CN109922440B - Data synchronization method, device, mobile terminal and storage medium - Google Patents

Data synchronization method, device, mobile terminal and storage medium Download PDF

Info

Publication number
CN109922440B
CN109922440B CN201910101276.1A CN201910101276A CN109922440B CN 109922440 B CN109922440 B CN 109922440B CN 201910101276 A CN201910101276 A CN 201910101276A CN 109922440 B CN109922440 B CN 109922440B
Authority
CN
China
Prior art keywords
data
synchronization
information
application
target application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910101276.1A
Other languages
Chinese (zh)
Other versions
CN109922440A (en
Inventor
李享
全磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910101276.1A priority Critical patent/CN109922440B/en
Publication of CN109922440A publication Critical patent/CN109922440A/en
Application granted granted Critical
Publication of CN109922440B publication Critical patent/CN109922440B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses a data synchronization method, data synchronization equipment, a mobile terminal and a storage medium. The method comprises the following steps: broadcasting a first user name of a target application when the target application is accessed to a network; receiving at least one return message for the broadcast, the return message including at least one encrypted application synchronization information; determining a decryption key based on the first username, and decrypting the at least one encrypted application synchronization message according to the decryption key; and synchronizing the data of the target application according to the application synchronization information obtained by successful decryption. The embodiment of the invention can solve the problem of safety risk during data synchronization and improve the data safety during the data synchronization process.

Description

Data synchronization method, device, mobile terminal and storage medium
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a data synchronization method, data synchronization equipment, a mobile terminal and a storage medium.
Background
With the popularity of the internet and the acceleration of urbanization, fast paced life and work results in more and more time-sliced for individuals. How to better manage personal life and working hours becomes increasingly important for office workers.
By making a task plan and a schedule, a user can better overall task arrangement and schedule time, and when managing tasks in the recent plan of the user, application software such as a traditional paper document, a white/black board or a third-party multiple task management type or time management type can be used, such as an electronic calendar, task management or a mailbox calendar system built by a company where the user is located.
However, the traditional paper document or white/black board is inconvenient for recording confidential tasks and easy for information leakage, data synchronization and information sharing cannot be performed between user data, and the integrity and the uniformity of the data are poor; when the third-party task management application system is used, data synchronization and information sharing can be performed, but if user data relates to personal privacy or important meetings (such as new product release and communication discussions), the data information of the application system is easy to have information security risks, and information leakage is caused.
Disclosure of Invention
The embodiment of the invention provides a data synchronization method, data synchronization equipment, a mobile terminal and a storage medium, and aims to solve the problem of safety risk during data synchronization.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a data synchronization method, including:
broadcasting a first user name of a target application when the target application is accessed to a network;
receiving at least one return message for the broadcast, the return message including at least one encrypted application synchronization information;
determining a decryption key based on the first username, and decrypting the at least one encrypted application synchronization message according to the decryption key;
and synchronizing the data of the target application according to the application synchronization information obtained by successful decryption.
In a second aspect, an embodiment of the present invention further provides a data synchronization apparatus, including:
the broadcast sending module is used for broadcasting a first user name of the target application when the target application is accessed to the network;
a message receiving module for receiving at least one return message for the broadcast, the return message including at least one encrypted application synchronization information;
the information decryption module is used for determining a decryption key based on the first user name and decrypting at least one piece of encrypted application synchronization information according to the decryption key;
and the information synchronization module is used for synchronizing the data of the target application according to the application synchronization information obtained by successful decryption.
In a third aspect, an embodiment of the present invention further provides a mobile terminal, including a processor, a memory, and a computer program stored in the memory and being executable on the processor, where the computer program, when executed by the processor, implements the steps of data synchronization in the above aspects.
In a fourth aspect, the embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor, and the data synchronization method steps in the above aspects are performed.
In the embodiment of the invention, the synchronous data of the target application is encrypted, the secret key is encrypted by using a user name plus a login password, and when the local application accesses the network for data synchronization, the decrypted secret key also uses the same mode, so that the safety of user data is ensured in the data synchronization process.
Drawings
The present invention will be better understood from the following description of specific embodiments thereof taken in conjunction with the accompanying drawings, in which like or similar reference characters designate like or similar features.
FIG. 1 is a flow chart illustrating a data synchronization method according to an embodiment of the present invention;
FIG. 2 is a network architecture diagram showing the existing network Internet and third party centric server on which a target application resides;
FIG. 3 is a system architecture diagram illustrating a calendar system according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating a calendar system interface layout according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram illustrating a data synchronization apparatus provided according to an embodiment of the present invention;
fig. 6 is a diagram illustrating a hardware configuration of a mobile terminal capable of implementing various embodiments of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
For a better understanding of the present invention, a data synchronization method, an apparatus, a mobile terminal and a storage medium according to embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and it should be noted that these embodiments are not intended to limit the scope of the present disclosure.
Fig. 1 is a flowchart illustrating a data synchronization method according to an embodiment of the present invention. As shown in fig. 1, a data synchronization method 100 in the embodiment of the present invention includes the following steps:
step S110, when the target application accesses the network, the first user name of the target application is broadcasted.
In this step, when the user needs to use the target application, the user needs to first perform user registration, set a user name and a password, and log in the target application using the user name and the password.
The user name and the user may be used to log in to the target application with a corresponding password, and the user name may be broadcast in clear text over the network when the target application accesses the network.
Step S120, receiving at least one return message for broadcasting, where the return message includes at least one piece of encrypted application synchronization information.
Step S130, determining a decryption key based on the first username, and decrypting the at least one encrypted application synchronization message according to the decryption key.
And step S140, synchronizing the data of the target application according to the application synchronization information obtained by successful decryption.
According to the data synchronization method provided by the embodiment of the invention, when a target application accesses a network, the user name can be broadcasted and the return message aiming at the broadcast is received, for at least one application synchronization message in the return message, the application synchronization data can be decrypted based on the user name of the target application as a decryption key, and the data of the target application is synchronized according to the application synchronization information which can be successfully decrypted. In an embodiment of the invention, the encryption key and the decryption key may be determined based on the user name. That is to say, the same secret key is used for encryption and decryption, and the application synchronization information obtained by successful decryption is the data information corresponding to the user name in the target application, so that the security of the user data in the application on the network is ensured.
In an embodiment, determining the decryption key based on the first username may specifically include:
and taking the first user name and the login password corresponding to the first user name as the decryption key.
In one embodiment, step S140 may specifically include:
and step S141-01, acquiring the synchronous data of the application synchronous information and the time stamp of the synchronous data which are obtained by successful decryption.
And step S141-02, synchronizing the data of the target application based on the time stamp and the synchronization data.
In the embodiment, the time stamp of the synchronous data is used as a key word to carry out data synchronization, so that the consistency of the data in the target application is ensured.
In another embodiment, step S140 may specifically include:
and step S142-01, acquiring the synchronous data of the application synchronous information, the time stamp of the synchronous data and the validity information of the synchronous data, which are obtained by successful decryption.
And step S142-02, determining whether the synchronous data is valid according to the validity information.
And step S142-03, synchronizing the data of the target application based on the time stamp and the synchronous data when the synchronous data is effective.
In this embodiment, the timestamp of the synchronization data and whether the synchronization data is valid may be considered simultaneously when synchronizing the data, so as to synchronize the valid data in the synchronization data, thereby improving the data synchronization efficiency while ensuring the data consistency in the target application.
In one embodiment, the at least one return message for broadcasting received by the target application may further include a source network address of the application synchronization information; in this embodiment, the data synchronization method 100 may further include:
step S151 is to generate application synchronization information corresponding to the first username, using the data corresponding to the first username, which is updated in the target application, as synchronization data corresponding to the first username.
Step S152 is to generate an encryption key according to the user login information including the first username, and encrypt the application synchronization information corresponding to the first username.
Step S153, based on the source network address, sending the encrypted application synchronization information corresponding to the first user name.
In this embodiment, the target application may record a source network address and a first username of the application synchronization information, use the source network address as an opposite-end network address, and when data of the target application is updated, generate the application synchronization information by using the updated data, and send the application synchronization information to the opposite-end network address of the first user, thereby improving initiative of data synchronization and data synchronization efficiency.
In one embodiment, the data synchronization method 100 may further include:
step S160, receiving a second username of the non-target application broadcast.
In step S161, the data corresponding to the second user name in the target application is used as the synchronization data corresponding to the second user name, and the application synchronization information corresponding to the second user name is generated using the synchronization data corresponding to the second user name.
Step S162, generating an encryption key according to the user login information including the second username, and encrypting the application synchronization information corresponding to the second username.
Step S163 is to generate a return message for the non-target application broadcast according to the encrypted application synchronization information corresponding to the second username, and to transmit the return message for the non-target application broadcast.
In one embodiment, step S161 may specifically include:
determining validity information of the synchronization data corresponding to the second username; and generating application synchronization information corresponding to the second user name according to the encrypted synchronization data and the validity information.
In the embodiment, the time stamp and the validity information of the data in the target application can be recorded, so that a user can synchronize the data according to the time stamp and the data validity, the time stamp of the data can be used for keeping the consistency of the data, invalid data is acquired when the data synchronization is reduced by using the validity information of the data, and the data synchronization efficiency is improved.
In one embodiment, the validity information indicates that the sync data corresponding to the second username is valid if the sync data corresponding to the second username is data obtained by the add operation and/or the modify operation.
In one embodiment, the validity information indicates that the sync data corresponding to the second username is invalid if the sync data corresponding to the second username is at least data obtained by a delete operation, and a timestamp of the data for which the delete operation is performed is later than a timestamp of the same data for which the operation other than the delete operation is performed.
In this embodiment, a new addition operation, a modification operation, and a deletion operation may be performed on data in a target application, and if the new addition operation and the modification operation are performed on the data, a deletion operation is also performed, that is, when a timestamp of the data for which the deletion operation is performed is later than a timestamp of the same data for which an operation other than the deletion operation is performed, it may be determined that synchronization data corresponding to the new addition operation is invalid and/or synchronization data corresponding to the modification operation is invalid. According to the specific operation of the data of the target application and the timestamp of the specific operation, the validity information of the synchronous data of the user is determined, only the valid data in the synchronous data can be selected for synchronization when the data are synchronized, invalid data read when the data are synchronized are reduced, and the data synchronization efficiency is improved.
According to the data synchronization method provided by the embodiment of the invention, the user name of the target application and the login password corresponding to the user name are used as secret keys for encrypting and decrypting data. For example, a user name and password for a user to log into a calendar system may be used as a key for encrypting and decrypting data. Therefore, keys are different between different users to prevent data leakage between users. And the data of the same user, the encryption key and the decryption key are consistent, so that the data of the user which can be successfully decrypted is ensured to be the data of the same user but not the data of other users, namely, the data encryption and decryption of the same user cannot be influenced, and the data user security is provided.
In one embodiment, both the encryption data and the decryption data may be implemented at the user side by a dedicated hardware encryption processor. Data encryption and data decryption provided by hardware can ensure the security of data on the network, and even if the data is intercepted, the data cannot be easily cracked.
In one embodiment, the data synchronization method 100 may further include:
step S201, waking up the target application, receiving the audio signal by using the woken up target application, and recognizing a voice instruction in the audio signal.
And step S202, processing the data in the target application according to the voice instruction.
In this embodiment, the target application may be triggered to begin receiving audio signals through the user interface component. The user interface component may be, for example, a button or a tab. As an example, a "voice" tag may be set in a user interface of a target application, and clicking the "voice" tag may trigger the target application to start receiving an audio signal, perform voice recognition on the audio signal to obtain a voice instruction in the audio signal, and process data in the target application according to the voice instruction, thereby improving user data processing efficiency and application usability.
In one embodiment, the data synchronization method 100 may further include:
step S203, according to the received instant message, awakening the target application.
Step S204, acquiring task information including date information in the instant message by using the awakened target application.
In step S205, task information including date information is added to the data of the target application.
In this embodiment, the target application may be awakened by a received instant message, which may be, for example, a short message or a communication message in a designated application. And the target application reads the task information in the instant message and adds the task information into the target application for processing.
In the embodiment of the invention, the task information in the target application can be processed in a plurality of task information identification and task establishment modes, so that the application usability and the application data processing efficiency of a user are improved.
In one embodiment, the data synchronization method 100 may further include:
and step S206, after the target application is awakened, setting the target application to continuously run in the background according to the set continuous running time length threshold.
In the embodiment of the invention, when the target application is awakened through the received instant message, in order to prevent the problem that the target application may be frequently awakened when a short message storm occurs, the time that the target application resides in the background after being awakened can be set in the target application, so that the target application can be ensured to reside in the background after being awakened and run without being frequently awakened.
In one embodiment, the data synchronization method 100 may further include:
step S207, when the data of the target application includes the task information to be processed, determining deadline information of the task information to be processed.
And step S208, determining a reminding time point before the deadline aiming at the to-be-processed task information according to the time point contained in the deadline information and a preset reminding time interval before the deadline.
Step S209, a reminding message for the task information to be processed is generated by using the reminding time point before the deadline for the task information to be processed and a preset reminding mode.
In this embodiment, the user may customize the task reminder effect to remind the task that is about to expire in the target application in time.
In one embodiment, the data synchronization method 100 may further include:
step S210, determining a working period and an idle period in a data processing time period and determining data needing to be processed in the working period according to the processing time information of the data of the target application and a preset data processing time period;
step S211, in the interface of the applied display data processing time cycle, the interface area corresponding to the working period and the data needing to be processed in the working period are displayed, an
Step S212, displaying the interface region corresponding to the idle time period, wherein the area size of the interface region corresponding to the idle time period is in direct proportion to the duration of the idle time period.
In the embodiment, the user can conveniently and rapidly check the idle time blocks by the area display and division of the idle time and the working time period so as to finish the task or insert a new task by using the idle time blocks, thereby improving the speed of acquiring the idle time blocks by the user, facilitating the user to check the distribution condition of the existing time and improving the data processing efficiency of the user.
In embodiments of the present invention, the target application may include, but is not limited to, a calendar system such as an electronic calendar. That is to say, the target application data synchronization method according to the embodiment of the present invention is applicable to any application that can perform data processing. Such as an application system with time management or task management.
According to the data synchronization method provided by the embodiment of the invention, both the local terminal and the non-local terminal in the network can comprise a single piece of application data. When the synchronous data is needed, the providing end of the application synchronous information can use the mode of the user name and the password as the secret key to encrypt the synchronous information, and the using end of the synchronous information can use the mode of the user name and the password as the secret key to decrypt the encrypted synchronous information, so as to ensure the safety of the application data of the user.
In the embodiment of the invention, the data synchronization method of the target application does not need to pass through a third-party server, so that the cost for safely synchronizing the data can be reduced. Therefore, the data synchronization method in the embodiment of the present invention can be applied to the synchronization operation of any application that does not want to pass through the third-party server.
In order to better understand the present invention, in the following embodiments, a data synchronization method according to an embodiment of the present invention is described by taking a target application as an electronic calendar as an example. It should be noted that these examples are not intended to limit the scope of the present disclosure. In some embodiments, the target application may be any application having temporal task management requirements.
Fig. 2 is a network architecture diagram showing the Internet and a third party central server of the existing target application. As shown in fig. 2, each of the user terminals, such as a mobile terminal and a Personal Computer (PC) terminal, may operate a calendar system. In practical application scenarios, information leakage may be caused by both the Internet and the third-party central server. Due to technical or resource capacity, the realization cost of most of small and medium-sized enterprises needs to be increased by using a calendar system built by a company private network.
Therefore, in the data synchronization method of the embodiment of the present invention, the calendar system can keep independent calendar data at both the mobile terminal and the PC terminal, and use the user name encryption code of the user logging in the calendar system as a key for encrypting data to obtain synchronization information of the calendar data. During synchronization, the time can be used as a keyword, and the calendar information can be synchronized through wireless fidelity wifi, Bluetooth or an internal network of a company so as to ensure the safety of the calendar data.
Fig. 3 shows a system architecture diagram of a calendar system according to an embodiment of the present invention. As shown in fig. 3, for the security of the synchronization information, a dedicated hardware encryption processor may be used for encrypting and decrypting data at the PC side and the mobile side, respectively.
In one embodiment, a mobile phone dedicated processor may be added to the main board of the terminal, and is dedicated to encrypting and decrypting the synchronization information. From the hardware point of view, the hardware of the hardware encryption processors of the PC end and the mobile end can not be completely the same; however, the application effects of the hardware encryption processors of the PC and the mobile terminal are consistent, and both the user name of the user logging in the calendar system and the password corresponding to the user name are used as keys for encrypting and decrypting data.
By using the encryption and decryption method of the embodiment of the invention, the secret keys between users are different, so that data leakage between users can be prevented; but for the same piece of data, the encryption and decryption keys are the same, so that the encryption and decryption of the data of the same user are not influenced. Such hardware-provided encryption and decryption can ensure the security of data on the network, and even if the data is intercepted, the data cannot be decrypted.
With continued reference to FIG. 3, a method of synchronizing a calendar system according to an exemplary embodiment of the present invention is described. In one embodiment, the synchronization method of the calendar system may include:
in step S301, a calendar system is logged in.
In this step, no matter any user needs to use the calendar system, the user needs to register login locally and set a username and password. And logs into the local calendar system using the username and password.
In step S302, the calendar data is encrypted.
In this step, the PC side and the mobile phone side may introduce different encryption processors, which are used exclusively for encryption and decryption of the synchronization information. All data need to be encrypted before synchronization, and the algorithm can use a symmetric encryption algorithm such as an AES encryption algorithm, and an encryption key uses a user name plus a login password. When the data is synchronized, the opposite terminal decrypts by using the mode of the user name plus the login password. Encryption and decryption are all completed on the hardware side. Symmetric key ciphers use the same key to encrypt and decrypt data, as opposed to the key pair used in public key ciphers. And the security of the data corresponding to the user in the target application is ensured when the data is transmitted in the network.
Step S303, the calendar system accesses the network and broadcasts the user name.
In one embodiment, when the PC end or the mobile end where the calendar is located is accessed to a network environment, the user name of the current login calendar system can be broadcasted on the network in a clear text manner; or, after a connection is established between different mobile terminals or between a mobile terminal and a PC terminal, for example, between a mobile phone and a mobile phone or between a mobile phone and a PC through a near field communication technology, the calendar system may broadcast the current login user name of the calendar system as well.
As an example, the near field communication technology may be bluetooth communication technology, zigbee communication technology, etc., and the present invention is not limited in detail herein.
Step S304, calendar data synchronization.
In one embodiment, the calendar system is connected to the network and receives at least one return message for the broadcast message, the return message including at least one encrypted application synchronization information. And decrypting at least one piece of encrypted application synchronization information by using the current login user name and the login password corresponding to the current user name as decryption keys, and synchronizing the data of the target application according to the application synchronization information obtained by successful decryption. When the calendar data is synchronized, the calendar data can be synchronized according to the time stamp, and the data consistency of the target application is ensured.
In one embodiment, a local target application accesses a network, and if a user name of a broadcast from a non-target application in the network is received, if application data of the user exists in the local target application, application synchronization information corresponding to the user can be generated by using synchronization data corresponding to the user. And transmitting the local network address and the encrypted application synchronization information of the user according to the source network address of the broadcast.
Step S305, calendar data management.
In one embodiment, if the calendar system is in a dormant or standby state, the calendar system may be awakened first.
As one example, a user may manually wake up a calendar system; the calendar system can recognize the voice instruction in the audio information and carry out operations such as adding, deleting or modifying the calendar task according to the voice instruction.
As an example, may be received audio information such as: "call calendar task of May one". The calendar system searches calendar information with task execution time of May I through voice recognition, the calendar information is automatically displayed on a display screen of the calendar system, and a user can delete or edit target calendar information in a touch mode.
In one embodiment, calendar data may be managed by automatic identification.
As an example, after receiving a short message, the mobile terminal automatically wakes up the calendar system, identifies task information including date information from the received short message, and adds the task information in the calendar system according to the date information. For example, when the meeting notification is performed by sending a short message through the short message system, the calendar system may be awakened according to the short message, and a meeting reminding task may be established in the calendar system according to the time information included in the task information, such as the meeting start time, the meeting end time, and the like. And calendar task expiration reminding can be carried out by utilizing the calendar system.
FIG. 4 shows a schematic diagram of a calendar system interface layout according to an embodiment of the present invention. As shown in fig. 4, the user's daily routine typically has a fixed period of time, such as a day, a week, a month, a year, etc. As an example, a user selects a 'week calendar' tab in a user interface of a calendar system, which may display the distribution of free time and working time for the week in detail according to the selected time period.
In order to facilitate the user to check, the area size of the interface display area corresponding to the idle period and the duration of the idle period form a preset proportional relationship. For example, the longer the duration of the spatial period, the larger the area of the corresponding display region in the user interface. The user can conveniently and quickly determine the idle time blocks, so that tasks are completed or temporarily increased tasks are inserted by using the idle time blocks, and the quick overall arrangement of the tasks is realized.
The management scheme for the calendar system in the embodiment of the invention is also suitable for other application systems with task management requirements, and the interface layout for the calendar system in the embodiment is also suitable for other application systems with time task management requirements. According to the embodiment of the invention, the safe calendar synchronization is realized in the network environment, and the calendar management of a user is facilitated.
Hereinafter, a data synchronization apparatus according to an embodiment of the present invention will be described in detail with reference to the accompanying drawings.
Fig. 5 is a schematic structural diagram illustrating a data synchronization apparatus according to an embodiment of the present invention. As shown in fig. 5, the data synchronization apparatus 500 includes:
the broadcast sending module 510 is configured to broadcast a first username of a target application when the target application accesses a network.
A message receiving module 520, configured to receive at least one return message for broadcasting, where the return message includes at least one piece of encrypted application synchronization information.
An information decryption module 530, configured to determine a decryption key based on the first username, and decrypt the at least one encrypted application synchronization information using the decryption key.
And an information synchronization module 540, configured to synchronize data of the target application by using the application synchronization information obtained by successful decryption.
In one embodiment, the information decryption module 530, when configured to determine the decryption key based on the first username, is specifically configured to use the first username and a login password corresponding to the first username as the decryption key.
In an embodiment, the information synchronization module 540 may specifically include:
the synchronous data acquisition unit is used for acquiring synchronous content of the application data, a time stamp of the synchronous content and an operation type in the application synchronous information;
the information synchronization module 540 is further specifically configured to synchronize data of the target application based on the timestamp and the synchronization data.
In an embodiment, the information synchronization module 540 may specifically include:
and the synchronous data acquisition unit is used for acquiring the synchronous data of the application synchronous information, the time stamp of the synchronous data and the validity information of the synchronous data, which are obtained by successful decryption.
And the data validity determining unit is used for determining whether the synchronous data is valid according to the validity information.
The information synchronization module 540 is further configured to synchronize the data of the target application based on the timestamp and the synchronization data when the synchronization data is valid.
In one embodiment, the source network address of the application synchronization information is also included in the at least one return message for the broadcast. In this embodiment, the data synchronization apparatus 500 may further include:
and the synchronous information generation module is used for taking the updated data corresponding to the first user name in the target application as the synchronous data corresponding to the first user name and generating the application synchronous information corresponding to the first user name by utilizing the synchronous data corresponding to the first user name.
And the synchronous data encryption module is used for generating an encryption key according to the user login information comprising the first user name and encrypting the application synchronous information corresponding to the first user name.
And the synchronous information sending module is used for sending the encrypted application synchronous information corresponding to the first user name based on the source network address.
In one embodiment, the data synchronization apparatus 500 may further include:
and the broadcast receiving module is used for receiving the second user name broadcasted by the non-target application.
And the synchronous information generating module is used for taking the data corresponding to the second user name in the target application as the synchronous data corresponding to the second user name and generating the application synchronous information corresponding to the second user name by utilizing the synchronous data corresponding to the second user name.
And the synchronous data encryption module is used for generating an encryption key according to the user login information comprising the second user name and encrypting the application synchronous information corresponding to the second user name.
And the return message sending module is used for generating a return message aiming at the non-target application broadcast according to the encrypted application synchronization information corresponding to the second user name and sending the return message aiming at the non-target application broadcast.
In an embodiment, the synchronization information generating module may be specifically configured to determine validity information of synchronization data corresponding to the second username; and generating application synchronization information corresponding to the second user name according to the encrypted synchronization data and the validity information.
In an embodiment, the content validity determination module is further specifically configured to:
if the synchronous data corresponding to the second user name is data obtained through the adding operation and/or the modifying operation, the validity information indicates that the synchronous data corresponding to the second user name is valid; the validity information indicates that the synchronization data corresponding to the second username is invalid if the synchronization data corresponding to the second username is data obtained by at least the deletion operation and the timestamp of the data targeted by the deletion operation is later than the timestamp of the same data targeted by operations other than the deletion operation.
In one embodiment, the data synchronization apparatus 500 may further include:
and the application awakening module is used for awakening the target application, receiving the audio signal by utilizing the awakened target application and identifying the voice instruction in the audio signal.
And the data processing module is used for processing the data in the target application according to the voice instruction.
In one embodiment, the data synchronization apparatus 500 may further include:
and the application awakening module is used for awakening the target application according to the received instant message.
And the task acquisition module is used for acquiring the task information including the date information in the instant message by using the awakened target application.
And the task adding module is used for adding task information comprising date information in the data of the target application.
In one embodiment, after the target application is woken up, the target application is set to run continuously in the background according to the set continuous running time threshold.
In one embodiment, the data synchronization apparatus 500 may further include:
and the task deadline acquisition module is used for determining the deadline information of the task information to be processed when the data of the target application comprises the task information to be processed.
And the reminding time setting module is used for determining the reminding time point before the deadline aiming at the task information to be processed according to the time point contained in the deadline information and the preset reminding time interval before the deadline.
And the reminding message generating module is used for generating the reminding message aiming at the task information to be processed by utilizing the reminding time point before the deadline aiming at the task information to be processed and a preset reminding mode.
In one embodiment, the data synchronization apparatus 500 may further include:
and the working period determining module is used for determining the working period and the idle period in the data processing time period and determining the data needing to be processed in the working period according to the processing time information of the data of the target application and the preset data processing time period.
And the interface layout display module is used for displaying the interface region corresponding to the working period and the data needing to be processed in the working period in an applied interface for displaying the data processing time period, and displaying the interface region corresponding to the idle period, wherein the area size of the interface region corresponding to the idle period is in direct proportion to the duration of the idle period.
According to the data synchronization device of the embodiment of the invention, when the data of the target application needs to be synchronized, the user name of the login target application and the password of the user name can be used as the decryption key to decrypt the received encrypted application synchronization information, so that the data in the application can be synchronized according to the decrypted application synchronization information.
In the embodiment of the present invention, a symmetric encryption method may be adopted to determine an encryption key and a decryption key, where the encryption key and the decryption key for the same user are the same, for example, a user name and a password of the user name are used as keys, and the keys are used to perform data encryption and data decryption. Therefore, according to the data synchronization method, the data synchronization device, the mobile terminal and the storage medium in the embodiments of the present invention, it can be ensured that the application synchronization information of the first encrypted user can be decrypted only by using the first username and the password of the first username as the decryption key, so as to perform data synchronization, thereby ensuring the security of the user data in the calendar data, and on this basis, the calendar is managed, thereby assisting the user in fast task orchestration and arrangement, and ensuring the security of the user data.
It is to be understood that the invention is not limited to the particular arrangements and instrumentality described in the above embodiments and shown in the drawings. For convenience and brevity of description, detailed description of a known method is omitted here, and for the specific working processes of the system, the module and the unit described above, reference may be made to corresponding processes in the foregoing method embodiments, which are not described herein again.
The mobile terminal provided in the embodiment of the present invention can implement each process implemented by the mobile terminal in the method embodiment of fig. 1 and fig. 4, and is not described herein again to avoid repetition.
Figure 6 is a schematic diagram of a hardware configuration of a mobile terminal implementing various embodiments of the present invention,
the mobile terminal 600 includes, but is not limited to: a radio frequency unit 601, a network module 602, an audio output unit 603, an input unit 604, a sensor 605, a display unit 606, a user input unit 607, an interface unit 608, a memory 609, a processor 610, and a power supply 611. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 6 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 601 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 610; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 601 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio frequency unit 601 may also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides the user with wireless broadband internet access through the network module 602, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 603 may convert audio data received by the radio frequency unit 601 or the network module 602 or stored in the memory 609 into an audio signal and output as sound. Also, the audio output unit 603 may also provide audio output related to a specific function performed by the mobile terminal 600 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 603 includes a speaker, a buzzer, a receiver, and the like.
The input unit 604 is used to receive audio or video signals. The input Unit 604 may include a Graphics Processing Unit (GPU) 1041 and a microphone 6042, and the Graphics processor 6041 processes image data of a still picture or video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 606. The image frames processed by the graphic processor 6041 may be stored in the memory 609 (or other storage medium) or transmitted via the radio frequency unit 601 or the network module 602. The microphone 6042 can receive sound, and can process such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 601 in case of the phone call mode.
The mobile terminal 600 also includes at least one sensor 605, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 6061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 6061 and/or the backlight when the mobile terminal 600 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 605 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 606 is used to display information input by the user or information provided to the user. The Display unit 606 may include a Display panel 6061, and the Display panel 6061 may be configured by a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 607 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 607 includes a touch panel 6071 and other input devices 6072. Touch panel 6071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 6071 using a finger, stylus, or any suitable object or accessory). The touch panel 6071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 610, receives a command from the processor 610, and executes the command. In addition, the touch panel 6071 can be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The user input unit 607 may include other input devices 6072 in addition to the touch panel 6071. Specifically, the other input devices 6072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 6071 can be overlaid on the display panel 6061, and when the touch panel 6071 detects a touch operation on or near the touch panel 6071, the touch operation is transmitted to the processor 610 to determine the type of the touch event, and then the processor 610 provides a corresponding visual output on the display panel 6061 according to the type of the touch event. Although the touch panel 6071 and the display panel 6061 are shown in fig. 6 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 6071 and the display panel 6061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 608 is an interface through which an external device is connected to the mobile terminal 600. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 608 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 600 or may be used to transmit data between the mobile terminal 600 and external devices.
The memory 609 may be used to store software programs as well as various data. The memory 609 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 609 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 610 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 609 and calling data stored in the memory 609, thereby integrally monitoring the mobile terminal. Processor 610 may include one or more processing units; preferably, the processor 610 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 610.
The mobile terminal 600 may further include a power supply 611 (e.g., a battery) for supplying power to the various components, and preferably, the power supply 611 is logically connected to the processor 610 via a power management system, so that functions of managing charging, discharging, and power consumption are performed via the power management system.
In addition, the mobile terminal 600 includes some functional modules that are not shown, and are not described in detail herein.
The embodiment of the present invention further provides a mobile terminal, which includes a processor 610, a memory 609, and a computer program stored in the memory 609 and capable of running on the processor 610, where the computer program is executed by the processor 610 to implement each process of the data synchronization method embodiment, and can achieve the same technical effect, and for avoiding repetition, details are not repeated here.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the data synchronization method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (14)

1. A method for synchronizing data, the method comprising:
broadcasting a first user name of a target application when the target application is accessed to a network;
receiving at least one return message for the broadcast, the return message including at least one encrypted application synchronization information;
determining a decryption key based on the first username and decrypting the at least one encrypted application synchronization message according to the decryption key;
synchronizing the data of the target application according to the application synchronization information obtained by successful decryption;
wherein the method further comprises:
awakening the target application, receiving an audio signal by utilizing the awakened target application, and identifying a voice instruction in the audio signal;
and processing the data in the target application according to the voice instruction.
2. The data synchronization method of claim 1, wherein the determining a decryption key based on the first username comprises:
and taking the first user name and the login password corresponding to the first user name as a decryption key.
3. The data synchronization method according to claim 1, wherein the synchronizing the data of the target application according to the application synchronization information obtained by the decryption success comprises:
acquiring the synchronous data of the application synchronous information obtained by successful decryption and a timestamp of the synchronous data;
synchronizing data of the target application based on the timestamp and the synchronization data.
4. The data synchronization method according to claim 1, wherein the synchronizing the data of the target application according to the application synchronization information obtained by the decryption success comprises:
acquiring the synchronization data of the application synchronization information obtained by successful decryption, the timestamp of the synchronization data and the validity information of the synchronization data;
determining whether the synchronous data is valid according to the validity information;
and when the synchronous data is effective, synchronizing the data of the target application based on the timestamp and the synchronous data.
5. The data synchronization method according to claim 1, wherein the return message further includes a source network address of the application synchronization information;
the method further comprises the following steps:
taking the updated data corresponding to the first user name in the target application as synchronous data corresponding to the first user name, and generating application synchronous information corresponding to the first user name by utilizing the synchronous data corresponding to the first user name;
generating an encryption key according to user login information including the first username, and encrypting application synchronization information corresponding to the first username;
and sending the encrypted application synchronization information corresponding to the first user name based on the source network address.
6. The data synchronization method of claim 1, further comprising:
receiving a second username of the non-target application broadcast;
taking data corresponding to the second user name in the target application as synchronous data corresponding to the second user name, and generating application synchronous information corresponding to the second user name by utilizing the synchronous data corresponding to the second user name;
generating an encryption key according to the user login information comprising the second user name, and encrypting the application synchronization information corresponding to the second user name;
and generating a return message aiming at the non-target application broadcast according to the encrypted application synchronization information corresponding to the second user name, and sending the return message aiming at the non-target application broadcast.
7. The data synchronization method according to claim 6, wherein the generating application synchronization information corresponding to the second username using the synchronization data corresponding to the second username comprises:
determining validity information of the synchronization data corresponding to the second username;
and generating application synchronization information corresponding to the second user name according to the encrypted synchronization data and the validity information.
8. The data synchronization method of claim 7,
if the synchronous data corresponding to the second user name is data obtained through adding operation and/or modifying operation, the validity information represents that the synchronous data corresponding to the second user name is valid;
and if the synchronous data corresponding to the second user name is at least data obtained by deletion operation, and the timestamp of the data corresponding to the deletion operation is later than the timestamp of the same data corresponding to the operation except for the deletion operation, the validity information shows that the synchronous data corresponding to the second user name is invalid.
9. The data synchronization method of claim 1, further comprising:
awakening the target application according to the received instant message;
acquiring task information including date information in the instant message by using the awakened target application;
and adding the task information including the date information into the data of the target application.
10. The data synchronization method of claim 1, further comprising:
when the data of the target application comprises task information to be processed, determining deadline information of the task information to be processed;
determining a pre-deadline reminding time point aiming at the to-be-processed task information according to a time point contained in the deadline information and a preset pre-deadline reminding time interval;
and generating a reminding message aiming at the task information to be processed by utilizing the reminding time point before the deadline aiming at the task information to be processed and a preset reminding mode.
11. The data synchronization method of claim 1, further comprising:
processing of data according to the target application
The method comprises the steps of determining working time periods and idle time periods in a data processing time period and determining data needing to be processed in the working time periods by time information and a preset data processing time period;
displaying an interface area corresponding to the working period and data to be processed in the working period in an interface of the application displaying the data processing time cycle, and
and displaying an interface region corresponding to the idle period, wherein the area of the interface region corresponding to the idle period is in direct proportion to the duration of the idle period.
12. A data synchronization apparatus, characterized in that the apparatus comprises:
the system comprises a broadcast sending module, a first user name receiving module and a first user name receiving module, wherein the broadcast sending module is used for broadcasting a first user name of a target application when the target application is accessed to a network;
a message receiving module for receiving at least one return message for the broadcast, the return message including at least one encrypted application synchronization information;
an information decryption module, configured to determine a decryption key based on the first username, and decrypt the at least one encrypted application synchronization information according to the decryption key;
the information synchronization module is used for synchronizing the data of the target application according to the application synchronization information obtained by successful decryption;
the apparatus further comprises:
the application awakening module is used for awakening the target application, receiving the audio signal by utilizing the awakened target application and identifying a voice instruction in the audio signal;
and the data processing module is used for processing the data in the target application according to the voice instruction.
13. A mobile terminal, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, implements the steps of the data synchronization method according to any one of claims 1 to 11.
14. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the data synchronization method according to any one of claims 1 to 11.
CN201910101276.1A 2019-01-31 2019-01-31 Data synchronization method, device, mobile terminal and storage medium Active CN109922440B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910101276.1A CN109922440B (en) 2019-01-31 2019-01-31 Data synchronization method, device, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910101276.1A CN109922440B (en) 2019-01-31 2019-01-31 Data synchronization method, device, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN109922440A CN109922440A (en) 2019-06-21
CN109922440B true CN109922440B (en) 2021-11-23

Family

ID=66961286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910101276.1A Active CN109922440B (en) 2019-01-31 2019-01-31 Data synchronization method, device, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN109922440B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116868672A (en) * 2021-01-14 2023-10-10 捷开通讯(深圳)有限公司 Accurate reference timing information acquisition method, communication device, and readable storage medium
CN114980363B (en) * 2022-07-27 2024-03-19 荣耀终端有限公司 Bluetooth reconnection method and related device thereof

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8275365B1 (en) * 2010-10-01 2012-09-25 Hydrabyte, Inc. Method and system for providing presence information
CN102710751A (en) * 2012-05-11 2012-10-03 惠州Tcl移动通信有限公司 Method and system for synchronous update of schedule
CN103546435A (en) * 2012-07-13 2014-01-29 中兴通讯股份有限公司 Data synchronizing method and server
CN103647809A (en) * 2013-11-30 2014-03-19 鸿富锦精密工业(深圳)有限公司 Data synchronization method and server system
CN104811472A (en) * 2015-03-19 2015-07-29 上海斐讯数据通信技术有限公司 Intelligent calendar system based on wireless communication technology and communication method thereof
EP3121783A1 (en) * 2015-07-21 2017-01-25 Samsung Electronics Co., Ltd. Apparatus and method for distributing social presence information based on calendar events
CN107181770A (en) * 2017-07-31 2017-09-19 北京深思数盾科技股份有限公司 Method of data synchronization and system
CN107453780A (en) * 2017-09-13 2017-12-08 深圳真时科技有限公司 A kind of calendar information synchronous method, device and system
CN107667515A (en) * 2015-05-31 2018-02-06 苹果公司 Synchronization group and validation group in relevant device
CN108667809A (en) * 2018-04-13 2018-10-16 三维通信股份有限公司 A kind of implementation method of multisystem DAS WEB interfaces account information management by synchronization

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007052285A2 (en) * 2005-07-22 2007-05-10 Yogesh Chunilal Rathod Universal knowledge management and desktop search system
US20110177774A1 (en) * 2010-01-13 2011-07-21 Qualcomm Incorporated Dynamic generation, delivery, and execution of interactive applications over a mobile broadcast network

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8275365B1 (en) * 2010-10-01 2012-09-25 Hydrabyte, Inc. Method and system for providing presence information
CN102710751A (en) * 2012-05-11 2012-10-03 惠州Tcl移动通信有限公司 Method and system for synchronous update of schedule
CN103546435A (en) * 2012-07-13 2014-01-29 中兴通讯股份有限公司 Data synchronizing method and server
CN103647809A (en) * 2013-11-30 2014-03-19 鸿富锦精密工业(深圳)有限公司 Data synchronization method and server system
CN104811472A (en) * 2015-03-19 2015-07-29 上海斐讯数据通信技术有限公司 Intelligent calendar system based on wireless communication technology and communication method thereof
CN107667515A (en) * 2015-05-31 2018-02-06 苹果公司 Synchronization group and validation group in relevant device
EP3121783A1 (en) * 2015-07-21 2017-01-25 Samsung Electronics Co., Ltd. Apparatus and method for distributing social presence information based on calendar events
CN107181770A (en) * 2017-07-31 2017-09-19 北京深思数盾科技股份有限公司 Method of data synchronization and system
CN107453780A (en) * 2017-09-13 2017-12-08 深圳真时科技有限公司 A kind of calendar information synchronous method, device and system
CN108667809A (en) * 2018-04-13 2018-10-16 三维通信股份有限公司 A kind of implementation method of multisystem DAS WEB interfaces account information management by synchronization

Also Published As

Publication number Publication date
CN109922440A (en) 2019-06-21

Similar Documents

Publication Publication Date Title
US11088836B2 (en) Key updating method, apparatus, and system
CN108629171B (en) Unread message processing method and terminal
CN111130989B (en) Information display and sending method and electronic equipment
CN107145794B (en) Data processing method and device and mobile terminal
CN108052819B (en) Face recognition method, mobile terminal and computer readable storage medium
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN110188524B (en) Information encryption method, information decryption method and terminal
CN110149628B (en) Information processing method and terminal equipment
WO2019114530A1 (en) Information prompting method and mobile terminal
CN110035183B (en) Information sharing method and terminal
CN109062634B (en) Application starting method and mobile terminal
CN109922440B (en) Data synchronization method, device, mobile terminal and storage medium
CN110460700B (en) Display screen control method and device, electronic equipment and storage medium
CN111597540A (en) Login method of application program, electronic device and readable storage medium
CN109525666A (en) A kind of data back up method and mobile terminal
CN107835297B (en) Information updating method, mobile terminal and computer readable storage medium
CN111159738B (en) Authority configuration method, application login method and device
CN109753784B (en) Authorization method based on multi-dimensional code, mobile terminal and server
CN109753776B (en) Information processing method and device and mobile terminal
CN114553612B (en) Data encryption and decryption method and device, storage medium and electronic equipment
CN108880787B (en) Information key processing method and related equipment
CN111343618B (en) Display method and electronic equipment
CN110717163B (en) Interaction method and terminal equipment
CN109409068B (en) Operation execution method and terminal
CN111600847A (en) Information processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant