[go: up one dir, main page]

WO2018049892A1 - Data transmission method and apparatus, and terminal - Google Patents

Data transmission method and apparatus, and terminal Download PDF

Info

Publication number
WO2018049892A1
WO2018049892A1 PCT/CN2017/092487 CN2017092487W WO2018049892A1 WO 2018049892 A1 WO2018049892 A1 WO 2018049892A1 CN 2017092487 W CN2017092487 W CN 2017092487W WO 2018049892 A1 WO2018049892 A1 WO 2018049892A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
data
target data
key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/092487
Other languages
French (fr)
Chinese (zh)
Inventor
黄宏用
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of WO2018049892A1 publication Critical patent/WO2018049892A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions

Definitions

  • the present invention relates to the field of terminal technologies, and in particular, to a data transmission method, apparatus, and terminal.
  • terminals such as smart phones, tablets, IPADs
  • network technologies With the rapid development of terminals (such as smart phones, tablets, IPADs) and network technologies, more and more users often connect multiple terminals, transfer information to each other, and manage the data. For example, when the smartphone A establishes a connection with the smartphone B, the user can upload the data on the smartphone A to the smartphone B.
  • the embodiment of the invention provides a data transmission method, device and terminal, which can improve the security of data transmission.
  • a first aspect of the embodiments of the present invention discloses a data transmission method, including:
  • the first terminal encrypts the target data by using a secret key to obtain encrypted data;
  • the first terminal transmits the encrypted data to the second terminal in response to the data transmission instruction.
  • a second aspect of the embodiments of the present invention discloses a data transmission apparatus, including:
  • a receiving unit configured to receive a data transmission instruction for instructing to transmit the target data to the second terminal
  • a first determining unit configured to determine an importance level value of the target data
  • An encryption unit configured to encrypt the target data by using a secret key to obtain encrypted data, if the importance level value of the target data is greater than a preset threshold
  • a sending unit configured to send the encrypted data to the second terminal in response to the data transmission instruction.
  • a third aspect of the embodiments of the present invention discloses a terminal, including a processor, a receiver, and wherein the processor is connected to the memory, where the memory stores program code, and the processor is configured to invoke the The program code stored in the memory performs some or all of the steps of any of the methods of the first aspect.
  • the embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, the computer program causing the computer to perform some or all of the steps of any of the methods described in the foregoing method embodiments. .
  • Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the operations as recited in the above method embodiments Part or all of the steps of either method.
  • the computer program product can be a software installation package.
  • the first terminal when the first terminal receives the data transmission instruction for instructing to transmit the target data to the second terminal, the first terminal may first determine the importance level value of the target data; If the value is greater than the preset threshold, the first terminal may further encrypt the target data by using the secret key to obtain the encrypted data. Finally, the first terminal sends the encrypted data to the second terminal in response to the data transmission instruction. It can be seen that, by using the embodiment of the present invention, before the first terminal sends the target data to the second terminal, the first terminal may first determine the importance level value of the target data, When the target data is important, the target data is encrypted and then sent to the second terminal, thereby avoiding leakage of important data and improving the security of data transmission.
  • FIG. 1 is a schematic diagram of a network architecture of a data transmission system according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a data transmission method according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of another data transmission method according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another data transmission apparatus according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the embodiment of the invention discloses a data transmission method, device and terminal, which can improve the security of data transmission. The details are described below separately.
  • FIG. 1 is a schematic diagram of a network architecture of a data transmission system according to an embodiment of the present invention.
  • the data transmission system includes a first terminal and a plurality of second terminals, where
  • the first terminal may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a smart wearable device (eg, Various types of user terminals such as smart watches and smart bracelets.
  • the operating system of the user terminal may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a Blackberry operating system, a Windows Phone 8 operating system, and the like. limited.
  • the second terminal may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a smart wearable device (eg, Various types of user terminals such as smart watches and smart bracelets.
  • the operating system of the user terminal may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a Blackberry operating system, a Windows Phone 8 operating system, and the like. limited.
  • the first terminal may first determine the importance level value of the target data; If the importance value is greater than the preset threshold, the first terminal may further encrypt the target data by using the secret key to obtain the encrypted data. Finally, the first terminal sends the encrypted data to the second terminal in response to the data transmission instruction. It can be seen that, by using the embodiment of the present invention, before the first terminal sends the target data to the second terminal, the first terminal may first determine the importance level value of the target data, and perform encryption processing on the target data when the target data is determined to be important. Then, it is sent to the second terminal, so that leakage of important data can be avoided, and the security of data transmission is improved.
  • the second terminal described above may be one or more second terminals shown in FIG. 1.
  • those skilled in the art can understand that although only four second terminals are shown in FIG. 1, they do not constitute a limitation on the embodiments of the present invention, and may include more second terminals than illustrated.
  • FIG. 2 is a schematic flowchart diagram of a data transmission method according to an embodiment of the present invention. As shown in FIG. 2, the method can include the following steps.
  • the first terminal receives a data transmission instruction for indicating that the target data is transmitted to the second terminal.
  • the first terminal stores multiple types of data, such as image data, text data, video data, voice data, and application data.
  • Some data is the private data of the user of the first terminal, such as private photos, private backup records, etc. These private data are usually more important to the user, and some data is not so important to the user, such as the first terminal. Stored application data, etc.
  • a communication connection between the first terminal and the second terminal such as a Bluetooth connection, a wired connection, a Near Field Communication (NFC) connection, and a communication connection between the first terminal and the second terminal, may be established in advance. Based on the establishment success, the first terminal may receive a data transmission instruction for indicating the transmission of the target data to the second terminal through the communication connection.
  • NFC Near Field Communication
  • step 201 the method further includes the following steps:
  • the first terminal acquires a device identifier of the second terminal
  • the first terminal sends the device identifier of the second terminal to the third wearable device associated with the first terminal, to trigger the third wearable device to verify the second terminal.
  • step 202 is performed.
  • the first terminal may first acquire the device identifier of the second terminal, and further, the first The terminal sends the device identifier of the second terminal to the third wearable device associated with the first terminal, and after the third wearable device receives the device identifier of the second terminal, the third wearable device can verify the device identifier and the preset of the second terminal. Whether the identifiers match, if they match, it is determined that the identity of the second terminal is legal.
  • the third wearable device may be a device carried by the user, such as a smart watch, a smart bracelet, or the like. The user associates the first terminal with the third wearable device in advance.
  • the user can indicate whether the first terminal needs to perform the corresponding step by sending the information to the first terminal by using the third wearable device.
  • the first terminal can be indirectly controlled, and at the same time, the security of the data of the first terminal is also improved.
  • the first terminal may also send the device identifier of the second terminal to the server for identity verification.
  • the server can be a dedicated network security server, and the security level of the terminal device is rated by big data, and some terminal devices can be determined according to the feedback information of the user.
  • the server After obtaining the device identifier of the second terminal, the server confirms that the security level of the second terminal is high, and may send the indication information that the identity of the second terminal is legal to the first terminal.
  • the first terminal determines an importance value of the target data.
  • the manner in which the first terminal determines the importance level value of the target data may specifically include the following steps:
  • the first terminal acquires historical usage parameters of the target data in a preset time, and the historical usage parameters include one or more of the following: usage time, usage times, and usage frequency;
  • the first terminal performs weighting calculation on the historical usage parameters to obtain the importance value of the target data.
  • the first terminal may acquire historical usage parameters of the target data of the first terminal in a preset time (such as one week before the current time, one month), such as usage time, usage times, and usage frequency, and further The first terminal performs weighted calculation on the historical usage parameters to obtain the importance value of the target data.
  • the sum of the weighting parameters of each historical usage parameter is 1.
  • the user can allocate weighting parameters of each historical usage parameter according to requirements, for example, the user can assign a weighting parameter of 40% to the usage time, and assign a weighting parameter to the usage frequency of 20. %, the weighting parameter for the use frequency allocation is 40%.
  • the first terminal encrypts the target data by using a secret key to obtain the encrypted data.
  • the first terminal may first determine whether the importance level value of the target data is greater than a preset threshold, and if yes, indicating that the target data is important to the user, if No, it means that the target data is not so important to the user.
  • the first terminal may encrypt the target data using the secret key to obtain the encrypted data.
  • the first terminal may not perform any processing on the target data.
  • the method further includes the following steps:
  • the first terminal acquires a remaining storage space of the second terminal.
  • the first terminal In the case that it is determined that the storage space occupied by the target data is larger than the remaining storage space, the first terminal The target data is compressed so that the compressed target data occupies less storage space than the remaining storage space.
  • the first terminal encrypts the target data by using the secret key, and the manner of obtaining the encrypted data may be specifically:
  • the first terminal encrypts the compressed target data by using a secret key to obtain encrypted data.
  • the first terminal may first acquire the remaining storage space of the second terminal, and determine whether the storage space occupied by the target data is If the data is larger than the remaining storage space, the first terminal may perform compression processing on the target data, so that the storage space occupied by the compressed target data is smaller than the remaining storage space, so that the data transmission failure can be avoided after the processing, and then the first terminal can The compressed target data is encrypted using a secret key to obtain encrypted data. If the storage space occupied by the target data is not greater than the remaining storage space, the first terminal may directly encrypt the target data by using the secret key to obtain the encrypted data.
  • the first terminal sends the encrypted data to the second terminal in response to the data transmission instruction.
  • the first terminal may first determine the importance level value of the target data; If the importance value of the target data is greater than the preset threshold, the first terminal may further encrypt the target data by using the secret key to obtain the encrypted data. Finally, the first terminal sends the encrypted data to the second terminal to respond to the data. Transfer instructions. It can be seen that, by using the embodiment of the present invention, before the first terminal sends the target data to the second terminal, the first terminal may first determine the importance level value of the target data, and perform encryption processing on the target data when the target data is determined to be important. Then, it is sent to the second terminal, so that leakage of important data can be avoided, and the security of data transmission is improved.
  • FIG. 3 is a schematic flowchart diagram of another data transmission method according to an embodiment of the present invention. As shown in FIG. 3, the method can include the following steps.
  • the first terminal receives a data transmission instruction for indicating that the target data is transmitted to the second terminal.
  • the first terminal determines an importance value of the target data.
  • the first terminal determines a storage space occupied by the target data.
  • the first terminal In a case where the storage space occupied by the target data is greater than a preset space threshold, the first terminal The target data is split into the first data and the second data.
  • the first terminal may first determine whether the storage space occupied by the target data is greater than a preset space threshold, and if yes, indicating that the storage space occupied by the target data is too Large, usually the larger the storage space occupied by data, the higher the transmission bandwidth requirement for the data transmission, and the longer the transmission time.
  • the first terminal may split the target data into the first data and the second data, wherein the first terminal may divide the target data into the first according to the storage space.
  • the data and the second data, or the first terminal may arbitrarily split the target data into the first data and the second data, which are not limited in the embodiment of the present invention.
  • the first terminal encrypts the first data and the second data by using a secret key to obtain the first encrypted data and the second encrypted data.
  • the first terminal encrypts the first data and the second data by using a secret key, and the manner of obtaining the first encrypted data and the second encrypted data may be:
  • the first terminal encrypts the first data and the second data respectively by using the first key to obtain the first encrypted data and the second encrypted data;
  • the first terminal encrypts the first data by using the second key to obtain the first encrypted data, and the first terminal encrypts the second data by using the third key to obtain the second encrypted data.
  • the first terminal may encrypt the first data and the second data by using the same key (ie, the first key) to obtain the first encrypted data and the second encrypted data, or the first terminal.
  • the same key ie, the first key
  • Different keys may be used, that is, the first data is encrypted using the second key, the first encrypted data is obtained, and the second data is encrypted using the third key to obtain the second encrypted data.
  • the method further includes:
  • the first terminal sends a key acquisition instruction to the first wearable device associated with the first terminal, and receives the second key and the third key sent by the first wearable device; or
  • the first terminal sends a key acquisition instruction to the first wearable device and the second wearable device associated with the first terminal, receives the second key sent by the first wearable device, and receives the third key sent by the second wearable device. .
  • the first terminal may obtain the second key and the third key in two ways.
  • the first type the first terminal is the same wearable device (that is, the first wearable device associated with the first terminal). )hair Sending a key acquisition instruction to obtain a second key and a third key; secondly, the first terminal sends a key acquisition instruction to different wearable devices (ie, the first wearable device, the second wearable device) to obtain The second key and the third key.
  • the first terminal may instruct the first wearable device and the second wearable device to transmit the key to the second terminal, so that the second terminal The data can be decrypted to obtain the target data.
  • the first terminal sends the first encrypted data and the second encrypted data to the second terminal twice.
  • the first terminal may send the first encrypted data and the second encrypted data to the second terminal twice.
  • the first terminal may send the first encrypted data and then send the second encrypted data, or the first terminal may send the second encrypted data and then send the first encrypted data, which is not limited in the embodiment of the present invention.
  • the first terminal receives a data transmission instruction for indicating that the target data is transmitted to the second terminal, and determines an importance degree value of the target data, where the storage space occupied by the target data is greater than the preset space.
  • the first terminal splits the target data into the first data and the second data, and the first terminal encrypts the first data and the second data respectively by using the secret key to obtain the first encrypted data and the second encrypted data.
  • the first terminal sends the first encrypted data and the second encrypted data to the second terminal twice. It can be seen that, by using the embodiment of the present invention, not only the security of data transmission between the first terminal and the second terminal can be improved, but also the transmission bandwidth of the first terminal and the second terminal during data transmission can be reduced, and the transmission is reduced. time.
  • FIG. 4 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention, where the data transmission apparatus may be used to perform some or all of the steps of the data transmission method described in FIG. 2 to FIG.
  • the data transmission device 400 can include:
  • the receiving unit 401 is configured to receive a data transmission instruction for instructing to transmit the target data to the second terminal;
  • a first determining unit 402 configured to determine an importance level value of the target data
  • the encryption unit 403 is configured to encrypt the target data by using a secret key to obtain encrypted data if the importance level value of the target data is greater than a preset threshold.
  • the sending unit 404 is configured to send the encrypted data to the second terminal in response to the data transmission instruction.
  • the embodiment of the present invention may divide the functional unit into the user terminal according to the foregoing method example.
  • each functional unit may be divided according to each function, or two or more functions may be integrated into one processing unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the receiving unit 401, the first determining unit 402, and the encrypting unit 403 may be integrated into a central processing unit (CPU); and the sending unit 404 may be a radio frequency module or a WiFi module.
  • CPU central processing unit
  • the division of the unit in the embodiment of the present invention is schematic, and is only a logical function division, and the actual implementation may have another division manner.
  • FIG. 5 is a schematic structural diagram of another data transmission apparatus according to an embodiment of the present invention, where the data transmission apparatus may be used to perform some or all of the steps of the data transmission method described in FIG. 2 to FIG.
  • the data transmission device shown in FIG. 5 is further optimized based on the data transmission device shown in FIG. 4.
  • the data transmission device shown in FIG. 5 includes In addition to all the units of the data transmission device shown in FIG. 4, the method may further include:
  • a second determining unit 405, configured to determine a storage space occupied by the target data
  • the splitting unit 406 is configured to split the target data into the first data and the second data if the storage space occupied by the target data is greater than a preset space threshold;
  • the encryption unit 403 is specifically configured to encrypt the first data and the second data by using a secret key to obtain first encrypted data and second encrypted data.
  • the manner in which the sending unit 404 sends the encrypted data to the second terminal is specifically:
  • the first encrypted data and the second encrypted data are sent to the second terminal twice.
  • the encryption unit 403 encrypts the first data and the second data by using a secret key, and the manner of obtaining the first encrypted data and the second encrypted data is specifically:
  • the first data is encrypted using a second key to obtain first encrypted data
  • the first terminal encrypts the second data using a third key to obtain second encrypted data.
  • the sending unit 404 is further configured to send a key acquisition instruction to the first wearable device that is associated with the first terminal, where the receiving unit is further configured to receive the location sent by the first wearable device. Describe the second key and the third key; or,
  • the sending unit 404 is further configured to send a key acquisition instruction to the first wearable device and the second wearable device that are associated with the first terminal, where the receiving unit is further configured to receive the first wearable device to send The second key, and the third key sent by the second wearable device.
  • the data transmission device 400 shown in FIG. 5 may further include:
  • the obtaining unit 407 is configured to acquire, after the receiving unit 401 receives a data transmission instruction for transmitting target data to the second terminal, acquiring a device identifier of the second terminal;
  • the sending unit 404 is further configured to send the device identifier of the second terminal to the third wearable device that is associated with the first terminal, to trigger the third wearable device to perform verification on the second terminal.
  • the first determining unit 402 is specifically configured to: when the receiving unit 401 receives the indication information that is sent by the third wearable device to indicate that the second terminal is legal, the target data is determined. The importance value.
  • the data transmission device 400 may further include:
  • An identifier obtaining unit configured to acquire a device identifier of the second terminal
  • An identifier sending unit configured to send the device identifier of the second terminal to the server, to trigger the server to verify the second terminal
  • An execution unit configured to: when receiving, by the server, indication information indicating that the identity of the second terminal is legal, the first terminal performing, determining, by the first terminal, the importance of the target data The step of the value.
  • a storage space obtaining unit configured to acquire a remaining storage space of the second terminal
  • a data compression unit configured to perform compression processing on the target data when the storage space occupied by the target data is larger than the remaining storage space, so that the storage space occupied by the compressed target data is smaller than the remaining storage;
  • the encryption unit 403 is specifically configured to encrypt the compressed target data.
  • the splitting unit 406, the obtaining unit 407, the executing unit, and the data compressing unit may also be integrated into the processor, and the identifier acquiring unit, the identifier sending unit, and the storage space are obtained.
  • the unit can be a radio frequency chip or a WiFi module.
  • the first terminal may first determine the importance level value of the target data, in the case where it is determined that the target data is important.
  • the target data is encrypted and then sent to the second terminal, thereby avoiding leakage of important data and improving the security of data transmission.
  • FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention, where the terminal may be used to perform some or all of the steps of the data transmission method described in FIG. 2 to FIG. 2 to 3, the description will not be repeated here.
  • the terminal 600 shown in FIG. 6 may include: at least one processor 601, a memory 602, a transceiver 603, and an antenna 604.
  • the transceiver 603 may include a receiver 6031 and a transmitter 6032 for receiving, respectively. Signal and send signal.
  • the memory 602 is for storing instructions
  • the processor 601 is for executing instructions stored by the memory 602, and controls the transmitter 6032 to transmit signals.
  • the processor 601, the memory 602, and the transceiver 603 can be implemented by one or more chips.
  • the processor 601, the memory 602, and the transceiver 603 may be fully integrated in one or more chips, or the processor 601 and the transceiver 603 may be integrated in one chip and the memory 602 integrated in another chip, specifically The form is not limited here. among them,
  • the memory 602 may be a high speed RAM memory or a non-volatile memory. It will be understood by those skilled in the art that the structure of the terminal 600 shown in FIG. 6 does not constitute a limitation of the present invention, and it may be a bus-shaped structure or a star-shaped structure, and may further include more than that shown in FIG. 6. More or less parts, or some parts, or different parts. For example, it may also include a radio frequency (RF) circuit, a display unit, a sensor, an audio circuit, a wireless fidelity (WiFi) module, and a power supply.
  • RF radio frequency
  • the processor 601 is a control center of the terminal 600, and may be a central processing unit (CPU).
  • the processor 601 connects various parts of the entire terminal 600 by using various interfaces and lines, and is stored in the memory 602 by running or executing.
  • the encrypted data is transmitted to the second terminal by the transmitter 6032 in response to the data transfer instruction.
  • the processor 601 may further invoke program code stored in the memory 602 for performing the following operations:
  • the processor 601 encrypts the target data by using a secret key, and obtaining the encrypted data includes:
  • the sending, by the processor 601, the encrypted data to the second terminal by using the transmitter 6032 includes:
  • the processor 601 sends the first encrypted data and the second encrypted data to the second terminal twice by the transmitter 6032.
  • the processor 601 encrypts the first data and the second data by using a secret key, and obtaining the first encrypted data and the second encrypted data includes:
  • the processor 601 encrypts the first data and the second data respectively by using a first key to obtain first encrypted data and second encrypted data; or
  • the processor 601 encrypts the first data by using a second key to obtain first encrypted data, and the first terminal encrypts the second data by using a third key to obtain second encrypted data. .
  • processor 601 may also call program code stored in the memory 602 for performing the following operations:
  • the processor 601 sends a key acquisition instruction to the first wearable device associated with the first terminal by using the transmitter 6032, and receives the identifier sent by the first wearable device by the receiver 6031. a second key and the third key; or,
  • the processor 601 sends a key acquisition instruction to the first wearable device and the second wearable device associated with the first terminal by the transmitter 6032, and receives the first message sent by the first wearable device by the receiver 6031. And acquiring, by the receiver 6031, the third key sent by the second wearable device.
  • the processor 601 may also be stored and stored in the memory 602. Program code for doing the following:
  • the processor 601 acquires a device identifier of the second terminal
  • the processor 601 sends the device identifier of the second terminal to the third wearable device associated with the first terminal by using the transmitter 6032 to trigger the third wearable device to perform verification on the second terminal.
  • the processor 601 performs the first terminal to determine the importance of the target data. The step of the degree value.
  • the determining, by the processor 601, the importance value of the target data includes:
  • the processor 601 acquires historical usage parameters of the target data in a preset time, and the historical usage parameters include one or more of the following: usage time, usage times, and usage frequency;
  • the processor 601 performs weighting calculation on the historical usage parameter to obtain an importance degree value of the target data.
  • the first terminal may first determine the importance level value of the target data, and if the target data is determined to be important, perform the target data. After the encryption process is sent to the second terminal, the leakage of important data can be avoided, and the security of data transmission is improved.
  • the embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, the computer program causing the computer to perform some or all of the steps of any of the methods described in the foregoing method embodiments.
  • the computer includes a terminal.
  • Embodiments of the present invention also provide a computer program product, the computer program product including storage A non-transitory computer readable storage medium for a computer program operative to cause a computer to perform some or all of the steps of any of the methods described in the above method embodiments.
  • the computer program product can be a software installation package, the computer including a terminal.
  • the disclosed apparatus may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods of the various embodiments of the present invention.
  • the foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Environmental & Geological Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed are a data transmission method and apparatus, and a terminal. The method comprises: a first terminal receiving a data transmission instruction for indicating target data transmission to a second terminal; the first terminal determining an importance value of the target data; where the importance value of the target data is greater than a pre-set threshold value, the first terminal using a key to encrypt the target data, and obtaining encrypted data; and the first terminal sending the encrypted data to the second terminal in response to the data transmission instruction. The implementation of the embodiments of the present invention can improve the security of data transmission.

Description

数据传输方法、装置及终端Data transmission method, device and terminal

本发明要求2016年9月14日递交的发明名称为“一种数据传输方法、装置及终端”的申请号201610828089.X的在先申请优先权,上述在先申请的内容以引入的方式并入本文本中。The present invention claims priority to the priority of the application Serial No. 201610828089.X filed on Sep. 14, 2016, the disclosure of which is incorporated herein by reference. In this article.

技术领域Technical field

本发明涉及终端技术领域,尤其涉及一种数据传输方法、装置及终端。The present invention relates to the field of terminal technologies, and in particular, to a data transmission method, apparatus, and terminal.

背景技术Background technique

随着终端(如智能手机、平板电脑、IPAD)以及网络技术的快速发展,越来越多的用户经常将多个终端进行连接,互传信息实现数据的传输,并管理这些数据。例如:当智能手机A与智能手机B建立连接后,用户就可以将智能手机A上的数据上传到智能手机B中。With the rapid development of terminals (such as smart phones, tablets, IPADs) and network technologies, more and more users often connect multiple terminals, transfer information to each other, and manage the data. For example, when the smartphone A establishes a connection with the smartphone B, the user can upload the data on the smartphone A to the smartphone B.

然而实践中发现,用户将两个终端进行连接后就可以直接进行数据传输,这给用户带来极大便利的同时,也存在一定的数据安全隐患。举例来说:用户B在用户A不知情的情况下,用户B将用户A的智能手机A的数据传输至用户B的智能手机B中,这会造成智能手机A的数据泄露。However, in practice, it is found that the user can directly perform data transmission after connecting the two terminals, which brings great convenience to the user, and also has certain data security risks. For example, if User B does not know User A, User B transmits the data of User A's Smartphone A to User B's Smartphone B, which may cause data leakage of Smartphone A.

发明内容Summary of the invention

本发明实施例提供了一种数据传输方法、装置及终端,可以提高数据传输的安全性。The embodiment of the invention provides a data transmission method, device and terminal, which can improve the security of data transmission.

本发明实施例第一方面公开了一种数据传输方法,包括:A first aspect of the embodiments of the present invention discloses a data transmission method, including:

第一终端接收用于指示将目标数据传输至第二终端的数据传输指令;Receiving, by the first terminal, a data transmission instruction for transmitting the target data to the second terminal;

所述第一终端确定所述目标数据的重要程度值;Determining, by the first terminal, an importance level value of the target data;

在所述目标数据的重要程度值大于预设阈值的情况下,所述第一终端使用秘钥对所述目标数据进行加密,获得加密数据;In a case that the importance level value of the target data is greater than a preset threshold, the first terminal encrypts the target data by using a secret key to obtain encrypted data;

所述第一终端将所述加密数据发送至所述第二终端,以响应所述数据传输指令。 The first terminal transmits the encrypted data to the second terminal in response to the data transmission instruction.

本发明实施例第二方面公开了一种数据传输装置,包括:A second aspect of the embodiments of the present invention discloses a data transmission apparatus, including:

接收单元,用于接收用于指示将目标数据传输至第二终端的数据传输指令;a receiving unit, configured to receive a data transmission instruction for instructing to transmit the target data to the second terminal;

第一确定单元,用于确定所述目标数据的重要程度值;a first determining unit, configured to determine an importance level value of the target data;

加密单元,用于在所述目标数据的重要程度值大于预设阈值的情况下,使用秘钥对所述目标数据进行加密,获得加密数据;An encryption unit, configured to encrypt the target data by using a secret key to obtain encrypted data, if the importance level value of the target data is greater than a preset threshold;

发送单元,用于将所述加密数据发送至所述第二终端,以响应所述数据传输指令。And a sending unit, configured to send the encrypted data to the second terminal in response to the data transmission instruction.

本发明实施例第三方面公开了一种终端,包括处理器、接收器、,其中,所述处理器与所述存储器连接,所述存储器中存储有程序代码,所述处理器用于调用所述存储器中存储的程序代码,执行第一方面任一方法的部分或全部步骤。A third aspect of the embodiments of the present invention discloses a terminal, including a processor, a receiver, and wherein the processor is connected to the memory, where the memory stores program code, and the processor is configured to invoke the The program code stored in the memory performs some or all of the steps of any of the methods of the first aspect.

本发明实施例还提供一种计算机存储介质,其中,该计算机存储介质存储用于电子数据交换的计算机程序,该计算机程序使得计算机执行如上述方法实施例中记载的任一方法的部分或全部步骤。The embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, the computer program causing the computer to perform some or all of the steps of any of the methods described in the foregoing method embodiments. .

本发明实施例还提供一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如上述方法实施例中记载的任一方法的部分或全部步骤。该计算机程序产品可以为一个软件安装包。Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the operations as recited in the above method embodiments Part or all of the steps of either method. The computer program product can be a software installation package.

本发明实施例中,第一终端在接收到用于指示将目标数据传输至第二终端的数据传输指令的情况下,第一终端可以先确定目标数据的重要程度值;在目标数据的重要程度值大于预设阈值的情况下,第一终端可以进一步使用秘钥对目标数据进行加密,获得加密数据;最后,第一终端再将加密数据发送至第二终端,以响应数据传输指令。可见,通过本发明实施例,第一终端在向第二终端发送目标数据之前,第一终端可以先确定目标数据的重要程度值,在确定目 标数据比较重要的情况下,对目标数据进行加密处理之后再发送给第二终端,从而可以避免重要数据的泄露,提高数据传输的安全性。In the embodiment of the present invention, when the first terminal receives the data transmission instruction for instructing to transmit the target data to the second terminal, the first terminal may first determine the importance level value of the target data; If the value is greater than the preset threshold, the first terminal may further encrypt the target data by using the secret key to obtain the encrypted data. Finally, the first terminal sends the encrypted data to the second terminal in response to the data transmission instruction. It can be seen that, by using the embodiment of the present invention, before the first terminal sends the target data to the second terminal, the first terminal may first determine the importance level value of the target data, When the target data is important, the target data is encrypted and then sent to the second terminal, thereby avoiding leakage of important data and improving the security of data transmission.

附图说明DRAWINGS

为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the present invention. Other drawings may also be obtained from those of ordinary skill in the art in light of the inventive work.

图1是本发明实施例公开的一种数据传输系统的网络架构示意图;1 is a schematic diagram of a network architecture of a data transmission system according to an embodiment of the present invention;

图2是本发明实施例公开的一种数据传输方法的流程示意图;2 is a schematic flowchart of a data transmission method according to an embodiment of the present invention;

图3是本发明实施例公开的另一种数据传输方法的流程示意图;3 is a schematic flowchart of another data transmission method according to an embodiment of the present invention;

图4是本发明实施例公开的一种数据传输装置的结构示意图;4 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention;

图5是本发明实施例公开的另一种数据传输装置的结构示意图;FIG. 5 is a schematic structural diagram of another data transmission apparatus according to an embodiment of the present invention; FIG.

图6是本发明实施例公开的一种终端的结构示意图。FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention.

具体实施方式detailed description

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.

本发明的说明书和权利要求书及上述附图中的术语“第一”和“第二”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first" and "second" and the like in the specification and claims of the present invention and the above drawings are used to distinguish different objects, and are not intended to describe a specific order. Furthermore, the terms "comprises" and "comprising" and "comprising" are intended to cover a non-exclusive inclusion. For example, a process, method, system, product, or device that comprises a series of steps or units is not limited to the listed steps or units, but optionally also includes steps or units not listed, or alternatively Other steps or units inherent to these processes, methods, products or equipment.

本发明实施例公开了一种数据传输方法、装置及终端,可以提高数据传输的安全性。以下分别进行详细说明。The embodiment of the invention discloses a data transmission method, device and terminal, which can improve the security of data transmission. The details are described below separately.

为了更好的理解本发明实施例,下面先对本发明实施例公开的一种数据传 输系统的网络架构示意图进行描述。In order to better understand the embodiments of the present invention, a data transmission disclosed in the embodiment of the present invention is first described below. A schematic diagram of the network architecture of the transmission system is described.

请参阅图1,图1是本发明实施例公开的一种数据传输系统的网络架构示意图。如图1所示,该数据传输系统包括第一终端以及多个第二终端,其中,Please refer to FIG. 1. FIG. 1 is a schematic diagram of a network architecture of a data transmission system according to an embodiment of the present invention. As shown in FIG. 1, the data transmission system includes a first terminal and a plurality of second terminals, where

第一终端可以包括但不限于智能手机、笔记本电脑、个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet Device,MID)、智能穿戴设备(如智能手表、智能手环)等各类用户终端。其中,该用户终端的操作系统可包括但不限于Android操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等等,本发明实施例不做限定。The first terminal may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a smart wearable device (eg, Various types of user terminals such as smart watches and smart bracelets. The operating system of the user terminal may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a Blackberry operating system, a Windows Phone 8 operating system, and the like. limited.

第二终端可以包括但不限于智能手机、笔记本电脑、个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、移动互联网设备(Mobile Internet Device,MID)、智能穿戴设备(如智能手表、智能手环)等各类用户终端。其中,该用户终端的操作系统可包括但不限于Android操作系统、IOS操作系统、Symbian(塞班)操作系统、Black Berry(黑莓)操作系统、Windows Phone8操作系统等等,本发明实施例不做限定。The second terminal may include, but is not limited to, a smart phone, a notebook computer, a personal computer (PC), a personal digital assistant (PDA), a mobile internet device (MID), a smart wearable device (eg, Various types of user terminals such as smart watches and smart bracelets. The operating system of the user terminal may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a Blackberry operating system, a Windows Phone 8 operating system, and the like. limited.

在图1所描述的数据传输系统中,第一终端在接收用于指示将目标数据传输至第二终端的数据传输指令之后;第一终端可以先确定目标数据的重要程度值;在目标数据的重要程度值大于预设阈值的情况下,第一终端可以进一步使用秘钥对目标数据进行加密,获得加密数据;最后,第一终端再将加密数据发送至第二终端,以响应数据传输指令。可见,通过本发明实施例,第一终端在向第二终端发送目标数据之前,第一终端可以先确定目标数据的重要程度值,在确定目标数据比较重要的情况下,对目标数据进行加密处理之后再发送给第二终端,从而可以避免重要数据的泄露,提高数据传输的安全性。In the data transmission system described in FIG. 1, after the first terminal receives the data transmission instruction for instructing transmission of the target data to the second terminal; the first terminal may first determine the importance level value of the target data; If the importance value is greater than the preset threshold, the first terminal may further encrypt the target data by using the secret key to obtain the encrypted data. Finally, the first terminal sends the encrypted data to the second terminal in response to the data transmission instruction. It can be seen that, by using the embodiment of the present invention, before the first terminal sends the target data to the second terminal, the first terminal may first determine the importance level value of the target data, and perform encryption processing on the target data when the target data is determined to be important. Then, it is sent to the second terminal, so that leakage of important data can be avoided, and the security of data transmission is improved.

需要说明的是,上述所述的第二终端可以是图1所示的一个或多个第二终端。另外,本领域技术人员可以理解,虽然图1中只示出了4个第二终端,但并不构成对本发明实施例的限定,可以包括比图示更多的第二终端。It should be noted that the second terminal described above may be one or more second terminals shown in FIG. 1. In addition, those skilled in the art can understand that although only four second terminals are shown in FIG. 1, they do not constitute a limitation on the embodiments of the present invention, and may include more second terminals than illustrated.

请参见图2,图2是本发明实施例公开的一种数据传输方法的的流程示意图。如图2所示,该方法可以包括以下步骤。 Referring to FIG. 2, FIG. 2 is a schematic flowchart diagram of a data transmission method according to an embodiment of the present invention. As shown in FIG. 2, the method can include the following steps.

201、第一终端接收用于指示将目标数据传输至第二终端的数据传输指令。201. The first terminal receives a data transmission instruction for indicating that the target data is transmitted to the second terminal.

本发明实施例中,第一终端上存储有多种类型的数据,比如:图片数据、文字数据、视频数据、语音数据以及应用程序数据等。有些数据是第一终端所属用户的私人数据,比如私人照片、私人备份记录等,这些私人数据通常对用户来说是比较重要的,而有些数据对用户来说不是那么的重要,比如第一终端存储的应用程序数据等。In the embodiment of the present invention, the first terminal stores multiple types of data, such as image data, text data, video data, voice data, and application data. Some data is the private data of the user of the first terminal, such as private photos, private backup records, etc. These private data are usually more important to the user, and some data is not so important to the user, such as the first terminal. Stored application data, etc.

本发明实施例中,可以预先建立第一终端与第二终端的通信连接,比如蓝牙连接、有线连接、近场通信(Near Field Communication,NFC)连接,在第一终端与第二终端的通信连接建立成功的基础上,第一终端可以通过通信连接接收用于指示将目标数据传输至第二终端的数据传输指令。In the embodiment of the present invention, a communication connection between the first terminal and the second terminal, such as a Bluetooth connection, a wired connection, a Near Field Communication (NFC) connection, and a communication connection between the first terminal and the second terminal, may be established in advance. Based on the establishment success, the first terminal may receive a data transmission instruction for indicating the transmission of the target data to the second terminal through the communication connection.

作为一种可选的实施方式,步骤201之后,该方法还包括以下步骤:As an optional implementation manner, after step 201, the method further includes the following steps:

11)第一终端获取第二终端的设备标识;11) The first terminal acquires a device identifier of the second terminal;

12)第一终端将第二终端的设备标识发送给与第一终端关联的第三穿戴设备,以触发第三穿戴设备对第二终端进行验证;12) The first terminal sends the device identifier of the second terminal to the third wearable device associated with the first terminal, to trigger the third wearable device to verify the second terminal.

13)在接收到第三穿戴设备发送的用于指示第二终端的身份合法的指示信息的情况下,执行步骤202。13) In the case that the indication information sent by the third wearable device for indicating the identity of the second terminal is received, step 202 is performed.

在该可选的实施方式中,第一终端在接收到用于指示将目标数据传输至第二终端的数据传输指令之后,第一终端可以先获取第二终端的设备标识,进一步地,第一终端将第二终端的设备标识发送给与第一终端关联的第三穿戴设备,第三穿戴设备接收到第二终端的设备标识之后,第三穿戴设备可以验证第二终端的设备标识与预设标识是否匹配,若匹配,则确定第二终端的身份合法。其中,第三穿戴设备可以是用户随身携带的设备,比如智能手表、智能手环等。用户预先将第一终端与第三穿戴设备进行关联,即使用户没有携带第一终端,用户也可以通过第三穿戴设备向第一终端发送信息的方式来指示第一终端是否需要执行相应的步骤,从而可以间接地控制第一终端,同时,也提高第一终端的数据的安全性。In the optional implementation, after receiving the data transmission instruction for indicating that the target data is transmitted to the second terminal, the first terminal may first acquire the device identifier of the second terminal, and further, the first The terminal sends the device identifier of the second terminal to the third wearable device associated with the first terminal, and after the third wearable device receives the device identifier of the second terminal, the third wearable device can verify the device identifier and the preset of the second terminal. Whether the identifiers match, if they match, it is determined that the identity of the second terminal is legal. The third wearable device may be a device carried by the user, such as a smart watch, a smart bracelet, or the like. The user associates the first terminal with the third wearable device in advance. Even if the user does not carry the first terminal, the user can indicate whether the first terminal needs to perform the corresponding step by sending the information to the first terminal by using the third wearable device. Thereby, the first terminal can be indirectly controlled, and at the same time, the security of the data of the first terminal is also improved.

作为一种可选的实施方式,第一终端也可将第二终端的设备标识发送给服务器来进行身份验证。该服务器可为专用的网络安全服务器,通过大数据对终端设备的安全等级进行评级,并可根据用户的反馈信息确定出某些终端设备为 “垃圾短信”的发送设备、“诈骗信息”的发送设备、“数据黑客”的发送设备等。服务器在获取了第二终端的设备标识之后,确认第二终端的安全等级高,即可向第一终端发送“第二终端的身份合法”的指示信息。As an optional implementation manner, the first terminal may also send the device identifier of the second terminal to the server for identity verification. The server can be a dedicated network security server, and the security level of the terminal device is rated by big data, and some terminal devices can be determined according to the feedback information of the user. The "spam" sending device, the "scam information" sending device, the "data hacking" sending device, and the like. After obtaining the device identifier of the second terminal, the server confirms that the security level of the second terminal is high, and may send the indication information that the identity of the second terminal is legal to the first terminal.

202、第一终端确定目标数据的重要程度值。202. The first terminal determines an importance value of the target data.

本发明实施例中,第一终端确定目标数据的重要程度值的方式具体可以包括以下步骤:In the embodiment of the present invention, the manner in which the first terminal determines the importance level value of the target data may specifically include the following steps:

21)第一终端获取在预设时间内目标数据的历史使用参数,历史使用参数包括以下中的一个或多个:使用时间、使用次数以及使用频率;21) The first terminal acquires historical usage parameters of the target data in a preset time, and the historical usage parameters include one or more of the following: usage time, usage times, and usage frequency;

22)第一终端将历史使用参数进行加权计算,获得目标数据的重要程度值。22) The first terminal performs weighting calculation on the historical usage parameters to obtain the importance value of the target data.

在该实施例中,第一终端可以获取第一终端在预设时间(比如当前时间之前的一周内、一个月内)目标数据的历史使用参数,比如使用时间、使用次数以及使用频率,进一步地,第一终端将历史使用参数进行加权计算,获得目标数据的重要程度值。其中,各历史使用参数的加权参数的和为1,用户可以根据需要来分配各历史使用参数的加权参数,比如:用户可以给使用时间分配加权参数为40%,给使用次数分配加权参数为20%,给使用频率分配加权参数为40%。In this embodiment, the first terminal may acquire historical usage parameters of the target data of the first terminal in a preset time (such as one week before the current time, one month), such as usage time, usage times, and usage frequency, and further The first terminal performs weighted calculation on the historical usage parameters to obtain the importance value of the target data. The sum of the weighting parameters of each historical usage parameter is 1. The user can allocate weighting parameters of each historical usage parameter according to requirements, for example, the user can assign a weighting parameter of 40% to the usage time, and assign a weighting parameter to the usage frequency of 20. %, the weighting parameter for the use frequency allocation is 40%.

203、在目标数据的重要程度值大于预设阈值的情况下,第一终端使用秘钥对目标数据进行加密,获得加密数据。203. If the importance level value of the target data is greater than a preset threshold, the first terminal encrypts the target data by using a secret key to obtain the encrypted data.

本发明实施例中,第一终端确定目标数据的重要程度值之后,第一终端可以先判断目标数据的重要程度值是否大于预设阈值,若是,则表明目标数据对用户来说比较重要,若否,则表明目标数据对用户来说不是那么的重要。In the embodiment of the present invention, after the first terminal determines the importance level value of the target data, the first terminal may first determine whether the importance level value of the target data is greater than a preset threshold, and if yes, indicating that the target data is important to the user, if No, it means that the target data is not so important to the user.

在目标数据的重要程度值大于预设阈值的情况下,为了防止目标数据的泄露,第一终端可以使用秘钥对目标数据进行加密,获得加密数据。In the case that the importance value of the target data is greater than the preset threshold, in order to prevent leakage of the target data, the first terminal may encrypt the target data using the secret key to obtain the encrypted data.

在目标数据的重要程度值不大于预设阈值的情况下,第一终端可以不用对目标数据进行任何处理。In the case where the importance value of the target data is not greater than the preset threshold, the first terminal may not perform any processing on the target data.

作为一种可选的实施方式,在目标数据的重要程度值大于预设阈值的情况下,该方法还包括以下步骤:As an optional implementation manner, if the importance value of the target data is greater than a preset threshold, the method further includes the following steps:

31)第一终端获取第二终端的剩余存储空间。31) The first terminal acquires a remaining storage space of the second terminal.

32)在确定目标数据所占存储空间大于剩余存储空间的情况下,第一终端 对目标数据进行压缩处理,以使得压缩后的目标数据所占存储空间小于剩余存储空间。32) In the case that it is determined that the storage space occupied by the target data is larger than the remaining storage space, the first terminal The target data is compressed so that the compressed target data occupies less storage space than the remaining storage space.

第一终端使用秘钥对目标数据进行加密,获得加密数据的方式具体可以为:The first terminal encrypts the target data by using the secret key, and the manner of obtaining the encrypted data may be specifically:

第一终端使用秘钥对压缩后的目标数据进行加密,获得加密数据。The first terminal encrypts the compressed target data by using a secret key to obtain encrypted data.

在该可选的实施方式中,第一终端在确定目标数据的重要程度值大于预设阈值的情况下,第一终端可以先获取第二终端的剩余存储空间,判断目标数据所占存储空间是否大于剩余存储空间,若是,第一终端可以对目标数据进行压缩处理,以使得压缩后的目标数据所占存储空间小于剩余存储空间,这样处理后可以避免数据传输失败,之后,第一终端就可以使用秘钥对压缩后的目标数据进行加密,获得加密数据。若目标数据所占存储空间不大于剩余存储空间,则第一终端可以直接使用秘钥对目标数据进行加密,获得加密数据。In the optional implementation manner, if the first terminal determines that the importance level value of the target data is greater than the preset threshold, the first terminal may first acquire the remaining storage space of the second terminal, and determine whether the storage space occupied by the target data is If the data is larger than the remaining storage space, the first terminal may perform compression processing on the target data, so that the storage space occupied by the compressed target data is smaller than the remaining storage space, so that the data transmission failure can be avoided after the processing, and then the first terminal can The compressed target data is encrypted using a secret key to obtain encrypted data. If the storage space occupied by the target data is not greater than the remaining storage space, the first terminal may directly encrypt the target data by using the secret key to obtain the encrypted data.

204、第一终端将加密数据发送至第二终端,以响应数据传输指令。204. The first terminal sends the encrypted data to the second terminal in response to the data transmission instruction.

在图2所描述的方法实施例中,第一终端在接收到用于指示将目标数据传输至第二终端的数据传输指令的情况下,第一终端可以先确定目标数据的重要程度值;在目标数据的重要程度值大于预设阈值的情况下,第一终端可以进一步使用秘钥对目标数据进行加密,获得加密数据;最后,第一终端再将加密数据发送至第二终端,以响应数据传输指令。可见,通过本发明实施例,第一终端在向第二终端发送目标数据之前,第一终端可以先确定目标数据的重要程度值,在确定目标数据比较重要的情况下,对目标数据进行加密处理之后再发送给第二终端,从而可以避免重要数据的泄露,提高数据传输的安全性。In the method embodiment described in FIG. 2, in a case where the first terminal receives the data transmission instruction for instructing to transmit the target data to the second terminal, the first terminal may first determine the importance level value of the target data; If the importance value of the target data is greater than the preset threshold, the first terminal may further encrypt the target data by using the secret key to obtain the encrypted data. Finally, the first terminal sends the encrypted data to the second terminal to respond to the data. Transfer instructions. It can be seen that, by using the embodiment of the present invention, before the first terminal sends the target data to the second terminal, the first terminal may first determine the importance level value of the target data, and perform encryption processing on the target data when the target data is determined to be important. Then, it is sent to the second terminal, so that leakage of important data can be avoided, and the security of data transmission is improved.

请参见图3,图3是本发明实施例公开的另一种数据传输方法的流程示意图。如图3所示,该方法可以包括以下步骤。Referring to FIG. 3, FIG. 3 is a schematic flowchart diagram of another data transmission method according to an embodiment of the present invention. As shown in FIG. 3, the method can include the following steps.

301、第一终端接收用于指示将目标数据传输至第二终端的数据传输指令。301. The first terminal receives a data transmission instruction for indicating that the target data is transmitted to the second terminal.

302、第一终端确定目标数据的重要程度值。302. The first terminal determines an importance value of the target data.

303、在目标数据的重要程度值大于预设阈值的情况下,第一终端确定目标数据所占的存储空间。303. If the importance level value of the target data is greater than a preset threshold, the first terminal determines a storage space occupied by the target data.

304、在目标数据所占的存储空间大于预设空间阈值的情况下,第一终端 将目标数据拆分成第一数据和第二数据。304. In a case where the storage space occupied by the target data is greater than a preset space threshold, the first terminal The target data is split into the first data and the second data.

本发明实施例中,第一终端确定目标数据所占的存储空间之后,第一终端可以先判断目标数据所占的存储空间是否大于预设空间阈值,若是,表明目标数据所占的存储空间太大,通常数据所占的存储空间越大,该数据传输时对传输带宽的要求就越高,传输的时间就越长。为了降低终端间数据传输时的传输带宽以及减少传输的时间,第一终端可以将目标数据拆分成第一数据和第二数据,其中,第一终端可以目标数据按照存储空间均等划分为第一数据和第二数据,或者,第一终端可以将目标数据任意拆分成第一数据和第二数据,本发明实施例不做限定。In the embodiment of the present invention, after the first terminal determines the storage space occupied by the target data, the first terminal may first determine whether the storage space occupied by the target data is greater than a preset space threshold, and if yes, indicating that the storage space occupied by the target data is too Large, usually the larger the storage space occupied by data, the higher the transmission bandwidth requirement for the data transmission, and the longer the transmission time. In order to reduce the transmission bandwidth of the data transmission between the terminals and reduce the transmission time, the first terminal may split the target data into the first data and the second data, wherein the first terminal may divide the target data into the first according to the storage space. The data and the second data, or the first terminal may arbitrarily split the target data into the first data and the second data, which are not limited in the embodiment of the present invention.

305、第一终端使用秘钥分别对第一数据和第二数据进行加密,获得第一加密数据和第二加密数据。305. The first terminal encrypts the first data and the second data by using a secret key to obtain the first encrypted data and the second encrypted data.

具体的,第一终端使用秘钥分别对第一数据和第二数据进行加密,获得第一加密数据和第二加密数据的方式可以为:Specifically, the first terminal encrypts the first data and the second data by using a secret key, and the manner of obtaining the first encrypted data and the second encrypted data may be:

第一终端使用第一秘钥分别对第一数据和第二数据进行加密,获得第一加密数据和第二加密数据;或,The first terminal encrypts the first data and the second data respectively by using the first key to obtain the first encrypted data and the second encrypted data; or

第一终端使用第二秘钥对第一数据进行加密,获得第一加密数据,以及第一终端使用第三秘钥对第二数据进行加密,获得第二加密数据。The first terminal encrypts the first data by using the second key to obtain the first encrypted data, and the first terminal encrypts the second data by using the third key to obtain the second encrypted data.

在该实施方式中,第一终端可以使用同一个秘钥(即第一秘钥)分别对第一数据和第二数据进行加密,获得第一加密数据和第二加密数据,或者,第一终端可以使用不同的秘钥,即使用第二秘钥对第一数据进行加密,获得第一加密数据,使用第三秘钥对第二数据进行加密,获得第二加密数据。In this embodiment, the first terminal may encrypt the first data and the second data by using the same key (ie, the first key) to obtain the first encrypted data and the second encrypted data, or the first terminal. Different keys may be used, that is, the first data is encrypted using the second key, the first encrypted data is obtained, and the second data is encrypted using the third key to obtain the second encrypted data.

作为一种可选的实施方式,该方法还包括:As an optional implementation manner, the method further includes:

第一终端向与第一终端关联的第一穿戴设备发送秘钥获取指令,接收第一穿戴设备发送的第二秘钥和第三秘钥;或,The first terminal sends a key acquisition instruction to the first wearable device associated with the first terminal, and receives the second key and the third key sent by the first wearable device; or

第一终端分别向与第一终端关联的第一穿戴设备、第二穿戴设备发送秘钥获取指令,接收第一穿戴设备发送的第二秘钥,以及接收第二穿戴设备发送的第三秘钥。The first terminal sends a key acquisition instruction to the first wearable device and the second wearable device associated with the first terminal, receives the second key sent by the first wearable device, and receives the third key sent by the second wearable device. .

在该实施方式中,第一终端获取第二秘钥和第三秘钥的方式可以有两种,第一种:第一终端向同一个穿戴设备(即与第一终端关联的第一穿戴设备)发 送秘钥获取指令,以获取第二秘钥和第三秘钥;第二种,第一终端向不同的穿戴设备(即第一穿戴设备、第二穿戴设备)发送秘钥获取指令,以获取第二秘钥和第三秘钥。In this implementation manner, the first terminal may obtain the second key and the third key in two ways. The first type: the first terminal is the same wearable device (that is, the first wearable device associated with the first terminal). )hair Sending a key acquisition instruction to obtain a second key and a third key; secondly, the first terminal sends a key acquisition instruction to different wearable devices (ie, the first wearable device, the second wearable device) to obtain The second key and the third key.

作为一种可选的实施方式,第一终端在向第二终端发送了加密后的数据之后,可以指示第一穿戴设备和第二穿戴设备将密钥传输给第二终端,以使第二终端可以对数据进行解密,从而获取到目标数据。As an optional implementation manner, after transmitting the encrypted data to the second terminal, the first terminal may instruct the first wearable device and the second wearable device to transmit the key to the second terminal, so that the second terminal The data can be decrypted to obtain the target data.

306、第一终端分两次将第一加密数据和第二加密数据发送至第二终端。306. The first terminal sends the first encrypted data and the second encrypted data to the second terminal twice.

本发明实施例中,第一终端在获得第一加密数据和第二加密数据之后,第一终端可以分两次将第一加密数据和第二加密数据发送至第二终端。其中,第一终端可以先发送第一加密数据然后再发送第二加密数据,或者,第一终端可以先发送第二加密数据然后再发送第一加密数据,本发明实施例不做限定。In the embodiment of the present invention, after the first terminal obtains the first encrypted data and the second encrypted data, the first terminal may send the first encrypted data and the second encrypted data to the second terminal twice. The first terminal may send the first encrypted data and then send the second encrypted data, or the first terminal may send the second encrypted data and then send the first encrypted data, which is not limited in the embodiment of the present invention.

在图3所描述的方法流程中,第一终端接收用于指示将目标数据传输至第二终端的数据传输指令,确定目标数据的重要程度值,在目标数据所占的存储空间大于预设空间阈值的情况下,第一终端将目标数据拆分成第一数据和第二数据,第一终端使用秘钥分别对第一数据和第二数据进行加密,获得第一加密数据和第二加密数据,第一终端分两次将第一加密数据和第二加密数据发送至第二终端。可见,通过本发明实施例,不仅可以提高第一终端与第二终端之间数据传输的安全性,同时,还可以降低第一终端与第二终端进行数据传输时的传输带宽,以及减少传输的时间。In the method flow described in FIG. 3, the first terminal receives a data transmission instruction for indicating that the target data is transmitted to the second terminal, and determines an importance degree value of the target data, where the storage space occupied by the target data is greater than the preset space. In the case of the threshold, the first terminal splits the target data into the first data and the second data, and the first terminal encrypts the first data and the second data respectively by using the secret key to obtain the first encrypted data and the second encrypted data. The first terminal sends the first encrypted data and the second encrypted data to the second terminal twice. It can be seen that, by using the embodiment of the present invention, not only the security of data transmission between the first terminal and the second terminal can be improved, but also the transmission bandwidth of the first terminal and the second terminal during data transmission can be reduced, and the transmission is reduced. time.

请参见图4,图4是本发明实施例公开的一种数据传输装置的结构示意图,其中,该数据传输装置可以用于执行图2~图3所描述的数据传输方法的部分或全部步骤,具体请参照图2~图3的描述,在此不再赘述。如图4所示,该数据传输装置400可以包括:Referring to FIG. 4, FIG. 4 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention, where the data transmission apparatus may be used to perform some or all of the steps of the data transmission method described in FIG. 2 to FIG. For details, please refer to the descriptions of FIG. 2 to FIG. 3 , and details are not described herein again. As shown in FIG. 4, the data transmission device 400 can include:

接收单元401,用于接收用于指示将目标数据传输至第二终端的数据传输指令;The receiving unit 401 is configured to receive a data transmission instruction for instructing to transmit the target data to the second terminal;

第一确定单元402,用于确定所述目标数据的重要程度值;a first determining unit 402, configured to determine an importance level value of the target data;

加密单元403,用于在所述目标数据的重要程度值大于预设阈值的情况下,使用秘钥对所述目标数据进行加密,获得加密数据; The encryption unit 403 is configured to encrypt the target data by using a secret key to obtain encrypted data if the importance level value of the target data is greater than a preset threshold.

发送单元404,用于将所述加密数据发送至所述第二终端,以响应所述数据传输指令。The sending unit 404 is configured to send the encrypted data to the second terminal in response to the data transmission instruction.

本发明实施例可以根据上述方法示例对用户终端进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。举例来说,上述接收单元401、第一确定单元402、加密单元403可以集成到中央处理器(Central Processing Unit,CPU)之中;而发送单元404可以为射频模块或WiFi模块。需要说明的是,本发明实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。The embodiment of the present invention may divide the functional unit into the user terminal according to the foregoing method example. For example, each functional unit may be divided according to each function, or two or more functions may be integrated into one processing unit. The above integrated unit can be implemented in the form of hardware or in the form of a software functional unit. For example, the receiving unit 401, the first determining unit 402, and the encrypting unit 403 may be integrated into a central processing unit (CPU); and the sending unit 404 may be a radio frequency module or a WiFi module. It should be noted that the division of the unit in the embodiment of the present invention is schematic, and is only a logical function division, and the actual implementation may have another division manner.

请参见图5,图5是本发明实施例公开的另一种数据传输装置的结构示意图,其中,该数据传输装置可以用于执行图2~图3所描述的数据传输方法的部分或全部步骤,具体请参照图2~图3的描述,在此不再赘述。其中,图5所示的数据传输装置是在图4所示的数据传输装置的基础上进一步优化得到的,与图4所示的数据传输装置相比,图5所示的数据传输装置除了包括图4所示的用数据传输装置的所有单元外,还可以包括:Referring to FIG. 5, FIG. 5 is a schematic structural diagram of another data transmission apparatus according to an embodiment of the present invention, where the data transmission apparatus may be used to perform some or all of the steps of the data transmission method described in FIG. 2 to FIG. For details, please refer to the descriptions of FIG. 2 to FIG. 3, and details are not described herein again. The data transmission device shown in FIG. 5 is further optimized based on the data transmission device shown in FIG. 4. Compared with the data transmission device shown in FIG. 4, the data transmission device shown in FIG. 5 includes In addition to all the units of the data transmission device shown in FIG. 4, the method may further include:

第二确定单元405,用于确定所述目标数据所占的存储空间;a second determining unit 405, configured to determine a storage space occupied by the target data;

拆分单元406,用于在所述目标数据所占的存储空间大于预设空间阈值的情况下,将所述目标数据拆分成第一数据和第二数据;The splitting unit 406 is configured to split the target data into the first data and the second data if the storage space occupied by the target data is greater than a preset space threshold;

所述加密单元403,具体用于使用秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据;The encryption unit 403 is specifically configured to encrypt the first data and the second data by using a secret key to obtain first encrypted data and second encrypted data.

所述发送单元404将所述加密数据发送至所述第二终端的方式具体为:The manner in which the sending unit 404 sends the encrypted data to the second terminal is specifically:

分两次将所述第一加密数据和所述第二加密数据发送至所述第二终端。The first encrypted data and the second encrypted data are sent to the second terminal twice.

可选的,所述加密单元403使用秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据的方式具体为:Optionally, the encryption unit 403 encrypts the first data and the second data by using a secret key, and the manner of obtaining the first encrypted data and the second encrypted data is specifically:

使用第一秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据;或,Separating the first data and the second data by using a first key to obtain first encrypted data and second encrypted data; or

使用第二秘钥对所述第一数据进行加密,获得第一加密数据,以及所述第一终端使用第三秘钥对所述第二数据进行加密,获得第二加密数据。 The first data is encrypted using a second key to obtain first encrypted data, and the first terminal encrypts the second data using a third key to obtain second encrypted data.

可选的,所述发送单元404,还用于向与所述第一终端关联的第一穿戴设备发送秘钥获取指令,所述接收单元,还用于接收所述第一穿戴设备发送的所述第二秘钥和所述第三秘钥;或,Optionally, the sending unit 404 is further configured to send a key acquisition instruction to the first wearable device that is associated with the first terminal, where the receiving unit is further configured to receive the location sent by the first wearable device. Describe the second key and the third key; or,

所述发送单元404,还用于分别向与所述第一终端关联的第一穿戴设备、第二穿戴设备发送秘钥获取指令,所述接收单元,还用于接收所述第一穿戴设备发送的所述第二秘钥,以及接收所述第二穿戴设备发送的所述第三秘钥。The sending unit 404 is further configured to send a key acquisition instruction to the first wearable device and the second wearable device that are associated with the first terminal, where the receiving unit is further configured to receive the first wearable device to send The second key, and the third key sent by the second wearable device.

可选的,图5所示的数据传输装置400还可以包括:Optionally, the data transmission device 400 shown in FIG. 5 may further include:

获取单元407,用于在所述所述接收单元401接收用于指示将目标数据传输至第二终端的数据传输指令之后,获取所述第二终端的设备标识;The obtaining unit 407 is configured to acquire, after the receiving unit 401 receives a data transmission instruction for transmitting target data to the second terminal, acquiring a device identifier of the second terminal;

所述发送单元404,还用于将所述第二终端的设备标识发送给与所述第一终端关联的第三穿戴设备,以触发所述第三穿戴设备对所述第二终端进行验证;The sending unit 404 is further configured to send the device identifier of the second terminal to the third wearable device that is associated with the first terminal, to trigger the third wearable device to perform verification on the second terminal.

所述第一确定单元402,具体用于在所述接收单元401接收到所述第三穿戴设备发送的用于指示所述第二终端的身份合法的指示信息的情况下,确定所述目标数据的重要程度值。The first determining unit 402 is specifically configured to: when the receiving unit 401 receives the indication information that is sent by the third wearable device to indicate that the second terminal is legal, the target data is determined. The importance value.

作为一种可选的实施方式,数据传输装置400还可以包括:As an optional implementation manner, the data transmission device 400 may further include:

标识获取单元,用于获取所述第二终端的设备标识;An identifier obtaining unit, configured to acquire a device identifier of the second terminal;

标识发送单元,用于将所述第二终端的设备标识发送给服务器,以触发所述服务器对所述第二终端进行验证;An identifier sending unit, configured to send the device identifier of the second terminal to the server, to trigger the server to verify the second terminal;

执行单元,用于在接收到所述服务器发送的用于指示所述第二终端的身份合法的指示信息的情况下,所述第一终端执行所述第一终端确定所述目标数据的重要程度值的步骤。An execution unit, configured to: when receiving, by the server, indication information indicating that the identity of the second terminal is legal, the first terminal performing, determining, by the first terminal, the importance of the target data The step of the value.

存储空间获取单元,用于获取第二终端的剩余存储空间;a storage space obtaining unit, configured to acquire a remaining storage space of the second terminal;

数据压缩单元,用于所述目标数据所占存储空间大于所述剩余存储空间的情况下,对所述目标数据进行压缩处理,以使得所述压缩后的目标数据所占存储空间小于所述剩余存储空间;a data compression unit, configured to perform compression processing on the target data when the storage space occupied by the target data is larger than the remaining storage space, so that the storage space occupied by the compressed target data is smaller than the remaining storage;

所述加密单元403,具体用于对所述压缩后的目标数据进行加密。The encryption unit 403 is specifically configured to encrypt the compressed target data.

本发明实施例中,拆分单元406、获取单元407、执行单元、数据压缩单元也可以集成到处理器中实现;标识获取单元、标识发送单元、存储空间获取 单元可以为射频芯片或WiFi模组。In the embodiment of the present invention, the splitting unit 406, the obtaining unit 407, the executing unit, and the data compressing unit may also be integrated into the processor, and the identifier acquiring unit, the identifier sending unit, and the storage space are obtained. The unit can be a radio frequency chip or a WiFi module.

在图4~图5所描述的数据传输装置400中,第一终端在向第二终端发送目标数据之前,第一终端可以先确定目标数据的重要程度值,在确定目标数据比较重要的情况下,对目标数据进行加密处理之后再发送给第二终端,从而可以避免重要数据的泄露,提高数据传输的安全性。In the data transmission device 400 described in FIG. 4 to FIG. 5, before the first terminal transmits the target data to the second terminal, the first terminal may first determine the importance level value of the target data, in the case where it is determined that the target data is important. The target data is encrypted and then sent to the second terminal, thereby avoiding leakage of important data and improving the security of data transmission.

请参见图6,图6是本发明实施例公开的一种终端的结构示意图,其中,该终端可以用于执行图2~图3所描述的数据传输方法的部分或全部步骤,具体请参照图2~图3的描述,在此不再赘述。其中,图6所示的终端600可以包括:至少一个处理器601、存储器602、收发信机603和天线604,其中,收发信机603中可以包括接收器6031和发送器6032,分别用于接收信号和发送信号。存储器602用于存储指令,处理器601用于执行存储器602存储的指令,并控制发送器6032发送信号。其中,处理器601、存储器602和收发信机603可以通过一个或多个芯片实现。例如,处理器601、存储器602和收发信机603可以完全集成在一个或多个芯片中,或者处理器601和收发信机603可以集成在一个芯片中而存储器602集成在另一个芯片中,具体形式此处不做限定。其中,Referring to FIG. 6, FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention, where the terminal may be used to perform some or all of the steps of the data transmission method described in FIG. 2 to FIG. 2 to 3, the description will not be repeated here. The terminal 600 shown in FIG. 6 may include: at least one processor 601, a memory 602, a transceiver 603, and an antenna 604. The transceiver 603 may include a receiver 6031 and a transmitter 6032 for receiving, respectively. Signal and send signal. The memory 602 is for storing instructions, the processor 601 is for executing instructions stored by the memory 602, and controls the transmitter 6032 to transmit signals. The processor 601, the memory 602, and the transceiver 603 can be implemented by one or more chips. For example, the processor 601, the memory 602, and the transceiver 603 may be fully integrated in one or more chips, or the processor 601 and the transceiver 603 may be integrated in one chip and the memory 602 integrated in another chip, specifically The form is not limited here. among them,

存储器602可以是高速RAM存储器,也可以是非易失性的存储器(non-volatile memory)。本领域技术人员可以理解,图6中示出的终端600的结构并不构成对本发明的限定,它既可以是总线形结构,也可以是星型结构,还可以包括比图6所示的更多或更少的部件,或者组合某些部件,或者不同的部件布置。比如:还可以包括射频(Radio Frequency,RF)电路、显示单元、传感器、音频电路、无线保真(wireless fidelity,WiFi)模块及电源等。The memory 602 may be a high speed RAM memory or a non-volatile memory. It will be understood by those skilled in the art that the structure of the terminal 600 shown in FIG. 6 does not constitute a limitation of the present invention, and it may be a bus-shaped structure or a star-shaped structure, and may further include more than that shown in FIG. 6. More or less parts, or some parts, or different parts. For example, it may also include a radio frequency (RF) circuit, a display unit, a sensor, an audio circuit, a wireless fidelity (WiFi) module, and a power supply.

其中,处理器601为终端600的控制中心,可以是中央处理器(Central Processing Unit,CPU),处理器601利用各种接口和线路连接整个终端600的各个部分,通过运行或执行存储在存储器602内的软件程序和/或模块,以及调用存储在存储器602内存储的程序代码,用于执行以下操作:The processor 601 is a control center of the terminal 600, and may be a central processing unit (CPU). The processor 601 connects various parts of the entire terminal 600 by using various interfaces and lines, and is stored in the memory 602 by running or executing. Software programs and/or modules within, as well as calling program code stored in memory 602 for performing the following operations:

通过接收器6031接收用于指示将目标数据传输至第二终端的数据传输指令; Receiving, by the receiver 6031, a data transmission instruction for instructing transmission of the target data to the second terminal;

确定所述目标数据的重要程度值;Determining an importance value of the target data;

在所述目标数据的重要程度值大于预设阈值的情况下,使用秘钥对所述目标数据进行加密,获得加密数据;And in a case that the importance degree value of the target data is greater than a preset threshold, encrypting the target data by using a secret key to obtain encrypted data;

通过发送器6032将所述加密数据发送至所述第二终端,以响应所述数据传输指令。The encrypted data is transmitted to the second terminal by the transmitter 6032 in response to the data transfer instruction.

作为一种可选的实施方式,在所述目标数据的重要程度值大于预设阈值的情况下,所述处理器601还可以调用存储在存储器602内存储的程序代码,用于执行以下操作:As an optional implementation manner, in a case where the importance level value of the target data is greater than a preset threshold, the processor 601 may further invoke program code stored in the memory 602 for performing the following operations:

确定所述目标数据所占的存储空间;Determining a storage space occupied by the target data;

在所述目标数据所占的存储空间大于预设空间阈值的情况下,将所述目标数据拆分成第一数据和第二数据;Dissolving the target data into the first data and the second data if the storage space occupied by the target data is greater than a preset space threshold;

所述处理器601使用秘钥对所述目标数据进行加密,获得加密数据包括:The processor 601 encrypts the target data by using a secret key, and obtaining the encrypted data includes:

使用秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据;Separating the first data and the second data by using a secret key to obtain first encrypted data and second encrypted data;

所述处理器601通过发送器6032将所述加密数据发送至所述第二终端包括:The sending, by the processor 601, the encrypted data to the second terminal by using the transmitter 6032 includes:

所述处理器601通过发送器6032分两次将所述第一加密数据和所述第二加密数据发送至所述第二终端。The processor 601 sends the first encrypted data and the second encrypted data to the second terminal twice by the transmitter 6032.

作为一种可选的实施方式,所述处理器601使用秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据包括:As an optional implementation manner, the processor 601 encrypts the first data and the second data by using a secret key, and obtaining the first encrypted data and the second encrypted data includes:

所述处理器601使用第一秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据;或,The processor 601 encrypts the first data and the second data respectively by using a first key to obtain first encrypted data and second encrypted data; or

所述处理器601使用第二秘钥对所述第一数据进行加密,获得第一加密数据,以及所述第一终端使用第三秘钥对所述第二数据进行加密,获得第二加密数据。The processor 601 encrypts the first data by using a second key to obtain first encrypted data, and the first terminal encrypts the second data by using a third key to obtain second encrypted data. .

作为一种可选的实施方式,所述处理器601还可以调用存储在存储器602内存储的程序代码,用于执行以下操作:As an optional implementation manner, the processor 601 may also call program code stored in the memory 602 for performing the following operations:

所述处理器601通过发送器6032向与所述第一终端关联的第一穿戴设备发送秘钥获取指令,以及通过接收器6031接收所述第一穿戴设备发送的所述 第二秘钥和所述第三秘钥;或,The processor 601 sends a key acquisition instruction to the first wearable device associated with the first terminal by using the transmitter 6032, and receives the identifier sent by the first wearable device by the receiver 6031. a second key and the third key; or,

所述处理器601通过发送器6032分别向与所述第一终端关联的第一穿戴设备、第二穿戴设备发送秘钥获取指令,通过接收器6031接收所述第一穿戴设备发送的所述第二秘钥,以及通过接收器6031接收所述第二穿戴设备发送的所述第三秘钥。The processor 601 sends a key acquisition instruction to the first wearable device and the second wearable device associated with the first terminal by the transmitter 6032, and receives the first message sent by the first wearable device by the receiver 6031. And acquiring, by the receiver 6031, the third key sent by the second wearable device.

作为一种可选的实施方式,所述处理器601通过接收器6031接收用于指示将目标数据传输至第二终端的数据传输指令之后,所述处理器601还可以调用存储在存储器602内存储的程序代码,用于执行以下操作:As an optional implementation manner, after the processor 601 receives the data transmission instruction for indicating the transmission of the target data to the second terminal by the receiver 6031, the processor 601 may also be stored and stored in the memory 602. Program code for doing the following:

所述处理器601获取所述第二终端的设备标识;The processor 601 acquires a device identifier of the second terminal;

所述处理器601通过发送器6032将所述第二终端的设备标识发送给与所述第一终端关联的第三穿戴设备,以触发所述第三穿戴设备对所述第二终端进行验证;The processor 601 sends the device identifier of the second terminal to the third wearable device associated with the first terminal by using the transmitter 6032 to trigger the third wearable device to perform verification on the second terminal.

在接收器6031接收到所述第三穿戴设备发送的用于指示所述第二终端的身份合法的指示信息的情况下,所述处理器601执行所述第一终端确定所述目标数据的重要程度值的步骤。In a case where the receiver 6031 receives the indication information sent by the third wearable device for indicating the identity of the second terminal, the processor 601 performs the first terminal to determine the importance of the target data. The step of the degree value.

作为一种可选的实施方式,所述处理器601确定所述目标数据的重要程度值包括:As an optional implementation manner, the determining, by the processor 601, the importance value of the target data includes:

所述处理器601获取在预设时间内所述目标数据的历史使用参数,所述历史使用参数包括以下中的一个或多个:使用时间、使用次数以及使用频率;The processor 601 acquires historical usage parameters of the target data in a preset time, and the historical usage parameters include one or more of the following: usage time, usage times, and usage frequency;

所述处理器601将所述历史使用参数进行加权计算,获得所述目标数据的重要程度值。The processor 601 performs weighting calculation on the historical usage parameter to obtain an importance degree value of the target data.

在图6所描述的终端600中,第一终端在向第二终端发送目标数据之前,第一终端可以先确定目标数据的重要程度值,在确定目标数据比较重要的情况下,对目标数据进行加密处理之后再发送给第二终端,从而可以避免重要数据的泄露,提高数据传输的安全性。In the terminal 600 described in FIG. 6, before the first terminal sends the target data to the second terminal, the first terminal may first determine the importance level value of the target data, and if the target data is determined to be important, perform the target data. After the encryption process is sent to the second terminal, the leakage of important data can be avoided, and the security of data transmission is improved.

本发明实施例还提供一种计算机存储介质,其中,该计算机存储介质存储用于电子数据交换的计算机程序,该计算机程序使得计算机执行如上述方法实施例中记载的任一方法的部分或全部步骤,所述计算机包括终端。The embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, the computer program causing the computer to perform some or all of the steps of any of the methods described in the foregoing method embodiments. The computer includes a terminal.

本发明实施例还提供一种计算机程序产品,所述计算机程序产品包括存储 了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如上述方法实施例中记载的任一方法的部分或全部步骤。该计算机程序产品可以为一个软件安装包,所述计算机包括终端。Embodiments of the present invention also provide a computer program product, the computer program product including storage A non-transitory computer readable storage medium for a computer program operative to cause a computer to perform some or all of the steps of any of the methods described in the above method embodiments. The computer program product can be a software installation package, the computer including a terminal.

需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。It should be noted that, for the foregoing method embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should understand that the present invention is not limited by the described action sequence. Because certain steps may be performed in other sequences or concurrently in accordance with the present invention. In addition, those skilled in the art should also understand that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.

在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.

在本申请所提供的几个实施例中,应该理解到,所揭露的装置,可通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided herein, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.

另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储器中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器 中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储器包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。The integrated unit, if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a memory. A number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods of the various embodiments of the present invention. The foregoing memory includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes.

本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储器中,存储器可以包括:闪存盘、只读存储器(英文:Read-Only Memory,简称:ROM)、随机存取器(英文:Random Access Memory,简称:RAM)、磁盘或光盘等。A person skilled in the art can understand that all or part of the steps of the foregoing embodiments can be completed by a program to instruct related hardware, and the program can be stored in a computer readable memory, and the memory can include: a flash drive , read-only memory (English: Read-Only Memory, referred to as: ROM), random accessor (English: Random Access Memory, referred to as: RAM), disk or CD.

以上对本发明实施例进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上上述,本说明书内容不应理解为对本发明的限制。 The embodiments of the present invention have been described in detail above, and the principles and implementations of the present invention are described in detail herein. The description of the above embodiments is only for helping to understand the method of the present invention and its core ideas; The present invention is not limited by the scope of the present invention, and the present invention is not limited by the scope of the present invention.

Claims (20)

一种数据传输方法,其特征在于,包括:A data transmission method, comprising: 第一终端接收用于指示将目标数据传输至第二终端的数据传输指令;Receiving, by the first terminal, a data transmission instruction for transmitting the target data to the second terminal; 所述第一终端确定所述目标数据的重要程度值;Determining, by the first terminal, an importance level value of the target data; 在所述目标数据的重要程度值大于预设阈值的情况下,所述第一终端使用秘钥对所述目标数据进行加密,获得加密数据;In a case that the importance level value of the target data is greater than a preset threshold, the first terminal encrypts the target data by using a secret key to obtain encrypted data; 所述第一终端将所述加密数据发送至所述第二终端,以响应所述数据传输指令。The first terminal transmits the encrypted data to the second terminal in response to the data transmission instruction. 根据权利要求1所述的方法,其特征在于,在所述目标数据的重要程度值大于预设阈值的情况下,所述方法还包括:The method according to claim 1, wherein in the case that the importance level value of the target data is greater than a preset threshold, the method further includes: 所述第一终端确定所述目标数据所占的存储空间;Determining, by the first terminal, a storage space occupied by the target data; 在所述目标数据所占的存储空间大于预设空间阈值的情况下,所述第一终端将所述目标数据拆分成第一数据和第二数据;The first terminal splits the target data into the first data and the second data, where the storage space occupied by the target data is greater than a preset space threshold; 所述第一终端使用秘钥对所述目标数据进行加密,获得加密数据包括:The first terminal encrypts the target data by using a secret key, and obtaining the encrypted data includes: 所述第一终端使用秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据;The first terminal encrypts the first data and the second data by using a secret key to obtain first encrypted data and second encrypted data; 所述第一终端将所述加密数据发送至所述第二终端包括:The sending, by the first terminal, the encrypted data to the second terminal includes: 所述第一终端分两次将所述第一加密数据和所述第二加密数据发送至所述第二终端。The first terminal sends the first encrypted data and the second encrypted data to the second terminal twice. 根据权利要求2所述的方法,其特征在于,所述第一终端使用秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据包括:The method according to claim 2, wherein the first terminal encrypts the first data and the second data respectively by using a secret key, and obtaining the first encrypted data and the second encrypted data comprises: 所述第一终端使用第一秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据;或,The first terminal encrypts the first data and the second data by using a first key to obtain first encrypted data and second encrypted data; or 所述第一终端使用第二秘钥对所述第一数据进行加密,获得第一加密数据,以及所述第一终端使用第三秘钥对所述第二数据进行加密,获得第二加密 数据。The first terminal encrypts the first data by using a second key to obtain first encrypted data, and the first terminal encrypts the second data by using a third key to obtain a second encryption. data. 根据权利要求3所述的方法,其特征在于,所述方法还包括:The method of claim 3, wherein the method further comprises: 所述第一终端向与所述第一终端关联的第一穿戴设备发送秘钥获取指令,以及接收所述第一穿戴设备发送的所述第二秘钥和所述第三秘钥;或,The first terminal sends a key acquisition instruction to the first wearable device associated with the first terminal, and receives the second key and the third key sent by the first wearable device; or 所述第一终端分别向与所述第一终端关联的第一穿戴设备、第二穿戴设备发送秘钥获取指令,接收所述第一穿戴设备发送的所述第二秘钥,以及接收所述第二穿戴设备发送的所述第三秘钥。The first terminal sends a key acquisition instruction to the first wearable device and the second wearable device associated with the first terminal, receives the second key sent by the first wearable device, and receives the The third key sent by the second wearable device. 根据权利要求1~4任一项所述的方法,其特征在于,所述第一终端接收用于指示将目标数据传输至第二终端的数据传输指令之后,所述方法还包括:The method according to any one of claims 1 to 4, wherein after the first terminal receives a data transmission instruction for instructing to transmit the target data to the second terminal, the method further includes: 所述第一终端获取所述第二终端的设备标识;Obtaining, by the first terminal, a device identifier of the second terminal; 所述第一终端将所述第二终端的设备标识发送给与所述第一终端关联的第三穿戴设备,以触发所述第三穿戴设备对所述第二终端进行验证;Sending, by the first terminal, the device identifier of the second terminal to the third wearable device associated with the first terminal, to trigger the third wearable device to perform verification on the second terminal; 在接收到所述第三穿戴设备发送的用于指示所述第二终端的身份合法的指示信息的情况下,所述第一终端执行所述第一终端确定所述目标数据的重要程度值的步骤。Receiving, by the third wearable device, indication information indicating that the identity of the second terminal is legal, the first terminal performing, by the first terminal, determining an importance degree value of the target data. step. 根据权利要求1~4任一项所述的方法,其特征在于,所述第一终端确定所述目标数据的重要程度值包括:The method according to any one of claims 1 to 4, wherein the determining, by the first terminal, the importance value of the target data comprises: 所述第一终端获取在预设时间内所述目标数据的历史使用参数,所述历史使用参数包括以下中的一个或多个:使用时间、使用次数以及使用频率;The first terminal acquires historical usage parameters of the target data in a preset time, and the historical usage parameters include one or more of the following: usage time, usage times, and usage frequency; 所述第一终端将所述历史使用参数进行加权计算,获得所述目标数据的重要程度值。The first terminal performs weighting calculation on the historical usage parameter to obtain an importance degree value of the target data. 根据权利要求1~4任一项所述的方法,其特征在于,所述第一终端接收用于指示将目标数据传输至第二终端的数据传输指令之后,所述方法还包括:The method according to any one of claims 1 to 4, wherein after the first terminal receives a data transmission instruction for instructing to transmit the target data to the second terminal, the method further includes: 所述第一终端获取所述第二终端的设备标识; Obtaining, by the first terminal, a device identifier of the second terminal; 所述第一终端将所述第二终端的设备标识发送给服务器,以触发所述服务器对所述第二终端进行验证;Sending, by the first terminal, the device identifier of the second terminal to the server, to trigger the server to perform verification on the second terminal; 在接收到所述服务器发送的用于指示所述第二终端的身份合法的指示信息的情况下,所述第一终端执行所述第一终端确定所述目标数据的重要程度值的步骤。And in the case that the indication information sent by the server for indicating the identity of the second terminal is legal, the first terminal performs the step of determining, by the first terminal, the importance level value of the target data. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising: 获取第二终端的剩余存储空间;Obtaining a remaining storage space of the second terminal; 所述目标数据所占存储空间大于所述剩余存储空间的情况下,对所述目标数据进行压缩处理,以使得所述压缩后的目标数据所占存储空间小于所述剩余存储空间;If the storage space occupied by the target data is larger than the remaining storage space, compress the target data, so that the storage space occupied by the compressed target data is smaller than the remaining storage space; 所述第一终端使用秘钥对所述目标数据进行加密,包括:The first terminal encrypts the target data by using a secret key, including: 对所述压缩后的目标数据进行加密。The compressed target data is encrypted. 根据权利要求4所述的方法,其特征在于,所述方法还包括:The method of claim 4, wherein the method further comprises: 指示所述第一穿戴设备将所述第二密钥和所述第三密钥发送给所述第二终端以进行数据解码;或,Instructing the first wearable device to send the second key and the third key to the second terminal for data decoding; or 指示所述第一穿戴设备将所述第二密钥发送给所述第二终端以进行数据解码,并指示所述第二穿戴设备将所述第三密钥发送给所述第二终端以进行数据解码。Instructing the first wearable device to send the second key to the second terminal for data decoding, and instructing the second wearable device to send the third key to the second terminal for performing Data decoding. 一种数据传输装置,其特征在于,包括:A data transmission device, comprising: 接收单元,用于接收用于指示将目标数据传输至第二终端的数据传输指令;a receiving unit, configured to receive a data transmission instruction for instructing to transmit the target data to the second terminal; 第一确定单元,用于确定所述目标数据的重要程度值;a first determining unit, configured to determine an importance level value of the target data; 加密单元,用于在所述目标数据的重要程度值大于预设阈值的情况下,使用秘钥对所述目标数据进行加密,获得加密数据;An encryption unit, configured to encrypt the target data by using a secret key to obtain encrypted data, if the importance level value of the target data is greater than a preset threshold; 发送单元,用于将所述加密数据发送至所述第二终端,以响应所述数据传输指令。And a sending unit, configured to send the encrypted data to the second terminal in response to the data transmission instruction. 根据权利要求10所述的装置,其特征在于,在所述目标数据的重要程度值大于预设阈值的情况下,所述装置还包括:The device according to claim 10, wherein, in the case that the importance level value of the target data is greater than a preset threshold, the device further comprises: 第二确定单元,用于确定所述目标数据所占的存储空间; a second determining unit, configured to determine a storage space occupied by the target data; 拆分单元,用于在所述目标数据所占的存储空间大于预设空间阈值的情况下,将所述目标数据拆分成第一数据和第二数据;a splitting unit, configured to split the target data into the first data and the second data if a storage space occupied by the target data is greater than a preset space threshold; 所述加密单元,具体用于使用秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据;The encryption unit is specifically configured to encrypt the first data and the second data by using a secret key to obtain first encrypted data and second encrypted data; 所述发送单元将所述加密数据发送至所述第二终端的方式具体为:The manner in which the sending unit sends the encrypted data to the second terminal is specifically: 分两次将所述第一加密数据和所述第二加密数据发送至所述第二终端。The first encrypted data and the second encrypted data are sent to the second terminal twice. 根据权利要求11所述的装置,其特征在于,所述加密单元使用秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据的方式具体为:The device according to claim 11, wherein the encryption unit encrypts the first data and the second data by using a secret key, and the manner of obtaining the first encrypted data and the second encrypted data is specifically : 使用第一秘钥分别对所述第一数据和所述第二数据进行加密,获得第一加密数据和第二加密数据;或,Separating the first data and the second data by using a first key to obtain first encrypted data and second encrypted data; or 使用第二秘钥对所述第一数据进行加密,获得第一加密数据,以及所述第一终端使用第三秘钥对所述第二数据进行加密,获得第二加密数据。The first data is encrypted using a second key to obtain first encrypted data, and the first terminal encrypts the second data using a third key to obtain second encrypted data. 根据权利要求12所述的装置,其特征在于,所述发送单元,还用于向与第一终端关联的第一穿戴设备发送秘钥获取指令,所述接收单元,还用于接收所述第一穿戴设备发送的所述第二秘钥和所述第三秘钥;或,The device according to claim 12, wherein the sending unit is further configured to send a key acquisition instruction to the first wearable device associated with the first terminal, where the receiving unit is further configured to receive the The second key and the third key sent by a wearable device; or 所述发送单元,还用于分别向与第一终端关联的第一穿戴设备、第二穿戴设备发送秘钥获取指令,所述接收单元,还用于接收所述第一穿戴设备发送的所述第二秘钥,以及接收所述第二穿戴设备发送的所述第三秘钥。The sending unit is further configured to send a key acquisition instruction to the first wearable device and the second wearable device that are associated with the first terminal, where the receiving unit is further configured to receive the a second key, and receiving the third key sent by the second wearable device. 根据权利要求10~13任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 10 to 13, wherein the device further comprises: 获取单元,用于在所述接收单元接收用于指示将目标数据传输至第二终端的数据传输指令之后,获取所述第二终端的设备标识;An acquiring unit, configured to acquire a device identifier of the second terminal after the receiving unit receives a data transmission instruction for indicating that the target data is transmitted to the second terminal; 所述发送单元,还用于将所述第二终端的设备标识发送给与所述第一终端关联的第三穿戴设备,以触发所述第三穿戴设备对所述第二终端进行验证;The sending unit is further configured to send the device identifier of the second terminal to the third wearable device that is associated with the first terminal, to trigger the third wearable device to perform verification on the second terminal; 所述第一确定单元,具体用于在所述接收单元接收到所述第三穿戴设备发 送的用于指示所述第二终端的身份合法的指示信息的情况下,确定所述目标数据的重要程度值。The first determining unit is specifically configured to receive, by the receiving unit, the third wearable device In the case of the indication information indicating that the identity of the second terminal is legal, the importance level value of the target data is determined. 根据权利要求10~13任一项所述的装置,其特征在于,所述第一确定单元确定所述目标数据的重要程度值的方式具体为:The device according to any one of claims 10 to 13, wherein the manner in which the first determining unit determines the importance level value of the target data is specifically: 获取在预设时间内所述目标数据的历史使用参数,所述历史使用参数包括以下中的一个或多个:使用时间、使用次数以及使用频率;Obtaining historical usage parameters of the target data in a preset time, the historical usage parameters including one or more of the following: usage time, usage times, and usage frequency; 将所述历史使用参数进行加权计算,获得所述目标数据的重要程度值。The historical usage parameter is weighted to obtain an importance value of the target data. 根据权利要求10~13任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 10 to 13, wherein the device further comprises: 标识获取单元,用于获取所述第二终端的设备标识;An identifier obtaining unit, configured to acquire a device identifier of the second terminal; 标识发送单元,用于将所述第二终端的设备标识发送给服务器,以触发所述服务器对所述第二终端进行验证;An identifier sending unit, configured to send the device identifier of the second terminal to the server, to trigger the server to verify the second terminal; 执行单元,用于在接收到所述服务器发送的用于指示所述第二终端的身份合法的指示信息的情况下,所述第一终端执行所述第一终端确定所述目标数据的重要程度值的步骤。An execution unit, configured to: when receiving, by the server, indication information indicating that the identity of the second terminal is legal, the first terminal performing, determining, by the first terminal, the importance of the target data The step of the value. 根据权利要求10所述的装置,其特征在于,所述装置还包括:The device according to claim 10, wherein the device further comprises: 存储空间获取单元,用于获取第二终端的剩余存储空间;a storage space obtaining unit, configured to acquire a remaining storage space of the second terminal; 数据压缩单元,用于所述目标数据所占存储空间大于所述剩余存储空间的情况下,对所述目标数据进行压缩处理,以使得所述压缩后的目标数据所占存储空间小于所述剩余存储空间;a data compression unit, configured to perform compression processing on the target data when the storage space occupied by the target data is larger than the remaining storage space, so that the storage space occupied by the compressed target data is smaller than the remaining storage; 所述加密单元,具体用于对所述压缩后的目标数据进行加密。The encryption unit is specifically configured to encrypt the compressed target data. 一种终端,其特征在于,包括处理器和存储器,其中,所述处理器与所述存储器连接,所述存储器中存储有程序代码,所述处理器用于调用所述存储器中存储的程序代码,执行权利要求1~9中任意一项所述的方法。A terminal, comprising: a processor and a memory, wherein the processor is connected to the memory, wherein the memory stores program code, and the processor is configured to invoke program code stored in the memory, The method of any one of claims 1 to 9. 一种计算机可读存储介质,其特征在于,其存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如权利要求1~9任一项所述的方法。 A computer readable storage medium storing a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method of any one of claims 1 to 9. 一种计算机程序产品,其特征在于,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如权利要求1~9任一项所述的方法。 A computer program product, comprising: a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a computer to perform the method of any one of claims 1-9 The method described.
PCT/CN2017/092487 2016-09-14 2017-07-11 Data transmission method and apparatus, and terminal Ceased WO2018049892A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610828089.X 2016-09-14
CN201610828089.XA CN106411865A (en) 2016-09-14 2016-09-14 A data transmission method, device and terminal

Publications (1)

Publication Number Publication Date
WO2018049892A1 true WO2018049892A1 (en) 2018-03-22

Family

ID=57996587

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/092487 Ceased WO2018049892A1 (en) 2016-09-14 2017-07-11 Data transmission method and apparatus, and terminal

Country Status (2)

Country Link
CN (1) CN106411865A (en)
WO (1) WO2018049892A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635041A (en) * 2018-12-04 2019-04-16 山东中创软件商用中间件股份有限公司 Data transmission method, device, equipment and medium based on Sqoop tool
CN113268378A (en) * 2021-05-18 2021-08-17 Oppo广东移动通信有限公司 Data disaster tolerance method and device, storage medium and electronic equipment
CN116389138A (en) * 2023-04-07 2023-07-04 深圳市众志天成科技有限公司 An information security protection method and device based on data transmission
CN117354068A (en) * 2023-12-06 2024-01-05 国网浙江省电力有限公司金华供电公司 Method and system for improving communication security of distributed energy management systems

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411865A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 A data transmission method, device and terminal
CN109040078B (en) * 2018-08-09 2021-01-05 郑州市景安网络科技股份有限公司 Method, device and equipment for reporting IP address and readable storage medium
CN109495265B (en) * 2018-12-06 2021-07-23 江苏中威科技软件系统有限公司 Network data transmission method, communication terminal, and computer-readable storage medium
CN116074845B (en) * 2023-04-06 2023-06-13 中诚华隆计算机技术有限公司 Data security transmission method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102412967A (en) * 2011-09-29 2012-04-11 用友软件股份有限公司 Data transmission system and method
CN103548300A (en) * 2011-07-25 2014-01-29 三菱电机株式会社 Encryption device, encryption method and encryption program
WO2014132643A1 (en) * 2013-02-26 2014-09-04 京セラ株式会社 Transmitting device and transmitting method
CN104244237A (en) * 2014-09-12 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
CN104700270A (en) * 2015-03-20 2015-06-10 酷派软件技术(深圳)有限公司 Payment request processing method, payment request processing device and terminal
CN106411865A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 A data transmission method, device and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9232413B2 (en) * 2013-05-02 2016-01-05 United States Cellular Corporation Maintaining high signal quality in mobile wireless networks using signal relative importance values
EP2843886A1 (en) * 2013-08-30 2015-03-04 TELEFONAKTIEBOLAGET LM ERICSSON (publ) Load balancing among alternative paths

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103548300A (en) * 2011-07-25 2014-01-29 三菱电机株式会社 Encryption device, encryption method and encryption program
CN102412967A (en) * 2011-09-29 2012-04-11 用友软件股份有限公司 Data transmission system and method
WO2014132643A1 (en) * 2013-02-26 2014-09-04 京セラ株式会社 Transmitting device and transmitting method
CN104244237A (en) * 2014-09-12 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
CN104700270A (en) * 2015-03-20 2015-06-10 酷派软件技术(深圳)有限公司 Payment request processing method, payment request processing device and terminal
CN106411865A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 A data transmission method, device and terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635041A (en) * 2018-12-04 2019-04-16 山东中创软件商用中间件股份有限公司 Data transmission method, device, equipment and medium based on Sqoop tool
CN113268378A (en) * 2021-05-18 2021-08-17 Oppo广东移动通信有限公司 Data disaster tolerance method and device, storage medium and electronic equipment
CN116389138A (en) * 2023-04-07 2023-07-04 深圳市众志天成科技有限公司 An information security protection method and device based on data transmission
CN116389138B (en) * 2023-04-07 2023-11-24 深圳市众志天成科技有限公司 Information security protection method and device based on data transmission
CN117354068A (en) * 2023-12-06 2024-01-05 国网浙江省电力有限公司金华供电公司 Method and system for improving communication security of distributed energy management systems
CN117354068B (en) * 2023-12-06 2024-03-01 国网浙江省电力有限公司金华供电公司 Method and system for improving communication security of distributed energy management systems

Also Published As

Publication number Publication date
CN106411865A (en) 2017-02-15

Similar Documents

Publication Publication Date Title
WO2018049892A1 (en) Data transmission method and apparatus, and terminal
US11864263B2 (en) Wireless connection establishing methods and wireless connection establishing apparatuses
CN105141568B (en) Secured communication channel method for building up and system, client and server
US20170086233A1 (en) Connection method for multimedia playing device, main device, and control terminal
US10419280B2 (en) Methods and apparatus for switching between a wired communication and a wireless communication
CN104584490B (en) Data transmission method for uplink and device
CN106331372B (en) Data transmission method and mobile terminal
EP3192290B1 (en) Communication between devices without establishing a persistent connection
CN105516897A (en) Method and device for one-key establishment of communication connection between Bluetooth devices
CN102932786A (en) Information transmission method and terminal
CN105792179A (en) A data processing method, device and terminal
JP2024515008A (en) Electronic device and method for installing an embedded subscriber identity module profile in an electronic device - Patents.com
CN111788836A (en) Data transmission method and BLE equipment
CN104333911A (en) Network connection setting method of multimedia player and related computer system
CN114697058B (en) An identity authentication method, electronic device, and computer-readable storage medium
CN111245585B (en) Information sending method and device and parameter determining method and device
KR20190088820A (en) Method and electronic device for controlling data communication
CN105959952A (en) Network security access method and device
CN107172718B (en) Information processing method and electronic equipment
CN113596827B (en) Key generation method, device, electronic equipment and storage medium
CN112866995B (en) Connection method, device, electronic equipment and storage medium
CN114637627B (en) Data recovery method and system
JP2020529089A5 (en)
CN117332398A (en) Methods, devices and systems for issuing device certificates
US10679604B2 (en) Method and apparatus for transmitting audio

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17850095

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17850095

Country of ref document: EP

Kind code of ref document: A1