WO2018076844A1 - 数据备份的方法、装置、存储介质及电子设备 - Google Patents

数据备份的方法、装置、存储介质及电子设备 Download PDF

Info

Publication number
WO2018076844A1
WO2018076844A1 PCT/CN2017/094979 CN2017094979W WO2018076844A1 WO 2018076844 A1 WO2018076844 A1 WO 2018076844A1 CN 2017094979 W CN2017094979 W CN 2017094979W WO 2018076844 A1 WO2018076844 A1 WO 2018076844A1
Authority
WO
WIPO (PCT)
Prior art keywords
account
user
server
data
identification card
Prior art date
Application number
PCT/CN2017/094979
Other languages
English (en)
French (fr)
Inventor
周璇
Original Assignee
广东欧珀移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东欧珀移动通信有限公司 filed Critical 广东欧珀移动通信有限公司
Priority to EP17863630.4A priority Critical patent/EP3509270B1/en
Priority to US16/318,252 priority patent/US10542422B2/en
Publication of WO2018076844A1 publication Critical patent/WO2018076844A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/30Network data restoration; Network data reliability; Network data fault tolerance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Definitions

  • the present invention belongs to the field of communications technologies, and in particular, to a data backup method, device, storage medium, and electronic device.
  • the terminal can upload the data generated during the use to the cloud, and download the data stored in the cloud to the terminal device when needed.
  • Embodiments of the present invention provide a data backup method, device, storage medium, and electronic device, which can improve user data security.
  • An embodiment of the present invention provides a data backup method, including:
  • the registration is obtained with the second user identification card.
  • Associated second account If it is determined that the user identification card of the terminal is changed from the first user identification card associated with the first account to the second user identification card according to the user identification card information, the registration is obtained with the second user identification card. Associated second account;
  • the embodiment of the invention further provides an apparatus for data backup, comprising:
  • An obtaining unit configured to acquire user identification card information of the terminal when the first account is logged in;
  • a registration unit configured to determine, according to the user identification card information, that the user identification card of the terminal is changed from the first user identification card associated with the first account to the second user identification card, a second account associated with the two user identification cards;
  • An execution unit configured to execute a preset data backup process, so that data corresponding to the first account is backed up to the second account;
  • the first sending unit is configured to send a delete command to the server corresponding to the first account, where the delete command is used to instruct the server to delete data corresponding to the first account.
  • the embodiment of the present invention provides a storage medium on which a computer program is stored.
  • the computer program is executed on a computer, the computer is caused to perform a data backup method according to an embodiment of the present invention.
  • An embodiment of the present invention provides an electronic device, including a memory, and a processor, by using a computer program stored in the memory, to perform the following steps:
  • the registration is obtained and the second user identification is performed.
  • the second account associated with the card
  • Embodiments of the present invention provide a data backup method, device, storage medium, and electronic device, which can improve user data security.
  • FIG. 1 is a schematic flowchart diagram of a method for backing up data according to an embodiment of the present invention.
  • FIG. 2 is another schematic flowchart of a method for backing up data according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a scenario according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of an apparatus for data backup according to an embodiment of the present invention.
  • FIG. 5 is another schematic structural diagram of an apparatus for data backup according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
  • FIG. 7 is another schematic structural diagram of an electronic device according to an embodiment of the present invention.
  • the cloud storage service account registered by the terminal is often associated with the user identification card (Subscriber) Identification Module, referred to as SIM card, performs association binding.
  • SIM card Subscriber
  • the data stored by the user under the cloud storage service account may be known by other people, causing the user's data to leak, that is, the user data is not secure.
  • An embodiment of the present invention provides a data backup method, including:
  • the registration is obtained with the second user identification card.
  • Associated second account If it is determined that the user identification card of the terminal is changed from the first user identification card associated with the first account to the second user identification card according to the user identification card information, the registration is obtained with the second user identification card. Associated second account;
  • the method may further include the following steps: sending a logout command to the server corresponding to the first account, where the logoff instruction is used to instruct the server to log off First account.
  • the registering the second account associated with the second user identity card may include the following steps: acquiring first verification information corresponding to the first account, and corresponding to the second user identity card. Second verification information. If it is determined that the first verification information matches the second verification information, registering with the second account associated with the second user identification card.
  • the obtaining the first verification information corresponding to the first account and the second verification information corresponding to the second user identity card may include the following steps: acquiring the first user fingerprint information corresponding to the first account And the second user fingerprint information corresponding to the second user identification card.
  • registering the second account associated with the second user identity card may include the following steps: if the first If the user fingerprint information matches the second user fingerprint information, the second account associated with the second user identity card is registered.
  • the performing the preset data backup process to back up the data corresponding to the first account to the second account may include the following steps: performing a preset data backup process, and following the preset data backup process, Sending a backup command to the server corresponding to the first account, the backup instruction is used to instruct the server to back up data corresponding to the first account to the second account.
  • the performing the preset data backup process to back up the data corresponding to the first account to the second account may include the following steps: sending, according to the preset data backup process, the server to indicate the The server transmits the data corresponding to the first account to the terminal's instruction. Receiving data corresponding to the first account from the server. After the data update is detected, the updated data is uploaded to the storage space corresponding to the second account in the server, where the updated data includes data corresponding to the first account.
  • the obtaining the first verification information corresponding to the first account and the second verification information corresponding to the second user identity card may include the following steps: acquiring a verification password corresponding to the first account, and The verification password corresponding to the two user identification cards.
  • registering the second account associated with the second user identity card may include the following steps: if the first If the verification password corresponding to the account matches the verification password corresponding to the second user identification card, the second account associated with the second user identification card is registered.
  • FIG. 1 is a schematic flowchart of a method for backing up data according to an embodiment of the present invention.
  • the process may include:
  • step S101 when the first account is logged in, the user identification card information of the terminal is acquired.
  • the execution body of the embodiment of the present invention may be a terminal device such as a smart phone or a tablet computer.
  • SIM card Subscriber Identification Module
  • the terminal when the terminal detects that the first account is logged in on the terminal, the terminal may trigger the terminal to obtain the information of the user identity card used by the terminal. Then, according to the obtained user identification card information, the terminal can determine whether the user identification card used by the terminal is changed from the first user identification card corresponding to the first account to another user identification card, that is, the user used by the terminal is determined. Whether the identification card is changed from the first user identification card to the second user identification card.
  • the terminal may acquire information of the first user identity card associated with the first account in advance. Then, when the first account is logged in on the terminal, the terminal acquires the information of the user identity card currently used by the terminal, and compares the information of the currently used user identity card with the information of the first user identity card. If the comparison result shows that the two information are consistent, it indicates that the terminal currently uses the first user identification card, that is, the user identification card used by the terminal has not changed. If the comparison result shows that the two information are inconsistent, it indicates that the user identification card currently used by the terminal is a user identification card other than the first user identification card, that is, the user identification card used by the terminal is changed.
  • the terminal may continue to perform its current operation. If the terminal determines that the user identity card used by the terminal is changed from the first user identity card to the second user identity card, then the process proceeds to step S102.
  • step S102 if it is determined that the user identification card of the terminal is changed from the first user identification card associated with the first account to the second user identification card according to the user identification card information, the registration is obtained and the second The second account associated with the user identification card.
  • the terminal determines, according to the user identity card information that is obtained by the terminal, that the user identity card used by the terminal is changed from the first user identity card associated with the first account to the second user identity card, the terminal may The second user identification card is registered to obtain an account associated with the second user identification card, that is, the second account.
  • step S103 a preset data backup process is performed to back up data corresponding to the first account to the second account.
  • the terminal may be triggered to execute and execute a preset data backup process, so that the data corresponding to the first account can be backed up to the second account.
  • the terminal may send an instruction to the server storing the data corresponding to the first account according to the preset data backup process, where the instruction is used to indicate that the server is to be stored in the storage corresponding to the first account.
  • the data of the space is copied to the storage space corresponding to the second account.
  • the delete command is sent to the server corresponding to the first account, and the delete command is used to instruct the server to delete the data corresponding to the first account.
  • the terminal may send a delete command to the server corresponding to the first account, where the delete command is used to indicate that the server is to be saved in the storage space corresponding to the first account.
  • the data in the deletion is used to indicate that the server is to be saved in the storage space corresponding to the first account.
  • the first association associated with the first account can be effectively avoided.
  • the user data caused by the user identity card being used by other users is not secure, and the user data is not lost.
  • FIG. 2 is another schematic flowchart of a data backup method according to an embodiment of the present disclosure, where the process may include:
  • step S201 when the first account is logged in, the terminal acquires the user identification card information.
  • the terminal can be a mobile phone.
  • the mobile phone may be triggered to obtain information of the user identification card used by the mobile phone. Then, the mobile phone can determine whether the user identification card used by the mobile phone changes according to the obtained user identification card information, that is, determine whether the user identification card used by the mobile phone is identified by the first user associated with the first account. The card is changed to another user identification card, such as a second user identification card.
  • the mobile phone when the mobile phone associates the registered first account with the first user identity card used by the mobile phone, the mobile phone may be triggered to obtain the information of the first user identity card, and the first user is The identity card information is saved in a preset file.
  • the mobile phone may be triggered to obtain the user identification card information currently used by the mobile phone, and the currently used user identification card information and the first user identity stored in the preset file are identified. The card information is compared to determine whether the user identity card currently used by the mobile phone is the first user identity card.
  • the phone can continue to perform its related operations.
  • the comparison result between the currently used user identity card information and the information of the first user identity card indicates that the two are inconsistent, it indicates that the user identity card currently used by the mobile phone is not the first user identity associated with the first account.
  • the identification card that is, the user identification card used by the mobile phone is changed, and the process proceeds to step S202.
  • step S202 if it is determined that the user identification card of the terminal is changed from the first user identification card associated with the first account to the second user identification card according to the user identification card information, the terminal acquires the first account. Corresponding first verification information, and second verification information corresponding to the second user identification card.
  • step S203 if it is determined that the first verification information matches the second verification information, the terminal registers to obtain a second account associated with the second user identity card.
  • steps S202 and S203 may include:
  • the mobile phone determines that the user identity card currently used by the mobile phone has been changed to the second user identity card by the first user identity card associated with the first account, and then the mobile phone can be triggered to obtain the first account corresponding to the first account.
  • the verification information and the second verification information corresponding to the second user identification card are information for verifying the identity of the user.
  • the mobile phone may determine whether the first verification information and the second verification information match. If the mobile phone determines that the first verification information and the second verification information do not match, the mobile phone may log in to the first account as an illegal login. In this case, the mobile phone may continue to verify the identity of the user in another manner, or cancel the login of the first account on the mobile phone, etc., and is not specifically limited herein.
  • the mobile phone determines that the first verification information and the second verification information match, the user who is considered to be the first account can replace the user identification card with the mobile phone.
  • the mobile phone can newly register a second account associated with the second user identity card currently used by the mobile phone according to the changed user identity card, such as the second user identity card.
  • the step of obtaining, by the terminal in the step S202, the first verification information corresponding to the first account, and the second verification information corresponding to the second user identity card may include:
  • the terminal acquires first user fingerprint information corresponding to the first account and second user fingerprint information corresponding to the second user identity card.
  • the terminal registration to obtain the second account associated with the second user identity card may include: if the first user fingerprint information is determined If the second user fingerprint information matches, the terminal registers to obtain the second account associated with the second user identity card.
  • the user when the user registers the first account on the mobile phone, the user may be required to input his/her fingerprint information on the mobile phone, and then the mobile phone determines the fingerprint information as the first user fingerprint information, and is associated with the first account. Then, the mobile phone can save the first user fingerprint information in a file of the mobile phone. After determining that the user identification card used by the mobile phone is changed from the first user identification card to the second user identification card, the mobile phone may require the user to enter fingerprint information at this time, that is, the mobile phone can receive the second user identification card. Corresponding second user fingerprint information.
  • the mobile phone can determine whether the two match according to the obtained first user fingerprint information and the second user fingerprint information. If the two do not match, it can be considered that the first account of the mobile phone is illegally logged in, and so on. If the two match, the user who is considered to be the first account can replace the user identification card with the mobile phone. In this case, the mobile phone can newly register a second account associated with the second user identity card for the user according to the second user identity card.
  • the new registration card obtains the second account, which can improve the security of the first account and effectively avoid data leakage caused by the account being stolen.
  • the terminal may also ensure the security of the first account by verifying other information.
  • the user may set a corresponding verification password or verification question and corresponding verification answer for the first account in advance.
  • the terminal determines that the user identity card used by the terminal is not the first user identity card associated with the first account, the user of the terminal may be required to input an authentication password or an answer to the verification question corresponding to the first account. Only when the user enters the correct verification password or verification answer, the terminal will newly register a second account according to the second user identification card.
  • the step of obtaining, by the terminal in the step S202, the first verification information corresponding to the first account, and the second verification information corresponding to the second user identity card may include:
  • the terminal acquires the verification password corresponding to the first account and the verification password corresponding to the second user identity card.
  • the terminal registration to obtain the second account associated with the second user identity card may include: if the second account is determined to be corresponding If the verification password matches the verification password corresponding to the first account, the terminal registers to obtain the second account associated with the second user identification card.
  • step S204 the terminal performs a preset data backup process to back up the data corresponding to the first account to the second account.
  • the mobile phone can be triggered to execute a preset data backup process, so that the previous save is first.
  • the data in the account can be backed up to the second account.
  • step S204 may include:
  • the preset data backup process is performed, and the backup command is sent to the server corresponding to the first account according to the preset data backup process, and the backup instruction is used to instruct the server to back up the data corresponding to the first account to the second account.
  • the mobile phone invokes a preset data backup process, and then sends a backup instruction to the server corresponding to the first account according to the preset data backup process, where the backup instruction is used to indicate that the server is to be stored in the storage corresponding to the first account.
  • the data in the space is backed up to the storage space corresponding to the second account.
  • the mobile phone may first send an instruction to the server corresponding to the first account, and the instruction is used to instruct the server to send the data stored in the first account to the mobile phone.
  • the mobile phone may first save the data on the mobile phone. Since the second user identification card and the second account associated with the mobile phone are currently used on the mobile phone, the mobile phone can update the data on the mobile phone after detecting that the user has updated the data on the mobile phone (the updated data includes The data corresponding to the first account downloaded from the server is uploaded to the server, and the storage space corresponding to the second account in the server is saved.
  • the step of the terminal performing the preset data backup process in S204 to back up the data corresponding to the first account to the second account may include:
  • the updated data is uploaded to the storage space corresponding to the second account in the server, and the updated data includes data corresponding to the first account.
  • step S205 the terminal sends a delete command to the server corresponding to the first account, and the delete command is used to instruct the server to delete the data corresponding to the first account.
  • the mobile phone may send a delete command to the server corresponding to the first account, where the delete command is used to indicate that the server is to be saved in the server.
  • the data in the storage space of the first account is deleted.
  • step S206 the terminal sends a logout command to the server corresponding to the first account, and the logoff command is used to instruct the server to log out of the first account.
  • the mobile phone may further send a logout instruction to the server, where the logout instruction is used to instruct the server to log off the first account. That is, the server will be dismissed from the first account after receiving the logout instruction.
  • the storage space occupied by the first account can be released, thereby saving the storage space of the server.
  • the server corresponding to the first account may also send a message that the first account is logged off to the user terminals. And prompting these user terminals to re-associate to the second account.
  • the terminal A sends a logout command to the server corresponding to the first account, and the logoff command is used to instruct the server to log off the first account.
  • the server detects that there is a B terminal associated with the first account name, and then the server may send the information that the first account is logged out to the B terminal, and prompts the B terminal to re-associate to the newly registered Two accounts, and so on.
  • FIG. 3 is a schematic diagram of a scenario according to an embodiment of the present invention.
  • the user terminal acquires its own user identification card information. Then, the user terminal can determine, according to the acquired user identity card information, whether the user identity card used by the user terminal is changed from the first user identity card corresponding to the first account to another user identity card, such as the second user identity. Identification card. If yes, the user terminal may generate a prompt message at this time, prompting the user to enter fingerprint information on the user terminal.
  • the fingerprint information may be determined as the second user fingerprint information corresponding to the second user identification card. Then, the user terminal can acquire the first user fingerprint information corresponding to the first account.
  • the first user fingerprint information may be pre-stored in the user terminal or the cloud server. If the user terminal determines that the two matches according to the obtained first user fingerprint information and the second user fingerprint information, it may be considered that the user replaces the user identification card for the user terminal.
  • the user terminal may send a registration request to the cloud server, where the registration request may carry related information of the second user identity card, and is used to instruct the cloud server to register to obtain the second account associated with the second user identity card. .
  • the cloud server responds to the registration request, and sends the newly registered second account information to the user terminal.
  • the user terminal can send a backup request to the cloud server, and the backup request is used to instruct the cloud server to back up the data stored in the storage space corresponding to the first account to the storage space corresponding to the second account.
  • the cloud server responds to the backup request and feeds back the successful backup information to the user terminal.
  • the user terminal may send a delete and logout request to the cloud server, where the delete and logout request is used to instruct the cloud server to delete the data stored in the storage space corresponding to the first account, and log off the first account.
  • the cloud server responds to the deletion and deregistration request, and feeds back the data corresponding to the first account and the information of the first account to the user terminal.
  • An embodiment of the present invention provides an apparatus for data backup, including:
  • An obtaining unit configured to acquire user identification card information of the terminal when the first account is logged in;
  • a registration unit configured to determine, according to the user identification card information, that the user identification card of the terminal is changed from the first user identification card associated with the first account to the second user identification card, a second account associated with the two user identification cards;
  • An execution unit configured to execute a preset data backup process, so that data corresponding to the first account is backed up to the second account;
  • the first sending unit is configured to send a delete command to the server corresponding to the first account, where the delete command is used to instruct the server to delete data corresponding to the first account.
  • the data backup device may further include: a second sending unit, configured to send a logout command to a server corresponding to the first account, where the logoff command is used to instruct the server to log off the first account.
  • a second sending unit configured to send a logout command to a server corresponding to the first account, where the logoff command is used to instruct the server to log off the first account.
  • the registration unit may be configured to: obtain first verification information corresponding to the first account, and second verification information corresponding to the second user identity card. If it is determined that the first verification information matches the second verification information, registering with the second account associated with the second user identification card.
  • the registration unit may be configured to: acquire first user fingerprint information corresponding to the first account, and second user fingerprint information corresponding to the second user identity card. If it is determined that the first user fingerprint information matches the second user fingerprint information, the second account associated with the second user identification card is registered.
  • the executing unit may be configured to: execute a preset data backup process, and send a backup instruction to a server corresponding to the first account according to the preset data backup process, where the backup instruction is used to indicate the The server backs up the data corresponding to the first account to the second account.
  • the executing unit may be configured to: send, according to a preset data backup process, an instruction for instructing the server to transmit data corresponding to the first account to the terminal. Receiving data corresponding to the first account from the server. After the data update is detected, the updated data is uploaded to the storage space corresponding to the second account in the server, where the updated data includes data corresponding to the first account.
  • the registration unit may be configured to: obtain a verification password corresponding to the first account, and a verification password corresponding to the second user identity card. If it is determined that the verification password corresponding to the first account matches the verification password corresponding to the second user identity card, the second account associated with the second user identity card is registered.
  • FIG. 4 is a schematic structural diagram of an apparatus for data backup according to an embodiment of the present invention.
  • the apparatus 300 for data backup may include an acquisition unit 301, a registration unit 302, an execution unit 303, and a first transmission unit 304.
  • the obtaining unit 301 is configured to acquire user identification card information of the terminal when the first account is logged in.
  • the acquiring unit 301 of the terminal may be triggered to acquire information of the user identification card used by the terminal.
  • the terminal may determine, according to the user identity card information acquired by the obtaining unit 301, whether the user identity card used by the terminal is changed by the first user identity card associated with the first account to another user identity card, such as Second user identification card.
  • the terminal may continue to perform its current operation.
  • the registration unit 302 is configured to determine, according to the user identification card information, that the user identification card of the terminal is changed from the first user identification card associated with the first account to the second user identification card, The second account associated with the second user identification card.
  • the terminal determines, according to the user identity card information acquired by the obtaining unit 301, that the user identity card used by the terminal is changed from the first user identity card associated with the first account to the second user identity card, the terminal The registration unit 302 can be triggered to register a second account associated with the second user identification card according to the second user identification card.
  • the registration unit 302 can register to obtain a second account associated with the second user identity card by:
  • the registration unit 302 may first obtain the first verification information corresponding to the first account and the second verification information corresponding to the second user identity card. It can be understood that the first verification information and the second verification information are information for verifying the identity of the user.
  • the registration unit 302 may determine whether the first verification information and the second verification information match. If the registration unit 302 determines that the first verification information and the second verification information do not match, it may be considered that the terminal logs in to the first account as an illegal login. In this case, the terminal may continue to verify the identity of the user in another manner, or cancel the login of the first account on the terminal, and so on, which is not specifically limited herein.
  • the registration unit 302 determines that the first verification information and the second verification information match, the user who is considered to be the first account can replace the user identification card for the terminal.
  • the terminal may newly register a second account associated with the second user identity card currently used by the terminal according to the second user identity card.
  • the step of acquiring the first verification information corresponding to the first account and the second verification information corresponding to the second user identity card may include:
  • the terminal registration to obtain the second account associated with the second user identity card may include: determining the first user fingerprint information and the second If the user fingerprint information matches, the terminal registers to obtain a second account associated with the second user identity card.
  • the terminal when the user registers the first account on the terminal, the user may be required to input his/her own fingerprint information on the terminal, and then the terminal determines the fingerprint information as the first user fingerprint information, and is associated with the first account. Then, the terminal may save the first user fingerprint information in a file of the terminal. After determining that the user identification card used by the terminal is changed from the first user identification card to the second user identification card, the terminal may require the user to input fingerprint information at this time, that is, the terminal may receive the second user identification card. Corresponding second user fingerprint information.
  • the terminal can determine whether the two match according to the obtained first user fingerprint information and the second user fingerprint information. If the two do not match, the terminal can be considered as the illegal login for the first account, and so on. If the two match, the user who is considered to be the first account replaces the user identification card for the terminal. In this case, the terminal may newly register a second account associated with the second user identity card for the user according to the second user identity card.
  • the new registration card obtains the second account, which can improve the security of the first account and effectively avoid data leakage caused by the account being stolen.
  • the executing unit 303 is configured to execute a preset data backup process, so that the data corresponding to the first account is backed up to the second account.
  • the execution unit 303 of the terminal may be triggered to execute and execute a preset data backup process, thereby The data previously saved in the first account can be backed up to the second account.
  • the execution unit 303 can be used to:
  • the preset data backup process is performed, and the backup command is sent to the server corresponding to the first account according to the preset data backup process, and the backup instruction is used to instruct the server to back up the data corresponding to the first account to the second account.
  • the executing unit 303 may invoke a preset data backup process, and then send a backup instruction to the server corresponding to the first account according to the preset data backup process, where the backup instruction is used to indicate that the server is to be saved in the first account.
  • the data in the corresponding storage space is backed up to the storage space corresponding to the second account.
  • the server backs up the data corresponding to the first account to the second account according to the backup instruction.
  • the first sending unit 304 is configured to send a delete command to the server corresponding to the first account, where the delete command is used to instruct the server to delete data corresponding to the first account.
  • the first sending unit 304 of the terminal may send a delete command to the server corresponding to the first account, and the delete command is used for Instructing the server to delete data stored in the storage space of the first account.
  • FIG. 5 is another schematic structural diagram of an apparatus for backing up data according to a third embodiment of the present invention.
  • the device 300 for data backup may further include: a second sending unit 305.
  • the second sending unit 305 is configured to send a logout command to the server corresponding to the first account, where the logoff command is used to instruct the server to log out of the first account.
  • the second sending unit 305 of the terminal may further send a logout instruction to the server, where the logoff instruction is used to indicate that the server is to be An account is cancelled. That is, the server will be dismissed from the first account after receiving the logout instruction.
  • the storage space occupied by the first account can be released, thereby saving the storage space of the server.
  • the embodiment of the present invention provides a storage medium on which a computer program is stored, and when the computer program is executed on a computer, the computer is caused to perform the data backup method provided by the embodiment of the present invention.
  • An embodiment of the present invention further provides an electronic device.
  • FIG. 6 is a schematic structural diagram of an electronic device 400 according to an embodiment of the present invention.
  • the electronic device 400 can include a processor 401 of one or more processing cores, a memory 402 of one or more computer readable storage media, and a communication unit 403.
  • Processor 401 is the control center of the electronic device that connects various portions of the entire electronic device using various interfaces and lines, by running or executing software programs and/or modules stored in memory 402, and by calling stored in memory 402. Data, performing various functions and processing data of the electronic device, thereby performing overall monitoring of the electronic device.
  • the memory 402 can be used to store software programs and modules, and the processor 401 executes various functional applications and data processing by running software programs and modules stored in the memory 402.
  • the communication unit 403 can be used for receiving and transmitting signals during the process of transmitting and receiving information.
  • communication unit 403 receives signals transmitted by the server and hands them over to one or more processors 401 for processing.
  • the communication unit 403 transmits the feedback signal sent by the processor 401 to the server.
  • the processor 401 in the electronic device loads the executable file corresponding to the process of one or more application programs into the memory 402 according to the following instructions, and is executed by the processor 401 to be stored in the memory 402. In the application, perform the following steps:
  • the registration is obtained and the second user identification is performed.
  • the second account associated with the card
  • the electronic device 400 may further include components such as a power source 404 , an input unit 405 , and an output unit 406 .
  • a power source 404 may further include components such as a power source 404 , an input unit 405 , and an output unit 406 .
  • the server structure illustrated in FIG. 7 does not constitute a limitation to the server, and may include more or fewer components than those illustrated, or some components may be combined, or different component arrangements.
  • the power supply 404 can be logically coupled to the processor 401 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the input unit 405 can be configured to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • the output unit 406 can be used to display information entered by the user or information provided to the user and various graphical user interfaces of the server, which can be composed of graphics, text, icons, video, and any combination thereof.
  • the output unit 406 can include a display panel.
  • the processor 401 may further perform the following steps: sending a logout command to the server corresponding to the first account, where the logout command is used to indicate The server logs out the first account.
  • the processor 401 when performing the step of obtaining the second account associated with the second user identity card, may perform: acquiring first verification information corresponding to the first account, and second The second verification information corresponding to the user identification card. If it is determined that the first verification information matches the second verification information, registering with the second account associated with the second user identification card.
  • the processor 401 when performing the step of acquiring the first verification information corresponding to the first account, and the second verification information corresponding to the second user identity card, may perform: acquiring the first account corresponding The first user fingerprint information and the second user fingerprint information corresponding to the second user identification card.
  • the processor 401 may perform If it is determined that the first user fingerprint information matches the second user fingerprint information, the second account associated with the second user identification card is registered.
  • the processor 401 may perform: performing a preset data backup process, and following The preset data backup process sends a backup command to the server corresponding to the first account, and the backup instruction is used to instruct the server to back up the data corresponding to the first account to the second account.
  • the processor 401 performs the step of performing the preset data backup process to back up the data corresponding to the first account to the second account, and may perform: sending to the server according to the preset data backup process. And an instruction for instructing the server to transmit data corresponding to the first account to the electronic device. Receiving data corresponding to the first account from the server. After the data update is detected, the updated data is uploaded to the storage space corresponding to the second account in the server, where the updated data includes data corresponding to the first account.
  • the processor 401 when performing the step of acquiring the first verification information corresponding to the first account, and the second verification information corresponding to the second user identity card, may perform: acquiring the first account corresponding The verification password and the verification password corresponding to the second user identification card.
  • the processor 401 may perform If it is determined that the verification password corresponding to the first account matches the verification password corresponding to the second user identification card, the second account associated with the second user identification card is registered.
  • the device for backing up the data belongs to the same concept as the method for backing up the data in the foregoing embodiment, and any of the methods provided in the method for backing up the data backup may be run on the device for backing up the data.
  • any of the methods provided in the method for backing up the data backup may be run on the device for backing up the data.
  • the implementation of the method refer to the method embodiment of the data backup, which is not described here.
  • the computer program can be stored in a computer readable storage medium, such as in a memory of the terminal, and executed by at least one processor in the terminal, and can include data transmission as described during execution.
  • the storage medium may be a magnetic disk, an optical disk, a read only memory (ROM, Read) Only Memory), random access memory (RAM, Random Access Memory), etc.
  • each functional module may be integrated into one processing chip, or each module may exist physically separately, or two or more modules may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated module if implemented in the form of a software functional module and sold or used as a standalone product, may also be stored in a computer readable storage medium, such as a read only memory, a magnetic disk or an optical disk, etc. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

一种数据备份的方法,包括:当第一账号登录时,获取用户身份识别卡信息;若判断出终端的用户身份识别卡由第一用户身份识别卡变更为第二用户身份识别卡,则注册得到第二账号;执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;发送删除指令到服务器,用于指示该服务器删除第一账号对应的数据。

Description

数据备份的方法、装置、存储介质及电子设备
本申请要求于2016年10月25日提交中国专利局、申请号为201610949322.X、发明名称为“数据备份的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明属于通信技术领域,尤其涉及一种数据备份的方法、装置、存储介质及电子设备。
背景技术
由于智能终端的普及,一个用户可能同时拥有多台终端,而用户在不同的终端上存储的数据也有所不同。为了使用户能够方便地使用存储在不同终端上的数据,云存储服务技术应运而生。通过云存储服务,终端可以将使用过程中产生的数据上传到云端,并在有需要的时候将云端存储的数据下载到终端设备。
技术问题
本发明实施例提供一种数据备份的方法、装置、存储介质及电子设备,可以提高用户数据的安全性。
技术解决方案
本发明实施例提供一种数据备份的方法,包括:
当第一账号登录时,获取终端的用户身份识别卡信息;
若根据所述用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
本发明实施例还提供一种数据备份的装置,包括:
获取单元,用于当第一账号登录时,获取终端的用户身份识别卡信息;
注册单元,用于若根据所述用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
执行单元,用于执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
第一发送单元,用于发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
本发明实施例提供一种存储介质,其上存储有计算机程序,当所述计算机程序在计算机上执行时,使得所述计算机执行如本发明实施例提供的数据备份的方法。
本发明实施例提供一种电子设备,包括存储器,处理器,所述处理器通过调用所述存储器中存储的计算机程序,用于执行如下步骤:
当第一账号登录时,获取电子设备的用户身份识别卡信息;
若根据所述用户身份识别卡信息,判断出电子设备的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
有益效果
本发明实施例提供一种数据备份的方法、装置、存储介质及电子设备,可以提高用户数据的安全性。
附图说明
下面结合附图,通过对本发明的具体实施方式详细描述,将使本发明的技术方案及其有益效果显而易见。
图1为本发明实施例提供的数据备份的方法的流程示意图。
图2为本发明实施例提供的数据备份的方法的另一流程示意图。
图3为本发明实施例提供的场景示意图。
图4为本发明实施例提供的数据备份的装置的结构示意图。
图5为本发明实施例提供的数据备份的装置的另一结构示意图。
图6为本发明实施例提供的电子设备的结构示意图。
图7为本发明实施例提供的电子设备的另一结构示意图。
本发明的最佳实施方式
请参照图式,其中相同的组件符号代表相同的组件,本发明的原理是以实施在一适当的运算环境中来举例说明。以下的说明是基于所例示的本发明具体实施例,其不应被视为限制本发明未在此详述的其它具体实施例。
在实际应用过程中,终端注册的云存储服务账号往往会与用户身份识别卡(Subscriber Identification Module,简称SIM卡)进行关联绑定。在这种情况下,当用户为终端更换新的SIM卡后,如果原来使用的旧的SIM卡被其他人使用,由于旧的SIM卡与用户的云存储服务账号之间具有关联绑定关系,那么该用户存储在云存储服务账号下的数据就可能会被其他人知晓,导致该用户的数据泄露,即导致用户数据不安全。
本发明实施例提供一种数据备份的方法,包括:
当第一账号登录时,获取终端的用户身份识别卡信息;
若根据所述用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
在一种实施方式中,在发送删除指令到第一账号对应的服务器的步骤之后,还可以包括如下步骤:发送注销指令到第一账号对应的服务器,所述注销指令用于指示所述服务器注销第一账号。
在一种实施方式中,所述注册得到与第二用户身份识别卡相关联的第二账号,可以包括如下步骤:获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息。若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
在一种实施方式中,所述获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息,可以包括如下步骤:获取第一账号对应的第一用户指纹信息,以及第二用户身份识别卡对应的第二用户指纹信息。
所述若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号,可以包括如下步骤:若判断出所述第一用户指纹信息与第二用户指纹信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
在一种实施方式中,所述执行预设数据备份进程,以使第一账号对应的数据备份到第二账号,可以包括如下步骤:执行预设数据备份进程,并按照预设数据备份进程,发送备份指令到第一账号对应的服务器,所述备份指令用于指示所述服务器将第一账号对应的数据备份到第二账号。
在一种实施方式中,所述执行预设数据备份进程,以使第一账号对应的数据备份到第二账号,可以包括如下步骤:按照预设数据备份进程,向服务器发送用于指示所述服务器将第一账号对应的数据传输到终端的指令。从所述服务器处接收第一账号对应的数据。在检测到发生数据更新后,将更新后的数据上传至所述服务器中与第二账号对应的存储空间,所述更新后的数据包含所述第一账号对应的数据。
在一种实施方式中,所述获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息,可以包括如下步骤:获取第一账号对应的验证密码,以及第二用户身份识别卡对应的验证密码。
所述若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号,可以包括如下步骤:若判断出所述第一账号对应的验证密码与第二用户身份识别卡对应的验证密码相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
请参阅图1,图1是本发明实施例提供的数据备份的方法的流程示意图,流程可以包括:
在步骤S101中,当第一账号登录时,获取终端的用户身份识别卡信息。
可以理解的是,本发明实施例的执行主体可以是智能手机、平板电脑等终端设备。
目前,当用户注册某个账号,如注册云服务账号时,一般会将账号与用户身份识别卡(Subscriber Identification Module,简称SIM卡)绑定关联。但是,在实际使用过程中,用户可能会更换SIM卡。例如,用户甲在注册云服务账号时,将该云服务账号与终端的SIM卡A相关联。之后,用户甲将终端使用的SIM卡A更换为SIM卡B,而SIM卡A则被用户乙的终端所使用。那么,由于SIM卡A与用户甲的云服务账号之间存在绑定关系,使得持有SIM卡A的用户乙有可能知晓用户甲保存在其云服务账号下的数据,导致用户甲的云服务账号对应的数据不安全。
在本发明实施例的步骤S101中,可以在终端检测到第一账号在该终端上登录时,触发该终端获取其使用的用户身份识别卡的信息。然后,根据获取到的用户身份识别卡信息,终端可以判断其使用的用户身份识别卡是否由与第一账号对应的第一用户身份识别卡变更为其它用户身份识别卡,即判断终端使用的用户身份识别卡是否由第一用户身份识别卡变更为第二用户身份识别卡。
在一种实施方式中,终端可以预先获取与第一账号关联的第一用户身份识别卡的信息。然后,当第一账号在终端上登录时,终端获取其当前使用的用户身份识别卡的信息,并将该当前使用的用户身份识别卡的信息和第一用户身份识别卡的信息比对。若比对结果显示二者信息一致,则表明终端当前使用的是第一用户身份识别卡,即终端使用的用户身份识别卡未发生变更。若比对结果显示二者信息不一致,则表明终端当前使用的用户身份识别卡为第一用户身份识别卡之外的用户身份识别卡,即终端使用的用户身份识别卡发生了变更。
若终端判断出其使用的用户身份识别卡未发生变更,则终端可以继续执行其当前的操作。若终端判断出其使用的用户身份识别卡由第一用户身份识别卡变更为第二用户身份识别卡,则进入步骤S102。
在步骤S102中,若根据该用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号。
比如,终端根据其获取到的用户身份识别卡信息,判断出终端使用的用户身份识别卡由与第一账号相关联的第一用户身份识别卡变更为第二用户身份识别卡,那么终端可以根据该第二用户身份识别卡,注册得到一个与第二用户身份识别卡相关联的账号,即第二账号。
在步骤S103中,执行预设数据备份进程,以使第一账号对应的数据备份到第二账号。
比如,在注册得到第二账号后,可以触发终端调用并执行预设的数据备份进程,从而使第一账号对应的数据能够备份到第二账号。
例如,在一种实施方式中,终端可以按照预设的数据备份进程,发送一条指令到存储有第一账号对应的数据的服务器,该指令用于指示该服务器将保存在第一账号对应的存储空间的数据复制到第二账号对应的存储空间。
在步骤S104中,发送删除指令到第一账号对应的服务器,该删除指令用于指示该服务器删除第一账号对应的数据。
比如,在确定第一账号对应的数据已经备份到第二账号之后,终端可以发送一条删除指令到第一账号对应的服务器,该删除指令用于指示该服务器将保存在第一账号对应的存储空间里的数据删除。
可以理解的是,通过注册新的第二账号,并将第一账号对应的数据备份到第二账号,同时将服务器上第一账号对应的数据删除,可以有效避免因第一账号关联的第一用户身份识别卡被其他用户使用所导致的用户数据不安全,并保证用户数据不丢失。
请参阅图2,图2为本发明实施例提供的数据备份的方法的另一流程示意图,流程可以包括:
在步骤S201中,当第一账号登录时,终端获取用户身份识别卡信息。
比如,该终端可以为手机。
例如,当检测到使用云存储服务的第一账号在手机上登录时,可以触发手机获取其使用的用户身份识别卡的信息。然后,手机可以根据获取到的用户身份识别卡信息,判断手机所使用的用户身份识别卡是否发生变更,即判断手机所使用的用户身份识别卡是否由与第一账号关联的第一用户身份识别卡变更为其它的用户身份识别卡,如第二用户身份识别卡。
在一种实施方式中,在手机将注册得到的第一账号与手机使用的第一用户身份识别卡绑定关联时,可以触发手机获取第一用户身份识别卡的信息,并将该第一用户身份识别卡的信息保存在某个预设文件中。当检测到第一账号在手机上登录时,可以触发手机获取其当前使用的用户身份识别卡信息,并将该当前使用的用户身份识别卡信息和保存在预设文件中的第一用户身份识别卡的信息相比对,以判断手机当前使用的用户身份识别卡是否为第一用户身份识别卡。
若该当前使用的用户身份识别卡信息和第一用户身份识别卡的信息的比对结果显示二者一致,则表明手机当前使用的用户身份识别卡为第一用户身份识别卡,即手机使用的用户身份识别卡未发生变更。这种情况下,手机可以继续执行其相关操作。
若该当前使用的用户身份识别卡信息和第一用户身份识别卡的信息的比对结果显示二者不一致,则表明手机当前使用的用户身份识别卡不是与第一账号相关联的第一用户身份识别卡,即手机使用的用户身份识别卡发生变更,此时进入步骤S202。
在步骤S202中,若根据该用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则终端获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息。
在步骤S203中,若判断出该第一验证信息与第二验证信息相匹配,则终端注册得到与第二用户身份识别卡相关联的第二账号。
比如,步骤S202和S203可以包括:
手机判断出其当前所使用的用户身份识别卡,已经由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,那么此时可以触发手机获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息。可以理解的是,上述第一验证信息和第二验证信息均为用于检验用户身份的信息。
在获取到与第一账号对应的第一验证信息以及与第二用户身份识别卡对应的第二验证信息之后,手机可以判断该第一验证信息和第二验证信息是否相匹配。若手机判断出该第一验证信息和第二验证信息不相匹配,则可以认为手机本次登录第一账号为非法登录。在这种情况下,手机可以换一种方式继续验证用户的身份,或者是取消第一账号在手机上的登录,等等,此处不做具体限定。
若手机判断出该第一验证信息和第二验证信息相匹配,则可以认为是第一账号的用户为手机更换了用户身份识别卡。在这种情况下,手机可以根据变更后的用户身份识别卡,如第二用户身份识别卡,为该用户新注册一个与手机当前使用的第二用户身份识别卡相关联的第二账号。
在一种实施方式中,上述步骤S202中终端获取第一账号对应的第一验证信息,以及与第二用户身份识别卡对应的第二验证信息的步骤,可以包括:
终端获取第一账号对应的第一用户指纹信息,以及与第二用户身份识别卡对应的第二用户指纹信息。
步骤S203中若判断出该第一验证信息与第二验证信息相匹配,则终端注册得到与第二用户身份识别卡相关联的第二账号,可以包括:若判断出该第一用户指纹信息与第二用户指纹信息相匹配,则终端注册得到与第二用户身份识别卡相关联的第二账号。
例如,用户在手机上注册第一账号时,可以要求用户在手机上录入自己的指纹信息,然后手机将该指纹信息确定为第一用户指纹信息,并与第一账号相关联。然后,手机可以将该第一用户指纹信息保存在手机的某个文件中。当判断出手机使用的用户身份识别卡由第一用户身份识别卡变更为第二用户身份识别卡后,手机可以在此时要求用户录入指纹信息,即手机可以接收到与第二用户身份识别卡对应的第二用户指纹信息。
之后,手机可以根据获取到的第一用户指纹信息和第二用户指纹信息,判断二者是否相匹配。若二者不相匹配,则可以认为手机本次登录第一账号为非法登录,等等。若二者相匹配,则可以认为是第一账号的用户为手机更换了用户身份识别卡。在这种情况下,手机可以根据第二用户身份识别卡,为该用户新注册一个与第二用户身份识别卡相关联的第二账号。
可以理解的是,通过验证第一账号对应的第一验证信息与第二用户身份识别卡对应的第二验证信息是否相匹配,并在这二者相匹配的情况下,才根据第二用户身份识别卡新注册得到第二账号,可以提高第一账号的安全性,有效避免因账号被盗导致的数据泄露。
当然,除了验证用户指纹信息,在其它实施方式中,终端还可以通过验证其它信息来保证第一账号的安全性。例如,用户可以预先为第一账号设置某个对应的验证密码或验证问题及对应的验证答案。当终端判断出其使用的用户身份识别卡不是与第一账号绑定关联的第一用户身份识别卡时,可以要求终端的用户输入与第一账号对应的验证密码或验证问题的答案。只有当用户输入正确的验证密码或验证答案时,终端才会根据第二用户身份识别卡新注册得到一个第二账号。
在一种实施方式中,上述步骤S202中终端获取第一账号对应的第一验证信息,以及与第二用户身份识别卡对应的第二验证信息的步骤,可以包括:
终端获取第一账号对应的验证密码,以及第二用户身份识别卡对应的验证密码。
那么,步骤S203中若判断出该第一验证信息与第二验证信息相匹配,则终端注册得到与第二用户身份识别卡相关联的第二账号,可以包括:若判断出第二账号对应的验证密码与第一账号对应的验证密码相匹配,则终端注册得到与第二用户身份识别卡相关联的第二账号。
在步骤S204中,终端执行预设数据备份进程,以使第一账号对应的数据备份到第二账号。
比如,手机在根据第二用户身份识别卡,注册得到与该第二用户身份识别卡相关联的第二账号之后,可以触发手机调用并执行预设的数据备份进程,从而使得之前保存在第一账号中的数据能够备份到第二账号。
在一种实施方式中,步骤S204可以包括:
执行预设数据备份进程,并按照预设数据备份进程,发送备份指令到第一账号对应的服务器,所述备份指令用于指示该服务器将第一账号对应的数据备份到第二账号。
比如,手机调用预设的数据备份进程,然后按照该预设的数据备份进程,发送一条备份指令到第一账号对应的服务器,该备份指令用于指示该服务器将保存在第一账号对应的存储空间中的数据备份到第二账号对应的存储空间中。
在另一种实施方式中,手机也可以先发送一条指令到第一账号对应的服务器,该指令用于指示该服务器将保存在第一账号中的数据发送到手机上。手机在接收到服务器发送过来的第一账号对应的数据后,可以先将这些数据保存在手机上。由于目前手机上使用的是第二用户身份识别卡及与其相关联的第二账号,因此手机可以在检测到用户对手机上的数据进行了更新之后,将手机上的数据(更新后的数据包括从服务器下载的第一账号对应的数据)上传到上述服务器,并保存在该服务器中第二账号对应的存储空间。
在另一种实施方式中,S204中终端执行预设数据备份进程,以使第一账号对应的数据备份到第二账号的步骤,可以包括:
按照预设数据备份进程,向服务器发送用于指示该服务器将第一账号对应的数据传输到终端的指令;
从该服务器处接收第一账号对应的数据;
在检测到发生数据更新后,将更新后的数据上传至该服务器中与第二账号对应的存储空间,该更新后的数据包含该第一账号对应的数据。
在步骤S205中,终端发送删除指令到第一账号对应的服务器,该删除指令用于指示该服务器删除第一账号对应的数据。
比如,手机在确定第一账号对应的服务器已将第一账号对应的数据备份到第二账号之后,手机可以发送删除指令到第一账号对应的服务器,该删除指令用于指示该服务器将保存在第一账号的存储空间中的数据删除。
可以理解的是,通过将保存在第一账号的存储空间中的数据删除,可以有效避免因用户不再使用与第一账号相关联的第一用户身份识别卡,而导致的第一账号的数据泄露。
在步骤S206中,终端发送注销指令到第一账号对应的服务器,该注销指令用于指示该服务器注销第一账号。
比如,在向服务器发送用于指示该服务器将第一账号对应的数据删除的指令之后,手机还可以发送注销指令到该服务器,该注销指令用于指示该服务器将第一账号注销。也就是说,该服务器在收到该注销指令后,会将第一账号销除。
可以理解的是,通过将第一账号注销的方式,可以释放第一账号占用的存储空间,达到节省服务器的存储空间的目的。
在一种实施方式中,若第一账号对应的服务器检测到第一账号名下还关联有其它多个用户终端,那么该服务器还可以将第一账号被注销的消息发送到这些用户终端上,并提示这些用户终端重新关联到第二账号。例如,步骤S206中,甲终端发送注销指令到第一账号对应的服务器,该注销指令用于指示该服务器将第一账号注销。服务器在接收到该注销指令后,检测到第一账号名下还关联有乙终端,则此时服务器可以发送第一账号被注销的信息到乙终端,并提示乙终端重新关联到新注册的第二账号,等等。
请一并参阅图3,图3为本发明实施例提供的场景示意图。
例如,当检测到第一账号在用户终端上登录时,用户终端获取自身的用户身份识别卡信息。然后,用户终端可以根据获取到的用户身份识别卡信息,判断其使用的用户身份识别卡是否由与第一账号对应的第一用户身份识别卡变更为其它用户身份识别卡,如第二用户身份识别卡。若是,则用户终端可以在此时生成一则提示信息,提示用户在用户终端上录入指纹信息。
用户终端获取到用户录入的指纹信息之后,可以将该指纹信息确定为与第二用户身份识别卡对应的第二用户指纹信息。然后,用户终端可以获取与第一账号对应的第一用户指纹信息。该第一用户指纹信息可以预先保存在用户终端或者云服务器中。若用户终端根据获取到的第一用户指纹信息与第二用户指纹信息,判断出二者相匹配,则可以认为是用户为用户终端更换了用户身份识别卡。
这种情况下,用户终端可以发送一条注册请求到云服务器,该注册请求可以携带第二用户身份识别卡的相关信息,并用于指示云服务器注册得到与第二用户身份识别卡关联的第二账号。云服务器对该注册请求进行响应,并将新注册得到的第二账号的信息发送到用户终端。
然后,用户终端可以发送一条备份请求到云服务器,该备份请求用于指示云服务器将保存在第一账号对应的存储空间里的数据备份到第二账号对应的存储空间。云服务器对该备份请求进行响应,并将备份成功的信息反馈给用户终端。
最后,用户终端可以发送一条删除及注销请求到云服务器,该删除及注销请求用于指示云服务器删除存储在第一账号对应的存储空间的数据,并将第一账号注销。云服务器对该删除及注销请求进行响应,并将成功删除第一账号对应的数据及注销第一账号的信息反馈给用户终端。
本发明实施例提供一种数据备份的装置,包括:
获取单元,用于当第一账号登录时,获取终端的用户身份识别卡信息;
注册单元,用于若根据所述用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
执行单元,用于执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
第一发送单元,用于发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
在一种实施方式中,该数据备份的装置还可以包括:第二发送单元,用于发送注销指令到第一账号对应的服务器,所述注销指令用于指示所述服务器注销第一账号。
在一种实施方式中,所述注册单元可以用于:获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息。若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
在一种实施方式中,所述注册单元可以用于:获取第一账号对应的第一用户指纹信息,以及第二用户身份识别卡对应的第二用户指纹信息。若判断出所述第一用户指纹信息与第二用户指纹信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
在一种实施方式中,所述执行单元可以用于:执行预设数据备份进程,并按照预设数据备份进程,发送备份指令到第一账号对应的服务器,所述备份指令用于指示所述服务器将第一账号对应的数据备份到第二账号。
在一种实施方式中,所述执行单元可以用于:按照预设数据备份进程,向服务器发送用于指示所述服务器将第一账号对应的数据传输到终端的指令。从所述服务器处接收第一账号对应的数据。在检测到发生数据更新后,将更新后的数据上传至所述服务器中与第二账号对应的存储空间,所述更新后的数据包含所述第一账号对应的数据。
在一种实施方式中,所述注册单元可以用于:获取第一账号对应的验证密码,以及第二用户身份识别卡对应的验证密码。若判断出所述第一账号对应的验证密码与第二用户身份识别卡对应的验证密码相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
请参阅图4,图4为本发明实施例提供的数据备份的装置的结构示意图。数据备份的装置300可以包括:获取单元301,注册单元302,执行单元303,第一发送单元304。
获取单元301,用于当第一账号登录时,获取终端的用户身份识别卡信息。
比如,当检测到使用云存储服务的第一账号在终端上登录时,可以触发终端的获取单元301获取该终端使用的用户身份识别卡的信息。
之后,终端可以根据获取单元301获取到的用户身份识别卡信息,判断终端所使用的用户身份识别卡是否由与第一账号关联的第一用户身份识别卡变更为其它的用户身份识别卡,如第二用户身份识别卡。
若终端判断出其使用的用户身份识别卡为与第一账号关联的第一用户身份识别卡,那么终端可以继续执行其当前的操作。
注册单元302,用于若根据所述用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号。
比如,若终端根据获取单元301获取到的用户身份识别卡信息,判断出终端使用的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,那么终端可以触发其注册单元302,根据该第二用户身份识别卡,注册得到一个与该第二用户身份识别卡相关联的第二账号。
在一种实施方式中,注册单元302可以通过如下方式来注册得到与第二用户身份识别卡相关联的第二账号:
获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息;
若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
比如,注册单元302可以先获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息。可以理解的是,上述第一验证信息和第二验证信息均为用于检验用户身份的信息。
在获取到第一账号对应的第一验证信息以及第二用户身份识别卡对应的第二验证信息之后,注册单元302可以判断该第一验证信息和第二验证信息是否相匹配。若注册单元302判断出该第一验证信息和第二验证信息不相匹配,则可以认为终端本次登录第一账号为非法登录。在这种情况下,终端可以换一种方式继续验证用户的身份,或者是取消第一账号在终端上的登录,等等,此处不做具体限定。
若注册单元302判断出该第一验证信息和第二验证信息相匹配,则可以认为是第一账号的用户为终端更换了用户身份识别卡。在这种情况下,终端可以根据第二用户身份识别卡,为该用户新注册一个与终端当前使用的第二用户身份识别卡相关联的第二账号。
在一种实施方式中,上述获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息的步骤,可以包括:
获取第一账号对应的第一用户指纹信息,以及第二用户身份识别卡对应的第二用户指纹信息。
上述若判断出该第一验证信息与第二验证信息相匹配,则终端注册得到与第二用户身份识别卡相关联的第二账号,可以包括:若判断出该第一用户指纹信息与第二用户指纹信息相匹配,则终端注册得到与第二用户身份识别卡相关联的第二账号。
例如,用户在终端上注册第一账号时,可以要求用户在终端上录入自己的指纹信息,然后终端将该指纹信息确定为第一用户指纹信息,并与第一账号相关联。然后,终端可以将该第一用户指纹信息保存在终端的某个文件中。当判断出终端使用的用户身份识别卡由第一用户身份识别卡变更为第二用户身份识别卡后,终端可以在此时要求用户录入指纹信息,即终端可以接收到与第二用户身份识别卡对应的第二用户指纹信息。
之后,终端可以根据获取到的第一用户指纹信息和第二用户指纹信息,判断二者是否相匹配。若二者不相匹配,则可以认为终端本次登录第一账号为非法登录,等等。若二者相匹配,则可以认为是第一账号的用户为终端更换了用户身份识别卡。在这种情况下,终端可以根据第二用户身份识别卡,为该用户新注册一个与第二用户身份识别卡相关联的第二账号。
可以理解的是,通过验证第一账号对应的第一验证信息与第二用户身份识别卡对应的第二验证信息是否相匹配,并在这二者相匹配的情况下,才根据第二用户身份识别卡新注册得到第二账号,可以提高第一账号的安全性,有效避免因账号被盗导致的数据泄露。
执行单元303,用于执行预设数据备份进程,以使第一账号对应的数据备份到第二账号。
比如,注册单元302在根据第二用户身份识别卡,注册得到与该第二用户身份识别卡相关联的第二账号之后,可以触发终端的执行单元303调用并执行预设的数据备份进程,从而使得之前保存在第一账号中的数据能够备份到第二账号。
在一种实施方式中,执行单元303可以用于:
执行预设数据备份进程,并按照预设数据备份进程,发送备份指令到第一账号对应的服务器,所述备份指令用于指示该服务器将第一账号对应的数据备份到第二账号。
比如,执行单元303可以调用预设的数据备份进程,然后按照该预设的数据备份进程,发送一条备份指令到第一账号对应的服务器,该备份指令用于指示该服务器将保存在第一账号对应的存储空间中的数据备份到第二账号对应的存储空间中。该服务器在接收到该备份指令后,就按照该备份指令将第一账号对应的数据备份到第二账号。
第一发送单元304,用于发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
比如,在确定第一账号对应的服务器已将第一账号对应的数据备份到第二账号之后,终端的第一发送单元304可以发送一条删除指令到第一账号对应的服务器,该删除指令用于指示该服务器将保存在第一账号的存储空间中的数据删除。
可以理解的是,通过将保存在第一账号的存储空间中的数据删除,可以有效避免因用户不再使用与第一账号相关联的第一用户身份识别卡,而导致的第一账号的数据泄露。
请一并参阅图5,图5为本发明第三实施例提供的数据备份的装置的另一结构示意图。数据备份的装置300还可以包括:第二发送单元305。
第二发送单元305,用于发送注销指令到第一账号对应的服务器,所述注销指令用于指示所述服务器注销第一账号。
比如,在向服务器发送用于指示该服务器将第一账号对应的数据删除的指令之后,终端的第二发送单元305还可以发送一条注销指令到该服务器,该注销指令用于指示该服务器将第一账号注销。也就是说,该服务器在收到该注销指令后,会将第一账号销除。
可以理解的是,通过将第一账号注销的方式,可以释放第一账号占用的存储空间,达到节省服务器的存储空间的目的。
本发明实施例提供一种存储介质,其上存储有计算机程序,当所述计算机程序在计算机上执行时,使得所述计算机执行本发明实施例提供的数据备份的方法。
本发明实施例还提供一种电子设备。
请参考图6,其示出了本发明实施例提供的电子设备400的结构示意图。该电子设备400可以包括一个或者一个以上处理核心的处理器401、一个或一个以上计算机可读存储介质的存储器402、通信单元403。
处理器401是该电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或执行存储在存储器402内的软件程序和/或模块,以及调用存储在存储器402内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。
存储器402可用于存储软件程序以及模块,处理器401通过运行存储在存储器402的软件程序以及模块,从而执行各种功能应用以及数据处理。
通信单元403可用于收发信息过程中,信号的接收和发送。特别地,通信单元403接收服务器发送的信号,并将信号交由一个或者一个以上处理器401处理。同时,通信单元403将处理器401发出的反馈信号发送给服务器。
本实施例中,电子设备中的处理器401会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行文件加载到存储器402中,并由处理器401来运行存储在存储器402中的应用程序,执行如下步骤:
当第一账号登录时,获取电子设备的用户身份识别卡信息;
若根据所述用户身份识别卡信息,判断出电子设备的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
请参阅图7,在其它实施方式中,电子设备400还可以包括电源404、输入单元405、以及输出单元406等部件。本领域技术人员可以理解,图7中示出的服务器结构并不构成对服务器的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
电源404可以通过电源管理系统与处理器401逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
输入单元405可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。
输出单元406可用于显示由用户输入的信息或提供给用户的信息以及服务器的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。输出单元406可包括显示面板。
在一种实施方式中,在发送删除指令到第一账号对应的服务器的步骤之后,处理器401还可以执行如下步骤:发送注销指令到第一账号对应的服务器,所述注销指令用于指示所述服务器注销第一账号。
在一种实施方式中,处理器401在执行所述注册得到与第二用户身份识别卡相关联的第二账号的步骤时,可以执行:获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息。若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
在一种实施方式中,处理器401在执行所述获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息的步骤时,可以执行:获取第一账号对应的第一用户指纹信息,以及第二用户身份识别卡对应的第二用户指纹信息。
那么,处理器401在执行所述若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号的步骤时,可以执行:若判断出所述第一用户指纹信息与第二用户指纹信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
在一种实施方式中,处理器401在执行所述执行预设数据备份进程,以使第一账号对应的数据备份到第二账号的步骤时,可以执行:执行预设数据备份进程,并按照预设数据备份进程,发送备份指令到第一账号对应的服务器,所述备份指令用于指示所述服务器将第一账号对应的数据备份到第二账号。
在一种实施方式中,处理器401执行所述执行预设数据备份进程,以使第一账号对应的数据备份到第二账号的步骤,可以执行:按照预设数据备份进程,向服务器发送用于指示所述服务器将第一账号对应的数据传输到电子设备的指令。从所述服务器处接收第一账号对应的数据。在检测到发生数据更新后,将更新后的数据上传至所述服务器中与第二账号对应的存储空间,所述更新后的数据包含所述第一账号对应的数据。
在一种实施方式中,处理器401在执行所述获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息的步骤时,可以执行:获取第一账号对应的验证密码,以及第二用户身份识别卡对应的验证密码。
那么,处理器401在执行所述若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号的步骤时,可以执行:若判断出所述第一账号对应的验证密码与第二用户身份识别卡对应的验证密码相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
本发明实施例中,所述数据备份的装置与上文实施例中的数据备份的方法属于同一构思,在所述数据备份的装置上可以运行所述数据备份的方法实施例中提供的任一方法,其实现过程详见所述数据备份的方法实施例,此处不再赘述。
需要说明的是,对本发明所述数据备份的方法而言,本领域普通技术人员可以理解实现本发明实施例所述数据备份的方法的全部或部分流程,是可以通过计算机程序来控制相关的硬件来完成,所述计算机程序可存储于一计算机可读取存储介质中,如存储在终端的存储器中,并被该终端内的至少一个处理器执行,在执行过程中可包括如所述数据传输的方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)等。
对本发明实施例的所述数据备份的装置而言,其各功能模块可以集成在一个处理芯片中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中,所述存储介质譬如为只读存储器,磁盘或光盘等。
以上对本发明实施例所提供的一种数据备份的方法、装置、存储介质及电子设备进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。

Claims (20)

  1. 一种数据备份的方法,其中,所述方法包括:
    当第一账号登录时,获取终端的用户身份识别卡信息;
    若根据所述用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
    执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
    发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
  2. 根据权利要求1所述的数据备份的方法,其中,在发送删除指令到第一账号对应的服务器的步骤之后,还包括:
    发送注销指令到第一账号对应的服务器,所述注销指令用于指示所述服务器注销第一账号。
  3. 根据权利要求2所述的数据备份的方法,其中,所述注册得到与第二用户身份识别卡相关联的第二账号,包括:
    获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息;
    若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
  4. 根据权利要求3所述的数据备份的方法,其中,所述获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息,包括:
    获取第一账号对应的第一用户指纹信息,以及第二用户身份识别卡对应的第二用户指纹信息;
    所述若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号,包括:若判断出所述第一用户指纹信息与第二用户指纹信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
  5. 根据权利要求4所述的数据备份的方法,其中,所述执行预设数据备份进程,以使第一账号对应的数据备份到第二账号,包括:
    执行预设数据备份进程,并按照预设数据备份进程,发送备份指令到第一账号对应的服务器,所述备份指令用于指示所述服务器将第一账号对应的数据备份到第二账号。
  6. 根据权利要求4所述的数据备份的方法,其中,所述执行预设数据备份进程,以使第一账号对应的数据备份到第二账号,包括:
    按照预设数据备份进程,向服务器发送用于指示所述服务器将第一账号对应的数据传输到终端的指令;
    从所述服务器处接收第一账号对应的数据;
    在检测到发生数据更新后,将更新后的数据上传至所述服务器中与第二账号对应的存储空间,所述更新后的数据包含所述第一账号对应的数据。
  7. 根据权利要求3所述的数据备份的方法,其中,所述获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息,包括:
    获取第一账号对应的验证密码,以及第二用户身份识别卡对应的验证密码;
    所述若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号,包括:若判断出所述第一账号对应的验证密码与第二用户身份识别卡对应的验证密码相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
  8. 一种数据备份的装置,其中,所述装置包括:
    获取单元,用于当第一账号登录时,获取终端的用户身份识别卡信息;
    注册单元,用于若根据所述用户身份识别卡信息,判断出终端的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
    执行单元,用于执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
    第一发送单元,用于发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
  9. 根据权利要求8所述的数据备份的装置,其中,所述装置还包括:
    第二发送单元,用于发送注销指令到第一账号对应的服务器,所述注销指令用于指示所述服务器注销第一账号。
  10. 根据权利要求9所述的数据备份的装置,其中,所述注册单元用于:
    获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息;
    若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
  11. 根据权利要求10所述的数据备份的装置,其中,所述注册单元用于:
    获取第一账号对应的第一用户指纹信息,以及第二用户身份识别卡对应的第二用户指纹信息;
    若判断出所述第一用户指纹信息与第二用户指纹信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
  12. 根据权利要求11所述的数据备份的装置,其中,所述执行单元用于:
    执行预设数据备份进程,并按照预设数据备份进程,发送备份指令到第一账号对应的服务器,所述备份指令用于指示所述服务器将第一账号对应的数据备份到第二账号。
  13. 根据权利要求11所述的数据备份的装置,其中,所述执行单元用于:
    按照预设数据备份进程,向服务器发送用于指示所述服务器将第一账号对应的数据传输到终端的指令;
    从所述服务器处接收第一账号对应的数据;
    在检测到发生数据更新后,将更新后的数据上传至所述服务器中与第二账号对应的存储空间,所述更新后的数据包含所述第一账号对应的数据。
  14. 一种存储介质,其上存储有计算机程序,其中,当所述计算机程序在计算机上执行时,使得所述计算机执行如权利要求1至7中任一项所述的数据备份的方法。
  15. 一种电子设备,包括存储器,处理器,其中,所述处理器通过调用所述存储器中存储的计算机程序,用于执行如下步骤:
    当第一账号登录时,获取电子设备的用户身份识别卡信息;
    若根据所述用户身份识别卡信息,判断出电子设备的用户身份识别卡由与第一账号关联的第一用户身份识别卡变更为第二用户身份识别卡,则注册得到与第二用户身份识别卡相关联的第二账号;
    执行预设数据备份进程,以使第一账号对应的数据备份到第二账号;
    发送删除指令到第一账号对应的服务器,所述删除指令用于指示所述服务器删除第一账号对应的数据。
  16. 根据权利要求15所述的电子设备,其中,所述处理器用于执行:
    发送注销指令到第一账号对应的服务器,所述注销指令用于指示所述服务器注销第一账号。
  17. 根据权利要求16所述的电子设备,其中,所述处理器用于执行:
    获取第一账号对应的第一验证信息,以及第二用户身份识别卡对应的第二验证信息;
    若判断出所述第一验证信息与第二验证信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
  18. 根据权利要求17所述的电子设备,其中,所述处理器用于执行:
    获取第一账号对应的第一用户指纹信息,以及第二用户身份识别卡对应的第二用户指纹信息;
    若判断出所述第一用户指纹信息与第二用户指纹信息相匹配,则注册得到与所述第二用户身份识别卡相关联的第二账号。
  19. 根据权利要求18所述的电子设备,其中,所述处理器用于执行:
    执行预设数据备份进程,并按照预设数据备份进程,发送备份指令到第一账号对应的服务器,所述备份指令用于指示所述服务器将第一账号对应的数据备份到第二账号。
  20. 根据权利要求18所述的电子设备,其中,所述处理器用于执行:
    按照预设数据备份进程,向服务器发送用于指示所述服务器将第一账号对应的数据传输到电子设备的指令;
    从所述服务器处接收第一账号对应的数据;
    在检测到发生数据更新后,将更新后的数据上传至所述服务器中与第二账号对应的存储空间,所述更新后的数据包含所述第一账号对应的数据。
PCT/CN2017/094979 2016-10-25 2017-07-28 数据备份的方法、装置、存储介质及电子设备 WO2018076844A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP17863630.4A EP3509270B1 (en) 2016-10-25 2017-07-28 Data backup method and device, storage medium and electronic apparatus
US16/318,252 US10542422B2 (en) 2016-10-25 2017-07-28 Data backup method, storage medium and electronic device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610949322.XA CN106550031B (zh) 2016-10-25 2016-10-25 数据备份的方法及装置
CN201610949322.X 2016-10-25

Publications (1)

Publication Number Publication Date
WO2018076844A1 true WO2018076844A1 (zh) 2018-05-03

Family

ID=58393107

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/094979 WO2018076844A1 (zh) 2016-10-25 2017-07-28 数据备份的方法、装置、存储介质及电子设备

Country Status (4)

Country Link
US (1) US10542422B2 (zh)
EP (1) EP3509270B1 (zh)
CN (1) CN106550031B (zh)
WO (1) WO2018076844A1 (zh)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550031B (zh) * 2016-10-25 2019-07-23 Oppo广东移动通信有限公司 数据备份的方法及装置
US10999721B2 (en) * 2016-11-30 2021-05-04 Huawei Technologies Co., Ltd. Communication identifier binding processing method and terminal
CN106973378A (zh) * 2017-03-30 2017-07-21 上海与德科技有限公司 一种登录名变更方法、移动终端、服务器及系统
CN109067730B (zh) * 2018-07-26 2021-05-18 北京小米移动软件有限公司 管理用户帐号的方法及装置
CN109410900B (zh) * 2018-09-04 2022-06-21 Oppo广东移动通信有限公司 音效处理方法、装置以及电子设备
CN110471793B (zh) * 2019-07-18 2022-05-06 维沃移动通信有限公司 数据备份方法、数据恢复方法、第一终端及第二终端
CN111447221B (zh) * 2020-03-26 2022-07-19 支付宝(杭州)信息技术有限公司 使用生物特征核实身份的方法和系统
US11914731B1 (en) * 2020-09-29 2024-02-27 Amazon Technologies, Inc. Cross-boundary data backup background
US20220131848A1 (en) * 2020-10-26 2022-04-28 Micron Technology, Inc. Management of Identifications of an Endpoint having a Memory Device Secured for Reliable Identity Validation
CN116723203B (zh) * 2022-10-10 2024-04-19 荣耀终端有限公司 数据备份方法、数据恢复方法及电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118087A (zh) * 2013-01-22 2013-05-22 Tcl集团股份有限公司 一种移动通信终端及其数据保护方法、系统
CN103152402A (zh) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 通过移动终端进行登录的方法与系统以及云端服务器
CN104902463A (zh) * 2015-05-22 2015-09-09 努比亚技术有限公司 移动终端及其虚拟卡终端的多卡管理方法和服务器
US20160073258A1 (en) * 2014-09-10 2016-03-10 Kabushiki Kaisha Toshiba Mobile electronic device
CN106550031A (zh) * 2016-10-25 2017-03-29 广东欧珀移动通信有限公司 数据备份的方法及装置

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW577247B (en) * 2001-08-30 2004-02-21 Axisoft Technologies Inc Subscriber identification module card backup system
FR2870412B1 (fr) * 2004-05-13 2006-09-15 Gemplus Sa Transfert de donnees entre deux cartes a puce
CN100490480C (zh) * 2005-08-24 2009-05-20 中国移动通信集团公司 处理用户标识更改的方法
JP4972028B2 (ja) * 2008-04-24 2012-07-11 株式会社日立製作所 コンテンツ転送システムとその方法、並びにホームサーバ
CN102176775A (zh) * 2011-01-27 2011-09-07 上海恒途信息科技有限公司 一种智能配置装置及方法
CN104468557A (zh) 2014-12-02 2015-03-25 华为软件技术有限公司 应用账号安全保护方法和装置
CN105898744B (zh) * 2016-03-23 2019-06-11 宇龙计算机通信科技(深圳)有限公司 一种信息管理方法及相关设备
CN105959293B (zh) * 2016-06-17 2019-06-21 阿里巴巴集团控股有限公司 电子账号的管理方法和装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118087A (zh) * 2013-01-22 2013-05-22 Tcl集团股份有限公司 一种移动通信终端及其数据保护方法、系统
CN103152402A (zh) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 通过移动终端进行登录的方法与系统以及云端服务器
US20160073258A1 (en) * 2014-09-10 2016-03-10 Kabushiki Kaisha Toshiba Mobile electronic device
CN104902463A (zh) * 2015-05-22 2015-09-09 努比亚技术有限公司 移动终端及其虚拟卡终端的多卡管理方法和服务器
CN106550031A (zh) * 2016-10-25 2017-03-29 广东欧珀移动通信有限公司 数据备份的方法及装置

Also Published As

Publication number Publication date
US10542422B2 (en) 2020-01-21
EP3509270B1 (en) 2021-01-13
US20190174302A1 (en) 2019-06-06
CN106550031B (zh) 2019-07-23
EP3509270A1 (en) 2019-07-10
CN106550031A (zh) 2017-03-29
EP3509270A4 (en) 2019-09-11

Similar Documents

Publication Publication Date Title
WO2018076844A1 (zh) 数据备份的方法、装置、存储介质及电子设备
WO2018076841A1 (zh) 数据分享方法、装置、存储介质及服务器
WO2019172641A1 (en) Electronic device and method for managing electronic key thereof
WO2017067286A1 (zh) 一种指纹模板更新方法、装置及终端
WO2014040501A1 (zh) 一种动态口令的生成及认证方法与系统
WO2018076867A1 (zh) 数据备份的删除方法、装置、系统、存储介质和服务器
WO2018082142A1 (zh) 一种录屏方法以及装置
WO2018076865A1 (zh) 数据分享方法、装置、存储介质及电子设备
WO2018076861A1 (zh) 数据传输的控制方法、装置、存储介质、服务器及系统
WO2018090823A1 (zh) 一种系统分区关键数据的保护方法及系统、终端
WO2018233352A1 (zh) 数据传输方法、装置、终端以及计算机可读存储介质
WO2018076881A1 (zh) 数据同步方法、装置、存储介质及服务器
WO2017092498A1 (zh) 一种信息管理方法及用户终端
WO2016123926A1 (zh) 一种基于远程控制的sim卡终端管理方法及系统
WO2019124826A1 (ko) 펌웨어를 업데이트하는 인터페이스 장치, 모바일 장치 및 펌웨어 업데이트 방법
WO2018190637A1 (ko) 디바이스의 통신 연결 방법 및 그 장치
WO2018076829A1 (zh) 终端数据的处理方法、装置、系统、存储介质及服务器
WO2018076870A1 (zh) 数据处理方法、装置、存储介质、服务器及数据处理系统
WO2015126037A1 (ko) 일회용 랜덤키를 이용한 본인 확인 및 도용 방지 시스템 및 방법
WO2018076863A1 (zh) 数据存储的方法、装置、存储介质、服务器及系统
WO2018161580A1 (zh) 广播的控制方法、装置、存储介质及电子设备
WO2018076888A1 (zh) 移动终端数据的同步方法、装置及系统、存储介质及移动终端
WO2020091525A1 (ko) 생체 인증을 이용한 결제 방법 및 그 전자 장치
WO2017206879A1 (zh) 一种移动终端应用程序的处理方法、装置、存储介质及电子设备
WO2018161576A1 (zh) 一种广播的控制方法、装置、存储介质及移动终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17863630

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2017863630

Country of ref document: EP

Effective date: 20190402

NENP Non-entry into the national phase

Ref country code: DE