CN107086998A - Recover the method and device, terminal, computer-readable recording medium of application data - Google Patents
Recover the method and device, terminal, computer-readable recording medium of application data Download PDFInfo
- Publication number
- CN107086998A CN107086998A CN201710298758.1A CN201710298758A CN107086998A CN 107086998 A CN107086998 A CN 107086998A CN 201710298758 A CN201710298758 A CN 201710298758A CN 107086998 A CN107086998 A CN 107086998A
- Authority
- CN
- China
- Prior art keywords
- terminal
- data
- application program
- restored
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 86
- 238000011084 recovery Methods 0.000 claims abstract description 37
- 210000003205 muscle Anatomy 0.000 claims abstract description 29
- 230000008569 process Effects 0.000 claims description 48
- 238000000151 deposition Methods 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 16
- 230000006854 communication Effects 0.000 description 21
- 238000004891 communication Methods 0.000 description 20
- 230000006870 function Effects 0.000 description 14
- 238000012545 processing Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000005611 electricity Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001629 suppression Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 238000009527 percussion Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
- H04L69/162—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention discloses the method and device for recovering application data, terminal, computer-readable recording medium, method includes step first terminal and passes through the sudden strain of a muscle of first terminal passing data and bag name that application program obtains application program to be restored, and the data of application program to be restored and bag name are sent to by the finger daemon of first terminal the socket receiving module of second terminal;The socket receiving module of second terminal receives the data and bag name of application program to be restored;The sudden strain of a muscle of second terminal passes application program and proved according to the user identity of the bag name of application program to be restored acquisition application program to be restored;The finger daemon of second terminal proves to recover the self contained navigation authority of the data of application program to be restored according to user identity, and passes through the forced symmetric centralization authority for the data for recovering order recovery application program to be restored.The present invention simplifies application data transmission and the flow recovered, and improves application data transmission and the reliability recovered, lifts Consumer's Experience sense.
Description
Technical field
The present invention relates to field of terminal technology, more particularly to a kind of method and device for recovering application data, terminal,
Computer-readable recording medium.
Background technology
Mobile terminal stores the substantial amounts of information of terminal user, and its information stored potentially includes address list, short message, postal
The personal information such as part, photo, it is also possible to including important informations such as bank account, credit card account and passwords.
During the present invention is realized, inventor has found that prior art has problems with:User more renews mobile whole
During end, generally require and re-download application program conventional before, or by application data before, such as chat record,
Logon information, the picture video of reception etc. backups to external safe digital card (Secure Digital Memory Card/SD
Card), external safe digital card is then inserted into new mobile terminal, then recovers application data from SD card, this process is more numerous
It is trivial, and if made a fault in operating process, it is easy to cause loss of data, or corresponding application can not correctly start.
The content of the invention
It is a primary object of the present invention to propose a kind of method and device, terminal, computer for recovering application data
Readable storage medium storing program for executing, it is intended to solve the technical problem of prior art presence.
To achieve the above object, first aspect of the embodiment of the present invention provides a kind of method for recovering application data, institute
Stating method includes step:
First terminal passes application program by the sudden strain of a muscle of first terminal and obtains the data and bag name of application program to be restored, and leads to
The finger daemon for crossing first terminal connects the socket that the data and bag name of the application program to be restored are sent to second terminal
Receive module;
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second eventually
The sudden strain of a muscle at end passes the user identity that application program obtains the application program to be restored according to the bag name of the application program to be restored
Prove;The finger daemon of the second terminal proves to recover the data of the application program to be restored according to the user identity
Self contained navigation authority, and weighed by the forced symmetric centralization for recovering the data that order recovers the application program to be restored
Limit.
Further, the finger daemon of the first terminal starts in the following manner:
During the first terminal start, start the init processes of the first terminal;Enter in the init of the first terminal
Start the finger daemon of the first terminal in journey.
Further, the finger daemon of the second terminal and the socket receiving module of the second terminal pass through following
Mode starts:
During the second terminal start, start the init processes of the second terminal;Enter in the init of the second terminal
Start the finger daemon of the second terminal in journey;The set of the second terminal is started by the finger daemon of the second terminal
Connect word receiving module.
In addition, to achieve the above object, second aspect of the embodiment of the present invention provides a kind of dress for recovering application data
Put, the device for recovering application data includes memory, processor and is stored on the memory and can be described
The program of the recovery application data run on processor, the program of the recovery application data is held by the processor
The step of method of following recovery application data is realized during row:
First terminal passes application program by the sudden strain of a muscle of first terminal and obtains the data and bag name of application program to be restored, and leads to
The finger daemon for crossing first terminal connects the socket that the data and bag name of the application program to be restored are sent to second terminal
Receive module;
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second eventually
The sudden strain of a muscle at end passes the user identity that application program obtains the application program to be restored according to the bag name of the application program to be restored
Prove;The finger daemon of the second terminal proves to recover the data of the application program to be restored according to the user identity
Self contained navigation authority, and weighed by the forced symmetric centralization for recovering the data that order recovers the application program to be restored
Limit.
Further, it is described recover application data program by the computing device when be additionally operable to realize following step
Suddenly:
During the first terminal start, start the init processes of the first terminal;Enter in the init of the first terminal
Start the finger daemon of the first terminal in journey.
Further, it is described recover application data program by the computing device when be additionally operable to realize following step
Suddenly:
During the second terminal start, start the init processes of the second terminal;Enter in the init of the second terminal
Start the finger daemon of the second terminal in journey;The set of the second terminal is started by the finger daemon of the second terminal
Connect word receiving module.
In addition, to achieve the above object, the third aspect of the embodiment of the present invention provides a kind of side for recovering application data
Method, methods described includes step:
The socket receiving module of terminal receives the data and bag name for the application program to be restored that another terminal is sent;
The sudden strain of a muscle of terminal passes application program and obtains the application program to be restored according to the bag name of the application program to be restored
User identity prove;
The finger daemon of terminal proves to recover the autonomous of the data of the application program to be restored according to the user identity
Access control right, and by recovering the forced symmetric centralization authority that order recovers the data of the application program to be restored.
Further, the finger daemon of the terminal and the socket receiving module of the terminal are opened in the following manner
It is dynamic:
During the starting up of terminal, start the init processes of the terminal;Start in the init processes of the terminal described
The finger daemon of terminal;The socket receiving module of the terminal is started by the finger daemon of the terminal.
In addition, to achieve the above object, fourth aspect of the embodiment of the present invention provides a kind of terminal, the terminal includes:Deposit
The journey of reservoir, processor and the recovery application data that is stored on the memory and can run on the processor
Sequence, realizes the side of above-mentioned recovery application data when the program of the recovery application data is by the computing device
The step of method.
Furthermore, to achieve the above object, the aspect of the embodiment of the present invention the 5th provides a kind of computer-readable recording medium, institute
State to be stored with computer-readable recording medium and recover the program of application data, the program of the recovery application data
The step of above-mentioned recovery application data is realized when being executed by processor.
The method and device, terminal, computer-readable storage medium provided in an embodiment of the present invention for recovering application data
Matter, the data and bag name of application program to be restored are received by socket receiving module, according to the bag of application program to be restored name
Obtaining the user identity of application program to be restored proves, and then recovers the self contained navigation authorities of the data of application program and strong
Access control right processed;Simplify application data transmission with recover flow, improve application data transmission with it is extensive
Multiple reliability, lifts Consumer's Experience sense.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the method flow schematic diagram of the recovery application data of first embodiment of the invention;
Fig. 4 is the apparatus structure schematic diagram of the recovery application data of second embodiment of the invention;
Fig. 5 is the method flow schematic diagram of the recovery application data of third embodiment of the invention;
Fig. 6 is the terminal structure schematic diagram of fourth embodiment of the invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed
Ground is used.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved
Move the fixed terminals such as terminal, and numeral TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of realization each embodiment of the invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent into base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or
The voice data stored in memory 109 is converted into audio signal and is output as sound.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 1 00 is performed can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042,1041 pairs of graphics processor is in video acquisition mode
Or the view data progress of the static images or video obtained in image capture mode by image capture apparatus (such as camera)
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
The noise produced during frequency signal or interference.
Mobile terminal 1 00 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 1 00 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can be wrapped
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can
By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with
For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy
The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage
Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 1 00 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system that the mobile terminal of the present invention is based on is entered below
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, UE (User Equipment, use of the LTE system including communicating connection successively
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
There is provided carrying and connection management for the control node of signaling between EPC203.HSS2032 is all to manage for providing some registers
Such as function of attaching position register (not shown) etc, and some are preserved about the use such as service features, data rate
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
First embodiment
As shown in figure 3, first embodiment of the invention provides a kind of method for recovering application data, methods described includes
Step:
30th, first terminal passes data and bag name that application program obtains application program to be restored by the sudden strain of a muscle of first terminal,
And connect the socket that the data of application program to be restored and bag name are sent to second terminal by the finger daemon of first terminal
Receive module;
In the present embodiment, the finger daemon of first terminal starts in the following manner:
When first terminal is started shooting, start the init processes of first terminal;Start first in the init processes of first terminal
The finger daemon of terminal.
Because finger daemon is by starting in init processes, therefore with root authority.
31st, the socket receiving module of second terminal receives the data and bag name of application program to be restored;Second terminal
Dodge biography application program proves according to the user identity of the bag name of application program to be restored acquisition application program to be restored;Second terminal
Finger daemon proved to recover the self contained navigation authority of the data of application program to be restored according to user identity, and by extensive
Order of reporting on completion of a task recovers the forced symmetric centralization authority of the data of application program to be restored.
In order to make it easy to understand, it is following to self contained navigation authority (Discretionary Access Control,
DAC), forced symmetric centralization (Mandatory Access Control, MAC) is introduced:
Before SELinux occurs, the security model on Linux is DAC, and full name is Discretionary Access
Control, is translated as self contained navigation.DAC core concept is very simple, is exactly:The authority that is possessed on process theory with
The authority for performing its user is identical.Such as, Browser is started with root user, then Browser just has the power of root user
Limit, can do anything on linux system.
Obviously, DAC is too loose.SELinux is in order to solve this problem, outside DAC, devises a new peace
Full model, is MAC (Mandatory Access Control), is translated as forced symmetric centralization.MAC philosophy is very simple
It is single:I.e. any process is want to do anything in SELinux systems, it is necessary to power is first assigned in security strategy configuration file
Limit.Every authority not appeared in security strategy configuration file, the process just not no authority.
In the present embodiment, the finger daemon of the second terminal and the socket receiving module of the second terminal pass through
In the following manner starts:
During the second terminal start, start the init processes of the second terminal;Enter in the init of the second terminal
Start the finger daemon of the second terminal in journey;The set of the second terminal is started by the finger daemon of the second terminal
Connect word receiving module.
Likewise, because finger daemon is by starting in init processes, therefore with root authority.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number
According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name
(com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication)
Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards
To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm
Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines
The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines
The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID
Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery,
Wechat can be logged in B machines.
The method provided in an embodiment of the present invention for recovering application data, receives to be restored by socket receiving module
The data and bag name of application program, are demonstrate,proved according to the user identity that the bag name of application program to be restored obtains application program to be restored
It is bright, and then recover the self contained navigation authority and forced symmetric centralization authority of the data of application program;Simplify application program
Data transfer and the flow recovered, improve application data transmission and the reliability recovered, lift Consumer's Experience sense.
Second embodiment
Reference picture 4, Fig. 4 provides a kind of recovery application program corresponding to those in the first embodiment for second embodiment of the invention
The device of data, the device of the recovery application data includes memory 41, processor 40 and is stored in the memory
On 41 and can be run on the processor 40 recovery application data program, the journey of the recovery application data
Sequence is realized the method for following recovery application data during computing device the step of:
First terminal passes application program by the sudden strain of a muscle of first terminal and obtains the data and bag name of application program to be restored, and leads to
The finger daemon for crossing first terminal connects the socket that the data and bag name of the application program to be restored are sent to second terminal
Receive module;
In the present embodiment, it is additionally operable to realize when the program for recovering application data is performed by the processor 40
Following steps:
During the first terminal start, start the init processes of the first terminal;Enter in the init of the first terminal
Start the finger daemon of the first terminal in journey.
Because finger daemon is by starting in init processes, therefore with root authority.
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second eventually
The sudden strain of a muscle at end passes the user identity that application program obtains the application program to be restored according to the bag name of the application program to be restored
Prove;The finger daemon of the second terminal proves to recover the data of the application program to be restored according to the user identity
Self contained navigation authority, and weighed by the forced symmetric centralization for recovering the data that order recovers the application program to be restored
Limit.
In order to make it easy to understand, it is following to self contained navigation authority (Discretionary Access Control,
DAC), forced symmetric centralization (Mandatory Access Control, MAC) is introduced:
Before SELinux occurs, the security model on Linux is DAC, and full name is Discretionary Access
Control, is translated as self contained navigation.DAC core concept is very simple, is exactly:The authority that is possessed on process theory with
The authority for performing its user is identical.Such as, Browser is started with root user, then Browser just has the power of root user
Limit, can do anything on linux system.
Obviously, DAC is too loose.SELinux is in order to solve this problem, outside DAC, devises a new peace
Full model, is MAC (Mandatory Access Control), is translated as forced symmetric centralization.MAC philosophy is very simple
It is single:I.e. any process is want to do anything in SELinux systems, it is necessary to power is first assigned in security strategy configuration file
Limit.Every authority not appeared in security strategy configuration file, the process just not no authority.
In the present embodiment, it is additionally operable to realize when the program for recovering application data is performed by the processor 40
Following steps:
During the second terminal start, start the init processes of the second terminal;Enter in the init of the second terminal
Start the finger daemon of the second terminal in journey;The set of the second terminal is started by the finger daemon of the second terminal
Connect word receiving module.
Likewise, because finger daemon is by starting in init processes, therefore with root authority.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number
According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name
(com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication)
Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards
To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm
Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines
The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines
The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID
Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery,
Wechat can be logged in B machines.
The device provided in an embodiment of the present invention for recovering application data, receives to be restored by socket receiving module
The data and bag name of application program, are demonstrate,proved according to the user identity that the bag name of application program to be restored obtains application program to be restored
It is bright, and then recover the self contained navigation authority and forced symmetric centralization authority of the data of application program;Simplify application program
Data transfer and the flow recovered, improve application data transmission and the reliability recovered, lift Consumer's Experience sense.
3rd embodiment
Reference picture 5, Fig. 5 provides a kind of method for recovering application data, methods described for third embodiment of the invention
Including step:
50th, the socket receiving module of terminal receives the data and bag name for the application program to be restored that another terminal is sent;
51st, the sudden strain of a muscle of terminal passes the user that application program obtains application program to be restored according to the bag name of application program to be restored
Proof of identification;
52nd, the finger daemon of terminal proves to recover the autonomous access control of the data of application program to be restored according to user identity
Authority processed, and by recovering the forced symmetric centralization authority that order recovers the data of application program to be restored.
In order to make it easy to understand, it is following to self contained navigation authority (Discretionary Access Control,
DAC), forced symmetric centralization (Mandatory Access Control, MAC) is introduced:
Before SELinux occurs, the security model on Linux is DAC, and full name is Discretionary Access
Control, is translated as self contained navigation.DAC core concept is very simple, is exactly:The authority that is possessed on process theory with
The authority for performing its user is identical.Such as, Browser is started with root user, then Browser just has the power of root user
Limit, can do anything on linux system.
Obviously, DAC is too loose.SELinux is in order to solve this problem, outside DAC, devises a new peace
Full model, is MAC (Mandatory Access Control), is translated as forced symmetric centralization.MAC philosophy is very simple
It is single:I.e. any process is want to do anything in SELinux systems, it is necessary to power is first assigned in security strategy configuration file
Limit.Every authority not appeared in security strategy configuration file, the process just not no authority.
In the present embodiment, the finger daemon of terminal and the socket receiving module of terminal start in the following manner:
During starting up of terminal, start the init processes of terminal;Start the finger daemon of terminal in the init processes of terminal;It is logical
The finger daemon for crossing terminal starts the socket receiving module of terminal.
Because finger daemon is by starting in init processes, therefore with root authority.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number
According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name
(com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication)
Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards
To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm
Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines
The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines
The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID
Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery,
Wechat can be logged in B machines.
The method provided in an embodiment of the present invention for recovering application data, receives to be restored by socket receiving module
The data and bag name of application program, are demonstrate,proved according to the user identity that the bag name of application program to be restored obtains application program to be restored
It is bright, and then recover the self contained navigation authority and forced symmetric centralization authority of the data of application program;Simplify application program
Data transfer and the flow recovered, improve application data transmission and the reliability recovered, lift Consumer's Experience sense.
Fourth embodiment
Reference picture 6, Fig. 6 provides a kind of terminal corresponding with 3rd embodiment, the end for fourth embodiment of the invention
End 60 includes:Memory 62, processor 61 and be stored on the memory 62 and can be run on the processor 61 it is extensive
The program of multiple application data, the program of the recovery application data realizes that the 3rd is real when being performed by the processor 61
The step of applying the method for recovery application data of example.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number
According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name
(com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication)
Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards
To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm
Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines
The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines
The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID
Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery,
Wechat can be logged in B machines.
Terminal provided in an embodiment of the present invention, the data and bag of application program to be restored are received by socket receiving module
Name, is proved according to the user identity that the bag name of application program to be restored obtains application program to be restored, and then recovers application program
Data self contained navigation authority and forced symmetric centralization authority;Simplify application data transmission and the stream recovered
Journey, improves application data transmission and the reliability recovered, lifts Consumer's Experience sense.
5th embodiment
Fifth embodiment of the invention provides a kind of computer-readable recording medium corresponding with 3rd embodiment, the meter
It is stored with calculation machine readable storage medium storing program for executing and recovers the program of application data, the program of the recovery application data is located
The step of reason device realizes the recovery application data of 3rd embodiment when performing.
As illustratively, illustrated below with recovering smile application data:
To transmit wechat application data to B machines from A machines, the sudden strain of a muscle being first turned on A machines passes application, selects wechat application number
According to transmission, the now sudden strain of a muscle of A machines passes application by wechat application data (/data/data/com.tencent.mm) and bag name
(com.tencent.mm) keeping for A machines is sent to by interprocess communication (localsocket can be used to carry out interprocess communication)
Shield process flycow, the finger daemon flycow of A machines is by connecting the socketReceive (socketReceive of B machines afterwards
To be created in B machine finger daemons flycow) data and bag name under general/data/data/com.tencent.mm
Com.tencnet.mm is sent to B machines.
After B machines are finished receiving, it is micro- to inquire about that the sudden strains of a muscle of B machines passes the bag com.tencent.mm that application is transmitted through coming by A machines
The user identity of letter proved (User Identification, UID), and this UID is transmitted to the finger daemon flycow, B of B machines
The finger daemon flycow of machine recovers wechat application data (/data/data/com.tencent.mm) DAC by this UID
Authority, and recovers by restorecon orders/data/data/com.tencent.mm MAC authorities, after the completion of recovery,
Wechat can be logged in B machines.
Computer-readable recording medium provided in an embodiment of the present invention, application to be restored is received by socket receiving module
The data and bag name of program, prove according to the user identity that the bag name of application program to be restored obtains application program to be restored, enter
And recover the self contained navigation authority and forced symmetric centralization authority of the data of application program;Simplify application data biography
The defeated flow with recovering, improves application data transmission and the reliability recovered, lifts Consumer's Experience sense.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and
And also including other key elements being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Also there is other identical element in process, method, article or the device of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each of the invention embodiment.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
1. a kind of method for recovering application data, methods described includes step:
The sudden strain of a muscle that first terminal passes through first terminal passes data and bag name that application program obtains application program to be restored, and passes through the
The socket that the data and bag name of the application program to be restored are sent to second terminal is received mould by the finger daemon of one terminal
Block;
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second terminal
Dodge biography application program proves according to the user identity of the bag name of the application program to be restored acquisition application program to be restored;
The finger daemon of the second terminal proves to recover the autonomous of the data of the application program to be restored according to the user identity
Access control right, and by recovering the forced symmetric centralization authority that order recovers the data of the application program to be restored.
2. a kind of method for recovering application data according to claim 1, it is characterised in that the first terminal
Finger daemon starts in the following manner:
During the first terminal start, start the init processes of the first terminal;In the init processes of the first terminal
Start the finger daemon of the first terminal.
3. a kind of method for recovering application data according to claim 1, it is characterised in that the second terminal
Finger daemon and the socket receiving module of the second terminal start in the following manner:
During the second terminal start, start the init processes of the second terminal;In the init processes of the second terminal
Start the finger daemon of the second terminal;The socket of the second terminal is started by the finger daemon of the second terminal
Receiving module.
4. a kind of device for recovering application data, it is characterised in that the device of the recovery application data includes depositing
The journey of reservoir, processor and the recovery application data that is stored on the memory and can run on the processor
Sequence, the program of the recovery application data is realized the following method for recovering application data during the computing device
The step of:
The sudden strain of a muscle that first terminal passes through first terminal passes data and bag name that application program obtains application program to be restored, and passes through the
The socket that the data and bag name of the application program to be restored are sent to second terminal is received mould by the finger daemon of one terminal
Block;
The socket receiving module of the second terminal receives the data and bag name of the application program to be restored;Second terminal
Dodge biography application program proves according to the user identity of the bag name of the application program to be restored acquisition application program to be restored;
The finger daemon of the second terminal proves to recover the autonomous of the data of the application program to be restored according to the user identity
Access control right, and by recovering the forced symmetric centralization authority that order recovers the data of the application program to be restored.
5. a kind of device for recovering application data according to claim 4, it is characterised in that the recovery application journey
It is additionally operable to realize following steps when the program of ordinal number evidence is by the computing device:
During the first terminal start, start the init processes of the first terminal;In the init processes of the first terminal
Start the finger daemon of the first terminal.
6. a kind of device for recovering application data according to claim 4, it is characterised in that the recovery application journey
It is additionally operable to realize following steps when the program of ordinal number evidence is by the computing device:
During the second terminal start, start the init processes of the second terminal;In the init processes of the second terminal
Start the finger daemon of the second terminal;The socket of the second terminal is started by the finger daemon of the second terminal
Receiving module.
7. a kind of method for recovering application data, methods described includes step:
The socket receiving module of terminal receives the data and bag name for the application program to be restored that another terminal is sent;
The sudden strain of a muscle of terminal passes the use that application program obtains the application program to be restored according to the bag name of the application program to be restored
Family proof of identification;
The finger daemon of terminal proves to recover the autonomous access of the data of the application program to be restored according to the user identity
Control authority, and by recovering the forced symmetric centralization authority that order recovers the data of the application program to be restored.
8. a kind of method for recovering application data according to claim 7, it is characterised in that the terminal is guarded
The socket receiving module of process and the terminal starts in the following manner:
During the starting up of terminal, start the init processes of the terminal;Start the terminal in the init processes of the terminal
Finger daemon;The socket receiving module of the terminal is started by the finger daemon of the terminal.
9. a kind of terminal, it is characterised in that the terminal includes:Memory, processor and it is stored on the memory and can
The program of the recovery application data run on the processor, the program of the recovery application data is by the place
The step of managing the method that the recovery application data as described in claim 7 or 8 is realized when device is performed.
10. a kind of computer-readable recording medium, it is characterised in that the recovery that is stored with the computer-readable recording medium should
With the program of routine data, realized when the program of the recovery application data is executed by processor as in claim 7 or 8
The step of described recovery application data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710298758.1A CN107086998A (en) | 2017-04-27 | 2017-04-27 | Recover the method and device, terminal, computer-readable recording medium of application data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710298758.1A CN107086998A (en) | 2017-04-27 | 2017-04-27 | Recover the method and device, terminal, computer-readable recording medium of application data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107086998A true CN107086998A (en) | 2017-08-22 |
Family
ID=59612979
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710298758.1A Pending CN107086998A (en) | 2017-04-27 | 2017-04-27 | Recover the method and device, terminal, computer-readable recording medium of application data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107086998A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108418823A (en) * | 2018-03-07 | 2018-08-17 | 北京元心科技有限公司 | Communicate personal identification method, device and the corresponding terminal of opposite end |
CN109445815A (en) * | 2018-10-15 | 2019-03-08 | 江苏恒宝智能系统技术有限公司 | A kind of smart card and its application upgrade method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7634507B2 (en) * | 2006-08-30 | 2009-12-15 | Inmage Systems, Inc. | Ensuring data persistence and consistency in enterprise storage backup systems |
CN102591727A (en) * | 2012-01-04 | 2012-07-18 | 华为终端有限公司 | Method for processing application data and computing node |
CN104008343A (en) * | 2014-05-14 | 2014-08-27 | 北京奇虎科技有限公司 | Data shattering method and device |
CN106060815A (en) * | 2016-05-18 | 2016-10-26 | 广东欧珀移动通信有限公司 | Data transmission method, mobile terminal and data transmission system |
CN106201597A (en) * | 2016-06-30 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and terminal carrying out application management based on Data Migration |
-
2017
- 2017-04-27 CN CN201710298758.1A patent/CN107086998A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7634507B2 (en) * | 2006-08-30 | 2009-12-15 | Inmage Systems, Inc. | Ensuring data persistence and consistency in enterprise storage backup systems |
CN102591727A (en) * | 2012-01-04 | 2012-07-18 | 华为终端有限公司 | Method for processing application data and computing node |
CN104008343A (en) * | 2014-05-14 | 2014-08-27 | 北京奇虎科技有限公司 | Data shattering method and device |
CN106060815A (en) * | 2016-05-18 | 2016-10-26 | 广东欧珀移动通信有限公司 | Data transmission method, mobile terminal and data transmission system |
CN106201597A (en) * | 2016-06-30 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and terminal carrying out application management based on Data Migration |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108418823A (en) * | 2018-03-07 | 2018-08-17 | 北京元心科技有限公司 | Communicate personal identification method, device and the corresponding terminal of opposite end |
CN108418823B (en) * | 2018-03-07 | 2021-06-04 | 北京元心科技有限公司 | Identity recognition method and device of communication opposite terminal and corresponding terminal |
CN109445815A (en) * | 2018-10-15 | 2019-03-08 | 江苏恒宝智能系统技术有限公司 | A kind of smart card and its application upgrade method |
CN109445815B (en) * | 2018-10-15 | 2019-11-26 | 恒宝股份有限公司 | A kind of smart card and its application upgrade method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107133092A (en) | Multi-thread synchronization processing method, terminal and computer-readable recording medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN107133302A (en) | Realize method, system, terminal and the computer-readable recording medium of data consistency | |
CN106953684A (en) | A kind of method for searching star, mobile terminal and computer-readable recording medium | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN107272906A (en) | Using many account display control methods and mobile terminal | |
CN107147803A (en) | A kind of way of recording, terminal device and computer-readable recording medium | |
CN106953989A (en) | Incoming call reminding method and device, terminal, computer-readable recording medium | |
CN107181865A (en) | Processing method, terminal and the computer-readable recording medium of unread short messages | |
CN107580336A (en) | A kind of method for connecting network, terminal and computer-readable recording medium | |
CN107276991A (en) | Load method, equipment and the computer-readable recording medium of Web page | |
CN107896287A (en) | Phone number risk monitoring method and mobile terminal | |
CN107818459A (en) | Red packet sending method, terminal and storage medium based on augmented reality | |
CN107846675A (en) | Register method, terminal, registrar and computer-readable recording medium | |
CN107124718A (en) | Data transmission method, mobile terminal and storage medium | |
CN107133151A (en) | A kind of daily record data processing method, equipment and computer-readable recording medium | |
CN107368241A (en) | A kind of information processing method, equipment and computer-readable recording medium | |
CN107423065A (en) | Method, mobile terminal and the computer-readable recording medium that a kind of application is attended to anything else | |
CN107330314A (en) | Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic | |
CN107070781A (en) | Position sharing method and equipment and computer-readable medium | |
CN107239690A (en) | Unlocking screen method and mobile terminal | |
CN107204977A (en) | Interface security method of calibration and device, computer-readable recording medium | |
CN107194217A (en) | User data access control method, equipment and computer-readable recording medium | |
CN107086998A (en) | Recover the method and device, terminal, computer-readable recording medium of application data | |
CN107133108A (en) | Implementation method, terminal, server and the computer-readable recording medium of distributed complex lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170822 |