CN107392066B - Method for protecting data security, mobile terminal and computer readable storage medium - Google Patents

Method for protecting data security, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN107392066B
CN107392066B CN201710590548.XA CN201710590548A CN107392066B CN 107392066 B CN107392066 B CN 107392066B CN 201710590548 A CN201710590548 A CN 201710590548A CN 107392066 B CN107392066 B CN 107392066B
Authority
CN
China
Prior art keywords
data
monitored
charging mode
event
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710590548.XA
Other languages
Chinese (zh)
Other versions
CN107392066A (en
Inventor
彭凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710590548.XA priority Critical patent/CN107392066B/en
Publication of CN107392066A publication Critical patent/CN107392066A/en
Application granted granted Critical
Publication of CN107392066B publication Critical patent/CN107392066B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a method for protecting data security, which is applied to the technical field of mobile terminals and comprises the following steps: entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored; in the safe charging mode, when data sent by external equipment through a charging wire is received, judging whether the data is program data of a preset type; if the data is program data of a preset type, the data is isolated, so that the data cannot be started or called. The embodiment of the invention also discloses a mobile terminal and a computer readable storage medium. The method for protecting data security, the mobile terminal and the computer readable storage medium can ensure the security of user information during charging.

Description

Method for protecting data security, mobile terminal and computer readable storage medium
Technical Field
The invention belongs to the technical field of mobile terminals, and particularly relates to a method for protecting data security, a mobile terminal and a computer readable storage medium.
Background
With the development of mobile terminal technology, people have stronger and stronger dependence on mobile terminals such as smart phones and tablet computers. The mobile terminal often bears much personal information and privacy of the user, including login passwords, photo albums, and the like of various accounts.
Currently, charging through a USB (Universal Serial Bus) external charging line is a common charging method, but this charging method can also perform data transmission while charging, and therefore has a great potential safety hazard. Especially, there are many shared charging services in the current market, such as shared charging treasured, if lawless persons build a control platform in a charger or the charging treasured, it is very easy to crack the security defense line in the terminal when the user charges, and steal the user's secret.
Disclosure of Invention
The embodiment of the invention provides a method for protecting data security, a mobile terminal and a computer readable storage medium, which can ensure the security of user information during charging.
A first aspect of an embodiment of the present invention provides a method for protecting data security, which is applied to charging a mobile terminal, and includes: entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored; in the safe charging mode, when data sent by external equipment through a charging wire is received, judging whether the data is program data of a preset type; and if the data is program data of a preset type, isolating the data so that the data cannot be started or called.
A second aspect of an embodiment of the present invention provides a mobile terminal, including: the control module is used for entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored; the judging module is used for judging whether the data is program data of a preset type or not when receiving the data sent by the external equipment through a charging wire in the safe charging mode; and the isolation module is used for isolating the data if the judgment result of the judgment module is that the data is program data of a preset type, so that the data cannot be started or called.
A third aspect of the embodiments of the present invention provides a mobile terminal, including: the present invention also provides a method for protecting data security, which is provided by the first aspect of the embodiments of the present invention, when the processor executes the computer program.
A fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for protecting data security provided in the first aspect of the embodiments of the present invention.
In the method for protecting data security, the mobile terminal and the computer-readable storage medium provided by the embodiments of the present invention, in the secure charging mode, when data sent by the external device through the charging line is received, if the data is program data of a preset type, the data is isolated, so that the data cannot be started or called, information leakage caused by trojan horse implantation or malicious program implantation during charging of the terminal can be effectively prevented, and the security of user information during charging is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 is a hardware configuration diagram of a mobile terminal according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of an implementation of a method for protecting data security according to an embodiment of the present invention.
Fig. 3 is a schematic flow chart of an implementation of a method for protecting data security according to another embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention.
Fig. 6 is a schematic diagram of a mobile terminal that performs secure charging by using the method for protecting data security according to the embodiment of the present invention in practical application.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a hardware configuration diagram of a mobile terminal according to an embodiment of the present invention. As shown in fig. 1, the mobile terminal 10 described in the present embodiment includes:
a memory 51, a processor 52 and a computer program stored on the memory 51 and executable on the processor, which when executed by the processor implements the method of securing data as described in the embodiments of fig. 2 and 3 described below.
Further, the mobile terminal 10 further includes:
at least one input device 53 and at least one output device 54.
The memory 51, the processor 52, the input device 53, and the output device 54 are connected via a bus 55.
The input device 53 may be a camera, a touch panel, a physical button, or a mouse. The output device 54 may specifically be a display screen.
The Memory 51 may be a high-speed Random Access Memory (RAM) Memory or a non-volatile Memory (non-volatile Memory), such as a disk Memory. The memory 51 is used for storing a set of executable program codes, and the processor 52 is coupled to the memory 51.
Further, an embodiment of the present invention further provides a computer-readable storage medium, which may be disposed in the mobile terminal in the foregoing and the following embodiments, and the computer-readable storage medium may be the memory in the foregoing embodiment shown in fig. 1. The computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the method of securing data as described in the embodiments illustrated in fig. 2 and 3, which will be described later. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a RAM, a magnetic disk, or an optical disk.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating an implementation flow of a method for protecting data security according to an embodiment of the present invention, where the method is applicable to a mobile terminal, and the mobile terminal includes: the mobile electronic data processing device comprises an electronic data processing device which can be used in moving, such as a smart phone, a tablet personal computer and a notebook computer and can be charged through an external charging wire. As shown in fig. 2, the method mainly includes the following steps:
s301, entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored.
Specifically, the user may trigger the mobile terminal to enter the safe charging mode by pressing a preset physical key, or by touching a setting menu and a key in a preset safe charging setting interface. The mobile terminal is provided with an event monitor, and various events occurring in the mobile terminal are monitored through the event monitor, such as: a physical key press event, a touch event occurring in an interactive interface, a focus event, a menu event, and the like. The event monitor transmits the monitored events to different controls or different event processing methods of the same control so as to process the events.
S302, in the safe charging mode, when data sent by the external device through a charging wire is received, whether the data is program data of a preset type is judged.
The external device may be, for example: desktop computer, panel computer, portable computer, smart mobile phone, mobile charging equipment (like the treasured that charges) etc. can carry out the all kinds of equipment that charge to mobile terminal.
The charging wire can be a data line with a charging function, such as a USB charging wire, and can be accessed into the mobile terminal through a USB or other data interface. The external device can perform data interaction with the mobile terminal through the charging wire while charging the mobile terminal.
The preset type of program data may be program data that may be self-bootable at power-on, or automatically executed, or may be called by other processes, such as: exe file,. sys file,. com, etc. may execute the data of the program.
It can be understood that the above determination is only for data transmitted from the external device through the charging wire. Therefore, data interaction between the terminal and external equipment through other secure channels such as a wireless network can not be prevented.
If the data is program data of a predetermined type, step S303 is executed: the data is isolated so that the data cannot be launched or called.
The isolation method may specifically include but is not limited to: isolation of data based on modifications made to the data itself, or isolation of data by an external environment. Where modifications are made to the data itself, such as: format converting the data, modifying a suffix name of the data, compression encrypting the data, disabling access rights to the data, and the like. Data is isolated by the external environment, for example: the data is stored in a specific storage area.
If the data is not the program data of the preset type, execute step S304: the data is processed in accordance with conventional processing logic. For example: and storing the data in a default storage directory, and executing corresponding operation. In this way, the data sent by the external device is processed differently, so that the data security protection is more targeted, and the flexibility of the security protection is improved.
In the embodiment of the invention, in the safe charging mode, when data sent by external equipment through a charging wire is received, if the data is program data of a preset type, the data is isolated, so that the data cannot be started or called, information leakage caused by trojan or malicious programs implanted into the terminal during charging can be effectively prevented, and the safety of user information during charging is ensured.
Referring to fig. 3, fig. 3 is a schematic diagram illustrating an implementation flow of a method for protecting data security according to another embodiment of the present invention, where the method is applicable to a mobile terminal, and the mobile terminal includes: the mobile electronic data processing device comprises an electronic data processing device which can be used in moving, such as a smart phone, a tablet personal computer and a notebook computer and can be charged through an external charging wire. As shown in fig. 3, the method mainly includes the following steps:
s401, when an event triggering the safe charging mode is monitored, the safe charging mode is entered.
The mobile terminal is provided with an event monitor, and various events occurring in the mobile terminal can be monitored through the event monitor. The event monitor transmits the monitored events to different controls or different event processing methods of the same control so as to process the events.
Optionally, the event triggering the secure charging mode is a pressing event of a preset physical key. Specifically, when the event monitor monitors that a preset physical key is pressed, the event monitor responds to the event and enters a safe charging mode. The preset physical keys can be the existing functional keys customized by a user, such as: a power-on key, a power-off key, a volume key, a photographing key and the like. To avoid functional conflicts, it is preferable to have non-on and off keys, such as volume + key. Alternatively, the preset physical key may be a physical key dedicated to entering the secure charging mode. The pressing operation may be, but is not limited to: long press, multiple presses, etc. And the method can be customized by a user.
Optionally, the event triggering the entering of the secure charging mode is a confirmation button touch event occurring based on the secure charging prompt information. Specifically, when an external charging wire insertion event is monitored through an event monitor, the safety charging prompt information is output. Then, when a confirmation button touch event occurring based on the output safety charging prompt information is monitored through the event listener, a safety charging mode is entered. Wherein the confirmation button touch event occurs based on the secure charging alert information, for example: a touch event generated by an operation of one or more fingers of the user contacting, leaving, moving, etc. on a confirmation button provided in the safe charging prompt information output window.
Optionally, if a confirmation button touch event based on the safe charging prompt information is not monitored over a preset time period, or a rejection button touch event based on the safe charging prompt information is monitored, the output of the safe charging prompt information is cancelled, and charging is performed according to a normal charging mode, that is, in the normal charging mode, the external device can perform data interaction with the main control chip. It is understood that the confirmation button in the present embodiment is a button having a confirmation meaning, such as a button with the words "yes", "Y", "ok", and the like. The reject button is a button having a reject meaning, such as a button with the words "no", "N", "off", and the like.
To further illustrate the method for protecting data security provided by the present embodiment, taking the mobile terminal shown in fig. 6 as an example, when a pressing event of the physical key 1 in fig. 6 is monitored, a secure charging mode is entered in response to the pressing event. Or, still taking the mobile terminal shown in fig. 6 as an example, when an external charging wire 2 insertion event is monitored, popping up the window 3, and outputting the safe charging prompt information in the window 3. Then, when a confirmation button 4 touch event in the window 3 is monitored, the secure charging mode is entered. Optionally, before entering the safe charging mode in response to the pressing event of the physical key 1, the safe charging prompt message may also be output, and when a confirmation button 4 touch event in the window 3 is monitored, the safe charging mode is entered.
Optionally, the event triggering the entering of the secure charging mode is a confirmation button touch event occurring on the basis of a preset secure charging setting interface, for example: a touch event generated by operations of contact, exit, movement, etc. on various setup menus and buttons provided by one or more fingers of the user at the interface for triggering entry into the secure charging mode. Specifically, a safety charging setting function module is preset in the mobile terminal, and when an event triggering safety charging setting is monitored, a preset safety charging setting interface is output through the safety charging setting function module. And then, when a confirmation button touch event which occurs on the basis of the output safety charging setting interface is monitored, entering the safety charging mode. Wherein events that trigger a safe charging setting, such as: a touch event of a shortcut icon of the secure charging setting function module, a pressing event of a secure charging setting shortcut physical key, and the like.
S402, in the safe charging mode, when data sent by the external device through a charging wire is received, whether the data is program data of a preset type or not is judged.
The external device may be, for example: desktop computer, panel computer, portable computer, smart mobile phone, mobile charging equipment (like the treasured that charges) etc. can carry out the all kinds of equipment that charge to mobile terminal.
The charging wire can be a data line with a charging function, such as a USB charging wire, and can be accessed into the mobile terminal through a USB or other data interface. The external device can perform data interaction with the mobile terminal through the charging wire while charging the mobile terminal.
The preset type of program data may be program data that may be self-bootable at power-on, or automatically executed, or may be called by other processes, such as: exe file,. sys file,. com, etc. may execute the data of the program.
If the data is the program data of the predetermined type, step S403 is executed: the data is isolated so that the data cannot be launched or called.
In another embodiment of the present invention, the data isolation may specifically include: and storing the received data of the preset type in a preset storage area, and setting the preset storage area to be inaccessible to the non-specified process. Wherein the designated process can be customized according to the operation of a user. Optionally, the default non-system process is not accessible.
In another embodiment of the present invention, the data isolation may further include: converting the received program data of the preset type into a data file of a preset format, for example: the file is converted into an encrypted file in a compressed format and is converted into a graphic data file. Converting the data can call a third-party format conversion program to convert, or directly modify the suffix name of the data file, such as: exe is modified to. jpg.
Optionally, the received program data of the preset type may also be converted into a data file of a preset format and stored in a preset storage area, and the preset storage area is set to be inaccessible to the unspecified process.
If the data is not the program data of the preset type, step S404 is executed: the data is processed in accordance with conventional processing logic. For example: and storing the data in a default storage directory, and executing corresponding operation.
S405, when a charging wire pulling-out event is monitored or an event of exiting the safe charging mode is triggered, generating and outputting description information of all program data of preset types received in the safe charging period.
Triggering an exit from the secure charging mode event includes: the method comprises the following steps that a user exits from a safe charging operation event in a preset safe charging setting interface, or the user presses a preset physical key to exit from a safe charging mode.
And when a charging wire pulling event is monitored or an event of exiting the safe charging mode is triggered, exiting the safe charging mode and entering a normal charging mode. And generating description information of all preset types of program data received during the safe charging when entering the normal charging mode. Wherein all preset types of program data received during the safe charging include: data stored in a preset storage area, or format-converted data. The description information of the program data may include, but is not limited to: type information, reception time, risk level, identification information, and the like of the program data. Wherein, the danger level can be determined according to the type of the program data and the authority of the operation. It will be appreciated that the risk level of the bootstrap data is higher than the risk level of the executable program data. Program data that has the right to read and modify data in memory at runtime is at a higher risk level than program data that does not have the right to read and modify data in memory.
Alternatively, the description information may be output in a list manner in the screen.
S406, when a trigger data recovery event is monitored, recovering target data pointed by the trigger data recovery event in all the preset types of program data, and deleting other data except the target data in all the preset types of program data.
Triggering data recovery events includes: and describing a touch event of a button for confirming the recovery data and a list item of the description information in the information output interface. And when the touch event is monitored, restoring the target data pointed by the touch event in all the preset types of program data received in the safe charging period, and deleting other program data. Wherein restoring the target data comprises: if the target data is converted into a data file with a preset format, restoring the target data into data with an original format, and further restoring the target data to an original preset storage position; and if the target data is stored in the preset storage area, restoring the target data to the original preset storage position.
It can be understood that, if the trigger data recovery event is not monitored after the preset time length is exceeded, the output of the description information is cancelled, and when the storage time lengths of all the preset types of program data exceed the preset time length, all the preset types of program data are deleted to release the occupied storage space.
In the embodiment of the invention, in the safe charging mode, when data sent by external equipment through a charging wire is received, if the data is program data of a preset type, the data is isolated, so that the data cannot be started or called, information leakage caused by trojan or malicious programs implanted into the terminal during charging can be effectively prevented, and the safety of user information during charging is ensured.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention, and for convenience of description, only the parts related to the embodiment of the present invention are shown. The mobile terminal illustrated in fig. 4 may be an execution subject of the method for protecting data security provided in the foregoing embodiment illustrated in fig. 2, and mainly includes:
the control module 501 is configured to enter a secure charging mode when an event triggering entry of the secure charging mode is monitored;
a determining module 502, configured to determine whether data sent by an external device through a charging line is program data of a preset type in the secure charging mode when the data is received;
an isolating module 503, configured to isolate the data if the determination result of the determining module 502 is that the data is program data of a preset type, so that the data cannot be started or called.
Specifically, the mobile terminal is provided with an event monitor, and when an event triggering the entering of the secure charging mode is monitored through the event monitor, the secure charging mode is entered through the control module 501. Then, in the safe charging mode, the determining module 502 determines whether the data is the preset type of program data when receiving the data sent by the external device through the charging line. If the determination result of the determining module 502 is that the data is the program data of the predetermined type, the data is isolated by the isolating module 503, so that the data cannot be started or called. Wherein the data isolation by the isolation module 503 may be, but is not limited to: isolation of data based on modifications made to the data itself, or isolation of data by an external environment. Where modifications are made to the data itself, such as: format converting the data, modifying a suffix name of the data, compression encrypting the data, disabling access rights to the data, and the like. Data is isolated by the external environment, for example: the data is stored in a specific storage area.
For details that are not described in the present embodiment, please refer to the description of the embodiment shown in fig. 1 to fig. 3, which will not be described herein again.
It should be noted that, in the embodiment of the mobile terminal illustrated in fig. 4, the division of the functional modules is only an example, and in practical applications, the above functions may be allocated by different functional modules according to needs, for example, configuration requirements of corresponding hardware or convenience of implementation of software, that is, the internal structure of the mobile terminal is divided into different functional modules to complete all or part of the functions described above. In addition, in practical applications, the corresponding functional modules in this embodiment may be implemented by corresponding hardware, or may be implemented by corresponding hardware executing corresponding software. The above description principles can be applied to various embodiments provided in the present specification, and are not described in detail below.
In the embodiment of the invention, in the safe charging mode, when data sent by external equipment through a charging wire is received, if the data is program data of a preset type, the data is isolated, so that the data cannot be started or called, information leakage caused by trojan or malicious programs implanted into the terminal during charging can be effectively prevented, and the safety of user information during charging is ensured.
Referring to fig. 5, a schematic structural diagram of a mobile terminal according to another embodiment of the present invention is shown, which only shows portions related to the embodiment of the present invention for convenience of description. The mobile terminal illustrated in fig. 5 may be an execution subject of the method for protecting data security provided by the foregoing embodiments illustrated in fig. 2 or fig. 3. The mobile terminal illustrated in fig. 5 differs from the mobile terminal in the embodiment illustrated in fig. 4 mainly in that:
further, the isolation module 503 includes:
a storage module 5031, configured to store the data in a preset storage area;
a setting module 5032, configured to set the preset storage area as inaccessible to the unspecified process;
a converting module 5033, configured to convert the data into a data file in a preset format.
Further, the mobile terminal further includes:
the generating module 601 is configured to generate and output description information of all preset types of program data received during the secure charging period when a charging wire pull-out event is monitored or an event of exiting the secure charging mode is triggered;
the processing module 602 is configured to, when a trigger data recovery event is monitored, recover target data pointed by the trigger data recovery event in all the preset types of program data, and delete other data except the target data in all the preset types of program data.
Optionally, if the determination result of the determining module 502 is that the data is not the preset type of program data, the data is processed according to the conventional processing logic through the processing module 602. For example: and storing the data in a default storage directory, and executing corresponding operation.
Further, the control module 501 is further configured to enter the safe charging mode when a pressing event of a preset physical key is monitored;
the mobile terminal further includes:
the information prompt module 603 is configured to output a safe charging prompt message when an external charging wire insertion event is monitored;
the control module 501 is further configured to enter the secure charging mode when a confirmation button touch event occurring based on the secure charging prompt information is monitored;
the mobile terminal further includes:
the interface output module 604 is configured to output a preset safe charging setting interface when an event triggering the safe charging setting is monitored;
the control module 501 is further configured to enter the secure charging mode when a confirmation button touch event occurring based on the secure charging setting interface is monitored.
Specifically, when an event that an external charging wire is inserted into a data interface of the mobile terminal is monitored through the event monitor, the information prompt module 603 outputs a safe charging prompt message to prompt a user whether to enter a safe charging mode. Then, the secure charging mode is entered by the control module 501 in response to a confirmation button touch event being monitored to occur based on the secure charging alert information.
Specifically, a safety charging setting function module can be preset in the mobile terminal. And monitoring an event which triggers the safe charging setting due to the operation of clicking a shortcut icon of the safe charging setting function module or the operation of pressing a safe charging setting shortcut physical key through the event monitor. Then, a preset safe charging setting interface is output through the interface output module 604 in response to the monitored event that triggers the safe charging setting. Thereafter, when a confirmation button touch event occurring based on the secure charging setting interface is monitored through the event listener, a secure charging mode is entered through the control module 501 in response to the monitored touch event.
For details that are not described in the present embodiment, please refer to the description of the embodiment shown in fig. 1 to fig. 4, which will not be described herein again.
In the embodiment of the invention, in the safe charging mode, when data sent by external equipment through a charging wire is received, if the data is program data of a preset type, the data is isolated, so that the data cannot be started or called, information leakage caused by trojan or malicious programs implanted into the terminal during charging can be effectively prevented, and the safety of user information during charging is ensured.
In the embodiments provided in the present application, it should be understood that the disclosed mobile terminal and method may be implemented in other ways. For example, the above-described embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication link may be through some interfaces, and the indirect coupling or communication link of the modules may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The above description of the method for protecting data security, the mobile terminal and the computer readable storage medium provided by the present invention is provided for those skilled in the art, and the idea of the embodiment of the present invention may be changed in the specific implementation manner and the application scope.

Claims (10)

1. A method for protecting data security is applied to charging of a mobile terminal, and is characterized in that the method comprises the following steps:
entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored;
in the safe charging mode, when data sent by external equipment through a charging wire is received, judging whether the data is program data of a preset type, wherein the external equipment is used for charging the mobile terminal;
if the data is program data of a preset type, isolating the data so that the data cannot be started or called;
if the data is not the program data of the preset type, processing the data according to a conventional processing logic;
said isolating said data comprises:
storing the data in a preset storage area, and setting the preset storage area to be inaccessible to a non-specified process; or
And converting the data into a data file with a preset format.
2. The method for protecting data security according to claim 1, wherein if the data is program data of a preset type, isolating the data so that the data cannot be started or called, comprises:
when a charging wire pulling event is monitored or an event of exiting a safe charging mode is triggered, generating and outputting description information of all program data of preset types received in a safe charging period;
when a trigger data recovery event is monitored, recovering target data pointed by the trigger data recovery event in all the preset types of program data, and deleting other data except the target data in all the preset types of program data.
3. The method of securing data as recited in claim 1, wherein said entering a secure charging mode when an event is monitored that triggers entry into the secure charging mode comprises:
and entering the safe charging mode when a pressing event of a preset physical key is monitored.
4. The method of securing data as recited in claim 1, wherein said entering into a secure charging mode when an event triggering entry into said secure charging mode is monitored comprises, prior to entering into said secure charging mode:
when an external charging wire insertion event is monitored, outputting safe charging prompt information;
when an event triggering entry into a secure charging mode is monitored, entering the secure charging mode includes:
and entering the safe charging mode when a confirmation button touch event occurring based on the safe charging prompt information is monitored.
5. The method of securing data as recited in claim 1, wherein said entering into a secure charging mode when an event triggering entry into said secure charging mode is monitored comprises, prior to entering into said secure charging mode:
outputting a preset safe charging setting interface when an event triggering the safe charging setting is monitored;
when an event triggering entry into a secure charging mode is monitored, entering the secure charging mode includes:
and entering the safe charging mode when a confirmation button touch event occurring on the basis of the safe charging setting interface is monitored.
6. A mobile terminal, comprising:
the control module is used for entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored;
the judging module is used for judging whether the data is program data of a preset type or not when receiving data sent by external equipment through a charging wire in the safe charging mode, wherein the external equipment is used for charging the mobile terminal;
the isolation module is used for isolating the data if the judgment result of the judgment module is that the data is program data of a preset type, so that the data cannot be started or called;
the processing module is used for processing the data according to a conventional processing logic if the judgment result of the judging module is that the data is not the program data of the preset type;
the isolation module includes:
the storage module is used for storing the data in a preset storage area;
the setting module is used for setting the preset storage area to be inaccessible to a non-specified process;
and the conversion module is used for converting the data into a data file with a preset format.
7. The mobile terminal of claim 6, wherein the mobile terminal further comprises:
the generating module is used for generating and outputting description information of all program data of preset types received in the safe charging period when a charging wire pulling event is monitored or an event of exiting the safe charging mode is triggered;
the processing module is further configured to, when a trigger data recovery event is monitored, recover target data pointed by the trigger data recovery event in all the preset types of program data, and delete other data except the target data in all the preset types of program data.
8. The mobile terminal of any of claims 6 or 7,
the control module is further used for entering the safe charging mode when a pressing event of a preset physical key is monitored;
the mobile terminal further includes:
the information prompt module is used for outputting safe charging prompt information when an external charging wire insertion event is monitored;
the control module is further used for entering the safe charging mode when a confirmation button touch event based on the safe charging prompt information is monitored;
the mobile terminal further includes:
the interface output module is used for outputting a preset safe charging setting interface when an event triggering the safe charging setting is monitored;
the control module is further used for entering the safe charging mode when a confirmation button touch event occurring on the basis of the safe charging setting interface is monitored.
9. A mobile terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements a method of securing data according to any of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of securing data according to any one of claims 1 to 5.
CN201710590548.XA 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium Active CN107392066B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710590548.XA CN107392066B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710590548.XA CN107392066B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107392066A CN107392066A (en) 2017-11-24
CN107392066B true CN107392066B (en) 2020-12-01

Family

ID=60335756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710590548.XA Active CN107392066B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107392066B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579484A (en) * 2019-09-29 2021-03-30 北京声智科技有限公司 Power-down state protection method and device for intelligent sound box and main board power supply circuit
CN111311830B (en) * 2020-01-21 2021-11-16 上海纪烨物联网科技有限公司 Intelligent management method and system for shared charger

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117251A (en) * 2009-12-31 2011-07-06 比亚迪股份有限公司 Method for selecting application mode of universal serial bus (USB) equipment and USB equipment
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103546289A (en) * 2013-09-29 2014-01-29 北京握奇智能科技有限公司 USB (universal serial bus) Key based secure data transmission method and system
CN104200172A (en) * 2014-08-29 2014-12-10 公安部第一研究所 Safe leading-in device, system and method for USB data
CN106874232A (en) * 2015-12-14 2017-06-20 中兴通讯股份有限公司 The charging method of general-purpose serial bus USB, device and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060117664A (en) * 2005-05-13 2006-11-17 주식회사 팬택 Method for booting of mobile communication set and apparatus thereof
CN105550568B (en) * 2015-12-25 2019-03-15 小米科技有限责任公司 The method and device of mobile terminal data protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117251A (en) * 2009-12-31 2011-07-06 比亚迪股份有限公司 Method for selecting application mode of universal serial bus (USB) equipment and USB equipment
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103546289A (en) * 2013-09-29 2014-01-29 北京握奇智能科技有限公司 USB (universal serial bus) Key based secure data transmission method and system
CN104200172A (en) * 2014-08-29 2014-12-10 公安部第一研究所 Safe leading-in device, system and method for USB data
CN106874232A (en) * 2015-12-14 2017-06-20 中兴通讯股份有限公司 The charging method of general-purpose serial bus USB, device and terminal

Also Published As

Publication number Publication date
CN107392066A (en) 2017-11-24

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN106062763B (en) Method and device for displaying application and picture and electronic equipment
CN106778175B (en) Interface locking method and device and terminal equipment
CN102467462B (en) Method for protecting data stored in device and corresponding device
CN108710515B (en) Application preloading method and device, storage medium and terminal
US9569607B2 (en) Security verification method and apparatus
CN104516760A (en) Operating system hot-switching method and device and mobile terminal
US20190138200A1 (en) Information processing method and device
CN108702414A (en) A kind of screen locking method and device
CN103812996B (en) A kind of information cuing method, device and terminal
CN105718171B (en) A kind of data processing method and terminal
CN107392066B (en) Method for protecting data security, mobile terminal and computer readable storage medium
CN108052407A (en) A kind of application crash means of defence, device, equipment and storage medium
CN112165704A (en) Information sharing method, earphone box and computer readable storage medium
CN105100449A (en) Picture sharing method and mobile terminal
CN108090345B (en) Linux system external command execution method and device
CN107920383B (en) Wireless hotspot connection method, mobile terminal and computer-readable storage medium
CN107392035B (en) Method for protecting data security, mobile terminal and computer readable storage medium
CN107483605B (en) File downloading method and device and storage medium
CN111723353A (en) Identity authentication method, device, terminal and storage medium based on face recognition
CN107437032B (en) Charging method, mobile terminal and computer-readable storage medium
CN107302116B (en) Charging method, mobile terminal and computer-readable storage medium
CN105577923A (en) Information processing method and terminal
CN107394288B (en) Charging method, mobile terminal and computer-readable storage medium
CN106484259A (en) Input method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant