CN107896207A - A kind of data migration method, terminal and computer-readable recording medium - Google Patents
A kind of data migration method, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107896207A CN107896207A CN201710900852.XA CN201710900852A CN107896207A CN 107896207 A CN107896207 A CN 107896207A CN 201710900852 A CN201710900852 A CN 201710900852A CN 107896207 A CN107896207 A CN 107896207A
- Authority
- CN
- China
- Prior art keywords
- data
- terminal
- safety detection
- move
- migrating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005012 migration Effects 0.000 title claims abstract description 103
- 238000013508 migration Methods 0.000 title claims abstract description 103
- 238000000034 method Methods 0.000 title claims abstract description 68
- 238000001514 detection method Methods 0.000 claims abstract description 265
- 230000005540 biological transmission Effects 0.000 claims abstract description 17
- 230000006854 communication Effects 0.000 claims description 48
- 238000004891 communication Methods 0.000 claims description 47
- 238000012545 processing Methods 0.000 claims description 40
- 238000009434 installation Methods 0.000 claims description 38
- 238000012360 testing method Methods 0.000 claims description 11
- 238000007689 inspection Methods 0.000 claims description 10
- 235000013399 edible fruits Nutrition 0.000 claims description 7
- 239000000284 extract Substances 0.000 claims description 3
- 238000011900 installation process Methods 0.000 claims description 3
- 241000700605 Viruses Species 0.000 abstract description 7
- 230000008569 process Effects 0.000 description 17
- 230000006870 function Effects 0.000 description 15
- 230000009471 action Effects 0.000 description 11
- 230000014509 gene expression Effects 0.000 description 11
- 230000007704 transition Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001629 suppression Effects 0.000 description 2
- 230000003612 virological effect Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000001404 mediated effect Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000009527 percussion Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 241000894007 species Species 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/563—Data redirection of data network streams
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of data migration method, terminal and computer-readable recording medium, this method be applied to data move into terminal and data move out terminal Data Migration in, including data move into terminal receive data move out terminal transmission migrating data, data move into the safety detection result that terminal obtains migrating data, and data move into terminal and the migrating data is handled according to safety detection result;The invention also discloses a kind of terminal and computer-readable recording medium, the above-mentioned function of computer-readable recording medium storage program and allow processor implement such scheme, reduce data move into terminal because Data Migration and by virus risk, realize improve Data Migration security technique effect.
Description
Technical field
, can more specifically to a kind of data migration method, terminal and computer the present invention relates to communication technical field
Read storage medium.
Background technology
At present, for the behavior of changing planes of mobile terminal, mobile terminal producer is also proposed a respective key and changed planes business.It is existing
Some business of changing planes are directly migrated to the application program on old mobile terminal and data on new mobile terminal, are being moved
During shifting, the application program and data that will not come to the migration on old mobile terminal etc. are examined safely accordingly
Survey, for example, after excluding viral equivalent risk, just store data on new mobile terminal.
It is existing technically because it is in transition process, direct reception processing migrating data, exist by change planes propagate
The risk of virus.Therefore, it is necessary to propose a kind of new data migration method, for solving to ask present in prior art
Topic.
The content of the invention
The technical problem to be solved in the present invention is:In available data transition process, data move into terminal not to transport number
According to safety detection is carried out, the risk of virus may be transmitted by causing data to move into terminal presence, for the technical problem, there is provided one
Kind data migration method, terminal and computer-readable recording medium.
In order to solve the above technical problems, the present invention provides a kind of data migration method, the data migration method includes:
Data move into terminal receive data move out terminal transmission migrating data;
The data move into the safety detection result that terminal obtains the migrating data;
The data move into terminal and the migrating data are handled according to the safety detection result.
Optionally, the data move into terminal and obtain the safety detection result of the migrating data and include:
The data move into the migrating data that end-on receives and carry out safety by default first safety detection rule
Detection obtains the safety detection result of the migrating data.
Optionally, the migrating data is that data terminal of moving out is regular by default second safety detection before sending
Safety detection result is carried to issue in the migrating data and described moves into end by the data after detection, data terminal of moving out
End, or the data are sent to by the default safety detection result instruction independently of the migrating data and move into terminal;
The safety detection result that the data move into the terminal acquisition migrating data includes:
The data move into terminal the data move out terminal by safety detection result carry in the migrating data
When, extract safety detection result from the migrating data;
The data move into terminal the data move out terminal pass through independently of the migrating data it is default safety examine
When surveying object command and sending, the default safety detection result instruction is received from data terminal of moving out, from the default peace
Full inspection is surveyed in object command and extracts safety detection result.
Optionally, the data are moved into terminal acquisition safety detection result and also included:
The data move into terminal when the safety detection result of acquisition is safe, using default 3rd safety detection
Rule detects to the migrating data, and when testing result is safe, the safety detection result got is safety;It is no
Then, the safety detection result got is dangerous.
Optionally, the data are moved into terminal acquisition safety detection result and also included:
The data move into terminal when the safety detection result of acquisition is safe, the safety detection result got
For safety;When the safety detection result of acquisition is dangerous, using default 3rd safety detection rule to the migration
Data are detected, and when testing result is safe, the safety detection result got is safety;Otherwise, the safety got
Testing result is dangerous.
Optionally, the data move into terminal and carry out processing bag to the migrating data according to the safety detection result
Include:
When the safety detection result is safe, judge whether the migrating data is installation class data, in this way, according to
The migrating data carries out installation process;Otherwise, storage processing is carried out to the migrating data.
Preferably, the data move into terminal and carry out processing bag to the migrating data according to the safety detection result
Include:
When the safety detection result is dangerous, handled using any one following alarming processing mode:
The migrating data is abandoned;
The migrating data is isolated;
The alarm for the migrating data is sent to user.
Optionally, the data move into terminal receive data move out terminal transmission migrating data before, in addition to:
The data, which move into terminal and currently receive the data as WIFI hot spot, moves out the WIFI communication links of terminal transmission
Request is connect, WIFI communication connections are established according to the WIFI communication connection requests and the data terminal of moving out;
Or,
The data are moved into terminal and moved out terminal transmission WIFI communication connection requests to the current data as WIFI hot spot,
With with the data move out terminal establish WIFI communication connection;
Or,
The data move into terminal and send WIFI communication connection requests to third party's WIFI hot spot, to pass through the third party
WIFI hot spot and the data terminal of moving out establish WIFI communication connections.
Further, present invention also offers a kind of terminal, the terminal to include
Including processor, memory and communication bus;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform one or more program stored in memory, to realize above-mentioned Data Migration
The step of method.Further, present invention also offers a kind of computer-readable recording medium, the computer-readable storage medium
Matter has one or more program, and one or more of programs can be by one or more computing device, with realization
The step of data migration method stated.
Beneficial effect
The present invention provides a kind of data migration method, terminal and computer-readable recording medium, for it is existing due to its
In transition process, data move into terminal and just directly store migrating data without the safety detection to migrating data, exist and pass through
The problem of risk of Data Migration transmitted virus, by the data migration method of the present invention, data are moved into terminal reception data and moved
Go out the migrating data of terminal transmission, data move into the safety detection result that terminal obtains the migrating data, according to safety detection
As a result migrating data is handled, can automatically completes the data safety detection to whole data migration process, can keep away
Exempt from, because Data Migration brings security risk, to solve in Data Migration, the disease brought without the Data Migration of safety detection
Malicious propagation problem, ensure that data move into the safety of terminal, and good Consumer's Experience is brought to user.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the hardware architecture diagram for realizing each optional mobile terminal of embodiment one of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is a kind of data migration method basic flow sheet that first embodiment of the invention provides;
Fig. 4 moves into terminal trigger data for the data that first embodiment of the invention provides and migrates and carry out safety detection method
Flow chart;
Fig. 5 is the safety detection rule-based algorithm flow chart that first embodiment of the invention provides;
Fig. 6 is that the data terminal trigger data of moving out that first embodiment of the invention provides migrates and carries out the side of safety detection
Method flow chart;
Fig. 7 is that the data that first embodiment of the invention provides move into terminal and data terminal trigger data migration of moving out is gone forward side by side
The method flow diagram of row safety detection;
Fig. 8 is that the data that second embodiment of the invention provides move into terminal and data terminal trigger data migration of moving out is gone forward side by side
The method refined flow chart of row safety detection;
Fig. 9 is the terminal structure schematic diagram that third embodiment of the invention provides;
Figure 10 moves into terminal trigger data for the data that third embodiment of the invention provides and migrates and carry out safety detection
Method refined flow chart;
Figure 11 is that the data terminal trigger data of moving out that third embodiment of the invention provides migrates and carries out safety detection
Method refined flow chart.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move
Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or
It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers
Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc.
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
First embodiment
In order to solve, because data move out terminal due to not carrying out safety detection to migrating data in data migration process, to lead
Cause migrating data may carrying mobile phone virus, jeopardize data move out terminal security the problem of, present embodiments provide one kind
The method of Data Migration, refer to Fig. 3, the schematic flow sheet for the Data Migration safety detection that Fig. 3 provides for the present embodiment, this reality
Applying the data migration method of example includes:
S301:Data move into terminal receive data move out terminal transmission migrating data.
Data in the present embodiment move into terminal and data are moved out, and terminal includes but is not limited to mobile phone, tablet personal computer, notes
This computer etc., it is necessary to explanation, move into terminal and refer to that equipment is moved out the equipment of data during migrating data by data,
One equipment is moved out terminal when moving out data for data, terminal is moved into when moving into data for data, not with the new of equipment
Old is foundation, and data move out terminal similarly.
For being normally carried out, it is necessary to which data move into terminal and data terminal of moving out is established Data Migration and connected for Data Migration
Connect, it is generally the case that establishing the mode of connection includes connecting with radio communication for wire communication connection, and wire communication connection includes
Data are moved out into terminal using various communication data lines and data are moved into terminal and are communicatively coupled, the communication data line include but
It is not limited to serial interface mouth line (such as COM lines), USB line (Universal Serial Bus, USB) etc.;Wirelessly
Connection include but is not limited to WIFI (WIreless-Fidelity, the WLAN based on IEEE802.11b standards) connections,
Bluetooth connection, infrared connection.It can be moved out for example, data move into terminal by WIFI and data after terminal establishes communication connection,
By WIFI connections data are received to move out the migrating data that terminal sends, wherein the mode connected include but is not limited to it is following several
Kind:Data move into terminal currently as WIFI hot spot receive data move out terminal transmission WIFI communication connection requests, according to
WIFI communication connection requests and the data terminal of moving out establish WIFI communication connections;Or data move into terminal to current conduct
The data of WIFI hot spot terminal of moving out sends WIFI communication connection requests, to establish WIFI communication links with data terminal of moving out
Connect;Or data move into terminal and data terminal of moving out is connected under same third party's WIFI network, data move into terminal to the 3rd
Square WIFI hot spot sends WIFI communication connection requests, to establish WIFI by third party's WIFI hot spot and data terminal of moving out and communicate
Connection.In Android system, the modes of generally use WIFI connections at present establishes Data Migration connection, due to WIFI speed compared with
It hurry up, the speed of Data Migration can be lifted accordingly, reduce the time of Data Migration.
It should be appreciated that migrating data in the present embodiment can include application program installation perform file and/or
Its installation data, various content-datas, such as picture, music, word etc. can also be included.
It should be appreciated that data move into terminal and data terminal of moving out is established after communication connection, include triggering number
According to the process of migration, the mode of triggering can be that data terminal of moving out moves into terminal to data and sends migration order with log-on data
Migration or data move into terminal and move out terminal initiation Data Migration request to data to ask trigger data to migrate, or
Person's data, which move into terminal and move into terminal to data, initiates Data Migration request, and data terminal of moving out please negate according to the Data Migration
Trigger data migrates after feedback migration order.
Migrating data moves into terminal from data terminal transmission to data of moving out, and data move into the transport number that end-on receives
According to needed before being handled carry out safety detection.Finished in all data transfers to be migrated, data move into terminal completion pair
After the processing of migrating data, whole Data Migration just terminates.
S302:Data move into the safety detection result that terminal obtains the migrating data.
The acquisition of safety detection result is to need progress safety detection just getable afterwards, to migrating data according to default
Safety detection rule to carry out detection be a very important step, the safety detection result for obtaining the migrating data can be several
According to the migrating data that end-on receives is moved into the migration that safety detection obtains is carried out by default first safety detection rule
The safety detection result of data;Can also be that data terminal-pair migrating data of moving out is pacified by default second safety detection rule
The safety detection result for the migrating data that full inspection measures;It can also be that data move out terminal-pair migrating data by default second peace
After full detected rule progress safety detection obtains the safety detection result of migrating data, safety detection result is sent to data
Terminal is moved into, moving into terminal-pair safety detection result by data judges and then to migrating data by default 3rd safety
Detected rule carries out the safety detection result for the migrating data that safety detection obtains.That is, safety detection is carried out to migrating data
Terminal can be that data move into terminal, can also data move out terminal or data move out terminal and data move into terminal.
In order to make it easy to understand, further exemplary illustration is done in a manner of several safety detections below.
In a kind of example, move into terminal trigger data by data and migrate and carry out safety detection, specifically refer to Fig. 4 institutes
Show, it includes:
S401:Data move into terminal to data move out terminal send Data Migration request.
S402:Data move into terminal receive data move out terminal transmission migrating data.
S403:Data move into terminal and carry out safe inspection to the migrating data received by default first safety detection rule
Survey.
S404:Data move into terminal and carry out respective handling according to safety detection result.
In this example, data move into terminal as the initiator for initiating Data Migration.Data move into terminal in this example
After receiving migrating data, by data move into terminal-pair its perform safety detection, now data move out terminal-pair its send
Migrating data can be without any safety detection.Certainly, can be that data terminal-pair of moving out is moved according to different scene demands
Data are moved to carry out safety detection by the second safety detection rule and then safety detection result and migrating data are sent into data
Move into terminal, data move into terminal and carry out respective handling according to safety detection result, can also be that data are moved out terminal-pair migration
Data carry out safety detection, safety detection result and migrating data are sent to after data move into terminal, data move into terminal
Once safety detection is carried out according to safety detection result again by the 3rd safety detection rule, data move into terminal according to safety detection
As a result respective handling is carried out.
It should be noted that data move into the first safety detection rule that terminal used during safety detection, in theory
It can be any detected rule that can realize data safety detection, a kind of safety detection rule-based algorithm progress example is set forth below and says
It is bright.It is shown in Figure 5, including:
S501:Migrating data by default safety check algorithm is carried out that safety check value is calculated.
S502:By obtained safety check value compared with default safety check value.
Wherein default safety check algorithm includes but is not limited to hash value algorithms, matching regular expressions algorithm, redundancy school
At least one of checking method, wherein hash value algorithms Typical Representative are MD serial algorithms (such as MD4, MD5) and SHA serial algorithms
(such as SHA1, SHA256), though it is foreseeable that above-mentioned default safety check algorithm is not on the premise of conflicting mutually, Ke Yixiang
Mutually combination and/or replacement, its all embodiment formed are all the technical schemes described in the present invention.Such as when default safety
Checking algorithm is combination of two, here, being illustrated by taking hash value algorithms and matching regular expressions algorithm combination as an example, is first led to
Cross hash value algorithms and hash check value is calculated, and compared with default Hash inspection threshold value, if mismatched, then pass through
Matching regular expressions algorithm is calculated and compared with corresponding threshold value.When default safety check algorithm is three kinds of algorithms
Combination, the CRC values of redundancy check algorithm calculating are first passed through, and compared with default CRC values threshold value;Such as
Fruit mismatches, then hash check value is calculated by hash value algorithms, and compared with default Hash inspection threshold value;If
Mismatch, calculated finally by matching regular expressions algorithm and compared with corresponding threshold value, it should be appreciated that
When default safety check algorithm is the combination of many algorithms, the sequencing of many algorithms and the number of algorithm can be according to tools
Body environmental demand is adjusted flexibly.Default safety check value is according to Data Detection experience, Uniform provisions or obtained by other means
Arrive.
In order to make it easy to understand, this example illustrates by taking a safety check algorithm as an example.Data move into terminal-pair migration
Data use hash value algorithms to be calculated (by taking MD5 as an example), and its detailed process is:Using MD5 algorithms to migrating data field
Hashed value is generated, the MD5 check values that hash is worth to migrating data field are calculated, by MD5 check values and default safety check
Value is matched, if MD5 check values match with default safety check value, migrating data field is safe, if MD5 check values
Mismatched with default safety check value, migrating data field is unsafe.
It will be clear that said process is only a kind of relatively simple specific first safety detection rule, do not represent
The present invention can only use above-mentioned first safety detection rule.
In another example, migrated by data terminal trigger data of moving out and carried out safety detection, specifically refer to Fig. 6,
It includes:
S601:Data move out terminal to data move into terminal send migration instruction.
S602:Data move out terminal by default second safety detection rule to migrating data carry out safety detection.
S603:Migrating data and safety detection result are sent to data and move into terminal by data terminal of moving out.
In this example, illustrated so that data move out the migration of terminal trigger data as an example, data terminal of moving out is moved to data
Enter terminal and send migration order, data terminal of moving out carries out safe inspection according to default second safety detection rule to migrating data
Survey, safety detection result and migrating data are sent to data and move into terminal.
It should be noted that data are moved out, terminal sends safety detection result and to data moves into terminal it is specifically as follows:
Safety detection result can be carried and be issued in migrating data and move into terminal by data terminal of moving out, can also be by independently of moving
The default safety detection result instruction of shifting data is sent to data and moves into terminal;Wherein data move out terminal can send migrate
After data, safety detection result is sent to by data by default safety detection result instruction and moves into terminal;Data are moved out end
Safety detection result can also be sent to data by default safety detection result instruction and moved by end before migrating data is sent
Enter terminal;Data terminal of moving out can also send migrating data and the instruction of default safety detection result simultaneously, pass through default safety
Safety detection result is sent to data and moves into terminal by testing result instruction.The present embodiment also moves into terminal to data and obtains data
Terminal-pair of moving out migrating data carries out the safety detection result that the second safety detection rule obtains and illustrated.When data are moved out end
When end carries safety detection result in the migrating data, data move into terminal and safety detection knot are extracted from migrating data
Fruit;When data move out terminal by instructing transmission independently of the default safety detection result of migrating data, data move into terminal
Default safety detection result instruction is received, and safety detection result is extracted from the instruction of default safety detection result.
It should be noted that data are moved out, terminal-pair migrating data is detected using the second safety detection rule, may be used also
So that migrating data to be marked according to safety detection result, for example, being moved when going out part according to the second safety detection rule detection
When shifting data are dangerous, unsafe migrating data is marked, the migrating data of safety is marked.Data move out terminal can
Terminal is moved into so that all migrating datas are sent into data, can also be and send all safety and unsafe migrating data.
In a kind of example, for the ease of understanding that the data in the present invention move out terminal and data move into terminal trigger data
Migrate and carry out the situation of safety detection, specifically refer to shown in this exemplary plot 7, it includes:
S701:Data move out terminal by default second safety detection rule to migrating data carry out safety detection.
S702:Migrating data and safety detection result are sent to data and move into terminal by data terminal of moving out.
S703:Data move into terminal according to safety detection result, to meeting the migrating data of condition by the default 3rd peace
Full detected rule carries out safety detection.
Held the suspicious attitude it should be appreciated that data move into can be moved out to the data safety detection result of terminal of terminal,
Data can be interpreted as move into terminal trust data not moving out the safety detection result of terminal.In this example, with
Data are moved into exemplified by terminal receives the migrating data and illustrated, and are moved into terminal when data and are moved out terminal acquiring data
When the safety detection result obtained to the second safety detection rule of migrating data progress is safe, using default 3rd safety detection
Rule detects again to the migrating data of safety, i.e., data move into terminal and data terminal both-end of moving out is carried out examining safely
Survey process.When the testing result obtained by the 3rd safety detection rule is also safe, it is believed that the safety detection knot got
Fruit is safety;Otherwise, the safety detection result got is dangerous.In the present embodiment, terminal is moved into when data obtaining
Safety detection result for it is dangerous when, data are moved into terminal accreditation data and moved out the safety detection result of terminal, just no longer right
Unsafe migrating data carries out the 3rd safety detection.
Predictably, data move into safety detection result of the terminal log according to terminal of moving out, and can be that data are moved into
For terminal when the safety detection result acquired is safe, it is peace that data, which move into terminal to trust the safety detection result got,
Entirely;When the safety detection result of acquisition is dangerous, data move into the unsafe migrating data of terminal-pair and hold suspection state
Degree, and unsafe migrating data is detected using default 3rd safety detection rule, advised using the 3rd safety detection
Then obtain testing result for it is safe when, it is believed that the unsafe migrating data got for safety;Otherwise, the safety inspection got
It is dangerous to survey result.It should be noted that the safety detection carried out in the present invention, which includes but are not limited to data, moves into terminal
Detected by Data Migration module built-in security detection function with data terminal of moving out, call user to move into terminal in data
The fail-safe software installed in terminal of being moved out with data carries out safety detection, by calling, data move into terminal and data are moved out terminal
Prefabricated fail-safe software carries out safety detection this several ways.
It should be appreciated that the second safety detection rule and the 3rd safety detection rule can be with the first safety detection rules
, can also be different using identical safety detection algorithmic rule, depending on safety detection software or built-in safety detection mould
Block use safety detection algorithmic rule, the algorithm that the present embodiment enumerates and combinations thereof be intended merely to understand, be not intended to limit algorithm
Use species and mode, just repeat no more herein.
S303:Data move into terminal and migrating data are handled according to safety detection result.
After data move into terminal according to above-mentioned steps acquisition safety detection result, data move into terminal will be to the part
Data are handled.Difference can be carried out because migrating data includes installation class data and content class data, different data types
Operation processing, when safety detection result for it is safe when, data move into terminal judge migrating data whether be install class data, such as
It is that installation process is carried out according to migrating data;Otherwise, storage processing is carried out to the migrating data.When safety detection result is
When dangerous, data are moved into terminal and acted according to default processing, are handled using any one alarming processing mode, such as will
Migrating data abandons, migrating data is isolated or sends the alarm for migrating data to user.It will be clear that above-mentioned show
Example migrating data is handled processing action only list it is several relatively common, but processing action be not limited to this
Several actions.
The method for the Data Migration that the present embodiment provides, terminal is moved out by data and/or data are moved into terminal-pair and migrated
Data carry out safety detection, it is ensured that the safety of migrating data, for prior art because it is in transition process, data move into end
End just directly stores the situation of migrating data without the safety detection to migrating data, afterwards can very great Cheng by safety detection
Degree avoids the propagation of virus and jeopardizes data and move into terminal, in addition, the data migration method of the present invention, is advised using safety detection
Then can automatically it complete to the detection of the data safety of whole data migration process, by data being moved out with terminal and data are moved into
The setting of terminal, can be by the way of single-ended detection and double check, and whole transition process has more security, and data are moved into
The dangerous data that terminal is moved out with data in terminal are isolated, and ensure the safety that data are moved into, and bring well to user
Consumer's Experience.
Second embodiment
In order to be better understood from the present invention, the present embodiment combines the specific example of a Data Migration, there is provided Yi Zhongqian
Move data and move into the specific moving method of terminal from data terminal to data of moving out, it is assumed that data X carries out Data Migration, data X
For an installation class method and it is safe, refers to Fig. 8, Fig. 8 is a kind of specific data that second embodiment of the invention provides
The flow chart of moving method, the data migration method include:
S801:Data move into terminal and data terminal of moving out and establish Data Migration and connect.
For being normally carried out, it is necessary to which data move into terminal and data terminal of moving out is established Data Migration and connected for Data Migration
Connect, in the present embodiment, because termination capacity is larger, data are more, and in order to improve the efficiency of Data Migration, the present embodiment is to adopt
Illustrated exemplified by being connected with WIFI network, wherein WIFI network connected mode includes following several:Data are moved out terminal sum
According to moving into, terminal is connected under same WIFI network, data are moved into terminal and are connected to using data terminal of moving out and are used as the WIFI of focus
It is connected to using data with data terminal of moving out under network and moves into terminal as under the WIFI network of focus, this implementation is with using data
Move into terminal be connected to data move out terminal WIFI hot spot on exemplified by.
S802:Data move out terminal to data move into terminal send migration order.
In general, before Data Migration is carried out, data, which move into terminal, can reserve sufficiently large memory headroom for migration
The storage of data, so data move into terminal the current memory headroom information of terminal can be sent to data and move out terminal, data
Terminal of moving out compares memory information with the data message of migrating data, and if transition condition is met data are moved into terminal hair
Send command information and proceed by Data Migration, ungratified conditional information is fed back into data if transition condition is unsatisfactory for moves
Enter terminal and terminate Data Migration, and due to consideration that the security of data, the present embodiment uses is moved out terminal hair by data
Go out migration order, moving into terminal to data sends migrating data, starts whole Data Migration flow.
S803:Data move out terminal using the second safety detection rule to migrating data carry out safety detection.
In this embodiment, before data move out terminal transmission data, using the second safety detection rule to migrating data
Detected, wherein the present embodiment is to install class file X and the second safety detection rule as redundancy check algorithm using migrating data
Exemplified by illustrate.Data move out terminal first to installation class file X detected using the second safety detection rule, its is specific
For:Data terminal of moving out to installation class file X be calculated installation class file X redundant check using redundancy check algorithm
Value A, CRC values A are compared with default CRC values threshold value B, if A equals B, then it represents that installation class file X is
Safety, if A is more than B or less than B, then it represents that installation class file X is dangerous.
S804:Data move into terminal and receive migrating data and safety detection result, judge to migrate according to safety detection result
Whether data are safe, in this way, then go to S805, such as no, go to S807.
In the present embodiment, data terminal of moving out sends the installation class file X and moves into terminal to data, also passes through independence
Safety detection result is sent to data in installation class file X default safety detection result instruction and moves into terminal, including but not
Be limited to data move into terminal send installation class file X move into terminal to data after, send safety detection result moved into data
Terminal.Data move into terminal and receive installation class file X, also receive default safety detection result instruction, and from default safety detection
Safety detection result is extracted in object command, may determine that installation class file X for safety according to the safety detection result extracted
, go to step S805.
S805:Data move into terminal and carry out safety detection again to migrating data using the 3rd safety detection rule.
Data are moved into after terminal receives safety detection result, are decided whether to carry out safe inspection again according to pre-set programs
Survey, in the present embodiment, installation class file X is safe, and data, which move into terminal, to carry out safety to the migrating data of safety again
Detection.Assuming that the safety detection result that data move into terminal acquisition in the present embodiment is safety, data move into terminal then to peace
Full installation class file X carries out safety detection again using the 3rd safety detection rule;If data move into the safety of terminal acquisition
When testing result is dangerous, then it is dangerous that can judge unsafe installation class file.In the present embodiment, with the 3rd safety
Detected rule to be illustrated exemplified by matching regular expressions algorithm, move into terminal and use matching regular expressions algorithm pair by data
Installation class file X carries out that regular expression check value C is calculated, and is matched with default regular expression threshold value D, if
C matches with D, then it represents that the safety detection result of acquisition is safety, and the safety detection result obtained if mismatching is dangerous.
In another embodiment, it is assumed that the safety detection result that data move into terminal acquisition is dangerous, and data move into end
End then carries out safety detection again to dangerous installation class file X using the 3rd safety detection rule;Exist if data move into terminal
When the safety detection result of acquisition is safe, safety detection is not carried out to it, that is, the safety detection result for thinking to get is peace
Entirely.According to the unsafe installation class file X of the 3rd safety detection rule detection for it is safe when, then it represents that unsafe installation class
File X is safe, and otherwise, then unsafe installation class file X is strictly unsafe, i.e., data move into terminal with it is final from
The safety detection result of body is defined.
S806:Judge whether migrating data is safe, in this way, goes to S808, otherwise, goes to according to final safety detection result
S807。
S807:Corresponding processing action is carried out to the migrating data of security risk be present.
S808:Respective handling is carried out to the migrating data of devoid of risk.
In this example, it is assumed that the result arrived the safety detected according to S806, i.e., obtained by the detection of the 3rd detected rule
The safety detection result taken is safety, and data move into terminal and then installation class file X is located accordingly according to the flow of standard
Reason acts, and will install class file X and be installed, whole Data Migration flow terminates, it is assumed that the knot arrived detected according to S806
Fruit is dangerous, and data move into terminal and then installation class file X is isolated or abandoned.
The method for the Data Migration that the present embodiment provides, with reference to a specific embodiment, by data move into terminal and
Data terminal-pair migrating data of moving out carries out safety detection, and the migrating data after detection is accordingly come out, it is ensured that migrate
The safety of data, in addition, the data migration method of the present invention, can automatically be completed to whole migration according to safety detection rule
The data safety detection of data procedures, by data being moved out with terminal and data are moved into the pre-set programs of terminal and set, it can adopt
With the mode of double check, whole transition process has higher security, and data are moved into terminal and data and moved out in terminal
Dangerous data isolated or abandoned, ensure that data move into the safety of terminal, and good Consumer's Experience is brought to user.
3rd embodiment
A kind of terminal is present embodiments provided, shown in Figure 9, it is total that it includes processor 901, memory 902 and communication
Line 903, wherein:
Communication bus 903 is used to realize the connection communication between processor 901 and memory 902;
Processor 901 is used to perform one or more program stored in memory 902, to realize as above each embodiment
The step of exemplified network security detection method.
The present embodiment also provides a kind of computer-readable recording medium, and computer-readable recording medium can be mobile phone, puts down
Plate etc., computer-readable recording medium storage data move into the migrating data of terminal reception, carry out safety detection to migrating data
Testing result and processing to migrating data.
The terminal that the present embodiment provides can also realize a kind of method of Data Migration, in order to make it easy to understand, referring specifically to
Shown in Figure 10, the method for the Data Migration includes:
S1001:Data move into terminal and data terminal of moving out and establish Data Migration and connect.
For being normally carried out, it is necessary to which data move into terminal and data terminal of moving out is established Data Migration and connected for Data Migration
Connect, in the present embodiment, in a manner of data move out terminal and data move into terminal using wired connection exemplified by illustrate, have
Body is by the way of twisted-pair feeder, i.e., data move out terminal and data move into terminal and pass through netting twine and establish connection.
S1002:Data move into terminal to data move out terminal send Data Migration request.
In the present embodiment, after Data Migration, which connects, to be established, data move into terminal and send Data Migration request, and data are moved
Go out terminal to receive after Data Migration is asked and start to send data and application program etc..
S1003:Data move into terminal and receive migrating data and carry out safety detection according to the first safety detection rule to it.
In the present embodiment, data move out terminal not to migrating data progress safety detection, directly send migrating data
Terminal is moved into data, data move into terminal and receive migrating data and carry out safety detection, wherein the present embodiment to migrating data
Illustrated exemplified by moving into data as data file such as image file.Data move into terminal and receive image file, using
One safety detection rule detects to image file, and the present embodiment illustrates so that the first safety detection rule is MD5 algorithms as an example,
It is specially:Data move into terminal-pair image file data and use MD5 algorithms, and image file data is generated and hashed by MD5 algorithms
Value, the MD5 check value Y that hash is worth to image file data are calculated, by MD5 check values Y and default MD5 safety checks value X
Matched, if MD5 check values Y matches with default MD5 safety checks value X, image file data is safe, if Y and X is not
Matching is that Y is more than or less than X, then image file data is dangerous, and safety detection can be swept image file data in real time
Retouch, so as to judge whether risk.
S1004:Judge whether migrating data is safe, in this way, goes to S1006, otherwise, goes to according to safety detection result
S1005。
S1005:Corresponding processing action is carried out to the migrating data of security risk be present.
S1006:Respective handling is carried out to the migrating data of devoid of risk.
Data move into terminal and judge image file according to the testing result of the image file data of safety detection rule detection
Whether data are safe, it is assumed that in the present embodiment, the obtained safety detection result detected according to S1004 is dangerous, that is, is schemed
As risk be present in file data, viral harm may be brought, data are moved into terminal and acted according to default processing to image file
Data are handled, wherein default processing action moves into terminal for data and rule of thumb sets or be artificially configured.This implementation
Example works as image taking human as setting default processing action to be illustrated exemplified by security risk being present for the prompting user partial data
When file data is dangerous, data move into terminal can alarm prompt user images file data security risk be present, user can be with
The prompting that terminal is moved into according to data is abandoned or isolated to image file data.In another embodiment, it is assumed that according to
The obtained safety detection result of S1004 detections is safety, and data move into stream of the terminal then to image file data according to standard
Cheng Jinhang processing accordingly acts, and for image file data, is then stored image file data.
The terminal that the present embodiment provides can also realize a kind of method of Data Migration, in order to make it easy to understand, please specifically join
As shown in Figure 11, the method for the Data Migration includes:
S1101:Data move into terminal and data terminal of moving out and establish Data Migration and connect.
S1102:Data move into terminal to data move out terminal send Data Migration request.
In the present embodiment, terminal and data terminal of moving out is moved into by data to establish by WIFI exemplified by Data Migration connects
Illustrate, when Data Migration connect establish after, data move into terminal send Data Migration request, data move out terminal receive number
After migration request, send migration and order and start to send data and application program etc..
S1103:Data move out terminal-pair migrating data using the second safety detection rule progress safety detection.
In the present embodiment, data terminal-pair migrating data of moving out carries out safety detection, wherein the present embodiment to move into number
According to be illustrated exemplified by data file such as image file and installation class file.Data move out terminal using the second safety detection rule
Then to image file and installation class file detection, the present embodiment is with the second safety detection rule for MD5 algorithms and regular expression
Illustrated exemplified by matching algorithm combination, it is specially:Data move into terminal-pair image file and installation class file data use
Image file and installation class file data generation hashed value, calculating hash are worth to image file number by MD5 algorithms, MD5 algorithms
According to MD5 check value Y, MD5 check values Y is matched with default MD5 safety checks value X, if MD5 check values Y with it is default
MD5 safety check values X is matched, then image file and installation class file data are safe, is more than or small if Y and X mismatches are Y
In X, then calculated and compared with corresponding threshold value Z by matching regular expressions algorithm, if regular expression verifies
Value W matches with corresponding threshold value Z, then image file and installation class file data are safe, otherwise, image file and installation
Class file is dangerous.
S1104:Data terminal of moving out sends migrating data and safety detection result.
In the present embodiment, data terminal of moving out sends all image files and installation class file moves into terminal to data,
Safety detection result is carried and is issued in migrating data and move into terminal by wherein data terminal of moving out.
S1105:Data move into terminal and judge whether migrating data is safe, in this way, goes to according to safety detection result
S1107, otherwise, go to S1106.
S1106:Corresponding processing action is carried out to the migrating data of security risk be present.
S1107:Respective handling is carried out to the migrating data of devoid of risk.
Data move into terminal and safety detection result are extracted from migrating data, according to the image of safety detection rule detection text
The safety detection result of part and installation class file data judges and whether installation class file data are safe, it is assumed that in the present embodiment
In, the obtained safety detection result detected according to S1105 is dangerous, and data move into terminal according to default processing action to figure
As file and installation class file data are handled, rule of thumb set or people wherein default processing action moves into terminal for data
To be configured.In the present embodiment, installed for installation class file, image file is stored.When image file and
Install class file data it is dangerous when, data move into terminal can to image file and installation class file data be abandoned or every
From.
In this embodiment, data, which move into terminal, can also provide at least one interface, and the interface can be set in the presence of safety
Risk shift data processing operation, is specifically included:New mobile terminal provides at least one interface and is used to set to risk data
Processing operation.New mobile terminal, which provides, directly to be abandoned risk data, prompts user's partial data the operation such as security risk to be present
Options for user selects.After the corresponding operation of user's selection, preservation processing is carried out.When Data Migration occurs, new mobile terminal
Corresponding operation processing is carried out according to the operation content of setting.
A kind of Data Migration terminal and readable computer storage medium are present embodiments provided, using the number of above-described embodiment
According to moving method, safety detection is carried out to migrating data by the first safety detection rule, it is ensured that the safety of migrating data, for
Prior art is because it is in transition process, and data move out terminal or data move into terminal and do not carry out safe inspection to migrating data
Survey, just directly store the situation of migrating data, the present embodiment is moved into terminal-pair migrating data progress safety detection using data and entered
Row explanation, jeopardize data by can significantly avoid the propagation of virus after safety detection and move into terminal, in addition, this reality
The data for applying example move into terminal, in addition at least one interface, by interface user can operating to this terminal, avoid
Discarding or the user-isolated data for wanting to retain, reduce the probability manslaughtered, good Consumer's Experience are brought to user.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
1. a kind of data migration method, it is characterised in that the method for the Data Migration includes:
Data move into terminal receive data move out terminal transmission migrating data;
The data move into the safety detection result that terminal obtains the migrating data;
The data move into terminal and the migrating data are handled according to the safety detection result.
2. data migration method as claimed in claim 1, it is characterised in that the data move into terminal and obtain the transport number
According to safety detection result include:
The data move into the migrating data that end-on receives and carry out safety detection by default first safety detection rule
Obtain the safety detection result of the migrating data.
3. data migration method as claimed in claim 1, it is characterised in that the migrating data is that the data are moved out terminal
, by the data after default second safety detection rule detection, data terminal of moving out takes safety detection result before sending
Band moves into terminal described in being issued in the migrating data, or passes through the default safety detection result independently of the migrating data
Instruction is sent to the data and moves into terminal;
The safety detection result that the data move into the terminal acquisition migrating data includes:
The data move into terminal the data move out terminal by safety detection result carry in the migrating data when, from
Safety detection result is extracted in the migrating data;
The data move into terminal and pass through the default safety detection knot independently of the migrating data in data terminal of moving out
When fruit instruction is sent, the default safety detection result instruction is received from data terminal of moving out, from the default safety inspection
Survey in object command and extract safety detection result.
4. data migration method as claimed in claim 3, it is characterised in that the data move into terminal and obtain safety detection knot
Fruit also includes:
The data move into terminal when the safety detection result of acquisition is safe, using default 3rd safety detection rule
The migrating data is detected, when testing result is safe, the safety detection result got is safety;Otherwise, obtain
The safety detection result got is dangerous.
5. data migration method as claimed in claim 3, it is characterised in that the data move into terminal and obtain safety detection knot
Fruit also includes:
The data move into terminal when the safety detection result of acquisition is safe, and the safety detection result got is peace
Entirely;When the safety detection result of acquisition is dangerous, using default 3rd safety detection rule to the migrating data
Detected, when testing result is safe, the safety detection result got is safety;Otherwise, the safety detection got
As a result to be dangerous.
6. the data migration method as described in claim any one of 1-5, it is characterised in that the data move into terminal according to institute
Stating safety detection result and carrying out processing to the migrating data includes:
When the safety detection result is safe, judge whether the migrating data is installation class data, in this way, according to described
Migrating data carries out installation process;Otherwise, storage processing is carried out to the migrating data.
7. the data migration method as described in claim any one of 1-5, it is characterised in that the data move into terminal according to institute
Stating safety detection result and carrying out processing to the migrating data includes:
When the safety detection result is dangerous, handled using any one following alarming processing mode:
The migrating data is abandoned;
The migrating data is isolated;
The alarm for the migrating data is sent to user.
8. the data migration method as described in claim any one of 1-5, it is characterised in that the data move into terminal and receive number
Before migrating data according to terminal transmission of moving out, in addition to:
The data move into terminal currently as WIFI hot spot receive the data move out the WIFI communication connections of terminal transmission please
Ask, WIFI communication connections are established according to the WIFI communication connection requests and the data terminal of moving out;
Or,
The data are moved into terminal and moved out terminal transmission WIFI communication connection requests to the current data as WIFI hot spot, with
The data move out terminal establish WIFI communication connection;
Or,
The data move into terminal and send WIFI communication connection requests to third party's WIFI hot spot, to pass through the third party WIFI
Focus and the data terminal of moving out establish WIFI communication connections.
9. a kind of terminal, it is characterised in that the terminal includes processor, memory and communication bus;
The communication bus is used to realize the connection communication between processor and memory;
The processor is used to perform one or more program stored in memory, to realize as appointed in claim 1 to 8
The step of data migration method described in one.
A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable recording medium storage have one or
Multiple programs, one or more of programs can be by one or more computing devices, to realize such as claim 1 to 8
Any one of data migration method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710900852.XA CN107896207A (en) | 2017-09-28 | 2017-09-28 | A kind of data migration method, terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710900852.XA CN107896207A (en) | 2017-09-28 | 2017-09-28 | A kind of data migration method, terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107896207A true CN107896207A (en) | 2018-04-10 |
Family
ID=61802474
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710900852.XA Pending CN107896207A (en) | 2017-09-28 | 2017-09-28 | A kind of data migration method, terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107896207A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111539198A (en) * | 2020-04-15 | 2020-08-14 | 北京宝兰德软件股份有限公司 | Form verification method and device based on Java |
CN113515498A (en) * | 2020-04-10 | 2021-10-19 | 中兴通讯股份有限公司 | Data migration method, terminal and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638468A (en) * | 2012-04-12 | 2012-08-15 | 华为技术有限公司 | Method, sending end, receiving end and system for protecting information transmission safety |
CN104424438A (en) * | 2013-09-06 | 2015-03-18 | 华为技术有限公司 | Anti-virus file detection method, anti-virus file detection device and network equipment |
US20170180424A1 (en) * | 2015-12-18 | 2017-06-22 | International Business Machines Corporation | File filter |
CN107045610A (en) * | 2017-05-08 | 2017-08-15 | 广东欧珀移动通信有限公司 | Data migration method, terminal device, and computer-readable storage medium |
-
2017
- 2017-09-28 CN CN201710900852.XA patent/CN107896207A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638468A (en) * | 2012-04-12 | 2012-08-15 | 华为技术有限公司 | Method, sending end, receiving end and system for protecting information transmission safety |
CN104424438A (en) * | 2013-09-06 | 2015-03-18 | 华为技术有限公司 | Anti-virus file detection method, anti-virus file detection device and network equipment |
US20170180424A1 (en) * | 2015-12-18 | 2017-06-22 | International Business Machines Corporation | File filter |
CN107045610A (en) * | 2017-05-08 | 2017-08-15 | 广东欧珀移动通信有限公司 | Data migration method, terminal device, and computer-readable storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113515498A (en) * | 2020-04-10 | 2021-10-19 | 中兴通讯股份有限公司 | Data migration method, terminal and computer readable storage medium |
CN111539198A (en) * | 2020-04-15 | 2020-08-14 | 北京宝兰德软件股份有限公司 | Form verification method and device based on Java |
CN111539198B (en) * | 2020-04-15 | 2023-07-04 | 北京宝兰德软件股份有限公司 | Form verification method and device based on Java |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107864357A (en) | Video calling special effect controlling method, terminal and computer-readable recording medium | |
CN107247746A (en) | A kind of data sharing method and terminal | |
CN107436779A (en) | A kind of application management method, equipment and computer-readable recording medium | |
CN107219974A (en) | A kind of method, mobile terminal and storage medium for showing application software | |
CN107613489A (en) | A kind of wireless charging method, hotspot equipment, terminal and storage medium | |
CN107770369A (en) | Control method, device and the computer-readable recording medium of mobile terminal | |
CN107506039A (en) | Mobile terminal, data transmission method and computer-readable storage medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN107347011A (en) | A kind of group message processing method, equipment and computer-readable recording medium | |
CN107592416A (en) | Method for sending voice message, terminal and computer-readable recording medium | |
CN107729115A (en) | A kind of display methods, equipment and computer-readable storage medium | |
CN107635070A (en) | A kind of method of prompting message, terminal and storage medium | |
CN107181865A (en) | Processing method, terminal and the computer-readable recording medium of unread short messages | |
CN108197441A (en) | Flexible screen terminal and its solution lock control method, computer readable storage medium | |
CN110365347A (en) | A kind of power amplifier control method, apparatus and computer readable storage medium | |
CN107580336A (en) | A kind of method for connecting network, terminal and computer-readable recording medium | |
CN107341067A (en) | A kind of keys deactivation processing method, equipment and computer-readable recording medium | |
CN107360558A (en) | Emergency call control method, communication terminal and computer-readable recording medium | |
CN107172605A (en) | A kind of Emmergency call method, mobile terminal and computer-readable recording medium | |
CN107608613A (en) | A kind of method and terminal for preventing maloperation | |
CN107656678A (en) | Long printscreen realization method, terminal and computer-readable recording medium | |
CN107105058A (en) | Folder transmission method and mobile terminal | |
CN107368241A (en) | A kind of information processing method, equipment and computer-readable recording medium | |
CN107423065A (en) | Method, mobile terminal and the computer-readable recording medium that a kind of application is attended to anything else | |
CN107133108A (en) | Implementation method, terminal, server and the computer-readable recording medium of distributed complex lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180410 |