CN109413266A - It is a kind of based on the data back up method and terminal that fall detection - Google Patents

It is a kind of based on the data back up method and terminal that fall detection Download PDF

Info

Publication number
CN109413266A
CN109413266A CN201811152712.XA CN201811152712A CN109413266A CN 109413266 A CN109413266 A CN 109413266A CN 201811152712 A CN201811152712 A CN 201811152712A CN 109413266 A CN109413266 A CN 109413266A
Authority
CN
China
Prior art keywords
data
terminal
cryptographic hash
backup
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811152712.XA
Other languages
Chinese (zh)
Inventor
刘小东
孟凡靖
李明静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201811152712.XA priority Critical patent/CN109413266A/en
Publication of CN109413266A publication Critical patent/CN109413266A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/12Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This application involves intelligent terminal technical fields, in particular to a kind of based on the data back up method for falling detection, its method includes: to fall detection data by obtaining, and judge whether terminal is in the state of falling from high altitude according to detection data is fallen, and judge terminal be in fall from high altitude state when, the system data BD of terminal is obtained, and opens multithreading, differential backup is carried out to the system data BD;Compared with traditional complete data redundancy technique, the technical solution of the application carries out the data backup of terminal using the differential backup technology of multithreading, substantially increases the efficiency and safety of data backup.

Description

It is a kind of based on the data back up method and terminal that fall detection
Technical field
This application involves intelligent terminal technical fields more particularly to a kind of based on the data back up method for falling detection and end End.
Background technique
With popularizing for smart phone, the role of mobile phone in daily work life is more and more important, not only It is the tool of communication, even more stores the equipment of entertaining integratedization.In addition to daily voice communication and the equal communication functions that surf the web, User can also store some significant datas in mobile phone in order to use.Such as: user can store video, figure in mobile phone The information such as piece, music, contact person, working document and the system configuration information of present terminal etc..In order to guarantee significant data The manufacturer of information security, current many production of intelligent mobile phones both provides cloud business solution, is monitoring user's triggering number After backup functionality, the data in user mobile phone can be associated with the data of backup traffic server end and synchronous, it will Significant data in user mobile phone is backed up.
However, at least there are the following problems in the prior art: in backup significant data, needing actively to trigger number by user Data backup business could be completed according to backup functionality.If user does not have timely active Backup Data, cause when mobile phone falls When damage, user data loss will lead to;And existing data backup is to back up completely mostly, using the principle covered comprehensively, There is a large amount of repeated data every time, more memory space can be occupied, and BACKUP TIME is longer, will increase to a certain extent User cost, and terminal is fallen this process and is sent within a short period of time, it is also desirable to a kind of quick backup scheme is used, is realized eventually The quick backup of end data is possible to guarantee terminal data safety.
Summary of the invention
The purpose of the application is to provide the method and terminal that a kind of terminal air falls the backup of data cloud, works as user terminal It, being capable of automatically backup data when falling, it is ensured that the safety of user data.
According to some embodiments of the present application in a first aspect, embodiments herein provide it is a kind of based on falling detection Data back up method, be applied to terminal, which comprises
Detection data is fallen in acquisition;
It is described to fall the velocity amplitude and gravity acceleration value that detection data includes: terminal;
Judge whether terminal is in the state of falling from high altitude according to detection data is fallen;
If judging, terminal is in the state that falls from high altitude, and obtains the system data BD of terminal;
Multithreading is opened, differential backup is carried out to the system data BD.
Optionally, before detection data is fallen in acquisition, the method also includes:
Backup open command is fallen in acquisition;
Based on backup open command is fallen, the velocity sensor and gravity sensor carried in controlling terminal keeps it turning on shape State;
The velocity amplitude of terminal is obtained by the velocity sensor measurement;
The gravity acceleration value of terminal is obtained with by the gravity sensor measurement.
Optionally, the basis falls the method that detection data judges whether terminal is in the state of falling from high altitude and includes:
If the velocity amplitude is greater than the threshold speed that falls from high altitude, and the gravity acceleration value is greater than the gravity that falls from high altitude and adds Threshold speed then determines that terminal is in the state that falls from high altitude.
Optionally, before the system data BD for obtaining terminal, the method also includes:
Detect the network state of terminal;
The step of if network state of terminal is connected state, triggers the system data BD for obtaining terminal;
If the network state of terminal is unconnected state, opening network is controlled, so that terminal is in connected state;
Terminal network state be connected state when, trigger it is described obtain terminal system data BD the step of.
Optionally, multithreading is being opened, before carrying out differential backup to the system data BD, the method also includes:
Determine the data to be backed up in the system data BD.
Optionally, after getting the system data BD of terminal, the method also includes:
By the system data BD according to the first predetermined division regular partition, multiple first data module Bi, i ∈ are obtained [1,M];
Define the first cryptographic Hash array H [M] that a size is N;
The first cryptographic Hash Hi of each first data module Bi is obtained respectively;
The first cryptographic Hash Hi is successively saved to the first cryptographic Hash array H [M];Wherein, H [M]= H1, H2, H3 ... HM };
First predetermined division rule refers to: at least according to the content of data file, the data date of formation, data size in Data are marked off multiple data modules of size and format by an at least attribute.
Optionally, the method also includes:
Obtain the original file data SD backed up beyond the clouds;
By the original file data SD according to the second predetermined division regular partition, multiple second data module St, t are obtained ∈[1,N];
Define the second cryptographic Hash array X [N] that a size is N;
The second cryptographic Hash Xt of each second data module St is obtained respectively;
The second cryptographic Hash Hi is successively saved to the second cryptographic Hash array X [N];Wherein, X [N]= X1, X2, X3 ... XN };
Wherein, the second predetermined division rule is identical as the first predetermined division rule.
Optionally, the method for the data to be backed up in the determination system data BD includes:
Traversal and comparison the first cryptographic Hash array H [M] and the second cryptographic Hash array X [N];
If the first cryptographic Hash array H [M] is identical with the cryptographic Hash in the second cryptographic Hash array X [N], it is determined that the system Without data to be backed up in data BD;
If the cryptographic Hash in the first cryptographic Hash array H [M] and the second cryptographic Hash array X [N] is not identical, from the first Hash At least one third cryptographic Hash different from the second cryptographic Hash array X [N] is selected in value array H [M];
The corresponding third data module of all third cryptographic Hash is determined as data to be backed up;
Wherein, third data module is contained among multiple first data module Bi.
Optionally, the unlatching multithreading, the method to system data BD progress differential backup include:
Respectively according to each third cryptographic Hash, the word of each third data module corresponding with each third cryptographic Hash is determined Save size S;
According to the byte-sized S of each third data module, the total of the data to be backed up in the system data BD is determined Byte-sized R;
According to total byte size R, the quantity q for needing the thread opened is determined;
It treats Backup Data and carries out md5 encryption;
It is uploaded to cloud by the q thread opened with Backup Data by encrypted and backs up;
Wherein, the size of data count that per thread uploads are as follows: count=S/threads;
Wherein, the position for the data to be backed up that q-th of thread uploads are as follows: (q-1) * R/threads to q*R/threads- 1。
Wherein, the position for the data to be backed up that the last one thread uploads are as follows: (q-1) * S/threads to R.
According to the another aspect of the application, embodiments herein additionally provides a kind of terminal, comprising:
Memory is configured as storing data and instruction;
The processor communicated is established with memory;
And velocity sensor and gravity sensor with processor communication;
Wherein, velocity sensor measurement obtains the velocity amplitude of terminal;Gravity sensor obtains the gravity of terminal for measuring Acceleration value;
Wherein, when executing the instruction in memory, the processor is configured to executing following operation:
Detection data is fallen in acquisition;
It is described to fall the velocity amplitude and gravity acceleration value that detection data includes: terminal;
Judge whether terminal is in the state of falling from high altitude according to detection data is fallen;
If judging, terminal is in the state that falls from high altitude, and obtains the system data BD of terminal;
Multithreading is opened, differential backup is carried out to the system data BD.
The above-mentioned technical proposal of the application falls detection data by obtaining, according to falling whether detection data judges terminal In the state of falling from high altitude, and judge terminal be in fall from high altitude state when, obtain the system data BD of terminal, and open Multithreading carries out differential backup to the system data BD;Compared with traditional complete data redundancy technique, the technology of the application Scheme carries out the data backup of terminal using the differential backup technology of multithreading, substantially increases the efficiency and safety of data backup Property.
Detailed description of the invention
To more fully understand and illustrating some embodiments of the present application, below with reference to the description of attached drawing reference implementation example, In the drawings, same digital number indicates corresponding part in the accompanying drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application;
Fig. 2 is the exemplary cell block diagram of the electronic functionalities configuration provided according to some embodiments of the present application;
Fig. 3 is a kind of signal based on the data back up method for falling detection provided according to some embodiments of the present application Property flow chart.
Specific embodiment
It is described as the application defined in requirement and its equivalent that has the right convenient for Integrated Understanding below with reference to attached drawing Various embodiments.These embodiments include various specific details in order to understand, but these are considered only as illustratively.Cause This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described herein The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure Description.
The term used in following description and claims and phrase are not limited to literal meaning, and being merely can Understand and consistently understands the application.Therefore, for those skilled in the art, it will be understood that provide to the various implementations of the application The description of example is only the purpose to illustrate, rather than limits the application of appended claims and its Equivalent definitions.
Below in conjunction with the attached drawing in some embodiments of the application, technical solutions in the embodiments of the present application carries out clear Chu is fully described by, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments. Based on the embodiment in the application, obtained by those of ordinary skill in the art without making creative efforts all Other embodiments shall fall in the protection scope of this application.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment , it is not intended to be limiting the application." one " of the embodiment of the present application and singular used in the attached claims, "one", "an", " described " and "the" be also intended to including most forms, unless the context clearly indicates other meaning.Also It should be appreciated that term "and/or" used herein refer to and include one or more mutually bindings list any of project or All possible combinations.Express " first ", " second ", " first " and " second " is for modifying respective element without examining Worry sequence or importance are used only for distinguishing a kind of element and another element, without limiting respective element.
Can be electronic equipment according to the terminal of some embodiments of the application, the electronic equipment may include smart phone, PC (PC, such as tablet computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device (VR) and the combination of one or more of wearable device etc..According to some embodiments of the present application, the wearable device Including type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics clothes Dress), decorated type (such as pad skin, tatoo or built in electronic device) etc. one or more of combination.The application's In some embodiments, the electronic equipment be can be flexibly, be not limited to above equipment, or can be in above-mentioned various equipment One or more of combinations.In this application, term " user " can indicate the people using electronic equipment or use electronic equipment Equipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides a kind of based on the data back up method for falling detection.The application is real in order to facilitate understanding Example is applied, the embodiment of the present application is described in detail below with reference to attached drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1 Shown, Environment System 100 may include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics Key 117 etc..In some embodiments of the present application, electronic equipment 110 can be omitted one or more elements, or can be into one Step includes one or more other elements.
Bus 111 may include circuit.The circuit can be with one or more element (examples in interconnection electronics 110 Such as, bus 111, processor 112, memory 113, input/output module 114, display 115 and communication module 116).It is described Circuit can also realize communication (for example, obtaining and/or sending number between one or more elements in electronic equipment 110 According to).
Processor 112 may include one or more coprocessors (Co-processor), application processor (AP, ) and communication processor (CommunicationProcessor) ApplicationProcessor.As an example, processor 112 The control and/or data processing with one or more elements of electronic equipment 110 can be executed.
Memory 113 can store data.The data may include other with one or more of electronic equipment 110 The relevant instruction of element or data.For example, the data may include the initial data before processor 112 is handled, intermediate data And/or treated data.Specifically, memory 113 can store photo, image, iris information etc..Memory 113 can To include impermanent memory memory and/or permanent memory memory.
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrap Include kernel, middleware, Application Programming Interface (API, ApplicationProgrammingInterface) and/or application program. At least part of the kernel, the middleware or the Application Programming Interface may include operating system (OS, OperatingSystem).As an example, the kernel can control or manage for execute other programs (for example, middleware, Application Programming Interface and application program) in the system resource of operation or function realized (for example, bus 111, processor 112, depositing Reservoir 113 etc.).In addition, the kernel can provide interface.The interface can pass through the middleware, the application programming One or more elements of interface or application program access electronic equipment 110 are to control or management system resource.
The middleware can be used as the middle layer of data transmission.Data transmission can permit Application Programming Interface or Application program is with the kernel communication to exchange data.As an example, the middleware can handle from the application program One or more task requests of acquisition.For example, the middleware can distribute electronic equipment to one or more application program The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one or Multiple tasks request.The Application Programming Interface can be the application program for control from the kernel or the middleware The interface of function is provided.The Application Programming Interface also may include one or more interfaces or function.The function can be used In security control, communication control, document control, window control, text control, image procossing, signal processing etc..
What input/output module 114 can be inputted to the transmission of the other elements of electronic equipment 110 from user or external equipment Instruction or data.Input/output module 114 can also be defeated by the instruction or data that obtain from the other elements of electronic equipment 110 Out to user or external equipment.
Display 115 can show content.The content can to user show various types (for example, text, image, Video, icon and/or symbol).Display 115 may include liquid crystal display (LCD, LiquidCrystalDisplay), hair Optical diode (LED, Light-EmittingDiode) display, Organic Light Emitting Diode (OLED, OrganicLightEmittingDiode) display, Micro Electro Mechanical System (MEMS, MicroElectroMechanicalSystems) display or electric paper display etc. or several combinations.Display 115 can To include touch screen.In some embodiments, display 115 can show virtual key.The available void of touch screen The input of quasi- key.Display 115 can be obtained by the touch screen and be inputted.The input may include touch input, gesture Input, action input, the input for approaching input, electronic pen or user body part.
Communication module 116 can configure the communication between equipment.In some embodiments, network environment 100 can be into one Step includes electronic equipment 140.As an example, the communication between the equipment may include electronic equipment 110 and other equipment (example Such as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can by wireless communication or cable modem Letter is connected to network 120, communicates with other equipment (for example, server 130 or electronic equipment 140) realization.
The wireless communication may include microwave communication and/or satellite communication etc..The wireless communication may include honeycomb Communication is (for example, global mobile communication (GSM, GlobalSystemforMobileCommunications), CDMA (CDMA, CodeDivisionMultipleAccess), 3G (Third Generation) Moblie (3G), forth generation mobile communication (4G), the 5th Third-generation mobile communication (5G)), Long Term Evolution (LTE, LongTermEvolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), wideband code division multiple access (WCDMA, WidebandCodeDivisionMultipleAccess), General Mobile Communication system (UMTS, UniversalMobileTelecommunicationsSystem), WiMAX (WiBro, ) etc. or several combinations WirelessBroadband.According to some embodiments of the present application, the wireless communication may include WLAN (WiFi, WirelessFidelity), bluetooth, low-power consumption bluetooth (BLE, BluetoothLowEnergy), purple Bee agreement (ZigBee), near-field communication (NFC, NearFieldCommunication), magnetic safe transmission, radio frequency and body area network (BAN, BodyAreaNetwork) etc. or several combination.According to some embodiments of the present application, the wire communication can be with Including Global Navigation Satellite System (Glonass/GNSS, GlobalNavigationSatelliteSystem), global positioning system System (GPS, GlobalPositionSystem), Beidou navigation satellite system or Galileo (European Global Satellite Navigation System) Deng.The wire communication may include universal serial bus (USB, UniversalSerialBus), high-definition media interface (HDMI, High-DefinitionMultimediaInterface), proposed standard 232 (RS-232, ), and/or plain old telephone service (POTS, PlainOldTelephoneService) etc. RecommendStandard232 One of or several combinations.
Secondary or physical bond 117 can be used for user's interaction.Secondary or physical bond 117 may include one or more entity keys.In some realities It applies in example, user can be with the function of customized secondary or physical bond 117.For example, secondary or physical bond 117 can be used for generating triggering open command.
Network 120 may include communication network.The communication network may include computer network (for example, local area network (LAN, LocalAreaNetwork) or wide area network (WAN, WideAreaNetwork)), internet and/or telephone network etc., or Several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, server 130, electronic equipment 140 etc.) send information.
Server 130 can connect the other equipment in Environment System 100 (for example, electronic equipment by network 120 110, electronic equipment 140 etc.).
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application, Some or all of execution operation can be in another equipment or multiple equipment (for example, electronic equipment 140 in electronic equipment 110 And/or server 130) in execute.In some embodiments, when electronic equipment 110 be automatically or in response to request execute it is a kind of or When multiple functions and/or service, electronic equipment 110 can request other equipment (for example, electronic equipment 140 and/or server 130) substitution executes function and/or service.In some embodiments, electronic equipment 110 is in addition to executing function or service, further Execute relative one or more functions.In some embodiments, other equipment are (for example, electronic equipment 140 and/or clothes Business device 130) requested function or other relevant one or more functions can be executed, implementing result can be sent to electricity Sub- equipment 110.Electronic equipment 110 can repeat result or be further processed implementing result, to provide requested function Or service.
In some embodiments, electronic equipment 110 by system data BD or is via network 120 by communication module 116 Data to be backed up in system data BD upload or back up to electronic equipment 140 or server 130.
It should be noted that the description for Environment System 100 above only for convenience of description can not be this Shen It please be limited within the scope of illustrated embodiment.It is appreciated that the principle based on this system can for those skilled in the art Any combination can be carried out to each element, or constitute subsystem and connect with other elements under the premise of without departing substantially from the principle, Various modifications and variations in form and details are carried out to the implementation above method and systematic difference field.For example, network environment System 100 may further include database etc..Suchlike deformation, within the scope of protection of this application.
Fig. 2 is the exemplary cell block diagram of the electronic functionalities configuration provided according to some embodiments of the present application.Such as Shown in Fig. 2, processor 112 may include processing module 200, and the processing module 200 may include acquiring unit 210, analysis Unit 220, control unit 230.
According to some embodiments of the present application, the available information of acquiring unit 210.The information may include but unlimited In text, picture, audio, video, movement, gesture etc. or several combinations.In some embodiments, acquiring unit 210 can be with Input information is obtained by input/output module 114, the touch screen of display 115 and/or secondary or physical bond 117.As an example, obtaining Take the input information of the available electronic equipment 110 of unit 210.The input information may include key-press input, touch-control input, Gesture input, action input, remote input, transmission input etc. or several combinations.
In some embodiments, acquiring unit 210 is available falls detection data, obtains and fall backup open command Deng.
According to some embodiments of the present application, analytical unit 220 at least can to the information that acquiring unit 210 obtains and The information stored in electronic equipment is analyzed.In some embodiments, analytical unit 220 can analyze acquiring unit 210 and obtain What is taken falls detection data etc..
According to some embodiments of the present application, control unit 230 can control electronic equipment.The controlling electronic devices can To include that controlling electronic devices 110 executes movement.In some embodiments, control unit 230 can control opening network, so that eventually End is in connected state etc..In some embodiments, control unit 230 is according to the analysis of analytical unit 220 as a result, according to falling The velocity sensor and gravity sensor carried in backup open command controlling terminal is kept it turned on.
It should be noted that the unit in processing module 200 is described above, it only for convenience of description, can not be this Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on this system, Any combination may be carried out to each unit, or constitute submodule and other units company under the premise of without departing substantially from the principle It connects, various modifications and variations in form and details is carried out to the function of implementing above-mentioned module and unit.For example, electronic equipment 110 may further include sensor etc., and acquiring unit 210 can obtain information by sensor.In another example processing unit 220 may further include division subelement etc..Suchlike deformation, within the scope of protection of this application.
Fig. 3 is a kind of signal based on the data back up method for falling detection provided according to some embodiments of the present application Property flow chart;
As shown in figure 3, embodiments herein provides a kind of based on the data back up method for falling detection, it is applied to eventually End, which comprises step S301: detection data is fallen in acquisition;It is described fall detection data include: terminal velocity amplitude and Gravity acceleration value;Step S302: judge whether terminal is in the state of falling from high altitude according to detection data is fallen;Step S303: If judging, terminal is in the state that falls from high altitude, and obtains the system data BD of terminal;Step S304: multithreading is opened, to institute It states system data BD and carries out differential backup.It is backed up by multithreading, terminal is sent in falling this process In short period, the quick backup of existing terminal data guarantees the data safety of terminal.After differential backup is according to preceding primary backup The data that the sum newly increased was modified are backed up, thus differential backup by primary backup completely with regard on the basis of backed up The required time is shorter, is not required to do system every time and back up completely, and saves the memory space of backup.
As a kind of optional embodiment, before detection data is fallen in acquisition, the method also includes: acquisition is fallen standby Part open command;Based on backup open command is fallen, the velocity sensor carried in controlling terminal and gravity sensor holding are opened Open state;The velocity amplitude of terminal is obtained by the velocity sensor measurement;End is obtained with by the gravity sensor measurement The gravity acceleration value at end.
As a kind of optional embodiment, the method also includes: backup out code is fallen in acquisition;It is backed up based on falling Out code, the velocity sensor and gravity sensor carried in controlling terminal remain off;Wherein, fall backup to close Instructing and falling backup open command can be triggered by the prompt operation (such as gesture motion) of user, can also be by change System setting triggering.
As a kind of optional embodiment, the basis falls detection data and judges whether terminal is in the state of falling from high altitude If method include: that the velocity amplitude is greater than and falls from high altitude threshold speed, and the gravity acceleration value is greater than the weight that falls from high altitude Power acceleration rate threshold then determines that terminal is in the state that falls from high altitude.
As a kind of optional embodiment, before the system data BD for obtaining terminal, the method also includes: detection is eventually The network state at end;The step of if network state of terminal is connected state, triggers the system data BD for obtaining terminal; If the network state of terminal is unconnected state, opening network is controlled, so that terminal is in connected state;In the network of terminal State be connected state when, trigger it is described obtain terminal system data BD the step of.
As a kind of optional embodiment, multithreading is being opened, before carrying out differential backup to the system data BD, institute State method further include: determine the data to be backed up in the system data BD.
As a kind of optional embodiment, after getting the system data BD of terminal, the method also includes: it will be described System data BD obtains multiple first data module Bi, i ∈ [1, M] according to the first predetermined division regular partition;It defines one big Small the first cryptographic Hash array H [M] for N;The first cryptographic Hash Hi of each first data module Bi is obtained respectively;By described first Cryptographic Hash Hi is successively saved to the first cryptographic Hash array H [M];Wherein, H [M]={ H1, H2, H3 ... HM };First Predetermined division rule refers to: at least according to the content of data file, the data date of formation, data size in an at least attribute will Data mark off multiple data modules of size and format.
As a kind of optional embodiment, the method also includes: obtain the original file data SD backed up beyond the clouds; By the original file data SD according to the second predetermined division regular partition, multiple second data module St, t ∈ [1, N] are obtained; Define the second cryptographic Hash array X [N] that a size is N;The second cryptographic Hash Xt of each second data module St is obtained respectively; The second cryptographic Hash Hi is successively saved to the second cryptographic Hash array X [N];Wherein, X [N]=X1, X2, X3,...XN};Wherein, the second predetermined division rule is identical as the first predetermined division rule.
As a kind of optional embodiment, the method for the data to be backed up in the determination system data BD includes: Traversal and comparison the first cryptographic Hash array H [M] and the second cryptographic Hash array X [N];If the first cryptographic Hash array H [M] and second is breathed out Cryptographic Hash in uncommon value array X [N] is identical, it is determined that without data to be backed up in the system data BD;If the first cryptographic Hash number Cryptographic Hash in group H [M] and the second cryptographic Hash array X [N] is not identical, then selects difference from the first cryptographic Hash array H [M] In at least one third cryptographic Hash of the second cryptographic Hash array X [N];The corresponding third data module of all third cryptographic Hash is true It is set to data to be backed up;Wherein, third data module is contained among multiple first data module Bi.
As a kind of optional embodiment, the unlatching multithreading carries out the side of differential backup to the system data BD Method includes: to determine the word of each third data module corresponding with each third cryptographic Hash according to each third cryptographic Hash respectively Save size S;According to the byte-sized S of each third data module, the total of the data to be backed up in the system data BD is determined Byte-sized R;According to total byte size R, the quantity q for needing the thread opened is determined;It treats Backup Data and carries out md5 encryption; It is uploaded to cloud by the q thread opened with Backup Data by encrypted and backs up;Wherein, the number that per thread uploads According to size count are as follows: count=S/threads;Wherein, the position for the data to be backed up that p-th of thread uploads are as follows: (p-1) * S/threads to p*S/threads.
The another aspect of the application additionally provides a kind of terminal, comprising: memory is configured as storing data and instruction; Backup open command is fallen in such as memory system data, storage;The processor communicated is established with memory;And with processor The velocity sensor and gravity sensor of communication;Wherein, velocity sensor measurement obtains the velocity amplitude of terminal;Gravity sensor is used The gravity acceleration value of terminal is obtained in measurement;Wherein, when executing the instruction in memory, the processor is configured to holding The following operation of row: detection data is fallen in acquisition;It is described to fall the velocity amplitude and gravity acceleration value that detection data includes: terminal; Judge whether terminal is in the state of falling from high altitude according to detection data is fallen;If judging, terminal is in the state that falls from high altitude, Obtain the system data BD of terminal;Multithreading is opened, differential backup is carried out to the system data BD.
Specifically, before detection data is fallen in acquisition, the processor is configured to executing following operation: acquisition is fallen Backup open command;Based on backup open command is fallen, the velocity sensor and gravity sensor carried in controlling terminal is kept Open state;The velocity amplitude of terminal is obtained by the velocity sensor measurement;It is obtained with by the gravity sensor measurement The gravity acceleration value of terminal.
As a kind of optional embodiment, falls detection data in basis and judge whether terminal is in the state of falling from high altitude When, the processor is configured to executing following operation:
If the velocity amplitude is greater than the threshold speed that falls from high altitude, and the gravity acceleration value is greater than the gravity that falls from high altitude and adds Threshold speed then determines that terminal is in the state that falls from high altitude.
Before the system data BD for obtaining terminal, the processor is configured to executing following operation:
Detect the network state of terminal;
The step of if network state of terminal is connected state, triggers the system data BD for obtaining terminal;
If the network state of terminal is unconnected state, opening network is controlled, so that terminal is in connected state;
Terminal network state be connected state when, trigger it is described obtain terminal system data BD the step of.
As a kind of optional embodiment, multithreading is being opened, before carrying out differential backup to the system data BD, institute Processor is stated to be configured as executing following operation:
Determine the data to be backed up in the system data BD.
As a kind of optional embodiment, after getting the system data BD of terminal, the processor is configured to holding The following operation of row: by the system data BD according to the first predetermined division regular partition, multiple first data module Bi, i are obtained ∈[1,M];Define the first cryptographic Hash array H [M] that a size is N;The first of each first data module Bi is obtained respectively Cryptographic Hash Hi;The first cryptographic Hash Hi is successively saved to the first cryptographic Hash array H [M];Wherein, H [M]= H1, H2, H3 ... HM };First predetermined division rule refers to: at least according to the content of data file, data date of formation, data Size in an at least attribute data are marked off to multiple data modules of size and format.
As a kind of optional embodiment, the processor is configured to executing following operation: acquisition has been backed up beyond the clouds Original file data SD;By the original file data SD according to the second predetermined division regular partition, multiple second numbers are obtained According to module St, t ∈ [1, N];Define the second cryptographic Hash array X [N] that a size is N;Each second data mould is obtained respectively The second cryptographic Hash Xt of block St;The second cryptographic Hash Hi is successively saved to the second cryptographic Hash array X [N];Its In, X [N]=X1, X2, X3 ... XN };Wherein, the second predetermined division rule and the first predetermined division rule phase Together.
As a kind of optional embodiment, when determining the data to be backed up in the system data BD, the processor It is configured as executing following operation: traversal and comparison the first cryptographic Hash array H [M] and the second cryptographic Hash array X [N];If first Cryptographic Hash array H [M] is identical with the cryptographic Hash in the second cryptographic Hash array X [N], it is determined that without to standby in the system data BD Part data;If the cryptographic Hash in the first cryptographic Hash array H [M] and the second cryptographic Hash array X [N] is not identical, from the first Hash At least one third cryptographic Hash different from the second cryptographic Hash array X [N] is selected in value array H [M];By all third Hash It is worth corresponding third data module and is determined as data to be backed up;Wherein, third data module is contained in multiple first data modules Among Bi.
As a kind of optional embodiment, multithreading is being opened, it is described when carrying out differential backup to the system data BD Processor is configured as executing following operation: respectively according to each third cryptographic Hash, determination is corresponding with each third cryptographic Hash The byte-sized S of each third data module;According to the byte-sized S of each third data module, the system data is determined The total byte size R of data to be backed up in BD;According to total byte size R, the quantity q for needing the thread opened is determined;As always Byte-sized R is 90M, then can open 3 threads, and every thread transmits 30M;Wherein, it should be noted that can also basis The quantity of the data module of data to be backed up determines the quantity q for needing the thread opened;Such as, there are 9 data modules to be backed up, then Open 9 threads;It treats Backup Data and carries out md5 encryption;It is uploaded encrypted with Backup Data by the q thread opened It is backed up to cloud;Wherein, the size of data count that per thread uploads are as follows: count=S/threads;Wherein, q-th The position for the data to be backed up that thread uploads are as follows: (q-1) * R/threads to q*R/threads-1;Wherein, the last one thread The position of the data to be backed up uploaded are as follows: (q-1) * S/threads to R.
The application is intended to protect a kind of based on the data back up method and terminal that fall detection, the above-mentioned technical side of the application Case falls detection data by obtaining, and judges whether terminal is in the state of falling from high altitude according to detection data is fallen, and judging Out terminal be in fall from high altitude state when, obtain the system data BD of terminal, and open multithreading, to the system data BD into Row differential backup;Compared with traditional complete data redundancy technique, the technical solution of the application utilizes the differential backup of multithreading Technology carries out the data backup of terminal, substantially increases the efficiency and safety of data backup.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in the present specification, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Finally, it is to be noted that, it is above-mentioned it is a series of processing not only include with sequence described here in temporal sequence The processing of execution, and the processing including executing parallel or respectively rather than in chronological order.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with It is completed by the relevant hardware of computer program instructions, the program can be stored in a computer readable storage medium, The program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
Above disclosed is only some preferred embodiments of the application, and the right model of the application cannot be limited with this It encloses, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and wants according to the application right Made equivalent variations is sought, is still belonged to the scope covered by the invention.

Claims (10)

1. a kind of based on the data back up method for falling detection, which is characterized in that be applied to terminal, which comprises
Detection data is fallen in acquisition;
It is described to fall the velocity amplitude and gravity acceleration value that detection data includes: terminal;
Judge whether terminal is in the state of falling from high altitude according to detection data is fallen;
If judging, terminal is in the state that falls from high altitude, and obtains the system data BD of terminal;
Multithreading is opened, differential backup is carried out to the system data BD.
2. the method according to claim 1, wherein the method is also wrapped before detection data is fallen in acquisition It includes:
Backup open command is fallen in acquisition;
Based on backup open command is fallen, the velocity sensor and gravity sensor carried in controlling terminal is kept it turned on;
The velocity amplitude of terminal is obtained by the velocity sensor measurement;
The gravity acceleration value of terminal is obtained with by the gravity sensor measurement.
3. the method according to claim 1, wherein the basis, which falls detection data, judges whether terminal is in The method for the state that falls from high altitude includes:
If the velocity amplitude is greater than the threshold speed that falls from high altitude, and the gravity acceleration value is greater than the acceleration of gravity that falls from high altitude Threshold value then determines that terminal is in the state that falls from high altitude.
4. the method according to claim 1, wherein obtain terminal system data BD before, the method Further include:
Detect the network state of terminal;
The step of if network state of terminal is connected state, triggers the system data BD for obtaining terminal;
If the network state of terminal is unconnected state, opening network is controlled, so that terminal is in connected state;
Terminal network state be connected state when, trigger it is described obtain terminal system data BD the step of.
5. the method according to claim 1, wherein it is poor to carry out to the system data BD opening multithreading Divide before backup, the method also includes:
Determine the data to be backed up in the system data BD.
6. according to the method described in claim 5, it is characterized in that, after getting the system data BD of terminal, the method Further include:
By the system data BD according to the first predetermined division regular partition, multiple first data module Bi, i ∈ [1, M] are obtained;
Define the first cryptographic Hash array H [M] that a size is N;
The first cryptographic Hash Hi of each first data module Bi is obtained respectively;
The first cryptographic Hash Hi is successively saved to the first cryptographic Hash array H [M];Wherein, H [M]=H1, H2, H3,...HM};
First predetermined division rule refers to: at least according to the content of data file, the data date of formation, data size at least Data are marked off multiple data modules of size and format by one attribute.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Obtain the original file data SD backed up beyond the clouds;
By the original file data SD according to the second predetermined division regular partition, multiple second data module St, t ∈ are obtained [1,N];
Define the second cryptographic Hash array X [N] that a size is N;
The second cryptographic Hash Xt of each second data module St is obtained respectively;
The second cryptographic Hash Hi is successively saved to the second cryptographic Hash array X [N];Wherein, X [N]=X1, X2, X3,...XN};
Wherein, the second predetermined division rule is identical as the first predetermined division rule.
8. the method according to the description of claim 7 is characterized in that the data to be backed up in the determination system data BD Method include:
Traversal and comparison the first cryptographic Hash array H [M] and the second cryptographic Hash array X [N];
If the first cryptographic Hash array H [M] is identical with the cryptographic Hash in the second cryptographic Hash array X [N], it is determined that the system data Without data to be backed up in BD;
If the cryptographic Hash in the first cryptographic Hash array H [M] and the second cryptographic Hash array X [N] is not identical, from the first cryptographic Hash number At least one third cryptographic Hash different from the second cryptographic Hash array X [N] is selected in group H [M];
The corresponding third data module of all third cryptographic Hash is determined as data to be backed up;
Wherein, third data module is contained among multiple first data module Bi.
9. method according to any one of claims 1 to 8, which is characterized in that the unlatching multithreading, to the system number Include: according to the method that BD carries out differential backup
Respectively according to each third cryptographic Hash, determine that the byte of each third data module corresponding with each third cryptographic Hash is big Small S;
According to the byte-sized S of each third data module, the total byte of the data to be backed up in the system data BD is determined Size R;
According to total byte size R, the quantity q for needing the thread opened is determined;
It treats Backup Data and carries out md5 encryption;
It is uploaded to cloud by the q thread opened with Backup Data by encrypted and backs up;
Wherein, the size of data count that per thread uploads are as follows: count=S/threads;
Wherein, the position for the data to be backed up that q-th of thread uploads are as follows: (q-1) * R/threads to q*R/threads-1;
Wherein, the position for the data to be backed up that the last one thread uploads are as follows: (q-1) * S/threads to R.
10. a kind of terminal characterized by comprising
Memory is configured as storing data and instruction;
The processor communicated is established with memory;
And velocity sensor and gravity sensor with processor communication;
Wherein, velocity sensor measurement obtains the velocity amplitude of terminal;Gravity sensor is used to measure the gravity for obtaining terminal and accelerates Angle value;
Wherein, when executing the instruction in memory, the processor is configured to executing following operation:
Detection data is fallen in acquisition;
It is described to fall the velocity amplitude and gravity acceleration value that detection data includes: terminal;
Judge whether terminal is in the state of falling from high altitude according to detection data is fallen;
If judging, terminal is in the state that falls from high altitude, and obtains the system data BD of terminal;
Multithreading is opened, differential backup is carried out to the system data BD.
CN201811152712.XA 2018-09-29 2018-09-29 It is a kind of based on the data back up method and terminal that fall detection Pending CN109413266A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811152712.XA CN109413266A (en) 2018-09-29 2018-09-29 It is a kind of based on the data back up method and terminal that fall detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811152712.XA CN109413266A (en) 2018-09-29 2018-09-29 It is a kind of based on the data back up method and terminal that fall detection

Publications (1)

Publication Number Publication Date
CN109413266A true CN109413266A (en) 2019-03-01

Family

ID=65465719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811152712.XA Pending CN109413266A (en) 2018-09-29 2018-09-29 It is a kind of based on the data back up method and terminal that fall detection

Country Status (1)

Country Link
CN (1) CN109413266A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917917A (en) * 2020-06-29 2020-11-10 维沃移动通信有限公司 File backup method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150149408A1 (en) * 2013-11-28 2015-05-28 Inventec Corporation Mobile device protecting system and method
CN105808373A (en) * 2014-12-30 2016-07-27 中兴通讯股份有限公司 Incremental backup method and device of data, and NAS (Network Attached Storage) equipment
CN105893185A (en) * 2016-03-31 2016-08-24 广东欧珀移动通信有限公司 Data backup method and device
CN107391628A (en) * 2017-06-30 2017-11-24 北京奇虎科技有限公司 Method of data synchronization and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150149408A1 (en) * 2013-11-28 2015-05-28 Inventec Corporation Mobile device protecting system and method
CN105808373A (en) * 2014-12-30 2016-07-27 中兴通讯股份有限公司 Incremental backup method and device of data, and NAS (Network Attached Storage) equipment
CN105893185A (en) * 2016-03-31 2016-08-24 广东欧珀移动通信有限公司 Data backup method and device
CN107391628A (en) * 2017-06-30 2017-11-24 北京奇虎科技有限公司 Method of data synchronization and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917917A (en) * 2020-06-29 2020-11-10 维沃移动通信有限公司 File backup method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN107222639A (en) User security is reminded to use the method and system of mobile terminal
CN107707766A (en) Charging reminding method based on routing
CN107835307A (en) Sleep method and system are helped for terminal
CN108040167A (en) The method that limiting terminal uses
CN108319408A (en) Stereogram target operating method and system
CN108334947A (en) A kind of the SGD training methods and system of intelligent optimization
CN108228811A (en) Information recommendation method and system
CN107132985A (en) A kind of display changeover method
CN107315681A (en) Application program self-starting test system, medium and method
CN107423585A (en) The concealed application method and system of a kind of application
CN107786979A (en) A kind of multiple terminals shared communication method and system
CN107846508A (en) For the assisted memory method and system of forgetful crowd
CN108009961A (en) For the trip householder method and system of physical disabilities
CN109379431A (en) A kind of contact person information updating method, cloud server and terminal
CN109582888A (en) Web page bookmark method for sorting and system
CN107402690A (en) A kind of global collecting method and system
CN109413266A (en) It is a kind of based on the data back up method and terminal that fall detection
CN108293175A (en) Device and for provide its switching method
CN108399529A (en) The management method and system of time
CN109189536A (en) A kind of terminal applies display methods and system
CN107395900A (en) The multiple based reminding method of missed call
CN107623736A (en) A kind of equipment connection method and system
CN108040088A (en) Event arrangement method and system based on stroke route
CN107832358A (en) A kind of distributed SVM optimization methods and system
CN108664998A (en) A kind of picture training method and system that paraphrase is reinforced

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190301

WD01 Invention patent application deemed withdrawn after publication