CN106293495A - The date storage method of terminal unit and terminal unit - Google Patents
The date storage method of terminal unit and terminal unit Download PDFInfo
- Publication number
- CN106293495A CN106293495A CN201510266837.5A CN201510266837A CN106293495A CN 106293495 A CN106293495 A CN 106293495A CN 201510266837 A CN201510266837 A CN 201510266837A CN 106293495 A CN106293495 A CN 106293495A
- Authority
- CN
- China
- Prior art keywords
- data
- stored
- terminal unit
- storage
- escape
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses the date storage method of a kind of terminal unit, the date storage method of described terminal unit comprises the following steps: obtain the data to be stored of terminal unit;Judge that described data to be stored are private data or unclassified data;If described data to be stored are private datas, then described data to be stored are encrypted, and the data to be stored after encrypted process are stored in storage card.The invention also discloses a kind of terminal unit.The data to be stored of terminal unit can be made a distinction storage based on storage card by the date storage method of the terminal unit that the present invention provides and terminal unit, it is to avoid the phenomenon of the storage loss of data that terminal unit causes when damaging.
Description
Technical field
The present invention relates to communication technique field, particularly relate to date storage method and the end of a kind of terminal unit
End equipment.
Background technology
The security informations such as the note of the most increasing intelligent terminal's such as mobile phone and phone directory can only be stored in
Mobile phone side could normally be read, and when mobile phone damages or loses, the storage card of mobile phone terminal such as SIM is then
Cannot be distinguished by these information is security information or unclassified information, thus causes information dropout.
Foregoing is only used for auxiliary and understands technical scheme, does not represent and recognizes that foregoing is
Prior art.
Summary of the invention
Present invention is primarily targeted at date storage method and the terminal unit that a kind of terminal unit is provided,
It is intended to, based on storage card, the data to be stored of terminal unit are made a distinction storage, it is to avoid terminal unit damages
The phenomenon of Shi Zaocheng storage loss of data.
For achieving the above object, the present invention provides the date storage method of a kind of terminal unit, described terminal
Equipment includes that common territory and security domain, the date storage method of described terminal unit comprise the following steps:
Obtain the data to be stored of terminal unit;
Judge that described data to be stored are private data or unclassified data;
If described data to be stored are private datas, then described data to be stored are encrypted, and
Data to be stored after encrypted process are stored in storage card.
Preferably, described terminal unit includes common territory and security domain, if described data to be stored are
Private data, then be encrypted described data to be stored, and to be stored by after encrypted process
Data are stored in the step of storage card and include:
If described data to be stored are private datas, then described data to be stored are put into security domain;
Extract the header file of data to be stored described in security domain;
Described header file is carried out escape process, obtains escape data;
It is pre-encrypted described escape data processing, obtains encryption data;
Described encryption data is stored in described storage card.
Preferably, described described header file being carried out escape process, the step obtaining escape data is further
Including:
Described header file is carried out alphabetic character mapping or character resolution processes, obtain escape data.
Preferably, if described data to be stored are private datas, then described data to be stored are carried out
Encryption, and also include after the data to be stored after encrypted process are stored in the step of storage card:
Obtain the storage data in described storage card;
Judge that described storage data are in common territory or security domain;
If described storage data are in security domain, then described storage data are decrypted process;
Storage data after being decrypted process show on the terminal device, read for user.
Preferably, if described storage data are in security domain, then described storage data are decrypted
The step processed includes:
If described storage data are in security domain, then receiving and deciphering password;
Judge that described clear crytpographic key is the most consistent with pre-encrypt password;
If consistent, then the storage data after being decrypted process are carried out escape process.
Preferably, the described data to be stored of described judgement be private data or unclassified data step it
After also include:
If described data to be stored are non-private datas, then described data to be stored are stored in described storage
Card.
Additionally, for achieving the above object, the present invention also provides for a kind of terminal unit, described terminal unit bag
Include:
First acquisition module, for obtaining the data to be stored of terminal unit;
First judge module, is used for judging that described data to be stored are private data or unclassified data;
Encryption memory module, if being private data for described data to be stored, then to described number to be stored
According to being encrypted, and the data to be stored after encrypted process are stored in storage card.
Described terminal unit includes that common territory and security domain, described encryption memory module include:
First memory element, if being private data for described data to be stored, then by described number to be stored
According to putting into security domain;
Extraction unit, for extracting the header file of data to be stored described in security domain;
First escape processing unit, for described header file is carried out escape process, obtains escape data;
Cryptographic processing unit, for described escape data is pre-encrypted process, obtains encryption data;
Second memory element, for being stored in described storage card by described encryption data.
Preferably, described first escape processing unit is further used for:
Described header file is carried out alphabetic character mapping or character resolution processes, obtain escape data.
Preferably, described terminal unit also includes:
Second acquisition module, for obtaining the storage data in described storage card;
Second judge module, is used for judging that described storage data are in common territory or security domain;
Described storage data if being in security domain for described storage data, are then solved by processing module
Close and escape processes;
Display module, the storage data after being decrypted process show on the terminal device, with
Read for user.
Preferably, described processing module includes:
Receive unit, if being in security domain for described storage data, then receiving and deciphering password;
Judging unit, is used for judging that described clear crytpographic key is the most consistent with pre-encrypt password;
Storage data after being decrypted process if for consistent, then are carried out turning by the second escape processing unit
Justice processes.
Preferably, described terminal unit also includes:
Directly memory module, if being non-private data for described data to be stored, then by described to be stored
Data are stored in described storage card.
The date storage method of the terminal unit that the present invention provides and terminal unit, by obtaining terminal unit
Data to be stored, it is judged that described data to be stored are private data or unclassified data, if described in treat
Storage data are private datas, then be encrypted described data to be stored, and by encrypted process
After data to be stored be stored in storage card.So, by based on the storage card security domain to terminal unit
Make a distinction storage with the data in common territory, be possible not only to ensure the safety of data storage, it is also possible to keep away
Exempt from the phenomenon of the storage loss of data caused when terminal unit damages.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of date storage method one embodiment of terminal unit of the present invention;
Fig. 2 is the refinement schematic flow sheet of step S103 in Fig. 1;
Fig. 3 is the schematic flow sheet of another embodiment of date storage method of terminal unit of the present invention;
Fig. 4 is the refinement schematic flow sheet of step S108 in Fig. 3;
Fig. 5 is the high-level schematic functional block diagram of terminal unit one embodiment of the present invention;
Fig. 6 is the refinement high-level schematic functional block diagram encrypting memory module in Fig. 5;
Fig. 7 is the high-level schematic functional block diagram of another embodiment of terminal unit of the present invention;
Fig. 8 is the refinement high-level schematic functional block diagram of the second processing module in Fig. 7.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, do referring to the drawings further
Explanation.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not used to limit
Determine the present invention.
The present invention provides the date storage method of a kind of terminal unit, with reference to Fig. 1, in one embodiment, institute
The date storage method stating terminal unit comprises the following steps:
Step S101, obtains the data to be stored of terminal unit;
In the present embodiment, terminal unit is preferably the mobile terminals such as mobile phone.As a example by mobile phone, described in wait to deposit
Storage data can be the information such as note, address list, photo, memorandum.
Step S102, it is judged that described data to be stored are private data or unclassified data;
In the present embodiment, terminal unit according to the attributive judgment of data to be stored be private data be also non-guarantor
Ciphertext data.As a example by mobile phone, note, address list, photo, memorandum, voice and video, QQ chat note
Record and wechat chat record etc. belong to private data, and everything does is unclassified data.At other
In embodiment, other private datas can be selected according to actual needs, it is not limited to the present embodiment.
Described data to be stored if described data to be stored are private datas, are then added by step S103
Close process, and the data to be stored after encrypted process are stored in storage card;
In the present embodiment, encryption includes the processing mode of escape and preset password, and storage card includes
SIM (Subscriber Identity Module, client identification module card) and SD card (SD card
Secure Digital Memory Card, safe digital card) etc., in other embodiments, can be selected it
His type of storage card, it is not limited to the present embodiment.
Described data to be stored if described data to be stored are non-private datas, are then stored by step S104
In described storage card.
In the present embodiment, data to be stored are judged by terminal unit, if described data right and wrong to be stored
Private data, then be directly stored in storage card such as SIM by data to be stored.
The date storage method of the terminal unit that the present invention provides, by obtaining the number to be stored of terminal unit
According to, it is judged that described data to be stored are private data or unclassified data, if described data to be stored are
Private data, then be encrypted described data to be stored, and to be stored by after encrypted process
Data are stored in storage card.So, by based on storage card such as SIM to the security domain of terminal unit and
The data in common territory make a distinction storage, are possible not only to ensure the safety of data storage, it is also possible to avoid
The phenomenon of the storage loss of data that terminal unit causes when damaging.
In one embodiment, as in figure 2 it is shown, on the basis of the embodiment of Fig. 1, described terminal unit
Including common territory and security domain, described step S103 includes:
Described data to be stored if described data to be stored are private datas, are then put into peace by step S1031
Universe;
In the present embodiment, terminal unit such as mobile phone, it is generally configured with common territory and two systems of security domain, if
Mobile phone is the one of Android operation system, Apple Macintosh operating system or Saipan operating system etc., then in common territory
The interior routine operation that can realize correspondence system;And at security domain, privacy information can be placed on safety by user
In territory, phone, note and the most basic function such as take pictures only are provided in this system, and disconnect all
Network connects.When user needs normally to use mobile phone, it is switched to the operating system such as Android system of correspondence
?.It is understood that the two system uses hardware isolated mode, it is separately mounted to two storages
Space, is completely independent operation, it is impossible to access mutually.If data to be stored be note, address list, photo,
One or more in the types such as memorandum, voice and video, QQ chat record and wechat chat record,
Then data to be stored are put into security domain.
Step S1032, extracts the header file of data to be stored described in security domain;
Step S1033, carries out escape process to described header file, obtains escape data;
In the present embodiment, when data to be stored are in security domain, extract the head literary composition of described data to be stored
Part, in this preferred embodiment, header file uses coding system, header file is carried out binary encoding, as adopted
Encoding with Unicode (Unicode, ten thousand country codes, single code), header file is encoded to A0 B2 00 00.
In the present embodiment, described header file A0 B2 00 00 is carried out at alphabetic character mapping or character resolution
Reason, obtains escape data, specific as follows:
1, header file uses alphabetic character mapped mode, i.e. self-defined mapping between character and letter, as
After numeral 0~9 corresponding letter a~j, i.e. header file A0 B2 00 00 use alphabetic character to map, escape is
Aa Bc aa aa。
2, header file uses and resolves character pattern, and i.e. header file employing character escape, turns for example with "/"
Justice character, is /A0 B2 00 00 by header file A0 B2 00 00 escape.
It is understood that in other embodiments, it is also possible to directly change header file, such as header file A0
Being B0 B2 00 00 etc. after B2 00 00 escape, concrete escape method can the most rationally be arranged.
Due to header file through escape process, therefore, common territory cannot correctly resolve data, because of without
Information at the display security domain such as address list and SMS module.
Step S1034, is pre-encrypted described escape data processing, obtains encryption data;
In the present embodiment, pre-encrypt mode can be user in advance with letter and/or numeral, voice, gesture,
The modes such as fingerprint input the password to terminal unit.
Step S1035, is stored in described storage card by described encryption data.
In this preferred embodiment, terminal unit the escape data after encrypted process is stored in SIM,
In SD card or other kinds of storage card.
Owing to first data to be stored being carried out escape and encryption, the most just store, so, can
With guarantee storage card such as SIM when changing to an other station terminal equipment, if not knowing Crypted password,
Then cannot be read out SIM card information at security domain.
In one embodiment, as it is shown on figure 3, on the basis of the embodiment of Fig. 1, described step S103
The most also include:
Step S105, obtains the storage data in described storage card;
Step S106, it is judged that described storage data are in common territory or security domain;
In the present embodiment, terminal unit obtains the storage data prestored in storage card such as SIM, and judges
Storage data are in common territory or the security domain of terminal unit such as mobile phone.
Step S107, if described storage data are in common territory, does not the most read described storage data;
In the present embodiment, if terminal unit judges storage, data are in common territory, owing to storage data are passed through
Data form after escape and encryption, escape and encryption differs with normal data form,
Therefore commonly territory cannot correctly resolve storage data, because storing data without reading, namely common territory will not
The information such as the address list of display mobile phone and note.
Described storage data if described storage data are in security domain, are then decrypted place by step S108
Reason;
In the present embodiment, if terminal unit judges storage, data are in security domain, then obtain user's input
Clear crytpographic key, if code error, jumps to not read storage data;If the clear crytpographic key of user's input is close
Code is correct, then the storage data after deciphering are carried out escape, be normal header file format with escape.
Step S109, the storage data after being decrypted process show on the terminal device, for
Family is read.
In the present embodiment, terminal unit will be decrypted the storage data after processing with escape on the terminal device
Show, so, when mobile phone damages or loses, still can normally read and be stored in storage card such as SIM
The information such as note on card and address list.
In one embodiment, as shown in Figure 4, on the basis of the embodiment of Fig. 3, described step S108
Including:
Step S1081, if described storage data are in security domain, then receiving and deciphering password;
Step S1082, it is judged that described clear crytpographic key is the most consistent with pre-encrypt password;
In the present embodiment, when terminal unit judges that storage data are in security domain, then can receive user defeated
The clear crytpographic key entered.Pre-encrypt mode can be user in advance with letter and/or numeral, voice, gesture,
The modes such as fingerprint input the password to terminal unit.Terminal unit can judge that the clear crytpographic key that user inputs is
No consistent with pre-encrypt password.
Storage data after being decrypted process if unanimously, are then carried out escape process by step S1083.
In the present embodiment, when terminal unit judges that clear crytpographic key is consistent with pre-encrypt password, then to through solving
Storage data after close process carry out escape process;Clear crytpographic key and pre-encrypt password is judged at terminal unit
Time inconsistent, then cannot be carried out decryption oprerations, namely storage data cannot escape become correct note and
The information such as address list.So, the clear crytpographic key that input is consistent with pre-encrypt password is needed when deciphering, no
Only can ensure that when terminal unit such as mobile phone damages, still just can carry out at the security domain of other-end equipment
Often read, it is also ensured that the safety of storage.
The present invention also provides for a kind of terminal unit 1, with reference to Fig. 5, in one embodiment, described terminal unit
1 includes:
First acquisition module 101, for obtaining the data to be stored of terminal unit;
In the present embodiment, terminal unit 1 is preferably the mobile terminals such as mobile phone.As a example by mobile phone, described in treat
Storage data can be the information such as note, address list, photo, memorandum.
First judge module 102, is used for judging that described data to be stored are private data or unclassified number
According to;
In the present embodiment, terminal unit according to the attributive judgment of data to be stored be private data be also non-guarantor
Ciphertext data.As a example by mobile phone, note, address list, photo, memorandum, voice and video, QQ chat note
Record and wechat chat record etc. belong to private data, and everything does is unclassified data.At other
In embodiment, other private datas can be selected according to actual needs, it is not limited to the present embodiment.Add
Described data to be stored if being private data for described data to be stored, are then entered by close memory module 103
Row encryption, and the data to be stored after encrypted process are stored in storage card;
In the present embodiment, encryption includes the processing mode of escape and preset password, and storage card includes
SIM (Subscriber Identity Module, client identification module card) and SD card (SD card
Secure Digital Memory Card, safe digital card) etc., in other embodiments, can be selected it
His type of storage card, it is not limited to the present embodiment.
Directly memory module 104, if being non-private data for described data to be stored, then deposits described waiting
Storage data are stored in described storage card.
In the present embodiment, data to be stored are judged by terminal unit 1, if data to be stored are non-guarantors
Ciphertext data, then be directly stored in storage card such as SIM by data to be stored.
The present invention provide terminal unit 1, by obtain terminal unit data to be stored, it is judged that described in treat
Storage data are private data or unclassified data, if described data to be stored are private datas, the most right
Described data to be stored are encrypted, and the data to be stored after encrypted process are stored in storage
Card.So, by the security domain of terminal unit and the data in common territory being entered based on storage card such as SIM
Row distinguishes storage, is possible not only to ensure the safety of data storage, it is also possible to when avoiding terminal unit to damage
The phenomenon of the storage loss of data caused.
In one embodiment, as shown in Figure 6, on the basis of the embodiment of Fig. 5, described terminal unit
Including common territory and security domain, described encryption memory module 103 includes:
First memory element 1031, if being private data for described data to be stored, then deposits described waiting
Storage data put into security domain;
In the present embodiment, terminal unit such as mobile phone, it is generally configured with common territory and two systems of security domain, if
Mobile phone is the one of Android operation system, Apple Macintosh operating system or Saipan operating system etc., then in common territory
The interior routine operation that can realize correspondence system;And at security domain, privacy information can be placed on safety by user
In territory, phone, note and the most basic function such as take pictures only are provided in this system, and disconnect all
Network connects.When user needs normally to use mobile phone, it is switched to the operating system such as Android system of correspondence
?.It is understood that the two system uses hardware isolated mode, it is separately mounted to two storages
Space, is completely independent operation, it is impossible to access mutually.If data to be stored be note, address list, photo,
One or more in the types such as memorandum, voice and video, QQ chat record and wechat chat record,
Then data to be stored are put into security domain.
Extraction unit 1032, for extracting the header file of data to be stored described in security domain;
First escape processing unit 1033, carries out escape process to described header file, obtains escape data;
In the present embodiment, when data to be stored are in security domain, extract the head literary composition of described data to be stored
Part, in this preferred embodiment, header file uses coding system, header file is carried out binary encoding, as adopted
Encoding with Unicode (Unicode, ten thousand country codes, single code), header file is encoded to A0 B2 00 00.
In the present embodiment, described header file A0 B2 00 00 is carried out at alphabetic character mapping or character resolution
Reason, obtains escape data, specific as follows:
1, header file uses alphabetic character mapped mode, i.e. self-defined mapping between character and letter, as
After numeral 0~9 corresponding letter a~j, i.e. header file A0 B2 00 00 use alphabetic character to map, escape is
Aa Bc aa aa。
2, header file uses and resolves character pattern, and i.e. header file employing character escape, turns for example with "/"
Justice character, is /A0 B2 00 00 by header file A0 B2 00 00 escape.
It is understood that in other embodiments, it is also possible to directly change header file, such as header file A0
Being B0 B2 00 00 etc. after B2 00 00 escape, concrete escape method can the most rationally be arranged.
Due to header file through escape process, therefore, common territory cannot correctly resolve data, because of without
Information at the display security domain such as address list and SMS module.
Cryptographic processing unit 1034, for described escape data is pre-encrypted process, obtains encrypting number
According to;
In the present embodiment, pre-encrypt mode can be user in advance with letter and/or numeral, voice, gesture,
The modes such as fingerprint input the password to terminal unit 1.
Second memory element 1035, for being stored in described storage card by described encryption data.
In this preferred embodiment, terminal unit 1 escape data after encrypted process is stored in SIM,
In SD card or other kinds of storage card..
Owing to first data to be stored being carried out escape and encryption, the most just store, so, can
With guarantee storage card such as SIM when changing to an other station terminal equipment 1, if not knowing Crypted password,
Then cannot be read out SIM card information at security domain.
In one embodiment, as it is shown in fig. 7, on the basis of the embodiment of Fig. 5, described terminal unit 1
Also include:
Second acquisition module 105, for obtaining the storage data in described storage card;
Second judge module 106, is used for judging that described storage data are in common territory or security domain;
In the present embodiment, terminal unit 1 obtains the storage data prestored in storage card such as SIM, and sentences
Disconnected storage data are in common territory or the security domain of terminal unit 1 such as mobile phone.
Non-read module 107, if being in common territory for described storage data, does not the most read described storage number
According to;
In the present embodiment, if terminal unit 1 judges storage, data are in common territory, due to storage data warp
Cross the data form after escape and encryption, escape and encryption to differ with normal data form,
Therefore commonly territory cannot correctly resolve storage data, because storing data without reading, namely common territory will not
The information such as the address list of display mobile phone and note.
Described storage data if being in security domain for described storage data, are then carried out by processing module 108
Decryption processing;
In the present embodiment, if terminal unit 1 judges storage, data are in security domain, then obtain user's input
Clear crytpographic key, if code error, jump to not read storage data;If the clear crytpographic key of user's input
Password is correct, then the storage data after deciphering are carried out escape, be normal header file format with escape.
Display module 109, the storage data after being decrypted process show on terminal unit 1,
Read for user.
In the present embodiment, terminal unit 1 will be decrypted the storage data after processing with escape at terminal unit 1
On show, so, when mobile phone damage or lose time, still can normally read and be stored in storage card such as SIM
The information such as note on card and address list.
In one embodiment, as shown in Figure 8, on the basis of the embodiment of Fig. 7, described processing module
108 include:
Receive unit 1081, if being in security domain for described storage data, then receiving and deciphering password;
Judging unit 1082, is used for judging that described clear crytpographic key is the most consistent with pre-encrypt password;
In the present embodiment, when terminal unit 1 judges that storage data are in security domain, then can receive user
The clear crytpographic key of input.Pre-encrypt mode can be user in advance with letter and/or numeral, voice, gesture,
The modes such as fingerprint input the password to terminal unit 1.Terminal unit 1 can judge that the deciphering that user inputs is close
Code is the most consistent with pre-encrypt password.
Second escape processing unit 1083, if for consistent, then entering the storage data after being decrypted process
Row escape processes.
In the present embodiment, when terminal unit 1 judges that clear crytpographic key is consistent with pre-encrypt password, then to warp
Storage data after decryption processing carry out escape process;Clear crytpographic key and pre-encrypt is judged at terminal unit 1
When password is inconsistent, then cannot be carried out decryption oprerations, namely storage data escape cannot become correct note
And the information such as address list.So, need the clear crytpographic key that input is consistent with pre-encrypt password when deciphering,
It is possible not only to ensure when terminal unit 1 such as mobile phone damages, still can be at the security domain of other-end equipment 1
Normally read, it is also ensured that the safety of storage.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every
Utilize equivalent structure or equivalence flow process conversion that description of the invention and accompanying drawing content made, or directly or
Connect and be used in other relevant technical fields, be the most in like manner included in the scope of patent protection of the present invention.
Claims (12)
1. the date storage method of a terminal unit, it is characterised in that described terminal unit
Date storage method comprise the following steps:
Obtain the data to be stored of terminal unit;
Judge that described data to be stored are private data or unclassified data;
If described data to be stored are private datas, then described data to be stored are encrypted place
Reason, and the data to be stored after encrypted process are stored in storage card.
2. the date storage method of terminal unit as claimed in claim 1, it is characterised in that
Described terminal unit includes common territory and security domain, if described data to be stored are secret number
According to, then described data to be stored are encrypted, and to be stored by after encrypted process
Data are stored in the step of storage card and include:
If described data to be stored are private datas, then described data to be stored are put into safety
Territory;
Extract the header file of data to be stored described in security domain;
Described header file is carried out escape process, obtains escape data;
It is pre-encrypted described escape data processing, obtains encryption data;
Described encryption data is stored in described storage card.
3. the date storage method of terminal unit as claimed in claim 2, it is characterised in that
Described described header file being carried out escape process, the step obtaining escape data farther includes:
Described header file is carried out alphabetic character mapping or character resolution processes, obtain escape number
According to.
4. the date storage method of terminal unit as claimed in claim 2, it is characterised in that
If described data to be stored are private datas, then described data to be stored are encrypted place
Reason, and also wrap after the data to be stored after encrypted process are stored in the step of storage card
Include:
Obtain the storage data in described storage card;
Judge that described storage data are in common territory or security domain;
If described storage data are in security domain, then described storage data are decrypted process;
Storage data after being decrypted process show on the terminal device, read for user
Take.
5. the date storage method of terminal unit as claimed in claim 4, it is characterised in that
If described storage data are in security domain, then described storage data are decrypted process
Step includes:
If described storage data are in security domain, then receiving and deciphering password;
Judge that described clear crytpographic key is the most consistent with pre-encrypt password;
If consistent, then the storage data after being decrypted process are carried out escape process.
6. the date storage method of terminal unit as claimed in claim 1, it is characterised in that
The described data to be stored of described judgement be private data or unclassified data step after also
Including:
If described data to be stored are non-private datas, then described data to be stored are stored in institute
State storage card.
7. a terminal unit, it is characterised in that described terminal unit includes:
First acquisition module, for obtaining the data to be stored of terminal unit;
First judge module, is used for judging that described data to be stored are private datas or unclassified
Data;
Encryption memory module, if being private data for described data to be stored, then treats described
Storage data are encrypted, and the data to be stored after encrypted process are stored in storage
Card.
8. terminal unit as claimed in claim 7, it is characterised in that described terminal unit
Including common territory and security domain, described encryption memory module includes:
First memory element, if being private data for described data to be stored, then treats described
Storage data put into security domain;
Extraction unit, for extracting the header file of data to be stored described in security domain;
First escape processing unit, for described header file is carried out escape process, obtains escape
Data;
Cryptographic processing unit, for described escape data is pre-encrypted process, is encrypted
Data;
Second memory element, for being stored in described storage card by described encryption data.
9. terminal unit as claimed in claim 8, it is characterised in that described first escape
Processing unit is further used for:
Described header file is carried out alphabetic character mapping or character resolution processes, obtain escape number
According to.
10. terminal unit as claimed in claim 8, it is characterised in that described terminal unit
Also include:
Second acquisition module, for obtaining the storage data in described storage card;
Second judge module, is used for judging that described storage data are in common territory or safety
Territory;
Processing module, if being in security domain, then to described storage data for described storage data
It is decrypted process;
Display module, the storage data after being decrypted process show on the terminal device
Show, read for user.
11. terminal units as claimed in claim 10, it is characterised in that described process mould
Block includes:
Receive unit, if being in security domain for described storage data, then receiving and deciphering password;
Judging unit, is used for judging that described clear crytpographic key is the most consistent with pre-encrypt password;
Second escape processing unit, if for consistent, then to being decrypted the storage data after process
Carry out escape process.
12. terminal units as claimed in claim 7, it is characterised in that described terminal unit
Also include:
Directly memory module, if being non-private data for described data to be stored, then by described
Data to be stored are stored in described storage card.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510266837.5A CN106293495A (en) | 2015-05-22 | 2015-05-22 | The date storage method of terminal unit and terminal unit |
PCT/CN2015/096304 WO2016188079A1 (en) | 2015-05-22 | 2015-12-03 | Data storage method for terminal device and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510266837.5A CN106293495A (en) | 2015-05-22 | 2015-05-22 | The date storage method of terminal unit and terminal unit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106293495A true CN106293495A (en) | 2017-01-04 |
Family
ID=57393510
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510266837.5A Pending CN106293495A (en) | 2015-05-22 | 2015-05-22 | The date storage method of terminal unit and terminal unit |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106293495A (en) |
WO (1) | WO2016188079A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709378A (en) * | 2017-02-16 | 2017-05-24 | 惠州Tcl移动通信有限公司 | Storage card encryption method and storage device |
CN109145538A (en) * | 2018-07-27 | 2019-01-04 | 国政通科技有限公司 | A kind of identity for protecting information security is logical |
CN112671766A (en) * | 2020-12-23 | 2021-04-16 | 玖纵网络科技(上海)有限公司 | Method for realizing safe storage of private information by using private front-end server |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102279752A (en) * | 2011-08-31 | 2011-12-14 | 北京华电万通科技有限公司 | Device and method for rendering ultra-large scene in real time based on Web three-dimension (3D) |
CN102866960A (en) * | 2012-09-05 | 2013-01-09 | 中兴通讯股份有限公司 | Method for realizing encryption in storage card, decrypting method and device |
CN202736492U (en) * | 2012-07-19 | 2013-02-13 | 杭州网搜科技有限公司 | Universal serial bus (USB) storage device with fingerprint encryption |
CN103677654A (en) * | 2012-09-24 | 2014-03-26 | 联想(北京)有限公司 | Method and electronic equipment for storing data |
CN104104753A (en) * | 2013-04-15 | 2014-10-15 | 德信无线通讯科技(北京)有限公司 | Double t card mobile phone |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727458A (en) * | 2008-10-30 | 2010-06-09 | 爱思开电讯投资(中国)有限公司 | Database management system and method used for smart cards |
US9805173B2 (en) * | 2012-08-24 | 2017-10-31 | Sony Corporation | Information processing device, information storage device, server, information processing system, information processing method and medium for reproduction of encrypted content |
CN103023922B (en) * | 2012-12-05 | 2014-07-02 | 清华大学 | Control flow model behavior based dynamic remote attestation method |
CN103177224A (en) * | 2013-02-06 | 2013-06-26 | 东莞宇龙通信科技有限公司 | Data protection method and device used for terminal external storage card |
CN104184892A (en) * | 2014-08-12 | 2014-12-03 | 桂林微网半导体有限责任公司 | Mobile terminal intelligent card based data transmission method and mobile terminal |
-
2015
- 2015-05-22 CN CN201510266837.5A patent/CN106293495A/en active Pending
- 2015-12-03 WO PCT/CN2015/096304 patent/WO2016188079A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102279752A (en) * | 2011-08-31 | 2011-12-14 | 北京华电万通科技有限公司 | Device and method for rendering ultra-large scene in real time based on Web three-dimension (3D) |
CN202736492U (en) * | 2012-07-19 | 2013-02-13 | 杭州网搜科技有限公司 | Universal serial bus (USB) storage device with fingerprint encryption |
CN102866960A (en) * | 2012-09-05 | 2013-01-09 | 中兴通讯股份有限公司 | Method for realizing encryption in storage card, decrypting method and device |
CN103677654A (en) * | 2012-09-24 | 2014-03-26 | 联想(北京)有限公司 | Method and electronic equipment for storing data |
CN104104753A (en) * | 2013-04-15 | 2014-10-15 | 德信无线通讯科技(北京)有限公司 | Double t card mobile phone |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709378A (en) * | 2017-02-16 | 2017-05-24 | 惠州Tcl移动通信有限公司 | Storage card encryption method and storage device |
CN109145538A (en) * | 2018-07-27 | 2019-01-04 | 国政通科技有限公司 | A kind of identity for protecting information security is logical |
CN109145538B (en) * | 2018-07-27 | 2020-08-07 | 国政通科技有限公司 | Identity card for protecting information security |
CN112671766A (en) * | 2020-12-23 | 2021-04-16 | 玖纵网络科技(上海)有限公司 | Method for realizing safe storage of private information by using private front-end server |
Also Published As
Publication number | Publication date |
---|---|
WO2016188079A1 (en) | 2016-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
US8433068B2 (en) | Method and apparatus for communication based on pseudo-contact information | |
KR100636111B1 (en) | Method protecting data stored in lost mobile terminal and recording medium therefor | |
CN106788995B (en) | File encryption method and device | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CN102867157B (en) | Mobile terminal and data guard method | |
US20060168658A1 (en) | Protection of data to be stored in the memory of a device | |
CN109150903A (en) | A kind of account management method, device, storage medium and terminal device | |
CN104318286B (en) | Management method, management system and the terminal of NFC label data | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN104796534A (en) | Method and device for processing information contents | |
CN101815292B (en) | Device and method for protecting data of mobile terminal | |
JP7105495B2 (en) | Segmented key authenticator | |
CN106293495A (en) | The date storage method of terminal unit and terminal unit | |
CN106550357A (en) | A kind of note method for managing security, device and terminal | |
CN104955029A (en) | Address book protection method, address book protection device and communication system | |
CN103379483A (en) | Method, device and mobile terminal for mobile terminal information security management | |
CN105162804A (en) | Communication information protection method and apparatus | |
CN105205376A (en) | Method for logging into intelligent application through fingerprints based on Android system | |
CN105678185B (en) | A kind of data security protection method and intelligent terminal management system | |
EP2985712B1 (en) | Application encryption processing method, apparatus, and terminal | |
CN107222453A (en) | A kind of document transmission method and device | |
CN105468988A (en) | Data protection method and device during connection of terminal and PC (Personal Computer) | |
CN105282154A (en) | Method for preventing identity information in real-name authentication from being tampered | |
CN205864753U (en) | A kind of encryption guard system of terminal unit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170104 |
|
RJ01 | Rejection of invention patent application after publication |