CN106203159A - A kind of method and apparatus of application program operation file - Google Patents

A kind of method and apparatus of application program operation file Download PDF

Info

Publication number
CN106203159A
CN106203159A CN201610509395.7A CN201610509395A CN106203159A CN 106203159 A CN106203159 A CN 106203159A CN 201610509395 A CN201610509395 A CN 201610509395A CN 106203159 A CN106203159 A CN 106203159A
Authority
CN
China
Prior art keywords
file
instruction
application program
permissions list
operation file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610509395.7A
Other languages
Chinese (zh)
Inventor
王慧松
孙钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610509395.7A priority Critical patent/CN106203159A/en
Publication of CN106203159A publication Critical patent/CN106203159A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention proposes the method and apparatus of a kind of application program operation file, relates to areas of information technology.The method includes: the operation file instruction that response application program sends, if detecting, described application program has the authority that described file performs the instruction of described operation file, then described file performs the instruction of described operation file;Otherwise, described file is not performed the instruction of described operation file;The instruction of described operation file is the instruction operating described file.This programme makes the file of interior of mobile phone be not applied program arbitrarily to operate and access, thus improves the safety of file, makes the vital document in cell phone system be protected.

Description

A kind of method and apparatus of application program operation file
Technical field
The present embodiments relate to areas of information technology, particularly relate to method and the dress of a kind of application program operation file Put.
Background technology
At present, utilize the situation of mobile-phone payment expense to get more and more, and payment application or payment function are running Time can produce some files, if these files are by random access, are likely to result in the leakage of user's payment information, make to user Become loss.Meanwhile, some vital documents, when using mobile phone, can be saved in by user such as the file of record password or log-on message In mobile phone, in case forgetting Password or checking during log-on message, if these files are by random access, can cause the user damage equally Lose.
But, inventor, during realizing the present invention, finds that the application program installed on current mobile phone gets more and more, And these application programs the most all can require to have the file of mobile phone access rights, make the peace of the file of storage on mobile phone There is major hidden danger in full property.
Therefore, it is necessary to improvement drawbacks mentioned above.
Summary of the invention
Based on problem above, the embodiment of the present invention proposes the method and apparatus of a kind of application program operation file, by sound Answering the operation file instruction that application program sends, if detecting, application program has the authority that file performs operation file instruction Just make the mode of application program operation file, make the file of interior of mobile phone be not applied program and arbitrarily operate and access, thus carry The high safety of file, makes the vital document in cell phone system be protected.
On the one hand, the embodiment of the present invention proposes a kind of method of application program operation file, including:
The operation file instruction that response application program sends, performs described file if detecting that described application program has The authority of described operation file instruction, then perform the instruction of described operation file to described file;Otherwise, described file is not performed Described operation file instructs;The instruction of described operation file is the instruction operating described file.
If detecting that described application program has the power that described file performs the instruction of described operation file additionally, described Limit, then performing the instruction of described operation file, may particularly include: if finding in the permissions list of described file described file The name of described application program, numbering or classification, and if find in described permissions list the name with described application program, Numbering or classification corresponding described operation file instruction, then to described file perform described operation file instruction;Described authority arranges Table saves described file is had the name of application program, numbering or the classification of operating right and described application program quilt Allow the described operation file instruction that described file is performed.
Additionally, the condition preset or file that according to described permissions list, the type of described file, file are met are protected The content deposited is that described file is arranged.
If additionally, the type of described file is encryption type, then arranging, for described file, the described power that level of security is the highest Limit list, if described permissions list is modified, then arranges using the described permissions list after change as the described authority of described file Table.
If additionally, plural described file meets identical pre-conditioned, then file described in two or more being arranged Identical described permissions list.
Additionally, described operation file instruction comprise the steps that open file open file instruction, delete file deletion file Instruct, read the duplication literary composition reading file instruction, the write file instruction of write file content or duplication file of file content Part instructs.
On the other hand, the embodiment of the present invention proposes the device of a kind of application program operation file, including:
Respond module, is used for: the operation file instruction that response application program sends;
Performing module, be used for: performing the instruction of described operation file if detecting described application program to have described file Authority, then to described file perform described operation file instruction;Otherwise, described file is not performed described operation file to refer to Order;The instruction of described operation file is the instruction operating described file.
If detecting that described application program has the power that described file performs the instruction of described operation file additionally, described Limit, then performing the instruction of described operation file, may particularly include: if finding in the permissions list of described file described file The name of described application program, numbering or classification, and if find in described permissions list the name with described application program, Numbering or classification corresponding described operation file instruction, then to described file perform described operation file instruction;Described authority arranges Table saves described file is had the name of application program, numbering or the classification of operating right and described application program quilt Allow the described operation file instruction that described file is performed.
Additionally, the condition preset or file that according to described permissions list, the type of described file, file are met are protected The content deposited is that described file is arranged.
If additionally, the type of described file is encryption type, then arranging, for described file, the described power that level of security is the highest Limit list, if described permissions list is modified, then arranges using the described permissions list after change as the described authority of described file Table.
If additionally, plural described file meets identical pre-conditioned, then file described in two or more being arranged Identical described permissions list.
Additionally, described operation file instruction comprise the steps that open file open file instruction, delete file deletion file Instruct, read the duplication literary composition reading file instruction, the write file instruction of write file content or duplication file of file content Part instructs.
Use technique scheme, have the advantages that
The operation file sent by response application program is instructed, if detecting that application program has file is performed operation The authority of file instruction just makes the mode of application program operation file, makes the file of interior of mobile phone be not applied program and arbitrarily operates And access, thus improve the safety of file, make the vital document in cell phone system be protected.
Accompanying drawing explanation
Fig. 1 is the flow chart of the method for application program operation file according to an embodiment of the invention;
Fig. 2 is the flow chart of the method for application program operation file in accordance with another embodiment of the present invention;
Fig. 3 is the block diagram of the device of application program operation file in accordance with another embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is The a part of embodiment of the present invention rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under not making creative work premise, broadly falls into the scope of protection of the invention.
Embodiment one
With reference to Fig. 1, the embodiment of the present invention proposes a kind of method of application program operation file, including:
Step S001, the operation file instruction that response application program sends;
Step S002, if detecting, application program has the authority that file performs operation file instruction, then hold file Row operation file instructs;Otherwise, file is not performed operation file instruction;Operation file instruction is the finger operating file Order.
Application program in the embodiment of the present invention is for set in mobile phone, panel computer, computer, intelligent watch or other intelligence The application program of standby upper installation.
Application program the operation of file is comprised the steps that open file open file instruction, delete file deletion file Instruct, read the duplication literary composition reading file instruction, the write file instruction of write file content or duplication file of file content Part instructs.
As a example by application program on mobile phone sends operation file instruction to file, when receiving the behaviour that application program sends After making file instruction, cell phone system detects, if detecting, application program has the power that file performs operation file instruction Limit, then perform operation file instruction to file;Otherwise, file is not performed operation file instruction.
Whether detection application program has the method for the authority that file performs operation file instruction, is exemplified below:
First kind of way, file header or end-of-file at file increase authority memory area, in authority memory area This document is had the name of application program, numbering or the classification of operating right and corresponding write application program to be allowed to by write The operation file instruction performed, illustrates such as: " phone/open ", represents " phone " this application program and can perform file " open " this operation file instructs.
The second way, writes the name of the application program having operating right to this document, numbering in the attribute of file Or classification and corresponding write application program are allowed to the operation file instruction performed.
The third mode, increases an authority to each file, for write, this document is had operating right The name of application program, numbering or classification and corresponding write application program are allowed to the operation file instruction performed.Or The same file following multiple files of folder are increased an authority, for write each different file corresponding to this article Part has the name of the application program of operating right, numbering or classification and corresponding write application program to be allowed to the operation performed File instruction.In one of which embodiment, file is had the name of the application program of operating right, numbering or classification with And the operation file instruction that application program is allowed to perform is stored in authority in the way of form.One of which In embodiment, owing to the file in cell phone system is the most, so only the file of part need for confidentiality need to be increased application journey Whether sequence has the detection of the authority that file performs operation file instruction.
The operation file sent by response application program is instructed, if detecting that application program has file is performed operation The authority of file instruction just makes the mode of application program operation file, makes the file of interior of mobile phone be not applied program and arbitrarily operates And access, thus improve the safety of file, make the vital document in cell phone system be protected.
In one of which embodiment, if detecting, application program has the power that file performs operation file instruction Limit, then performing operation file instruction, may particularly include: if finding the name of application program in the permissions list of file file Word, numbering or classification, and if find the operation file that the name with application program, numbering or classification are corresponding in permissions list Instruction, then perform operation file instruction to file;Permissions list saves the application program to file with operating right Name, numbering or classification and application program are allowed to the operation file instruction performing file.
By the inside of file increase an authority region, in authority region in the way of permissions list record to literary composition Part has the name of the application program of operating right, numbering or classification and application program is allowed to the operation literary composition to file execution Part instructs.
Or file is increased an authority, and in authority, in the way of permissions list, file is had by record The operation file that the name of the application program of operating right, numbering or classification and application program are allowed to perform file refers to Order.
Table 1 illustrates have the application program of " apps tore " this name file is able to carry out " open " and " read " the two operation file instructs." open " represent open file open file instruction, " read " represents and reads file Reading file instruction.
Table 1
Table 2 illustrates and belongs to the application program of " store " this classification file is able to carry out " open " this behaviour Make file instruction.
There is the classification of the application program of authority Operation file executable to file instructs
store open
Table 2
It is allowed to literary composition by writing the name of application program, numbering or classification and application program in permissions list The mode of the operation file instruction that part performs, makes application program before operation file, verifies application program, to having permission Application program just allow its operation file.Avoiding any program can the problem of file within operating handset.
In one of which embodiment, the condition preset that permissions list is met by the type according to file, file Or the content that file preserves is that file is arranged.
Content in the permissions list increase file is write direct by user, and user such as records close according to the type of file The file of code type, select file write instrument by be allowed to the name of the application program of operation file, numbering or classification with And the operation file instruction that application program is allowed to perform file writes.
Or, cell phone system automatically the file of interior of mobile phone is scanned, when type or file that file detected The content preserved meets default condition, then file is increased permissions list.As: detect in the content that file preserves and include During " password " printed words, file is increased permissions list.In one of which embodiment, to permissions list unified write content, Make the content in the permissions list of file consistent.
The condition preset or the content of file preservation that type according to file, file are met are that file arranges authority row Table, makes only to arrange the file being necessary to arrange permissions list, thus decreases the workload of user or cell phone system.
In one of which embodiment, if the type of file is encryption type, then level of security is set for file the highest Permissions list, if permissions list is modified, then using the permissions list after change as the permissions list of file.
When type file being detected is encryption type, now cell phone system is the power that file arranges that level of security is the highest Limit list, wherein in an embodiment, the permissions list that level of security is the highest is the application program only allowing to produce this document Operating it, other application program is all without operating right.After the permissions list of file is modified by user, user is changed After permissions list preserve, as the permissions list of file.By the file of encryption type is arranged the power that level of security is the highest Limit list so that it is it cannot be operated by its application program, adds the safety of file.
In one of which embodiment, if plural file meets identical pre-conditioned, then to two or more File arranges identical permissions list.
Identical permissions list is set to meeting identical pre-conditioned two or more file, reduces user or mobile phone system The workload of system, makes permissions list obtain multiplexing simultaneously.Wherein in an embodiment, to meeting identical pre-conditioned two Individual above file arranges same permissions list, to save the memory space of cell phone system.
The pre-conditioned condition for pre-setting.
In one of which embodiment, operation file instruction comprise the steps that open file open file instruction, delete literary composition The deletion file instruction of part, the reading file instruction of reading file content, the write file instruction of write file content or duplication The duplication file instruction of file.
Embodiment two
With reference to Fig. 2, as a example by mobile phone, the flow process of an embodiment in the present invention is described.
Step S201, " payment file " is sent by game application to be opened file instruction and reads file instruction;
Step S202, retrieves in the permissions list of " payment file ", if not retrieving the name of game application Word, the most do not perform that application program sends opens file instruction and reads file instruction;
Step S203, " payment file " is sent by payment application to be opened file instruction and reads file instruction;
Step S204, retrieves in the permissions list of " payment file ", if retrieving the name of payment application And retrieve payment application have open file instruction and read file instruction authority, then perform payment application pair What " payment file " sent opens file instruction and reads file instruction.
The technical scheme of the present embodiment, when the permissions list of " payment file " does not has the name of game application, Make game application can not " payment file " be conducted interviews, make " payment file " safer.
Embodiment three
With reference to Fig. 3, the embodiment of the present invention proposes the device of a kind of application program operation file, including:
Respond module 301, is used for: the operation file instruction that response application program sends;
Perform module 302, be used for: application program has the authority that file performs operation file instruction, then if detecting File is performed operation file instruction;Otherwise, file is not performed operation file instruction;Operation file instructs as to carry out file The instruction of operation.
The operation file sent by response application program is instructed, if detecting that application program has file is performed operation The authority of file instruction just makes the mode of application program operation file, makes the file of interior of mobile phone be not applied program and arbitrarily operates And access, thus improve the safety of file, make the vital document in cell phone system be protected.
In one of which embodiment, if detecting, application program has the power that file performs operation file instruction Limit, then performing operation file instruction, specifically including: if finding the name of application program in the permissions list of file file Word, numbering or classification, and if find the operation file that the name with application program, numbering or classification are corresponding in permissions list Instruction, then perform operation file instruction to file;Permissions list saves the application program to file with operating right Name, numbering or classification and application program are allowed to the operation file instruction performing file.
In one of which embodiment, the condition preset that permissions list is met by the type according to file, file Or the content that file preserves is that file is arranged.
In one of which embodiment, if the type of file is encryption type, then level of security is set for file the highest Permissions list, if permissions list is modified, then using the permissions list after change as the permissions list of file.
In one of which embodiment, if plural file meets identical pre-conditioned, then to two or more File arranges identical permissions list.
In one of which embodiment, operation file instruction comprise the steps that open file open file instruction, delete literary composition The deletion file instruction of part, the reading file instruction of reading file content, the write file instruction of write file content or duplication The duplication file instruction of file.
Embodiment four
" payment file " is sent by game application to be opened file instruction and reads file instruction;At " payment file " Retrieving in permissions list, if not retrieving the name of game application, the most do not perform that application program sends opens literary composition Part instruction and reading file instruction;" payment file " is sent by payment application to be opened file instruction and reads file instruction; The permissions list of " payment file " is retrieved, if retrieving the name of payment application and retrieving payment application journey Sequence has to be opened file instruction and reads the authority of file instruction, then perform payment application to beating that " payment file " sends Open file instruction and reading file instruction.
The technical scheme of the present embodiment, when the permissions list of " payment file " does not has the name of game application, Make game application can not " payment file " be conducted interviews, make " payment file " safer.
The embodiment of the present invention further relates to a kind of computer program, and it includes computer-readable medium, described computer Computer-readable recording medium includes: first group of code, the operation file instruction that response application program sends;Second group of code, should if detecting There is by program the authority that file performs operation file instruction, then file is performed operation file instruction;Otherwise, to file not Execution operation file instructs;Operation file instruction is the instruction operating file.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, be permissible Instructing relevant hardware by computer program to complete, described program can be stored in computer read/write memory medium. Program during execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, light Dish, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc..
Based on such understanding, prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words The part of part or this technical scheme can embody with the form of software product, and this computer software product is stored in one In individual storage medium, including some instructions with so that a mobile terminal (can be personal computer, server, or net Network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium includes: U Dish, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), the various medium that can store program code such as magnetic disc or CD.
Device embodiment described above is only schematically, and the wherein said unit illustrated as separating component can To be or to may not be physically separate, the parts shown as unit can be or may not be physics list Unit, i.e. may be located at a place, or can also be distributed on multiple NE.Can be selected it according to the actual needs In some or all of module realize the purpose of embodiment of the present invention scheme.Those of ordinary skill in the art are not paying wound In the case of the work of the property made, i.e. it is appreciated that and implements.
Through the above description of the embodiments, those skilled in the art it can be understood that to each embodiment can The mode adding required general hardware platform by software realizes, naturally it is also possible to realized by hardware.Based on such reason Solving, the part that prior art is contributed by technique scheme the most in other words can embody with the form of software product Coming, this computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD etc., including Some instructions are with so that a computer equipment (can be personal computer, server, or the network equipment etc.) performs each The method described in some part of individual embodiment or embodiment.
Last it is noted that above example is only in order to illustrate the technical scheme of the embodiment of the present invention, rather than it is limited System;Although being described in detail the embodiment of the present invention with reference to previous embodiment, those of ordinary skill in the art should Understand: the technical scheme described in foregoing embodiments still can be modified by it, or to wherein portion of techniques feature Carry out equivalent;And these amendments or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention skill The spirit and scope of art scheme.

Claims (12)

1. the method for an application program operation file, it is characterised in that including:
The operation file instruction that response application program sends, if it is described to detect that described application program has the execution of described file The authority of operation file instruction, then perform the instruction of described operation file to described file;Otherwise, described in described file is not performed Operation file instructs;The instruction of described operation file is the instruction operating described file.
The method of application program operation file the most according to claim 1, it is characterised in that:
Detect that described application program has the authority that described file performs the instruction of described operation file, then to described if described File performs the instruction of described operation file, specifically includes:
If finding the name of described application program, numbering or classification in the permissions list of described file, and if in described power Limit list finds the described operation file instruction corresponding with the name of described application program, numbering or classification, then to described File performs the instruction of described operation file;Described permissions list saves the application program to described file with operating right Name, numbering or classification and the described operation file instruction that is allowed to described file is performed of described application program.
The method of application program operation file the most according to claim 2, it is characterised in that:
The condition preset or the content of file preservation that according to described permissions list, the type of described file, file are met are Described file is arranged.
The method of application program operation file the most according to claim 3, it is characterised in that:
If the type of described file is encryption type, then the described permissions list that level of security is the highest is set for described file, if Described permissions list is modified, then using the described permissions list after change as the described permissions list of described file.
The method of application program operation file the most according to claim 3, it is characterised in that:
If plural described file meets identical pre-conditioned, then file described in two or more is arranged identical described in Permissions list.
6. according to the method for the application program operation file described in any one of claim 1 to 5, it is characterised in that:
The instruction of described operation file includes: that opens file opens file instruction, the deletion file instruction of deletion file, reading literary composition The reading file instruction of part content, the write file instruction of write file content or the duplication file instruction of duplication file.
7. the device of an application program operation file, it is characterised in that including:
Respond module, is used for: the operation file instruction that response application program sends;
Perform module, be used for: described application program has the power that described file performs the instruction of described operation file if detecting Limit, then perform the instruction of described operation file to described file;Otherwise, described file is not performed the instruction of described operation file;Institute Stating operation file instruction is the instruction operating described file.
The device of application program operation file the most according to claim 7, it is characterised in that:
Detect that described application program has the authority that described file performs the instruction of described operation file, then to described if described File performs the instruction of described operation file, specifically includes: if finding described application program in the permissions list of described file Name, numbering or classification, and if finding name, numbering or the classification pair with described application program in described permissions list The described operation file instruction answered, then perform the instruction of described operation file to described file;It is right to save in described permissions list Described file has the name of the application program of operating right, numbering or classification and described application program is allowed to described literary composition The described operation file instruction that part performs.
The device of application program operation file the most according to claim 8, it is characterised in that:
The condition preset or the content of file preservation that according to described permissions list, the type of described file, file are met are Described file is arranged.
The device of application program operation file the most according to claim 9, it is characterised in that:
If the type of described file is encryption type, then the described permissions list that level of security is the highest is set for described file, if Described permissions list is modified, then using the described permissions list after change as the described permissions list of described file.
The device of 11. application program operation files according to claim 9, it is characterised in that:
If plural described file meets identical pre-conditioned, then file described in two or more is arranged identical described in Permissions list.
12. according to the device of the application program operation file described in any one of claim 7 to 11, it is characterised in that:
The instruction of described operation file includes: that opens file opens file instruction, the deletion file instruction of deletion file, reading literary composition The reading file instruction of part content, the write file instruction of write file content or the duplication file instruction of duplication file.
CN201610509395.7A 2016-06-30 2016-06-30 A kind of method and apparatus of application program operation file Pending CN106203159A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610509395.7A CN106203159A (en) 2016-06-30 2016-06-30 A kind of method and apparatus of application program operation file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610509395.7A CN106203159A (en) 2016-06-30 2016-06-30 A kind of method and apparatus of application program operation file

Publications (1)

Publication Number Publication Date
CN106203159A true CN106203159A (en) 2016-12-07

Family

ID=57463972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610509395.7A Pending CN106203159A (en) 2016-06-30 2016-06-30 A kind of method and apparatus of application program operation file

Country Status (1)

Country Link
CN (1) CN106203159A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709034A (en) * 2016-12-29 2017-05-24 广东欧珀移动通信有限公司 File protection method and apparatus, and terminal
CN107798252A (en) * 2017-10-27 2018-03-13 维沃移动通信有限公司 A kind of file access method and mobile terminal
CN108959951A (en) * 2017-05-19 2018-12-07 北京瑞星网安技术股份有限公司 Method, apparatus, equipment and the readable storage medium storing program for executing of document security protection
CN111753286A (en) * 2020-06-16 2020-10-09 Oppo广东移动通信有限公司 Terminal device monitoring method and device, terminal device and storage medium
CN113032830A (en) * 2021-03-26 2021-06-25 北京有竹居网络技术有限公司 Electronic equipment control method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131725A (en) * 2007-05-16 2008-02-27 何鸿君 File access control method
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method
CN104680084A (en) * 2015-03-20 2015-06-03 北京瑞星信息技术有限公司 Method and system for protecting user privacy in computer
CN104951708A (en) * 2015-06-11 2015-09-30 浪潮电子信息产业股份有限公司 File measurement and protection method and device
CN105528553A (en) * 2014-09-30 2016-04-27 中国移动通信集团公司 A method and a device for secure sharing of data and a terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131725A (en) * 2007-05-16 2008-02-27 何鸿君 File access control method
CN105528553A (en) * 2014-09-30 2016-04-27 中国移动通信集团公司 A method and a device for secure sharing of data and a terminal
CN104680079A (en) * 2015-02-04 2015-06-03 上海信息安全工程技术研究中心 Electronic document security management system and electronic document security management method
CN104680084A (en) * 2015-03-20 2015-06-03 北京瑞星信息技术有限公司 Method and system for protecting user privacy in computer
CN104951708A (en) * 2015-06-11 2015-09-30 浪潮电子信息产业股份有限公司 File measurement and protection method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709034A (en) * 2016-12-29 2017-05-24 广东欧珀移动通信有限公司 File protection method and apparatus, and terminal
CN108959951A (en) * 2017-05-19 2018-12-07 北京瑞星网安技术股份有限公司 Method, apparatus, equipment and the readable storage medium storing program for executing of document security protection
CN107798252A (en) * 2017-10-27 2018-03-13 维沃移动通信有限公司 A kind of file access method and mobile terminal
CN107798252B (en) * 2017-10-27 2019-10-18 维沃移动通信有限公司 A kind of file access method and mobile terminal
CN111753286A (en) * 2020-06-16 2020-10-09 Oppo广东移动通信有限公司 Terminal device monitoring method and device, terminal device and storage medium
CN113032830A (en) * 2021-03-26 2021-06-25 北京有竹居网络技术有限公司 Electronic equipment control method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN106203159A (en) A kind of method and apparatus of application program operation file
CN102254124B (en) A kind of information of mobile terminal security protection system and method
US9077728B1 (en) Systems and methods for managing access-control groups
US7770227B2 (en) Right information management method and right information management device
US9003542B1 (en) Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same
US9286486B2 (en) System and method for copying files between encrypted and unencrypted data storage devices
CN101840471B (en) Document right control method and device
CN102063583A (en) Data exchange method for mobile storage medium and device thereof
CN106971120A (en) A kind of method, device and computing device for realizing file protection
CN101236531B (en) Memory and its automatic protection realization method
CN105630855B (en) File sharing method, shared file system and terminal
US9245132B1 (en) Systems and methods for data loss prevention
CN106682504B (en) A kind of method, apparatus for preventing file from maliciously being edited and electronic equipment
CN105468999B (en) data encryption method and mobile hard disk
CN112580066A (en) Data protection method and device
CN106503570A (en) The method and device of protection Root authority
CN207133828U (en) Unstructured data filing apparatus
EP3739490A1 (en) Server and control method thereof
CN103761487A (en) Hiding method and device of files
CN108092946A (en) A kind of method and system for having secure access to network
CN104866761B (en) A kind of high security Android intelligent terminal
KR20130079004A (en) Mobile data loss prevention system and method for providing virtual security environment using file system virtualization on smart phone
CN110084057A (en) Safety access method, device, equipment and the storage medium of vital document
US20170094502A1 (en) Management method, management device and terminal for contacts in terminal
CN108319701A (en) Map datum integrated conduct method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161207