CN102279812A - Data protection method and terminal - Google Patents

Data protection method and terminal Download PDF

Info

Publication number
CN102279812A
CN102279812A CN2011102254507A CN201110225450A CN102279812A CN 102279812 A CN102279812 A CN 102279812A CN 2011102254507 A CN2011102254507 A CN 2011102254507A CN 201110225450 A CN201110225450 A CN 201110225450A CN 102279812 A CN102279812 A CN 102279812A
Authority
CN
China
Prior art keywords
data
application program
instruction
sent
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102254507A
Other languages
Chinese (zh)
Other versions
CN102279812B (en
Inventor
陈华星
陈一槐
刘珍珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN 201110225450 priority Critical patent/CN102279812B/en
Publication of CN102279812A publication Critical patent/CN102279812A/en
Application granted granted Critical
Publication of CN102279812B publication Critical patent/CN102279812B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data protection method and a terminal, wherein the data protection method comprises the following steps: step 102, receiving an instruction of saving data to a shared data region from an application program and then confirming whether the instruction is automatically sent out by the application program; and step 104, saving the data to an RAM (random access memory) in the shared data region if the instruction is automatically sent out by the application program. By the invention, data probably read by a malicious program autonomously can be saved to the RAM while the data can be lost if the RAM is powered down, thus the potential safety hazard can be prevented from keeping for a long time and the data can be prevented from being used by the malicious program.

Description

Data guard method and terminal
Technical field
The present invention relates to mobile communication technology, in particular to a kind of data guard method and a kind of terminal.
Background technology
In present mobile phone terminal, the data that part is important need a plurality of different functional modules frequently to use.For instance, for the multi-mold multi-card mobile phone, a plurality of communication modules wherein often all need to use usim card (Universal Subscriber Identity Module, whole world Subscriber Identity Module) data in, this will usim card data realize sharing, can be after certain communication module be closed, the user can also read usim card data that should module.
For foregoing, present scheme is behind mobile phone power-on, information in each usim card is read out, be kept at a shared region, be the zone that a plurality of functional modules or application program can both be carried out read-write operation, this shared region read and write control by AP (Application Processor, application processor), communication module can be via AP to this shared region visit USIM data, and the effect of doing like this is convenient and swift.But because what preserve among the USIM is the very strong data of privacy such as address list, note, this way is very dangerous, allows rogue program or wooden horse steal information in the shared region easily.
AP by communication module with the data read among the USIM after, store shared region into.Storer divides RAM (loss of data after the power down) and FLASH (data are still preserved after the power down) two kinds, if mobile phone saves the data among the FLASH automatically, even mobile phone shutdown or power down data all can exist so, there is potential safety hazard in this.
Such as, user's USIM information is employed program and copies among the FLASH under the unwitting situation of user, behind user's normal shutdown, and after the usim card taking-up, start again, the information in the mobile phone among the still in store former USIM, this is not that the user wishes to see; Perhaps in some cases, the user may temporarily use to other users mobile phone, even so former USIM takes out, and changed other users' USIM, but because the data among the former USIM have been kept among the FLASH, will leak the information among the former USIM in careless, there is potential safety hazard in this.That is to say,, leak the very strong information of privacy among the USIM easily under the unwitting situation of user, form potential safety hazard when the application program in the terminal is saved in data in the mobile phone.
Therefore, need a kind of Data Protection Scheme, can guarantee to realize sharing of data between a plurality of functional modules, can guarantee the safety of shared data again, protect it not used by rogue program.
Summary of the invention
Technical matters to be solved by this invention is, a kind of Data Protection Scheme is provided, and can guarantee to realize sharing of data between a plurality of functional modules, can guarantee the safety of shared data again, protects it not used by rogue program.
In view of this, the invention provides a kind of data guard method, comprising: step 102, from application program data storage during to the instruction of sharing data area, is confirmed whether described instruction is sent automatically by described application program receiving; Step 104 is when described instruction is sent automatically by described application program, with the RAM (random access memory) of described data storage in the described sharing data area.In this technical scheme, may be the data storage that independently reads of rogue program in RAM, and data are just lost after the RAM power down, preventing to retain for a long time becomes potential safety hazard, is used by rogue program.
In technique scheme, preferably, in described step 102, also comprise: confirm whether described instruction is that described application program is sent according to user's operation; In described step 104, also comprise: in described instruction is described application program when sending according to user's operation, with described data storage RAM or FLASH (flash memory) by described user's appointment in the described sharing data area.In this technical scheme, if user's suggestion is saved in assigned address with data, the operation of affirmation user suggestion does not have potential safety hazard, preserves according to user intention to get final product.
Whether in technique scheme, preferably, described step 102 specifically comprises: when described application program is sent described instruction, add mark in described instruction, sent automatically by described application program to identify described instruction; According to the described mark in the described instruction, confirm whether described instruction is sent automatically by described application program.In this technical scheme, this mark can be a handle that adds for instruction, and by this handle, can pick out each instruction easily is that application program is sent voluntarily or sent according to user intention.
In technique scheme, preferably, described data are from global Subscriber Identity Module, and the type of described data comprises address list and note.In this technical scheme; need the data of protection can have multiple; data among the USIM not just; also can be other data; for example be recorded in the address list of each immediate communication tool of mobile phone terminal; this address list often also needs a plurality of communication tools shared, and some pictures that perhaps multiple application program can visit and upload, audio frequency etc. also need protection.
In technique scheme, preferably, described step 104 specifically comprises: when described instruction was sent automatically by described application program, notice AP (application processor) read described data by the communication module corresponding with described global Subscriber Identity Module, and described data storage is arrived RAM.
The present invention also provides a kind of terminal, comprising: the confirmation command module, from application program data storage during to the instruction of sharing data area, is confirmed whether described instruction is sent automatically by described application program receiving; Data memory module is when described instruction is sent automatically by described application program, with the RAM of described data storage in the described sharing data area.In this technical scheme, may be the data storage that independently reads of rogue program in RAM, and data are just lost after the RAM power down, preventing to retain for a long time becomes potential safety hazard, is used by rogue program.
In technique scheme, preferably, described confirmation command module confirms also whether described instruction is that described application program is sent according to user's operation; Described data memory module is a described application program when sending according to user's operation in described instruction also, with described data storage RAM or FLASH by described user's appointment in the described sharing data area.In this technical scheme, if user suggestion is saved in assigned address with data, confirm that but the operation that the user gets do not have potential safety hazard, preserve according to user intention and get final product.
In technique scheme, preferably, also comprise: the cue mark module, when described application program is sent described instruction, in described instruction, add mark, whether send automatically to identify described instruction by described application program; Described confirmation command module confirms according to the described mark in the described instruction whether described instruction is sent automatically by described application program.In this technical scheme, this mark can be a handle that adds for instruction, and by this handle, can pick out each instruction easily is that application program is sent voluntarily or sent according to user intention.
In technique scheme, preferably, described data are from global Subscriber Identity Module, and the type of described data comprises address list and note.In this technical scheme; need the data of protection can have multiple; data among the USIM not just; also can be other data; for example be recorded in the address list of each immediate communication tool of mobile phone terminal; this address list often also needs a plurality of communication tools shared, and some pictures that perhaps multiple application program can visit and upload, audio frequency etc. also need protection.
In technique scheme, preferably, when described data memory module was sent by described application program automatically in described instruction, notice AP read described data by the communication module corresponding with described global Subscriber Identity Module, and described data storage is arrived RAM.
By above technical scheme; a kind of data guard method and a kind of terminal have been realized; can judge automatically whether the application storage data are spontaneous behaviour; and automatically the data of spontaneous storage are kept among the RAM; these data can be lost after the RAM power down; can avoid it to be employed program and frequently read use, become potential safety hazard.
Description of drawings
Fig. 1 is the process flow diagram of data guard method according to an embodiment of the invention;
Fig. 2 is the block diagram of terminal according to an embodiment of the invention;
Fig. 3 is the process flow diagram of data guard method according to an embodiment of the invention;
Fig. 4 is the data sharing synoptic diagram of data guard method according to an embodiment of the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with the drawings and specific embodiments.
Set forth a lot of details in the following description so that fully understand the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following public specific embodiment.
Fig. 1 is the process flow diagram of data guard method according to an embodiment of the invention.
As shown in Figure 1, the invention provides a kind of data guard method, comprising: step 102, from application program data storage during to the instruction of sharing data area, is confirmed whether described instruction is sent automatically by described application program receiving; Step 104 is when described instruction is sent automatically by described application program, with the RAM (random access memory) of described data storage in the described sharing data area.In this technical scheme, may be the data storage that independently reads of rogue program in RAM, and data are just lost after the RAM power down, preventing to retain for a long time becomes potential safety hazard, is used by rogue program.
In technique scheme, preferably, in described step 102, also comprise: confirm that described instruction is that described application program is sent according to user's operation; In described step 104, also comprise: whether in described instruction is described application program when sending according to user's operation, with described data storage RAM or FLASH (flash memory) by described user's appointment in the described sharing data area.In this technical scheme, if user suggestion is saved in assigned address with data, confirm that but the operation that the user gets do not have potential safety hazard, preserve according to user intention and get final product.
Whether in technique scheme, preferably, described step 102 specifically comprises: when described application program is sent described instruction, add mark in described instruction, sent automatically by described application program to identify described instruction; According to the described mark in the described instruction, confirm whether described instruction is sent automatically by described application program.In this technical scheme, this mark can be a handle that adds for instruction, and by this handle, can pick out each instruction easily is that application program is sent voluntarily or sent according to user intention.
In technique scheme, preferably, described data are from global Subscriber Identity Module, and the type of described data comprises address list and note.In this technical scheme; need the data of protection can have multiple; data among the USIM not just; also can be other data; for example be recorded in the address list of each immediate communication tool of mobile phone terminal; this address list often also needs a plurality of communication tools shared, and some pictures that perhaps multiple application program can visit and upload, audio frequency etc. also need protection.
In technique scheme, preferably, described step 104 specifically comprises: when described instruction was sent automatically by described application program, notice AP (application processor) read described data by the communication module corresponding with described global Subscriber Identity Module, and described data storage is arrived RAM.
Fig. 2 is the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 2, the present invention also provides a kind of terminal 200, comprising: confirmation command module 202, from application program data storage during to the instruction of sharing data area, is confirmed whether described instruction is sent automatically by described application program receiving; Data memory module 204 is when described instruction is sent automatically by described application program, with the RAM of described data storage in the described sharing data area.In this technical scheme, may be the data storage that independently reads of rogue program in RAM, and data are just lost after the RAM power down, preventing to retain for a long time becomes potential safety hazard, is used by rogue program.
In technique scheme, preferably, described confirmation command module 202 confirms also whether described instruction is that described application program is sent according to user's operation; Described data memory module 204 is a described application program when sending according to user's operation in described instruction also, with described data storage RAM or FLASH by described user's appointment in the described sharing data area.In this technical scheme, if user's suggestion is saved in assigned address with data, the operation of affirmation user suggestion does not have potential safety hazard, preserves according to user intention to get final product.
In technique scheme, preferably, also comprise: cue mark module 206, when described application program is sent described instruction, in described instruction, add mark, whether send automatically to identify described instruction by described application program; Described confirmation command module 202 confirms according to the described mark in the described instruction whether described instruction is sent automatically by described application program.In this technical scheme, this mark can be a handle that adds for instruction, and by this handle, can pick out each instruction easily is that application program is sent voluntarily or sent according to user intention.
In technique scheme, preferably, described data are from global Subscriber Identity Module, and the type of described data comprises address list and note.In this technical scheme; need the data of protection can have multiple; data among the USIM not just; also can be other data; for example be recorded in the address list of each immediate communication tool of mobile phone terminal; this address list often also needs a plurality of communication tools shared, and some pictures that perhaps multiple application program can visit and upload, audio frequency etc. also need protection.
In technique scheme, preferably, when described data memory module 204 was sent by described application program automatically in described instruction, notice AP read described data by the communication module corresponding with described global Subscriber Identity Module, and described data storage is arrived RAM.
Fig. 3 is the process flow diagram of data guard method according to an embodiment of the invention.Fig. 4 is the data sharing synoptic diagram of data guard method according to an embodiment of the invention.
For protected data safety, in the present embodiment, provide a kind of method of safer shared data, protect at the USIM data, concrete steps as shown in Figure 3:
Step 302 is sent storage instruction.
In conjunction with Fig. 4, as required, application program is sent the information of obtaining among USIM1 or the USIM2, and it is write the instruction of sharing data area; Described instruction can be the instruction that application program is sent according to user's operation, can be the spontaneous behaviour of application program also, and the latter then probably is that malicious application is the behavior that illegal purpose is stolen user's private information.
Automatically preserve the data of USIM1 or USIM2 or user and have a mind to manually preserve data in order to distinguish mobile phone, need increase a handle memory command, by this handle judge whether manually preserve for the user.
Step 304 reads the information among the USIM.
AP is by communication module 1 and communication module 2, sense data from USIM1 and USIM2 respectively, and these information can be note or address list etc.
Step 306 judges whether that user's proactive command application program comes reading of data, is then to enter step 308, otherwise enters step 310.
As mentioned above, the described behavior of reading can be the behavior that the user knows the inside story, it also can be the unwitting behavior of user, write the described USIM1 or the information among the USIM2 that reads to sharing data area before, need judge whether in advance that the user decides in its sole discretion will deposit data to the FLASH, specifically: extract handle, and analyze to the storage instruction of sharing data area storage data.
Step 308, with data storage in FLASH.
Suppose that if user decision deposits the data of USIM1 among the FLASH in, then the data that will read write FLASH zone in the sharing data area by AP from USIM1.
Step 310, with data storage in RAM.
Suppose that if be not that the user sends for the storage instruction of data among the USIM2, then the data that will read write ram region in the sharing data area by AP from USIM2.
Use this method, can only save the data in when mobile phone is stored automatically among the RAM, but when the user is meant to be kept at the data among the USIM in the mobile phone, then data is saved among the FLASH, thereby prevents that rogue program from utilizing this leak to steal user's private information.
By technical scheme of the present invention; can realize a kind of data guard method and a kind of terminal; can judge automatically whether the application storage data are spontaneous behaviour; and automatically the data of spontaneous storage are kept among the RAM; these data can be lost after the RAM power down; can avoid it to be employed program and frequently read use, become potential safety hazard.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a data guard method is characterized in that, comprising:
Step 102 during to the instruction of sharing data area, confirms whether described instruction is sent automatically by described application program with data storage from application program receiving;
Step 104 is when described instruction is sent automatically by described application program, with the random access memory of described data storage in the described sharing data area.
2. data guard method according to claim 1 is characterized in that, in described step 102, also comprises:
Confirm whether described instruction is that described application program is sent according to user's operation;
In described step 104, also comprise:
In described instruction is described application program when sending according to user's operation, with described data storage described random access memory or described flash memory by described user's appointment in the described sharing data area.
3. data guard method according to claim 1 is characterized in that, described step 102 specifically comprises:
When described application program is sent described instruction, in described instruction, add mark, whether send automatically to identify described instruction by described application program;
According to the described mark in the described instruction, confirm whether described instruction is sent automatically by described application program.
4. according to each described data guard method in the claim 1 to 3, it is characterized in that described data are from global Subscriber Identity Module, the type of described data comprises address list and note.
5. data guard method according to claim 4 is characterized in that, described step 104 specifically comprises:
When described instruction was sent automatically by described application program, the notice application processor read described data by the communication module corresponding with described global Subscriber Identity Module, and described data storage is arrived described random access memory.
6. a terminal is characterized in that, comprising:
The confirmation command module during to the instruction of sharing data area, confirms whether described instruction is sent automatically by described application program with data storage from application program receiving;
Data memory module is when described instruction is sent automatically by described application program, with the random access memory of described data storage in the described sharing data area.
7. terminal according to claim 6 is characterized in that, described confirmation command module confirms also whether described instruction is that described application program is sent according to user's operation;
Described data memory module is a described application program when sending according to user's operation in described instruction also, with described data storage described random access memory or described flash memory by described user's appointment in the described sharing data area.
8. terminal according to claim 6 is characterized in that, also comprises:
Whether the cue mark module when described application program is sent described instruction, is added mark in described instruction, sent automatically by described application program to identify described instruction;
Described confirmation command module confirms according to the described mark in the described instruction whether described instruction is sent automatically by described application program.
9. according to each described terminal in the claim 6 to 8, it is characterized in that described data are from global Subscriber Identity Module, the type of described data comprises address list and note.
10. terminal according to claim 9, it is characterized in that, when described data memory module is sent by described application program automatically in described instruction, the notice application processor reads described data by the communication module corresponding with described global Subscriber Identity Module, and described data storage is arrived described random access memory.
CN 201110225450 2011-08-08 2011-08-08 Data protection method and terminal Active CN102279812B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110225450 CN102279812B (en) 2011-08-08 2011-08-08 Data protection method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110225450 CN102279812B (en) 2011-08-08 2011-08-08 Data protection method and terminal

Publications (2)

Publication Number Publication Date
CN102279812A true CN102279812A (en) 2011-12-14
CN102279812B CN102279812B (en) 2013-12-25

Family

ID=45105271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110225450 Active CN102279812B (en) 2011-08-08 2011-08-08 Data protection method and terminal

Country Status (1)

Country Link
CN (1) CN102279812B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112256373A (en) * 2020-10-21 2021-01-22 中国联合网络通信集团有限公司 USIM application shortcut setting method, terminal and smart card

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0562028A (en) * 1991-09-02 1993-03-12 Nec Corp Information processor
CN101137963A (en) * 2005-04-07 2008-03-05 微软公司 Systems and methods for verifying trust of executable files
CN101231682A (en) * 2007-01-26 2008-07-30 李贵林 Computer information safe method
CN101833622A (en) * 2010-05-10 2010-09-15 深圳市五巨科技有限公司 Method and apparatus for checking and killing Trojan of removable storage device of terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0562028A (en) * 1991-09-02 1993-03-12 Nec Corp Information processor
CN101137963A (en) * 2005-04-07 2008-03-05 微软公司 Systems and methods for verifying trust of executable files
CN101231682A (en) * 2007-01-26 2008-07-30 李贵林 Computer information safe method
CN101833622A (en) * 2010-05-10 2010-09-15 深圳市五巨科技有限公司 Method and apparatus for checking and killing Trojan of removable storage device of terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112256373A (en) * 2020-10-21 2021-01-22 中国联合网络通信集团有限公司 USIM application shortcut setting method, terminal and smart card
CN112256373B (en) * 2020-10-21 2023-05-23 中国联合网络通信集团有限公司 Setting method of USIM application shortcut, terminal and smart card

Also Published As

Publication number Publication date
CN102279812B (en) 2013-12-25

Similar Documents

Publication Publication Date Title
EP3116161B1 (en) Security unit management method and terminal
CN101026834A (en) Locking method and unlocking method
US20150050913A1 (en) Method and device for preventing recording during a conversation
CN103888932B (en) A kind of smart card and its method of support multi-operator number switching
CN103503036A (en) Method for exporting and importing data of a javacard application
WO2008129701A1 (en) File management system and method, and mobile terminal
CN101389100A (en) Personal information protecting method for mobile communication terminal equipment
CN103188672A (en) Mobile terminal and data protection method thereof
CN103116801B (en) A kind of wireless SD card and the implementation method of mode of operation switching thereof
CN104598831A (en) Data security protection method and terminal
CN104486716A (en) Method and device for showing bluetooth name
CN108040335A (en) A kind of Internet of Things communication number management method and system based on smart card
CN103237118A (en) Mobile terminal startup method and system, and mobile terminal
CN104423928A (en) Data processing method, data processing device and terminal equipment
CN101795328A (en) Set-card separation mobile phone and method for realizing card initialization
CN102279812B (en) Data protection method and terminal
WO2010148779A1 (en) Method and terminal for implementing network and card locking function of terminal
CN103067556A (en) Handling method, terminal and system of privacy information
CN104765631A (en) Restoration method and device for application program of mobile terminal
CN103813315A (en) Data protection method of mobile communication terminal
CN103530580A (en) Terminal SD card security management method, device and terminal
CN103209240A (en) Method and system for encrypting and deciphering data
EP3200436B1 (en) Data processing method and data processing apparatus
CN105700971A (en) Data backup method and device
CN104766022A (en) File protection system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant