CN107086998A - Recover the method and device, terminal, computer-readable recording medium of application data - Google Patents

Recover the method and device, terminal, computer-readable recording medium of application data Download PDF

Info

Publication number
CN107086998A
CN107086998A CN201710298758.1A CN201710298758A CN107086998A CN 107086998 A CN107086998 A CN 107086998A CN 201710298758 A CN201710298758 A CN 201710298758A CN 107086998 A CN107086998 A CN 107086998A
Authority
CN
China
Prior art keywords
terminal
data
application program
restored
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710298758.1A
Other languages
Chinese (zh)
Inventor
霍平华
陈艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710298758.1A priority Critical patent/CN107086998A/en
Publication of CN107086998A publication Critical patent/CN107086998A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses the method and device for recovering application data, terminal, computer-readable recording medium, method includes step first terminal and passes through the sudden strain of a muscle of first terminal passing data and bag name that application program obtains application program to be restored, and the data of application program to be restored and bag name are sent to by the finger daemon of first terminal the socket receiving module of second terminal;The socket receiving module of second terminal receives the data and bag name of application program to be restored;The sudden strain of a muscle of second terminal passes application program and proved according to the user identity of the bag name of application program to be restored acquisition application program to be restored;The finger daemon of second terminal proves to recover the self contained navigation authority of the data of application program to be restored according to user identity, and passes through the forced symmetric centralization authority for the data for recovering order recovery application program to be restored.The present invention simplifies application data transmission and the flow recovered, and improves application data transmission and the reliability recovered, lifts Consumer's Experience sense.

Description

Recover the method and device, terminal, computer-readable recording medium of application data
Technical field
The present invention relates to field of terminal technology, more particularly to a kind of method and device for recovering application data, terminal, Computer-readable recording medium.
Background technology
Mobile terminal stores the substantial amounts of information of terminal user, and its information stored potentially includes address list, short message, postal The personal information such as part, photo, it is also possible to including important informations such as bank account, credit card account and passwords.
During the present invention is realized, inventor has found that prior art has problems with:User more renews mobile whole During end, generally require and re-download application program conventional before, or by application data before, such as chat record, Logon information, the picture video of reception etc. backups to external safe digital card (Secure Digital Memory Card/SD Card), external safe digital card is then inserted into new mobile terminal, then recovers application data from SD card, this process is more numerous It is trivial, and if made a fault in operating process, it is easy to cause loss of data, or corresponding application can not correctly start.
The content of the invention
It is a primary object of the present invention to propose a kind of method and device, terminal, computer for recovering application data Readable storage medium storing program for executing, it is intended to solve the technical problem of prior art presence.
To achieve the above object, first aspect of the embodiment of the present invention provides a kind of method for recovering application data, institute Stating method includes step:
First terminal passes application program by the sudden strain of a muscle of first terminal and obtains the data and bag name of application program to be restored, and leads to The finger daemon for crossing first terminal connects the socket that the data and bag name of the application program to be restored are sent to second terminal Receive module;
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second eventually The sudden strain of a muscle at end passes the user identity that application program obtains the application program to be restored according to the bag name of the application program to be restored Prove;The finger daemon of the second terminal proves to recover the data of the application program to be restored according to the user identity Self contained navigation authority, and weighed by the forced symmetric centralization for recovering the data that order recovers the application program to be restored Limit.
Further, the finger daemon of the first terminal starts in the following manner:
During the first terminal start, start the init processes of the first terminal;Enter in the init of the first terminal Start the finger daemon of the first terminal in journey.
Further, the finger daemon of the second terminal and the socket receiving module of the second terminal pass through following Mode starts:
During the second terminal start, start the init processes of the second terminal;Enter in the init of the second terminal Start the finger daemon of the second terminal in journey;The set of the second terminal is started by the finger daemon of the second terminal Connect word receiving module.
In addition, to achieve the above object, second aspect of the embodiment of the present invention provides a kind of dress for recovering application data Put, the device for recovering application data includes memory, processor and is stored on the memory and can be described The program of the recovery application data run on processor, the program of the recovery application data is held by the processor The step of method of following recovery application data is realized during row:
First terminal passes application program by the sudden strain of a muscle of first terminal and obtains the data and bag name of application program to be restored, and leads to The finger daemon for crossing first terminal connects the socket that the data and bag name of the application program to be restored are sent to second terminal Receive module;
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second eventually The sudden strain of a muscle at end passes the user identity that application program obtains the application program to be restored according to the bag name of the application program to be restored Prove;The finger daemon of the second terminal proves to recover the data of the application program to be restored according to the user identity Self contained navigation authority, and weighed by the forced symmetric centralization for recovering the data that order recovers the application program to be restored Limit.
Further, it is described recover application data program by the computing device when be additionally operable to realize following step Suddenly:
During the first terminal start, start the init processes of the first terminal;Enter in the init of the first terminal Start the finger daemon of the first terminal in journey.
Further, it is described recover application data program by the computing device when be additionally operable to realize following step Suddenly:
During the second terminal start, start the init processes of the second terminal;Enter in the init of the second terminal Start the finger daemon of the second terminal in journey;The set of the second terminal is started by the finger daemon of the second terminal Connect word receiving module.
In addition, to achieve the above object, the third aspect of the embodiment of the present invention provides a kind of side for recovering application data Method, methods described includes step:
The socket receiving module of terminal receives the data and bag name for the application program to be restored that another terminal is sent;
The sudden strain of a muscle of terminal passes application program and obtains the application program to be restored according to the bag name of the application program to be restored User identity prove;
The finger daemon of terminal proves to recover the autonomous of the data of the application program to be restored according to the user identity Access control right, and by recovering the forced symmetric centralization authority that order recovers the data of the application program to be restored.
Further, the finger daemon of the terminal and the socket receiving module of the terminal are opened in the following manner It is dynamic:
During the starting up of terminal, start the init processes of the terminal;Start in the init processes of the terminal described The finger daemon of terminal;The socket receiving module of the terminal is started by the finger daemon of the terminal.
In addition, to achieve the above object, fourth aspect of the embodiment of the present invention provides a kind of terminal, the terminal includes:Deposit The journey of reservoir, processor and the recovery application data that is stored on the memory and can run on the processor Sequence, realizes the side of above-mentioned recovery application data when the program of the recovery application data is by the computing device The step of method.
Furthermore, to achieve the above object, the aspect of the embodiment of the present invention the 5th provides a kind of computer-readable recording medium, institute State to be stored with computer-readable recording medium and recover the program of application data, the program of the recovery application data The step of above-mentioned recovery application data is realized when being executed by processor.
The method and device, terminal, computer-readable storage medium provided in an embodiment of the present invention for recovering application data Matter, the data and bag name of application program to be restored are received by socket receiving module, according to the bag of application program to be restored name Obtaining the user identity of application program to be restored proves, and then recovers the self contained navigation authorities of the data of application program and strong Access control right processed;Simplify application data transmission with recover flow, improve application data transmission with it is extensive Multiple reliability, lifts Consumer's Experience sense.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the method flow schematic diagram of the recovery application data of first embodiment of the invention;
Fig. 4 is the apparatus structure schematic diagram of the recovery application data of second embodiment of the invention;
Fig. 5 is the method flow schematic diagram of the recovery application data of third embodiment of the invention;
Fig. 6 is the terminal structure schematic diagram of fourth embodiment of the invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed Ground is used.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved Move the fixed terminals such as terminal, and numeral TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of realization each embodiment of the invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent into base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or The voice data stored in memory 109 is converted into audio signal and is output as sound.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 1 00 is performed can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042,1041 pairs of graphics processor is in video acquisition mode Or the view data progress of the static images or video obtained in image capture mode by image capture apparatus (such as camera) Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound The noise produced during frequency signal or interference.
Mobile terminal 1 00 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 1 00 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can be wrapped Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 1 00 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system that the mobile terminal of the present invention is based on is entered below Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, UE (User Equipment, use of the LTE system including communicating connection successively Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and There is provided carrying and connection management for the control node of signaling between EPC203.HSS2032 is all to manage for providing some registers Such as function of attaching position register (not shown) etc, and some are preserved about the use such as service features, data rate The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
First embodiment
As shown in figure 3, first embodiment of the invention provides a kind of method for recovering application data, methods described includes Step:
30th, first terminal passes data and bag name that application program obtains application program to be restored by the sudden strain of a muscle of first terminal, And connect the socket that the data of application program to be restored and bag name are sent to second terminal by the finger daemon of first terminal Receive module;
In the present embodiment, the finger daemon of first terminal starts in the following manner:
When first terminal is started shooting, start the init processes of first terminal;Start first in the init processes of first terminal The finger daemon of terminal.
Because finger daemon is by starting in init processes, therefore with root authority.
31st, the socket receiving module of second terminal receives the data and bag name of application program to be restored;Second terminal Dodge biography application program proves according to the user identity of the bag name of application program to be restored acquisition application program to be restored;Second terminal Finger daemon proved to recover the self contained navigation authority of the data of application program to be restored according to user identity, and by extensive Order of reporting on completion of a task recovers the forced symmetric centralization authority of the data of application program to be restored.
In order to make it easy to understand, it is following to self contained navigation authority (Discretionary Access Control, DAC), forced symmetric centralization (Mandatory Access Control, MAC) is introduced:
Before SELinux occurs, the security model on Linux is DAC, and full name is Discretionary Access Control, is translated as self contained navigation.DAC core concept is very simple, is exactly:The authority that is possessed on process theory with The authority for performing its user is identical.Such as, Browser is started with root user, then Browser just has the power of root user Limit, can do anything on linux system.
Obviously, DAC is too loose.SELinux is in order to solve this problem, outside DAC, devises a new peace Full model, is MAC (Mandatory Access Control), is translated as forced symmetric centralization.MAC philosophy is very simple It is single:I.e. any process is want to do anything in SELinux systems, it is necessary to power is first assigned in security strategy configuration file Limit.Every authority not appeared in security strategy configuration file, the process just not no authority.
In the present embodiment, the finger daemon of the second terminal and the socket receiving module of the second terminal pass through In the following manner starts:
During the second terminal start, start the init processes of the second terminal;Enter in the init of the second terminal Start the finger daemon of the second terminal in journey;The set of the second terminal is started by the finger daemon of the second terminal Connect word receiving module.
Likewise, because finger daemon is by starting in init processes, therefore with root authority.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name (com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication) Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery, Wechat can be logged in B machines.
The method provided in an embodiment of the present invention for recovering application data, receives to be restored by socket receiving module The data and bag name of application program, are demonstrate,proved according to the user identity that the bag name of application program to be restored obtains application program to be restored It is bright, and then recover the self contained navigation authority and forced symmetric centralization authority of the data of application program;Simplify application program Data transfer and the flow recovered, improve application data transmission and the reliability recovered, lift Consumer's Experience sense.
Second embodiment
Reference picture 4, Fig. 4 provides a kind of recovery application program corresponding to those in the first embodiment for second embodiment of the invention The device of data, the device of the recovery application data includes memory 41, processor 40 and is stored in the memory On 41 and can be run on the processor 40 recovery application data program, the journey of the recovery application data Sequence is realized the method for following recovery application data during computing device the step of:
First terminal passes application program by the sudden strain of a muscle of first terminal and obtains the data and bag name of application program to be restored, and leads to The finger daemon for crossing first terminal connects the socket that the data and bag name of the application program to be restored are sent to second terminal Receive module;
In the present embodiment, it is additionally operable to realize when the program for recovering application data is performed by the processor 40 Following steps:
During the first terminal start, start the init processes of the first terminal;Enter in the init of the first terminal Start the finger daemon of the first terminal in journey.
Because finger daemon is by starting in init processes, therefore with root authority.
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second eventually The sudden strain of a muscle at end passes the user identity that application program obtains the application program to be restored according to the bag name of the application program to be restored Prove;The finger daemon of the second terminal proves to recover the data of the application program to be restored according to the user identity Self contained navigation authority, and weighed by the forced symmetric centralization for recovering the data that order recovers the application program to be restored Limit.
In order to make it easy to understand, it is following to self contained navigation authority (Discretionary Access Control, DAC), forced symmetric centralization (Mandatory Access Control, MAC) is introduced:
Before SELinux occurs, the security model on Linux is DAC, and full name is Discretionary Access Control, is translated as self contained navigation.DAC core concept is very simple, is exactly:The authority that is possessed on process theory with The authority for performing its user is identical.Such as, Browser is started with root user, then Browser just has the power of root user Limit, can do anything on linux system.
Obviously, DAC is too loose.SELinux is in order to solve this problem, outside DAC, devises a new peace Full model, is MAC (Mandatory Access Control), is translated as forced symmetric centralization.MAC philosophy is very simple It is single:I.e. any process is want to do anything in SELinux systems, it is necessary to power is first assigned in security strategy configuration file Limit.Every authority not appeared in security strategy configuration file, the process just not no authority.
In the present embodiment, it is additionally operable to realize when the program for recovering application data is performed by the processor 40 Following steps:
During the second terminal start, start the init processes of the second terminal;Enter in the init of the second terminal Start the finger daemon of the second terminal in journey;The set of the second terminal is started by the finger daemon of the second terminal Connect word receiving module.
Likewise, because finger daemon is by starting in init processes, therefore with root authority.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name (com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication) Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery, Wechat can be logged in B machines.
The device provided in an embodiment of the present invention for recovering application data, receives to be restored by socket receiving module The data and bag name of application program, are demonstrate,proved according to the user identity that the bag name of application program to be restored obtains application program to be restored It is bright, and then recover the self contained navigation authority and forced symmetric centralization authority of the data of application program;Simplify application program Data transfer and the flow recovered, improve application data transmission and the reliability recovered, lift Consumer's Experience sense.
3rd embodiment
Reference picture 5, Fig. 5 provides a kind of method for recovering application data, methods described for third embodiment of the invention Including step:
50th, the socket receiving module of terminal receives the data and bag name for the application program to be restored that another terminal is sent;
51st, the sudden strain of a muscle of terminal passes the user that application program obtains application program to be restored according to the bag name of application program to be restored Proof of identification;
52nd, the finger daemon of terminal proves to recover the autonomous access control of the data of application program to be restored according to user identity Authority processed, and by recovering the forced symmetric centralization authority that order recovers the data of application program to be restored.
In order to make it easy to understand, it is following to self contained navigation authority (Discretionary Access Control, DAC), forced symmetric centralization (Mandatory Access Control, MAC) is introduced:
Before SELinux occurs, the security model on Linux is DAC, and full name is Discretionary Access Control, is translated as self contained navigation.DAC core concept is very simple, is exactly:The authority that is possessed on process theory with The authority for performing its user is identical.Such as, Browser is started with root user, then Browser just has the power of root user Limit, can do anything on linux system.
Obviously, DAC is too loose.SELinux is in order to solve this problem, outside DAC, devises a new peace Full model, is MAC (Mandatory Access Control), is translated as forced symmetric centralization.MAC philosophy is very simple It is single:I.e. any process is want to do anything in SELinux systems, it is necessary to power is first assigned in security strategy configuration file Limit.Every authority not appeared in security strategy configuration file, the process just not no authority.
In the present embodiment, the finger daemon of terminal and the socket receiving module of terminal start in the following manner:
During starting up of terminal, start the init processes of terminal;Start the finger daemon of terminal in the init processes of terminal;It is logical The finger daemon for crossing terminal starts the socket receiving module of terminal.
Because finger daemon is by starting in init processes, therefore with root authority.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name (com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication) Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery, Wechat can be logged in B machines.
The method provided in an embodiment of the present invention for recovering application data, receives to be restored by socket receiving module The data and bag name of application program, are demonstrate,proved according to the user identity that the bag name of application program to be restored obtains application program to be restored It is bright, and then recover the self contained navigation authority and forced symmetric centralization authority of the data of application program;Simplify application program Data transfer and the flow recovered, improve application data transmission and the reliability recovered, lift Consumer's Experience sense.
Fourth embodiment
Reference picture 6, Fig. 6 provides a kind of terminal corresponding with 3rd embodiment, the end for fourth embodiment of the invention End 60 includes:Memory 62, processor 61 and be stored on the memory 62 and can be run on the processor 61 it is extensive The program of multiple application data, the program of the recovery application data realizes that the 3rd is real when being performed by the processor 61 The step of applying the method for recovery application data of example.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name (com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication) Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery, Wechat can be logged in B machines.
Terminal provided in an embodiment of the present invention, the data and bag of application program to be restored are received by socket receiving module Name, is proved according to the user identity that the bag name of application program to be restored obtains application program to be restored, and then recovers application program Data self contained navigation authority and forced symmetric centralization authority;Simplify application data transmission and the stream recovered Journey, improves application data transmission and the reliability recovered, lifts Consumer's Experience sense.
5th embodiment
Fifth embodiment of the invention provides a kind of computer-readable recording medium corresponding with 3rd embodiment, the meter It is stored with calculation machine readable storage medium storing program for executing and recovers the program of application data, the program of the recovery application data is located The step of reason device realizes the recovery application data of 3rd embodiment when performing.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name (com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication) Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery, Wechat can be logged in B machines.
Computer-readable recording medium provided in an embodiment of the present invention, application to be restored is received by socket receiving module The data and bag name of program, prove according to the user identity that the bag name of application program to be restored obtains application program to be restored, enter And recover the self contained navigation authority and forced symmetric centralization authority of the data of application program;Simplify application data biography The defeated flow with recovering, improves application data transmission and the reliability recovered, lifts Consumer's Experience sense.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also including other key elements being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in process, method, article or the device of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each of the invention embodiment.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of method for recovering application data, methods described includes step:
The sudden strain of a muscle that first terminal passes through first terminal passes data and bag name that application program obtains application program to be restored, and passes through the The socket that the data and bag name of the application program to be restored are sent to second terminal is received mould by the finger daemon of one terminal Block;
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second terminal Dodge biography application program proves according to the user identity of the bag name of the application program to be restored acquisition application program to be restored; The finger daemon of the second terminal proves to recover the autonomous of the data of the application program to be restored according to the user identity Access control right, and by recovering the forced symmetric centralization authority that order recovers the data of the application program to be restored.
2. a kind of method for recovering application data according to claim 1, it is characterised in that the first terminal Finger daemon starts in the following manner:
During the first terminal start, start the init processes of the first terminal;In the init processes of the first terminal Start the finger daemon of the first terminal.
3. a kind of method for recovering application data according to claim 1, it is characterised in that the second terminal Finger daemon and the socket receiving module of the second terminal start in the following manner:
During the second terminal start, start the init processes of the second terminal;In the init processes of the second terminal Start the finger daemon of the second terminal;The socket of the second terminal is started by the finger daemon of the second terminal Receiving module.
4. a kind of device for recovering application data, it is characterised in that the device of the recovery application data includes depositing The journey of reservoir, processor and the recovery application data that is stored on the memory and can run on the processor Sequence, the program of the recovery application data is realized the following method for recovering application data during the computing device The step of:
The sudden strain of a muscle that first terminal passes through first terminal passes data and bag name that application program obtains application program to be restored, and passes through the The socket that the data and bag name of the application program to be restored are sent to second terminal is received mould by the finger daemon of one terminal Block;
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second terminal Dodge biography application program proves according to the user identity of the bag name of the application program to be restored acquisition application program to be restored; The finger daemon of the second terminal proves to recover the autonomous of the data of the application program to be restored according to the user identity Access control right, and by recovering the forced symmetric centralization authority that order recovers the data of the application program to be restored.
5. a kind of device for recovering application data according to claim 4, it is characterised in that the recovery application journey It is additionally operable to realize following steps when the program of ordinal number evidence is by the computing device:
During the first terminal start, start the init processes of the first terminal;In the init processes of the first terminal Start the finger daemon of the first terminal.
6. a kind of device for recovering application data according to claim 4, it is characterised in that the recovery application journey It is additionally operable to realize following steps when the program of ordinal number evidence is by the computing device:
During the second terminal start, start the init processes of the second terminal;In the init processes of the second terminal Start the finger daemon of the second terminal;The socket of the second terminal is started by the finger daemon of the second terminal Receiving module.
7. a kind of method for recovering application data, methods described includes step:
The socket receiving module of terminal receives the data and bag name for the application program to be restored that another terminal is sent;
The sudden strain of a muscle of terminal passes the use that application program obtains the application program to be restored according to the bag name of the application program to be restored Family proof of identification;
The finger daemon of terminal proves to recover the autonomous access of the data of the application program to be restored according to the user identity Control authority, and by recovering the forced symmetric centralization authority that order recovers the data of the application program to be restored.
8. a kind of method for recovering application data according to claim 7, it is characterised in that the terminal is guarded The socket receiving module of process and the terminal starts in the following manner:
During the starting up of terminal, start the init processes of the terminal;Start the terminal in the init processes of the terminal Finger daemon;The socket receiving module of the terminal is started by the finger daemon of the terminal.
9. a kind of terminal, it is characterised in that the terminal includes:Memory, processor and it is stored on the memory and can The program of the recovery application data run on the processor, the program of the recovery application data is by the place The step of managing the method that the recovery application data as described in claim 7 or 8 is realized when device is performed.
10. a kind of computer-readable recording medium, it is characterised in that the recovery that is stored with the computer-readable recording medium should With the program of routine data, realized when the program of the recovery application data is executed by processor as in claim 7 or 8 The step of described recovery application data.
CN201710298758.1A 2017-04-27 2017-04-27 Recover the method and device, terminal, computer-readable recording medium of application data Pending CN107086998A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710298758.1A CN107086998A (en) 2017-04-27 2017-04-27 Recover the method and device, terminal, computer-readable recording medium of application data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710298758.1A CN107086998A (en) 2017-04-27 2017-04-27 Recover the method and device, terminal, computer-readable recording medium of application data

Publications (1)

Publication Number Publication Date
CN107086998A true CN107086998A (en) 2017-08-22

Family

ID=59612979

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710298758.1A Pending CN107086998A (en) 2017-04-27 2017-04-27 Recover the method and device, terminal, computer-readable recording medium of application data

Country Status (1)

Country Link
CN (1) CN107086998A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418823A (en) * 2018-03-07 2018-08-17 北京元心科技有限公司 Communicate personal identification method, device and the corresponding terminal of opposite end
CN109445815A (en) * 2018-10-15 2019-03-08 江苏恒宝智能系统技术有限公司 A kind of smart card and its application upgrade method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7634507B2 (en) * 2006-08-30 2009-12-15 Inmage Systems, Inc. Ensuring data persistence and consistency in enterprise storage backup systems
CN102591727A (en) * 2012-01-04 2012-07-18 华为终端有限公司 Method for processing application data and computing node
CN104008343A (en) * 2014-05-14 2014-08-27 北京奇虎科技有限公司 Data shattering method and device
CN106060815A (en) * 2016-05-18 2016-10-26 广东欧珀移动通信有限公司 Data transmission method, mobile terminal and data transmission system
CN106201597A (en) * 2016-06-30 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of method and terminal carrying out application management based on Data Migration

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7634507B2 (en) * 2006-08-30 2009-12-15 Inmage Systems, Inc. Ensuring data persistence and consistency in enterprise storage backup systems
CN102591727A (en) * 2012-01-04 2012-07-18 华为终端有限公司 Method for processing application data and computing node
CN104008343A (en) * 2014-05-14 2014-08-27 北京奇虎科技有限公司 Data shattering method and device
CN106060815A (en) * 2016-05-18 2016-10-26 广东欧珀移动通信有限公司 Data transmission method, mobile terminal and data transmission system
CN106201597A (en) * 2016-06-30 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of method and terminal carrying out application management based on Data Migration

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418823A (en) * 2018-03-07 2018-08-17 北京元心科技有限公司 Communicate personal identification method, device and the corresponding terminal of opposite end
CN108418823B (en) * 2018-03-07 2021-06-04 北京元心科技有限公司 Identity recognition method and device of communication opposite terminal and corresponding terminal
CN109445815A (en) * 2018-10-15 2019-03-08 江苏恒宝智能系统技术有限公司 A kind of smart card and its application upgrade method
CN109445815B (en) * 2018-10-15 2019-11-26 恒宝股份有限公司 A kind of smart card and its application upgrade method

Similar Documents

Publication Publication Date Title
CN107133092A (en) Multi-thread synchronization processing method, terminal and computer-readable recording medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN107133302A (en) Realize method, system, terminal and the computer-readable recording medium of data consistency
CN106953684A (en) A kind of method for searching star, mobile terminal and computer-readable recording medium
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN107272906A (en) Using many account display control methods and mobile terminal
CN107147803A (en) A kind of way of recording, terminal device and computer-readable recording medium
CN106953989A (en) Incoming call reminding method and device, terminal, computer-readable recording medium
CN107181865A (en) Processing method, terminal and the computer-readable recording medium of unread short messages
CN107580336A (en) A kind of method for connecting network, terminal and computer-readable recording medium
CN107276991A (en) Load method, equipment and the computer-readable recording medium of Web page
CN107896287A (en) Phone number risk monitoring method and mobile terminal
CN107818459A (en) Red packet sending method, terminal and storage medium based on augmented reality
CN107846675A (en) Register method, terminal, registrar and computer-readable recording medium
CN107124718A (en) Data transmission method, mobile terminal and storage medium
CN107133151A (en) A kind of daily record data processing method, equipment and computer-readable recording medium
CN107368241A (en) A kind of information processing method, equipment and computer-readable recording medium
CN107423065A (en) Method, mobile terminal and the computer-readable recording medium that a kind of application is attended to anything else
CN107330314A (en) Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic
CN107070781A (en) Position sharing method and equipment and computer-readable medium
CN107239690A (en) Unlocking screen method and mobile terminal
CN107204977A (en) Interface security method of calibration and device, computer-readable recording medium
CN107194217A (en) User data access control method, equipment and computer-readable recording medium
CN107086998A (en) Recover the method and device, terminal, computer-readable recording medium of application data
CN107133108A (en) Implementation method, terminal, server and the computer-readable recording medium of distributed complex lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170822