CN106469028B - A kind of data migration method and mobile terminal - Google Patents

A kind of data migration method and mobile terminal Download PDF

Info

Publication number
CN106469028B
CN106469028B CN201610826085.8A CN201610826085A CN106469028B CN 106469028 B CN106469028 B CN 106469028B CN 201610826085 A CN201610826085 A CN 201610826085A CN 106469028 B CN106469028 B CN 106469028B
Authority
CN
China
Prior art keywords
terminal
data
authentication information
interface
migrated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610826085.8A
Other languages
Chinese (zh)
Other versions
CN106469028A (en
Inventor
陆天洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610826085.8A priority Critical patent/CN106469028B/en
Publication of CN106469028A publication Critical patent/CN106469028A/en
Priority to PCT/CN2017/092249 priority patent/WO2018049884A1/en
Application granted granted Critical
Publication of CN106469028B publication Critical patent/CN106469028B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/061Improving I/O performance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0647Migration mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of data migration method and mobile terminals, comprising: first terminal establishes the communication connection with second terminal;The first terminal shows that authentication interface, the authentication interface are used to input the first authentication information for user in the display interface;When the first authentication information for detecting user's input is matched with the second authentication information prestored, data to be migrated are sent to the second terminal by the first terminal, so that the second terminal receives and stores the data to be migrated.The embodiment of the present invention is conducive to be promoted the safety in data migration process of mobile terminal.

Description

A kind of data migration method and mobile terminal
Technical field
The present invention relates to technical field of mobile terminals, and in particular to a kind of data migration method and mobile terminal.
Background technique
With the development of mobile terminal technology, mobile phone has become essential a part in people's life.And with The frequency of the hand-off machine of people be getting faster, how by user data (such as application program used in everyday, the weight in old mobile phone The chat record and document wanted, all Wi-Fi passwords connected etc.) being transferred to have become in new cell-phone and urgently solve quickly and efficiently Hot issue certainly.
In the prior art, have part mobile phone and support the quick unloading of data, such as mobile phone removal of home function, mobile phone removal of home is by one On Data Migration to another mobile phone in platform mobile phone.In the prior art, old mobile phone can directly move data after unlock It moves on on another mobile phone, but there is a certain security risk for the above process, be easy to cause leaking data.
Summary of the invention
The embodiment of the invention provides a kind of data migration method and mobile terminal, to promoted mobile terminal in data Safety in transition process.
In a first aspect, the embodiment of the present invention provides a kind of data migration method, comprising:
First terminal establishes the communication connection with second terminal;
The first terminal shows that authentication interface, the authentication interface are used for for the first mirror of user's input in the display interface Weigh information;
When the first authentication information for detecting user's input is matched with the second authentication information prestored, the first terminal will Data to be migrated are sent to the second terminal, so that the second terminal receives and stores the data to be migrated.
As can be seen that relative to mobile terminal in existing scheme directly by Data Migration to the scheme of another mobile terminal, Data migration method provided in an embodiment of the present invention, first terminal initially set up the communication connection with second terminal, then, aobvious Show and show authentication interface on interface, the authentication interface is used to input the first authentication information for user, finally, defeated in detection user When the first authentication information entered is matched with the second authentication information prestored, data to be migrated are just sent to institute by the first terminal Second terminal is stated, so that the second terminal receives and stores the data to be migrated.As it can be seen that mobile terminal is moved in progress data It before shifting, needs to authenticate user, after only the authentication is passed, can just execute data migration operation, to be conducive to be promoted The safety of the Data Migration of mobile terminal.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of structural schematic diagram of network architecture disclosed by the embodiments of the present invention;
Fig. 2 is a kind of flow diagram of data migration method disclosed by the embodiments of the present invention;
Fig. 3 is the flow diagram of another data migration method disclosed by the embodiments of the present invention;
Fig. 4 is the flow diagram of another data migration method disclosed by the embodiments of the present invention;
Fig. 5 is a kind of unit composition block diagram of mobile terminal disclosed by the embodiments of the present invention;
Fig. 6 is a kind of structural schematic diagram of mobile terminal disclosed by the embodiments of the present invention;
Fig. 7 is the structural schematic diagram of another mobile terminal disclosed by the embodiments of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
In order to be best understood from a kind of data migration method and mobile terminal disclosed by the embodiments of the present invention, below to the present invention Embodiment describes in detail.
In order to be best understood from a kind of data migration method and mobile terminal disclosed by the embodiments of the present invention, below first to this hair The applicable network architecture of bright embodiment is described.Referring to Fig. 1, Fig. 1 is a kind of network architecture disclosed by the embodiments of the present invention Structural schematic diagram.As shown in Figure 1, the network architecture schematic diagram may include first terminal and second terminal, wherein described One terminal and second terminal can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, a number Word assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer.Wherein, first terminal can be with It is communicatively coupled by network and second terminal.
Based on network architecture shown in FIG. 1, the embodiment of the invention discloses a kind of data migration method.Referring to Fig. 2, Fig. 2 is the embodiment of the invention provides a kind of data migration method, as shown, notebook data moving method includes:
S101, first terminal establish the communication connection with second terminal.
Wherein, the first terminal is established may is that with the specific implementation of the communication connection of second terminal
First terminal two-dimensional code display on the display interface, the two dimensional code are scanned for the second terminal The hot spot mark and the hot spot for obtaining the hotspot of the first terminal creation afterwards identify corresponding encrypted message, and are based on The hot spot mark and the encrypted message establish the communication connection with the first terminal, wherein the two dimensional code includes institute The hot spot mark and the hot spot for stating the hotspot of first terminal creation identify corresponding encrypted message.
It may also is that alternatively, the first terminal is established with the specific implementation of the communication connection of second terminal
The first terminal establishes the communication connection with the second terminal based on short-distance wireless communication technology, wherein The short-distance wireless communication technology includes NFC (Near Field Communication) mechanics of communication, ZigBee communication skill One of art and bluetooth (Bluetooth) mechanics of communication or combination.
It should be understood that above two first terminal establishes the implementation with the communication connection of second terminal, Ke Yishi Now without using Data Migration is realized in the case where common network, the safety of Data Migration can be further promoted.
S102, the first terminal show that authentication interface, the authentication interface are used to input for user in the display interface First authentication information.
The first authentication information that S103, first terminal detection user input is matched with the second authentication information prestored.
S104, detect user input the first authentication information matched with the second authentication information prestored when, described first Data to be migrated are sent to the second terminal by terminal.
S105, the second terminal receive and store the data to be migrated.
Wherein, the specific implementation that data to be migrated are sent to the second terminal is by the first terminal:
The first terminal determines the data to be migrated, wherein the data to be migrated comprise at least one of the following: logical Interrogate record, privacy multi-medium data, browser privacy information, account number cipher information and chat record;
The data to be migrated are sent to institute based on the communication connection established with the second terminal by the first terminal State second terminal.
As can be seen that relative to mobile terminal in existing scheme directly by Data Migration to the scheme of another mobile terminal, Data migration method provided in an embodiment of the present invention, first terminal initially set up the communication connection with second terminal, then, aobvious Show and show authentication interface on interface, the authentication interface is used to input the first authentication information for user, finally, defeated in detection user When the first authentication information entered is matched with the second authentication information prestored, data to be migrated are just sent to institute by the first terminal Second terminal is stated, so that the second terminal receives and stores the data to be migrated.As it can be seen that mobile terminal is moved in progress data It before shifting, needs to authenticate user, after only the authentication is passed, can just execute data migration operation, to be conducive to be promoted The safety of the Data Migration of mobile terminal.
Optionally, the first terminal is established after the communication connection with second terminal, and the first terminal is on display circle Before showing authentication interface on face, following operation is can also be performed in the first terminal:
The first terminal detects whether there is second authentication information prestored;
If the first terminal detects the presence of second authentication information prestored, execution is described in the display interface The step of showing authentication interface;
If the first terminal detects that the first terminal, which is shown, to be set there is no second authentication information prestored Interface is set, the set interface is used to input second authentication information for user;
The first terminal obtains and saves second authentication information of user's input.
It is consistent with above-mentioned embodiment shown in Fig. 2, referring to Fig. 3, Fig. 3 is another number provided in an embodiment of the present invention According to the flow diagram of moving method.As shown, notebook data moving method includes:
S201, the first terminal two-dimensional code display on the display interface.
The hot spot mark of the hotspot of first terminal creation and described is obtained after S202, second terminal scanning Hot spot identifies corresponding encrypted message, and is established based on hot spot mark and the encrypted message and led to the first terminal Letter connection, wherein the two dimensional code includes the hot spot mark and hot spot mark of the hotspot of the first terminal creation Corresponding encrypted message.
S203, the first terminal detect whether there is second authentication information prestored.
Wherein, if the first terminal detects the presence of second authentication information prestored, S204 is thened follow the steps extremely S210;
If the first terminal is detected there is no second authentication information prestored, S206 is thened follow the steps extremely S210。
If S204, the first terminal detect that there is no second authentication information prestored, the first terminals Show that set interface, the set interface are used to input second authentication information for user.
S205, the first terminal obtain and save second authentication information of user's input.
S206, the first terminal show that authentication interface, the authentication interface are used to input for user in the display interface First authentication information.
The first authentication information that S207, first terminal detection user input is matched with the second authentication information prestored.
S208, detect user input the first authentication information matched with the second authentication information prestored when, described first Terminal determines the data to be migrated, wherein the data to be migrated comprise at least one of the following: address list, privacy multimedia Data, browser privacy information, account number cipher information and chat record.
S209, the first terminal send the data to be migrated based on the communication connection established with the second terminal To the second terminal.
S210, the second terminal receive and store the data to be migrated.
As can be seen that relative to mobile terminal in existing scheme directly by Data Migration to the scheme of another mobile terminal, Data migration method provided in an embodiment of the present invention, first terminal initially set up the communication connection with second terminal, then, aobvious Show and show authentication interface on interface, the authentication interface is used to input the first authentication information for user, finally, defeated in detection user When the first authentication information entered is matched with the second authentication information prestored, data to be migrated are just sent to institute by the first terminal Second terminal is stated, so that the second terminal receives and stores the data to be migrated.As it can be seen that mobile terminal is moved in progress data It before shifting, needs to authenticate user, after only the authentication is passed, can just execute data migration operation, to be conducive to be promoted The safety of the Data Migration of mobile terminal.
It is consistent with above-mentioned Fig. 2 and embodiment shown in Fig. 3, referring to Fig. 4, Fig. 4 is provided in an embodiment of the present invention another A kind of flow diagram of data migration method.As shown, notebook data moving method includes:
S301, the first terminal establish the communication connection with the second terminal based on short-distance wireless communication technology, Wherein, the short-distance wireless communication technology includes one in NFC mechanics of communication, ZigBee mechanics of communication and blue-tooth technology Kind or combination.
S302, the first terminal detect whether there is second authentication information prestored;
Wherein, if the first terminal detects the presence of second authentication information prestored, S305 is thened follow the steps extremely S309;
If the first terminal is detected there is no second authentication information prestored, S303 is thened follow the steps extremely S309。
If S303, the first terminal detect that there is no second authentication information prestored, the first terminals Show that set interface, the set interface are used to input second authentication information for user;
S304, the first terminal obtain and save second authentication information of user's input.
S305, the first terminal show that authentication interface, the authentication interface are used to input for user in the display interface First authentication information.
The first authentication information that S306, first terminal detection user input is matched with the second authentication information prestored.
S307, detect user input the first authentication information matched with the second authentication information prestored when, described first Terminal determines the data to be migrated, wherein the data to be migrated comprise at least one of the following: address list, privacy multimedia Data, browser privacy information, account number cipher information and chat record.
S308, the first terminal send the data to be migrated based on the communication connection established with the second terminal To the second terminal.
S309, the second terminal receive and store the data to be migrated.
As can be seen that relative to mobile terminal in existing scheme directly by Data Migration to the scheme of another mobile terminal, Data migration method provided in an embodiment of the present invention, first terminal initially set up the communication connection with second terminal, then, aobvious Show and show authentication interface on interface, the authentication interface is used to input the first authentication information for user, finally, defeated in detection user When the first authentication information entered is matched with the second authentication information prestored, data to be migrated are just sent to institute by the first terminal Second terminal is stated, so that the second terminal receives and stores the data to be migrated.As it can be seen that mobile terminal is moved in progress data It before shifting, needs to authenticate user, after only the authentication is passed, can just execute data migration operation, to be conducive to be promoted The safety of the Data Migration of mobile terminal.
The following is an embodiment of the apparatus of the present invention, and apparatus of the present invention embodiment is realized for executing embodiment of the present invention method Method.As shown in figure 5, the mobile terminal may include communication unit 401, display unit 402, migration units 403, in which:
The communication unit 401, for establishing and the communication connection of second terminal;
The display unit 402, for showing that authentication interface, the authentication interface are used for defeated for user in the display interface Enter the first authentication information;
The migration units 403, in the first authentication information for detecting user's input and the second authentication information prestored When matching, data to be migrated are sent to the second terminal, so that the second terminal receives and stores the number to be migrated According to.
Optionally, the communication unit 402 is specifically used for two-dimensional code display, the two dimensional code on the display interface For obtaining the hot spot mark and hot spot mark of the hotspot of the first terminal creation after second terminal scanning Corresponding encrypted message, and the communication connection with the first terminal is established based on hot spot mark and the encrypted message, Wherein, the two dimensional code include the hotspot of first terminal creation hot spot mark and hot spot mark it is corresponding close Code information.
Optionally, the communication unit 402 is specifically used for establishing with described second eventually based on short-distance wireless communication technology The communication connection at end, wherein the short-distance wireless communication technology includes NFC mechanics of communication, ZigBee mechanics of communication and bluetooth One of mechanics of communication or combination.
Optionally, the mobile terminal further include:
Detection unit 404, after the communication unit 401 establishes the communication connection with second terminal, the display is single Before member 402 shows authentication interface in the display interface, for detecting whether the second authentication information prestored in the presence of described in;
Trigger unit 405, if detecting the presence of second authentication information prestored for the detection unit 404, It triggers the display unit 402 and executes the operation for showing authentication interface in the display interface;
Setting unit 406, if detecting that there is no second authentication information prestored, displays for the detection unit Set interface, the set interface are used to input second authentication information for user;It obtains and saves the described of user's input Second authentication information.
Optionally, the migration units 403 are specifically used for determining the data to be migrated, wherein the data to be migrated It comprises at least one of the following: address list, privacy multi-medium data, browser privacy information, account number cipher information and chat record; The data to be migrated are sent to the second terminal based on the communication connection established with the second terminal.
It should be noted that mobile terminal described in apparatus of the present invention embodiment is presented in the form of functional unit. Term " unit " used herein above should be understood as meaning as widest as possible, for realizing function described by each " unit " Object for example can be integrated circuit ASIC, single circuit, for executing the processing of one or more softwares or firmware program Device (shared, dedicated or chipset) and memory, combinational logic circuit, and/or other conjunctions for realizing above-mentioned function are provided Suitable component.
For example, communication unit 401 described above is established and the function of the communication connection of second terminal can be by Fig. 6 institute The mobile terminal shown realizes, specifically can by processor 101 by calling the executable program code in memory 102, Establish the communication connection with second terminal.
As can be seen that relative to mobile terminal in existing scheme directly by Data Migration to the scheme of another mobile terminal, Data migration method provided in an embodiment of the present invention, first terminal initially set up the communication connection with second terminal, then, aobvious Show and show authentication interface on interface, the authentication interface is used to input the first authentication information for user, finally, defeated in detection user When the first authentication information entered is matched with the second authentication information prestored, data to be migrated are just sent to institute by the first terminal Second terminal is stated, so that the second terminal receives and stores the data to be migrated.As it can be seen that mobile terminal is moved in progress data It before shifting, needs to authenticate user, after only the authentication is passed, can just execute data migration operation, to be conducive to be promoted The safety of the Data Migration of mobile terminal.
The embodiment of the invention also provides another mobile terminals, as shown in Figure 6, comprising: processor 101, memory 102, communication interface 103 and communication bus 104;Wherein, processor 101, memory 102 and communication interface 103 are total by communication Line 104 connects and completes mutual communication;The channel radio that processor 101 passes through communication interface 103 control and External cell net Letter;Communication interface 103 includes but is not limited to antenna, amplifier, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplexer etc..Memory 102 comprises at least one of the following: random access memory, non- Volatile memory and external memory are stored with executable program code in memory 102, the executable program code energy Enough bootstrap processors 101 execute the data migration method specifically disclosed in embodiment of the present invention method, comprising the following steps:
The processor 101 establishes the communication connection with second terminal;
The processor 101 shows that authentication interface, the authentication interface are used for for user's input first in the display interface Authentication information;
When the first authentication information for detecting user's input is matched with the second authentication information prestored, the processor 101 Data to be migrated are sent to the second terminal, so that the second terminal receives and stores the data to be migrated.
Optionally, the processor 101 establish with second terminal communicate to connect specific implementation may is that
First terminal two-dimensional code display on the display interface, the two dimensional code are scanned for the second terminal The hot spot mark and the hot spot for obtaining the hotspot of the first terminal creation afterwards identify corresponding encrypted message, and are based on The hot spot mark and the encrypted message establish the communication connection with the first terminal, wherein the two dimensional code includes institute The hot spot mark and the hot spot for stating the hotspot of first terminal creation identify corresponding encrypted message.
Optionally, the processor 101 establish with second terminal communicate to connect specific implementation may is that
The first terminal establishes the communication connection with the second terminal based on short-distance wireless communication technology, wherein The short-distance wireless communication technology include one of NFC mechanics of communication, ZigBee mechanics of communication and blue-tooth technology or Person's combination.
Optionally, the processor 101 is established after the communication connection with second terminal, shows authentication in the display interface Before interface, it can also detect whether there is second authentication information prestored;If detecting the presence of second prestored Authentication information then executes described the step of showing authentication interface in the display interface;If detecting, there is no the prestored Two authentication informations then show that set interface, the set interface are used to input second authentication information for user;It obtains and protects Deposit second authentication information of user's input.
Optionally, the specific implementation that data to be migrated are sent to the second terminal by the processor 101 can be with It is:
The processor 101 determines the data to be migrated, wherein the data to be migrated comprise at least one of the following: Address list, privacy multi-medium data, browser privacy information, account number cipher information and chat record;
The data to be migrated are sent to institute based on the communication connection established with the second terminal by the processor 101 State second terminal.
As can be seen that relative to mobile terminal in existing scheme directly by Data Migration to the scheme of another mobile terminal, Data migration method provided in an embodiment of the present invention, first terminal initially set up the communication connection with second terminal, then, aobvious Show and show authentication interface on interface, the authentication interface is used to input the first authentication information for user, finally, defeated in detection user When the first authentication information entered is matched with the second authentication information prestored, data to be migrated are just sent to institute by the first terminal Second terminal is stated, so that the second terminal receives and stores the data to be migrated.As it can be seen that mobile terminal is moved in progress data It before shifting, needs to authenticate user, after only the authentication is passed, can just execute data migration operation, to be conducive to be promoted The safety of the Data Migration of mobile terminal.
In addition, the executable program code stored in above-mentioned memory 102 is also used to execute above-mentioned Fig. 2, Fig. 3 and Fig. 4 institute The correlation step of the data migration method shown.The first authentication information that user inputs and second prestored authentication are being detected as executed When information matches, data to be migrated are sent to the second terminal so that the second terminal receive and store it is described wait move The step of moving data, etc..
The embodiment of the invention also provides another mobile terminals, as shown in fig. 7, for ease of description, illustrate only with The relevant part of the embodiment of the present invention, it is disclosed by specific technical details, please refer to present invention method part.The movement Terminal can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS Any terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, by taking mobile terminal is mobile phone as an example:
Fig. 7 shows the block diagram of the part-structure of mobile phone relevant to mobile terminal provided in an embodiment of the present invention.Ginseng Fig. 7 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 910, memory 920, input unit 930, display unit 940, sensor 950, voicefrequency circuit 960, Wireless Fidelity (wireless fidelity, WiFi) module 970, processor 980, And the equal components of power supply 990.It will be understood by those skilled in the art that handset structure shown in Fig. 7 is not constituted to mobile phone It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 7 to mobile phone:
RF circuit 910 can be used for sending and receiving for information.In general, RF circuit 910 includes but is not limited to antenna, at least one A amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 910 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code it is point more Location (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 920 can be used for storing software program and module, and processor 980 is stored in memory 920 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 920 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (control instruction obtains function, audio stream playing function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone Data (such as global audio example, global sound effect parameters, application level audio example, application level sound effect parameters etc.) etc.. It can also include nonvolatile memory in addition, memory 920 may include high-speed random access memory, for example, at least one A disk memory, flush memory device or other volatile solid-state parts.
Input unit 930 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 930 may include fingerprint recognition mould group 931 and other are defeated Enter equipment 932.Fingerprint recognition mould group 931 can acquire the finger print data of user on it.Optionally, fingerprint recognition mould group 931 can Including optical fingerprint module, capacitance type fingerprint module and RF type fingerprint module.It is condenser type with fingerprint recognition mould group 931 For fingerprint recognition mould group, specifically include induction electrode (abnormal induction electrode and normal induction electrode) and with the induction electrode The signal processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.) of connection.In addition to fingerprint recognition mould Group 931, input unit 930 can also include other input equipments 932.Specifically, other input equipments 932 may include but not It is limited to one of physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. Or it is a variety of.
Display unit 940 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 940 may include display screen 941, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Display screen 941.Although fingerprint recognition mould group 931 and display screen 941 are to realize mobile phone as two independent components in Fig. 7 Input and input function, but it is in some embodiments it is possible to fingerprint recognition mould group 931 and display screen 941 is integrated and real Existing mobile phone outputs and inputs function.
Mobile phone may also include at least one sensor 950, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display screen 941, proximity sensor can when mobile phone is moved in one's ear, close display screen 941 and/or Backlight.As a kind of motion sensor, accelerometer sensor can detect all directions on (generally three axis) acceleration it is big It is small, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, phase Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 961, be converted to sound by loudspeaker 961 by road 960 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is turned after being received by voicefrequency circuit 960 It is changed to audio data, then by after the processing of audio data output processor 980, such as another mobile phone is sent to through RF circuit 910, Or audio data is exported to memory 920 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 970 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 7 is shown WiFi module 970, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 980 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 920, and call and be stored in memory 920 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 980 can wrap Include one or more processing units;Preferably, processor 980 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 980.
Mobile phone further includes the power supply 990 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 980 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In earlier figures 2, Fig. 3 and embodiment shown in Fig. 4, each step method process can be based on the structure reality of the mobile phone It is existing.
In aforementioned embodiment shown in fig. 5, each unit function can be realized based on the structure of the mobile phone.
The embodiment of the present invention also provides a kind of computer storage medium, wherein the computer storage medium can be stored with journey Sequence, the program include some or all of any data migration method recorded in above method embodiment step when executing Suddenly.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, It can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention Step.And memory above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory May include: flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random access device (English: Random Access Memory, referred to as: RAM), disk or CD etc..
The embodiment of the present invention has been described in detail above, specific case used herein to the principle of the present invention and Embodiment is expounded, and the above description of the embodiment is only used to help understand the method for the present invention and its core ideas; At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the present invention There is change place, in conclusion the contents of this specification are not to be construed as limiting the invention.

Claims (6)

1. a kind of data migration method characterized by comprising
First terminal establishes the communication connection with second terminal;
The first terminal establishes the communication connection with second terminal, comprising: the first terminal shows two in the display interface Tie up code, the hot spot mark of hotspot of the two dimensional code for obtaining the first terminal creation after second terminal scanning Corresponding encrypted message is identified with the hot spot, and is established with described first eventually based on hot spot mark and the encrypted message The communication connection at end, wherein the two dimensional code includes the hot spot mark and the heat of the hotspot of the first terminal creation The corresponding encrypted message of point identification;
The first terminal detects whether there is the second authentication information prestored;
If the first terminal detects the presence of second authentication information prestored, the first terminal is shown in the display interface Show that authentication interface, the authentication interface are used to input the first authentication information for user;
When the first authentication information for detecting user's input is matched with the second authentication information that the first terminal prestores, described the Data to be migrated are sent to the second terminal by one terminal, so that the second terminal receives and stores the number to be migrated According to;
If the first terminal detects that there is no second authentication information prestored, the first terminal display setting circles Face, the set interface are used to input second authentication information for user;
The first terminal obtains and saves second authentication information of user's input.
2. the method as described in claim 1, which is characterized in that data to be migrated are sent to described second by the first terminal Terminal, comprising:
The first terminal determines the data to be migrated, wherein the data to be migrated comprise at least one of the following: communication Record, privacy multi-medium data, browser privacy information, account number cipher information and chat record;
The data to be migrated are sent to described based on the communication connection established with the second terminal by the first terminal Two terminals.
3. a kind of mobile terminal characterized by comprising
Communication unit, for establishing and the communication connection of second terminal;Specifically on the display interface of the mobile terminal Two-dimensional code display, the heat of hotspot of the two dimensional code for obtaining the mobile terminal creation after second terminal scanning Point identification and the hot spot identify corresponding encrypted message, and based on hot spot mark and encrypted message foundation with it is described The communication connection of mobile terminal, wherein the two dimensional code include the hotspot of mobile terminal creation hot spot mark and The hot spot identifies corresponding encrypted message;
Detection unit, for detecting whether in the presence of the second authentication information prestored;
It is single to trigger display if detecting the presence of second authentication information prestored for the detection unit for trigger unit Member executes the operation for showing authentication interface in the display interface;
Display unit, for showing that authentication interface, the authentication interface are used for for the first authentication of user's input in the display interface Information;
Migration units, the second authentication information for being prestored in the first authentication information of detection user's input and the mobile terminal When matching, data to be migrated are sent to the second terminal, so that the second terminal receives and stores the number to be migrated According to;
Setting unit, if detecting that there is no second authentication information prestored, display setting circles for the detection unit Face, the set interface are used to input second authentication information for user;Obtain and save second mirror of user's input Weigh information.
4. mobile terminal as claimed in claim 3, which is characterized in that
The migration units are specifically used for determining the data to be migrated, wherein the data to be migrated include following at least one Kind: address list, privacy multi-medium data, browser privacy information, account number cipher information and chat record;By the number to be migrated The second terminal is sent to according to based on the communication connection established with the second terminal.
5. a kind of mobile terminal characterized by comprising
Processor, memory, communication interface and communication bus, the processor, the memory and the communication interface pass through The communication bus connects and completes mutual communication;
The memory is stored with executable program code, and the communication interface is for wirelessly communicating;
The processor is used to call the executable program code in the memory, executes as claim 1-2 is any Method described in.
6. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has program instruction, Described program is instructed for executing the method according to claim 1 after calling for computer.
CN201610826085.8A 2016-09-14 2016-09-14 A kind of data migration method and mobile terminal Active CN106469028B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610826085.8A CN106469028B (en) 2016-09-14 2016-09-14 A kind of data migration method and mobile terminal
PCT/CN2017/092249 WO2018049884A1 (en) 2016-09-14 2017-07-07 Data migration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610826085.8A CN106469028B (en) 2016-09-14 2016-09-14 A kind of data migration method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106469028A CN106469028A (en) 2017-03-01
CN106469028B true CN106469028B (en) 2019-04-16

Family

ID=58230216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610826085.8A Active CN106469028B (en) 2016-09-14 2016-09-14 A kind of data migration method and mobile terminal

Country Status (2)

Country Link
CN (1) CN106469028B (en)
WO (1) WO2018049884A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106469028B (en) * 2016-09-14 2019-04-16 Oppo广东移动通信有限公司 A kind of data migration method and mobile terminal
CN110706380A (en) * 2019-09-27 2020-01-17 广东汇泰龙科技股份有限公司 Method and system for quickly cloning intelligent lock
CN111064599B (en) * 2019-11-26 2022-09-06 山东龙帝科技发展有限公司 Method and system for monitoring plug-in migration
CN113515498A (en) * 2020-04-10 2021-10-19 中兴通讯股份有限公司 Data migration method, terminal and computer readable storage medium
CN113836082A (en) * 2020-06-23 2021-12-24 南京酷派软件技术有限公司 Data migration method and device, storage medium and server
CN112738910B (en) * 2020-12-30 2023-04-28 维沃移动通信有限公司 Application control method and device and electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104981027B (en) * 2014-05-12 2018-10-02 腾讯科技(深圳)有限公司 Mobile terminal application synchronous method and system
CN104602238B (en) * 2014-05-29 2019-07-16 腾讯科技(深圳)有限公司 A kind of wireless network connecting method, device and system
CN105282824A (en) * 2014-06-03 2016-01-27 中兴通讯股份有限公司 File sharing method based on wireless communication and wireless communication terminal
CN105491113B (en) * 2015-11-25 2019-03-12 小米科技有限责任公司 Moving method, device and terminal
CN106469028B (en) * 2016-09-14 2019-04-16 Oppo广东移动通信有限公司 A kind of data migration method and mobile terminal

Also Published As

Publication number Publication date
CN106469028A (en) 2017-03-01
WO2018049884A1 (en) 2018-03-22

Similar Documents

Publication Publication Date Title
CN106469028B (en) A kind of data migration method and mobile terminal
CN106055962B (en) A kind of solution lock control method and mobile terminal
CN106203035B (en) A kind of data access control method and mobile terminal
CN106778175B (en) Interface locking method and device and terminal equipment
CN106302653B (en) Control authority sharing method of access control terminal and related equipment
CN106681860B (en) A kind of data back up method and data backup device
CN107071147B (en) Parameter adjusting method and device
CN106446841B (en) A kind of fingerprint template matching order update method and terminal
CN107480489B (en) unlocking control method and related product
CN108156508B (en) Barrage information processing method and device, mobile terminal, server and system
CN106534288B (en) A kind of data transmission method and mobile terminal
US20190080120A1 (en) Unlocking methods and related products
WO2018049881A1 (en) Data migration method and device
CN108834132B (en) Data transmission method and equipment and related medium product
CN106484326B (en) A kind of data transmission processing method and mobile terminal
CN106708633B (en) The method and mobile terminal of increasing terminal WiFi workstation mode closing velocities
WO2018049885A1 (en) Data migration method and device
CN107272985B (en) Notification message processing method and related product
CN106980554B (en) Process processing method and device
CN106529256B (en) A kind of terminal unlock method and mobile terminal
CN106954211B (en) A kind of key wiring method and mobile terminal
CN107092819B (en) Fingerprint input inspection method and device
CN106897164B (en) Fingerprint input control method and device
CN107038414B (en) Fingerprint template synchronization method and device
CN107197086B (en) Unlocking control method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant