CN107277050A - A kind of data processing method, server, terminal and computer-readable recording medium - Google Patents

A kind of data processing method, server, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107277050A
CN107277050A CN201710624080.1A CN201710624080A CN107277050A CN 107277050 A CN107277050 A CN 107277050A CN 201710624080 A CN201710624080 A CN 201710624080A CN 107277050 A CN107277050 A CN 107277050A
Authority
CN
China
Prior art keywords
file destination
terminal
signature code
target signature
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710624080.1A
Other languages
Chinese (zh)
Other versions
CN107277050B (en
Inventor
王保和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710624080.1A priority Critical patent/CN107277050B/en
Publication of CN107277050A publication Critical patent/CN107277050A/en
Application granted granted Critical
Publication of CN107277050B publication Critical patent/CN107277050B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to communication technical field there is provided a kind of data processing method, server, terminal and computer-readable recording medium, cause the slow-footed problem of the connection of terminal and server to solve existing anti-network abduction method.The data processing method of the present invention includes:Access request of the receiving terminal to file destination;According to the access request, the corresponding target data stream of the file destination is obtained, wherein the target data stream includes the data flow of default target signature code and the file destination;The target data stream is sent to the terminal, so as to after target signature code is verified described in the terminal-pair, read the data flow of the file destination.So, when terminal obtains the data flow of file destination, it is not necessary to re-establish network connection with server, improve the connection speed between terminal and server.

Description

A kind of data processing method, server, terminal and computer-readable recording medium
Technical field
The present invention relates to communication technical field, more particularly to a kind of data processing method, server, terminal and computer can Read storage medium.
Background technology
With the rapid development of Internet, user is increasing to the demand of internet, the thing followed is various networks The phenomenon of abduction.For example, user downloads A application programs, opening is later discovered that it is B application programs;User needs to access A websites, But B websites etc. are jumped to after opening.These phenomenons are all the phenomenons that network is kidnapped.
At present, kidnap phenomenon for network and there are some reply means.Common means include:Use https (Secure Hypertext Transfer Protocol, Secure Hypertext Transfer Protocol) substitute common http (HyperText Transfer Protocol, HTTP);Using the mode repeatedly asked, carried in asking first condition code and Secondary request address, makes terminal access secondary request address, and carry out condition code verification.Can be to anti-network using above-mentioned means Kidnap and produce certain effect, still, while have impact on terminal and the connection speed of server.
It can be seen that, existing anti-network, which kidnaps method, causes the connection speed of terminal and server slow.
The content of the invention
The embodiment of the present invention provides a kind of data processing method, server, terminal and computer-readable recording medium, to solve Certainly existing anti-network, which kidnaps method, causes the slow-footed problem of the connection of terminal and server.
In a first aspect, the embodiments of the invention provide a kind of data processing method, applied to server, data processing method Including:
Access request of the receiving terminal to file destination;
According to the access request, the corresponding target data stream of the file destination is obtained, wherein the target data stream Include the data flow of default target signature code and the file destination;
The target data stream is sent to the terminal, so that after target signature code is verified described in the terminal-pair, Read the data flow of the file destination.
Second aspect, the embodiments of the invention provide a kind of server, including:
Receiving module, for access request of the receiving terminal to file destination;
Acquisition module, for the access request received according to the receiving module, obtains the file destination correspondence Target data stream, wherein the target data stream includes the data flow of default target signature code and the file destination;
Sending module, for sending the target data stream that the acquisition module is obtained to the terminal, so that described After target signature code is verified described in terminal-pair, the data flow of the file destination is read.
The third aspect, the embodiment of the present invention also provides another server, including:Memory, processor and it is stored in On reservoir and the computer program that can run on a processor, as above institute is realized described in the computing device during computer program Step in the data processing method stated.
Fourth aspect, the embodiment of the present invention also provides another data processing method, applied to terminal, including:
The access request to file destination is sent to server;
The target data stream that the server is sent according to the access request is received, wherein, the target data stream bag Data flow containing default target signature code and file destination;
The target signature code is obtained, and target signature code is verified;
If to target signature code check success, obtaining the data flow of the file destination.
5th aspect, the embodiments of the invention provide a kind of terminal, including:
Sending module, for sending the access request to file destination to server;
Receiving module, for receiving the target data stream that the server is sent according to the access request, wherein, it is described Data flow of the target data stream comprising default target signature code and file destination;
Correction verification module, for obtaining the target signature code that the receiving module is received, and to target signature code Verified;
Acquisition module, if for the correction verification module to target signature code check success, obtaining the target text The data flow of part.
6th aspect, the embodiment of the present invention also provides another terminal, including:Memory, processor and it is stored in storage Realized on device and the computer program that can run on a processor, described in the computing device during computer program as described above Data processing method in step.
7th aspect, the embodiment of the present invention also provides a kind of computer-readable recording medium, it is characterised in that the calculating Computer program is stored on machine readable storage medium storing program for executing, the computer program realizes above-mentioned server side when being executed by processor Step in data processing method, or realize the step in the data processing method of above-mentioned end side.
So, in the embodiment of the present invention, access request of the server receiving terminal to file destination;Please according to the access Ask, obtain the corresponding target data stream of the file destination, wherein the target data stream includes default target signature code With the data flow of the file destination;The target data stream is sent to the terminal, so that target described in the terminal-pair is special Levy after code verified, read the data flow of the file destination.So, when terminal obtains the data flow of file destination, it is not required to Network connection is re-established with server, improve the connection speed between terminal and server.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed for description of the embodiment of the present invention The accompanying drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is the flow chart of the data processing method of server side provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the data processing method of end side provided in an embodiment of the present invention;
Fig. 3 is one of structure chart of server provided in an embodiment of the present invention;
Fig. 4 is one of structure chart of terminal provided in an embodiment of the present invention;
Fig. 5 is the structure chart of the correction verification module in terminal provided in an embodiment of the present invention;
Fig. 6 is the two of the structure chart of terminal provided in an embodiment of the present invention;
Fig. 7 is the three of the structure chart of terminal provided in an embodiment of the present invention;
Fig. 8 is the two of the structure chart of server provided in an embodiment of the present invention;
Fig. 9 is the four of the structure chart of terminal provided in an embodiment of the present invention;
Figure 10 is the five of the structure chart of terminal provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Referring to Fig. 1, Fig. 1 is at the flow chart of data processing method provided in an embodiment of the present invention, the data of the present embodiment Reason method is applied to server.As shown in figure 1, data processing method comprises the following steps:
The access request of step 101, receiving terminal to file destination.
Wherein, access request can be download request or the access request to webpage.Terminal can pass through client Hold to server and send access request, with downloading object file or the corresponding webpage of access target file.
Step 102, according to the access request, the corresponding target data stream of the file destination is obtained, wherein the mesh Mark data flow includes the data flow of default target signature code and the file destination.
Server is received after access request, file destination can be searched in the resource pool of storage, and obtain target text The corresponding target data stream of part.Wherein, target data stream is to include the data flow of default target signature code and source file.Target Condition code can be located at head, afterbody or other positions of target data stream.Preferably, for convenience of reading target signature code, Target signature code can be located at the head of target data stream.So, terminal can first read condition code, and condition code is tested After card, then the data of the file destination after condition code are read, embodiment is simple.
For example, certain installation kit is the file that length is L, and this document is when being stored in server, and length is N+L, wherein, N For the length of target signature code.For this file for including condition code, format error occurs and can not solve if directly using The situation of analysis.It therefore, it can improve the security of file destination by way of adding target signature code in target data stream, with Prevent network from kidnapping.
Above-mentioned target signature code can also dynamically be set, i.e., set by client, and be handed over by client and server Mutually changed.So, the security of file can further be improved.
Step 103, to the terminal target data stream is sent, so that target signature code is carried out described in the terminal-pair After checking, the data flow of the file destination is read.
In the specific implementation, server can send target data stream to the step to terminal, terminal is obtained target data Target signature code in stream, and target signature code is verified.If being proved to be successful, terminal can read the number of file destination According to stream, the file destination is stored, or be shown as page info after the file destination is parsed.
In addition, server can also first send target signature code, after terminal-pair target signature code is proved to be successful, retransmit The data flow of file destination.
Terminal in the embodiment of the present invention can be mobile phone, computer, tablet personal computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital Assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
The data processing method of the embodiment of the present invention, access request of the receiving terminal to file destination;Accessed according to described Request, obtains the corresponding target data stream of the file destination, wherein the target data stream includes default target signature The data flow of code and the file destination;The target data stream is sent to the terminal, so that target described in the terminal-pair After condition code is verified, the data flow of the file destination is read.So, when terminal obtains the data flow of file destination, no Need to re-establish network connection with server, improve the connection speed between terminal and server.And in target data stream Comprising target signature code, file destination can be prevented to be held as a hostage.
Referring to Fig. 2, Fig. 2 is the flow chart of data processing method provided in an embodiment of the present invention.As shown in Fig. 2 being applied to Terminal, data processing method comprises the following steps:
Step 201, send to the access request of file destination to server.
Wherein, access request can be download request or the access request to webpage.Terminal can pass through client Hold to server and send access request, with downloading object file or the corresponding webpage of access target file.
The target data stream that step 202, the reception server are sent according to the access request, wherein, the target Data flow of the data stream packets containing default target signature code and file destination.
Wherein, target data stream can include the data flow of default target signature code and source file.Target signature code can So that afterbody or other positions located at the head of target data stream, can also be located at.Preferably, for convenience of reading target signature Code, target signature code can be located at the head of target data stream.So, terminal can first read condition code, and condition code is entered After row checking, then the data of the file destination after condition code are read, embodiment is simple.
For example, certain installation kit is the file that length is L, and this document is in server storage, and length is N+L, wherein, N For the length of target signature code.For this file for including condition code, format error occurs and can not solve if directly using The situation of analysis.It is thus possible to improve the security of file destination, prevents network from kidnapping phenomenon.It therefore, it can by number of targets The security of file destination is improved according to the mode of stream addition target signature code, to prevent network from kidnapping.
Above-mentioned target signature code can also dynamically be set, i.e., set by client, and be handed over by client and server Mutually changed.So, the security of file can further be improved.
Step 203, the acquisition target signature code, and target signature code is verified.
Terminal is obtained after target data stream, can first obtain the target signature code in target data stream, and to target signature Code is verified.In specific verification, it can be determined that whether target signature code is identical with default check code.If target signature code It is identical with default check code, then to the success of target signature code check;If target signature code is differed with default check code, Verification failure.
Optionally, it is described to the target signature code verify the step of after, methods described also includes:If to institute The failure of target signature code check is stated, then gives up the data flow of the file destination.
In this embodiment, if failing to target signature code check, it can determine that file destination is held as a hostage.Now, Terminal can give up the data flow of file destination.So, when file destination is held as a hostage, the data flow of file destination is not read, So as to improve the security of data.
If step 204, to the target signature code check success, obtain the data flow of the file destination.
After to the success of target signature code check, the data flow of file destination can be obtained after target signature code is removed. If for example, data flow of the corresponding target data stream of file destination comprising N condition codes and L file destinations, wherein N feature Code bit is in the head of data flow.If to N feature code check successes, the number of file destination can be read since N+1 According to so as to obtain the data flow of file destination.
Optionally, when the access request is download request, in the step of the data flow for obtaining the file destination After rapid, methods described also includes:
The data flow of the file destination is stored as file destination.
In this embodiment, terminal can obtain the data flow of file destination, the parsing of the data stream to file destination, from And obtain file destination.In such manner, it is possible to improve the speed of download and download efficiency of file.
Terminal in the embodiment of the present invention can be mobile phone, computer, tablet personal computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital Assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
The data processing method of the embodiment of the present invention, the access request to file destination is sent to server;Receive described The target data stream that server is sent according to the access request, wherein, the target data stream includes default target signature The data flow of code and file destination;The target signature code is obtained, and target signature code is verified;If to the mesh The success of feature code check is marked, then obtains the data flow of the file destination.So, when terminal obtains the data flow of file destination, Network connection need not be re-established with server, improve the connection speed between terminal and server, reduced to server With the loss of terminal.And file destination can be prevented to be held as a hostage comprising target signature code in target data stream.
Referring to Fig. 3, Fig. 3 is the structure chart of server provided in an embodiment of the present invention, as shown in figure 3, server 300 is wrapped Include:Receiving module 301, acquisition module 302 and sending module 303.Wherein, receiving module 301 and acquisition module 302 are connected, and are obtained Modulus block 302 and sending module 303 are connected.
Receiving module 301, for access request of the receiving terminal to file destination;Acquisition module 302, for according to described The access request that receiving module 301 is received, obtains the corresponding target data stream of the file destination, wherein the number of targets Include the data flow of default target signature code and the file destination according to stream;Sending module 303, for being sent out to the terminal The target data stream for sending the acquisition module 302 to obtain, so that after target signature code is verified described in the terminal-pair, Read the data flow of the file destination.
Optionally, the target signature code is located at the head of the target data stream, and the access request is download request.
Server 300 can realize each process that server is realized in the corresponding embodiments of the method for Fig. 1, to avoid weight It is multiple, repeat no more here.
The server 300 of the embodiment of the present invention, access request of the receiving terminal to file destination;Please according to the access Ask, obtain the corresponding target data stream of the file destination, wherein the target data stream includes default target signature code With the data flow of the file destination;The target data stream is sent to the terminal, so that target described in the terminal-pair is special Levy after code verified, read the data flow of the file destination.So, when terminal obtains the data flow of file destination, it is not required to Network connection is re-established with server, improve the connection speed between terminal and server.And wrapped in target data stream Containing target signature code, file destination can be prevented to be held as a hostage.
Referring to Fig. 4, Fig. 4 is the structure chart of terminal provided in an embodiment of the present invention, as shown in figure 4, terminal 400 includes:Hair Module 401, receiving module 402, correction verification module 403 and acquisition module 404 are sent, wherein, sending module 401 and receiving module 402 Connection, receiving module 402 and correction verification module 403 are connected, and correction verification module 403 and acquisition module 404 are connected.
Sending module 401, for sending the access request to file destination to server;Receiving module 402, for receiving The target data stream that the server is sent according to the access request, wherein, the target data stream includes default target The data flow of condition code and file destination;Correction verification module 403, for obtaining the target spy that the receiving module 402 is received Code is levied, and target signature code is verified;Acquisition module 404, if special for 403 pairs of the correction verification module target Code check success is levied, then obtains the data flow of the file destination.
Optionally, as shown in figure 5, the correction verification module 403 includes:Judging submodule 4031, for judging the target Whether condition code is identical with default check code;Determination sub-module 4032, if for target signature code and the default verification Code-phase is same, it is determined that to target signature code check success.
Optionally, as shown in fig. 6, the terminal 400 also includes:Give up module 405, if for target signature code Verification failure, then give up the data flow of the file destination.
Optionally, the target signature code is located at the head of the target data stream.
Optionally, as shown in fig. 7, the access request is download request, the terminal also includes:Memory module 406, is used File destination is stored as in the data flow for the file destination for obtaining the acquisition module 404.
Terminal 400 can realize each process that terminal is realized in the corresponding embodiments of the method for Fig. 2, to avoid repeating, this In repeat no more.
The terminal 400 of the embodiment of the present invention, the access request to file destination is sent to server;Receive the server The target data stream sent according to the access request, wherein, the target data stream includes default target signature code and mesh Mark the data flow of file;The target signature code is obtained, and target signature code is verified;If to the target signature Code check success, then obtain the data flow of the file destination.So, when terminal obtains the data flow of file destination, it is not necessary to Network connection is re-established with server, the connection speed between terminal and server is improved, reduced to server and terminal Loss.And file destination can be prevented to be held as a hostage comprising target signature code in target data stream.
Referring to Fig. 8, Fig. 8 is the structure chart of server provided in an embodiment of the present invention, as shown in figure 8, server 800 is wrapped Include:At least one processor 801, memory 802, at least one network interface 804 and user interface 803.In server 800 Each component is coupled by bus system 805.It is understood that bus system 805 is used to realize the company between these components Connect letter.Bus system 805 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal bus in addition.But It is that for the sake of clear explanation, various buses are all designated as bus system 805 in fig. 8.
Wherein, user interface 803 can include display, keyboard or pointing device (for example, mouse, trace ball (track ball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 802 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable P ROM, EPROM), Electrically Erasable Read Only Memory (Electrically EP ROM, EEPROM) Or flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous D RAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SD RAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SD RAM, ESDRAM), synchronous connect Connect dynamic random access memory (Synch link D RAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 802 of system and method described herein be intended to including but not limited to these With the memory of any other suitable type.
In some embodiments, memory 802 stores following element, can perform module or data structure, or Their subset of person, or their superset:Operating system 8021 and application program 8022.
Wherein, operating system 8021, comprising various system programs, such as ccf layer, core library layer, driving layer, are used for Realize various basic businesses and handle hardware based task.Application program 8022, includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 8022.
In embodiments of the present invention, by calling program or the instruction of the storage of memory 802, specifically, can be application The program stored in program 8022 or instruction, processor 801 are used for:
Access request of the receiving terminal to file destination;According to the access request, the file destination is obtained corresponding Target data stream, wherein the target data stream includes the data flow of default target signature code and the file destination;To The terminal sends the target data stream, so as to after target signature code is verified described in the terminal-pair, read the mesh Mark the data flow of file.
The method that the embodiments of the present invention are disclosed can apply in processor 801, or be realized by processor 801. Processor 801 is probably a kind of IC chip, the disposal ability with signal.In implementation process, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 801 or the instruction of software form.Above-mentioned processing Device 801 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor And software module combination performs completion.Software module can be located at random access memory, and flash memory, read-only storage may be programmed read-only In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at Memory 802, processor 801 reads the information in memory 802, the step of completing the above method with reference to its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combine to realize.Realized for hardware, processing unit can be realized in one or more application specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
Realize, can be realized by performing the module (such as process, function) of function described herein herein for software Described technology.Software code is storable in memory and by computing device.Memory can within a processor or Realized outside processor.
Optionally, the access request is download request, and the target signature code is located at the head of the target data stream.
Server 800 can realize each process that server is realized in previous embodiment, to avoid repeating, here no longer Repeat.
Server 800 in the embodiment of the present invention, access request of the receiving terminal to file destination;Please according to the access Ask, obtain the corresponding target data stream of the file destination, wherein the target data stream includes default target signature code With the data flow of the file destination;The target data stream is sent to the terminal, so that target described in the terminal-pair is special Levy after code verified, read the data flow of the file destination.So, when terminal obtains the data flow of file destination, it is not required to Network connection is re-established with server, improve the connection speed between terminal and server.And wrapped in target data stream Containing target signature code, file destination can be prevented to be held as a hostage.
Referring to Fig. 9, Fig. 9 is the structure chart of terminal provided in an embodiment of the present invention.As shown in figure 9, terminal 900 includes:Extremely A few processor 901, memory 902, at least one network interface 904 and user interface 903.Each group in terminal 900 Part is coupled by bus system 905.It is understood that bus system 905 is used to realize the connection communication between these components. Bus system 905 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal bus in addition.But in order to For the sake of clear explanation, various buses are all designated as bus system 905 in fig .9.
Wherein, user interface 903 can include display, keyboard or pointing device (for example, mouse, trace ball (track ball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 902 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable P ROM, EPROM), Electrically Erasable Read Only Memory (Electrically EP ROM, EEPROM) Or flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous D RAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SD RAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SD RAM, ESDRAM), synchronous connect Connect dynamic random access memory (Synch link D RAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 902 of system and method described herein be intended to including but not limited to these With the memory of any other suitable type.
In some embodiments, memory 902 stores following element, can perform module or data structure, or Their subset of person, or their superset:Operating system 9021 and application program 9022.
Wherein, operating system 9021, comprising various system programs, such as ccf layer, core library layer, driving layer, are used for Realize various basic businesses and handle hardware based task.Application program 9022, includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 9022.
In embodiments of the present invention, by calling program or the instruction of the storage of memory 902, specifically, can be application The program stored in program 9022 or instruction, processor 901 are used for:The access request to file destination is sent to server;Connect The target data stream that the server is sent according to the access request is received, wherein, the target data stream includes default mesh Mark condition code and the data flow of file destination;The target signature code is obtained, and target signature code is verified;If right The target signature code check success, then obtain the data flow of the file destination.
The method that the embodiments of the present invention are disclosed can apply in processor 901, or be realized by processor 901. Processor 901 is probably a kind of IC chip, the disposal ability with signal.In implementation process, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 901 or the instruction of software form.Above-mentioned processing Device 901 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor And software module combination performs completion.Software module can be located at random access memory, and flash memory, read-only storage may be programmed read-only In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at Memory 902, processor 901 reads the information in memory 902, the step of completing the above method with reference to its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combine to realize.Realized for hardware, processing unit can be realized in one or more application specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
Realize, can be realized by performing the module (such as process, function) of function described herein herein for software Described technology.Software code is storable in memory and by computing device.Memory can within a processor or Realized outside processor.
Optionally, processor 901 is additionally operable to read the computer program, performs following steps:Judge that the target is special Whether identical with default check code levy code;If the target signature code is identical with the default check code, it is determined that to the mesh Mark the success of feature code check.
Optionally, processor 901 is additionally operable to read the computer program, performs following steps:If special to the target Code check failure is levied, then gives up the data flow of the file destination.
Optionally, the target signature code is located at the head of the target data stream.
Optionally, when the access request is download request, processor 901 is additionally operable to read the computer program, Perform following steps:The data flow of the file destination is stored as file destination.
Terminal 900 can realize each process that terminal is realized in previous embodiment, to avoid repeating, no longer go to live in the household of one's in-laws on getting married here State.
The terminal 900 of the embodiment of the present invention, the access request to file destination is sent to server;Receive the server The target data stream sent according to the access request, wherein, the target data stream includes default target signature code and mesh Mark the data flow of file;The target signature code is obtained, and target signature code is verified;If to the target signature Code check success, then obtain the data flow of the file destination.So, when terminal obtains the data flow of file destination, it is not necessary to Network connection is re-established with server, the connection speed between terminal and server is improved, reduced to server and terminal Loss.And file destination can be prevented to be held as a hostage comprising target signature code in target data stream.
Referring to Figure 10, Figure 10 is the structure chart of terminal provided in an embodiment of the present invention.Specifically, the terminal 1000 in Figure 10 Can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer etc..
As shown in Figure 10, terminal 1000 include radio frequency (Radio Frequency, RF) circuit 1010, it is memory 1020, defeated Enter unit 1030, display unit 1040, processor 1050, voicefrequency circuit 1060, communication module 1070 and power supply 1080.
Wherein, input block 1030 can be used for the numeral or character information for receiving user's input, and produce and terminal The signal input that 1000 user is set and function control is relevant.Specifically, in the embodiment of the present invention, the input block 1030 Contact panel 1031 can be included.Contact panel 1031, also referred to as touch-screen, collect touch behaviour of the user on or near it Make (such as user uses the operations of any suitable object or annex on contact panel 1031 such as finger, stylus), and according to Formula set in advance drives corresponding attachment means.Optionally, contact panel 1031 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation is brought, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give the processor 1050, and the order sent of reception processing device 1050 and can be performed.Furthermore, it is possible to adopt Contact panel 1031 is realized with polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1031, input block 1030 can also include other input equipments 1032, and other input equipments 1032 can include but is not limited to One kind or many in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. Kind.
Wherein, display unit 1040 can be used for the information and terminal for showing the information inputted by user or being supplied to user 1000 various menu interfaces.Display unit 1040 may include display panel 1041, optionally, can use LCD or organic hairs The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 1041.
It should be noted that contact panel 1031 can cover display panel 1041, touch display screen is formed, when the touch display screen Detect after the touch operation on or near it, processor 1050 is sent to determine the type of touch event, with post processing Device 1050 provides corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can distinguish two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area is used to show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..The touch-screen of the embodiment of the present invention is soft Property screen, organic nesa coating of CNT is posted in two faces of flexible screen.
Wherein processor 1050 is the control centre of terminal 1000, utilizes each of various interfaces and the whole terminal of connection Individual part, by operation or performs and is stored in software program and/or module in first memory 1021, and calls and be stored in Data in second memory 1022, perform the various functions and processing data of terminal 1000, so as to be carried out to terminal 1000 whole Body is monitored.Optionally, processor 1050 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 1021 in software program and/or module and/ Or the data in the second memory 1022, processor 1050 is used for:The access request to file destination is sent to server;Connect The target data stream that the server is sent according to the access request is received, wherein, the target data stream includes default mesh Mark condition code and the data flow of file destination;The target signature code is obtained, and target signature code is verified;If right The target signature code check success, then obtain the data flow of the file destination.
Optionally, processor 1050 is additionally operable to:Judge whether the target signature code is identical with default check code;If described Target signature code is identical with the default check code, it is determined that to target signature code check success.
Optionally, processor 1050 is additionally operable to:If failing to the target signature code check, give up the file destination Data flow.
Optionally, processor 1050 is additionally operable to:The target signature code is located at the head of the target data stream.
Optionally, when the access request is download request, processor 1050 is additionally operable to:By the number of the file destination File destination is stored as according to stream.
Terminal 1000 can realize each process that terminal is realized in previous embodiment, to avoid repeating, no longer go to live in the household of one's in-laws on getting married here State.
The terminal 1000 of the embodiment of the present invention, the access request to file destination is sent to server;Receive the service The target data stream that device is sent according to the access request, wherein, the target data stream comprising default target signature code and The data flow of file destination;The target signature code is obtained, and target signature code is verified;If special to the target Code check success is levied, then obtains the data flow of the file destination.So, when terminal obtains the data flow of file destination, it is not required to Network connection re-established with server, improve the connection speed between terminal and server, reduced to server and end The loss at end.And file destination can be prevented to be held as a hostage comprising target signature code in target data stream.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, is stored thereon with computer program and (refers to Make), the program (instruction) realizes following steps when being executed by processor:Access request of the receiving terminal to file destination;According to The access request, obtains the corresponding target data stream of the file destination, wherein the target data stream include it is default The data flow of target signature code and the file destination;The target data stream is sent to the terminal, so that the terminal-pair After the target signature code is verified, the data flow of the file destination is read.
Optionally, the access request is download request, and the target signature code is located at the head of the target data stream.
Or, the program (instruction) realizes following steps when being executed by processor:Sent to server to file destination Access request;The target data stream that the server is sent according to the access request is received, wherein, the target data stream bag Data flow containing default target signature code and file destination;The target signature code is obtained, and target signature code is entered Row verification;If to target signature code check success, obtaining the data flow of the file destination.
Optionally, following steps are realized when the program (instruction) is executed by processor:Whether judge the target signature code It is identical with default check code;If the target signature code is identical with the default check code, it is determined that to target signature code Verify successfully.
Optionally, following steps are realized when the program (instruction) is executed by processor:If to the target signature code check Failure, then give up the data flow of the file destination.
Optionally, the target signature code is located at the head of the target data stream.
Optionally, when the access request is download request, realized when the program (instruction) is executed by processor following Step:The data flow of the file destination is stored as file destination.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, others can be passed through Mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, is only A kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be the INDIRECT COUPLING or communication link of device or unit by some interfaces Connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized using in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are to cause a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each of the invention embodiment methods described. And foregoing storage medium includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (17)

1. a kind of data processing method, applied to server, it is characterised in that including:
Access request of the receiving terminal to file destination;
According to the access request, the corresponding target data stream of the file destination is obtained, wherein being wrapped in the target data stream Include the data flow of default target signature code and the file destination;
The target data stream is sent to the terminal, so as to after target signature code is verified described in the terminal-pair, read The data flow of the file destination.
2. according to the method described in claim 1, it is characterised in that the access request is download request, the target signature Code is located at the head of the target data stream.
3. a kind of data processing method, applied to terminal, it is characterised in that including:
The access request to file destination is sent to server;
The target data stream that the server is sent according to the access request is received, wherein, the target data stream is comprising pre- If target signature code and file destination data flow;
The target signature code is obtained, and target signature code is verified;
If to target signature code check success, obtaining the data flow of the file destination.
4. method according to claim 3, it is characterised in that described the step of verified to target signature code, Including:
Judge whether the target signature code is identical with default check code;
If the target signature code is identical with the default check code, it is determined that to target signature code check success.
5. method according to claim 3, it is characterised in that it is described target signature code is verified the step of Afterwards, methods described also includes:
If failing to the target signature code check, give up the data flow of the file destination.
6. the method according to any one of claim 3 to 5, it is characterised in that the target signature code is located at the target The head of data flow.
7. method according to claim 3, it is characterised in that the access request is download request, in the acquisition institute After the step of stating the data flow of file destination, methods described also includes:
The data flow of the file destination is stored as file destination.
8. a kind of server, it is characterised in that including:
Receiving module, for access request of the receiving terminal to file destination;
Acquisition module, for the access request received according to the receiving module, obtains the corresponding mesh of the file destination Data flow is marked, wherein the target data stream includes the data flow of default target signature code and the file destination;
Sending module, for sending the target data stream that the acquisition module is obtained to the terminal, so that the terminal After being verified to target signature code, the data flow of the file destination is read.
9. server according to claim 8, it is characterised in that the target signature code is located at the target data stream Head, the access request is download request.
10. a kind of terminal, it is characterised in that including:
Sending module, for sending the access request to file destination to server;
Receiving module, for receiving the target data stream that the server is sent according to the access request, wherein, the target Data flow of the data stream packets containing default target signature code and file destination;
Correction verification module, for obtaining the target signature code that the receiving module is received, and is carried out to target signature code Verification;
Acquisition module, if obtaining the file destination to target signature code check success for the correction verification module Data flow.
11. terminal according to claim 10, it is characterised in that the correction verification module includes:
Judging submodule, for judging whether the target signature code is identical with default check code;
Determination sub-module, if identical with the default check code for target signature code, it is determined that to the target signature Code check success.
12. terminal according to claim 10, it is characterised in that the terminal also includes:
Give up module, if for failing to the target signature code check, giving up the data flow of the file destination.
13. the terminal according to any one of claim 10 to 12, it is characterised in that the target signature code is located at the mesh Mark the head of data flow.
14. terminal according to claim 10, it is characterised in that the access request is download request, and the terminal is also Including:
Memory module, the data flow of the file destination for the acquisition module to be obtained is stored as file destination.
15. a kind of server, it is characterised in that including:Memory, processor and store on a memory and can be on a processor The computer program of operation, is realized at data as claimed in claim 1 or 2 described in the computing device during computer program Step in reason method.
16. a kind of terminal, it is characterised in that including:Memory, processor and storing can be transported on a memory and on a processor Capable computer program, is realized as any one of claim 3 to 7 described in the computing device during computer program Step in data processing method.
17. a kind of computer-readable recording medium, it is characterised in that computer journey is stored on the computer-readable recording medium Sequence, the computer program realizes the step in data processing method as claimed in claim 1 or 2 when being executed by processor, Or the step in data processing method of the realization as any one of claim 3 to 7.
CN201710624080.1A 2017-07-27 2017-07-27 Data processing method, server, terminal and computer readable storage medium Active CN107277050B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710624080.1A CN107277050B (en) 2017-07-27 2017-07-27 Data processing method, server, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710624080.1A CN107277050B (en) 2017-07-27 2017-07-27 Data processing method, server, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107277050A true CN107277050A (en) 2017-10-20
CN107277050B CN107277050B (en) 2021-02-26

Family

ID=60078725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710624080.1A Active CN107277050B (en) 2017-07-27 2017-07-27 Data processing method, server, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107277050B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109408751A (en) * 2018-09-27 2019-03-01 腾讯科技(成都)有限公司 A kind of data processing method, terminal, server and storage medium
CN111241172A (en) * 2019-12-26 2020-06-05 北京航天测控技术有限公司 Data storage method, device, terminal and computer readable medium
CN111338820A (en) * 2020-02-24 2020-06-26 北京海益同展信息科技有限公司 Operation method, client and storage medium
CN112416916A (en) * 2020-11-16 2021-02-26 中信银行股份有限公司 Data verification method and device, electronic equipment and readable storage medium
CN113051443A (en) * 2019-12-26 2021-06-29 北京奇艺世纪科技有限公司 Data processing method and related equipment
CN113377710A (en) * 2020-03-10 2021-09-10 ***通信集团湖南有限公司 Data acquisition method and device and electronic equipment
CN114021709A (en) * 2021-09-30 2022-02-08 苏州浪潮智能科技有限公司 Multi-FPGA data processing method and device, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767738A (en) * 2015-03-23 2015-07-08 浪潮集团有限公司 Data access method and device
CN104954386A (en) * 2015-06-30 2015-09-30 百度在线网络技术(北京)有限公司 Network anti-hijacking methods and device
WO2015176284A1 (en) * 2014-05-22 2015-11-26 华为技术有限公司 Data transmission method and apparatus
CN105553955A (en) * 2015-12-09 2016-05-04 上海安吉星信息服务有限公司 Data processing method and device
CN106850743A (en) * 2016-12-21 2017-06-13 腾讯科技(深圳)有限公司 A kind of business authorization method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015176284A1 (en) * 2014-05-22 2015-11-26 华为技术有限公司 Data transmission method and apparatus
CN104767738A (en) * 2015-03-23 2015-07-08 浪潮集团有限公司 Data access method and device
CN104954386A (en) * 2015-06-30 2015-09-30 百度在线网络技术(北京)有限公司 Network anti-hijacking methods and device
CN105553955A (en) * 2015-12-09 2016-05-04 上海安吉星信息服务有限公司 Data processing method and device
CN106850743A (en) * 2016-12-21 2017-06-13 腾讯科技(深圳)有限公司 A kind of business authorization method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109408751A (en) * 2018-09-27 2019-03-01 腾讯科技(成都)有限公司 A kind of data processing method, terminal, server and storage medium
CN111241172A (en) * 2019-12-26 2020-06-05 北京航天测控技术有限公司 Data storage method, device, terminal and computer readable medium
CN113051443A (en) * 2019-12-26 2021-06-29 北京奇艺世纪科技有限公司 Data processing method and related equipment
CN111241172B (en) * 2019-12-26 2023-05-26 北京航天测控技术有限公司 Data storage method, device, terminal and computer readable medium
CN111338820A (en) * 2020-02-24 2020-06-26 北京海益同展信息科技有限公司 Operation method, client and storage medium
CN111338820B (en) * 2020-02-24 2024-04-05 京东科技信息技术有限公司 Operation method, client and storage medium
CN113377710A (en) * 2020-03-10 2021-09-10 ***通信集团湖南有限公司 Data acquisition method and device and electronic equipment
CN112416916A (en) * 2020-11-16 2021-02-26 中信银行股份有限公司 Data verification method and device, electronic equipment and readable storage medium
CN114021709A (en) * 2021-09-30 2022-02-08 苏州浪潮智能科技有限公司 Multi-FPGA data processing method and device, server and storage medium
CN114021709B (en) * 2021-09-30 2024-01-23 苏州浪潮智能科技有限公司 Multi-FPGA data processing method and device, server and storage medium

Also Published As

Publication number Publication date
CN107277050B (en) 2021-02-26

Similar Documents

Publication Publication Date Title
CN107277050A (en) A kind of data processing method, server, terminal and computer-readable recording medium
CN103634294B (en) Information verifying method and device
EP3270300A1 (en) Method and device for form verification
US20150302215A1 (en) Sensitive operation verification method, terminal device, server, and verification system
CN104902531B (en) Connect method, application authorization server, terminal and the router of network
CN104065633B (en) A kind of proof diagram that utilizes carries out method, the Apparatus and system verified
CN105975144A (en) Information processing method and apparatus
US20150341416A1 (en) Cloud management systems and methods for executing applications of android systems
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106708734A (en) Software abnormality detection method and apparatus
CN104243155A (en) Safety verification method and device
CN106534200A (en) Identity authentication method and mobile terminal
CN108574721B (en) Login method, device, server, user terminal and readable storage medium
CN107329586A (en) A kind of data inputting method, mobile terminal and computer-readable recording medium
CN105847007A (en) Identity verification method for terminal device and computer device
CN106469113A (en) Applied program testing method and system
CN106650490A (en) Cloud account number login method and device
CN104539571A (en) Information interaction method, identity authentication method, server and terminal
CN104899488B (en) Numeric value transfer and device
CN106332217A (en) Wireless routing method and mobile terminal
CN106231113A (en) A kind of Dialing Method and mobile terminal
CN105978878B (en) Webpage verification using data-hiding technology method and device
CN106708555A (en) Method and device for loading plug-ins
CN107798061A (en) A kind of webpage loading method and mobile terminal
CN107329959A (en) A kind of information processing method, first terminal and second terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant