyzed the data to be transmitted to determine private data and non-privacy number According to;
Specifically, analytical unit 402 includes analysis subelement and setting subelement;
The analysis subelement, for being analyzed the data to be transmitted to determine the number for including account information According to;
The setting subelement, for will include that the data of the account information are set as private data, and will not wrap Data containing the account information are set as non-private data.
Determination unit 401, for interacting with the second terminal to determine symmetric key;
Encryption unit 405, for being encrypted using the symmetric key to the private data;
Computing unit 406, for calculating the size of the private data;
Acquiring unit 407 obtains described second if the size of the private data for the encryption is greater than preset threshold The network connecting mode of terminal;
Prompt unit 408, if the network connecting mode for the second terminal is by mobile flow networking, Xiang Suoshu User issues the prompt for being confirmed whether transmission;
Transmission unit 403, if Xiang Suoshu second terminal sends data transmission specifically for the prompt for receiving confirmation transmission It requests, includes the instruction for establishing first path and the second path in the data transfer request;
Receiving unit 404, for receiving the first path mark and the second ID of trace route path of the second terminal feedback;
Transmission unit 403 is also used to send the private data of the encryption and the mark of first path to the second terminal Know so that the second terminal stores the private data under the corresponding path of first path mark;
Transmission unit 403 is also used to when the private data is sent, and Xiang Suoshu second terminal sends described non-hidden Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path Know under corresponding path.
Wherein it is determined that unit 401, analytical unit 402, transmission unit 403, receiving unit 404, encryption unit 405, calculating Unit 406, acquiring unit 407, prompt unit 408, Traversal Unit 409 and duplicate removal unit 410 can be used for executing in embodiment 2 Method described in step S201 to S212 specifically describes description of the detailed in Example 2 to the method, and details are not described herein.
Referring to Fig. 5, in another embodiment of the present invention, providing a kind of terminal.The terminal 500 includes CPU501, memory 502, bus 503.Wherein, which can be smart phone, tablet computer, intelligent wearable device etc. Electronic equipment with call function.
Wherein, CPU501 executes the program being stored in advance in memory 502, which specifically includes:
Determine the data to be transmitted that user chooses;
The data to be transmitted are analyzed to determine private data and non-private data;
Data transfer request is sent to the second terminal, includes establishing first path and the in the data transfer request The instruction in two paths;
Receive the first path mark and the second ID of trace route path of the second terminal feedback;
To the second terminal send the private data and first path mark so that the second terminal by institute Private data storage is stated to identify under corresponding path to the first path;
When the private data is sent, Xiang Suoshu second terminal sends the non-private data and the second path Mark is so that the second terminal will be under the non-private data storage to the corresponding path of second ID of trace route path.
Optionally, the first terminal is analyzed the data to be transmitted to determine private data and non-privacy number According to, comprising:
The data to be transmitted are analyzed to determine the data for including account information;
Private data, and the data that will not include the account information are set by the data comprising the account information It is set as non-private data.
Optionally, described to hold before the mark that the private data and first path are sent to the second terminal Row process further include:
It interacts with the second terminal to determine symmetric key;
The private data is encrypted using the symmetric key;
The mark of the private data and first path is sent to the second terminal, comprising:
The private data of encryption and the mark of the first path are sent to the second terminal.
Optionally, the first terminal to the second terminal send the private data and first path mark it Before, the implementation procedure further include:
Calculate the size of the private data of the encryption;
If the size of the private data is greater than preset threshold, the network connecting mode of the second terminal is obtained;
If the network connecting mode of the second terminal is by mobile flow networking, issues and be confirmed whether to the user The prompt of transmission;
If receiving the prompt of confirmation transmission, Xiang Suoshu second terminal sends the mark of the private data and first path Know.
Optionally, the first terminal is analyzed the data to be transmitted to determine private data and non-privacy number According to before, the implementation procedure further include:
The data to be transmitted are traversed to determine whether there is duplicate data;
Duplicate data if it exists then carry out duplicate removal processing to the data to be transmitted.
As can be seen that first terminal determines the data to be transmitted that user chooses in the scheme of the embodiment of the present invention;It is described First terminal analyzes to determine private data and non-private data the data to be transmitted;The first terminal is to institute It states second terminal and sends data transfer request, include the finger for establishing first path and the second path in the data transfer request Show;Receive the first path mark and the second ID of trace route path of the second terminal feedback;The first terminal is whole to described second End sends the mark of the private data and first path so that the second terminal stores the private data to described First path identifies under corresponding path;When the private data is sent, Xiang Suoshu second terminal sends described non-hidden Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path Know under corresponding path.It is hereby understood that can be identified hidden in data to be transmitted by implementing technical solution provided by the invention Private data and non-private data, and the private data and non-private data are transmitted respectively so that the private data It is stored in different paths with non-private data, to facilitate user management.
Referring to Fig. 6, Fig. 6 is the frame of the part-structure for the relevant mobile phone of terminal that one embodiment of the present of invention provides Figure.With reference to Fig. 6, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 610, memory 620, input unit 630, shows Show unit 640, sensor 650, voicefrequency circuit 660, Wireless Fidelity (Wireless Fidelity, WiFi) module 670, processing The components such as device 680 and power supply 690.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted pair The restriction of mobile phone may include perhaps combining certain components or different component cloth than illustrating more or fewer components It sets.
It is specifically introduced below with reference to each component parts of the Fig. 6 to mobile phone:
RF circuit 610 can be used for sending and receiving for information.In general, RF circuit 610 includes but is not limited to antenna, at least one A amplifier, transceiver, coupler, low-noise amplifier (LowNoiseAmplifier, LNA), duplexer etc..In addition, RF Circuit 610 can also be communicated with network and other equipment by wireless communication.Any communication mark can be used in above-mentioned wireless communication Quasi- or agreement, including but not limited to global system for mobile communications (Global System ofMobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code DivisionMultiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (LongTerm Evolution, LTE), Email, short message service (ShortMessaging Service, SMS) etc..
Memory 620 can be used for storing software program and module, and processor 680 is stored in memory 620 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 620 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as Data Migration function, touch control operation detection function etc.) etc.;Storage data area can be stored is created according to using for mobile phone Data (such as data storage table data etc.) built etc..In addition, memory 620 may include high-speed random access memory, It can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited Memory device.
Input unit 630 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 630 may include that fingerprint mould group 631 and other inputs are set Standby 632.Fingerprint mould group 631 can acquire the finger print data of user on it.Optionally, fingerprint mould group 631 may include that optical profile type refers to Line module, capacitance type fingerprint module and RF type fingerprint module.By taking fingerprint mould group 631 is capacitance type fingerprint mould group as an example, tool Body includes induction electrode (n1 abnormal induction electrode and n2 normal induction electrode) and the signal that connect with the induction electrode Processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.).In addition to fingerprint mould group 631, input unit 630 can also include other input equipments 632.Specifically, other input equipments 632 can include but is not limited to physical keyboard, One of function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 640 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 640 may include display screen 641, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Display screen 641.Although fingerprint mould group 631 and display screen 641 are to realize the defeated of mobile phone as two independent components in Fig. 6 Enter and input function, but in some embodiments it is possible to it is fingerprint mould group 631 and display screen 641 is integrated and realize mobile phone Output and input function.
Mobile phone may also include at least one sensor 650, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display screen 641, proximity sensor can when mobile phone is moved in one's ear, close display screen 641 and/or Backlight.As a kind of motion sensor, accelerometer sensor can detect all directions on (generally three axis) acceleration it is big It is small, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, phase Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 660, loudspeaker 661, microphone 662 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 6 61, be converted to sound by loudspeaker 661 by road 660 Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, after being received by voicefrequency circuit 660 Audio data is converted to, then by after the processing of audio data output processor 680, through RF circuit 610 to be sent to such as the other hand Machine, or audio data is exported to memory 620 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 670 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 6 is shown WiFi module 670, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 680 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 620, and call and be stored in memory 620 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 680 can wrap Include one or more processing units;Preferably, processor 680 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Mobile phone further includes the power supply 690 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 680 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In earlier figures 1, embodiment shown in Fig. 2, each step method process can be realized based on the structure of the mobile phone.
In earlier figures 3, embodiment shown in Fig. 4, each unit function can be realized based on the structure of the mobile phone.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, It can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Various Jie that can store program code such as reservoir (RAM, RandomAccess Memory), mobile hard disk, magnetic or disk Matter.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (11)

1. a kind of method of Data Migration, which is characterized in that the described method includes:
First terminal determines the data to be transmitted that user chooses to migrate to second terminal;
The first terminal analyzes to determine private data and non-private data the data to be transmitted;
The first terminal sends data transfer request to the second terminal, includes establishing first in the data transfer request The instruction in path and the second path;
The first path mark and the second ID of trace route path, the second terminal for receiving the second terminal feedback establish described first Path and second path, first path mark is corresponding with the first path, second ID of trace route path with it is described Second path is corresponding;
The first terminal sends the mark of the private data and the first path so that described to the second terminal The private data is stored to the first path and is identified under corresponding path by second terminal;
When the private data is sent, Xiang Suoshu second terminal sends the non-private data and second path Mark is so that the second terminal will be under the non-private data storage to the corresponding path of second ID of trace route path.
2. the method according to claim 1, wherein the first terminal divides the data to be transmitted Analysis is to determine private data and non-private data, comprising:
The first terminal analyzes to determine the data for including account information the data to be transmitted;
Private data, and the data setting that will not include the account information are set by the data comprising the account information For non-private data.
3. according to the method described in claim 2, it is characterized in that, the first terminal is described hidden to second terminal transmission Before the mark of private data and first path, the method also includes:
The first terminal and the second terminal are interacted to determine symmetric key;
The first terminal encrypts the private data using the symmetric key;
The first terminal sends the mark of the private data and first path to the second terminal, comprising:
The first terminal sends the private data of encryption and the mark of the first path to the second terminal.
4. according to the method described in claim 3, it is characterized in that, the first terminal is described hidden to second terminal transmission Before the mark of private data and first path, the method also includes:
The first terminal calculates the size of the private data of the encryption;
If the size of the private data is greater than preset threshold, the first terminal obtains the networking side of the second terminal Formula;
If the network connecting mode of the second terminal is by mobile flow networking, is issued to the user and be confirmed whether to transmit Prompt;
If receiving the prompt of confirmation transmission, the first terminal sends the private data and the first via to the second terminal The mark of diameter.
5. method according to any one of claims 1 to 4, which is characterized in that the first terminal is to the number to be transmitted According to being analyzed to determine private data and non-private data before, the method also includes:
The first terminal traverses the data to be transmitted to determine whether there is duplicate data;
Duplicate data if it exists then carry out duplicate removal processing to the data to be transmitted.
6. a kind of terminal, which is characterized in that the terminal includes:
Determination unit, for receiving the data to be transmitted that user chooses to migrate to second terminal;
Analytical unit, for being analyzed the data to be transmitted to determine private data and non-private data;
Transmission unit includes establishing for sending data transfer request to the second terminal, in the data transfer request The instruction in one path and the second path;
Receiving unit, for receiving the first path mark and the second ID of trace route path of the second terminal feedback, described second eventually The first path and second path are established in end, and the first path mark is corresponding with the first path, and described second ID of trace route path is corresponding with second path;
The transmission unit, be also used to send the mark of the private data and the first path to the second terminal so that The second terminal is obtained to store the private data under the corresponding path of first path mark;
The transmission unit is also used to when the private data is sent, and Xiang Suoshu second terminal sends the non-privacy Data and the mark in second path are so that the second terminal stores the non-private data to second path It identifies under corresponding path.
7. terminal according to claim 6, which is characterized in that the analytical unit includes that analysis subelement and setting are single Member;
The analysis subelement, for being analyzed the data to be transmitted to determine the data for including account information;
The setting subelement, the data of the account information are set as private data for will include, and will not include institute The data for stating account information are set as non-private data.
8. terminal according to claim 7, which is characterized in that the terminal further includes encryption unit;
The determination unit, for interacting with the second terminal to determine symmetric key;
The encryption unit, for being encrypted using the symmetric key to the private data;
The transmission unit, specifically for sending the private data of encryption and the mark of the first path to the second terminal Know.
9. terminal according to claim 8, which is characterized in that the terminal further includes computing unit, acquiring unit and mentions Show unit;
The computing unit, for calculating the size of the private data;
The acquiring unit obtains described second eventually if the size of the private data for the encryption is greater than preset threshold The network connecting mode at end;
The prompt unit, if the network connecting mode for the second terminal is by mobile flow networking, to the use Family issues the prompt for being confirmed whether transmission;
The transmission unit, if the terminal sends institute to the second terminal specifically for the prompt for receiving confirmation transmission State the mark of private data and first path.
10. according to any terminal of claim 6 to 9, which is characterized in that the terminal further includes Traversal Unit and duplicate removal Unit;
The Traversal Unit, for traversing the data to be transmitted to determine whether there is duplicate data;
The duplicate removal unit then carries out duplicate removal processing to the data to be transmitted for duplicate data if it exists.
11. a kind of terminal characterized by comprising
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as claim 1 to right It is required that 5 described in any item methods.
CN201610826853.XA 2016-09-14 2016-09-14 A kind of method and terminal of Data Migration Expired - Fee Related CN106487878B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610826853.XA CN106487878B (en) 2016-09-14 2016-09-14 A kind of method and terminal of Data Migration
PCT/CN2017/095056 WO2018049937A1 (en) 2016-09-14 2017-07-28 Data migration method and terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610826853.XA CN106487878B (en) 2016-09-14 2016-09-14 A kind of method and terminal of Data Migration

Publications (2)

Publication Number Publication Date
CN106487878A CN106487878A (en) 2017-03-08
CN106487878B true CN106487878B (en) 2019-08-20

Family

ID=58267255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610826853.XA Expired - Fee Related CN106487878B (en) 2016-09-14 2016-09-14 A kind of method and terminal of Data Migration

Country Status (2)

Country Link
CN (1) CN106487878B (en)
WO (1) WO2018049937A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487878B (en) * 2016-09-14 2019-08-20 Oppo广东移动通信有限公司 A kind of method and terminal of Data Migration
EP3547637A1 (en) * 2018-03-30 2019-10-02 AO Kaspersky Lab System and method for routing data when executing queries
US11635903B2 (en) * 2021-06-15 2023-04-25 International Business Machines Corporation Cloud data migration

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683409A (en) * 2013-11-29 2015-06-03 华为终端有限公司 Method for sharing applications between terminals and terminal
CN105188015A (en) * 2015-08-07 2015-12-23 上海斐讯数据通信技术有限公司 Mobile terminal private data migration backup method and mobile terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100620055B1 (en) * 2004-12-06 2006-09-08 엘지전자 주식회사 Method of canceling location information request
CN104408383B (en) * 2014-10-31 2018-03-16 东莞宇龙通信科技有限公司 A kind of private data processing system and method
CN104540088A (en) * 2014-12-23 2015-04-22 小米科技有限责任公司 Connection establishment method, terminal and device
CN105577361A (en) * 2015-04-20 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information processing method and device thereof
CN106487878B (en) * 2016-09-14 2019-08-20 Oppo广东移动通信有限公司 A kind of method and terminal of Data Migration

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683409A (en) * 2013-11-29 2015-06-03 华为终端有限公司 Method for sharing applications between terminals and terminal
CN105188015A (en) * 2015-08-07 2015-12-23 上海斐讯数据通信技术有限公司 Mobile terminal private data migration backup method and mobile terminal

Also Published As

Publication number Publication date
CN106487878A (en) 2017-03-08
WO2018049937A1 (en) 2018-03-22

Similar Documents

Publication Publication Date Title
CN105824958B (en) A kind of methods, devices and systems of inquiry log
CN107967322B (en) File classification display method, mobile terminal and computer readable storage medium
CN104238893B (en) A kind of method and apparatus that video preview picture is shown
US20160105418A1 (en) Method, system, device, and terminal for network initialization of multimedia playback device
CN104820665A (en) Method, terminal and server for exhibiting recommendation information
CN104239332A (en) Webpage content processing method, webpage content processing device and browser client side
CN106487878B (en) A kind of method and terminal of Data Migration
CN106534288B (en) A kind of data transmission method and mobile terminal
CN106060223B (en) Terminal control method and device
CN106658657A (en) Network access method and device
TWI575458B (en) Method, device and system for providing service based on application
CN104836717A (en) Data processing method and apparatus, and terminal equipment
CN103631592B (en) A kind of configuration, call method, device and equipment that shows resource
CN106202422B (en) The treating method and apparatus of Web page icon
CN106205657B (en) A kind of lyric display method and device
CN105321197A (en) Image processing method and apparatus
CN104391629A (en) Method for sending message in orientation manner, method for displaying message, server and terminal
CN107317828A (en) Document down loading method and device
CN107786423B (en) A kind of method and system of instant messaging
CN106656803B (en) A kind of method, apparatus and system updating route table items
CN106330684B (en) A kind of method and terminal of synchronizing information
CN105022621A (en) Method and device for collecting session message and terminal
CN106951223A (en) Method and terminal that a kind of desktop is shown
CN110532231A (en) File polling method, file polling device and terminal device
CN106572163B (en) A kind of method and terminal of Data Migration

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190820