CN105681365B - Method and apparatus for file transmission - Google Patents
Method and apparatus for file transmission Download PDFInfo
- Publication number
- CN105681365B CN105681365B CN201610245067.0A CN201610245067A CN105681365B CN 105681365 B CN105681365 B CN 105681365B CN 201610245067 A CN201610245067 A CN 201610245067A CN 105681365 B CN105681365 B CN 105681365B
- Authority
- CN
- China
- Prior art keywords
- file
- sent
- instruction
- encryption
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The disclosure is directed to a kind of method and apparatus for file transmission, are applied to terminal.The described method includes: receiving file sends instruction;Judge that the file sends whether instruction indicates the file being sent to Cloud Server;When determining that the file is sent to the Cloud Server by the file transmission instruction instruction, encryption file is sent to the Cloud Server, the encryption file is that the file of encryption generation is carried out to the initial data of the file according to the encryption information stored in the terminal.In this way, increasing the safety for the file being uploaded in Cloud Server, the risk that privacy of user is leaked from Cloud Server is reduced.
Description
Technical field
This disclosure relates to communication data area of security more particularly to a kind of method and apparatus for file transmission.
Background technique
With the popularization of intelligent terminals, and in the terminal file to be processed increases, and the memory of terminal increasingly cannot
Meet the storage demand of user.Currently, cloud service is stored by ordinary user for the backup of file more and more.With interconnection
Net is popularized, and modern society people gradually recognize the importance of personal privacy protection, and many people can worry that cloud service saves
Whether file is safe.Privacy of user leakage problem happens occasionally caused by being stolen due to cloud account.Wherein, it is related to the hidden of individual
The problem of private photo, video etc. are leaked is especially prominent.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provide it is a kind of safely and conveniently, it is for file transmission
Method and apparatus.
According to the first aspect of the embodiments of the present disclosure, a kind of method for file transmission is provided, terminal is applied to, it is described
Method includes: to receive file to send instruction;Judge that the file sends whether instruction indicates the file being sent to cloud service
Device;When determining that the file is sent to the Cloud Server by the file transmission instruction instruction, encryption file is sent to
The Cloud Server, the encryption file are according to the encryption information stored in the terminal, to the initial data of the file
Carry out the file of encryption generation.
Optionally, before the reception file sends the step of instructing, the method also includes: according in the terminal
The encryption information of storage encrypts the initial data of the file, generates the encryption file.
It is optionally, described that the initial data of the file is encrypted according to the encryption information stored in the terminal,
The step of generating the encryption file includes: generation CIPHERING REQUEST, and the CIPHERING REQUEST is for requesting user to indicate whether to institute
File is stated to be encrypted;Receive the encrypted instruction that the user response is sent in the CIPHERING REQUEST;Refer in response to the encryption
It enables, according to the encryption information stored in the terminal, the initial data of the file is encrypted, generate the encryption text
Part.
Optionally, after the reception file sends the step of instructing, the method also includes: judge the file hair
Send whether instruction indicates the file being sent to another terminal;Instruction is instructed to send out the file determining that the file is sent
When sending to another terminal, the file is sent to another terminal.
It is optionally, described when determining that the file is sent to another terminal by the file transmission instruction instruction,
The step of file is sent to another terminal includes: to send instruction instruction in the judgement file to send out the file
When sending to another terminal, the encryption file is decrypted;File after decryption is sent to another terminal.
It is optionally, described when determining that the file is sent to the Cloud Server by the file transmission instruction instruction,
The step of encryption file is sent to the Cloud Server includes: to send instruction instruction in the judgement file to send out the file
When sending to the Cloud Server, according to the encryption information stored in the terminal, the initial data of the file is encrypted,
Generate the encryption file;The encryption file is sent to the Cloud Server.
Optionally, the method also includes: receive the file that is sent by the Cloud Server;Judging the received file of institute is
No is the file generated after being encrypted according to the encryption information stored in the terminal;Determining according to received file
When the file that the encryption information generates after being encrypted, according to the encryption information, by the received file decryption of institute.
According to the second aspect of an embodiment of the present disclosure, a kind of device for file transmission is provided, terminal is applied to, it is described
Device includes: command reception module, sends instruction for receiving file;Cloud Server judgment module, for judging the file
Send whether instruction indicates the file being sent to Cloud Server;File sending module is encrypted, for determining the file
When the file is sent to the Cloud Server by transmission instruction instruction, encryption file is sent to the Cloud Server, it is described
Encrypting file is that the text of encryption generation is carried out to the initial data of the file according to the encryption information stored in the terminal
Part.
The technical scheme provided by this disclosed embodiment can include the following benefits:
When needing file being sent to Cloud Server by terminal, will be encrypted according to the encryption information stored in terminal
The encryption file of generation is sent to Cloud Server.Since encryption information is stored in the terminal, even if the encryption uploaded
File is stolen from Cloud Server, and if encryption information is not stolen from terminal, file will not be opened, this
Sample, the content in file would not also leak.The method and apparatus for file transmission that the disclosure provides, which increase, to be uploaded to
The safety of file in Cloud Server reduces the risk that privacy of user is leaked from Cloud Server.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is the flow chart of the method shown according to an exemplary embodiment for file transmission;
Fig. 2 is the flow chart of the method for file transmission shown according to another exemplary embodiment;
Fig. 3 is the flow chart shown according to an exemplary embodiment for generating encryption file;
Fig. 4 is the surface chart shown according to an exemplary embodiment for generating CIPHERING REQUEST;
Fig. 5 is the flow chart of the method for file transmission shown according to a further exemplary embodiment;
Fig. 6 is the flow chart of the method for file transmission shown according to a further exemplary embodiment;
Fig. 7 is the flow chart of the method for file transmission shown according to a further exemplary embodiment;
Fig. 8 is the flow chart of the method for file transmission shown according to a further exemplary embodiment;
Fig. 9 is the block diagram of the device shown according to an exemplary embodiment for file transmission;
Figure 10 is the block diagram of the device for file transmission shown according to another exemplary embodiment;
Figure 11 is the block diagram of encrypting module shown according to an exemplary embodiment;
Figure 12 is the block diagram of the device for file transmission shown according to a further exemplary embodiment;
Figure 13 is the block diagram of the device for file transmission shown according to a further exemplary embodiment;
Figure 14 is the block diagram of the device for file transmission shown according to a further exemplary embodiment;
Figure 15 is the block diagram of the device for file transmission shown according to a further exemplary embodiment;And
Figure 16 is the block diagram of the device shown according to an exemplary embodiment for file transmission.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is the flow chart of the method shown according to an exemplary embodiment for file transmission.The method application
In terminal, as shown in Figure 1, the described method comprises the following steps.
In step s 11, it receives file and sends instruction.
In step s 12, judge that the file sends whether instruction indicates the file being sent to Cloud Server.
In step s 13, when determining that the file is sent to the Cloud Server by the file transmission instruction instruction,
Encryption file is sent to the Cloud Server, the encryption file is according to the encryption information stored in the terminal, to institute
The initial data for stating file carries out the file of encryption generation.
Specifically, in step s 11, it is instruction terminal outwardly (for example, server or other ends that file, which sends instruction,
End) send file instruction.For example, file, which sends to instruct to be clicked by user, is used to indicate the picture that terminal will store
It is sent to after " transmission " key of another terminal, the instruction that terminal receives.The file may include the text of multiple format
Part, for example, text file, picture file and video file etc..
In step s 12, whether the read-write operation carried out to system can be judged by the progress information run in terminal
For cloud service process, whether indicate the file being sent to Cloud Server further to judge that file sends to instruct.If sentenced
It is yes for breaking, then can carry out step S13.
It can store encryption information in terminal, added for the initial data (raw data) to the file in terminal
It is close.Encryption information for example can be Encryption Algorithm and code key.Multiple Encryption Algorithm and multiple code keys are can store in terminal.Tool
Body which Encryption Algorithm therein and code key can be terminal default, can also be selected by user oneself.In step S13
In, terminal receive the file is sent to the instruction of Cloud Server when, can be sent to Cloud Server it is encrypted after it is raw
At encryption file.
According to above technical scheme, when needing file being sent to Cloud Server by terminal, will be stored according in terminal
Encryption information carry out encryption generation encryption file be sent to Cloud Server.Since encryption information is stored in the terminal,
Therefore, even if the encryption file uploaded is stolen from Cloud Server, if encryption information is not stolen from terminal, text
Part will not be opened, in this way, the content in file would not also leak.The method for file transmission that the disclosure provides increases
The safety for having added the file being uploaded in Cloud Server reduces the risk that privacy of user is leaked from Cloud Server.
In the above-described embodiments, encrypting to file can automatically carry out before receiving file and sending instruction.Fig. 2
It is the flow chart of the method for file transmission shown according to another exemplary embodiment.As shown in Fig. 2, on the basis of Fig. 1
On, before receiving the step of file sends instruction (step S11), the method can also include step S11'.
In step S11', according to the encryption information stored in the terminal, the initial data of the file is added
It is close, generate the encryption file.
It is, terminal can all be encrypted to file therein is stored in.For example, being generated with the camera in mobile phone
It when one photos, is directly encrypted, is stored again after encryption.For another example, it when receiving file from another terminal, first encrypts and deposits again
Storage.In this way, all files stored in terminal are all encryption files.User wants to open these encryption files in the terminal
When, terminal opens it again after encryption file can be decrypted automatically.In this embodiment, to all texts in terminal
Part encrypts automatically, so that can directly transmit when sending file to Cloud Server, to save transmission time, accelerate
Transmission speed.
In the embodiment of fig. 2, each file can be encrypted automatically, that is, for users encryption be can not
See.In the another embodiment of the disclosure, it can be decided whether to add according to the instruction of user after generating file
It is close.Fig. 3 is the flow chart shown according to an exemplary embodiment for generating encryption file.As shown in figure 3, according in the terminal
The step of encryption information of storage encrypts the initial data of the file, generates the encryption file (step S11')
It may comprise steps of.
In step S11'1, CIPHERING REQUEST is generated, the CIPHERING REQUEST is for requesting user to indicate whether to the file
It is encrypted.
In step S11'2, the encrypted instruction that the user response is sent in the CIPHERING REQUEST is received.
In step S11'3, in response to the encrypted instruction, according to the encryption information stored in the terminal, to described
The initial data of file is encrypted, and the encryption file is generated.
Wherein, CIPHERING REQUEST can be generated by popping up dialog box in interface.Fig. 4 is according to an exemplary embodiment
The surface chart of the generation CIPHERING REQUEST shown.User can send encrypted instruction by clicking "Yes".In this embodiment, may be used
According to the demand of user in advance to encrypt the partial document in terminal, in this way, for the file of inessential or non-privacy
It can not have to encryption, reduce the workload of terminal encryption, and embody the initiative of user.
If user wants to send file to good friend (another terminal), in order to allow good friend easily to open file,
The file not encrypted can be sent.Fig. 5 is the process of the method for file transmission shown according to a further exemplary embodiment
Figure.As shown in figure 5, on the basis of Fig. 1, after the reception file sends the step of instructing (step S11), the method
It is further comprising the steps of.
In step S12', judge that the file sends whether instruction indicates the file being sent to another terminal.
With in step S12 similarly, can by the progress information run in terminal, judge to system carry out read-write behaviour
Whether be another terminal process, come further judge file send instruction whether indicate the file being sent to another end
End.
In step S13', instruct instruction that the file is sent to another terminal determining that the file is sent
When, the file is sent to another terminal.
Terminal sends file to Cloud Server, it is believed that user backs up file using in Cloud Server.And eventually
Hold to another terminal send file when, it is believed that user wishes the information for sharing file with good friend.Therefore, in the embodiment
In, the file not encrypted currently can be sent to another terminal, shared convenient for carrying out normal information between user and good friend, and
And the transmission speed of file is unaffected.
It in the 5 embodiment of figure 5, is the file not encrypted to the file that another terminal is sent, which can be with
It is not encrypted file always, is also possible to encrypt later and decrypted file in the terminal.Fig. 6 is according to another example
Property implement exemplify for file transmission method flow chart.As shown in fig. 6, determining the text on the basis of Fig. 5
When the file is sent to another terminal by part transmission instruction instruction, the file is sent to the step of another terminal
Suddenly (step S13') may comprise steps of.
In step S13'1, instruct instruction that the file is sent to another terminal determining that the file is sent
When, the encryption file is decrypted.
In step S13'2, the file after decryption is sent to another terminal.
In this embodiment, if being sent to the file of another terminal is currently exactly encrypted state (including whole texts
Part be automatically encrypted and before by user indicate encryption two kinds of situations), then can first by the file of encrypted state be decrypted with
Afterwards, it retransmits to another terminal.In this way, another terminal can receive the file not encrypted, convenient between user and good friend into
The normal information of row is shared.
In the another embodiment of the disclosure, can receive instruction to Cloud Server send file instruction after,
The encryption to file is triggered again.Fig. 7 is the flow chart of the method for file transmission shown according to a further exemplary embodiment.
As shown in fig. 7, instructing instruction that the file is sent to the cloud service determining that the file is sent on the basis of Fig. 1
When device, the step of file is sent to the Cloud Server (step S13) will be encrypted and included the following steps.
In step S131, instruct instruction that the file is sent to the Cloud Server determining that the file is sent
When, according to the encryption information stored in the terminal, the initial data of the file is encrypted, generates the encryption text
Part.
In step S132, the encryption file is sent to the Cloud Server.
In the embodiment, all files in terminal, which can be, not to be encrypted, only when some file is instructed to send
When to Cloud Server, just this document is encrypted.Alternatively, a part of file in terminal does not encrypt, when some text
When part is instructed to be sent to Cloud Server, encrypted in the case where judging this document unencryption, then to this document.In this way,
For the file for not needing to send to Cloud Server, it can not have to be encrypted in advance, to reduce the workload of encryption, mention
The high speed of service of terminal.
In the embodiment above, what terminal was sent to Cloud Server is encryption file, if other terminals are from Cloud Server
If getting these encryption files, if not getting the encryption information stored in the terminal simultaneously, it cannot obtain
Get the content of file.When user needs to download backup file from Cloud Server, connect with the terminal for sending the encryption file
Receive these encryption files, so that it may be decrypted according to the encryption information wherein stored by file is encrypted, to obtain file content.
Fig. 8 is the flow chart of the method for file transmission shown according to a further exemplary embodiment.As shown in figure 8, in the base of Fig. 1
On plinth, the method can also include the following steps.
In step S14, the file sent by the Cloud Server is received.
In step S15, judge received file whether be to be added according to the encryption information stored in the terminal
The file generated after close.
In step s 16, determine received file be the file that generates after being encrypted according to the encryption information
When, according to the encryption information, by the received file decryption of institute.
In this embodiment, it is uploaded to the encryption file of Cloud Server by the terminal, is only got off with the terminal downloads
It could open.Other terminals, even if encryption file download is got off, can not also be opened due to not being stored with the encryption information.
Thus while using Cloud Server backup file, the safety of backup file is increased.In addition, if user replaces
The encryption information can be transferred in new terminal and store by used terminal, in order to from new terminal from cloud
In server when downloading encryption file, encryption file can be opened, the content of file is obtained.User can be by the encryption information
Access authority is arranged to higher level, to increase the safety of encryption information.
It is understood that in the embodiment above, leakage privacy is prevented by being encrypted to file.It can also lead to
The mode for obscure to file and being uploaded to Cloud Server after processing again is crossed, makes the content of file can not be from cloud service to reach
The purpose directly acquired in device.In the embodiment, it is stored in the terminal of transmitting file on Cloud Server and carries out obscuring processing
Scramble data, the terminal for only storing the scramble data can open the file through obscuring downloaded from Cloud Server.To text
Part is obscured identical as the effect encrypted.
The disclosure also provides a kind of device for file transmission, is applied to terminal.Fig. 9 is according to an exemplary embodiment
The block diagram of the device for file transmission shown.As shown in figure 9, the device 10 for file transmission includes command reception
Module 11, Cloud Server judgment module 12 and encryption file sending module 13.
Command reception module 11 sends instruction for receiving file.
Cloud Server judgment module 12 sends whether instruction indicates the file being sent to cloud for judging the file
Server.
Encryption file sending module 13 is used to be sent to the file in the judgement file transmission instruction instruction described
When Cloud Server, encryption file is sent to the Cloud Server, the encryption file is to add according to what is stored in the terminal
Confidential information carries out the file of encryption generation to the initial data of the file.
Figure 10 is the block diagram of the device for file transmission shown according to another exemplary embodiment.As shown in Figure 10,
On the basis of Fig. 9, described device 10 can also include encrypting module 14.
Encrypting module 14 is used to add the initial data of the file according to the encryption information stored in the terminal
It is close, generate the encryption file.
Figure 11 is the block diagram of encrypting module 14 shown according to an exemplary embodiment.As shown in figure 11, the encryption mould
Block 14 includes generating submodule 141, receiving submodule 142 and encryption submodule 143.
It generates submodule 141 and generates CIPHERING REQUEST, CIPHERING REQUEST is for requesting user to indicate whether to carry out the file
Encryption.
Receiving submodule 142 is for receiving the encrypted instruction that user response is sent in CIPHERING REQUEST.
Submodule 143 is encrypted to be used in response to the encrypted instruction, according to the encryption information stored in the terminal, to institute
The initial data for stating file is encrypted, and the encryption file is generated.
Figure 12 is the block diagram of the device for file transmission shown according to a further exemplary embodiment.As shown in figure 12,
On the basis of Fig. 9, described device 10 further includes terminal judgment module 15 and file sending module 16.
Terminal judgment module 15 sends whether instruction indicates the file being sent to another end for judging the file
End.
File sending module 16 is used to determine that it is described another that the file transmission instruction indicates for the file to be sent to
When terminal, the file is sent to another terminal.
Figure 13 is the block diagram of the device for file transmission shown according to a further exemplary embodiment.As shown in figure 13,
On the basis of Figure 12, the file sending module 16 may include decryption submodule 161 and the first sending submodule 162.
Decryption submodule 161, which is used to send instruction instruction in the judgement file, is sent to another end for the file
When end, the encryption file is decrypted.
First sending submodule 162 is used to the file after decryption being sent to another terminal.
Figure 14 is the block diagram of the device for file transmission shown according to a further exemplary embodiment.As shown in figure 14,
On the basis of Fig. 9, the encryption file sending module 13 includes encryption submodule 131 and the second sending submodule 132.
Encryption submodule 131, which is used to send instruction instruction in the judgement file, is sent to the cloud service for the file
When device, according to the encryption information stored in the terminal, the initial data of the file is encrypted, generates the encryption text
Part;
Second sending submodule 132 is used to the encryption file being sent to the Cloud Server.
Figure 15 is the block diagram of the device for file transmission shown according to a further exemplary embodiment.As shown in figure 15,
On the basis of Fig. 9, described device 10 can also include file reception module 17, encryption judgment module 18 and deciphering module 19.
File reception module 17 is for receiving the file sent by the Cloud Server.
Encryption judgment module 18 for judge received file whether be according to the encryption information stored in the terminal
The file generated after being encrypted.
Deciphering module 19 be used for determine received file be the text that generates after being encrypted according to the encryption information
When part, according to the encryption information, by the received file decryption of institute.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
According to above technical scheme, when needing file being sent to Cloud Server by terminal, will be stored according in terminal
Encryption information carry out encryption generation encryption file be sent to Cloud Server.Since encryption information is stored in the terminal,
Therefore, even if the encryption file uploaded is stolen from Cloud Server, if encryption information is not stolen from terminal, text
Part will not be opened, in this way, the content in file would not also leak.The device for file transmission that the disclosure provides increases
The safety for having added the file being uploaded in Cloud Server reduces the risk that privacy of user is leaked from Cloud Server.
Figure 16 is the block diagram of the device 1600 shown according to an exemplary embodiment for file transmission.For example, device
1600 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, medical treatment
Equipment, body-building equipment, personal digital assistant etc..
Referring to Fig.1 6, device 1600 may include following one or more components: processing component 1602, memory 1604,
Electric power assembly 1606, multimedia component 1608, audio component 1610, the interface 1612 of input/output (I/O), sensor module
1614 and communication component 1616.
The integrated operation of the usual control device 1600 of processing component 1602, such as with display, telephone call, data communication,
Camera operation and record operate associated operation.Processing component 1602 may include one or more processors 1620 to execute
Instruction, to complete all or part of the steps of the above-mentioned method for file transmission.In addition, processing component 1602 may include one
A or multiple modules, convenient for the interaction between processing component 1602 and other assemblies.For example, processing component 1602 may include more
Media module, to facilitate the interaction between multimedia component 1608 and processing component 1602.
Memory 1604 is configured as storing various types of data to support the operation in device 1600.These data
Example includes the instruction of any application or method for operating on device 1600, contact data, telephone book data,
Message, picture, video etc..Memory 1604 can by any kind of volatibility or non-volatile memory device or they
Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Electric power assembly 1606 provides electric power for the various assemblies of device 1600.Electric power assembly 1606 may include power management
System, one or more power supplys and other with for device 1600 generate, manage, and distribute the associated component of electric power.
Multimedia component 1608 includes the screen of one output interface of offer between described device 1600 and user.?
In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel,
Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or more touch passes
Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding is dynamic
The boundary of work, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more
Media component 1608 includes a front camera and/or rear camera.When device 1600 is in operation mode, as shot mould
When formula or video mode, front camera and/or rear camera can receive external multi-medium data.Each preposition camera shooting
Head and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 1610 is configured as output and/or input audio signal.For example, audio component 1610 includes a wheat
Gram wind (MIC), when device 1600 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt
It is configured to receive external audio signal.The received audio signal can be further stored in memory 1604 or via communication
Component 1616 is sent.In some embodiments, audio component 1610 further includes a loudspeaker, is used for output audio signal.
I/O interface 1612 provides interface, above-mentioned peripheral interface module between processing component 1602 and peripheral interface module
It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and
Locking press button.
Sensor module 1614 includes one or more sensors, and the state for providing various aspects for device 1600 is commented
Estimate.For example, sensor module 1614 can detecte the state that opens/closes of device 1600, the relative positioning of component, such as institute
The display and keypad that component is device 1600 are stated, sensor module 1614 can be with detection device 1600 or device 1,600 1
The position change of a component, the existence or non-existence that user contacts with device 1600,1600 orientation of device or acceleration/deceleration and dress
Set 1600 temperature change.Sensor module 1614 may include proximity sensor, be configured in not any physics
It is detected the presence of nearby objects when contact.Sensor module 1614 can also include optical sensor, as CMOS or ccd image are sensed
Device, for being used in imaging applications.In some embodiments, which can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1616 is configured to facilitate the communication of wired or wireless way between device 1600 and other equipment.Dress
The wireless network based on communication standard, such as WiFi can be accessed by setting 1600,2G or 3G or their combination.It is exemplary at one
In embodiment, communication component 1616 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, the communication component 1616 further includes near-field communication (NFC) module, to promote short distance
Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1600 can be by one or more application specific integrated circuit (ASIC), number
Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, above-mentioned for file transmission for executing
Method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 1604 of instruction, above-metioned instruction can be executed above-mentioned for file to complete by the processor 1620 of device 1600
The method of transmission.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM),
CD-ROM, tape, floppy disk and optical data storage devices etc..
Those skilled in the art will readily occur to other embodiment party of the disclosure after considering specification and practicing the disclosure
Case.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or adaptability
Variation follows the general principles of this disclosure and including the undocumented common knowledge or usual skill in the art of the disclosure
Art means.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following claim
It points out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
Claims (11)
1. a kind of method for file transmission, is applied to terminal, which is characterized in that the described method includes:
It receives file and sends instruction;
Judge that the file sends whether instruction indicates the file being sent to Cloud Server;
When determining that the file is sent to the Cloud Server by the file transmission instruction instruction, encryption file is sent to
The Cloud Server, the encryption file are according to the encryption information stored in the terminal, to the initial data of the file
Carry out the file of encryption generation;
After the reception file sends the step of instructing, the method also includes:
Judge that the file sends whether instruction indicates the file being sent to another terminal;
When determining that the file is sent to another terminal by the file transmission instruction instruction, the file is sent to
Another terminal;
It is described when determining that the file sends instruction instruction the file is sent to another terminal, the file is sent out
It send to the step of another terminal and includes:
When determining that the file sends instruction instruction the file is sent to another terminal, by the encryption file into
Row decryption;
File after decryption is sent to another terminal.
2. the method according to claim 1, wherein the reception file send instruct the step of before, institute
State method further include:
According to the encryption information stored in the terminal, the initial data of the file is encrypted, generates the encryption text
Part.
3. right according to the method described in claim 2, it is characterized in that, described according to the encryption information stored in the terminal
The initial data of the file is encrypted, generate the encryption file the step of include:
CIPHERING REQUEST is generated, the CIPHERING REQUEST is for requesting user to indicate whether to encrypt the file;
Receive the encrypted instruction that the user response is sent in the CIPHERING REQUEST;
The initial data of the file is carried out according to the encryption information stored in the terminal in response to the encrypted instruction
Encryption, generates the encryption file.
4. the method according to claim 1, wherein described determining that the file transmission instruction instruction will be described
When file is sent to the Cloud Server, will encrypt the step of file is sent to the Cloud Server includes:
When determining that the file is sent to the Cloud Server by the file transmission instruction instruction, deposited according in the terminal
The encryption information of storage encrypts the initial data of the file, generates the encryption file;
The encryption file is sent to the Cloud Server.
5. method described in any claim in -4 according to claim 1, which is characterized in that the method also includes:
Receive the file sent by the Cloud Server;
Judge received file whether be the file generated after being encrypted according to the encryption information stored in the terminal;
Determine the received file of institute for generate after being encrypted according to the encryption information file when, according to encryption letter
Breath, by the received file decryption of institute.
6. a kind of device for file transmission, is applied to terminal, which is characterized in that described device includes:
Command reception module sends instruction for receiving file;
Cloud Server judgment module, for judging that the file sends whether instruction indicates the file being sent to cloud service
Device;
File sending module is encrypted, the file is sent to the cloud service for sending instruction instruction in the judgement file
When device, encryption file is sent to the Cloud Server, the encryption file for according to the encryption information stored in the terminal,
The file of encryption generation is carried out to the initial data of the file;
Described device further include:
Terminal judgment module, for judging that the file sends whether instruction indicates the file being sent to another terminal;
The file is sent to another terminal for sending instruction instruction in the judgement file by file sending module
When, the file is sent to another terminal;
The file sending module includes:
Submodule is decrypted, for when determining that the file sends instruction instruction the file is sent to another terminal,
The encryption file is decrypted;
First sending submodule, for the file after decryption to be sent to another terminal.
7. device according to claim 6, which is characterized in that described device further include:
Encrypting module, it is raw for being encrypted to the initial data of the file according to the encryption information stored in the terminal
At the encryption file.
8. device according to claim 7, which is characterized in that the encrypting module includes:
Submodule is generated, generates CIPHERING REQUEST, the CIPHERING REQUEST is for requesting user to indicate whether to add the file
It is close;
Receiving submodule, the encrypted instruction sent for receiving the user response in the CIPHERING REQUEST;
Submodule is encrypted, is used in response to the encrypted instruction, according to the encryption information stored in the terminal, to the file
Initial data encrypted, generate the encryption file.
9. device according to claim 6, which is characterized in that the encryption file sending module includes:
Submodule is encrypted, for when determining that the file sends instruction instruction the file is sent to the Cloud Server,
According to the encryption information stored in the terminal, the initial data of the file is encrypted, generates the encryption file;
Second sending submodule, for the encryption file to be sent to the Cloud Server.
10. according to device described in any claim in claim 6-9, which is characterized in that described device further include:
File reception module, for receiving the file sent by the Cloud Server;
Judgment module is encrypted, whether received file is to be added according to the encryption information stored in the terminal for judging
The file generated after close;
Deciphering module, for determine received file for generate after being encrypted according to the encryption information file when,
According to the encryption information, by the received file decryption of institute.
11. a kind of device for file transmission, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
It receives file and sends instruction;
Judge that the file sends whether instruction indicates the file being sent to Cloud Server;
When determining that the file is sent to the Cloud Server by the file transmission instruction instruction, encryption file is sent to
The Cloud Server, the encryption file are according to the encryption information stored in the terminal, to the initial data of the file
Carry out the file of encryption generation;
After the reception file sends the step of instructing, judge that the file sends whether instruction indicates to send out the file
It send to another terminal;
When determining that the file is sent to another terminal by the file transmission instruction instruction, the file is sent to
Another terminal;
It is described when determining that the file sends instruction instruction the file is sent to another terminal, the file is sent out
It send to the step of another terminal and includes:
When determining that the file sends instruction instruction the file is sent to another terminal, by the encryption file into
Row decryption;
File after decryption is sent to another terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610245067.0A CN105681365B (en) | 2016-04-18 | 2016-04-18 | Method and apparatus for file transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610245067.0A CN105681365B (en) | 2016-04-18 | 2016-04-18 | Method and apparatus for file transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105681365A CN105681365A (en) | 2016-06-15 |
CN105681365B true CN105681365B (en) | 2019-05-14 |
Family
ID=56310100
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610245067.0A Active CN105681365B (en) | 2016-04-18 | 2016-04-18 | Method and apparatus for file transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105681365B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107995148B (en) * | 2016-10-27 | 2020-09-18 | 中国电信股份有限公司 | File tamper-proofing method, system, terminal and trusted cloud platform |
CN108881663B (en) * | 2018-06-20 | 2019-12-24 | 暨南大学 | Image area copying detection method supporting privacy protection function |
CN112565282A (en) * | 2020-12-14 | 2021-03-26 | 中国科学院信息工程研究所 | Data encryption method, terminal equipment and electronic equipment |
CN113591120A (en) * | 2021-08-09 | 2021-11-02 | 北京达佳互联信息技术有限公司 | Information issuing method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638568A (en) * | 2012-03-02 | 2012-08-15 | 深圳市朗科科技股份有限公司 | Cloud storage system and data management method thereof |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN104065680A (en) * | 2013-03-21 | 2014-09-24 | 华为终端有限公司 | Information processing method and apparatus, information retrieval method and apparatus, user terminal and server |
CN105025019A (en) * | 2015-07-07 | 2015-11-04 | 深圳奥联信息安全技术有限公司 | Data safety sharing method |
-
2016
- 2016-04-18 CN CN201610245067.0A patent/CN105681365B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638568A (en) * | 2012-03-02 | 2012-08-15 | 深圳市朗科科技股份有限公司 | Cloud storage system and data management method thereof |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN104065680A (en) * | 2013-03-21 | 2014-09-24 | 华为终端有限公司 | Information processing method and apparatus, information retrieval method and apparatus, user terminal and server |
CN105025019A (en) * | 2015-07-07 | 2015-11-04 | 深圳奥联信息安全技术有限公司 | Data safety sharing method |
Also Published As
Publication number | Publication date |
---|---|
CN105681365A (en) | 2016-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6220993B2 (en) | Smart hardware device control method, apparatus, program, and recording medium | |
EP3001640A1 (en) | Secure information exchange method and wearable device | |
EP2985975A1 (en) | Method, apparatus and system for authenticating access and computer program | |
WO2016050037A1 (en) | Operation authorization method and device | |
CN104486083A (en) | Supervisory video processing method and device | |
CN104318177A (en) | Protection method and protection device for data of terminal equipment | |
CN104168277A (en) | File security maintaining method and device | |
JP6101863B2 (en) | Information transmission method, apparatus, program, and recording medium for voice service | |
CN106060098B (en) | Processing method, processing unit and the processing system of identifying code | |
CN105681365B (en) | Method and apparatus for file transmission | |
CN103914541A (en) | Information search method and device | |
CN105306716A (en) | Data processing method, device and system | |
CN109246110B (en) | Data sharing method and device and computer readable storage medium | |
CN105450662A (en) | Encryption method and device | |
CN112883402A (en) | Encryption method and device, electronic equipment and storage medium | |
CN104331672A (en) | Method and device for performing confidential treatment on pictures upon bracelet | |
CN105046127A (en) | Encryption and decryption method and apparatus | |
CN105681261A (en) | Security authentication method and apparatus | |
CN103916471A (en) | Information display method and device | |
CN104182697A (en) | File encryption method and device | |
CN106611112A (en) | Application program safe processing method, device and equipment | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN113055169B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN108664216B (en) | Data storage method and device | |
EP3249566B1 (en) | Method and device for encrypting application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |