CN105468988A - Data protection method and device during connection of terminal and PC (Personal Computer) - Google Patents

Data protection method and device during connection of terminal and PC (Personal Computer) Download PDF

Info

Publication number
CN105468988A
CN105468988A CN201410407914.XA CN201410407914A CN105468988A CN 105468988 A CN105468988 A CN 105468988A CN 201410407914 A CN201410407914 A CN 201410407914A CN 105468988 A CN105468988 A CN 105468988A
Authority
CN
China
Prior art keywords
terminal
user
password
connection
carry out
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410407914.XA
Other languages
Chinese (zh)
Inventor
刘佩
余庆平
高翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410407914.XA priority Critical patent/CN105468988A/en
Priority to PCT/CN2015/079261 priority patent/WO2016026333A1/en
Publication of CN105468988A publication Critical patent/CN105468988A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data protection method and device during the connection of a terminal and a PC (Personal Computer). The method comprises the following steps: setting a connection password in the terminal; after a detection result shows that the terminal is connected with the PC, forbidding the terminal to carry out any data interaction with the PC, and obtaining the connection password input by the user; and judging whether the connection password input by the user is correct or not, if the connection password input by the user is correct, permitting the terminal to carry out data interaction with the PC, and if the connection password is incorrect, forbidding the terminal to carry out any data interaction with the PC. By virtue of the technical scheme of the invention, user privacy can be effectively protected, and a phenomenon that an illegal user obtains and exports data in terminal settings through the PC is avoided.

Description

Data guard method during terminal connection PC and device
Technical field
The present invention relates to field of mobile communication, particularly relate to a kind of terminal connect PC time data guard method and device.
Background technology
Mobile terminal product (hereinafter referred to as terminal) more and more appears in daily life, and people also more and more rely on terminal, and terminal has become the daily communication major equipment of people.Many individual privacies of also in store user in terminal, such as, the alternative documents such as contact person, short message, picture, video.Along with popularizing of end product, the management software of terminal also arises at the historic moment.The particularly software of personal computer (PersonalComputer, referred to as PC) lateral terminal management, such as, the PC lateral terminal management software etc. that 360 mobile phone assistants, 91 assistants, pea pods and all big enterprises carry.These management softwares, in order to highlight intrinsic advantage, function is all very powerful, puts in place to the management of terminal comprehensively, and simple and efficient.As long as mobile phone is set to debugging mode by you, what all need not do, and terminal management software will drive by Auto-mounting, various information in terminal can be shown on PC soon, and derived information is to PC, in addition, the information on PC is imported to terminal also very convenient.Thus, to setting and the management of terminal, thing easily is just become.People often also by PC side management software download install should with the various information of office terminal.Under above-mentioned scene, although the terminal of user is provided with locking screen interface, these PC side management softwares but can various port, walks around locking screen interface, without any interception, just can carry out the mutual of information with terminal.Disabled user takes terminal, and the information in terminal just has by the risk illegally derived, and the leakage of individual subscriber privacy faces great risk.
Summary of the invention
In view of the problem that the individual subscriber privacy of terminal in prior art is easily leaked, the present invention proposes a kind of terminal connect PC time data guard method and device.
The invention provides data guard method during a kind of terminal connection PC, comprising:
Connection password is set in the terminal;
After detecting that terminal is connected with PC, forbid that terminal and PC carry out any data interaction, and obtain the connection password of user's input;
Judge that whether the connection password that user inputs is correct, if correctly, then allow terminal and PC to carry out data interaction, if connect password bad, then forbid that terminal and PC carry out any data interaction.
Preferably, arrange in the terminal after connecting password, said method comprises further: the unblock in terminal being connected traffic sign placement for being in guard mode, wherein, under guard mode, then forbidding that terminal and PC carry out any data interaction.
Preferably, after detecting that terminal is connected with PC, comprise further:
Judge to unlock the state connecting mark, if unblock connects mark be in guard mode, then forbid that terminal and PC carry out any data interaction, and point out user to input connection password.
Preferably, the connection password obtaining user's input specifically comprises:
Obtain the connection password that user is inputted by PC; Or,
Obtain the connection password that user is inputted by terminal.
Preferably, comprise further:
When the connection password judging that user inputs is correct, the unblock in terminal is connected traffic sign placement for being in data interaction state;
After detecting that terminal and PC disconnect, the unblock connection mark in terminal is re-set as and is in guard mode.
Present invention also offers data protecting device during a kind of terminal connection PC, comprising:
Module is set, for arranging connection password in the terminal;
Processing module, for after detecting that terminal is connected with PC, forbids that terminal and PC carry out any data interaction, and obtains the connection password of user's input;
Judge module, whether correct for judging the connection password that user inputs, if correctly, then allow terminal and PC to carry out data interaction, if connect password bad, then forbid that terminal and PC carry out any data interaction.
Preferably, arrange module to be further used for:
Arrange after connecting password in the terminal, the unblock in terminal being connected traffic sign placement for being in guard mode, wherein, under guard mode, then forbidding that terminal and PC carry out any data interaction.
Preferably, processing module is further used for: after detecting that terminal is connected with PC, judges to unlock the state connecting mark, if unblock connects mark be in guard mode, then forbids that terminal and PC carry out any data interaction, and points out user to input connection password.
Preferably, processing module specifically for:
The connection password of user's input is obtained by PC; Or,
The connection password of user's input is obtained by terminal.
Preferably, processing module is further used for:
When the connection password judging that user inputs is correct, the unblock in terminal is connected traffic sign placement for being in data interaction state;
After detecting that terminal and PC disconnect, the unblock connection mark in terminal is re-set as and is in guard mode.
Beneficial effect of the present invention is as follows:
By means of the technical scheme of the embodiment of the present invention, when terminal is connected with PC side, increase by one protective barrier, when there is the demand with terminal interaction PC side, must first unlock terminal, unlock successfully, could to carry out normal data mutual with terminal, otherwise, the any information in user terminal cannot be read, the problem that the individual subscriber privacy that technique scheme solves terminal in prior art is easily leaked, can available protecting privacy of user, when disabled user takes other people terminal, arbitrarily can not obtain the information in terminal, data acquisition in avoiding disabled user terminal to be arranged by PC and derivation.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of instructions, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Accompanying drawing explanation
By reading hereafter detailed description of the preferred embodiment, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Accompanying drawing only for illustrating the object of preferred implementation, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
The process flow diagram of data guard method when Fig. 1 is the terminal connection PC of the embodiment of the present invention;
Fig. 2 is the schematic diagram of the treatment scheme of the example 1 of the embodiment of the present invention;
Fig. 3 is the schematic diagram of the treatment scheme of the example 2 of the embodiment of the present invention;
The structural representation of data protecting device when Fig. 4 is the terminal connection PC of the embodiment of the present invention.
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
In order to the problem that the individual subscriber privacy solving terminal in prior art is easily leaked; the invention provides a kind of terminal connect PC time data guard method and device; when terminal is connected with PC side; increase by one protective barrier, when there is the demand with terminal interaction PC side, must first unlock terminal; unlock successfully; normal data could be carried out alternately with terminal, otherwise, any information in user terminal cannot be read.Below in conjunction with accompanying drawing and embodiment, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, do not limit the present invention.
Embodiment of the method
According to embodiments of the invention; provide data guard method during a kind of terminal connection PC; Fig. 1 is the terminal of the embodiment of the present invention process flow diagram of data guard method when connecting PC, and as shown in Figure 1, data guard method when connecting PC according to the terminal of the embodiment of the present invention comprises following process:
Step 101, arranges connection password in the terminal;
In a step 101, arrange after connecting password in the terminal, the unblock in terminal can also being connected traffic sign placement for being in guard mode, wherein, under guard mode, then forbidding that terminal and PC carry out any data interaction.
That is, in embodiments of the present invention, terminal arranges cryptographic item and arranges connection password for user can increase by one in storage chip (hereinafter referred to as Flash).Arrange this password effect to be, after password is arranged, unblock is connected mark by terminal, is set to true, represents that terminal is in connection guard mode.
Step 102, after detecting that terminal is connected with PC, forbids that terminal and PC carry out any data interaction, and obtains the connection password of user's input;
In embodiments of the present invention, when PC connects terminal, be masked as very if unlock connection, terminal is in guard mode, and any instruction carrying out data interaction with terminal, terminal is not all supported.Terminal interface can also be in guard mode by reminding subscriber terminal.
In a step 102, after detecting that terminal is connected with PC, how to be provided with and to unlock connection mark; then need to judge to unlock the state connecting mark; if unlock connection mark to be in guard mode, then forbid that terminal and PC carry out any data interaction, and point out user to input connection password.
In addition, the mode obtaining the connection password of user's input has two kinds, specifically comprises: obtain the connection password that user is inputted by PC; Or, obtain the connection password that user is inputted by terminal.
Particularly, this unblock comprises two kinds of mode: Yi Zhongshi, inputs unlocking pin by PC, and this unlocking pin is encrypted by PC key, and the unlock command then by arranging with terminal, sends to terminal by unlock command by this enciphered data.After terminal receives unlock command, take out enciphered data wherein, with the decruption key matched with encryption key, it is decrypted, obtains the password that user inputs from PC.Another kind is, terminal connects unlocking pin in interface prompt input, and user inputs unlocking pin to terminal unlocking at terminal interface.This password form can comprise the multiple password input mode of the end side such as the data cryptogram inputted in current widely used figure unlocking pin, finger-print cipher, Password Input frame.
Step 103, judges that whether the connection password that user inputs is correct, if correctly, then allows terminal and PC to carry out data interaction, if connect password bad, then forbids that terminal and PC carry out any data interaction.
In step 103, when the connection password judging that user inputs is correct, the unblock in terminal is connected traffic sign placement for being in data interaction state, allowing terminal and PC to carry out data interaction.
In embodiments of the present invention, terminal judges that whether the connection unlocking pin that user provides is consistent with the connection unlocking pin being kept at terminal after getting and connecting unlocking pin, unanimously then unblock is connected mark and is set to vacation, represents that terminal connects protection and unlocks.Inconsistent then prompting connection unlocks unsuccessfully, and prompting user re-enters password.
In embodiments of the present invention, in order to protect the data of terminal, after detecting that terminal and PC disconnect, the unblock connection mark in terminal being re-set as and being in guard mode.
That is, after terminal detects that USB charged state is cancelled, expression and PC disconnect, and again unblock are connected mark and are set to very, be in connection guard mode.
Below in conjunction with accompanying drawing, the technique scheme of the embodiment of the present invention is described in detail.
Example 1
Fig. 2 is the schematic diagram of the treatment scheme of the example 1 of the embodiment of the present invention, provides the flow process that PC connects terminal protection mechanism, as shown in Figure 2, specifically comprises following process:
Step 1, in terminal is arranged, provides a password to arrange function, and when being connected with PC for arranging, carry out connecting the password unlocked, this password adopts ciphertext to be kept in terminal flash.
Step 2, matching step 1, increases in the terminal and connects unblock mark, this mark is invisible to user, and the effect of this mark is, is masked as true time, PC and terminal are carried out mutual instruction block, do not support PC by instruction from terminal acquisition or to terminal transmission data.
Step 3, PC is connected with terminal, when carrying out data interaction, first must carry out connection unlocking operation.
Step 3.1, user connects unlocking pin in PC input, and PC uses key to be encrypted to this password.
Step 3.2, PC, by the data of encryption, is encapsulated in unlock command, sends to terminal.
Step 4, terminal receives connection unlock command, processes the password that this instruction obtains user's input, and judges password legitimacy.
Step 4.1, terminal takes out the enciphered data in the unlock command that PC sends, and is decrypted, obtains the decodement of PC transmission with password match with PC encryption key.
Step 4.2, the password obtained and the password be kept in terminal flash contrast by terminal, as the foundation judging PC whether validated user.
Step 5, terminal judges whether validated user, and carry out alignment processing.If password is inconsistent, then PC is disabled user, and terminal notification PC unlocks unsuccessfully, and user is illegal.If password is consistent, PC is validated user, then it is false for connection being unlocked traffic sign placement, represents and unlocks, and notify that PC unlocks successfully.
Step 6, PC unlocks successfully, and PC and terminal data interactive instruction are in carries out normal response state, and PC can carry out information interaction with terminal.
Step 7, PC and terminal disconnect, and terminal detects and is not in USB charged state, then connection is unlocked mark and be re-set as very, enter connection guard mode.PC is connected with terminal again, need re-execute above step 1 to step 6.
Example 2
For the intelligent terminal that can carry out screen protection, describe one embodiment of the present invention in detail below with reference to Fig. 3.Fig. 3 is the schematic diagram of the treatment scheme of the example 2 of the embodiment of the present invention, as shown in Figure 3, specifically comprises following process:
Step 1, in terminal is arranged, provides a password to arrange function, when being connected with PC for arranging, carries out connecting the password unlocked, and waits rational method to be saved in Flash to encrypt in password.This password form can comprise the multiple password input mode of the end side such as the data cryptogram inputted in current widely used figure unlocking pin, finger-print cipher, Password Input frame.
Step 2, matching step 1, increases in the terminal and connects unblock mark, this mark is invisible to user, and the effect of this mark is, is masked as true time, PC and terminal are carried out mutual instruction block, do not support PC by instruction from terminal acquisition or to terminal transmission data.
Step 3, when terminal is connected to PC, terminal interface prompting user inputs connection unlocking pin, and Password Input form has arranged form and presented.
Step 4, user inputs connection unlocking pin, and terminal judges whether validated user on this basis.If password is inconsistent, be then disabled user, terminal connection does not unlock, prompting user cipher mistake.If password is consistent, be then validated user, it is false that connection is unlocked traffic sign placement by terminal, and represent and unlock, prompting user can carry out data interaction.
Step 5, unlocks successfully, and normal response state is carried out in all instructions of terminal, and PC can carry out information interaction with terminal.
Step 6, PC and terminal disconnect, and terminal detects and is not in USB charged state, then connection is unlocked mark and be re-set as very, enter connection guard mode.PC is connected with terminal again, need re-execute above step 1 to step 5.
The technical scheme of the embodiment of the present invention does not have particular/special requirement to PC and terminal, as long as PC can carry out instruction interaction with terminal, can realize.Can user data in available protecting terminal not compromised.
Device embodiment
According to embodiments of the invention; provide data protecting device during a kind of terminal connection PC; the structural representation of data protecting device when Fig. 4 is the terminal connection PC of the embodiment of the present invention; as shown in Figure 4; data protecting device when connecting PC according to the terminal of the embodiment of the present invention comprises: arrange module 40, processing module 42 and judge module 44, be described in detail below to the modules of the embodiment of the present invention.
Module 40 is set, for arranging connection password in the terminal; Arrange module 40 to be further used for:
Arrange after connecting password in the terminal, the unblock in terminal being connected traffic sign placement for being in guard mode, wherein, under guard mode, then forbidding that terminal and PC carry out any data interaction.
Processing module 42, for after detecting that terminal is connected with PC, forbids that terminal and PC carry out any data interaction, and obtains the connection password of user's input; Processing module 42 is further used for: after detecting that terminal is connected with PC, judges to unlock the state connecting mark, if unblock connects mark be in guard mode, then forbids that terminal and PC carry out any data interaction, and points out user to input connection password.
Processing module 42 specifically for: by PC obtain user input connection password; Or, the connection password of user's input is obtained by terminal.
Processing module 42 is further used for: when the connection password judging that user inputs is correct, the unblock in terminal is connected traffic sign placement for being in data interaction state; After detecting that terminal and PC disconnect, the unblock connection mark in terminal is re-set as and is in guard mode.
Judge module 44, whether correct for judging the connection password that user inputs, if correctly, then allow terminal and PC to carry out data interaction, if connect password bad, then forbid that terminal and PC carry out any data interaction.
In sum, by means of the technical scheme of the embodiment of the present invention, when terminal is connected with PC side, increase by one protective barrier, when there is the demand with terminal interaction PC side, must first unlock terminal, unlock successfully, could to carry out normal data mutual with terminal, otherwise, the any information in user terminal cannot be read, the problem that the individual subscriber privacy that technique scheme solves terminal in prior art is easily leaked, can available protecting privacy of user, when disabled user takes other people terminal, arbitrarily can not obtain the information in terminal, data acquisition in avoiding disabled user terminal to be arranged by PC and derivation.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with display at this algorithm provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure constructed required by this type systematic is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In instructions provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and adaptively can change the module in the client in embodiment and they are arranged in one or more clients different from this embodiment.Block combiner in embodiment can be become a module, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or unit be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or client or unit.Unless expressly stated otherwise, each feature disclosed in this instructions (comprising adjoint claim, summary and accompanying drawing) can by providing identical, alternative features that is equivalent or similar object replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in the following claims, the one of any of embodiment required for protection can use with arbitrary array mode.
All parts embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that the some or all functions of some or all parts be loaded with in the client of sequence network address that microprocessor or digital signal processor (DSP) can be used in practice to realize according to the embodiment of the present invention.The present invention can also be embodied as part or all equipment for performing method as described herein or device program (such as, computer program and computer program).Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.

Claims (10)

1. data guard method during terminal connection personal computer PC, is characterized in that, comprising:
Connection password is set in the terminal;
After detecting that terminal is connected with PC, forbid that described terminal and described PC carry out any data interaction, and obtain the described connection password of user's input;
Judge that whether the described connection password that user inputs is correct, if correctly, then allow described terminal and described PC to carry out data interaction, if described connection password bad, then forbid that described terminal and described PC carry out any data interaction.
2. the method for claim 1; it is characterized in that; arrange after connecting password in the terminal; described method comprises further: the unblock in described terminal is connected traffic sign placement for being in guard mode; wherein; under described guard mode, then forbid that described terminal and described PC carry out any data interaction.
3. method as claimed in claim 2, it is characterized in that, after detecting that terminal is connected with PC, described method comprises further:
Judge the described state unlocking connection mark, if described unblock connects mark be in guard mode, then forbid that described terminal and described PC carry out any data interaction, and point out user to input described connection password.
4. the method for claim 1, is characterized in that, the described connection password obtaining user's input specifically comprises:
Obtain the described connection password that user is inputted by described PC; Or,
Obtain the described connection password that user is inputted by described terminal.
5. method as claimed in claim 2, it is characterized in that, described method comprises further:
When the described connection password judging that user inputs is correct, the unblock in described terminal is connected traffic sign placement for being in data interaction state;
After detecting that described terminal and described PC disconnect, the unblock connection mark in described terminal is re-set as and is in guard mode.
6. data protecting device during terminal connection personal computer PC, is characterized in that, comprising:
Module is set, for arranging connection password in the terminal;
Processing module, for after detecting that terminal is connected with PC, forbids that described terminal and described PC carry out any data interaction, and obtains the described connection password of user's input;
Judge module, whether correct for judging the described connection password that user inputs, if correctly, then allow described terminal and described PC to carry out data interaction, if described connection password bad, then forbid that described terminal and described PC carry out any data interaction.
7. device as claimed in claim 6, it is characterized in that, the described module that arranges is further used for:
Arrange after connecting password in the terminal, the unblock in described terminal being connected traffic sign placement for being in guard mode, wherein, under described guard mode, then forbidding that described terminal and described PC carry out any data interaction.
8. device as claimed in claim 7; it is characterized in that; described processing module is further used for: after detecting that terminal is connected with PC; judge the described state unlocking connection mark; if described unblock connects mark be in guard mode; then forbid that described terminal and described PC carry out any data interaction, and point out user to input described connection password.
9. device as claimed in claim 6, is characterized in that, processing module specifically for:
The described connection password of user's input is obtained by described PC; Or,
The described connection password of user's input is obtained by described terminal.
10. device as claimed in claim 7, it is characterized in that, described processing module is further used for:
When the described connection password judging that user inputs is correct, the unblock in described terminal is connected traffic sign placement for being in data interaction state;
After detecting that described terminal and described PC disconnect, the unblock connection mark in described terminal is re-set as and is in guard mode.
CN201410407914.XA 2014-08-19 2014-08-19 Data protection method and device during connection of terminal and PC (Personal Computer) Pending CN105468988A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410407914.XA CN105468988A (en) 2014-08-19 2014-08-19 Data protection method and device during connection of terminal and PC (Personal Computer)
PCT/CN2015/079261 WO2016026333A1 (en) 2014-08-19 2015-05-19 Data protection method, device and storage medium in connection between terminal and pc

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410407914.XA CN105468988A (en) 2014-08-19 2014-08-19 Data protection method and device during connection of terminal and PC (Personal Computer)

Publications (1)

Publication Number Publication Date
CN105468988A true CN105468988A (en) 2016-04-06

Family

ID=55350172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410407914.XA Pending CN105468988A (en) 2014-08-19 2014-08-19 Data protection method and device during connection of terminal and PC (Personal Computer)

Country Status (2)

Country Link
CN (1) CN105468988A (en)
WO (1) WO2016026333A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529236A (en) * 2016-11-02 2017-03-22 广东欧珀移动通信有限公司 Unlocking method, apparatus and system
CN110226164A (en) * 2017-01-22 2019-09-10 华为技术有限公司 A kind of verification method, mobile terminal, equipment and system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112132524B (en) * 2020-07-10 2024-03-29 北京云族佳科技有限公司 Monitoring method, performance management method, client and server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1976511A (en) * 2005-11-28 2007-06-06 中兴通讯股份有限公司 Method for conducting secrete handling for PC broadside-on mobile terminal information
CN101123769A (en) * 2007-08-02 2008-02-13 深圳市杰特电信控股有限公司 A method for editing mobile phone information using computer
CN101493867A (en) * 2008-01-25 2009-07-29 希姆通信息技术(上海)有限公司 Method and system for mutually transmitting shared data safely between mobile phone and computer
CN101369895B (en) * 2008-08-27 2011-06-22 宇龙计算机通信科技(深圳)有限公司 Method and mobile terminal for establishing connection with PC terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1976511A (en) * 2005-11-28 2007-06-06 中兴通讯股份有限公司 Method for conducting secrete handling for PC broadside-on mobile terminal information
CN101123769A (en) * 2007-08-02 2008-02-13 深圳市杰特电信控股有限公司 A method for editing mobile phone information using computer
CN101493867A (en) * 2008-01-25 2009-07-29 希姆通信息技术(上海)有限公司 Method and system for mutually transmitting shared data safely between mobile phone and computer
CN101369895B (en) * 2008-08-27 2011-06-22 宇龙计算机通信科技(深圳)有限公司 Method and mobile terminal for establishing connection with PC terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529236A (en) * 2016-11-02 2017-03-22 广东欧珀移动通信有限公司 Unlocking method, apparatus and system
CN110226164A (en) * 2017-01-22 2019-09-10 华为技术有限公司 A kind of verification method, mobile terminal, equipment and system
US11222104B2 (en) 2017-01-22 2022-01-11 Huawei Technologies Co., Ltd. Verification method, mobile terminal, device, and system
CN110226164B (en) * 2017-01-22 2022-02-08 华为技术有限公司 Verification method, mobile terminal, equipment and system

Also Published As

Publication number Publication date
WO2016026333A1 (en) 2016-02-25

Similar Documents

Publication Publication Date Title
CN110492990B (en) Private key management method, device and system under block chain scene
EP2795829B1 (en) Cryptographic system and methodology for securing software cryptography
WO2017035268A1 (en) Data obfuscation method and service using unique seeds
CN105812332A (en) Data protection method
CN107480519A (en) A kind of method and server for identifying risk application
CN105335642B (en) The processing method and processing system of picture
CN104933342A (en) Picture viewing method and mobile terminal
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN114868123A (en) Non-contact card personal identification system
Tu et al. Critical risk considerations in auto-ID security: Barcode vs. RFID
CN105975867B (en) A kind of data processing method
CN106713618A (en) Processing method of identifying code and mobile terminal
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN106169052A (en) The processing method of application program, device and mobile terminal
GB2556638A (en) Protecting usage of key store content
Frisby et al. Security Analysis of Smartphone Point-of-Sale Systems.
CN105468988A (en) Data protection method and device during connection of terminal and PC (Personal Computer)
EP2973182A1 (en) Methods and apparatus for securing user input in a mobile device
CN103902882B (en) A kind of prevent user profile from leaking terminal and method
CN103592927A (en) Method for binding product server and service function through license
CN108540591B (en) Address book management method, address book management device and electronic equipment
US10845990B2 (en) Method for executing of security keyboard, apparatus and system for executing the method
CN102393886B (en) Safety control method of mobile terminal, device and system
US20230319105A1 (en) Computer network hacking prevention system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160406

WD01 Invention patent application deemed withdrawn after publication