CN106487878B - A kind of method and terminal of Data Migration - Google Patents
A kind of method and terminal of Data Migration Download PDFInfo
- Publication number
- CN106487878B CN106487878B CN201610826853.XA CN201610826853A CN106487878B CN 106487878 B CN106487878 B CN 106487878B CN 201610826853 A CN201610826853 A CN 201610826853A CN 106487878 B CN106487878 B CN 106487878B
- Authority
- CN
- China
- Prior art keywords
- terminal
- data
- path
- private data
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/30—Routing of multiclass traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/563—Data redirection of data network streams
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides a kind of method of Data Migration and terminals.The described method includes: first terminal determines the data to be transmitted that user chooses;The data to be transmitted are analyzed to determine private data and non-private data;The first terminal sends data transfer request to the second terminal;Receive the first path mark and the second ID of trace route path of the second terminal feedback;The mark of the private data and first path is sent to the second terminal;When the private data is sent, Xiang Suoshu second terminal sends the mark of the non-private data and the second path.To known to, by implementing technical solution provided by the invention, it can identify the private data and non-private data in data to be transmitted, and the private data and non-private data are transmitted respectively so that the private data and non-private data are stored in different paths, to facilitate user management.
Description
Technical field
The present invention relates to field of terminal, and in particular to the method and terminal of a kind of Data Migration.
Background technique
It is universal with terminal (such as the electronic equipments such as smart phone, wearable device, tablet computer), terminal gradually at
Indispensable a part in for people's lives, so that no matter go to everywhere can carried terminal by people.
But with the development of science and technology, terminal update speed quickly.When user starts with a new terminal, often for
It is convenient to use, it is necessary to which that the data inside old terminal imported into new terminal.
It should be pointed out that new terminal can generally be received all when importing data into new terminal from old terminal
Data store one default path under.Due to including private data and non-private data, and privacy in the data of transmission
The importance of data and non-private data is different, and a large amount of private data and non-private data are put together inconvenient user's pipe
Reason.
Summary of the invention
The embodiment of the invention provides a kind of method of Data Migration and terminals, can identify the privacy in data to be transmitted
Data and non-private data, and the private data and non-private data transmitted respectively so that the private data and
Non- private data is stored in different paths, to facilitate user management.
First aspect of the embodiment of the present invention discloses a kind of method of Data Migration, which comprises
First terminal determines the data to be transmitted that user chooses;
The first terminal analyzes to determine private data and non-private data the data to be transmitted;
The first terminal sends data transfer request to the second terminal, includes establishing in the data transfer request
The instruction of first path and the second path;
Receive the first path mark and the second ID of trace route path of the second terminal feedback;
The first terminal sends the mark of the private data and first path so that described to the second terminal
The private data is stored to the first path and is identified under corresponding path by second terminal;
When the private data is sent, Xiang Suoshu second terminal sends the non-private data and the second path
Mark is so that the second terminal will be under the non-private data storage to the corresponding path of second ID of trace route path.
Second aspect of the embodiment of the present invention discloses a kind of terminal, and the terminal includes:
Determination unit, the data to be transmitted chosen for receiving user;
Analytical unit, for being analyzed the data to be transmitted to determine private data and non-private data;
Transmission unit includes building in the data transfer request for sending data transfer request to the second terminal
The instruction of vertical first path and the second path;
Receiving unit, for receiving the first path mark and the second ID of trace route path of the second terminal feedback;
The transmission unit, be also used to send the mark of the private data and first path to the second terminal so that
The second terminal is obtained to store the private data under the corresponding path of first path mark;
The transmission unit is also used to when the private data is sent, and Xiang Suoshu second terminal sends described non-
The mark in private data and the second path is so that the second terminal stores the non-private data to second path
It identifies under corresponding path.
Third aspect present invention discloses a kind of terminal, and the terminal includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes as described in relation to the first aspect
Method.
As can be seen that first terminal determines the data to be transmitted that user chooses in the scheme of the embodiment of the present invention;It is described
First terminal analyzes to determine private data and non-private data the data to be transmitted;The first terminal is to institute
It states second terminal and sends data transfer request, include the finger for establishing first path and the second path in the data transfer request
Show;Receive the first path mark and the second ID of trace route path of the second terminal feedback;The first terminal is whole to described second
End sends the mark of the private data and first path so that the second terminal stores the private data to described
First path identifies under corresponding path;When the private data is sent, Xiang Suoshu second terminal sends described non-hidden
Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path
Know under corresponding path.It is hereby understood that can be identified hidden in data to be transmitted by implementing technical solution provided by the invention
Private data and non-private data, and the private data and non-private data are transmitted respectively so that the private data
It is stored in different paths with non-private data, to facilitate user management.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1-a is a kind of flow diagram of the method for Data Migration provided in an embodiment of the present invention;
Fig. 1-b is a kind of network architecture diagram of data mover system provided in an embodiment of the present invention;
Fig. 1-c is that a kind of data provided in an embodiment of the present invention store schematic table;
Fig. 2 is the flow diagram of the method for another Data Migration provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of another terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of entity apparatus structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of entity apparatus structural schematic diagram of mobile phone provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of method of Data Migration and terminals, can identify the privacy in data to be transmitted
Data and non-private data, and the private data and non-private data transmitted respectively so that the private data and
Non- private data is stored in different paths, to facilitate user management.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical solution in the embodiment of the present invention are explicitly described, it is clear that described embodiment is the present invention one
The embodiment divided, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, should fall within the scope of the present invention.
The term " first " that occurs in description of the invention, claims and attached drawing, " second " and " third " etc. are to use
In the different object of difference, and it is not intended to describe specific sequence.In addition, term " includes " and " having " and they are any
Deformation, it is intended that cover and non-exclusive include.Such as contain the process, method, system, product of a series of steps or units
Or equipment is not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or can
Selection of land further includes the other step or units intrinsic for these process, methods, product or equipment.
A kind of method of Data Migration is disclosed in one embodiment of the invention, which comprises first terminal
Determine the data to be transmitted that user chooses;The first terminal analyzes to determine privacy number the data to be transmitted
According to non-private data;The first terminal sends data transfer request to the second terminal, in the data transfer request
Instruction including establishing first path and the second path;Receive first path mark and the second path of the second terminal feedback
Mark;The first terminal sends the mark of the private data and first path so that described second to the second terminal
The private data is stored to the first path and is identified under corresponding path by terminal;When the private data is sent
When, Xiang Suoshu second terminal sends the mark of the non-private data and the second path so that the second terminal will be described non-
Under private data storage to the corresponding path of second ID of trace route path.
Fig. 1-a is please referred to, Fig. 1-a is a kind of method of Data Migration provided by one embodiment of the present invention.Wherein, as schemed
Shown in 1-a, a kind of method for Data Migration that one embodiment of the present of invention provides includes the following contents:
S101, first terminal determine the data to be transmitted that user chooses;
It is understood that the scene are as follows: user is by the Data Migration of first terminal to second terminal, then first is whole
After connection is established with second terminal in end, first terminal will remind user to select the data to be transmitted.
Wherein, as shown in Fig. 1-b, the first terminal can be established by wide area network or local area network and second terminal to be connected
It connects, to obtain the data transfer request of second terminal transmission.
Wherein, the first terminal can be the electronics such as smart phone, tablet computer, intelligent wearable equipment, computer
Equipment.
Wherein, the second terminal can be the electronics such as smart phone, tablet computer, intelligent wearable equipment, computer
Equipment.
Wherein, data to be transmitted can be the information such as audio-video, picture, text.
It is understood that first terminal can traverse the data to be transmitted to determine whether there is duplicate number
According to;Duplicate data if it exists then carry out duplicate removal processing to the data to be transmitted to prevent from transmitting duplicate information.
It should be pointed out that first terminal can be gone to traverse data to be transmitted with determination according to the mark of every part of data be
No there are identical marks, and identical mark, then illustrate that there are duplicate data if it exists.
As shown in fig 1-c, first data to be transmitted are classified, such as picture category, word type, video class.Citing
For, the mark of picture category data can be stored in picture category catalogue in the following, then according to the mark of picture category data to picture
Class data carry out duplicate removal.For example the following Data Identification of picture category has 12345,556677,8899,12345, then picture classification
Record exists under two 12345 Data Identifications, illustrates that the two data are duplicate.Certainly, it can be mentioned during duplicate removal
Show whether user deletes duplicate data, if the duplicate data that do not delete, it is recommended that name of the user to duplicate data
Title is renamed.
S102, the first terminal are analyzed the data to be transmitted to determine private data and non-privacy number
According to;
It is understood that data relevant to account number cipher are regarded as private data.In addition, private data can be
Data type that user chooses, such as short message, notepad information, photo, video etc..
For example, the first terminal analyzes to determine the number for including account information the data to be transmitted
According to;Private data, and the data setting that will not include the account information are set by the data comprising the account information
For non-private data.
S103, the first terminal send data transfer request to the second terminal, wrap in the data transfer request
Include the instruction for establishing first path and the second path;
Wherein, first path and the second path are not same paths.
S104, the first path mark and the second ID of trace route path for receiving the second terminal feedback;
Wherein, it should be pointed out that if receiving first path mark and the second path of the second terminal feedback
Mark, illustrates that second terminal has selected for the first store path and the second store path;First path mark and described first
Store path is corresponding, wherein first path identifies the address that can be first path;Similarly, the second ID of trace route path and described the
Two store paths are corresponding, wherein the second ID of trace route path can be the address in the second path;
S105, the first terminal to the second terminal send the private data and first path mark so that
The private data is stored to the first path and is identified under corresponding path by the second terminal;
It is understood that private data can be carried out to guarantee that private data is not revealed during transmission
Encryption is sent.
For example, the first terminal and the second terminal are interacted to determine symmetric key;Described first eventually
End encrypts the private data using the symmetric key;The first terminal sends encryption to the second terminal
The mark of private data and the first path.Wherein, it should be pointed out that second terminal receives the private data of encryption
Afterwards, by under the private data storage to first path of the encryption, symmetric key can also also be stored in first path in passing, with
Just the private data of encryption is decrypted at any time.
In addition, it is necessary to which, it is noted that the first terminal sends the private data and the first via to the second terminal
Before the mark of diameter, the size of the private data of the encryption is also judged, if the private data of encryption is too big, and second is whole
End is currently mobile flow, then biggish consumption can be caused to second terminal, for the sake of safety, still to remind whether user wants
Send data so.
Specifically, the first terminal calculates the size of the private data;If the size of the private data is greater than pre-
If when threshold value, the first terminal obtains the network connecting mode of the second terminal;If the network connecting mode of the second terminal is logical
Cross move flow networking when, then to the user issue be confirmed whether transmission prompt;If receiving the prompt of confirmation transmission, institute
It states first terminal and sends the mark of the private data and first path so that the second terminal will to the second terminal
The private data is stored under the corresponding path of mark of the first path.
S106, when the private data is sent, Xiang Suoshu second terminal sends the non-private data and second
The mark in path is so that the second terminal stores the non-private data to the corresponding path of second ID of trace route path
Under.
As can be seen that first terminal determines the data to be transmitted that user chooses in the scheme of the embodiment of the present invention;It is described
First terminal analyzes to determine private data and non-private data the data to be transmitted;The first terminal is to institute
It states second terminal and sends data transfer request, include the finger for establishing first path and the second path in the data transfer request
Show;Receive the first path mark and the second ID of trace route path of the second terminal feedback;The first terminal is whole to described second
End sends the mark of the private data and first path so that the second terminal stores the private data to described
First path identifies under corresponding path;When the private data is sent, Xiang Suoshu second terminal sends described non-hidden
Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path
Know under corresponding path.It is hereby understood that can be identified hidden in data to be transmitted by implementing technical solution provided by the invention
Private data and non-private data, and the private data and non-private data are transmitted respectively so that the private data
It is stored in different paths with non-private data, to facilitate user management.
Referring to Fig. 2, Fig. 2 is a kind of method of Data Migration provided by one embodiment of the present invention.Wherein, such as Fig. 2 institute
Show, a kind of method for Data Migration that one embodiment of the present of invention provides includes the following contents:
S201, first terminal determine the data to be transmitted that user chooses;
Wherein, the first terminal and the second terminal can be smart phone, tablet computer, intelligent wearable equipment
Equal electronic equipments.
S202, the first terminal traverse the data to be transmitted to determine whether there is duplicate data;If it exists
Duplicate data then carry out duplicate removal processing to the data to be transmitted;
S203, the first terminal analyze to determine the data for including account information the data to be transmitted;
S204, the data comprising the account information are set to private data, and will will not include the account information
Data be set as non-private data;
S205, the first terminal and the second terminal are interacted to determine symmetric key, and are utilized described symmetrical
Private data described in key pair is encrypted;
S206, the first terminal calculate the size of the private data of the encryption;
If the size of private data of S207, the encryption are greater than preset threshold, the first terminal obtains described the
The network connecting mode of two terminals;
If the network connecting mode of S208, the second terminal is by mobile flow networking, issued to the user true
Recognize the prompt whether transmitted;
If S209, the prompt for receiving confirmation transmission, the first terminal sends data transmission to the second terminal and asks
It asks, includes the instruction for establishing first path and the second path in the data transfer request;
S210, the first path mark and the second ID of trace route path for receiving the second terminal feedback;
S211, the first terminal send the private data of the encryption and the mark of first path to the second terminal
It is identified under corresponding path so that the second terminal stores the private data to the first path;
S212, when the private data is sent, Xiang Suoshu second terminal sends the non-private data and second
The mark in path is so that the second terminal stores the non-private data to the corresponding path of second ID of trace route path
Under.
As can be seen that having expanded the duplicate removal step of data to be transmitted in the scheme of the embodiment of the present invention, to prevent from repeating
Transmit data.Verification step is also expanded in the scheme of the embodiment of the present invention, to prevent from generating biggish consumption to mobile flow.
Referring to Fig. 3, Fig. 3 is a kind of structural schematic diagram for terminal that one embodiment of the present of invention provides.Wherein, as schemed
Shown in 3, a kind of terminal 300 of one embodiment of the present of invention offer, wherein the terminal can be as smart phone, plate electricity
The electronic equipments such as brain, intelligent wearable equipment.The terminal 300 includes determination unit 301, analytical unit 302, transmission unit 303
And receiving unit 304.
Determination unit 301, the data to be transmitted chosen for receiving user;
Analytical unit 302, for being analyzed the data to be transmitted to determine private data and non-private data;
Transmission unit 303 is used to send data transfer request to the second terminal, includes in the data transfer request
Establish the instruction of first path and the second path;
Receiving unit 304, for receiving the first path mark and the second ID of trace route path of the second terminal feedback;
Transmission unit 303, be also used to send the mark of the private data and first path to the second terminal so that
The second terminal is obtained to store the private data under the corresponding path of first path mark;
Transmission unit 303 is also used to when the private data is sent, and Xiang Suoshu second terminal sends described non-hidden
Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path
Know under corresponding path.
Wherein it is determined that unit 301, analytical unit 302, transmission unit 303 and receiving unit 304 can be used for executing reality
Method described in step S101 to S106 in example 1 is applied, specifically describes description of the detailed in Example 1 to the method, herein no longer
It repeats.
Referring to Fig. 4, Fig. 4 is a kind of structural schematic diagram for terminal that one embodiment of the present of invention provides.Wherein, as schemed
Shown in 4, another terminal 400 of one embodiment of the present of invention offer, wherein the terminal can be as smart phone, plate
The electronic equipments such as computer, intelligent wearable equipment.The terminal 400 includes determination unit 401, analytical unit 402, transmission unit
403, receiving unit 404, encryption unit 405, computing unit 406, acquiring unit 407, prompt unit 408, Traversal Unit 409
With duplicate removal unit 410.
Determination unit 401, the data to be transmitted chosen for receiving user;
Traversal Unit 409, for traversing the data to be transmitted to determine whether there is duplicate data;
Duplicate removal unit 410 then carries out duplicate removal processing to the data to be transmitted for duplicate data if it exists;
Analytical unit 402, for being analyzed the data to be transmitted to determine private data and non-privacy number
According to;
Specifically, analytical unit 402 includes analysis subelement and setting subelement;
The analysis subelement, for being analyzed the data to be transmitted to determine the number for including account information
According to;
The setting subelement, for will include that the data of the account information are set as private data, and will not wrap
Data containing the account information are set as non-private data.
Determination unit 401, for interacting with the second terminal to determine symmetric key;
Encryption unit 405, for being encrypted using the symmetric key to the private data;
Computing unit 406, for calculating the size of the private data;
Acquiring unit 407 obtains described second if the size of the private data for the encryption is greater than preset threshold
The network connecting mode of terminal;
Prompt unit 408, if the network connecting mode for the second terminal is by mobile flow networking, Xiang Suoshu
User issues the prompt for being confirmed whether transmission;
Transmission unit 403, if Xiang Suoshu second terminal sends data transmission specifically for the prompt for receiving confirmation transmission
It requests, includes the instruction for establishing first path and the second path in the data transfer request;
Receiving unit 404, for receiving the first path mark and the second ID of trace route path of the second terminal feedback;
Transmission unit 403 is also used to send the private data of the encryption and the mark of first path to the second terminal
Know so that the second terminal stores the private data under the corresponding path of first path mark;
Transmission unit 403 is also used to when the private data is sent, and Xiang Suoshu second terminal sends described non-hidden
Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path
Know under corresponding path.
Wherein it is determined that unit 401, analytical unit 402, transmission unit 403, receiving unit 404, encryption unit 405, calculating
Unit 406, acquiring unit 407, prompt unit 408, Traversal Unit 409 and duplicate removal unit 410 can be used for executing in embodiment 2
Method described in step S201 to S212 specifically describes description of the detailed in Example 2 to the method, and details are not described herein.
Referring to Fig. 5, in another embodiment of the present invention, providing a kind of terminal.The terminal 500 includes
CPU501, memory 502, bus 503.Wherein, which can be smart phone, tablet computer, intelligent wearable device etc.
Electronic equipment with call function.
Wherein, CPU501 executes the program being stored in advance in memory 502, which specifically includes:
Determine the data to be transmitted that user chooses;
The data to be transmitted are analyzed to determine private data and non-private data;
Data transfer request is sent to the second terminal, includes establishing first path and the in the data transfer request
The instruction in two paths;
Receive the first path mark and the second ID of trace route path of the second terminal feedback;
To the second terminal send the private data and first path mark so that the second terminal by institute
Private data storage is stated to identify under corresponding path to the first path;
When the private data is sent, Xiang Suoshu second terminal sends the non-private data and the second path
Mark is so that the second terminal will be under the non-private data storage to the corresponding path of second ID of trace route path.
Optionally, the first terminal is analyzed the data to be transmitted to determine private data and non-privacy number
According to, comprising:
The data to be transmitted are analyzed to determine the data for including account information;
Private data, and the data that will not include the account information are set by the data comprising the account information
It is set as non-private data.
Optionally, described to hold before the mark that the private data and first path are sent to the second terminal
Row process further include:
It interacts with the second terminal to determine symmetric key;
The private data is encrypted using the symmetric key;
The mark of the private data and first path is sent to the second terminal, comprising:
The private data of encryption and the mark of the first path are sent to the second terminal.
Optionally, the first terminal to the second terminal send the private data and first path mark it
Before, the implementation procedure further include:
Calculate the size of the private data of the encryption;
If the size of the private data is greater than preset threshold, the network connecting mode of the second terminal is obtained;
If the network connecting mode of the second terminal is by mobile flow networking, issues and be confirmed whether to the user
The prompt of transmission;
If receiving the prompt of confirmation transmission, Xiang Suoshu second terminal sends the mark of the private data and first path
Know.
Optionally, the first terminal is analyzed the data to be transmitted to determine private data and non-privacy number
According to before, the implementation procedure further include:
The data to be transmitted are traversed to determine whether there is duplicate data;
Duplicate data if it exists then carry out duplicate removal processing to the data to be transmitted.
As can be seen that first terminal determines the data to be transmitted that user chooses in the scheme of the embodiment of the present invention;It is described
First terminal analyzes to determine private data and non-private data the data to be transmitted;The first terminal is to institute
It states second terminal and sends data transfer request, include the finger for establishing first path and the second path in the data transfer request
Show;Receive the first path mark and the second ID of trace route path of the second terminal feedback;The first terminal is whole to described second
End sends the mark of the private data and first path so that the second terminal stores the private data to described
First path identifies under corresponding path;When the private data is sent, Xiang Suoshu second terminal sends described non-hidden
Private data and the mark in the second path are so that the second terminal marks the non-private data storage to second path
Know under corresponding path.It is hereby understood that can be identified hidden in data to be transmitted by implementing technical solution provided by the invention
Private data and non-private data, and the private data and non-private data are transmitted respectively so that the private data
It is stored in different paths with non-private data, to facilitate user management.
Referring to Fig. 6, Fig. 6 is the frame of the part-structure for the relevant mobile phone of terminal that one embodiment of the present of invention provides
Figure.With reference to Fig. 6, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 610, memory 620, input unit 630, shows
Show unit 640, sensor 650, voicefrequency circuit 660, Wireless Fidelity (Wireless Fidelity, WiFi) module 670, processing
The components such as device 680 and power supply 690.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted pair
The restriction of mobile phone may include perhaps combining certain components or different component cloth than illustrating more or fewer components
It sets.
It is specifically introduced below with reference to each component parts of the Fig. 6 to mobile phone:
RF circuit 610 can be used for sending and receiving for information.In general, RF circuit 610 includes but is not limited to antenna, at least one
A amplifier, transceiver, coupler, low-noise amplifier (LowNoiseAmplifier, LNA), duplexer etc..In addition, RF
Circuit 610 can also be communicated with network and other equipment by wireless communication.Any communication mark can be used in above-mentioned wireless communication
Quasi- or agreement, including but not limited to global system for mobile communications (Global System ofMobile communication,
GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code
DivisionMultiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple
Access, WCDMA), long term evolution (LongTerm Evolution, LTE), Email, short message service
(ShortMessaging Service, SMS) etc..
Memory 620 can be used for storing software program and module, and processor 680 is stored in memory 620 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 620 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (such as Data Migration function, touch control operation detection function etc.) etc.;Storage data area can be stored is created according to using for mobile phone
Data (such as data storage table data etc.) built etc..In addition, memory 620 may include high-speed random access memory,
It can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-states are deposited
Memory device.
Input unit 630 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 630 may include that fingerprint mould group 631 and other inputs are set
Standby 632.Fingerprint mould group 631 can acquire the finger print data of user on it.Optionally, fingerprint mould group 631 may include that optical profile type refers to
Line module, capacitance type fingerprint module and RF type fingerprint module.By taking fingerprint mould group 631 is capacitance type fingerprint mould group as an example, tool
Body includes induction electrode (n1 abnormal induction electrode and n2 normal induction electrode) and the signal that connect with the induction electrode
Processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.).In addition to fingerprint mould group 631, input unit
630 can also include other input equipments 632.Specifically, other input equipments 632 can include but is not limited to physical keyboard,
One of function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 640 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 640 may include display screen 641, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Display screen 641.Although fingerprint mould group 631 and display screen 641 are to realize the defeated of mobile phone as two independent components in Fig. 6
Enter and input function, but in some embodiments it is possible to it is fingerprint mould group 631 and display screen 641 is integrated and realize mobile phone
Output and input function.
Mobile phone may also include at least one sensor 650, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display screen 641, proximity sensor can when mobile phone is moved in one's ear, close display screen 641 and/or
Backlight.As a kind of motion sensor, accelerometer sensor can detect all directions on (generally three axis) acceleration it is big
It is small, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, phase
Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 660, loudspeaker 661, microphone 662 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 6 61, be converted to sound by loudspeaker 661 by road 660
Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, after being received by voicefrequency circuit 660
Audio data is converted to, then by after the processing of audio data output processor 680, through RF circuit 610 to be sent to such as the other hand
Machine, or audio data is exported to memory 620 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 670
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 6 is shown
WiFi module 670, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 680 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 620, and call and be stored in memory 620
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 680 can wrap
Include one or more processing units;Preferably, processor 680 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Mobile phone further includes the power supply 690 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 680 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In earlier figures 1, embodiment shown in Fig. 2, each step method process can be realized based on the structure of the mobile phone.
In earlier figures 3, embodiment shown in Fig. 4, each unit function can be realized based on the structure of the mobile phone.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit,
It can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Various Jie that can store program code such as reservoir (RAM, RandomAccess Memory), mobile hard disk, magnetic or disk
Matter.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (11)
1. a kind of method of Data Migration, which is characterized in that the described method includes:
First terminal determines the data to be transmitted that user chooses to migrate to second terminal;
The first terminal analyzes to determine private data and non-private data the data to be transmitted;
The first terminal sends data transfer request to the second terminal, includes establishing first in the data transfer request
The instruction in path and the second path;
The first path mark and the second ID of trace route path, the second terminal for receiving the second terminal feedback establish described first
Path and second path, first path mark is corresponding with the first path, second ID of trace route path with it is described
Second path is corresponding;
The first terminal sends the mark of the private data and the first path so that described to the second terminal
The private data is stored to the first path and is identified under corresponding path by second terminal;
When the private data is sent, Xiang Suoshu second terminal sends the non-private data and second path
Mark is so that the second terminal will be under the non-private data storage to the corresponding path of second ID of trace route path.
2. the method according to claim 1, wherein the first terminal divides the data to be transmitted
Analysis is to determine private data and non-private data, comprising:
The first terminal analyzes to determine the data for including account information the data to be transmitted;
Private data, and the data setting that will not include the account information are set by the data comprising the account information
For non-private data.
3. according to the method described in claim 2, it is characterized in that, the first terminal is described hidden to second terminal transmission
Before the mark of private data and first path, the method also includes:
The first terminal and the second terminal are interacted to determine symmetric key;
The first terminal encrypts the private data using the symmetric key;
The first terminal sends the mark of the private data and first path to the second terminal, comprising:
The first terminal sends the private data of encryption and the mark of the first path to the second terminal.
4. according to the method described in claim 3, it is characterized in that, the first terminal is described hidden to second terminal transmission
Before the mark of private data and first path, the method also includes:
The first terminal calculates the size of the private data of the encryption;
If the size of the private data is greater than preset threshold, the first terminal obtains the networking side of the second terminal
Formula;
If the network connecting mode of the second terminal is by mobile flow networking, is issued to the user and be confirmed whether to transmit
Prompt;
If receiving the prompt of confirmation transmission, the first terminal sends the private data and the first via to the second terminal
The mark of diameter.
5. method according to any one of claims 1 to 4, which is characterized in that the first terminal is to the number to be transmitted
According to being analyzed to determine private data and non-private data before, the method also includes:
The first terminal traverses the data to be transmitted to determine whether there is duplicate data;
Duplicate data if it exists then carry out duplicate removal processing to the data to be transmitted.
6. a kind of terminal, which is characterized in that the terminal includes:
Determination unit, for receiving the data to be transmitted that user chooses to migrate to second terminal;
Analytical unit, for being analyzed the data to be transmitted to determine private data and non-private data;
Transmission unit includes establishing for sending data transfer request to the second terminal, in the data transfer request
The instruction in one path and the second path;
Receiving unit, for receiving the first path mark and the second ID of trace route path of the second terminal feedback, described second eventually
The first path and second path are established in end, and the first path mark is corresponding with the first path, and described second
ID of trace route path is corresponding with second path;
The transmission unit, be also used to send the mark of the private data and the first path to the second terminal so that
The second terminal is obtained to store the private data under the corresponding path of first path mark;
The transmission unit is also used to when the private data is sent, and Xiang Suoshu second terminal sends the non-privacy
Data and the mark in second path are so that the second terminal stores the non-private data to second path
It identifies under corresponding path.
7. terminal according to claim 6, which is characterized in that the analytical unit includes that analysis subelement and setting are single
Member;
The analysis subelement, for being analyzed the data to be transmitted to determine the data for including account information;
The setting subelement, the data of the account information are set as private data for will include, and will not include institute
The data for stating account information are set as non-private data.
8. terminal according to claim 7, which is characterized in that the terminal further includes encryption unit;
The determination unit, for interacting with the second terminal to determine symmetric key;
The encryption unit, for being encrypted using the symmetric key to the private data;
The transmission unit, specifically for sending the private data of encryption and the mark of the first path to the second terminal
Know.
9. terminal according to claim 8, which is characterized in that the terminal further includes computing unit, acquiring unit and mentions
Show unit;
The computing unit, for calculating the size of the private data;
The acquiring unit obtains described second eventually if the size of the private data for the encryption is greater than preset threshold
The network connecting mode at end;
The prompt unit, if the network connecting mode for the second terminal is by mobile flow networking, to the use
Family issues the prompt for being confirmed whether transmission;
The transmission unit, if the terminal sends institute to the second terminal specifically for the prompt for receiving confirmation transmission
State the mark of private data and first path.
10. according to any terminal of claim 6 to 9, which is characterized in that the terminal further includes Traversal Unit and duplicate removal
Unit;
The Traversal Unit, for traversing the data to be transmitted to determine whether there is duplicate data;
The duplicate removal unit then carries out duplicate removal processing to the data to be transmitted for duplicate data if it exists.
11. a kind of terminal characterized by comprising
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, executes such as claim 1 to right
It is required that 5 described in any item methods.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610826853.XA CN106487878B (en) | 2016-09-14 | 2016-09-14 | A kind of method and terminal of Data Migration |
PCT/CN2017/095056 WO2018049937A1 (en) | 2016-09-14 | 2017-07-28 | Data migration method and terminals |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610826853.XA CN106487878B (en) | 2016-09-14 | 2016-09-14 | A kind of method and terminal of Data Migration |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106487878A CN106487878A (en) | 2017-03-08 |
CN106487878B true CN106487878B (en) | 2019-08-20 |
Family
ID=58267255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610826853.XA Expired - Fee Related CN106487878B (en) | 2016-09-14 | 2016-09-14 | A kind of method and terminal of Data Migration |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106487878B (en) |
WO (1) | WO2018049937A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487878B (en) * | 2016-09-14 | 2019-08-20 | Oppo广东移动通信有限公司 | A kind of method and terminal of Data Migration |
EP3547637A1 (en) * | 2018-03-30 | 2019-10-02 | AO Kaspersky Lab | System and method for routing data when executing queries |
US11635903B2 (en) | 2021-06-15 | 2023-04-25 | International Business Machines Corporation | Cloud data migration |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683409A (en) * | 2013-11-29 | 2015-06-03 | 华为终端有限公司 | Method for sharing applications between terminals and terminal |
CN105188015A (en) * | 2015-08-07 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | Mobile terminal private data migration backup method and mobile terminal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100620055B1 (en) * | 2004-12-06 | 2006-09-08 | 엘지전자 주식회사 | Method of canceling location information request |
CN104408383B (en) * | 2014-10-31 | 2018-03-16 | 东莞宇龙通信科技有限公司 | Private data processing system and method |
CN104540088A (en) * | 2014-12-23 | 2015-04-22 | 小米科技有限责任公司 | Connection establishment method, terminal and device |
CN105577361A (en) * | 2015-04-20 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method and device thereof |
CN106487878B (en) * | 2016-09-14 | 2019-08-20 | Oppo广东移动通信有限公司 | A kind of method and terminal of Data Migration |
-
2016
- 2016-09-14 CN CN201610826853.XA patent/CN106487878B/en not_active Expired - Fee Related
-
2017
- 2017-07-28 WO PCT/CN2017/095056 patent/WO2018049937A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104683409A (en) * | 2013-11-29 | 2015-06-03 | 华为终端有限公司 | Method for sharing applications between terminals and terminal |
CN105188015A (en) * | 2015-08-07 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | Mobile terminal private data migration backup method and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106487878A (en) | 2017-03-08 |
WO2018049937A1 (en) | 2018-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105824958B (en) | A kind of methods, devices and systems of inquiry log | |
CN107967322B (en) | File classification display method, mobile terminal and computer readable storage medium | |
CN104238893B (en) | A kind of method and apparatus that video preview picture is shown | |
US20160105418A1 (en) | Method, system, device, and terminal for network initialization of multimedia playback device | |
CN104820665A (en) | Method, terminal and server for exhibiting recommendation information | |
CN104239332A (en) | Webpage content processing method, webpage content processing device and browser client side | |
CN106534288B (en) | A kind of data transmission method and mobile terminal | |
CN110442297A (en) | Multi-screen display method, split screen display available device and terminal device | |
CN106487878B (en) | A kind of method and terminal of Data Migration | |
CN106205657B (en) | A kind of lyric display method and device | |
CN106060223B (en) | Terminal control method and device | |
CN106658657A (en) | Network access method and device | |
TWI575458B (en) | Method, device and system for providing service based on application | |
CN103631592B (en) | A kind of configuration, call method, device and equipment that shows resource | |
CN110532231A (en) | File polling method, file polling device and terminal device | |
CN105321197A (en) | Image processing method and apparatus | |
CN104391629A (en) | Method for sending message in orientation manner, method for displaying message, server and terminal | |
CN104836717A (en) | Data processing method and apparatus, and terminal equipment | |
CN104133693B (en) | Installment state detection method, device and terminal | |
CN107317828A (en) | Document down loading method and device | |
CN109688611A (en) | A kind of configuration method, device, terminal and the storage medium of frequency range parameter | |
CN107786423B (en) | A kind of method and system of instant messaging | |
CN106656803B (en) | A kind of method, apparatus and system updating route table items | |
CN106330684B (en) | A kind of method and terminal of synchronizing information | |
CN105022621A (en) | Method and device for collecting session message and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190820 |