CN106203159A - A kind of method and apparatus of application program operation file - Google Patents
A kind of method and apparatus of application program operation file Download PDFInfo
- Publication number
- CN106203159A CN106203159A CN201610509395.7A CN201610509395A CN106203159A CN 106203159 A CN106203159 A CN 106203159A CN 201610509395 A CN201610509395 A CN 201610509395A CN 106203159 A CN106203159 A CN 106203159A
- Authority
- CN
- China
- Prior art keywords
- file
- instruction
- application program
- permissions list
- operation file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present invention proposes the method and apparatus of a kind of application program operation file, relates to areas of information technology.The method includes: the operation file instruction that response application program sends, if detecting, described application program has the authority that described file performs the instruction of described operation file, then described file performs the instruction of described operation file;Otherwise, described file is not performed the instruction of described operation file;The instruction of described operation file is the instruction operating described file.This programme makes the file of interior of mobile phone be not applied program arbitrarily to operate and access, thus improves the safety of file, makes the vital document in cell phone system be protected.
Description
Technical field
The present embodiments relate to areas of information technology, particularly relate to method and the dress of a kind of application program operation file
Put.
Background technology
At present, utilize the situation of mobile-phone payment expense to get more and more, and payment application or payment function are running
Time can produce some files, if these files are by random access, are likely to result in the leakage of user's payment information, make to user
Become loss.Meanwhile, some vital documents, when using mobile phone, can be saved in by user such as the file of record password or log-on message
In mobile phone, in case forgetting Password or checking during log-on message, if these files are by random access, can cause the user damage equally
Lose.
But, inventor, during realizing the present invention, finds that the application program installed on current mobile phone gets more and more,
And these application programs the most all can require to have the file of mobile phone access rights, make the peace of the file of storage on mobile phone
There is major hidden danger in full property.
Therefore, it is necessary to improvement drawbacks mentioned above.
Summary of the invention
Based on problem above, the embodiment of the present invention proposes the method and apparatus of a kind of application program operation file, by sound
Answering the operation file instruction that application program sends, if detecting, application program has the authority that file performs operation file instruction
Just make the mode of application program operation file, make the file of interior of mobile phone be not applied program and arbitrarily operate and access, thus carry
The high safety of file, makes the vital document in cell phone system be protected.
On the one hand, the embodiment of the present invention proposes a kind of method of application program operation file, including:
The operation file instruction that response application program sends, performs described file if detecting that described application program has
The authority of described operation file instruction, then perform the instruction of described operation file to described file;Otherwise, described file is not performed
Described operation file instructs;The instruction of described operation file is the instruction operating described file.
If detecting that described application program has the power that described file performs the instruction of described operation file additionally, described
Limit, then performing the instruction of described operation file, may particularly include: if finding in the permissions list of described file described file
The name of described application program, numbering or classification, and if find in described permissions list the name with described application program,
Numbering or classification corresponding described operation file instruction, then to described file perform described operation file instruction;Described authority arranges
Table saves described file is had the name of application program, numbering or the classification of operating right and described application program quilt
Allow the described operation file instruction that described file is performed.
Additionally, the condition preset or file that according to described permissions list, the type of described file, file are met are protected
The content deposited is that described file is arranged.
If additionally, the type of described file is encryption type, then arranging, for described file, the described power that level of security is the highest
Limit list, if described permissions list is modified, then arranges using the described permissions list after change as the described authority of described file
Table.
If additionally, plural described file meets identical pre-conditioned, then file described in two or more being arranged
Identical described permissions list.
Additionally, described operation file instruction comprise the steps that open file open file instruction, delete file deletion file
Instruct, read the duplication literary composition reading file instruction, the write file instruction of write file content or duplication file of file content
Part instructs.
On the other hand, the embodiment of the present invention proposes the device of a kind of application program operation file, including:
Respond module, is used for: the operation file instruction that response application program sends;
Performing module, be used for: performing the instruction of described operation file if detecting described application program to have described file
Authority, then to described file perform described operation file instruction;Otherwise, described file is not performed described operation file to refer to
Order;The instruction of described operation file is the instruction operating described file.
If detecting that described application program has the power that described file performs the instruction of described operation file additionally, described
Limit, then performing the instruction of described operation file, may particularly include: if finding in the permissions list of described file described file
The name of described application program, numbering or classification, and if find in described permissions list the name with described application program,
Numbering or classification corresponding described operation file instruction, then to described file perform described operation file instruction;Described authority arranges
Table saves described file is had the name of application program, numbering or the classification of operating right and described application program quilt
Allow the described operation file instruction that described file is performed.
Additionally, the condition preset or file that according to described permissions list, the type of described file, file are met are protected
The content deposited is that described file is arranged.
If additionally, the type of described file is encryption type, then arranging, for described file, the described power that level of security is the highest
Limit list, if described permissions list is modified, then arranges using the described permissions list after change as the described authority of described file
Table.
If additionally, plural described file meets identical pre-conditioned, then file described in two or more being arranged
Identical described permissions list.
Additionally, described operation file instruction comprise the steps that open file open file instruction, delete file deletion file
Instruct, read the duplication literary composition reading file instruction, the write file instruction of write file content or duplication file of file content
Part instructs.
Use technique scheme, have the advantages that
The operation file sent by response application program is instructed, if detecting that application program has file is performed operation
The authority of file instruction just makes the mode of application program operation file, makes the file of interior of mobile phone be not applied program and arbitrarily operates
And access, thus improve the safety of file, make the vital document in cell phone system be protected.
Accompanying drawing explanation
Fig. 1 is the flow chart of the method for application program operation file according to an embodiment of the invention;
Fig. 2 is the flow chart of the method for application program operation file in accordance with another embodiment of the present invention;
Fig. 3 is the block diagram of the device of application program operation file in accordance with another embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
The a part of embodiment of the present invention rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under not making creative work premise, broadly falls into the scope of protection of the invention.
Embodiment one
With reference to Fig. 1, the embodiment of the present invention proposes a kind of method of application program operation file, including:
Step S001, the operation file instruction that response application program sends;
Step S002, if detecting, application program has the authority that file performs operation file instruction, then hold file
Row operation file instructs;Otherwise, file is not performed operation file instruction;Operation file instruction is the finger operating file
Order.
Application program in the embodiment of the present invention is for set in mobile phone, panel computer, computer, intelligent watch or other intelligence
The application program of standby upper installation.
Application program the operation of file is comprised the steps that open file open file instruction, delete file deletion file
Instruct, read the duplication literary composition reading file instruction, the write file instruction of write file content or duplication file of file content
Part instructs.
As a example by application program on mobile phone sends operation file instruction to file, when receiving the behaviour that application program sends
After making file instruction, cell phone system detects, if detecting, application program has the power that file performs operation file instruction
Limit, then perform operation file instruction to file;Otherwise, file is not performed operation file instruction.
Whether detection application program has the method for the authority that file performs operation file instruction, is exemplified below:
First kind of way, file header or end-of-file at file increase authority memory area, in authority memory area
This document is had the name of application program, numbering or the classification of operating right and corresponding write application program to be allowed to by write
The operation file instruction performed, illustrates such as: " phone/open ", represents " phone " this application program and can perform file
" open " this operation file instructs.
The second way, writes the name of the application program having operating right to this document, numbering in the attribute of file
Or classification and corresponding write application program are allowed to the operation file instruction performed.
The third mode, increases an authority to each file, for write, this document is had operating right
The name of application program, numbering or classification and corresponding write application program are allowed to the operation file instruction performed.Or
The same file following multiple files of folder are increased an authority, for write each different file corresponding to this article
Part has the name of the application program of operating right, numbering or classification and corresponding write application program to be allowed to the operation performed
File instruction.In one of which embodiment, file is had the name of the application program of operating right, numbering or classification with
And the operation file instruction that application program is allowed to perform is stored in authority in the way of form.One of which
In embodiment, owing to the file in cell phone system is the most, so only the file of part need for confidentiality need to be increased application journey
Whether sequence has the detection of the authority that file performs operation file instruction.
The operation file sent by response application program is instructed, if detecting that application program has file is performed operation
The authority of file instruction just makes the mode of application program operation file, makes the file of interior of mobile phone be not applied program and arbitrarily operates
And access, thus improve the safety of file, make the vital document in cell phone system be protected.
In one of which embodiment, if detecting, application program has the power that file performs operation file instruction
Limit, then performing operation file instruction, may particularly include: if finding the name of application program in the permissions list of file file
Word, numbering or classification, and if find the operation file that the name with application program, numbering or classification are corresponding in permissions list
Instruction, then perform operation file instruction to file;Permissions list saves the application program to file with operating right
Name, numbering or classification and application program are allowed to the operation file instruction performing file.
By the inside of file increase an authority region, in authority region in the way of permissions list record to literary composition
Part has the name of the application program of operating right, numbering or classification and application program is allowed to the operation literary composition to file execution
Part instructs.
Or file is increased an authority, and in authority, in the way of permissions list, file is had by record
The operation file that the name of the application program of operating right, numbering or classification and application program are allowed to perform file refers to
Order.
Table 1 illustrates have the application program of " apps tore " this name file is able to carry out " open " and
" read " the two operation file instructs." open " represent open file open file instruction, " read " represents and reads file
Reading file instruction.
Table 1
Table 2 illustrates and belongs to the application program of " store " this classification file is able to carry out " open " this behaviour
Make file instruction.
There is the classification of the application program of authority | Operation file executable to file instructs |
store | open |
Table 2
It is allowed to literary composition by writing the name of application program, numbering or classification and application program in permissions list
The mode of the operation file instruction that part performs, makes application program before operation file, verifies application program, to having permission
Application program just allow its operation file.Avoiding any program can the problem of file within operating handset.
In one of which embodiment, the condition preset that permissions list is met by the type according to file, file
Or the content that file preserves is that file is arranged.
Content in the permissions list increase file is write direct by user, and user such as records close according to the type of file
The file of code type, select file write instrument by be allowed to the name of the application program of operation file, numbering or classification with
And the operation file instruction that application program is allowed to perform file writes.
Or, cell phone system automatically the file of interior of mobile phone is scanned, when type or file that file detected
The content preserved meets default condition, then file is increased permissions list.As: detect in the content that file preserves and include
During " password " printed words, file is increased permissions list.In one of which embodiment, to permissions list unified write content,
Make the content in the permissions list of file consistent.
The condition preset or the content of file preservation that type according to file, file are met are that file arranges authority row
Table, makes only to arrange the file being necessary to arrange permissions list, thus decreases the workload of user or cell phone system.
In one of which embodiment, if the type of file is encryption type, then level of security is set for file the highest
Permissions list, if permissions list is modified, then using the permissions list after change as the permissions list of file.
When type file being detected is encryption type, now cell phone system is the power that file arranges that level of security is the highest
Limit list, wherein in an embodiment, the permissions list that level of security is the highest is the application program only allowing to produce this document
Operating it, other application program is all without operating right.After the permissions list of file is modified by user, user is changed
After permissions list preserve, as the permissions list of file.By the file of encryption type is arranged the power that level of security is the highest
Limit list so that it is it cannot be operated by its application program, adds the safety of file.
In one of which embodiment, if plural file meets identical pre-conditioned, then to two or more
File arranges identical permissions list.
Identical permissions list is set to meeting identical pre-conditioned two or more file, reduces user or mobile phone system
The workload of system, makes permissions list obtain multiplexing simultaneously.Wherein in an embodiment, to meeting identical pre-conditioned two
Individual above file arranges same permissions list, to save the memory space of cell phone system.
The pre-conditioned condition for pre-setting.
In one of which embodiment, operation file instruction comprise the steps that open file open file instruction, delete literary composition
The deletion file instruction of part, the reading file instruction of reading file content, the write file instruction of write file content or duplication
The duplication file instruction of file.
Embodiment two
With reference to Fig. 2, as a example by mobile phone, the flow process of an embodiment in the present invention is described.
Step S201, " payment file " is sent by game application to be opened file instruction and reads file instruction;
Step S202, retrieves in the permissions list of " payment file ", if not retrieving the name of game application
Word, the most do not perform that application program sends opens file instruction and reads file instruction;
Step S203, " payment file " is sent by payment application to be opened file instruction and reads file instruction;
Step S204, retrieves in the permissions list of " payment file ", if retrieving the name of payment application
And retrieve payment application have open file instruction and read file instruction authority, then perform payment application pair
What " payment file " sent opens file instruction and reads file instruction.
The technical scheme of the present embodiment, when the permissions list of " payment file " does not has the name of game application,
Make game application can not " payment file " be conducted interviews, make " payment file " safer.
Embodiment three
With reference to Fig. 3, the embodiment of the present invention proposes the device of a kind of application program operation file, including:
Respond module 301, is used for: the operation file instruction that response application program sends;
Perform module 302, be used for: application program has the authority that file performs operation file instruction, then if detecting
File is performed operation file instruction;Otherwise, file is not performed operation file instruction;Operation file instructs as to carry out file
The instruction of operation.
The operation file sent by response application program is instructed, if detecting that application program has file is performed operation
The authority of file instruction just makes the mode of application program operation file, makes the file of interior of mobile phone be not applied program and arbitrarily operates
And access, thus improve the safety of file, make the vital document in cell phone system be protected.
In one of which embodiment, if detecting, application program has the power that file performs operation file instruction
Limit, then performing operation file instruction, specifically including: if finding the name of application program in the permissions list of file file
Word, numbering or classification, and if find the operation file that the name with application program, numbering or classification are corresponding in permissions list
Instruction, then perform operation file instruction to file;Permissions list saves the application program to file with operating right
Name, numbering or classification and application program are allowed to the operation file instruction performing file.
In one of which embodiment, the condition preset that permissions list is met by the type according to file, file
Or the content that file preserves is that file is arranged.
In one of which embodiment, if the type of file is encryption type, then level of security is set for file the highest
Permissions list, if permissions list is modified, then using the permissions list after change as the permissions list of file.
In one of which embodiment, if plural file meets identical pre-conditioned, then to two or more
File arranges identical permissions list.
In one of which embodiment, operation file instruction comprise the steps that open file open file instruction, delete literary composition
The deletion file instruction of part, the reading file instruction of reading file content, the write file instruction of write file content or duplication
The duplication file instruction of file.
Embodiment four
" payment file " is sent by game application to be opened file instruction and reads file instruction;At " payment file "
Retrieving in permissions list, if not retrieving the name of game application, the most do not perform that application program sends opens literary composition
Part instruction and reading file instruction;" payment file " is sent by payment application to be opened file instruction and reads file instruction;
The permissions list of " payment file " is retrieved, if retrieving the name of payment application and retrieving payment application journey
Sequence has to be opened file instruction and reads the authority of file instruction, then perform payment application to beating that " payment file " sends
Open file instruction and reading file instruction.
The technical scheme of the present embodiment, when the permissions list of " payment file " does not has the name of game application,
Make game application can not " payment file " be conducted interviews, make " payment file " safer.
The embodiment of the present invention further relates to a kind of computer program, and it includes computer-readable medium, described computer
Computer-readable recording medium includes: first group of code, the operation file instruction that response application program sends;Second group of code, should if detecting
There is by program the authority that file performs operation file instruction, then file is performed operation file instruction;Otherwise, to file not
Execution operation file instructs;Operation file instruction is the instruction operating file.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, be permissible
Instructing relevant hardware by computer program to complete, described program can be stored in computer read/write memory medium.
Program during execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, light
Dish, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory,
RAM) etc..
Based on such understanding, prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words
The part of part or this technical scheme can embody with the form of software product, and this computer software product is stored in one
In individual storage medium, including some instructions with so that a mobile terminal (can be personal computer, server, or net
Network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium includes: U
Dish, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access
Memory), the various medium that can store program code such as magnetic disc or CD.
Device embodiment described above is only schematically, and the wherein said unit illustrated as separating component can
To be or to may not be physically separate, the parts shown as unit can be or may not be physics list
Unit, i.e. may be located at a place, or can also be distributed on multiple NE.Can be selected it according to the actual needs
In some or all of module realize the purpose of embodiment of the present invention scheme.Those of ordinary skill in the art are not paying wound
In the case of the work of the property made, i.e. it is appreciated that and implements.
Through the above description of the embodiments, those skilled in the art it can be understood that to each embodiment can
The mode adding required general hardware platform by software realizes, naturally it is also possible to realized by hardware.Based on such reason
Solving, the part that prior art is contributed by technique scheme the most in other words can embody with the form of software product
Coming, this computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD etc., including
Some instructions are with so that a computer equipment (can be personal computer, server, or the network equipment etc.) performs each
The method described in some part of individual embodiment or embodiment.
Last it is noted that above example is only in order to illustrate the technical scheme of the embodiment of the present invention, rather than it is limited
System;Although being described in detail the embodiment of the present invention with reference to previous embodiment, those of ordinary skill in the art should
Understand: the technical scheme described in foregoing embodiments still can be modified by it, or to wherein portion of techniques feature
Carry out equivalent;And these amendments or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention skill
The spirit and scope of art scheme.
Claims (12)
1. the method for an application program operation file, it is characterised in that including:
The operation file instruction that response application program sends, if it is described to detect that described application program has the execution of described file
The authority of operation file instruction, then perform the instruction of described operation file to described file;Otherwise, described in described file is not performed
Operation file instructs;The instruction of described operation file is the instruction operating described file.
The method of application program operation file the most according to claim 1, it is characterised in that:
Detect that described application program has the authority that described file performs the instruction of described operation file, then to described if described
File performs the instruction of described operation file, specifically includes:
If finding the name of described application program, numbering or classification in the permissions list of described file, and if in described power
Limit list finds the described operation file instruction corresponding with the name of described application program, numbering or classification, then to described
File performs the instruction of described operation file;Described permissions list saves the application program to described file with operating right
Name, numbering or classification and the described operation file instruction that is allowed to described file is performed of described application program.
The method of application program operation file the most according to claim 2, it is characterised in that:
The condition preset or the content of file preservation that according to described permissions list, the type of described file, file are met are
Described file is arranged.
The method of application program operation file the most according to claim 3, it is characterised in that:
If the type of described file is encryption type, then the described permissions list that level of security is the highest is set for described file, if
Described permissions list is modified, then using the described permissions list after change as the described permissions list of described file.
The method of application program operation file the most according to claim 3, it is characterised in that:
If plural described file meets identical pre-conditioned, then file described in two or more is arranged identical described in
Permissions list.
6. according to the method for the application program operation file described in any one of claim 1 to 5, it is characterised in that:
The instruction of described operation file includes: that opens file opens file instruction, the deletion file instruction of deletion file, reading literary composition
The reading file instruction of part content, the write file instruction of write file content or the duplication file instruction of duplication file.
7. the device of an application program operation file, it is characterised in that including:
Respond module, is used for: the operation file instruction that response application program sends;
Perform module, be used for: described application program has the power that described file performs the instruction of described operation file if detecting
Limit, then perform the instruction of described operation file to described file;Otherwise, described file is not performed the instruction of described operation file;Institute
Stating operation file instruction is the instruction operating described file.
The device of application program operation file the most according to claim 7, it is characterised in that:
Detect that described application program has the authority that described file performs the instruction of described operation file, then to described if described
File performs the instruction of described operation file, specifically includes: if finding described application program in the permissions list of described file
Name, numbering or classification, and if finding name, numbering or the classification pair with described application program in described permissions list
The described operation file instruction answered, then perform the instruction of described operation file to described file;It is right to save in described permissions list
Described file has the name of the application program of operating right, numbering or classification and described application program is allowed to described literary composition
The described operation file instruction that part performs.
The device of application program operation file the most according to claim 8, it is characterised in that:
The condition preset or the content of file preservation that according to described permissions list, the type of described file, file are met are
Described file is arranged.
The device of application program operation file the most according to claim 9, it is characterised in that:
If the type of described file is encryption type, then the described permissions list that level of security is the highest is set for described file, if
Described permissions list is modified, then using the described permissions list after change as the described permissions list of described file.
The device of 11. application program operation files according to claim 9, it is characterised in that:
If plural described file meets identical pre-conditioned, then file described in two or more is arranged identical described in
Permissions list.
12. according to the device of the application program operation file described in any one of claim 7 to 11, it is characterised in that:
The instruction of described operation file includes: that opens file opens file instruction, the deletion file instruction of deletion file, reading literary composition
The reading file instruction of part content, the write file instruction of write file content or the duplication file instruction of duplication file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610509395.7A CN106203159A (en) | 2016-06-30 | 2016-06-30 | A kind of method and apparatus of application program operation file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610509395.7A CN106203159A (en) | 2016-06-30 | 2016-06-30 | A kind of method and apparatus of application program operation file |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106203159A true CN106203159A (en) | 2016-12-07 |
Family
ID=57463972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610509395.7A Pending CN106203159A (en) | 2016-06-30 | 2016-06-30 | A kind of method and apparatus of application program operation file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106203159A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709034A (en) * | 2016-12-29 | 2017-05-24 | 广东欧珀移动通信有限公司 | File protection method and apparatus, and terminal |
CN107798252A (en) * | 2017-10-27 | 2018-03-13 | 维沃移动通信有限公司 | A kind of file access method and mobile terminal |
CN108959951A (en) * | 2017-05-19 | 2018-12-07 | 北京瑞星网安技术股份有限公司 | Method, apparatus, equipment and the readable storage medium storing program for executing of document security protection |
CN111753286A (en) * | 2020-06-16 | 2020-10-09 | Oppo广东移动通信有限公司 | Terminal device monitoring method and device, terminal device and storage medium |
CN113032830A (en) * | 2021-03-26 | 2021-06-25 | 北京有竹居网络技术有限公司 | Electronic equipment control method and device and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131725A (en) * | 2007-05-16 | 2008-02-27 | 何鸿君 | File access control method |
CN104680079A (en) * | 2015-02-04 | 2015-06-03 | 上海信息安全工程技术研究中心 | Electronic document security management system and electronic document security management method |
CN104680084A (en) * | 2015-03-20 | 2015-06-03 | 北京瑞星信息技术有限公司 | Method and system for protecting user privacy in computer |
CN104951708A (en) * | 2015-06-11 | 2015-09-30 | 浪潮电子信息产业股份有限公司 | File measurement and protection method and device |
CN105528553A (en) * | 2014-09-30 | 2016-04-27 | 中国移动通信集团公司 | A method and a device for secure sharing of data and a terminal |
-
2016
- 2016-06-30 CN CN201610509395.7A patent/CN106203159A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131725A (en) * | 2007-05-16 | 2008-02-27 | 何鸿君 | File access control method |
CN105528553A (en) * | 2014-09-30 | 2016-04-27 | 中国移动通信集团公司 | A method and a device for secure sharing of data and a terminal |
CN104680079A (en) * | 2015-02-04 | 2015-06-03 | 上海信息安全工程技术研究中心 | Electronic document security management system and electronic document security management method |
CN104680084A (en) * | 2015-03-20 | 2015-06-03 | 北京瑞星信息技术有限公司 | Method and system for protecting user privacy in computer |
CN104951708A (en) * | 2015-06-11 | 2015-09-30 | 浪潮电子信息产业股份有限公司 | File measurement and protection method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709034A (en) * | 2016-12-29 | 2017-05-24 | 广东欧珀移动通信有限公司 | File protection method and apparatus, and terminal |
CN108959951A (en) * | 2017-05-19 | 2018-12-07 | 北京瑞星网安技术股份有限公司 | Method, apparatus, equipment and the readable storage medium storing program for executing of document security protection |
CN107798252A (en) * | 2017-10-27 | 2018-03-13 | 维沃移动通信有限公司 | A kind of file access method and mobile terminal |
CN107798252B (en) * | 2017-10-27 | 2019-10-18 | 维沃移动通信有限公司 | A kind of file access method and mobile terminal |
CN111753286A (en) * | 2020-06-16 | 2020-10-09 | Oppo广东移动通信有限公司 | Terminal device monitoring method and device, terminal device and storage medium |
CN113032830A (en) * | 2021-03-26 | 2021-06-25 | 北京有竹居网络技术有限公司 | Electronic equipment control method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106203159A (en) | A kind of method and apparatus of application program operation file | |
CN102254124B (en) | A kind of information of mobile terminal security protection system and method | |
US9077728B1 (en) | Systems and methods for managing access-control groups | |
US7770227B2 (en) | Right information management method and right information management device | |
US9003542B1 (en) | Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same | |
US9286486B2 (en) | System and method for copying files between encrypted and unencrypted data storage devices | |
CN101840471B (en) | Document right control method and device | |
CN102063583A (en) | Data exchange method for mobile storage medium and device thereof | |
CN106971120A (en) | A kind of method, device and computing device for realizing file protection | |
CN101236531B (en) | Memory and its automatic protection realization method | |
CN105630855B (en) | File sharing method, shared file system and terminal | |
US9245132B1 (en) | Systems and methods for data loss prevention | |
CN106682504B (en) | A kind of method, apparatus for preventing file from maliciously being edited and electronic equipment | |
CN105468999B (en) | data encryption method and mobile hard disk | |
CN112580066A (en) | Data protection method and device | |
CN106503570A (en) | The method and device of protection Root authority | |
CN207133828U (en) | Unstructured data filing apparatus | |
EP3739490A1 (en) | Server and control method thereof | |
CN103761487A (en) | Hiding method and device of files | |
CN108092946A (en) | A kind of method and system for having secure access to network | |
CN104866761B (en) | A kind of high security Android intelligent terminal | |
KR20130079004A (en) | Mobile data loss prevention system and method for providing virtual security environment using file system virtualization on smart phone | |
CN110084057A (en) | Safety access method, device, equipment and the storage medium of vital document | |
US20170094502A1 (en) | Management method, management device and terminal for contacts in terminal | |
CN108319701A (en) | Map datum integrated conduct method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161207 |