WO2018049975A1 - 一种数据转移方法及相关产品 - Google Patents

一种数据转移方法及相关产品 Download PDF

Info

Publication number
WO2018049975A1
WO2018049975A1 PCT/CN2017/099191 CN2017099191W WO2018049975A1 WO 2018049975 A1 WO2018049975 A1 WO 2018049975A1 CN 2017099191 W CN2017099191 W CN 2017099191W WO 2018049975 A1 WO2018049975 A1 WO 2018049975A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
password
communication request
send
data transfer
Prior art date
Application number
PCT/CN2017/099191
Other languages
English (en)
French (fr)
Inventor
张海龙
Original Assignee
广东欧珀移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东欧珀移动通信有限公司 filed Critical 广东欧珀移动通信有限公司
Publication of WO2018049975A1 publication Critical patent/WO2018049975A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/119Details of migration of file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a data transfer method and related products.
  • Terminals in the communication field are devices commonly used by users. Since the devices all have their own operating systems, the terminals are also called smart terminals or smart phones, and smart phones (for: Smartphone). It is a collective title for mobile phones with more computing power and functions than traditional feature phones.
  • the most used operating systems for smartphones are Windows Phone, Android, IOS, and BlackBerry OS, but the applications between them are not compatible with each other. Because smartphones can install third-party software like a personal computer, they are feature-rich and can be expanded.
  • the embodiment of the invention provides a data transfer method and device, which can improve user experience.
  • a first aspect of the embodiments of the present invention provides a data transfer method, where the method includes the following steps:
  • a communication request sent by the first terminal to the second terminal where the communication request includes: an indication of data transfer;
  • the first terminal receives the second terminal to send a communication response
  • the first terminal receives the first password set by the user on the password setting page, and the first terminal sends a password input prompt to the second terminal;
  • the first terminal receives the second password sent by the second terminal, and the first terminal compares the first password with the second password, and if the first password matches the second password, sends the second password to the second terminal. Transfer files.
  • a second aspect of the embodiments of the present invention provides a data transfer apparatus, where the apparatus is disposed in a first terminal, and the apparatus includes:
  • a sending unit configured to send, to the second terminal, a communication request, where the communication request includes: an indication of data transfer;
  • a receiving unit configured to receive a second terminal to send a communication response; and receive a first password set by the user on the password setting page;
  • the sending unit is further configured to send a password input prompt to the second terminal;
  • the receiving unit is further configured to receive a second password sent by the second terminal;
  • the processing unit is configured to compare the first password with the second password, and if the first password matches the second password, send the transfer file to the second terminal.
  • a third aspect of the embodiments of the present invention provides a terminal, where the terminal includes: a processor, a memory, and a transceiver; the processor is connected to the memory and the transceiver, and the transceiver is configured to send and receive with an external device. Data; the memory for storing program code, the processor for calling program code stored in the memory to perform the method provided by the first aspect.
  • an embodiment of the present invention provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform the implementation of the present invention.
  • an embodiment of the present invention provides a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to execute Some or all of the steps described in the first aspect of the invention.
  • the computer program product can be a software installation package.
  • FIG. 1 is a flow chart of a method for implementing terminal relocation according to a preferred embodiment of the present invention.
  • FIG. 2 is a flow chart of a method for implementing terminal relocation according to another preferred embodiment of the present invention.
  • FIG. 3 is a structural diagram of an apparatus for implementing terminal relocation according to a next preferred embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of hardware of a terminal provided by the present invention.
  • Computer device also referred to as “computer” in the context, is meant an intelligent electronic device that can perform predetermined processing, such as numerical calculations and/or logical calculations, by running a predetermined program or instruction, which can include a processor and The memory is executed by the processor to execute a predetermined process pre-stored in the memory to execute a predetermined process, or is executed by hardware such as an ASIC, an FPGA, a DSP, or the like, or a combination of the two.
  • Computer devices include, but are not limited to, servers, personal computers, notebook computers, tablets, smart phones, and the like.
  • the method further includes:
  • the first terminal does not send the transfer file to the second terminal.
  • the first password is a mathematical calculation formula, and the first password and the second password are matched as follows:
  • the method further includes:
  • the first terminal prompts the user to input the third password before sending the important transfer file, and sends a password input prompt to the second terminal, and receives the fourth password returned by the second terminal, such as determining the fourth password. Matching the third password, transmitting the important transfer file.
  • the first terminal sends a password input prompt to the second terminal, including:
  • the first terminal periodically sends a password input prompt to the second terminal.
  • the communication request sent by the first terminal to the second terminal includes:
  • the indication of the data transfer is carried in an extension field of the communication request.
  • the communication request carries a special field of a set length indicating an indication of the data transfer.
  • the sending a password input prompt to the second terminal includes:
  • the password input prompt is sent to the second terminal by a short message or a page mode.
  • the processing unit is further configured to: if the first password does not match the second password, the first terminal does not send the transfer file to the second terminal.
  • the first password is a mathematical calculation formula
  • the processing unit is specifically configured to determine a match, such as the second, if the second password is consistent with the result of the mathematical calculation formula. If the password does not match the result of the mathematical formula, then a mismatch is determined.
  • the processing unit is further configured to determine the importance of the transfer file, prompt the user to input the third password, and send the password input prompt to the second terminal before transmitting the important transfer file. Receiving a fourth password returned by the second terminal, and if the fourth password is determined to match the third password, transmitting the important transfer file.
  • the sending unit is configured to periodically send a password input prompt to the second terminal.
  • the sending unit is specifically configured to send the communication request by using wifi or Bluetooth.
  • the sending unit is configured to: send the indication of the data transfer in an extension field of the communication request to the second terminal.
  • the sending unit is specifically configured to indicate, in the communication request, a special field of a set length to indicate the data transfer.
  • FIG. 1 is a schematic diagram of a method for implementing terminal relocation according to a preferred embodiment of the present invention. The method is completed by a terminal. The method is as shown in FIG.
  • Step S101 The communication request sent by the first terminal to the second terminal, where the communication request includes: an indication of moving the home;
  • the communication request sent by the first terminal to the second terminal in the foregoing step S101 may be a plurality of communication requests.
  • the communication request sent by the first terminal to the second terminal may be For a communication request sent by the first terminal through Wireless Fidelity (WIFI), the structure and definition of the communication request can be referred to the specific definition in IEEE802.1, and details are not described herein again.
  • the communication request sent by the first terminal to the second terminal may be a communication request sent by the first terminal by using a Bluetooth, and of course, in an actual application, the communication may be sent by using another communication manner.
  • the communication request is, for example, a communication request sent by the first terminal through Long Term Evolution (LTE), and of course, the first terminal is sent by Code Division Multiple Access (CDMA). Communication request.
  • LTE Long Term Evolution
  • CDMA Code Division Multiple Access
  • the specific embodiments of the present invention are not limited to the specific manifestation of the communication request, nor to the specific standard protocol for compliance with the communication request.
  • the value of the above-mentioned moving instruction may specifically be: moving or not moving, and it may be represented by one bit in the extension field in the communication request, for example, setting 1 to move, setting 0 to not moving, of course, in practical application.
  • the above setting may be reversed.
  • setting 0 to move and setting 1 to not move and the specific embodiment of the present invention does not limit the specific meaning of the value indicated above.
  • other methods can also be used as an indication of moving, for example, carrying a special field of a set length, for example, 10 1, 10 0, 11 1 or 12 0, etc., only need the first The terminal and the second terminal can recognize each other.
  • Step S102 The first terminal receives the second terminal to send a communication response.
  • the communication response sent by the second terminal received by the first terminal in the foregoing step S102 may be multiple communication responses.
  • the second terminal receives the communication sent by the second terminal.
  • the response may be a communication response sent by the second terminal through Wireless Fidelity (WIFI).
  • WIFI Wireless Fidelity
  • the structure and definition of the communication response may be referred to the specific definition in IEEE802.1, and details are not described herein.
  • the communication response sent by the second terminal received by the first terminal may be a communication response sent by the second terminal by using Bluetooth.
  • Bluetooth Bluetooth
  • the method sends the communication response, for example, the communication response sent by the first terminal through Long Term Evolution (LTE), and of course, the second terminal passes the code division multiple access (CDMA: Code Division Multiple Access, CDMA). )
  • LTE Long Term Evolution
  • CDMA Code Division Multiple Access
  • the invention is concrete The manner of implementation is not limited to the specific manifestation of the communication request, nor to the specific standard protocol for compliance with the communication request.
  • Step S103 The first terminal receives the first password set by the user on the password setting page, and the first terminal sends a password input prompt to the second terminal.
  • the password input prompt in the above steps may be specifically: a specific message, such as a short message, of course, in an actual application, it may also be an actual page, and of course, may also be a prompt of other manners, and the specific embodiment of the present invention is not Limit the specific manifestations of the above tips.
  • Step S104 The first terminal receives the second password sent by the second terminal, and the first terminal compares the first password with the second password. If the first password matches the second password, the moving file is sent to the second terminal.
  • the foregoing method may further include:
  • the sending of the moving file to the second terminal is stopped.
  • the first terminal displays the password input page to the user to obtain the first password input by the user, and then sends a password input prompt to the second terminal, and receives the second password returned by the second terminal,
  • the first password is compared with the second password to determine whether to move the mobile phone of the user, because for the mobile phone to move, the old and new mobile phones are generally the same user, then the same user randomly inputs a password, and the password is not transmitted through the network. Therefore, its security is very high, so it has the advantage of improving network security.
  • FIG. 2 is a schematic diagram of a method for implementing terminal relocation according to another preferred embodiment of the present invention.
  • the method is implemented by a terminal.
  • the method is as shown in FIG. 2, and includes the following steps:
  • Step S201 The communication request sent by the first terminal to the second terminal, where the communication request includes: an indication of moving;
  • the communication request sent by the first terminal to the second terminal in the foregoing step S201 may be a plurality of communication requests.
  • the communication request sent by the first terminal to the second terminal may be For a communication request sent by the first terminal through Wireless Fidelity (WIFI), the structure and definition of the communication request can be referred to the specific definition in IEEE802.1, and details are not described herein again.
  • the communication request sent by the first terminal to the second terminal may be a communication request sent by the first terminal by using a Bluetooth, and of course, in an actual application, the communication may be sent by using another communication manner.
  • Communication request for example, the first terminal is transmitted through Long Term Evolution (LTE)
  • LTE Long Term Evolution
  • CDMA Code Division Multiple Access
  • the specific embodiments of the present invention are not limited to the specific manifestation of the communication request, nor to the specific standard protocol for compliance with the communication request.
  • the value of the above-mentioned moving instruction may specifically be: moving or not moving, and it may be represented by one bit in the extension field in the communication request, for example, setting 1 to move, setting 0 to not moving, of course, in practical application.
  • the above setting may be reversed.
  • setting 0 to move and setting 1 to not move and the specific embodiment of the present invention does not limit the specific meaning of the value indicated above.
  • other methods can also be used as an indication of moving, for example, carrying a special field of a set length, for example, 10 1, 10 0, 11 1 or 12 0, etc., only need the first The terminal and the second terminal can recognize each other.
  • Step S202 The first terminal receives the second terminal to send a communication response.
  • the communication response sent by the second terminal received by the first terminal in the foregoing step S202 may be multiple communication responses.
  • the second terminal receives the communication sent by the second terminal.
  • the response may be a communication response sent by the second terminal through Wireless Fidelity (WIFI).
  • WIFI Wireless Fidelity
  • the structure and definition of the communication response may be referred to the specific definition in IEEE802.1, and details are not described herein.
  • the communication response sent by the second terminal received by the first terminal may be a communication response sent by the second terminal by using Bluetooth.
  • Bluetooth Bluetooth
  • the method sends the communication response, for example, the communication response sent by the first terminal through Long Term Evolution (LTE), and of course, the second terminal passes the code division multiple access (CDMA: Code Division Multiple Access, CDMA). )
  • LTE Long Term Evolution
  • CDMA Code Division Multiple Access
  • the specific embodiments of the present invention are not limited to the specific manifestation of the communication request, nor to the specific standard protocol for compliance with the communication request.
  • Step S203 The first terminal receives the first password set by the user on the password setting page, and the first terminal sends a password input prompt to the second terminal;
  • the first password may be: a mathematical calculation formula (for example, 1+1, 1+4) And so on), such as addition calculation, multiplication calculation, and so on.
  • the password input prompt in the above steps may be specifically: a specific message, such as a short message, of course, in an actual application, it may also be an actual page, and of course, may also be a prompt of other manners, and the specific embodiment of the present invention is not Limit the specific manifestations of the above tips.
  • Step S204 The first terminal receives the second password sent by the second terminal, and the first terminal compares the first password with the second password, and if the second password is the result of the first password, determining that the first password matches the second password And sending the moving file to the second terminal.
  • the foregoing method may further include:
  • the sending of the moving file to the second terminal is stopped.
  • the foregoing method may further include:
  • the first terminal prompts the user to input a third password before sending the important moving file, and sends a password input prompt to the second terminal, and receives the fourth password returned by the second terminal, such as determining the fourth password. Match the third password to transfer the important moving file.
  • the foregoing method may further include:
  • the first terminal periodically sends a password input prompt to the second terminal.
  • the above cycle users can set them by themselves, or they can be set by the manufacturer.
  • the first terminal displays the password input page to the user to obtain the first password input by the user, and then sends a password input prompt to the second terminal, and receives the second password returned by the second terminal,
  • the first password is compared with the second password to determine whether to move the mobile phone of the user, because for the mobile phone to move, the old and new mobile phones are generally the same user, then the same user randomly inputs a password, and the password is not transmitted through the network. Therefore, its security is very high, so it has the advantage of improving network security.
  • FIG. 3 is a device for implementing terminal relocation.
  • the device is disposed in a first terminal, and the device includes:
  • the sending unit 301 is configured to send a communication request to the second terminal, where the communication request includes: an indication of moving;
  • the receiving unit 302 is configured to receive, by the second terminal, a communication response, and receive a first password set by the user on the password setting page;
  • the sending unit 301 is further configured to send a password input prompt to the second terminal;
  • the receiving unit 302 is further configured to receive a second password sent by the second terminal.
  • the processing unit 303 is configured to compare the first password with the second password, and if the first password matches the second password, send the moving file to the second terminal.
  • the processing unit is further configured to: if the first password does not match the second password, the first The terminal does not send the moving file to the second terminal.
  • the first password is a mathematical calculation formula
  • the processing unit is specifically configured to determine a match, such as a second password and the mathematical calculation formula, if the second password is consistent with the result of the mathematical calculation formula.
  • the results are inconsistent and it is determined that there is no match.
  • the processing unit is further configured to determine the importance of the moving file, prompt the user to input the third password, and send a password input prompt to the second terminal before receiving the important moving file, and receive the return of the second terminal.
  • the fourth password if it is determined that the fourth password matches the third password, transmits the important moving file.
  • the sending unit is configured to periodically send a password input prompt to the second terminal.
  • the present invention also provides a terminal including the above-described terminal moving security implementation device 300.
  • each block of the flowchart or block diagram can represent a module, a program segment, or a portion of code that includes one or more of the Executable instructions.
  • the functions noted in the blocks may also occur in a different order than that illustrated in the drawings. For example, two consecutive blocks may be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented in a dedicated hardware-based system that performs the specified function or function. Or it can be implemented by a combination of dedicated hardware and computer instructions.
  • an embodiment of the present invention further provides a terminal 400, including but not limited to: a smart phone, a smart watch, a tablet computer, a personal computer, a notebook computer, or a computer group, as shown in FIG. 4, the terminal 400 includes a processor 401, a memory 402, a transceiver 403, and a bus 404.
  • the transceiver 403 is configured to transmit and receive data with and from an external device.
  • the number of processors 401 in device 400 may be one or more.
  • processor 401, memory 402, and transceiver 403 may be connected by a bus system or other means.
  • Apparatus 400 can be used to perform the method illustrated in FIG. For the meaning and examples of the terms involved in the embodiment, reference may be made to the corresponding description of FIG. 1. I will not repeat them here.
  • the program code is stored in the memory 402.
  • the processor 401 is configured to call program code stored in the memory 402 for performing the steps as shown in FIG.
  • the processor 401 herein may be a processing component or a collective name of multiple processing components.
  • the processing component may be a central processing unit (CPU), an application specific integrated circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application.
  • DSPs digital signal processors
  • FPGAs Field Programmable Gate Arrays
  • the memory 403 may be a storage device or a collective name of a plurality of storage elements, and is used to store executable program code or parameters, data, and the like required for the application running device to operate. And the memory 403 may include random access memory (RAM), and may also include non-volatile memory such as a magnetic disk memory, a flash memory, or the like.
  • RAM random access memory
  • the bus 404 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component (PCI) bus, or an Extended Industry Standard Architecture (EISA) bus.
  • ISA Industry Standard Architecture
  • PCI Peripheral Component
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 4, but it does not mean that there is only one bus or one type of bus.
  • the user equipment may also include input and output devices coupled to bus 404 for connection to other portions, such as processor 401, via a bus.
  • the input/output device can provide an input interface for the operator, so that the operator can select the control item through the input interface, and can also be other interfaces through which other devices can be externally connected.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some communication interface, device or unit, and may be electrical, mechanical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present invention which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种数据转移方法及相关产品,所述方法包括如下步骤:第一终端向第二终端发送通信请求,该通信请求中包括:数据转移的指示;第一终端接收第二终端发送的通信响应;第一终端接收用户在密码设置页面设置的第一密码,第一终端向第二终端发送密码输入提示;第一终端接收第二终端发送的第二密码,第一终端比对第一密码与第二密码,如第一密码与第二密码匹配,则向第二终端发送转移文件。所述方法具有用户体验度好的优点。

Description

一种数据转移方法及相关产品 技术领域
本发明涉及通信技术领域,具体涉及一种数据转移方法及相关产品。
背景技术
通信领域的终端,例如手机、平板电脑等设备是属于用户常用的设备,由于目前该设备均具有自身的操作系统,所以也将终端称为智能终端或智能手机,智能手机(用于:Smartphone)是对于那些运算能力及功能比传统功能手机更强的手机的集合性称谓。智能手机使用最多的操作系统有:Windows Phone、Android、IOS和BlackBerry OS,但他们之间的应用软件互不兼容。智能手机因为可以像个人电脑一样安装第三方软件,所以它们功能丰富,而且可以不断扩充。
发明内容
本发明实施例提供了一种数据转移方法及装置,可以提升用户的体验度。
本发明实施例第一方面提供了一种数据转移方法,所述方法包括如下步骤:
第一终端向第二终端发送的通信请求,该通信请求中包括:数据转移的指示;
第一终端接收第二终端发送通信响应;
第一终端接收用户在密码设置页面设置的第一密码,第一终端向第二终端发送密码输入提示;
第一终端接收第二终端发送的第二密码,第一终端比对所述第一密码与所述第二密码,如所述第一密码与所述第二密码匹配,则向第二终端发送转移文件。
本发明实施例第二方面提供了一种数据转移装置,所述装置设置于第一终端内,所述装置包括:
发送单元,用于向第二终端发送的通信请求,该通信请求中包括:数据转移的指示;
接收单元,用于接收第二终端发送通信响应;接收用户在密码设置页面设置的第一密码;
所述发送单元,还用于向第二终端发送密码输入提示;
所述接收单元,还用于接收第二终端发送的第二密码;
处理单元,用于比对第一密码与第二密码,如第一密码与第二密码匹配,则向第二终端发送转移文件。
本发明实施例第三方面提供了一种终端,所述终端包括:处理器、存储器、收发器;所述处理器与所述存储器、收发器连接,所述收发器用于与外部设备之间收发数据;所述存储器,用于存储程序代码,所述处理器用于调用所述存储器中存储的程序代码执行第一方面提供的方法。
第四方面,本发明实施例提供了一种计算机可读存储介质,其中,所述计算机可读存储介质存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如本发明实施例第一方面中所描述的部分或全部步骤。
第五方面,本发明实施例提供了一种计算机程序产品,其中,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如本发明实施例第一方面中所描述的部分或全部步骤。该计算机程序产品可以为一个软件安装包。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本发明的其它特征、目的和优点将会变得更明显:
图1为根据本发明一个优选实施例提供的终端搬家的实现方法的流程图。
图2为根据本发明另一个优选实施例提供的终端搬家的实现方法的流程图。
图3为根据本发明下一优选实施例提供的终端搬家的实现装置的结构图。
图4为本发明提供的终端的硬件结构示意图。
具体实施方式
在更加详细地讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将各项操作描述成顺序的处理,但是其中的许多操作可以被并行地、并发地或者同时实施。此外,各项操作的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。
在上下文中所称“计算机设备”,也称为“电脑”,是指可以通过运行预定程序或指令来执行数值计算和/或逻辑计算等预定处理过程的智能电子设备,其可以包括处理器与存储器,由处理器执行在存储器中预存的存续指令来执行预定处理过程,或是由ASIC、FPGA、DSP等硬件执行预定处理过程,或是由上述二者组合来实现。计算机设备包括但不限于服务器、个人电脑、笔记本电脑、平板电脑、智能手机等。
后面所讨论的方法(其中一些通过流程图示出)可以通过硬件、软件、固件、中间件、微代码、硬件描述语言或者其任意组合来实施。当用软件、固件、中间件或微代码来实施时,用以实施必要任务的程序代码或代码段可以被存储在机器或计算机可读介质(比如存储介质)中。(一个或多个)处理器可以实施必要的任务。
这里所公开的具体结构和功能细节仅仅是代表性的,并且是用于描述本发明的示例性实施例的目的。但是本发明可以通过许多替换形式来具体实现,并且不应当被解释成仅仅受限于这里所阐述的实施例。
应当理解的是,虽然在这里可能使用了术语“第一”、“第二”等等来描述各个单元,但是这些单元不应当受这些术语限制。使用这些术语仅仅是为了将一个单元与另一个单元进行区分。举例来说,在不背离示例性实施例的范围的情况下,第一单元可以被称为第二单元,并且类似地第二单元可以被称为第一单元。这里所使用的术语“和/或”包括其中一个或更多所列出的相关联项目的任意和所有组合。
这里所使用的术语仅仅是为了描述具体实施例而不意图限制示例性实施例。除非上下文明确地另有所指,否则这里所使用的单数形式“一个”、“一项”还意图包括复数。还应当理解的是,这里所使用的术语“包括”和/或“包含” 规定所陈述的特征、整数、步骤、操作、单元和/或组件的存在,而不排除存在或添加一个或更多其他特征、整数、步骤、操作、单元、组件和/或其组合。
还应当提到的是,在一些替换实现方式中,所提到的功能/动作可以按照不同于附图中标示的顺序发生。举例来说,取决于所涉及的功能/动作,相继示出的两幅图实际上可以基本上同时执行或者有时可以按照相反的顺序来执行。
现有的终端均具有文件存储的功能,该文件例如:照片、文本、视频、通信录等等,随着目前智能手机的款式越来越多,手机更换的频率越来越高,本申请将手机更换后的数据转移俗称“手机搬家”,对于现有的手机搬家来说,如何将旧手机的文件转移到新手机中是一件非常让人头痛的问题,以通讯录为例,现有的方案通过第三方软件来实现,现有的手机在搬家时无法保证连接的安全性,这样可能在手机搬家中导致手机中的资料泄露,用户体验度低。
在第一方面提供的数据转移方法中,所述方法还包括:
如所述第一密码与所述第二密码不匹配,则第一终端不向第二终端发送该转移文件。
在第一方面提供的数据转移方法中,所述第一密码为数学计算式,所述第一密码与第二密码匹配具体为:
如第二密码与所述数学计算式的结果一致,则确定匹配,如第二密码与所述数学计算式的结果不一致,则确定不匹配。
在第一方面提供的数据转移方法中,所述方法还包括:
判断转移文件的重要性,第一终端在发送重要的转移文件之前,提示用户输入第三密码,并向第二终端发送密码输入提示,接收第二终端返回的第四密码,如确定第四密码与第三密码匹配,传输该重要的转移文件。
在第一方面提供的数据转移方法中,所述第一终端向第二终端发送密码输入提示具体,包括:
所述第一终端周期性的向第二终端发送密码输入提示。
在第一方面提供的数据转移方法中,所述第一终端向第二终端发送的通信请求,包括:
第一终端向第二终端通过wifi或蓝牙发送的所述通信请求。
在第一方面提供的数据转移方法中,所述数据转移的指示携带在所述通信请求的扩展字段中。
在第一方面提供的数据转移的实现方法中,所述通信请求携带一个设定长度的特殊字段表示所述数据转移的指示。
在第一方面提供的数据转移的实现方法中,所述向第二终端发送密码输入提示,包括:
通过短消息或页面方式向所述第二终端发送密码输入提示。
在第二方面提供的数据转移装置中,所述处理单元还用于如所述第一密码与第二密码不匹配,则第一终端不向第二终端发送该转移文件。
在第二方面提供的数据转移装置中,所述第一密码为数学计算式,所述处理单元具体,用于如第二密码与所述数学计算式的结果一致,则确定匹配,如第二密码与所述数学计算式的结果不一致,则确定不匹配。
在第二方面提供的数据转移装置中,所述处理单元,还用于判断转移文件的重要性,在发送重要的转移文件之前,提示用户输入第三密码,并向第二终端发送密码输入提示,接收第二终端返回的第四密码,如确定第四密码与第三密码匹配,传输该重要的转移文件。
在第二方面提供的数据转移装置中,所述发送单元具体,用于周期性的向第二终端发送密码输入提示。
在第二方面提供的数据转移装置中,所述发送单元,具体用于通过wifi或蓝牙发送的所述通信请求。
在第二方面提供的数据转移装置中,所述发送单元,具体用于将所述数据转移的指示携带在所述通信请求的扩展字段中向所述第二终端发送。
在第二方面提供的数据转移装置中,所述发送单元,具体用于在所述通信请求携带一个设定长度的特殊字段表示所述数据转移的指示。
下面结合附图对本发明作进一步详细描述。
请参考图1,图1为根据本发明一个优选实施例的提供的终端搬家的实现方法,该方法由终端完成,该方法如图1所示,包括如下步骤:
步骤S101、第一终端向第二终端发送的通信请求,该通信请求中包括:搬家的指示;
上述步骤S101中的第一终端向第二终端发送的通信请求可以是多种通信请求,例如在本发明一个优选实施例的一个具体方案中,上述第一终端向第二终端发送的通信请求可以为,第一终端通过无线保真(英文:Wireless Fidelity,WIFI)发送的一个通信请求,该通信请求的结构以及定义可以参见IEEE802.1中的具体定义,这里不再赘述,当然在发明一个优选实施例的另一个具体方案中,上述第一终端向第二终端发送的通信请求可以为,第一终端通过蓝牙发送的一个通信请求,当然在实际应用中,还可以采用其他的通信方式发送该通信请求,例如,第一终端通过长期演进(英文:Long Term Evolution,LTE)发送的通信请求,当然还可以为,第一终端通过码分多址(英文:Code Division Multiple Access,CDMA)发送的通信请求。本发明具体实施方式并不限于该通信请求的具体表现形式,也不限于该通信请求的遵守的具体的标准协议。
上述搬家的指示的值具体可以为:搬家或不搬家,其可以通过通信请求中扩展字段中个一个bit来体现,例如,设定1为搬家,设定0为不搬家,当然在实际应用中,上述设定也可以反过来,例如设定0为搬家,设定1为不搬家,本发明具体实施方式并不限定上述指示的值的具体含义。当然在实际应用中,还可以通过其他的方式作为搬家的指示,例如携带一个设定长度的特殊字段,例如10个1、10个0、11个1或12个0等方式,只需要第一终端和第二终端互相能够识别即可。
步骤S102、第一终端接收第二终端发送通信响应;
上述步骤S102中的第一终端接收的第二终端发送的通信响应可以是多种通信响应,例如在本发明一个优选实施例的一个具体方案中,上述第一终端接收的第二终端发送的通信响应可以为,第二终端通过无线保真(英文:Wireless Fidelity,WIFI)发送的一个通信响应,该通信响应的结构以及定义可以参见IEEE802.1中的具体定义,这里不再赘述,当然在发明一个优选实施例的另一个具体方案中,上述第一终端接收的第二终端发送的通信响应可以为,第二终端通过蓝牙发送的一个通信响应,当然在实际应用中,还可以采用其他的通信方式发送该通信响应,例如,第一终端通过长期演进(英文:Long Term Evolution,LTE)发送的通信响应,当然还可以为,第二终端通过码分多址(英文:Code Division Multiple Access,CDMA)发送的通信响应。本发明具体实 施方式并不限于该通信请求的具体表现形式,也不限于该通信请求的遵守的具体的标准协议。
步骤S103、第一终端接收用户在密码设置页面设置的第一密码,第一终端向第二终端发送密码输入提示。
上述步骤中的密码输入提示具体可以为:一个具体的消息,例如短消息,当然在实际应用中,也可以为一个实际的页面,当然还可以为其他方式的提示,本发明具体实施方式并不限制上述提示的具体表现形式。
步骤S104、第一终端接收第二终端发送的第二密码,第一终端比对第一密码与第二密码,如第一密码与第二密码匹配,则向第二终端发送该搬家文件。
可选的,上述方法在步骤S104之后还可以包括:
如第一密码与第二密码不匹配,停止向第二终端发送搬家文件。
本发明提供的技术方案在建立通信连接以后,第一终端向用户显示密码输入页面获取用户输入的第一密码,然后向第二终端发送密码输入提示,接收第二终端返回的第二密码,将第一密码与第二密码进行比对以确定是否为该用户手机搬家,因为对于手机搬家来说,其新旧手机一般为同一用户,那么同一用户随机输入的一个密码,该密码也不通过网络传输,所以其安全性是很高的,所以其具有提高网络安全性的优点。
请参考图2,图2为根据本发明另一个优选实施例的提供的终端搬家的实现方法,该方法由终端完成,该方法如图2所示,包括如下步骤:
步骤S201、第一终端向第二终端发送的通信请求,该通信请求中包括:搬家的指示;
上述步骤S201中的第一终端向第二终端发送的通信请求可以是多种通信请求,例如在本发明一个优选实施例的一个具体方案中,上述第一终端向第二终端发送的通信请求可以为,第一终端通过无线保真(英文:Wireless Fidelity,WIFI)发送的一个通信请求,该通信请求的结构以及定义可以参见IEEE802.1中的具体定义,这里不再赘述,当然在发明一个优选实施例的另一个具体方案中,上述第一终端向第二终端发送的通信请求可以为,第一终端通过蓝牙发送的一个通信请求,当然在实际应用中,还可以采用其他的通信方式发送该通信请求,例如,第一终端通过长期演进(英文:Long Term Evolution,LTE)发 送的通信请求,当然还可以为,第一终端通过码分多址(英文:Code Division Multiple Access,CDMA)发送的通信请求。本发明具体实施方式并不限于该通信请求的具体表现形式,也不限于该通信请求的遵守的具体的标准协议。
上述搬家的指示的值具体可以为:搬家或不搬家,其可以通过通信请求中扩展字段中个一个bit来体现,例如,设定1为搬家,设定0为不搬家,当然在实际应用中,上述设定也可以反过来,例如设定0为搬家,设定1为不搬家,本发明具体实施方式并不限定上述指示的值的具体含义。当然在实际应用中,还可以通过其他的方式作为搬家的指示,例如携带一个设定长度的特殊字段,例如10个1、10个0、11个1或12个0等方式,只需要第一终端和第二终端互相能够识别即可。
步骤S202、第一终端接收第二终端发送通信响应;
上述步骤S202中的第一终端接收的第二终端发送的通信响应可以是多种通信响应,例如在本发明一个优选实施例的一个具体方案中,上述第一终端接收的第二终端发送的通信响应可以为,第二终端通过无线保真(英文:Wireless Fidelity,WIFI)发送的一个通信响应,该通信响应的结构以及定义可以参见IEEE802.1中的具体定义,这里不再赘述,当然在发明一个优选实施例的另一个具体方案中,上述第一终端接收的第二终端发送的通信响应可以为,第二终端通过蓝牙发送的一个通信响应,当然在实际应用中,还可以采用其他的通信方式发送该通信响应,例如,第一终端通过长期演进(英文:Long Term Evolution,LTE)发送的通信响应,当然还可以为,第二终端通过码分多址(英文:Code Division Multiple Access,CDMA)发送的通信响应。本发明具体实施方式并不限于该通信请求的具体表现形式,也不限于该通信请求的遵守的具体的标准协议。
步骤S203、第一终端接收用户在密码设置页面设置的第一密码,第一终端向第二终端发送密码输入提示;所述第一密码可以为:数学计算式(例如1+1、1+4等等类似),例如加法计算、乘法计算等等。
上述步骤中的密码输入提示具体可以为:一个具体的消息,例如短消息,当然在实际应用中,也可以为一个实际的页面,当然还可以为其他方式的提示,本发明具体实施方式并不限制上述提示的具体表现形式。
步骤S204、第一终端接收第二终端发送的第二密码,第一终端比对第一密码与第二密码,如第二密码为第一密码的结果,则确定第一密码与第二密码匹配,则向第二终端发送该搬家文件。
可选的,上述方法在步骤S204之后还可以包括:
如第一密码与第二密码不匹配,停止向第二终端发送搬家文件。
可选的,上述方法在步骤S204之后还可以包括:
判断搬家文件的重要性,第一终端在发送重要的搬家文件之前,提示用户输入第三密码,并向第二终端发送密码输入提示,接收第二终端返回的第四密码,如确定第四密码与第三密码匹配,传输该重要的搬家文件。
可选的,上述方法在步骤S204之后还可以包括:
第一终端周期性的向第二终端发送密码输入提示。
上述周期用户可以通过自行设定,当然也可以由厂家设定。
本发明提供的技术方案在建立通信连接以后,第一终端向用户显示密码输入页面获取用户输入的第一密码,然后向第二终端发送密码输入提示,接收第二终端返回的第二密码,将第一密码与第二密码进行比对以确定是否为该用户手机搬家,因为对于手机搬家来说,其新旧手机一般为同一用户,那么同一用户随机输入的一个密码,该密码也不通过网络传输,所以其安全性是很高的,所以其具有提高网络安全性的优点。
参阅图3,图3为一种终端搬家的实现装置300,所述装置设置于第一终端内,所述装置包括:
发送单元301,用于向第二终端发送的通信请求,该通信请求中包括:搬家的指示;
接收单元302,用于接收第二终端发送通信响应;接收用户在密码设置页面设置的第一密码;
发送单元301,还用于向第二终端发送密码输入提示;
接收单元302,还用于接收第二终端发送的第二密码;
处理单元303,用于比对第一密码与第二密码,如第一密码与第二密码匹配,则向第二终端发送该搬家文件。
可选的,所述处理单元还用于如所述第一密码与第二密码不匹配,则第一 终端不向第二终端发送该搬家文件。
可选的,所述第一密码为数学计算式,所述处理单元具体,用于如第二密码与所述数学计算式的结果一致,则确定匹配,如第二密码与所述数学计算式的结果不一致,则确定不匹配。
可选的,所述处理单元,还用于判断搬家文件的重要性,在发送重要的搬家文件之前,提示用户输入第三密码,并向第二终端发送密码输入提示,接收第二终端返回的第四密码,如确定第四密码与第三密码匹配,传输该重要的搬家文件。
可选的,所述发送单元具体,用于周期性的向第二终端发送密码输入提示。
本发明还提供一种终端,该终端包括上述终端搬家连接安全性的实现装置300。
本发明具体施例的细节,而且在不背离本发明的精神或基本特征的情况下,能够以其他的具体形式实现本发明。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本发明内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。系统权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。
附图中的流程图和框图显示了根据本发明的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
参见图4,本发明实施例还提供一种终端400,该终端400包括但不限于:智能手机、智能手表、平板电脑、个人计算机、笔记本电脑或计算机群组,如图4所示,该终端400包括:处理器401、存储器402、收发器403和总线404。收发器403用于与外部设备之间收发数据。设备400中的处理器401的数量可以是一个或多个。本申请的一些实施例中,处理器401、存储器402和收发器403可通过总线系统或其他方式连接。设备400可以用于执行图1所示的方法。关于本实施例涉及的术语的含义以及举例,可以参考图1对应的说明。此处不再赘述。
其中,存储器402中存储程序代码。处理器401用于调用存储器402中存储的程序代码,用于执行如图1所示的步骤。
需要说明的是,这里的处理器401可以是一个处理元件,也可以是多个处理元件的统称。例如,该处理元件可以是中央处理器(Central Processing Unit,CPU),也可以是特定集成电路(Application Specific Integrated Circuit,ASIC),或者是被配置成实施本申请实施例的一个或多个集成电路,例如:一个或多个微处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(Field Programmable Gate Array,FPGA)。
存储器403可以是一个存储装置,也可以是多个存储元件的统称,且用于存储可执行程序代码或应用程序运行装置运行所需要参数、数据等。且存储器403可以包括随机存储器(RAM),也可以包括非易失性存储器(non-volatile memory),例如磁盘存储器,闪存(Flash)等。
总线404可以是工业标准体系结构(Industry Standard Architecture,ISA)总线、外部设备互连(Peripheral Component,PCI)总线或扩展工业标准体系结构(Extended Industry Standard Architecture,EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。为便于表示,图4中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
该用户设备还可以包括输入输出装置,连接于总线404,以通过总线与处理器401等其它部分连接。该输入输出装置可以为操作人员提供一输入界面,以便操作人员通过该输入界面选择布控项,还可以是其它接口,可通过该接口外接其它设备。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,又例如,多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些通信接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者 对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围,其均应涵盖在本发明的权利要求和说明书的范围当中。

Claims (20)

  1. 一种数据转移方法,其特征在于,所述方法包括如下步骤:
    第一终端向第二终端发送的通信请求,该通信请求中包括:数据转移的指示;
    第一终端接收第二终端发送通信响应;
    第一终端接收用户在密码设置页面设置的第一密码,第一终端向第二终端发送密码输入提示;
    第一终端接收第二终端发送的第二密码,第一终端比对第一密码与第二密码,如第一密码与第二密码匹配,则向第二终端发送数据转移文件。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    如所述第一密码与第二密码不匹配,则第一终端不向第二终端发送转移文件。
  3. 根据权利要求1所述的方法,其特征在于,所述第一密码为数学计算式,所述第一密码与第二密码匹配具体为:
    如第二密码与所述数学计算式的结果一致,则确定匹配,如第二密码与所述数学计算式的结果不一致,则确定不匹配。
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    判断转移文件的重要性,第一终端在发送重要的转移文件之前,提示用户输入第三密码,并向第二终端发送密码输入提示,接收第二终端返回的第四密码,如确定第四密码与第三密码匹配,传输该重要的转移文件。
  5. 根据权利要求1所述的方法,其特征在于,所述第一终端向第二终端发送密码输入提示具体,包括:
    所述第一终端周期性的向第二终端发送密码输入提示。
  6. 根据权利要求1所述的方法,其特征在于,所述第一终端向第二终端发送的通信请求,包括:
    第一终端向第二终端通过wifi或蓝牙发送的所述通信请求。
  7. 根据权利要求1所述的方法,其特征在于,所述数据转移的指示携带在所述通信请求的扩展字段中。
  8. 根据权利要求1所述的方法,其特征在于,所述通信请求携带一个设定长度的特殊字段表示所述数据转移的指示。
  9. 根据权利要求4所述的方法,其特征在于,所述向第二终端发送密码输入提示,包括:
    通过短消息或页面方式向所述第二终端发送密码输入提示。
  10. 一种数据转移装置,其特征在于,所述装置设置于第一终端内,所述装置包括:
    发送单元,用于向第二终端发送的通信请求,该通信请求中包括:数据转移的指示;
    接收单元,用于接收第二终端发送通信响应;接收用户在密码设置页面设置的第一密码;
    所述发送单元,还用于向第二终端发送密码输入提示;
    所述接收单元,还用于接收第二终端发送的第二密码;
    处理单元,用于比对第一密码与第二密码,如第一密码与第二密码匹配,则向第二终端发送转移文件。
  11. 根据权利要求10所述的装置,其特征在于,所述处理单元还用于如所述第一密码与第二密码不匹配,则第一终端不向第二终端发送该转移文件。
  12. 根据权利要求10所述的装置,其特征在于,所述第一密码为数学计算式,所述处理单元具体,用于如第二密码与所述数学计算式的结果一致,则确定匹配,如第二密码与所述数学计算式的结果不一致,则确定不匹配。
  13. 根据权利要求10所述的装置,其特征在于,
    所述处理单元,还用于判断转移文件的重要性,在发送重要的转移文件之前,提示用户输入第三密码,并向第二终端发送密码输入提示,接收第二终端返回的第四密码,如确定第四密码与第三密码匹配,传输该重要的转移文件。
  14. 根据权利要求10所述的装置,其特征在于,所述发送单元具体,用于周期性的向第二终端发送密码输入提示。
  15. 根据权利要求10所述的装置,其特征在于,
    所述发送单元,具体用于通过wifi或蓝牙发送的所述通信请求。
  16. 根据权利要求10所述的装置,其特征在于,
    所述发送单元,具体用于将所述数据转移的指示携带在所述通信请求的扩展字段中向所述第二终端发送。
  17. 根据权利要求10所述的装置,其特征在于,
    所述发送单元,具体用于在所述通信请求携带一个设定长度的特殊字段表示所述数据转移的指示。
  18. 一种终端,其特征在于,所述终端包括:处理器、存储器、收发器;所述处理器与所述存储器、收发器连接,所述收发器用于与外部设备之间收发数据;所述存储器,用于存储程序代码,所述处理器用于调用所述存储器中存储的程序代码执行如权利要求1-9任一项所述的方法。
  19. 一种计算机存储介质,其特征在于,其用于存储计算机程序,其中,所述计算机程序使得计算机执行如权利要求1-9任一项所述的方法。
  20. 一种计算机程序产品,其特征在于,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如权利要求1-9任一项所述的方法。
PCT/CN2017/099191 2016-09-14 2017-08-26 一种数据转移方法及相关产品 WO2018049975A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610826598.9 2016-09-14
CN201610826598.9A CN106446110B (zh) 2016-09-14 2016-09-14 一种终端搬家连接安全性的实现方法及装置

Publications (1)

Publication Number Publication Date
WO2018049975A1 true WO2018049975A1 (zh) 2018-03-22

Family

ID=58168032

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/099191 WO2018049975A1 (zh) 2016-09-14 2017-08-26 一种数据转移方法及相关产品

Country Status (2)

Country Link
CN (1) CN106446110B (zh)
WO (1) WO2018049975A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113408989A (zh) * 2021-06-29 2021-09-17 奇瑞汽车股份有限公司 汽车数据的比对方法、装置及计算机存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446110B (zh) * 2016-09-14 2020-07-28 Oppo广东移动通信有限公司 一种终端搬家连接安全性的实现方法及装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015081875A1 (zh) * 2013-12-04 2015-06-11 北京奇虎科技有限公司 一种终端设备之间分享文件的方法及装置
CN105491113A (zh) * 2015-11-25 2016-04-13 小米科技有限责任公司 迁移方法、装置及终端
CN105656991A (zh) * 2015-12-21 2016-06-08 北京金山安全软件有限公司 文件分享方法及装置
CN106446110A (zh) * 2016-09-14 2017-02-22 广东欧珀移动通信有限公司 一种终端搬家连接安全性的实现方法及装置
CN106503511A (zh) * 2016-09-14 2017-03-15 广东欧珀移动通信有限公司 一种提高手机搬家密码校验安全性的方法及装置
CN106507268A (zh) * 2016-09-14 2017-03-15 广东欧珀移动通信有限公司 一种手机搬家中动态验证的方法及装置

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100612696B1 (ko) * 2004-06-25 2006-08-16 에스케이 텔레콤주식회사 블루투스망에서 이동통신단말을 페어링하기 위한 방법 및이를 위한 이동통신단말
CN101626256A (zh) * 2008-07-07 2010-01-13 英华达(南京)科技有限公司 建立蓝牙无线传输的方法
CN102255639A (zh) * 2010-05-21 2011-11-23 希姆通信息技术(上海)有限公司 通过蓝牙手机间操作文件传输的方法
CN103414790A (zh) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 基于nfc的文件传输系统
CN103957037B (zh) * 2014-04-09 2016-01-13 北京工业大学 基于蓝牙PC端与Android手机端自动通信的方法
CN105682094B (zh) * 2015-12-30 2019-01-04 天维尔信息科技股份有限公司 通信指挥调度方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015081875A1 (zh) * 2013-12-04 2015-06-11 北京奇虎科技有限公司 一种终端设备之间分享文件的方法及装置
CN105491113A (zh) * 2015-11-25 2016-04-13 小米科技有限责任公司 迁移方法、装置及终端
CN105656991A (zh) * 2015-12-21 2016-06-08 北京金山安全软件有限公司 文件分享方法及装置
CN106446110A (zh) * 2016-09-14 2017-02-22 广东欧珀移动通信有限公司 一种终端搬家连接安全性的实现方法及装置
CN106503511A (zh) * 2016-09-14 2017-03-15 广东欧珀移动通信有限公司 一种提高手机搬家密码校验安全性的方法及装置
CN106507268A (zh) * 2016-09-14 2017-03-15 广东欧珀移动通信有限公司 一种手机搬家中动态验证的方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113408989A (zh) * 2021-06-29 2021-09-17 奇瑞汽车股份有限公司 汽车数据的比对方法、装置及计算机存储介质
CN113408989B (zh) * 2021-06-29 2024-04-02 奇瑞汽车股份有限公司 汽车数据的比对方法、装置及计算机存储介质

Also Published As

Publication number Publication date
CN106446110A (zh) 2017-02-22
CN106446110B (zh) 2020-07-28

Similar Documents

Publication Publication Date Title
US10972965B2 (en) Method and apparatus for wireless fidelity fast connection
US20160210632A1 (en) Secured payment method and relevant device and system
WO2018103405A1 (zh) 识别接入点和热点的方法及相关产品
WO2018049892A1 (zh) 数据传输方法、装置及终端
US11432142B2 (en) Multi-device wireless connection method and device
WO2018103466A1 (zh) 无线保真国家码的应用方法、装置、智能终端及存储介质
WO2018049975A1 (zh) 一种数据转移方法及相关产品
CN111526192B (zh) 终端的远程控制方法、装置、终端和计算机可读存储介质
WO2019034074A1 (zh) 随机接入方法、终端和基站
WO2018103403A1 (zh) 无线保真Wi-Fi扫描方法及相关产品
CN106507268B (zh) 一种手机搬家中动态验证的方法及装置
CN111124874B (zh) 调试网页的方法、调试服务器以及主控设备
WO2018049964A1 (zh) 数据转移方法及相关产品
US8412159B2 (en) Method, apparatus and computer program product for security configuration coordination during a cell update procedure
WO2017185693A1 (zh) 电子设备以及从直连的另一电子设备中复制数据的方法
CN106503511B (zh) 一种提高手机搬家密码校验安全性的方法及装置
WO2018103446A1 (zh) 一种无线保真的快速连接方法及装置
US9485670B2 (en) Method, apparatus and computer program product for security configuration coordination during a cell update procedure
EP2506614B1 (en) Method, apparatus and computer program product for security configuration coordination during a cell update procedure
EP2976899B1 (en) Method and apparatus for providing an interface between a uicc and a processor in an access terminal that supports asynchronous command processing by the uicc
CN106231544B (zh) 一种终端搬家中传输路径存储选择的方法及装置
WO2018072463A1 (zh) 一种信息共享方法、装置及存储介质
US10425532B2 (en) Method and apparatus for storing phone number, and method and apparatus for dialing phone number
CN114553857A (zh) 数据传输的方法、装置、腕戴设备及介质
US9277046B2 (en) Perform an action based on dialed digits

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17850177

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17850177

Country of ref document: EP

Kind code of ref document: A1