CN106293495A - The date storage method of terminal unit and terminal unit - Google Patents

The date storage method of terminal unit and terminal unit Download PDF

Info

Publication number
CN106293495A
CN106293495A CN201510266837.5A CN201510266837A CN106293495A CN 106293495 A CN106293495 A CN 106293495A CN 201510266837 A CN201510266837 A CN 201510266837A CN 106293495 A CN106293495 A CN 106293495A
Authority
CN
China
Prior art keywords
data
stored
terminal unit
storage
escape
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510266837.5A
Other languages
Chinese (zh)
Inventor
魏明业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510266837.5A priority Critical patent/CN106293495A/en
Priority to PCT/CN2015/096304 priority patent/WO2016188079A1/en
Publication of CN106293495A publication Critical patent/CN106293495A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses the date storage method of a kind of terminal unit, the date storage method of described terminal unit comprises the following steps: obtain the data to be stored of terminal unit;Judge that described data to be stored are private data or unclassified data;If described data to be stored are private datas, then described data to be stored are encrypted, and the data to be stored after encrypted process are stored in storage card.The invention also discloses a kind of terminal unit.The data to be stored of terminal unit can be made a distinction storage based on storage card by the date storage method of the terminal unit that the present invention provides and terminal unit, it is to avoid the phenomenon of the storage loss of data that terminal unit causes when damaging.

Description

The date storage method of terminal unit and terminal unit
Technical field
The present invention relates to communication technique field, particularly relate to date storage method and the end of a kind of terminal unit End equipment.
Background technology
The security informations such as the note of the most increasing intelligent terminal's such as mobile phone and phone directory can only be stored in Mobile phone side could normally be read, and when mobile phone damages or loses, the storage card of mobile phone terminal such as SIM is then Cannot be distinguished by these information is security information or unclassified information, thus causes information dropout.
Foregoing is only used for auxiliary and understands technical scheme, does not represent and recognizes that foregoing is Prior art.
Summary of the invention
Present invention is primarily targeted at date storage method and the terminal unit that a kind of terminal unit is provided, It is intended to, based on storage card, the data to be stored of terminal unit are made a distinction storage, it is to avoid terminal unit damages The phenomenon of Shi Zaocheng storage loss of data.
For achieving the above object, the present invention provides the date storage method of a kind of terminal unit, described terminal Equipment includes that common territory and security domain, the date storage method of described terminal unit comprise the following steps:
Obtain the data to be stored of terminal unit;
Judge that described data to be stored are private data or unclassified data;
If described data to be stored are private datas, then described data to be stored are encrypted, and Data to be stored after encrypted process are stored in storage card.
Preferably, described terminal unit includes common territory and security domain, if described data to be stored are Private data, then be encrypted described data to be stored, and to be stored by after encrypted process Data are stored in the step of storage card and include:
If described data to be stored are private datas, then described data to be stored are put into security domain;
Extract the header file of data to be stored described in security domain;
Described header file is carried out escape process, obtains escape data;
It is pre-encrypted described escape data processing, obtains encryption data;
Described encryption data is stored in described storage card.
Preferably, described described header file being carried out escape process, the step obtaining escape data is further Including:
Described header file is carried out alphabetic character mapping or character resolution processes, obtain escape data.
Preferably, if described data to be stored are private datas, then described data to be stored are carried out Encryption, and also include after the data to be stored after encrypted process are stored in the step of storage card:
Obtain the storage data in described storage card;
Judge that described storage data are in common territory or security domain;
If described storage data are in security domain, then described storage data are decrypted process;
Storage data after being decrypted process show on the terminal device, read for user.
Preferably, if described storage data are in security domain, then described storage data are decrypted The step processed includes:
If described storage data are in security domain, then receiving and deciphering password;
Judge that described clear crytpographic key is the most consistent with pre-encrypt password;
If consistent, then the storage data after being decrypted process are carried out escape process.
Preferably, the described data to be stored of described judgement be private data or unclassified data step it After also include:
If described data to be stored are non-private datas, then described data to be stored are stored in described storage Card.
Additionally, for achieving the above object, the present invention also provides for a kind of terminal unit, described terminal unit bag Include:
First acquisition module, for obtaining the data to be stored of terminal unit;
First judge module, is used for judging that described data to be stored are private data or unclassified data;
Encryption memory module, if being private data for described data to be stored, then to described number to be stored According to being encrypted, and the data to be stored after encrypted process are stored in storage card.
Described terminal unit includes that common territory and security domain, described encryption memory module include:
First memory element, if being private data for described data to be stored, then by described number to be stored According to putting into security domain;
Extraction unit, for extracting the header file of data to be stored described in security domain;
First escape processing unit, for described header file is carried out escape process, obtains escape data;
Cryptographic processing unit, for described escape data is pre-encrypted process, obtains encryption data;
Second memory element, for being stored in described storage card by described encryption data.
Preferably, described first escape processing unit is further used for:
Described header file is carried out alphabetic character mapping or character resolution processes, obtain escape data.
Preferably, described terminal unit also includes:
Second acquisition module, for obtaining the storage data in described storage card;
Second judge module, is used for judging that described storage data are in common territory or security domain;
Described storage data if being in security domain for described storage data, are then solved by processing module Close and escape processes;
Display module, the storage data after being decrypted process show on the terminal device, with Read for user.
Preferably, described processing module includes:
Receive unit, if being in security domain for described storage data, then receiving and deciphering password;
Judging unit, is used for judging that described clear crytpographic key is the most consistent with pre-encrypt password;
Storage data after being decrypted process if for consistent, then are carried out turning by the second escape processing unit Justice processes.
Preferably, described terminal unit also includes:
Directly memory module, if being non-private data for described data to be stored, then by described to be stored Data are stored in described storage card.
The date storage method of the terminal unit that the present invention provides and terminal unit, by obtaining terminal unit Data to be stored, it is judged that described data to be stored are private data or unclassified data, if described in treat Storage data are private datas, then be encrypted described data to be stored, and by encrypted process After data to be stored be stored in storage card.So, by based on the storage card security domain to terminal unit Make a distinction storage with the data in common territory, be possible not only to ensure the safety of data storage, it is also possible to keep away Exempt from the phenomenon of the storage loss of data caused when terminal unit damages.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of date storage method one embodiment of terminal unit of the present invention;
Fig. 2 is the refinement schematic flow sheet of step S103 in Fig. 1;
Fig. 3 is the schematic flow sheet of another embodiment of date storage method of terminal unit of the present invention;
Fig. 4 is the refinement schematic flow sheet of step S108 in Fig. 3;
Fig. 5 is the high-level schematic functional block diagram of terminal unit one embodiment of the present invention;
Fig. 6 is the refinement high-level schematic functional block diagram encrypting memory module in Fig. 5;
Fig. 7 is the high-level schematic functional block diagram of another embodiment of terminal unit of the present invention;
Fig. 8 is the refinement high-level schematic functional block diagram of the second processing module in Fig. 7.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, do referring to the drawings further Explanation.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not used to limit Determine the present invention.
The present invention provides the date storage method of a kind of terminal unit, with reference to Fig. 1, in one embodiment, institute The date storage method stating terminal unit comprises the following steps:
Step S101, obtains the data to be stored of terminal unit;
In the present embodiment, terminal unit is preferably the mobile terminals such as mobile phone.As a example by mobile phone, described in wait to deposit Storage data can be the information such as note, address list, photo, memorandum.
Step S102, it is judged that described data to be stored are private data or unclassified data;
In the present embodiment, terminal unit according to the attributive judgment of data to be stored be private data be also non-guarantor Ciphertext data.As a example by mobile phone, note, address list, photo, memorandum, voice and video, QQ chat note Record and wechat chat record etc. belong to private data, and everything does is unclassified data.At other In embodiment, other private datas can be selected according to actual needs, it is not limited to the present embodiment.
Described data to be stored if described data to be stored are private datas, are then added by step S103 Close process, and the data to be stored after encrypted process are stored in storage card;
In the present embodiment, encryption includes the processing mode of escape and preset password, and storage card includes SIM (Subscriber Identity Module, client identification module card) and SD card (SD card Secure Digital Memory Card, safe digital card) etc., in other embodiments, can be selected it His type of storage card, it is not limited to the present embodiment.
Described data to be stored if described data to be stored are non-private datas, are then stored by step S104 In described storage card.
In the present embodiment, data to be stored are judged by terminal unit, if described data right and wrong to be stored Private data, then be directly stored in storage card such as SIM by data to be stored.
The date storage method of the terminal unit that the present invention provides, by obtaining the number to be stored of terminal unit According to, it is judged that described data to be stored are private data or unclassified data, if described data to be stored are Private data, then be encrypted described data to be stored, and to be stored by after encrypted process Data are stored in storage card.So, by based on storage card such as SIM to the security domain of terminal unit and The data in common territory make a distinction storage, are possible not only to ensure the safety of data storage, it is also possible to avoid The phenomenon of the storage loss of data that terminal unit causes when damaging.
In one embodiment, as in figure 2 it is shown, on the basis of the embodiment of Fig. 1, described terminal unit Including common territory and security domain, described step S103 includes:
Described data to be stored if described data to be stored are private datas, are then put into peace by step S1031 Universe;
In the present embodiment, terminal unit such as mobile phone, it is generally configured with common territory and two systems of security domain, if Mobile phone is the one of Android operation system, Apple Macintosh operating system or Saipan operating system etc., then in common territory The interior routine operation that can realize correspondence system;And at security domain, privacy information can be placed on safety by user In territory, phone, note and the most basic function such as take pictures only are provided in this system, and disconnect all Network connects.When user needs normally to use mobile phone, it is switched to the operating system such as Android system of correspondence ?.It is understood that the two system uses hardware isolated mode, it is separately mounted to two storages Space, is completely independent operation, it is impossible to access mutually.If data to be stored be note, address list, photo, One or more in the types such as memorandum, voice and video, QQ chat record and wechat chat record, Then data to be stored are put into security domain.
Step S1032, extracts the header file of data to be stored described in security domain;
Step S1033, carries out escape process to described header file, obtains escape data;
In the present embodiment, when data to be stored are in security domain, extract the head literary composition of described data to be stored Part, in this preferred embodiment, header file uses coding system, header file is carried out binary encoding, as adopted Encoding with Unicode (Unicode, ten thousand country codes, single code), header file is encoded to A0 B2 00 00.
In the present embodiment, described header file A0 B2 00 00 is carried out at alphabetic character mapping or character resolution Reason, obtains escape data, specific as follows:
1, header file uses alphabetic character mapped mode, i.e. self-defined mapping between character and letter, as After numeral 0~9 corresponding letter a~j, i.e. header file A0 B2 00 00 use alphabetic character to map, escape is Aa Bc aa aa。
2, header file uses and resolves character pattern, and i.e. header file employing character escape, turns for example with "/" Justice character, is /A0 B2 00 00 by header file A0 B2 00 00 escape.
It is understood that in other embodiments, it is also possible to directly change header file, such as header file A0 Being B0 B2 00 00 etc. after B2 00 00 escape, concrete escape method can the most rationally be arranged.
Due to header file through escape process, therefore, common territory cannot correctly resolve data, because of without Information at the display security domain such as address list and SMS module.
Step S1034, is pre-encrypted described escape data processing, obtains encryption data;
In the present embodiment, pre-encrypt mode can be user in advance with letter and/or numeral, voice, gesture, The modes such as fingerprint input the password to terminal unit.
Step S1035, is stored in described storage card by described encryption data.
In this preferred embodiment, terminal unit the escape data after encrypted process is stored in SIM, In SD card or other kinds of storage card.
Owing to first data to be stored being carried out escape and encryption, the most just store, so, can With guarantee storage card such as SIM when changing to an other station terminal equipment, if not knowing Crypted password, Then cannot be read out SIM card information at security domain.
In one embodiment, as it is shown on figure 3, on the basis of the embodiment of Fig. 1, described step S103 The most also include:
Step S105, obtains the storage data in described storage card;
Step S106, it is judged that described storage data are in common territory or security domain;
In the present embodiment, terminal unit obtains the storage data prestored in storage card such as SIM, and judges Storage data are in common territory or the security domain of terminal unit such as mobile phone.
Step S107, if described storage data are in common territory, does not the most read described storage data;
In the present embodiment, if terminal unit judges storage, data are in common territory, owing to storage data are passed through Data form after escape and encryption, escape and encryption differs with normal data form, Therefore commonly territory cannot correctly resolve storage data, because storing data without reading, namely common territory will not The information such as the address list of display mobile phone and note.
Described storage data if described storage data are in security domain, are then decrypted place by step S108 Reason;
In the present embodiment, if terminal unit judges storage, data are in security domain, then obtain user's input Clear crytpographic key, if code error, jumps to not read storage data;If the clear crytpographic key of user's input is close Code is correct, then the storage data after deciphering are carried out escape, be normal header file format with escape.
Step S109, the storage data after being decrypted process show on the terminal device, for Family is read.
In the present embodiment, terminal unit will be decrypted the storage data after processing with escape on the terminal device Show, so, when mobile phone damages or loses, still can normally read and be stored in storage card such as SIM The information such as note on card and address list.
In one embodiment, as shown in Figure 4, on the basis of the embodiment of Fig. 3, described step S108 Including:
Step S1081, if described storage data are in security domain, then receiving and deciphering password;
Step S1082, it is judged that described clear crytpographic key is the most consistent with pre-encrypt password;
In the present embodiment, when terminal unit judges that storage data are in security domain, then can receive user defeated The clear crytpographic key entered.Pre-encrypt mode can be user in advance with letter and/or numeral, voice, gesture, The modes such as fingerprint input the password to terminal unit.Terminal unit can judge that the clear crytpographic key that user inputs is No consistent with pre-encrypt password.
Storage data after being decrypted process if unanimously, are then carried out escape process by step S1083.
In the present embodiment, when terminal unit judges that clear crytpographic key is consistent with pre-encrypt password, then to through solving Storage data after close process carry out escape process;Clear crytpographic key and pre-encrypt password is judged at terminal unit Time inconsistent, then cannot be carried out decryption oprerations, namely storage data cannot escape become correct note and The information such as address list.So, the clear crytpographic key that input is consistent with pre-encrypt password is needed when deciphering, no Only can ensure that when terminal unit such as mobile phone damages, still just can carry out at the security domain of other-end equipment Often read, it is also ensured that the safety of storage.
The present invention also provides for a kind of terminal unit 1, with reference to Fig. 5, in one embodiment, described terminal unit 1 includes:
First acquisition module 101, for obtaining the data to be stored of terminal unit;
In the present embodiment, terminal unit 1 is preferably the mobile terminals such as mobile phone.As a example by mobile phone, described in treat Storage data can be the information such as note, address list, photo, memorandum.
First judge module 102, is used for judging that described data to be stored are private data or unclassified number According to;
In the present embodiment, terminal unit according to the attributive judgment of data to be stored be private data be also non-guarantor Ciphertext data.As a example by mobile phone, note, address list, photo, memorandum, voice and video, QQ chat note Record and wechat chat record etc. belong to private data, and everything does is unclassified data.At other In embodiment, other private datas can be selected according to actual needs, it is not limited to the present embodiment.Add Described data to be stored if being private data for described data to be stored, are then entered by close memory module 103 Row encryption, and the data to be stored after encrypted process are stored in storage card;
In the present embodiment, encryption includes the processing mode of escape and preset password, and storage card includes SIM (Subscriber Identity Module, client identification module card) and SD card (SD card Secure Digital Memory Card, safe digital card) etc., in other embodiments, can be selected it His type of storage card, it is not limited to the present embodiment.
Directly memory module 104, if being non-private data for described data to be stored, then deposits described waiting Storage data are stored in described storage card.
In the present embodiment, data to be stored are judged by terminal unit 1, if data to be stored are non-guarantors Ciphertext data, then be directly stored in storage card such as SIM by data to be stored.
The present invention provide terminal unit 1, by obtain terminal unit data to be stored, it is judged that described in treat Storage data are private data or unclassified data, if described data to be stored are private datas, the most right Described data to be stored are encrypted, and the data to be stored after encrypted process are stored in storage Card.So, by the security domain of terminal unit and the data in common territory being entered based on storage card such as SIM Row distinguishes storage, is possible not only to ensure the safety of data storage, it is also possible to when avoiding terminal unit to damage The phenomenon of the storage loss of data caused.
In one embodiment, as shown in Figure 6, on the basis of the embodiment of Fig. 5, described terminal unit Including common territory and security domain, described encryption memory module 103 includes:
First memory element 1031, if being private data for described data to be stored, then deposits described waiting Storage data put into security domain;
In the present embodiment, terminal unit such as mobile phone, it is generally configured with common territory and two systems of security domain, if Mobile phone is the one of Android operation system, Apple Macintosh operating system or Saipan operating system etc., then in common territory The interior routine operation that can realize correspondence system;And at security domain, privacy information can be placed on safety by user In territory, phone, note and the most basic function such as take pictures only are provided in this system, and disconnect all Network connects.When user needs normally to use mobile phone, it is switched to the operating system such as Android system of correspondence ?.It is understood that the two system uses hardware isolated mode, it is separately mounted to two storages Space, is completely independent operation, it is impossible to access mutually.If data to be stored be note, address list, photo, One or more in the types such as memorandum, voice and video, QQ chat record and wechat chat record, Then data to be stored are put into security domain.
Extraction unit 1032, for extracting the header file of data to be stored described in security domain;
First escape processing unit 1033, carries out escape process to described header file, obtains escape data;
In the present embodiment, when data to be stored are in security domain, extract the head literary composition of described data to be stored Part, in this preferred embodiment, header file uses coding system, header file is carried out binary encoding, as adopted Encoding with Unicode (Unicode, ten thousand country codes, single code), header file is encoded to A0 B2 00 00.
In the present embodiment, described header file A0 B2 00 00 is carried out at alphabetic character mapping or character resolution Reason, obtains escape data, specific as follows:
1, header file uses alphabetic character mapped mode, i.e. self-defined mapping between character and letter, as After numeral 0~9 corresponding letter a~j, i.e. header file A0 B2 00 00 use alphabetic character to map, escape is Aa Bc aa aa。
2, header file uses and resolves character pattern, and i.e. header file employing character escape, turns for example with "/" Justice character, is /A0 B2 00 00 by header file A0 B2 00 00 escape.
It is understood that in other embodiments, it is also possible to directly change header file, such as header file A0 Being B0 B2 00 00 etc. after B2 00 00 escape, concrete escape method can the most rationally be arranged.
Due to header file through escape process, therefore, common territory cannot correctly resolve data, because of without Information at the display security domain such as address list and SMS module.
Cryptographic processing unit 1034, for described escape data is pre-encrypted process, obtains encrypting number According to;
In the present embodiment, pre-encrypt mode can be user in advance with letter and/or numeral, voice, gesture, The modes such as fingerprint input the password to terminal unit 1.
Second memory element 1035, for being stored in described storage card by described encryption data.
In this preferred embodiment, terminal unit 1 escape data after encrypted process is stored in SIM, In SD card or other kinds of storage card..
Owing to first data to be stored being carried out escape and encryption, the most just store, so, can With guarantee storage card such as SIM when changing to an other station terminal equipment 1, if not knowing Crypted password, Then cannot be read out SIM card information at security domain.
In one embodiment, as it is shown in fig. 7, on the basis of the embodiment of Fig. 5, described terminal unit 1 Also include:
Second acquisition module 105, for obtaining the storage data in described storage card;
Second judge module 106, is used for judging that described storage data are in common territory or security domain;
In the present embodiment, terminal unit 1 obtains the storage data prestored in storage card such as SIM, and sentences Disconnected storage data are in common territory or the security domain of terminal unit 1 such as mobile phone.
Non-read module 107, if being in common territory for described storage data, does not the most read described storage number According to;
In the present embodiment, if terminal unit 1 judges storage, data are in common territory, due to storage data warp Cross the data form after escape and encryption, escape and encryption to differ with normal data form, Therefore commonly territory cannot correctly resolve storage data, because storing data without reading, namely common territory will not The information such as the address list of display mobile phone and note.
Described storage data if being in security domain for described storage data, are then carried out by processing module 108 Decryption processing;
In the present embodiment, if terminal unit 1 judges storage, data are in security domain, then obtain user's input Clear crytpographic key, if code error, jump to not read storage data;If the clear crytpographic key of user's input Password is correct, then the storage data after deciphering are carried out escape, be normal header file format with escape.
Display module 109, the storage data after being decrypted process show on terminal unit 1, Read for user.
In the present embodiment, terminal unit 1 will be decrypted the storage data after processing with escape at terminal unit 1 On show, so, when mobile phone damage or lose time, still can normally read and be stored in storage card such as SIM The information such as note on card and address list.
In one embodiment, as shown in Figure 8, on the basis of the embodiment of Fig. 7, described processing module 108 include:
Receive unit 1081, if being in security domain for described storage data, then receiving and deciphering password;
Judging unit 1082, is used for judging that described clear crytpographic key is the most consistent with pre-encrypt password;
In the present embodiment, when terminal unit 1 judges that storage data are in security domain, then can receive user The clear crytpographic key of input.Pre-encrypt mode can be user in advance with letter and/or numeral, voice, gesture, The modes such as fingerprint input the password to terminal unit 1.Terminal unit 1 can judge that the deciphering that user inputs is close Code is the most consistent with pre-encrypt password.
Second escape processing unit 1083, if for consistent, then entering the storage data after being decrypted process Row escape processes.
In the present embodiment, when terminal unit 1 judges that clear crytpographic key is consistent with pre-encrypt password, then to warp Storage data after decryption processing carry out escape process;Clear crytpographic key and pre-encrypt is judged at terminal unit 1 When password is inconsistent, then cannot be carried out decryption oprerations, namely storage data escape cannot become correct note And the information such as address list.So, need the clear crytpographic key that input is consistent with pre-encrypt password when deciphering, It is possible not only to ensure when terminal unit 1 such as mobile phone damages, still can be at the security domain of other-end equipment 1 Normally read, it is also ensured that the safety of storage.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every Utilize equivalent structure or equivalence flow process conversion that description of the invention and accompanying drawing content made, or directly or Connect and be used in other relevant technical fields, be the most in like manner included in the scope of patent protection of the present invention.

Claims (12)

1. the date storage method of a terminal unit, it is characterised in that described terminal unit Date storage method comprise the following steps:
Obtain the data to be stored of terminal unit;
Judge that described data to be stored are private data or unclassified data;
If described data to be stored are private datas, then described data to be stored are encrypted place Reason, and the data to be stored after encrypted process are stored in storage card.
2. the date storage method of terminal unit as claimed in claim 1, it is characterised in that Described terminal unit includes common territory and security domain, if described data to be stored are secret number According to, then described data to be stored are encrypted, and to be stored by after encrypted process Data are stored in the step of storage card and include:
If described data to be stored are private datas, then described data to be stored are put into safety Territory;
Extract the header file of data to be stored described in security domain;
Described header file is carried out escape process, obtains escape data;
It is pre-encrypted described escape data processing, obtains encryption data;
Described encryption data is stored in described storage card.
3. the date storage method of terminal unit as claimed in claim 2, it is characterised in that Described described header file being carried out escape process, the step obtaining escape data farther includes:
Described header file is carried out alphabetic character mapping or character resolution processes, obtain escape number According to.
4. the date storage method of terminal unit as claimed in claim 2, it is characterised in that If described data to be stored are private datas, then described data to be stored are encrypted place Reason, and also wrap after the data to be stored after encrypted process are stored in the step of storage card Include:
Obtain the storage data in described storage card;
Judge that described storage data are in common territory or security domain;
If described storage data are in security domain, then described storage data are decrypted process;
Storage data after being decrypted process show on the terminal device, read for user Take.
5. the date storage method of terminal unit as claimed in claim 4, it is characterised in that If described storage data are in security domain, then described storage data are decrypted process Step includes:
If described storage data are in security domain, then receiving and deciphering password;
Judge that described clear crytpographic key is the most consistent with pre-encrypt password;
If consistent, then the storage data after being decrypted process are carried out escape process.
6. the date storage method of terminal unit as claimed in claim 1, it is characterised in that The described data to be stored of described judgement be private data or unclassified data step after also Including:
If described data to be stored are non-private datas, then described data to be stored are stored in institute State storage card.
7. a terminal unit, it is characterised in that described terminal unit includes:
First acquisition module, for obtaining the data to be stored of terminal unit;
First judge module, is used for judging that described data to be stored are private datas or unclassified Data;
Encryption memory module, if being private data for described data to be stored, then treats described Storage data are encrypted, and the data to be stored after encrypted process are stored in storage Card.
8. terminal unit as claimed in claim 7, it is characterised in that described terminal unit Including common territory and security domain, described encryption memory module includes:
First memory element, if being private data for described data to be stored, then treats described Storage data put into security domain;
Extraction unit, for extracting the header file of data to be stored described in security domain;
First escape processing unit, for described header file is carried out escape process, obtains escape Data;
Cryptographic processing unit, for described escape data is pre-encrypted process, is encrypted Data;
Second memory element, for being stored in described storage card by described encryption data.
9. terminal unit as claimed in claim 8, it is characterised in that described first escape Processing unit is further used for:
Described header file is carried out alphabetic character mapping or character resolution processes, obtain escape number According to.
10. terminal unit as claimed in claim 8, it is characterised in that described terminal unit Also include:
Second acquisition module, for obtaining the storage data in described storage card;
Second judge module, is used for judging that described storage data are in common territory or safety Territory;
Processing module, if being in security domain, then to described storage data for described storage data It is decrypted process;
Display module, the storage data after being decrypted process show on the terminal device Show, read for user.
11. terminal units as claimed in claim 10, it is characterised in that described process mould Block includes:
Receive unit, if being in security domain for described storage data, then receiving and deciphering password;
Judging unit, is used for judging that described clear crytpographic key is the most consistent with pre-encrypt password;
Second escape processing unit, if for consistent, then to being decrypted the storage data after process Carry out escape process.
12. terminal units as claimed in claim 7, it is characterised in that described terminal unit Also include:
Directly memory module, if being non-private data for described data to be stored, then by described Data to be stored are stored in described storage card.
CN201510266837.5A 2015-05-22 2015-05-22 The date storage method of terminal unit and terminal unit Pending CN106293495A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510266837.5A CN106293495A (en) 2015-05-22 2015-05-22 The date storage method of terminal unit and terminal unit
PCT/CN2015/096304 WO2016188079A1 (en) 2015-05-22 2015-12-03 Data storage method for terminal device and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510266837.5A CN106293495A (en) 2015-05-22 2015-05-22 The date storage method of terminal unit and terminal unit

Publications (1)

Publication Number Publication Date
CN106293495A true CN106293495A (en) 2017-01-04

Family

ID=57393510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510266837.5A Pending CN106293495A (en) 2015-05-22 2015-05-22 The date storage method of terminal unit and terminal unit

Country Status (2)

Country Link
CN (1) CN106293495A (en)
WO (1) WO2016188079A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709378A (en) * 2017-02-16 2017-05-24 惠州Tcl移动通信有限公司 Storage card encryption method and storage device
CN109145538A (en) * 2018-07-27 2019-01-04 国政通科技有限公司 A kind of identity for protecting information security is logical
CN112671766A (en) * 2020-12-23 2021-04-16 玖纵网络科技(上海)有限公司 Method for realizing safe storage of private information by using private front-end server

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279752A (en) * 2011-08-31 2011-12-14 北京华电万通科技有限公司 Device and method for rendering ultra-large scene in real time based on Web three-dimension (3D)
CN102866960A (en) * 2012-09-05 2013-01-09 中兴通讯股份有限公司 Method for realizing encryption in storage card, decrypting method and device
CN202736492U (en) * 2012-07-19 2013-02-13 杭州网搜科技有限公司 Universal serial bus (USB) storage device with fingerprint encryption
CN103677654A (en) * 2012-09-24 2014-03-26 联想(北京)有限公司 Method and electronic equipment for storing data
CN104104753A (en) * 2013-04-15 2014-10-15 德信无线通讯科技(北京)有限公司 Double t card mobile phone

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727458A (en) * 2008-10-30 2010-06-09 爱思开电讯投资(中国)有限公司 Database management system and method used for smart cards
US9805173B2 (en) * 2012-08-24 2017-10-31 Sony Corporation Information processing device, information storage device, server, information processing system, information processing method and medium for reproduction of encrypted content
CN103023922B (en) * 2012-12-05 2014-07-02 清华大学 Control flow model behavior based dynamic remote attestation method
CN103177224A (en) * 2013-02-06 2013-06-26 东莞宇龙通信科技有限公司 Data protection method and device used for terminal external storage card
CN104184892A (en) * 2014-08-12 2014-12-03 桂林微网半导体有限责任公司 Mobile terminal intelligent card based data transmission method and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279752A (en) * 2011-08-31 2011-12-14 北京华电万通科技有限公司 Device and method for rendering ultra-large scene in real time based on Web three-dimension (3D)
CN202736492U (en) * 2012-07-19 2013-02-13 杭州网搜科技有限公司 Universal serial bus (USB) storage device with fingerprint encryption
CN102866960A (en) * 2012-09-05 2013-01-09 中兴通讯股份有限公司 Method for realizing encryption in storage card, decrypting method and device
CN103677654A (en) * 2012-09-24 2014-03-26 联想(北京)有限公司 Method and electronic equipment for storing data
CN104104753A (en) * 2013-04-15 2014-10-15 德信无线通讯科技(北京)有限公司 Double t card mobile phone

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709378A (en) * 2017-02-16 2017-05-24 惠州Tcl移动通信有限公司 Storage card encryption method and storage device
CN109145538A (en) * 2018-07-27 2019-01-04 国政通科技有限公司 A kind of identity for protecting information security is logical
CN109145538B (en) * 2018-07-27 2020-08-07 国政通科技有限公司 Identity card for protecting information security
CN112671766A (en) * 2020-12-23 2021-04-16 玖纵网络科技(上海)有限公司 Method for realizing safe storage of private information by using private front-end server

Also Published As

Publication number Publication date
WO2016188079A1 (en) 2016-12-01

Similar Documents

Publication Publication Date Title
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
US8433068B2 (en) Method and apparatus for communication based on pseudo-contact information
KR100636111B1 (en) Method protecting data stored in lost mobile terminal and recording medium therefor
CN106788995B (en) File encryption method and device
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN102867157B (en) Mobile terminal and data guard method
US20060168658A1 (en) Protection of data to be stored in the memory of a device
CN109150903A (en) A kind of account management method, device, storage medium and terminal device
CN104318286B (en) Management method, management system and the terminal of NFC label data
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN104796534A (en) Method and device for processing information contents
CN101815292B (en) Device and method for protecting data of mobile terminal
JP7105495B2 (en) Segmented key authenticator
CN106293495A (en) The date storage method of terminal unit and terminal unit
CN106550357A (en) A kind of note method for managing security, device and terminal
CN104955029A (en) Address book protection method, address book protection device and communication system
CN103379483A (en) Method, device and mobile terminal for mobile terminal information security management
CN105162804A (en) Communication information protection method and apparatus
CN105205376A (en) Method for logging into intelligent application through fingerprints based on Android system
CN105678185B (en) A kind of data security protection method and intelligent terminal management system
EP2985712B1 (en) Application encryption processing method, apparatus, and terminal
CN107222453A (en) A kind of document transmission method and device
CN105468988A (en) Data protection method and device during connection of terminal and PC (Personal Computer)
CN105282154A (en) Method for preventing identity information in real-name authentication from being tampered
CN205864753U (en) A kind of encryption guard system of terminal unit

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104

RJ01 Rejection of invention patent application after publication