[go: up one dir, main page]

CN104507080A - File processing method and terminal - Google Patents

File processing method and terminal Download PDF

Info

Publication number
CN104507080A
CN104507080A CN201410663154.9A CN201410663154A CN104507080A CN 104507080 A CN104507080 A CN 104507080A CN 201410663154 A CN201410663154 A CN 201410663154A CN 104507080 A CN104507080 A CN 104507080A
Authority
CN
China
Prior art keywords
terminal
target
identification information
source terminal
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410663154.9A
Other languages
Chinese (zh)
Other versions
CN104507080B (en
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810134907.5A priority Critical patent/CN108183972B/en
Priority to CN201410663154.9A priority patent/CN104507080B/en
Publication of CN104507080A publication Critical patent/CN104507080A/en
Application granted granted Critical
Publication of CN104507080B publication Critical patent/CN104507080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例公开了一种文件处理方法,包括:源终端欲向目标终端传输目标文件时,获取所述目标终端的标识信息;所述源终端根据所述标识信息识别所述目标终端是否为合法终端;若是,所述源终端根据所述标识信息对欲传输的目标文件进行加密;所述源终端向所述目标终端发送已加密的目标文件。本发明实施例还公开了一种终端。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端根据目标终端的标识信息自动设置密钥,操作简单。

The embodiment of the present invention discloses a file processing method, including: when the source terminal intends to transmit a target file to the target terminal, acquiring the identification information of the target terminal; the source terminal identifies whether the target terminal is a legal terminal; if yes, the source terminal encrypts the target file to be transmitted according to the identification information; the source terminal sends the encrypted target file to the target terminal. The embodiment of the invention also discloses a terminal. With the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, the source terminal automatically sets a key according to the identification information of the target terminal, and the operation is simple.

Description

一种文件处理方法及终端A file processing method and terminal

技术领域technical field

本发明涉及计算机技术领域,尤其涉及一种文件处理方法及终端。The invention relates to the technical field of computers, in particular to a file processing method and a terminal.

背景技术Background technique

随着通信技术的发展,信息数据的传递越来越便捷,人们获取信息的途径也越来越广,例如,基于蓝牙或红外方式进行文件传输等。通常,为避免商业机密、个人隐私等重要数据的泄露,用户在传输数据文件时可以对所要传输的数据文件进行加密。With the development of communication technology, the transmission of information and data is becoming more and more convenient, and the ways for people to obtain information are also becoming wider and wider, for example, file transmission based on Bluetooth or infrared. Usually, in order to avoid the leakage of important data such as business secrets and personal privacy, the user can encrypt the data file to be transmitted when transferring the data file.

现有方法采用加密方式传输文件时,需发送方和接收方事先约定好密钥,手动输入该密钥进行加密和解密,操作繁琐,影响用户体验。When the existing method uses encryption to transmit files, the sender and the receiver need to agree on a key in advance, and manually input the key for encryption and decryption, which is cumbersome and affects user experience.

发明内容Contents of the invention

本发明实施例提供一种文件处理方法及终端,若目标终端为源终端标识的合法终端,源终端根据目标终端的标识信息自动设置密钥,操作简单。Embodiments of the present invention provide a file processing method and a terminal. If the target terminal is a legal terminal identified by the source terminal, the source terminal automatically sets a key according to the identification information of the target terminal, and the operation is simple.

第一方面,本发明实施例提供一种文件处理方法,包括:In a first aspect, an embodiment of the present invention provides a file processing method, including:

源终端欲向目标终端传输目标文件时,获取所述目标终端的标识信息;When the source terminal intends to transmit the target file to the target terminal, obtain the identification information of the target terminal;

所述源终端根据所述标识信息识别所述目标终端是否为合法终端;identifying, by the source terminal, whether the target terminal is a legitimate terminal according to the identification information;

若是,所述源终端根据所述标识信息对欲传输的目标文件进行加密;If yes, the source terminal encrypts the target file to be transmitted according to the identification information;

所述源终端向所述目标终端发送已加密的目标文件。The source terminal sends the encrypted target file to the target terminal.

结合第一方面,在第一方面的第一种可能的实现方式中,所述标识信息包括手机号码或即时通讯账号。With reference to the first aspect, in a first possible implementation manner of the first aspect, the identification information includes a mobile phone number or an instant messaging account.

结合第一方面的第一种可能的实现方式,在第一方面的第二种可能的实现方式中,若所述标识信息为手机号码,所述源终端根据所述标识信息识别所述目标终端是否为合法终端,包括:With reference to the first possible implementation of the first aspect, in a second possible implementation of the first aspect, if the identification information is a mobile phone number, the source terminal identifies the target terminal according to the identification information Whether it is a legal terminal, including:

所述源终端查询本地通讯录中是否存在该手机号码对应的联系人信息;The source terminal queries whether there is contact information corresponding to the mobile phone number in the local address book;

若存在,所述源终端识别出所述目标终端是合法终端;If it exists, the source terminal identifies that the target terminal is a legitimate terminal;

若不存在,所述源终端识别出所述目标终端不是合法终端。If not, the source terminal recognizes that the target terminal is not a legitimate terminal.

结合第一方面的第一种可能的实现方式,在第一方面的第三种可能的实现方式中,若所述标识信息为即时通讯账号,所述源终端根据所述标识信息识别所述目标终端是否为合法终端,包括:With reference to the first possible implementation of the first aspect, in a third possible implementation of the first aspect, if the identification information is an instant messaging account, the source terminal identifies the target according to the identification information Whether the terminal is a legal terminal, including:

所述源终端根据所述即时通讯账号查询所述源终端的好友关系链中是否存在该即时通讯账号对应的好友信息;The source terminal queries whether there is friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal according to the instant messaging account;

若存在,所述源终端识别出所述目标终端是合法终端;If it exists, the source terminal identifies that the target terminal is a legitimate terminal;

若不存在,所述源终端识别出所述目标终端不是合法终端。If not, the source terminal recognizes that the target terminal is not a legitimate terminal.

结合第一方面、第一方面的第二种或第三种可能的实现方式,在第一方面的第四种可能的实现方式中,所述源终端根据所述标识信息识别所述目标终端是否为合法终端之后,所述方法还包括:With reference to the first aspect and the second or third possible implementation manner of the first aspect, in a fourth possible implementation manner of the first aspect, the source terminal identifies whether the target terminal is After being a legal terminal, the method also includes:

若所述源终端识别出所述目标终端不是合法终端,输出提示信息,以提示用户是否确认传送。If the source terminal recognizes that the target terminal is not a legitimate terminal, it outputs prompt information to prompt the user whether to confirm the transmission.

结合第一方面的第四种可能的实现方式,在第一方面的第五种可能的实现方式中,所述输出提示信息之后,所述方法还包括:With reference to the fourth possible implementation manner of the first aspect, in a fifth possible implementation manner of the first aspect, after the prompt information is output, the method further includes:

若接收到确认传送的指令,所述源终端根据预设密钥对欲传输的目标文件进行加密;If the instruction for confirming the transmission is received, the source terminal encrypts the target file to be transmitted according to the preset key;

所述源终端向所述目标终端发送已加密的目标文件及所述预设密钥。The source terminal sends the encrypted target file and the preset key to the target terminal.

第二方面,本发明实施例提供一种文件处理方法,包括:In a second aspect, an embodiment of the present invention provides a file processing method, including:

目标终端需要接收源终端欲传输的目标文件时,获取所述目标终端的标识信息;When the target terminal needs to receive the target file to be transmitted by the source terminal, obtain the identification information of the target terminal;

所述目标终端向所述源终端发送所述标识信息,以使所述源终端根据该标识信息对所述目标文件进行加密;The target terminal sends the identification information to the source terminal, so that the source terminal encrypts the target file according to the identification information;

所述目标终端接收所述源终端发送的所述目标文件;The target terminal receives the target file sent by the source terminal;

若所述目标终端是所述源终端标识的合法终端,所述目标终端根据所述标识信息对所述目标文件进行解密。If the target terminal is a legitimate terminal identified by the source terminal, the target terminal decrypts the target file according to the identification information.

结合第二方面,在第二方面的第一种可能的实现方式中,所述方法还包括:With reference to the second aspect, in a first possible implementation manner of the second aspect, the method further includes:

若所述目标终端不是所述源终端标识的合法终端,接收所述源终端发送的目标文件和预设密钥;If the target terminal is not a legal terminal identified by the source terminal, receiving the target file and the preset key sent by the source terminal;

根据所述预设密钥对所述目标文件进行解密。The target file is decrypted according to the preset key.

结合第二方面或第二方面的第一种可能的实现方式,在第二方面的第三种可能的实现方式中,所述标识信息包括手机号码或即时通讯账号。With reference to the second aspect or the first possible implementation manner of the second aspect, in a third possible implementation manner of the second aspect, the identification information includes a mobile phone number or an instant messaging account.

第三方面,本发明实施例提供一种终端,包括:In a third aspect, an embodiment of the present invention provides a terminal, including:

第一获取模块,用于源终端欲向目标终端传输目标文件时,获取所述目标终端的标识信息;The first obtaining module is used for obtaining the identification information of the target terminal when the source terminal intends to transmit the target file to the target terminal;

识别模块,用于根据所述标识信息识别所述目标终端是否为合法终端;An identification module, configured to identify whether the target terminal is a legal terminal according to the identification information;

加密模块,用于若所述目标终端是合法终端,根据所述标识信息对欲传输的目标文件进行加密;An encryption module, configured to encrypt the target file to be transmitted according to the identification information if the target terminal is a legitimate terminal;

第一发送模块,用于向所述目标终端发送已加密的目标文件。The first sending module is configured to send the encrypted target file to the target terminal.

结合第三方面,在第三方面的第一种可能的实现方式中,所述标识信息包括手机号码或即时通讯账号。With reference to the third aspect, in a first possible implementation manner of the third aspect, the identification information includes a mobile phone number or an instant messaging account.

结合第三方面的第一种可能的实现方式,在第三方面的第二种可能的实现方式中,若所述标识信息为手机号码,所述识别模块具体用于:In combination with the first possible implementation of the third aspect, in the second possible implementation of the third aspect, if the identification information is a mobile phone number, the identification module is specifically configured to:

查询本地通讯录中是否存在该手机号码对应的联系人信息;Query whether there is contact information corresponding to the mobile phone number in the local address book;

若存在,识别出所述目标终端是合法终端;If it exists, identifying that the target terminal is a legitimate terminal;

若不存在,识别出所述目标终端不是合法终端。If not, it is identified that the target terminal is not a legitimate terminal.

结合第三方面的第一种可能的实现方式,在第三方面的第四种可能的实现方式中,若所述标识信息为即时通讯账号,所述识别模块具体用于:In combination with the first possible implementation of the third aspect, in the fourth possible implementation of the third aspect, if the identification information is an instant messaging account, the identification module is specifically configured to:

根据所述即时通讯账号查询所述源终端的好友关系链中是否存在该即时通讯账号对应的好友信息;Querying whether there is friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal according to the instant messaging account;

若存在,识别出所述目标终端是合法终端;If it exists, identifying that the target terminal is a legitimate terminal;

若不存在,识别出所述目标终端不是合法终端。If not, it is identified that the target terminal is not a legitimate terminal.

结合第三方面、第三方面的第二种或第三种可能的实现方式,在第三方面的第五种可能的实现方式中,所述终端还包括:With reference to the third aspect and the second or third possible implementation manner of the third aspect, in a fifth possible implementation manner of the third aspect, the terminal further includes:

输出模块,用于若所述目标终端不是合法终端,输出提示信息,以提示用户是否确认传送。An output module, configured to output prompt information to prompt the user whether to confirm the transmission if the target terminal is not a legal terminal.

结合第三方面的第四种可能的实现方式,在第三方面的第五种可能的实现方式中,所述加密模块,还用于若接收到确认传送的指令,根据预设密钥对欲传输的目标文件进行加密;With reference to the fourth possible implementation of the third aspect, in the fifth possible implementation of the third aspect, the encryption module is further configured to: The transferred target files are encrypted;

所述第一发送模块,还用于向所述目标终端发送已加密的目标文件及所述预设密钥。The first sending module is further configured to send the encrypted target file and the preset key to the target terminal.

第四方面,本发明实施例提供一种终端,包括:In a fourth aspect, an embodiment of the present invention provides a terminal, including:

第二获取模块,用于目标终端需要接收源终端欲传输的目标文件时,获取所述目标终端的标识信息;The second obtaining module is used for obtaining the identification information of the target terminal when the target terminal needs to receive the target file to be transmitted by the source terminal;

第二发送模块,用于向所述源终端发送所述标识信息,以使所述源终端根据该标识信息对所述目标文件进行加密;A second sending module, configured to send the identification information to the source terminal, so that the source terminal encrypts the target file according to the identification information;

接收模块,用于接收所述源终端发送的所述目标文件;a receiving module, configured to receive the target file sent by the source terminal;

解密模块,用于若所述目标终端是所述源终端标识的合法终端,所述目标终端根据所述标识信息对所述目标文件进行解密。A decryption module, configured to decrypt the target file according to the identification information if the target terminal is a legitimate terminal identified by the source terminal.

结合第四方面,在第四方面的第一种可能的实现方式中,所述接收模块,还用于若所述目标终端不是所述源终端标识的合法终端,接收所述源终端发送的目标文件和预设密钥;With reference to the fourth aspect, in a first possible implementation manner of the fourth aspect, the receiving module is further configured to receive the target terminal sent by the source terminal if the target terminal is not a legitimate terminal identified by the source terminal. files and preset keys;

所述解密模块,还用于根据所述预设密钥对所述目标文件进行解密。The decryption module is further configured to decrypt the target file according to the preset key.

结合第四方面或第四方面的第一种可能的实现方式,在第四方面的第二种可能的实现方式中,所述标识信息包括手机号码或即时通讯账号。With reference to the fourth aspect or the first possible implementation manner of the fourth aspect, in a second possible implementation manner of the fourth aspect, the identification information includes a mobile phone number or an instant messaging account.

实施本发明实施例,源终端需要向目标终端传输目标文件时,源终端获取目标终端的标识信息;并根据所获取到的目标终端的标识信息识别该目标终端是否为合法终端;若是,则根据该标识信息对欲传输的目标文件进行加密;向目标终端发送已加密的目标文件。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,不仅可保障文件传输过程中的安全性,且操作简单。Implementing the embodiment of the present invention, when the source terminal needs to transmit the target file to the target terminal, the source terminal obtains the identification information of the target terminal; and identifies whether the target terminal is a legal terminal according to the obtained identification information of the target terminal; The identification information encrypts the target file to be transmitted; and sends the encrypted target file to the target terminal. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. Decrypting the target file not only ensures the security of the file transfer process, but also makes the operation simple.

附图说明Description of drawings

为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the following will briefly introduce the drawings that need to be used in the description of the embodiments. Obviously, the drawings in the following description are some embodiments of the present invention. For Those of ordinary skill in the art can also obtain other drawings based on these drawings without making creative efforts.

图1是本发明实施例提供的一种文件处理方法的流程示意图;FIG. 1 is a schematic flowchart of a file processing method provided by an embodiment of the present invention;

图2是本发明实施例提供的一种文件处理方法的另一流程示意图;Fig. 2 is another schematic flowchart of a file processing method provided by an embodiment of the present invention;

图3是本发明实施例提供的一种文件处理方法的又一流程示意图;Fig. 3 is another schematic flowchart of a file processing method provided by an embodiment of the present invention;

图4是本发明实施例提供的一种文件处理方法的再一流程示意图;Fig. 4 is another schematic flowchart of a file processing method provided by an embodiment of the present invention;

图5是本发明实施例提供的一种终端的结构示意图;FIG. 5 is a schematic structural diagram of a terminal provided by an embodiment of the present invention;

图6是本发明实施例提供的一种终端的另一结构示意图;FIG. 6 is another schematic structural diagram of a terminal provided by an embodiment of the present invention;

图7是本发明实施例提供的一种终端的又一结构示意图。FIG. 7 is another schematic structural diagram of a terminal provided by an embodiment of the present invention.

具体实施方式detailed description

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

本发明实施例提供了一种文件处理方法、源终端及目标终端,源终端需要向目标终端传输目标文件时,源终端获取目标终端的标识信息;并根据所获取到的目标终端的标识信息识别该目标终端是否为合法终端;若是,则根据该标识信息对欲传输的目标文件进行加密;向目标终端发送已加密的目标文件,从而完成目标文件的传输。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,操作简单。下面将结合附图1-附图7对本发明实施例提供的一种文件处理方法、源终端及目标终端分别进行详细介绍。Embodiments of the present invention provide a file processing method, a source terminal, and a target terminal. When the source terminal needs to transmit a target file to the target terminal, the source terminal obtains the identification information of the target terminal; and identifies Whether the target terminal is a legitimate terminal; if so, encrypt the target file to be transmitted according to the identification information; send the encrypted target file to the target terminal, thereby completing the transmission of the target file. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. The target file is decrypted, and the operation is simple. A file processing method, a source terminal, and a target terminal provided by an embodiment of the present invention will be described in detail below in conjunction with accompanying drawings 1 to 7 .

众所周知,传输文件时需两个终端,为方便描述,本发明实施例将这两个终端分别称为“源终端”和“目标终端”,所述终端可以是计算机、手机、IPAD等设备,本发明实施例对终端的具体类型不作限制,凡是可以实施本发明实施例的设备均属于本发明实施例所需保护的范围。下面从“源终端”侧介绍一种文件处理方法的处理流程。As we all know, two terminals are required to transfer files. For the convenience of description, the embodiments of the present invention refer to these two terminals as "source terminal" and "target terminal". The terminals can be computers, mobile phones, IPADs and other devices. The embodiment of the invention does not limit the specific type of the terminal, and any device that can implement the embodiment of the invention belongs to the scope of protection required by the embodiment of the invention. The processing flow of a file processing method is introduced below from the "source terminal" side.

请参见图1,图1是本发明实施例提供的一种文件处理方法的流程示意图,在本发明实施例中,该方法可以包括以下步骤。Please refer to FIG. 1 . FIG. 1 is a schematic flowchart of a file processing method provided by an embodiment of the present invention. In an embodiment of the present invention, the method may include the following steps.

S101:源终端欲向目标终端传输目标文件时,获取所述目标终端的标识信息。S101: Acquire identification information of the target terminal when the source terminal intends to transmit a target file to the target terminal.

由于网络病毒或黑客的存在,在传输文件的过程中,数据文件的安全性时刻受到威胁,若个人信息或商业机密被泄露出去将给用户造成无法弥补的损失,因此,人们对数据信息的安全性越来越重视。通常,为提高终端在传输文件过程中的安全性,可以采用加密方式进行文件传输。本发明实施例以加密方式传输数据文件的场景为例,可以是通过蓝牙、红外或数据线等方式进行文件传输,具体的,本发明实施例不作限制。Due to the existence of network viruses or hackers, the security of data files is always threatened during the process of file transfer. If personal information or business secrets are leaked out, it will cause irreparable losses to users. Sex is getting more and more important. Generally, in order to improve the security of the terminal during the file transfer process, the file transfer can be performed in an encrypted manner. In this embodiment of the present invention, the scenario of transmitting data files in an encrypted manner is taken as an example, and the file transmission may be performed through Bluetooth, infrared, or data lines. Specifically, this embodiment of the present invention does not make a limitation.

具体实现中,源终端欲向目标终端传输目标文件时,获取目标终端的标识信息。例如,作为一种实现方式,源终端需要向目标终端传输目标文件时,向目标终端发送文件传输请求,以使目标终端根据该请求返回目标终端的标识信息,从而,源终端获取到目标终端的标识信息。值得说明的是,所述标识信息可以是目标终端的手机号码或即时通讯账号,当然,还可以是标识符等其它信息,只要是源终端和目标终端通过该标识符可建立某种关联的信息均可以作为该标识信息。具体的,本发明实施例不作限制。In a specific implementation, when the source terminal intends to transmit the target file to the target terminal, it acquires the identification information of the target terminal. For example, as an implementation, when the source terminal needs to transfer a target file to the target terminal, it sends a file transfer request to the target terminal, so that the target terminal returns the identification information of the target terminal according to the request, so that the source terminal obtains the target terminal's Identification information. It is worth noting that the identification information can be the mobile phone number or instant messaging account of the target terminal, of course, it can also be other information such as an identifier, as long as the source terminal and the target terminal can establish a certain relationship through the identifier can be used as the identification information. Specifically, the embodiments of the present invention are not limited.

S102:所述源终端根据所述标识信息识别所述目标终端是否为合法终端。S102: The source terminal identifies whether the target terminal is a legitimate terminal according to the identification information.

源终端获取到目标终端的标识信息后,根据所获取到的标识信息识别目标终端是否为合法终端,若目标终端是源终端标识的合法终端,则进一步对目标文件进行加密;若目标终端不是源终端标识的合法终端,则可以输出提示信息,提示用户是否确定要传输该目标文件,从而,提高文件在传输过程中的安全性。After the source terminal obtains the identification information of the target terminal, it identifies whether the target terminal is a legal terminal according to the obtained identification information. If the target terminal is a legal terminal identified by the source terminal, it further encrypts the target file; if the target terminal is not the source terminal The legal terminal identified by the terminal can output prompt information to prompt the user whether to confirm the target file to be transferred, thereby improving the security of the file during transfer.

作为一种示例,假设标识信息为手机号码,源终端获取到目标终端的手机号码后,可以查询本地通讯录中是否存在该手机号码对应的联系人信息;若存在,则识别出目标终端是合法终端;若不存在,则识别出目标终端不是合法终端。从而,通过查询源终端的通讯录中是否存储有目标终端的手机号码来识别该目标终端是否为合法终端,若源终端的通讯录中不存在目标终端的手机号码,则说明给该目标终端传输数据文件时可能会存在潜在的风险,从而,输出提示信息提醒用户是否确认传输目标文件。As an example, assuming that the identification information is a mobile phone number, after the source terminal obtains the mobile phone number of the target terminal, it can query whether there is contact information corresponding to the mobile phone number in the local address book; if it exists, it can identify that the target terminal is legal terminal; if it does not exist, it is identified that the target terminal is not a legitimate terminal. Therefore, whether the target terminal is a legal terminal is identified by checking whether the mobile phone number of the target terminal is stored in the address book of the source terminal. There may be potential risks when transferring data files, so a prompt message is output to remind the user whether to confirm the transfer of the target file.

作为另一种示例,假设标识信息为即时通讯账号,源终端获取到目标终端的即时通讯账号后,可以查询源终端的好友关系链中是否存在该即时通讯账号对应的好友信息;若存在,则识别出目标终端是合法终端;若不存在,则识别出目标终端不是合法终端。从而,通过源终端的即时通讯账号和目标终端的即时通讯账号,确定目标终端是否为源终端标识的合法终端。As another example, assuming that the identification information is an instant messaging account, after the source terminal obtains the instant messaging account of the target terminal, it can query whether the friend information corresponding to the instant messaging account exists in the friend relationship chain of the source terminal; It is identified that the target terminal is a legal terminal; if it does not exist, it is recognized that the target terminal is not a legal terminal. Therefore, through the instant messaging account of the source terminal and the instant messaging account of the target terminal, it is determined whether the target terminal is a legal terminal identified by the source terminal.

值得说明的是,若标识信息为其它标识符,则可以进行类似处理,源终端预先针对标识符建立了好友关系链,获取到目标终端的标识符后,查询目标终端的标识符是否存在于该好友关系链中,若存在,则识别出目标终端是合法终端;若不存在,则识别出目标终端不是合法终端。当然,源终端根据标识信息识别目标终端是否为合法终端的方法还可以是其它,具体的,本发明实施例不作限制,以上仅为示例。It is worth noting that if the identification information is other identifiers, similar processing can be performed. The source terminal has established a friend relationship chain for the identifier in advance, and after obtaining the identifier of the target terminal, it queries whether the identifier of the target terminal exists in the In the friendship chain, if it exists, it is recognized that the target terminal is a legal terminal; if it does not exist, it is recognized that the target terminal is not a legal terminal. Certainly, other methods may be used for the source terminal to identify whether the target terminal is a legitimate terminal according to the identification information. Specifically, this embodiment of the present invention does not make a limitation, and the above is only an example.

S103:若是,所述源终端根据所述标识信息对欲传输的目标文件进行加密。S103: If yes, the source terminal encrypts the target file to be transmitted according to the identification information.

若识别出目标终端为源终端标识的合法终端,则,源终端根据目标终端的标识信息对欲传输的目标文件进行加密。值得说明的是,具体实现中,可以是直接将标识信息作为目标文件的加密密码;也可以是将标识信息作为密钥,根据该密钥采用加密算法设置加密密码,具体的,本发明实施例不作限制。若采用前者加密,目标终端直接根据标识信息对目标文件进行解密即可;若为后者,则目标终端可以根据自身的标识信息采用与源终端对应的加密算法获得原始的加密密码后,再采用该加密密码对目标文件进行解密。因此,后者安全性更高,用户对于非常重要的数据文件进行传输时可以采用后者进行加密。If it is recognized that the target terminal is a legal terminal identified by the source terminal, the source terminal encrypts the target file to be transmitted according to the identification information of the target terminal. It is worth noting that, in specific implementation, the identification information may be directly used as the encryption password of the target file; or the identification information may be used as a key, and an encryption algorithm is used to set the encryption password according to the key. Specifically, the embodiment of the present invention No limit. If the former encryption is used, the target terminal can directly decrypt the target file according to the identification information; if the latter is used, the target terminal can use the encryption algorithm corresponding to the source terminal to obtain the original encryption password according to its own identification information, and then use The encrypted password decrypts the target file. Therefore, the latter is more secure, and users can use the latter for encryption when transferring very important data files.

S104:所述源终端向所述目标终端发送已加密的目标文件。S104: The source terminal sends the encrypted target file to the target terminal.

源终端对欲传输的目标文件进行机密后,向目标终端发送已加密的目标文件。目标终端接收源终端所发送的目标文件,并根据目标终端自身的标识信息对所接收到的目标文件进行解密,从而,安全、可靠地完成数据文件的传输,且操作简单。After the source terminal encrypts the target file to be transmitted, it sends the encrypted target file to the target terminal. The target terminal receives the target file sent by the source terminal, and decrypts the received target file according to the identification information of the target terminal itself, so that the transmission of the data file is completed safely and reliably, and the operation is simple.

在本发明实施例描述的文件处理方法中,源终端需要向目标终端传输目标文件时,源终端获取目标终端的标识信息;并根据所获取到的目标终端的标识信息识别该目标终端是否为合法终端;若是,则根据该标识信息对欲传输的目标文件进行加密;向目标终端发送已加密的目标文件。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,不仅可保障文件传输过程中的安全性,且操作简单。In the file processing method described in the embodiment of the present invention, when the source terminal needs to transmit the target file to the target terminal, the source terminal obtains the identification information of the target terminal; and identifies whether the target terminal is legal according to the acquired identification information of the target terminal terminal; if yes, encrypt the target file to be transmitted according to the identification information; send the encrypted target file to the target terminal. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. Decrypting the target file not only ensures the security of the file transfer process, but also makes the operation simple.

请参见图2,图2是本发明实施例提供的一种文件处理方法的另一流程示意图,在本发明实施例中,以手机为例,该方法可以包括以下步骤。Please refer to FIG. 2 . FIG. 2 is another schematic flowchart of a file processing method provided by an embodiment of the present invention. In the embodiment of the present invention, taking a mobile phone as an example, the method may include the following steps.

S201:源终端欲向目标终端传输目标文件时,获取所述目标终端的手机号码。S201: When the source terminal intends to transmit a target file to the target terminal, obtain the mobile phone number of the target terminal.

作为一种示例,源终端欲向目标终端传输目标文件时,向目标终端发送文件传输请求,以使目标终端接收到该请求后,根据该请求获取目标终端的手机号码,即安装在目标终端上的SIM卡信息。考虑到少数手机支持双卡双待功能,若该目标终端上安装了至少两张SIM卡,则获取每张SIM卡对应的手机号码,并将所获取到的手机号码发送给源终端,从而,源终端获取到目标终端的手机号码。As an example, when the source terminal intends to transfer a target file to the target terminal, it sends a file transfer request to the target terminal, so that after receiving the request, the target terminal obtains the mobile phone number of the target terminal according to the request, that is, installs the file on the target terminal SIM card information. Considering that a small number of mobile phones support the dual-card dual-standby function, if at least two SIM cards are installed on the target terminal, the mobile phone number corresponding to each SIM card is obtained, and the obtained mobile phone number is sent to the source terminal, thereby, The source terminal obtains the mobile phone number of the target terminal.

作为另一种示例,考虑到不重要的数据文件进行传输时无需加密的情形,源终端欲向目标终端传输目标文件时,向目标终端发送文件传输请求,具体实现中,该文件传输请求还可以携带有传送方式。例如,将不需要对目标文件进行加密传输的情形称为“普通传送”,将需要加密传输的情形称为“安全传送”,在文件传输请求中标识具体的传送方式。目标终端接收到源终端发送的文件传输请求后,解析该请求中携带的相关信息,确定当前的传送方式;若为“安全传送”方式,则获取手机号码,并将所获取到的手机号码发送给源终端。若为“普通传送”方式,则可以自动给源终端返回一个确认信息,以使源终端将目标文件以非加密的方式传送给目标终端。As another example, considering that unimportant data files are transmitted without encryption, when the source terminal wants to transmit the target file to the target terminal, it sends a file transfer request to the target terminal. In specific implementation, the file transfer request can also be Carries a transport method. For example, the situation that does not require encrypted transmission of the target file is called "normal transmission", and the situation that requires encrypted transmission is called "secure transmission", and the specific transmission method is identified in the file transmission request. After receiving the file transfer request sent by the source terminal, the target terminal analyzes the relevant information carried in the request to determine the current transfer method; if it is the "safe transfer" method, obtains the mobile phone number and sends the obtained mobile phone number to to the source terminal. If it is the "common transmission" mode, it can automatically return a confirmation message to the source terminal, so that the source terminal can transmit the target file to the target terminal in a non-encrypted manner.

值得说明的是,考虑到目标终端中可能没有安装SIM卡的情形,此时,目标终端无法获取到手机号码这一信息,则可以给源终端发送类似于NULL的信息,源终端接收到该信息后,可以采用预设密码对目标文件进行加密,目标终端采用预设密码进行解密,从而,充分考虑实际过程中的异常使用情形,提高该方法的兼容性。It is worth noting that, considering that the target terminal may not have a SIM card installed, at this time, the target terminal cannot obtain the information of the mobile phone number, so it can send a message similar to NULL to the source terminal, and the source terminal receives the information Finally, the target file can be encrypted with the preset password, and the target terminal can be decrypted with the preset password, so that the compatibility of the method can be improved by fully considering the abnormal usage situation in the actual process.

S202:所述源终端查询本地通讯录中是否存在该手机号码对应的联系人信息。S202: The source terminal queries whether there is contact information corresponding to the mobile phone number in the local address book.

源终端接收到目标终端返回的手机号码后,查询本地通讯录中是否存在该手机号码对应的联系人信息,若存在,则说明目标终端是源终端标识的合法终端,从而,源终端识别出目标终端是合法终端,执行步骤S203,根据该目标终端的手机号码对目标文件进行加密。After receiving the mobile phone number returned by the target terminal, the source terminal inquires whether the contact information corresponding to the mobile phone number exists in the local address book. If it exists, it means that the target terminal is a legal terminal identified by the source terminal. If the terminal is a legitimate terminal, step S203 is executed to encrypt the target file according to the mobile phone number of the target terminal.

若本地通讯录中不存在该手机号码对应的联系人信息,则说明该目标终端不是源终端标识的合法终端,从而,源终端识别出目标终端不是合法终端。作为另一种实现方式,目标终端不是源终端标识的合法终端时,为提高数据传输过程的安全性,可以执行步骤S205,源终端输出提示信息,以提示用户是否确认传送。If there is no contact information corresponding to the mobile phone number in the local address book, it means that the target terminal is not a valid terminal identified by the source terminal, and thus the source terminal recognizes that the target terminal is not a valid terminal. As another implementation, when the target terminal is not the legal terminal identified by the source terminal, in order to improve the security of the data transmission process, step S205 may be executed, and the source terminal outputs a prompt message to prompt the user whether to confirm the transmission.

S203:所述源终端根据所述手机号码对欲传输的目标文件进行加密。S203: The source terminal encrypts the target file to be transmitted according to the mobile phone number.

若本地通讯录中存在该手机号码对应的联系人信息,说明目标终端是源终端标识的合法终端,因此,根据手机号码对欲传输的目标文件进行加密。具体实现中,可以是直接将手机号码作为目标文件的加密密码;也可以是将手机号码作为密钥,根据该密钥采用加密算法设置加密密码,具体的,本发明实施例不作限制。若采用前者加密,目标终端直接根据手机号码对目标文件进行解密即可;若为后者,则目标终端可以根据自身的手机号码采用与源终端对应的加密算法获得原始的加密密码后,再采用该加密密码对目标文件进行解密。因此,后者安全性更高,用户对于非常重要的数据文件进行传输时可以采用后者进行加密。If the contact information corresponding to the mobile phone number exists in the local address book, it means that the target terminal is a legal terminal identified by the source terminal. Therefore, the target file to be transmitted is encrypted according to the mobile phone number. In specific implementation, the mobile phone number can be directly used as the encryption password of the target file; or the mobile phone number can be used as a key, and an encryption algorithm is used to set the encryption password according to the key. Specifically, this embodiment of the present invention does not limit it. If the former encryption is used, the target terminal can directly decrypt the target file according to the mobile phone number; The encrypted password decrypts the target file. Therefore, the latter is more secure, and users can use the latter for encryption when transferring very important data files.

S204:所述源终端向所述目标终端发送已加密的目标文件。S204: The source terminal sends the encrypted target file to the target terminal.

S205:输出提示信息,以提示用户是否确认传送。S205: Output prompt information to prompt the user whether to confirm the transmission.

若本地通讯录中不存在该手机号码对应的联系人信息,说明该目标终端不是源终端标识的合法终端,因此,为保障目标文件的安全性,输出提示信息,以提示用户是否确认传送。其中,输出提示信息的方式可以是弹出对话框的方式,也可以是语音播报方式,具体的,本发明实施例不作限制。从而,用户获知源终端输出的提示信息后,进一步确认是否真正需要将目标文件传送给该目标终端,若是,则向源终端发起确认传送的指令,当然,也可以是源终端输出提示信息后,若在预设时长内未接收到用户输入的确认传送的指令,则自动发起确认传送或取消传送的指令,指示源终端向目标终端传送或不传送目标文件。具体的,本发明实施例不作限制。If there is no contact information corresponding to the mobile phone number in the local address book, it means that the target terminal is not a legal terminal identified by the source terminal. Therefore, in order to ensure the security of the target file, a prompt message is output to prompt the user whether to confirm the transmission. Wherein, the manner of outputting the prompt information may be a manner of popping up a dialog box, or may be a manner of voice broadcast, which is not limited in this embodiment of the present invention. Therefore, after the user learns the prompt information output by the source terminal, he further confirms whether the target file really needs to be transmitted to the target terminal, and if so, initiates an instruction to confirm the transmission to the source terminal. Of course, after the source terminal outputs the prompt information, If the instruction for confirming the transmission input by the user is not received within the preset time period, an instruction for confirming the transmission or canceling the transmission is automatically initiated, instructing the source terminal to transmit or not transmit the target file to the target terminal. Specifically, the embodiments of the present invention are not limited.

S206:若接收到确认传送的指令,所述源终端根据预设密钥对欲传输的目标文件进行加密。S206: If the instruction to confirm the transmission is received, the source terminal encrypts the target file to be transmitted according to the preset key.

若接收到确认传送的指令,说明用户期望向该目标终端传送目标文件,因此,采用预设密钥对欲传输的目标文件进行加密。作为一种实现方式,预设密钥可以是预先约定的加密密码的标识符,源终端和目标终端根据该标识符即可确定具体的加密密码;也可以是源终端和目标终端共同的联系人信息,例如,假设源终端和目标终端的通讯录中均存储有其共同的联系人的手机号码,如“老板”,于是,可以将“老板”作为预设密钥,该预设密钥对应的加密密码为通讯录中“老板”对应的手机号码,从而,目标终端接收到目标文件后,采用通讯录中“老板”对应的手机号码对目标文件进行解密。If the instruction for confirming the transmission is received, it means that the user expects to transmit the target file to the target terminal, therefore, the target file to be transmitted is encrypted with a preset key. As an implementation, the preset key can be an identifier of a pre-agreed encryption password, and the source terminal and the target terminal can determine the specific encryption password according to the identifier; it can also be a common contact between the source terminal and the target terminal Information, for example, assuming that the address books of the source terminal and the target terminal both store the mobile phone numbers of their common contacts, such as "boss", so "boss" can be used as a preset key, and the preset key corresponds to The encrypted password is the mobile phone number corresponding to "boss" in the address book, so that after receiving the target file, the target terminal uses the mobile phone number corresponding to "boss" in the address book to decrypt the target file.

作为另一种示例,若接收到确认传送的指令,也可以自动将目标终端的手机号码添加至本地通讯录中,进而,根据该手机号码对目标文件进行加密。具体的,本发明实施例不作限制。As another example, if the instruction to confirm the transmission is received, the mobile phone number of the target terminal may also be automatically added to the local address book, and then the target file is encrypted according to the mobile phone number. Specifically, the embodiments of the present invention are not limited.

S207:所述源终端向所述目标终端发送已加密的目标文件及所述预设密钥。S207: The source terminal sends the encrypted target file and the preset key to the target terminal.

具体实现中,若源终端对目标文件进行加密时不是根据目标终端的标识信息进行的,则对目标文件进行加密后,不仅需要向目标终端发送已加密的目标文件,且因将目标文件进行加密的预设密钥告知目标终端,以使目标终端接收到目标文件后,可以根据该预设密钥确定目标文件的加密密码,从而实现对目标文件的解密操作。In specific implementation, if the source terminal encrypts the target file not according to the identification information of the target terminal, after encrypting the target file, it not only needs to send the encrypted target file to the target terminal, but also encrypts the target file The preset key of the target terminal is notified to the target terminal, so that after the target terminal receives the target file, it can determine the encryption password of the target file according to the preset key, so as to realize the decryption operation of the target file.

在本发明实施例描述的文件处理方法中,源终端需要向目标终端传输目标文件时,源终端获取目标终端的标识信息;并根据所获取到的目标终端的标识信息识别该目标终端是否为合法终端;若是,则根据该标识信息对欲传输的目标文件进行加密;向目标终端发送已加密的目标文件。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,不仅可保障文件传输过程中的安全性,且操作简单。In the file processing method described in the embodiment of the present invention, when the source terminal needs to transmit the target file to the target terminal, the source terminal obtains the identification information of the target terminal; and identifies whether the target terminal is legal according to the acquired identification information of the target terminal terminal; if yes, encrypt the target file to be transmitted according to the identification information; send the encrypted target file to the target terminal. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. Decrypting the target file not only ensures the security of the file transfer process, but also makes the operation simple.

请参见图3,图3是本发明实施例提供的一种文件处理方法的又一流程示意图,在本发明实施例中,该方法可以包括以下步骤。Please refer to FIG. 3 . FIG. 3 is another schematic flowchart of a file processing method provided by an embodiment of the present invention. In an embodiment of the present invention, the method may include the following steps.

S301:源终端欲向目标终端传输目标文件时,获取所述目标终端的即时通讯账号。S301: When the source terminal intends to transmit a target file to the target terminal, obtain the instant messaging account of the target terminal.

通常,在终端上运行即时通信软件时,用户采用自己的账号在自己的终端上进行登录,因此,终端存在关联的即时通讯账号。其中,即时通讯软件可以是QQ、微信、微博、飞信、易信等等,具体的,本发明实施例不作限制。源终端欲向目标终端传输目标文件时,可以向目标终端发送文件传输请求,以使目标终端接收到该请求后,根据该请求获取目标终端上经常使用的即时通讯账号,并将所获取到的即时通讯账号返回给源终端。Usually, when the instant messaging software is running on the terminal, the user uses his own account to log in on his own terminal, therefore, the terminal has an associated instant messaging account. Wherein, the instant messaging software may be QQ, WeChat, Weibo, Fetion, Yixin, etc. Specifically, this embodiment of the present invention makes no limitation. When the source terminal wants to transfer a target file to the target terminal, it can send a file transfer request to the target terminal, so that after receiving the request, the target terminal can obtain the instant messaging account frequently used on the target terminal according to the request, and transfer the acquired The instant messaging account is returned to the source terminal.

S302:所述源终端根据所述即时通讯账号查询所述源终端的好友关系链中是否存在该即时通讯账号对应的好友信息。S302: The source terminal queries whether there is friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal according to the instant messaging account.

具体实现中,查询目标终端的即时通讯账号是否存在于源终端的好友关系链中,所述好友关系链记载有源终端的即时通讯账号中的所有好友的账号信息,若存在,说明目标终端是合法终端,从而,源终端识别出目标终端是合法终端,执行步骤S303,根据该目标终端的即时通讯账号对目标文件进行加密。In the specific implementation, query whether the instant messaging account of the target terminal exists in the friend relationship chain of the source terminal, and the friend relationship chain records the account information of all friends in the instant messaging account of the active terminal. If it exists, it means that the target terminal is The legitimate terminal, thus, the source terminal recognizes that the target terminal is a legitimate terminal, and executes step S303 to encrypt the target file according to the instant messaging account of the target terminal.

若源终端的好友关系链中不存在该即时通讯账号对应的好友信息,则说明该目标终端不是源终端标识的合法终端,从而,源终端识别出目标终端不是合法终端。作为另一种实现方式,目标终端不是源终端标识的合法终端时,为提高数据传输过程的安全性,可以执行步骤S305,源终端输出提示信息,以提示用户是否确认传送。If there is no friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal, it means that the target terminal is not a legitimate terminal identified by the source terminal, and thus the source terminal recognizes that the target terminal is not a legitimate terminal. As another implementation manner, when the target terminal is not a legal terminal identified by the source terminal, in order to improve the security of the data transmission process, step S305 may be executed, and the source terminal outputs a prompt message to prompt the user whether to confirm the transmission.

S303:所述源终端根据所述即时通讯账号对欲传输的目标文件进行加密。S303: The source terminal encrypts the target file to be transmitted according to the instant messaging account.

若源终端的好友关系链中存在该即时通讯账号对应的好友信息,说明目标终端是源终端标识的合法终端,因此,根据即时通讯账号对欲传输的目标文件进行加密。具体实现中,可以是直接将即时通讯账号作为目标文件的加密密码;也可以是将即时通讯账号作为密钥,根据该密钥采用加密算法设置加密密码,具体的,本发明实施例不作限制。若采用前者加密,目标终端直接根据即时通讯账号对目标文件进行解密即可;若为后者,则目标终端可以根据自身的即时通讯账号采用与源终端对应的加密算法获得原始的加密密码后,再采用该加密密码对目标文件进行解密。因此,后者安全性更高,用户对于非常重要的数据文件进行传输时可以采用后者进行加密。If there is friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal, it means that the target terminal is a legal terminal identified by the source terminal. Therefore, the target file to be transmitted is encrypted according to the instant messaging account. In specific implementation, the instant messaging account may be directly used as the encryption password of the target file; or the instant messaging account may be used as a key, and an encryption algorithm is used to set the encryption password according to the key. Specifically, this embodiment of the present invention does not limit it. If the former encryption is used, the target terminal can directly decrypt the target file according to the instant messaging account; if the latter is used, the target terminal can use the encryption algorithm corresponding to the source terminal to obtain the original encrypted password according to its own instant messaging account. Then use the encrypted password to decrypt the target file. Therefore, the latter is more secure, and users can use the latter for encryption when transferring very important data files.

S304:所述源终端向所述目标终端发送已加密的目标文件。S304: The source terminal sends the encrypted target file to the target terminal.

S305:输出提示信息,以提示用户是否确认传送。S305: Output prompt information to prompt the user whether to confirm the transmission.

若源终端的好友关系链中不存在该即时通讯账号对应的好友信息,说明目标终端不是源终端标识的合法终端,因此,所述源终端识别出所述目标终端不是合法终端,为保障目标文件的安全性,输出提示信息,以提示用户是否确认传送。其中,输出提示信息的方式可以是弹出对话框的方式,也可以是语音播报方式,具体的,本发明实施例不作限制。从而,用户获知源终端输出的提示信息后,进一步确认是否真正需要将目标文件传送给该目标终端,若是,则向源终端发起确认传送的指令,当然,也可以是源终端输出提示信息后,若在预设时长内未接收到用户输入的确认传送的指令,则自动发起确认传送或取消传送的指令,指示源终端向目标终端传送或不传送目标文件。具体的,本发明实施例不作限制。If there is no friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal, it means that the target terminal is not a legal terminal identified by the source terminal. Therefore, the source terminal recognizes that the target terminal is not a legal terminal. For security, output a prompt message to prompt the user whether to confirm the transmission. Wherein, the manner of outputting the prompt information may be a manner of popping up a dialog box, or may be a manner of voice broadcast, which is not limited in this embodiment of the present invention. Therefore, after the user learns the prompt information output by the source terminal, he further confirms whether the target file really needs to be transmitted to the target terminal, and if so, initiates an instruction to confirm the transmission to the source terminal. Of course, after the source terminal outputs the prompt information, If the instruction for confirming the transmission input by the user is not received within the preset time period, an instruction for confirming the transmission or canceling the transmission is automatically initiated, instructing the source terminal to transmit or not transmit the target file to the target terminal. Specifically, the embodiments of the present invention are not limited.

S306:若接收到确认传送的指令,所述源终端根据预设密钥对欲传输的目标文件进行加密。S306: If the instruction to confirm the transmission is received, the source terminal encrypts the target file to be transmitted according to the preset key.

若接收到确认传送的指令,说明用户期望向该目标终端传送目标文件,因此,采用预设密钥对欲传输的目标文件进行加密。作为一种实现方式,预设密钥可以是预先约定的加密密码的标识符,源终端和目标终端根据该标识符即可确定出具体的加密密码;也可以是源终端和目标终端共同的好友信息,例如,假设源终端和目标终端的即时通讯账号对应的好友信息中均存储有其共同的好友信息,如“张三”,于是,可以将“张三”作为预设密钥,该预设密钥对应的加密密码为“张三”对应的即时通讯账号,从而,目标终端接收到目标文件后,采用好友“张三”对应的即时通讯账号对目标文件进行解密。If the instruction for confirming the transmission is received, it means that the user expects to transmit the target file to the target terminal, therefore, the target file to be transmitted is encrypted with a preset key. As an implementation, the preset key can be an identifier of a pre-agreed encryption password, and the source terminal and the target terminal can determine the specific encryption password according to the identifier; it can also be a common friend of the source terminal and the target terminal Information, for example, assuming that the friend information corresponding to the instant messaging accounts of the source terminal and the target terminal all store their common friend information, such as "Zhang San", so "Zhang San" can be used as a preset key, and the preset Let the encryption password corresponding to the key be the instant messaging account corresponding to "Zhang San", so that after receiving the target file, the target terminal uses the instant messaging account corresponding to the friend "Zhang San" to decrypt the target file.

作为另一种示例,若接收到确认传送的指令,也可以自动将目标终端的即时通讯账号添加为好友,进而,根据该即时通讯账号对目标文件进行加密。具体的,本发明实施例不作限制。As another example, if the instruction for confirming the transmission is received, the instant messaging account of the target terminal may also be automatically added as a friend, and then the target file may be encrypted according to the instant messaging account. Specifically, the embodiments of the present invention are not limited.

S307:所述源终端向所述目标终端发送已加密的目标文件及所述预设密钥。S307: The source terminal sends the encrypted target file and the preset key to the target terminal.

具体的,请参见步骤S307,此处不再赘述。For details, please refer to step S307, which will not be repeated here.

在本发明实施例描述的文件处理方法中,源终端需要向目标终端传输目标文件时,源终端获取目标终端的标识信息;并根据所获取到的目标终端的标识信息识别该目标终端是否为合法终端;若是,则根据该标识信息对欲传输的目标文件进行加密;向目标终端发送已加密的目标文件。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,不仅可保障文件传输过程中的安全性,且操作简单。In the file processing method described in the embodiment of the present invention, when the source terminal needs to transmit the target file to the target terminal, the source terminal obtains the identification information of the target terminal; and identifies whether the target terminal is legal according to the acquired identification information of the target terminal terminal; if yes, encrypt the target file to be transmitted according to the identification information; send the encrypted target file to the target terminal. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. Decrypting the target file not only ensures the security of the file transfer process, but also makes the operation simple.

以上为“源终端”侧介绍的文件处理方法,下面从“目标终端”侧介绍一种文件处理方法的处理流程,值得说明的是,“目标终端”侧与“源终端”侧相同或对应的部分此处不再赘述,可以参照上述实施例的具体描述。The above is the file processing method introduced by the "source terminal" side. The following describes the processing flow of a file processing method from the "target terminal" side. It is worth noting that the "target terminal" side is the same as or corresponds to the "source terminal" side. Parts will not be described in detail here, and specific descriptions of the foregoing embodiments may be referred to.

请参见图4,图4是本发明实施例提供的一种文件处理方法的再一流程示意图,在本发明实施例中,该方法可以包括以下步骤。Please refer to FIG. 4 . FIG. 4 is another schematic flowchart of a file processing method provided by an embodiment of the present invention. In an embodiment of the present invention, the method may include the following steps.

S401:目标终端需要接收源终端欲传输的目标文件时,获取所述目标终端的标识信息。S401: When the target terminal needs to receive the target file to be transmitted by the source terminal, acquire the identification information of the target terminal.

例如,目标终端接收到源终端的文件传输请求时,若目标终端需要接收源终端欲传输的目标文件,则获取目标终端的标识信息。当然,也可以根据该请求识别当前的传送方式,若为“安全传送”方式,则获取目标终端的标识信息。For example, when the target terminal receives the file transfer request from the source terminal, if the target terminal needs to receive the target file to be transmitted by the source terminal, it acquires the identification information of the target terminal. Of course, the current transmission mode may also be identified according to the request, and if it is a "secure transmission" mode, the identification information of the target terminal is acquired.

S402:向所述源终端发送所述标识信息,以使所述源终端根据该标识信息对欲传输的目标文件进行加密。S402: Send the identification information to the source terminal, so that the source terminal encrypts the target file to be transmitted according to the identification information.

将所获取到的标识信息发送给源终端,以使源终端根据该标识信息对欲传输的目标文件进行加密。其中,所述标识信息可以是目标终端的手机号码或即时通讯账号,当然,还可以是标识符等其它信息,只要是源终端和目标终端通过该标识符可建立某种关联的信息均可以作为该标识信息。具体的,本发明实施例不作限制。Send the obtained identification information to the source terminal, so that the source terminal encrypts the target file to be transmitted according to the identification information. Wherein, the identification information may be the mobile phone number or instant messaging account of the target terminal, of course, it may also be other information such as an identifier, as long as the source terminal and the target terminal can establish a certain relationship through the identifier, it can be used as The identifying information. Specifically, the embodiments of the present invention are not limited.

S403:所述目标终端接收所述源终端发送的目标文件。S403: The target terminal receives the target file sent by the source terminal.

S404:若所述目标终端是所述源终端标识的合法终端,所述目标终端根据所述标识信息对所述目标文件进行解密。S404: If the target terminal is a legitimate terminal identified by the source terminal, the target terminal decrypts the target file according to the identification information.

具体实现中,源终端会根据目标终端的标识信息来识别目标终端是否为源终端的合法终端,若目标终端是源终端标识的合法终端,则源终端根据目标终端的标识信息对目标文件进行加密;目标终端接收到源终端所发送的目标文件后,根据所述标识信息对所述目标文件进行解密。具体的,可以参照上述步骤S103、S203或S303。当然,也可以是目标终端接收到对该目标文件的访问请求时,根据所述标识信息对所述目标文件进行解密。In specific implementation, the source terminal will identify whether the target terminal is a legal terminal of the source terminal according to the identification information of the target terminal. If the target terminal is a legal terminal identified by the source terminal, the source terminal will encrypt the target file according to the identification information of the target terminal ; After receiving the target file sent by the source terminal, the target terminal decrypts the target file according to the identification information. Specifically, reference may be made to the above steps S103, S203 or S303. Certainly, the target terminal may also decrypt the target file according to the identification information when receiving an access request to the target file.

在本发明实施例描述的文件处理方法中,目标终端需要接收源终端欲传输的目标文件时,获取所述目标终端的标识信息;并将该标识信息发送给源终端,以使所述源终端根据该标识信息对欲传输的目标文件进行加密;接收源终端发送过来的目标文件;若所述目标终端是所述源终端标识的合法终端,根据所述标识信息对所述目标文件进行解密。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,不仅可保障文件传输过程中的安全性,且操作简单。In the file processing method described in the embodiment of the present invention, when the target terminal needs to receive the target file to be transmitted by the source terminal, it obtains the identification information of the target terminal; and sends the identification information to the source terminal, so that the source terminal Encrypt the target file to be transmitted according to the identification information; receive the target file sent by the source terminal; if the target terminal is a legal terminal identified by the source terminal, decrypt the target file according to the identification information. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. Decrypting the target file not only ensures the security of the file transfer process, but also makes the operation simple.

值得说明的是,在上述实施例中,若目标终端不是源终端标识的合法终端,则源终端向目标终端传送目标文件时,还会传送预设密钥;目标终端接收源终端发送的目标文件和预设密钥;根据所述预设密钥对所述目标文件进行解密。具体的,可以参照上述步骤S206或S306,此处不再赘述。It is worth noting that, in the above embodiment, if the target terminal is not a legal terminal identified by the source terminal, the source terminal will also transmit the preset key when transmitting the target file to the target terminal; the target terminal receives the target file sent by the source terminal and a preset key; decrypting the target file according to the preset key. Specifically, reference may be made to the above step S206 or S306, which will not be repeated here.

下面为本发明装置实施例,本发明装置实施例与本发明方法实施例属于同一构思,用于执行本发明方法实施例中描述的方法。为了便于说明,本发明装置实施例仅示出与本发明装置实施例相关的部分,具体技术细节未揭示的,请参照本发明方法实施例的描述,此处不再一一赘述。在以下实施例中,所述终端可以包括:智能手机、电脑、平板电脑、笔记本电脑、掌上电脑以及移动互联网设备(MID)、PAD等终端设备。具体的,本发明实施例不作限制。The following are device embodiments of the present invention. The device embodiments of the present invention and the method embodiments of the present invention belong to the same concept, and are used to execute the method described in the method embodiments of the present invention. For ease of description, the device embodiment of the present invention only shows the parts related to the device embodiment of the present invention. For specific technical details not disclosed, please refer to the description of the method embodiment of the present invention, and details will not be repeated here. In the following embodiments, the terminal may include: a smart phone, a computer, a tablet computer, a notebook computer, a palmtop computer, and terminal equipment such as a mobile internet device (MID), and a PAD. Specifically, the embodiments of the present invention are not limited.

请参见图5,图5是本发明实施例提供的一种终端的结构示意图,在本发明实施例中,该终端可以包括:第一获取模块101、识别模块102、加密模块103和第一发送模块104。Please refer to FIG. 5. FIG. 5 is a schematic structural diagram of a terminal provided by an embodiment of the present invention. In an embodiment of the present invention, the terminal may include: a first acquisition module 101, an identification module 102, an encryption module 103 and a first sending Module 104.

第一获取模块101,用于源终端欲向目标终端传输目标文件时,获取所述目标终端的标识信息。The first obtaining module 101 is configured to obtain the identification information of the target terminal when the source terminal intends to transmit the target file to the target terminal.

识别模块102,用于根据所述标识信息识别所述目标终端是否为合法终端。The identification module 102 is configured to identify whether the target terminal is a legal terminal according to the identification information.

加密模块103,用于若所述目标终端是合法终端,根据所述标识信息对欲传输的目标文件进行加密。The encryption module 103 is configured to encrypt the target file to be transmitted according to the identification information if the target terminal is a legitimate terminal.

第一发送模块104,用于向所述目标终端发送已加密的目标文件。The first sending module 104 is configured to send the encrypted target file to the target terminal.

在本发明实施例描述的终端中,源终端需要向目标终端传输目标文件时,获取目标终端的标识信息;并根据所获取到的目标终端的标识信息识别该目标终端是否为合法终端;若是,则根据该标识信息对欲传输的目标文件进行加密;向目标终端发送已加密的目标文件。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,不仅可保障文件传输过程中的安全性,且操作简单。In the terminal described in the embodiment of the present invention, when the source terminal needs to transmit the target file to the target terminal, obtain the identification information of the target terminal; and identify whether the target terminal is a legal terminal according to the obtained identification information of the target terminal; if so, Then encrypt the target file to be transmitted according to the identification information; and send the encrypted target file to the target terminal. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. Decrypting the target file not only ensures the security of the file transfer process, but also makes the operation simple.

请参见图6,图6是本发明实施例提供的一种终端的另一结构示意图,在本发明实施例中,该终端可以包括:第一获取模块201、识别模块202、加密模块203、第一发送模块204和输出模块205。Please refer to FIG. 6. FIG. 6 is another structural diagram of a terminal provided by an embodiment of the present invention. In an embodiment of the present invention, the terminal may include: a first acquisition module 201, an identification module 202, an encryption module 203, A sending module 204 and an output module 205 .

第一获取模块201,用于源终端欲向目标终端传输目标文件时,获取所述目标终端的标识信息。The first obtaining module 201 is configured to obtain the identification information of the target terminal when the source terminal intends to transmit the target file to the target terminal.

识别模块202,用于根据所述标识信息识别所述目标终端是否为合法终端。The identification module 202 is configured to identify whether the target terminal is a legal terminal according to the identification information.

加密模块203,用于若所述目标终端是合法终端,根据所述标识信息对欲传输的目标文件进行加密。The encryption module 203 is configured to encrypt the target file to be transmitted according to the identification information if the target terminal is a legal terminal.

第一发送模块204,用于向所述目标终端发送已加密的目标文件。The first sending module 204 is configured to send the encrypted target file to the target terminal.

输出模块205,用于若所述目标终端不是合法终端,输出提示信息,以提示用户是否确认传送。The output module 205 is configured to output prompt information to prompt the user whether to confirm the transmission if the target terminal is not a legitimate terminal.

在一种实现方式中,所述标识信息包括手机号码或即时通讯账号。In an implementation manner, the identification information includes a mobile phone number or an instant messaging account.

在一种实现方式中,若所述标识信息为手机号码,识别模块202具体用于:In an implementation manner, if the identification information is a mobile phone number, the identification module 202 is specifically configured to:

查询本地通讯录中是否存在该手机号码对应的联系人信息;Query whether there is contact information corresponding to the mobile phone number in the local address book;

若存在,识别出所述目标终端是合法终端;If it exists, identifying that the target terminal is a legitimate terminal;

若不存在,识别出所述目标终端不是合法终端。If not, it is identified that the target terminal is not a legitimate terminal.

在一种实现方式中,若所述标识信息为即时通讯账号,识别模块202具体用于:In an implementation manner, if the identification information is an instant messaging account, the identification module 202 is specifically configured to:

根据所述即时通讯账号查询所述源终端的好友关系链中是否存在该即时通讯账号对应的好友信息;Querying whether there is friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal according to the instant messaging account;

若存在,识别出所述目标终端是合法终端;If it exists, identifying that the target terminal is a legitimate terminal;

若不存在,识别出所述目标终端不是合法终端。If not, it is identified that the target terminal is not a legitimate terminal.

在一种实现方式中,加密模块203还用于:若接收到确认传送的指令,根据预设密钥对欲传输的目标文件进行加密;In one implementation, the encryption module 203 is also used to: if an instruction confirming the transmission is received, encrypt the target file to be transmitted according to the preset key;

第一发送模块204还用于:向所述目标终端发送已加密的目标文件及所述预设密钥。The first sending module 204 is further configured to: send the encrypted target file and the preset key to the target terminal.

在本发明实施例描述的终端中,源终端需要向目标终端传输目标文件时,获取目标终端的标识信息;并根据所获取到的目标终端的标识信息识别该目标终端是否为合法终端;若是,则根据该标识信息对欲传输的目标文件进行加密;向目标终端发送已加密的目标文件。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,不仅可保障文件传输过程中的安全性,且操作简单。In the terminal described in the embodiment of the present invention, when the source terminal needs to transmit the target file to the target terminal, obtain the identification information of the target terminal; and identify whether the target terminal is a legal terminal according to the obtained identification information of the target terminal; if so, Then encrypt the target file to be transmitted according to the identification information; and send the encrypted target file to the target terminal. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. Decrypting the target file not only ensures the security of the file transfer process, but also makes the operation simple.

请参见图7,图7是本发明实施例提供的一种终端的又一结构示意图,在本发明实施例中,该终端可以包括:第二获取模块301、第二发送模块302、接收模块303和解密模块304。Please refer to FIG. 7. FIG. 7 is another schematic structural diagram of a terminal provided by an embodiment of the present invention. In an embodiment of the present invention, the terminal may include: a second acquiring module 301, a second sending module 302, and a receiving module 303 and decryption module 304.

第二获取模块301,用于目标终端需要接收源终端欲传输的目标文件时,获取所述目标终端的标识信息。The second acquiring module 301 is configured to acquire the identification information of the target terminal when the target terminal needs to receive the target file to be transmitted by the source terminal.

第二发送模块302,用于向所述源终端发送所述标识信息,以使所述源终端根据该标识信息对所述目标文件进行加密。The second sending module 302 is configured to send the identification information to the source terminal, so that the source terminal encrypts the target file according to the identification information.

接收模块303,用于接收所述源终端发送的所述目标文件。The receiving module 303 is configured to receive the target file sent by the source terminal.

解密模块304,用于若所述目标终端是所述源终端标识的合法终端,所述目标终端根据所述标识信息对所述目标文件进行解密。The decryption module 304 is configured to, if the target terminal is a legitimate terminal identified by the source terminal, the target terminal decrypts the target file according to the identification information.

在一种实现方式中,接收模块303还用于:In an implementation manner, the receiving module 303 is also used to:

若所述目标终端不是所述源终端标识的合法终端,接收所述源终端发送的目标文件和预设密钥;If the target terminal is not a legal terminal identified by the source terminal, receiving the target file and the preset key sent by the source terminal;

解密模块304还用于:根据所述预设密钥对所述目标文件进行解密。The decryption module 304 is further configured to: decrypt the target file according to the preset key.

在一种实现方式中,所述标识信息包括手机号码或即时通讯账号。In an implementation manner, the identification information includes a mobile phone number or an instant messaging account.

在本发明实施例描述的终端中,目标终端需要接收源终端欲传输的目标文件时,获取所述目标终端的标识信息;并将该标识信息发送给源终端,以使所述源终端根据该标识信息对欲传输的目标文件进行加密;接收源终端发送过来的目标文件;若所述目标终端是所述源终端标识的合法终端,根据所述标识信息对所述目标文件进行解密。采用本发明实施例,若目标终端为源终端标识的合法终端,源终端向目标终端传输目标文件时,根据目标终端的标识信息自动给目标文件设置密钥,目标终端根据自身的标识信息自动对目标文件进行解密,不仅可保障文件传输过程中的安全性,且操作简单。In the terminal described in the embodiment of the present invention, when the target terminal needs to receive the target file to be transmitted by the source terminal, it obtains the identification information of the target terminal; and sends the identification information to the source terminal, so that the source terminal according to the The identification information encrypts the target file to be transmitted; receives the target file sent by the source terminal; if the target terminal is a legal terminal identified by the source terminal, decrypts the target file according to the identification information. According to the embodiment of the present invention, if the target terminal is a legal terminal identified by the source terminal, when the source terminal transmits the target file to the target terminal, the key is automatically set for the target file according to the identification information of the target terminal, and the target terminal automatically encrypts the target file according to its own identification information. Decrypting the target file not only ensures the security of the file transfer process, but also makes the operation simple.

在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定是必须针对相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of this specification, descriptions referring to the terms "one embodiment", "some embodiments", "example", "specific examples", or "some examples" mean that specific features described in connection with the embodiment or example , structure, material or feature is included in at least one embodiment or example of the present invention. In this specification, the schematic representations of the above terms are not necessarily necessarily directed to the same embodiment or example. Furthermore, the described specific features, structures, materials or characteristics may be combined in any suitable manner in any one or more embodiments or examples. In addition, those skilled in the art can combine and combine different embodiments or examples and features of different embodiments or examples described in this specification without conflicting with each other.

本领域的技术人员可以将本说明书中描述的不同实施例以及不同实施例的特征进行结合和组合。本发明所有实施例中的模块或单元,可以通过通用集成电路,例如CPU(Central Processing Unit,中央处理器),或通过ASIC(ApplicationSpecific Integrated Circuit,专用集成电路)来实现。Those skilled in the art can combine and combine different embodiments and features of different embodiments described in this specification. The modules or units in all embodiments of the present invention can be realized by a general-purpose integrated circuit, such as a CPU (Central Processing Unit, central processing unit), or by an ASIC (Application Specific Integrated Circuit, application-specific integrated circuit).

本发明所有实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减;本发明所有实施例装置中的模块或单元可以根据实际需要进行合并、划分和删减。The steps in the methods of all embodiments of the present invention can be adjusted, combined and deleted according to actual needs; the modules or units in the devices of all embodiments of the present invention can be combined, divided and deleted according to actual needs.

流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本发明的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本发明的实施例所属技术领域的技术人员所理解。Any process or method descriptions in flowcharts or otherwise described herein may be understood to represent modules, segments or portions of code comprising one or more executable instructions for implementing specific logical functions or steps of the process , and the scope of preferred embodiments of the invention includes alternative implementations in which functions may be performed out of the order shown or discussed, including substantially concurrently or in reverse order depending on the functions involved, which shall It is understood by those skilled in the art to which the embodiments of the present invention pertain.

在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。就本说明书而言,"计算机可读介质"可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印所述程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得所述程序,然后将其存储在计算机存储器中。The logic and/or steps represented in the flowcharts or otherwise described herein, for example, can be considered as a sequenced listing of executable instructions for implementing logical functions, which can be embodied in any computer-readable medium, For use with instruction execution systems, devices, or devices (such as computer-based systems, systems including processors, or other systems that can fetch instructions from instruction execution systems, devices, or devices and execute instructions), or in conjunction with these instruction execution systems, devices or equipment for use. For the purposes of this specification, a "computer-readable medium" may be any device that can contain, store, communicate, propagate or transmit a program for use in or in conjunction with an instruction execution system, device, or device. More specific examples (non-exhaustive list) of computer-readable media include the following: electrical connection with one or more wires (electronic device), portable computer disk case (magnetic device), random access memory (RAM), Read Only Memory (ROM), Erasable and Editable Read Only Memory (EPROM or Flash Memory), Fiber Optic Devices, and Portable Compact Disc Read Only Memory (CDROM). In addition, the computer-readable medium may even be paper or other suitable medium on which the program can be printed, since the program can be read, for example, by optically scanning the paper or other medium, followed by editing, interpretation or other suitable processing if necessary. The program is processed electronically and stored in computer memory.

本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。Those of ordinary skill in the art can understand that all or part of the steps carried by the methods of the above embodiments can be completed by instructing related hardware through a program, and the program can be stored in a computer-readable storage medium. During execution, one or a combination of the steps of the method embodiments is included.

此外,在本发明各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing module, each unit may exist separately physically, or two or more units may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. If the integrated modules are realized in the form of software function modules and sold or used as independent products, they can also be stored in a computer-readable storage medium.

上述提到的存储介质可以是只读存储器,磁盘或光盘等。尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制,本领域的普通技术人员在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。The storage medium mentioned above may be a read-only memory, a magnetic disk or an optical disk, and the like. Although the embodiments of the present invention have been shown and described above, it can be understood that the above embodiments are exemplary and should not be construed as limiting the present invention, those skilled in the art can make the above-mentioned The embodiments are subject to changes, modifications, substitutions and variations.

以上所揭露的仅为本发明的较佳实施例而已,当然不能以此来限定本发明之权利范围,本领域普通技术人员可以理解实现上述实施例的全部或部分流程,并依本发明权利要求所作的等同变化,仍属于发明所涵盖的范围。What is disclosed above is only a preferred embodiment of the present invention, and certainly cannot limit the scope of rights of the present invention with this. Those of ordinary skill in the art can understand all or part of the process for realizing the above embodiments, and according to the claims of the present invention The equivalent changes made still belong to the scope covered by the invention.

Claims (18)

1.一种文件处理方法,其特征在于,包括:1. A file processing method, characterized in that, comprising: 源终端欲向目标终端传输目标文件时,获取所述目标终端的标识信息;When the source terminal intends to transmit the target file to the target terminal, obtain the identification information of the target terminal; 所述源终端根据所述标识信息识别所述目标终端是否为合法终端;identifying, by the source terminal, whether the target terminal is a legitimate terminal according to the identification information; 若是,所述源终端根据所述标识信息对欲传输的目标文件进行加密;If yes, the source terminal encrypts the target file to be transmitted according to the identification information; 所述源终端向所述目标终端发送已加密的目标文件。The source terminal sends the encrypted target file to the target terminal. 2.如权利你要求1所述的方法,其特征在于,所述标识信息包括手机号码或即时通讯账号。2. The method according to claim 1, wherein the identification information includes a mobile phone number or an instant messaging account. 3.如权利要求2所述的方法,其特征在于,若所述标识信息为手机号码,所述源终端根据所述标识信息识别所述目标终端是否为合法终端,包括:3. The method according to claim 2, wherein if the identification information is a mobile phone number, the source terminal identifies whether the target terminal is a legitimate terminal according to the identification information, comprising: 所述源终端查询本地通讯录中是否存在该手机号码对应的联系人信息;The source terminal queries whether there is contact information corresponding to the mobile phone number in the local address book; 若存在,所述源终端识别出所述目标终端是合法终端;If it exists, the source terminal identifies that the target terminal is a legal terminal; 若不存在,所述源终端识别出所述目标终端不是合法终端。If not, the source terminal recognizes that the target terminal is not a legitimate terminal. 4.如权利要求2所述的方法,其特征在于,若所述标识信息为即时通讯账号,所述源终端根据所述标识信息识别所述目标终端是否为合法终端,包括:4. The method according to claim 2, wherein if the identification information is an instant messaging account, the source terminal identifies whether the target terminal is a legitimate terminal according to the identification information, comprising: 所述源终端根据所述即时通讯账号查询所述源终端的好友关系链中是否存在该即时通讯账号对应的好友信息;The source terminal queries whether there is friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal according to the instant messaging account; 若存在,所述源终端识别出所述目标终端是合法终端;If it exists, the source terminal identifies that the target terminal is a legitimate terminal; 若不存在,所述源终端识别出所述目标终端不是合法终端。If not, the source terminal recognizes that the target terminal is not a legitimate terminal. 5.如权利要求1、3、4任一项所述的方法,其特征在于,所述源终端根据所述标识信息识别所述目标终端是否为合法终端之后,所述方法还包括:5. The method according to any one of claims 1, 3, and 4, wherein after the source terminal identifies whether the target terminal is a legal terminal according to the identification information, the method further comprises: 若所述源终端识别出所述目标终端不是合法终端,输出提示信息,以提示用户是否确认传送。If the source terminal recognizes that the target terminal is not a legitimate terminal, it outputs prompt information to prompt the user whether to confirm the transmission. 6.如权利要求5所述的方法,其特征在于,所述输出提示信息之后,所述方法还包括:6. The method according to claim 5, wherein after the prompt information is output, the method further comprises: 若接收到确认传送的指令,所述源终端根据预设密钥对欲传输的目标文件进行加密;If the instruction for confirming the transmission is received, the source terminal encrypts the target file to be transmitted according to the preset key; 所述源终端向所述目标终端发送已加密的目标文件及所述预设密钥。The source terminal sends the encrypted target file and the preset key to the target terminal. 7.一种文件处理方法,其特征在于,包括:7. A file processing method, characterized in that, comprising: 目标终端需要接收源终端欲传输的目标文件时,获取所述目标终端的标识信息;When the target terminal needs to receive the target file to be transmitted by the source terminal, obtain the identification information of the target terminal; 所述目标终端向所述源终端发送所述标识信息,以使所述源终端根据该标识信息对所述目标文件进行加密;The target terminal sends the identification information to the source terminal, so that the source terminal encrypts the target file according to the identification information; 所述目标终端接收所述源终端发送的所述目标文件;The target terminal receives the target file sent by the source terminal; 若所述目标终端是所述源终端标识的合法终端,所述目标终端根据所述标识信息对所述目标文件进行解密。If the target terminal is a legitimate terminal identified by the source terminal, the target terminal decrypts the target file according to the identification information. 8.如权利要求7所述的方法,其特征在于,所述方法还包括:8. The method of claim 7, further comprising: 若所述目标终端不是所述源终端标识的合法终端,接收所述源终端发送的目标文件和预设密钥;If the target terminal is not a legal terminal identified by the source terminal, receiving the target file and the preset key sent by the source terminal; 根据所述预设密钥对所述目标文件进行解密。The target file is decrypted according to the preset key. 9.如权利要求7或8所述的方法,其特征在于,所述标识信息包括手机号码或即时通讯账号。9. The method according to claim 7 or 8, wherein the identification information includes a mobile phone number or an instant messaging account. 10.一种终端,其特征在于,包括:10. A terminal, characterized in that, comprising: 第一获取模块,用于源终端欲向目标终端传输目标文件时,获取所述目标终端的标识信息;The first obtaining module is used for obtaining the identification information of the target terminal when the source terminal intends to transmit the target file to the target terminal; 识别模块,用于根据所述标识信息识别所述目标终端是否为合法终端;An identification module, configured to identify whether the target terminal is a legal terminal according to the identification information; 加密模块,用于若所述目标终端是合法终端,根据所述标识信息对欲传输的目标文件进行加密;An encryption module, configured to encrypt the target file to be transmitted according to the identification information if the target terminal is a legitimate terminal; 第一发送模块,用于向所述目标终端发送已加密的目标文件。The first sending module is configured to send the encrypted target file to the target terminal. 11.如权利要求10所述的终端,其特征在于,所述标识信息包括手机号码或即时通讯账号。11. The terminal according to claim 10, wherein the identification information includes a mobile phone number or an instant messaging account. 12.如权利要求11所述的终端,其特征在于,若所述标识信息为手机号码,所述识别模块具体用于:12. The terminal according to claim 11, wherein if the identification information is a mobile phone number, the identification module is specifically used for: 查询本地通讯录中是否存在该手机号码对应的联系人信息;Query whether there is contact information corresponding to the mobile phone number in the local address book; 若存在,识别出所述目标终端是合法终端;If it exists, identifying that the target terminal is a legitimate terminal; 若不存在,识别出所述目标终端不是合法终端。If not, it is identified that the target terminal is not a legitimate terminal. 13.如权利要求11所述的终端,其特征在于,若所述标识信息为即时通讯账号,所述识别模块具体用于:13. The terminal according to claim 11, wherein if the identification information is an instant messaging account, the identification module is specifically used for: 根据所述即时通讯账号查询所述源终端的好友关系链中是否存在该即时通讯账号对应的好友信息;Querying whether there is friend information corresponding to the instant messaging account in the friend relationship chain of the source terminal according to the instant messaging account; 若存在,识别出所述目标终端是合法终端;If it exists, identifying that the target terminal is a legitimate terminal; 若不存在,识别出所述目标终端不是合法终端。If not, it is identified that the target terminal is not a legitimate terminal. 14.如权利要求10、12、13任一项所述的终端,其特征在于,所述终端还包括:14. The terminal according to any one of claims 10, 12, and 13, wherein the terminal further comprises: 输出模块,用于若所述目标终端不是合法终端,输出提示信息,以提示用户是否确认传送。An output module, configured to output prompt information to prompt the user whether to confirm the transmission if the target terminal is not a legal terminal. 15.如权利要求14所述的终端,其特征在于,所述加密模块,还用于若接收到确认传送的指令,根据预设密钥对欲传输的目标文件进行加密;15. The terminal according to claim 14, wherein the encryption module is further configured to encrypt the target file to be transmitted according to a preset key if an instruction confirming transmission is received; 所述第一发送模块,还用于向所述目标终端发送已加密的目标文件及所述预设密钥。The first sending module is further configured to send the encrypted target file and the preset key to the target terminal. 16.一种终端,其特征在于,包括:16. A terminal, characterized in that, comprising: 第二获取模块,用于目标终端需要接收源终端欲传输的目标文件时,获取所述目标终端的标识信息;The second obtaining module is used for obtaining the identification information of the target terminal when the target terminal needs to receive the target file to be transmitted by the source terminal; 第二发送模块,用于向所述源终端发送所述标识信息,以使所述源终端根据该标识信息对所述目标文件进行加密;A second sending module, configured to send the identification information to the source terminal, so that the source terminal encrypts the target file according to the identification information; 接收模块,用于接收所述源终端发送的所述目标文件;a receiving module, configured to receive the target file sent by the source terminal; 解密模块,用于若所述目标终端是所述源终端标识的合法终端,所述目标终端根据所述标识信息对所述目标文件进行解密。A decryption module, configured to decrypt the target file according to the identification information if the target terminal is a legitimate terminal identified by the source terminal. 17.如权利要求16所述的终端,其特征在于,所述接收模块,还用于若所述目标终端不是所述源终端标识的合法终端,接收所述源终端发送的目标文件和预设密钥;17. The terminal according to claim 16, wherein the receiving module is further configured to, if the target terminal is not a legal terminal identified by the source terminal, receive the target file and preset information sent by the source terminal key; 所述解密模块,还用于根据所述预设密钥对所述目标文件进行解密。The decryption module is further configured to decrypt the target file according to the preset key. 18.如权利要求16或17所述的终端,其特征在于,所述标识信息包括手机号码或即时通讯账号。18. The terminal according to claim 16 or 17, wherein the identification information includes a mobile phone number or an instant messaging account.
CN201410663154.9A 2014-11-19 2014-11-19 A kind of document handling method and terminal Active CN104507080B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810134907.5A CN108183972B (en) 2014-11-19 2014-11-19 File processing method and terminal
CN201410663154.9A CN104507080B (en) 2014-11-19 2014-11-19 A kind of document handling method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410663154.9A CN104507080B (en) 2014-11-19 2014-11-19 A kind of document handling method and terminal

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201810134907.5A Division CN108183972B (en) 2014-11-19 2014-11-19 File processing method and terminal

Publications (2)

Publication Number Publication Date
CN104507080A true CN104507080A (en) 2015-04-08
CN104507080B CN104507080B (en) 2018-03-27

Family

ID=52948782

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810134907.5A Active CN108183972B (en) 2014-11-19 2014-11-19 File processing method and terminal
CN201410663154.9A Active CN104507080B (en) 2014-11-19 2014-11-19 A kind of document handling method and terminal

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810134907.5A Active CN108183972B (en) 2014-11-19 2014-11-19 File processing method and terminal

Country Status (1)

Country Link
CN (2) CN108183972B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007561A (en) * 2015-06-10 2015-10-28 广东欧珀移动通信有限公司 Bluetooth data transmission method, device, system and a mobile terminal
CN106372521A (en) * 2016-09-28 2017-02-01 珠海市魅族科技有限公司 Data operation method and device
CN106534157A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Data transmission method, device and terminal
WO2017071330A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 Data encryption and decryption method and encryption and decryption device
WO2017071324A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 File-transmission encryption and decryption method and encryption and decryption device
CN106685791A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Method and device for sending confidential information
CN106707978A (en) * 2015-11-13 2017-05-24 北京奇虎科技有限公司 Method of transferring intelligent household control right through address book and the address book
WO2017206505A1 (en) * 2016-05-30 2017-12-07 宇龙计算机通信科技(深圳)有限公司 Method for accessing private information, access device, and terminal
CN107749878A (en) * 2017-10-16 2018-03-02 新华三信息安全技术有限公司 A kind of method and device of synchronous documents
CN108243161A (en) * 2016-12-26 2018-07-03 北京润信恒达科技有限公司 A kind of terminal speech encryption method and voice encryption system
CN108259412A (en) * 2016-12-28 2018-07-06 中国移动通信集团湖北有限公司 The methods, devices and systems of information processing
CN108377319A (en) * 2018-03-15 2018-08-07 北京顶象技术有限公司 picture transmission method and device
CN109802885A (en) * 2019-01-17 2019-05-24 安徽云探索网络科技有限公司 Instant message communication method based on cloud storage
EP3603147A1 (en) * 2017-03-27 2020-02-05 Symantec Corporation Systems and methods for enforcing data loss prevention policies
CN111464531A (en) * 2020-03-31 2020-07-28 洛阳理工学院 Instant confirmation type file transmission method based on multiple encryption

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956402A (en) * 1997-03-07 1999-09-21 At&T Corp. Passwordless secure and efficient remote data update
CN1494252A (en) * 2002-10-31 2004-05-05 华为技术有限公司 Encryption communication method and device
CN1697424A (en) * 2005-05-09 2005-11-16 朱文和 Method for carrying out private security data communication base on decimal communication numbers
CN101141680A (en) * 2007-09-30 2008-03-12 中兴通讯股份有限公司 Short message encrypting transmission and reception method
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 A wireless network security transmission method, system and device
EP1993240A1 (en) * 2007-05-18 2008-11-19 Alcatel Lucent Determination of a security assurance level of a mobile communication involving the network operator
CN101616142A (en) * 2008-06-24 2009-12-30 香港城市大学 Method and system for realizing information encryption transmission
CN102196421A (en) * 2010-03-11 2011-09-21 北京明朝万达科技有限公司 Trust-relationship-based file security transmission method for handheld terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8321690B2 (en) * 2005-08-11 2012-11-27 Microsoft Corporation Protecting digital media of various content types
CN102685119A (en) * 2012-04-28 2012-09-19 上海杰之能信息科技有限公司 Data transmitting/receiving method, data transmitting/receiving device, transmission method, transmission system and server
CN103414790A (en) * 2013-08-30 2013-11-27 苏州跨界软件科技有限公司 File transfer system based on NFC

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956402A (en) * 1997-03-07 1999-09-21 At&T Corp. Passwordless secure and efficient remote data update
CN1494252A (en) * 2002-10-31 2004-05-05 华为技术有限公司 Encryption communication method and device
CN1697424A (en) * 2005-05-09 2005-11-16 朱文和 Method for carrying out private security data communication base on decimal communication numbers
EP1993240A1 (en) * 2007-05-18 2008-11-19 Alcatel Lucent Determination of a security assurance level of a mobile communication involving the network operator
CN101141680A (en) * 2007-09-30 2008-03-12 中兴通讯股份有限公司 Short message encrypting transmission and reception method
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 A wireless network security transmission method, system and device
CN101616142A (en) * 2008-06-24 2009-12-30 香港城市大学 Method and system for realizing information encryption transmission
CN102196421A (en) * 2010-03-11 2011-09-21 北京明朝万达科技有限公司 Trust-relationship-based file security transmission method for handheld terminal

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007561A (en) * 2015-06-10 2015-10-28 广东欧珀移动通信有限公司 Bluetooth data transmission method, device, system and a mobile terminal
US9979706B2 (en) 2015-10-28 2018-05-22 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data encryption and decryption method and encryption and decryption device
CN108200093B (en) * 2015-10-28 2021-08-24 Oppo广东移动通信有限公司 Encryption and decryption method and encryption and decryption device for transmission files
CN108200093A (en) * 2015-10-28 2018-06-22 广东欧珀移动通信有限公司 Transmit the encryption and decryption approaches and encryption and decryption devices of file
WO2017071330A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 Data encryption and decryption method and encryption and decryption device
WO2017071324A1 (en) * 2015-10-28 2017-05-04 广东欧珀移动通信有限公司 File-transmission encryption and decryption method and encryption and decryption device
CN106685791A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Method and device for sending confidential information
CN106707978A (en) * 2015-11-13 2017-05-24 北京奇虎科技有限公司 Method of transferring intelligent household control right through address book and the address book
WO2017206505A1 (en) * 2016-05-30 2017-12-07 宇龙计算机通信科技(深圳)有限公司 Method for accessing private information, access device, and terminal
CN106372521B (en) * 2016-09-28 2019-11-08 珠海市魅族科技有限公司 A kind of data run method and device
CN106372521A (en) * 2016-09-28 2017-02-01 珠海市魅族科技有限公司 Data operation method and device
CN106534157A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Data transmission method, device and terminal
CN108243161A (en) * 2016-12-26 2018-07-03 北京润信恒达科技有限公司 A kind of terminal speech encryption method and voice encryption system
CN108259412A (en) * 2016-12-28 2018-07-06 中国移动通信集团湖北有限公司 The methods, devices and systems of information processing
EP3603147A1 (en) * 2017-03-27 2020-02-05 Symantec Corporation Systems and methods for enforcing data loss prevention policies
CN107749878B (en) * 2017-10-16 2021-05-14 新华三信息安全技术有限公司 Method and device for synchronizing files
CN107749878A (en) * 2017-10-16 2018-03-02 新华三信息安全技术有限公司 A kind of method and device of synchronous documents
CN108377319A (en) * 2018-03-15 2018-08-07 北京顶象技术有限公司 picture transmission method and device
CN108377319B (en) * 2018-03-15 2020-04-17 北京顶象技术有限公司 Picture transmission method and device
CN109802885A (en) * 2019-01-17 2019-05-24 安徽云探索网络科技有限公司 Instant message communication method based on cloud storage
CN111464531A (en) * 2020-03-31 2020-07-28 洛阳理工学院 Instant confirmation type file transmission method based on multiple encryption

Also Published As

Publication number Publication date
CN108183972B (en) 2019-08-30
CN104507080B (en) 2018-03-27
CN108183972A (en) 2018-06-19

Similar Documents

Publication Publication Date Title
CN104507080B (en) A kind of document handling method and terminal
US10154018B2 (en) Method and system for facilitating network joining
US9294287B2 (en) Interrogating an authentication device
US20190089684A1 (en) Method and system for encrypted communications
CN106663162B (en) Securely pairing computing devices
US8099761B2 (en) Protocol for device to station association
WO2015180691A1 (en) Key agreement method and device for verification information
US20150264724A1 (en) Method and system of establishing wireless communication connection
US10230697B2 (en) User terminals, and methods and computer-readable recording mediums storing computer programs for transmitting and receiving messages
US9100773B2 (en) Verifying a wireless device
US20140173686A1 (en) Device Communication Based On Device Trustworthiness
CN110663055A (en) Facilitating funds transfer between user accounts
CN104520805A (en) Secure app ecosystem with key and data exchange according to enterprise information control policy
KR101418797B1 (en) Security token device for cloud service, system for providing security cloud service and method thereof
EP2727390B1 (en) Secure context-based computing
US10460117B2 (en) System and method for removing internet attack surface from internet connected devices
JP2019514314A (en) Method, system and medium for using dynamic public key infrastructure to send and receive encrypted messages
WO2017166362A1 (en) Esim number writing method, security system, esim number server, and terminal
WO2016126151A1 (en) System for establishing secure communication between multiple electronic communication devices
JP6192495B2 (en) Semiconductor device, information terminal, semiconductor element control method, and information terminal control method
CN105022965A (en) Data encryption method and apparatus
TWI633800B (en) Methods for device pairing and data transmission in handheld communication devices
CN105825247B (en) A kind of card reader and data transmission method
KR20190007336A (en) Method and apparatus for generating end-to-end security channel, and method and apparatus for transmitting/receiving secure information using security channel
CN110460567B (en) A kind of identity authentication method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder