CN102955917A - Method, device and equipment for protecting data - Google Patents

Method, device and equipment for protecting data Download PDF

Info

Publication number
CN102955917A
CN102955917A CN2011102515009A CN201110251500A CN102955917A CN 102955917 A CN102955917 A CN 102955917A CN 2011102515009 A CN2011102515009 A CN 2011102515009A CN 201110251500 A CN201110251500 A CN 201110251500A CN 102955917 A CN102955917 A CN 102955917A
Authority
CN
China
Prior art keywords
equipment
sign
specific data
data
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102515009A
Other languages
Chinese (zh)
Other versions
CN102955917B (en
Inventor
董小平
陈实
徐练
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201110251500.9A priority Critical patent/CN102955917B/en
Publication of CN102955917A publication Critical patent/CN102955917A/en
Application granted granted Critical
Publication of CN102955917B publication Critical patent/CN102955917B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method, a device and equipment for protecting data. The method is applied to second equipment, and specifically comprises the following steps that: in the case that first equipment is connected with the second equipment, the second equipment obtains a first identification and a second identification, wherein the first identification is the unique identification of the first equipment, and the second identification is the unique identification of the second equipment; and whether the first identification is matched with the second identification is judged, if the first identification is not matched with the second identification, then specified data in the first equipment and/or the second equipment are set to be in a protected state. Special hardware peripherals have no need to be added during an application for the method, the device and the equipment for protecting data disclosed by the invention, and the specified data in the first equipment and the second equipment are protected via hardware authentication according to the identifications (ID) of the equipment; and therefore, the method, the device and the equipment for protecting data are low in cost and high in safety.

Description

A kind of method of protected data, device and equipment
Technical field
The present invention relates to field of computer technology, particularly a kind of method of protected data, device and equipment.
Background technology
At present, electronic equipment has been widely used such as mobile phone, computer, panel computer (PAD) etc., when two equipment link to each other, how to guarantee the separately safety of the interior data of equipment, is the problem that must consider.Present solution is:
1, by the data in two equipment of method protection of pure software.
The method security performance is relatively poor, is cracked easily.
2, protect two data in the equipment by the mode of hardware.
Present hardware-based cryptographic all needs to increase special hardware adaptor; Therefore cost is high.
Summary of the invention
The embodiment of the invention provides a kind of method, device and equipment of protected data, with the realization of the low-cost high security protection to data.
The embodiment of the invention provides a kind of method of protected data, is applied to the second equipment; Described method comprises:
When the first equipment and the second equipment connection,
The second equipment obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment;
Judge whether described the first sign and the second sign mate,
If described the first sign and the second sign are not mated, then the specific data in described the first equipment and/or the second equipment is set to shielded state.
Wherein, if described the first sign and second marking matched, then the interior specific data of described the first equipment and/or the second equipment is set to the state of de-preservation.
Wherein, the specific data in described the first equipment and/or the second equipment is set to shielded state and comprises:
Determine specific data;
Send the first data protection instruction for described the first equipment, so that described the first equipment is set to guard mode according to the described specific data of instruction that receives; And/or,
Send the second data protection instruction for described the second equipment, so that described the second equipment is set to guard mode according to the described specific data of instruction that receives.
Wherein, described specific data is set to guard mode and comprises:
For hiding, or the read-write properties of described specific data are set to read-onlyly with the hiding setup of attribute of described specific data, or the access attribute of described specific data is set to denied access.
The embodiment of the invention also provides a kind of device of protected data, is applied to the second equipment; Described device comprises:
Acquiring unit is used for when the first equipment and the second equipment connection, obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment;
Judging unit is used for judging whether described the first sign and the second sign mate,
Data protection unit is used for identifying when not mating in described the first sign and second, and the specific data in described the first equipment and/or the second equipment is set to shielded state.
Wherein, described data protection unit also is used in described the first sign and second when marking matched, and the specific data in described the first equipment and/or the second equipment is set to the state of de-preservation.
Wherein, described data protection unit comprises,
The data determining unit is used for determining specific data;
Instruction issues the unit, is used for sending the first data protection instruction to described the first equipment, so that described the first equipment is set to guard mode according to the described specific data of instruction that receives; And/or, send the second data protection instruction for described the second equipment, so that described the second equipment is set to guard mode according to the described specific data of instruction that receives.
Wherein, described specific data is set to guard mode and comprises:
For hiding, or the read-write properties of described specific data are set to read-onlyly with the hiding setup of attribute of described specific data, or the access attribute of described specific data is set to denied access.
The embodiment of the invention also provides a kind of equipment, comprising:
Storage unit is used for second of preservation equipment self and identifies;
Processing unit is used for when the first equipment and the second equipment connection, obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment; Judge whether described the first sign and the second sign mate; Identify when not mating in described the first sign and second, the specific data in described the first equipment and/or the second equipment is set to shielded state.
Wherein, described processing unit also is used in described the first sign and second when marking matched, and the specific data in described the first equipment and/or the second equipment is set to the state of de-preservation.
Wherein, described the first equipment is the equipment that possesses display and operating system; Described the second equipment is for only possessing the equipment of operating system.
Use the application, do not need to increase special hardware adaptor, protect specific data in first and second equipment according to the sign (ID) of equipment by hardware identification, cost is low and safe.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art, apparently, accompanying drawing in the following describes only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the method flow diagram according to a kind of protected data of the embodiment of the invention;
Fig. 2 is the apparatus structure synoptic diagram according to a kind of protected data of the embodiment of the invention;
Fig. 3 is a kind of device structure synoptic diagram according to the embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
Referring to Fig. 1, it is the method flow diagram according to a kind of protected data of the embodiment of the invention, and this flow process is applied to the second equipment; Described method specifically comprises:
Step 101, when the first equipment and the second equipment connection, the second equipment obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment;
Here, described the first equipment and the second equipment all are the equipment that comprises processor, and for example, the first equipment is computing machine, the second equipment is mobile phone, and perhaps, the first equipment is computing machine, and the second equipment is panel computer, perhaps, the first equipment is intelligent television (TV), and the second equipment is mobile phone etc.
Step 102 judges whether described the first sign and the second sign mate;
Here, can adopt one of following dual mode to judge:
Mode one: be provided with the ID matching algorithm in first and second equipment, sign according to this matching algorithm acquisition need be mated afterwards, reads sign from equipment to be matched, if the sign that reads out is with identical according to the sign that calculates in the matching algorithm, then the match is successful.
For example, the ID of the second equipment is 123, knows according to matching algorithm, with the ID of the second equipment should be 213 with the ID of 123 the first equipment that are complementary namely, so, be 213 as long as the second equipment obtains the ID of the first equipment, then the first sign and the second marking matched success.
The first equipment judges that the process whether the second equipment mate is the same.
Mode two: in first and second equipment ID number of the equipment to be matched of various that have storage unit to be used to store to preset and self coupling, when needs are verified, only need and to compare from the equipment to be matched ID that reads out and the ID that has stored number, if identical then the match is successful.
For example, the ID of pre-stored the first equipment is 213 on the second equipment, when needs mate checking, the second equipment at first reads its ID from the first equipment, the result who for example reads ID is 213, afterwards, the ID of the first equipment of the ID that reads and self storage is compared, then the match is successful if both are identical.
Step 103, if described the first sign and the second sign are not mated, then the specific data in described the first equipment and/or the second equipment is set to shielded state.
Above-mentioned steps 103 can specifically comprise:
Determine specific data; For example, this specific data can be private document, application program etc.;
Send the first data protection instruction for described the first equipment, so that described the first equipment is set to guard mode according to the described specific data of instruction that receives; And/or, send the second data protection instruction for described the second equipment, so that described the second equipment is set to guard mode according to the described specific data of instruction that receives.That is to say; when the sign of judging equipment is not mated with default sign; both only the specific data in the first equipment was set to protected state; only the specific data in the second equipment is set to protected state, the specific data of first and second equipment content can also be set to protected state simultaneously.
Above-mentioned described specific data is set to guard mode and comprises: for hiding, or the read-write properties of described specific data are set to read-onlyly with the hiding setup of attribute of described specific data, or the access attribute of described specific data is set to denied access etc.
Need to prove that if described the first sign and second marking matched, then the interior specific data of described the first equipment and/or the second equipment is set to the state of de-preservation.
Need to prove, the embodiment of the invention can be applied in mixed architecture (hybrid) system that is comprised of the first equipment and the second equipment, wherein, the mixed architecture system can be two independently terminal device combine, also can comprise a portable terminal device of the first equipment and the second equipment.Can being comprised of notebook and smart mobile phone of a platform independent triangular web such as the mixed architecture system, also can be the notebook with mixed architecture system.
Wherein, the first equipment can comprise the first hardware system, such as based on X86-based or ARM architecture processor from system; The second equipment can comprise the second hardware system, such as the main system based on X86-based or ARM architecture processor.Namely the first equipment and the second equipment can be based on identical hardware structures, also can be according to different hardware structures.In addition, main system and from system can be the differentiation two systems carried out according to importance or priority or processing power or power consumption (for example, the corresponding importance of main system is high, priority is high, processing power is strong or power consumption is large, and from system with above-mentioned opposite), also can only be the differentiation in order to name, and the importance of non-limiting system or priority or processing power or power consumption.
Further, the second equipment can comprise the second hardware system with second operating system, such as desk device operating system being installed (such as Windows, Linux or MacOS) or the second hardware system of portable device system (such as Android, Symbian or iOS) is installed; The first equipment can comprise the first hardware system with first operating system, such as desk device operating system being installed (such as Windows, Linux or MacOS) or the first hardware system of portable device system (such as Android, Symbian or iOS) is installed.Namely the first operating system and the second operating system can be the same or different, as long as may operate in corresponding hardware system.Preferably, the second equipment is based on the X86-based processor, and the main system of desktop operating system is installed; The first equipment is based on the ARM architecture processor, be equipped with the portable device system from system.
Wherein, the first equipment has first interface (communication unit), and the second equipment has the second corresponding interface, the first equipment be connected the first interface of equipment by correspondence and be connected or separate with the second Interface realization.First interface and the second interface can be that wireline interface also can be wave point, do not do restriction herein, as long as the first interface of the first equipment can realize being connected of two terminals with the second interface of the second equipment and separate, and can intercommunication data, especially operative scenario data.
When first interface and the second interface were wireline interface, first interface can be specially data bus interface, such as USB interface, or the UART interface, or self defined interface satisfies two connection or separation between the equipment.The second interface also can be the USB interface of correspondence, or the UART interface, or self defined interface satisfies two connection or separation between the system.When first interface and the second interface were wave point, both sides can be the blue tooth interfaces of coupling, or infrared interface, or the Wifi interface.
Take the notebook of hybrid system configuration as example, the first equipment and the second equipment are two relative independent system, can work alone respectively or link together work.The second equipment is arranged at the host computer side with respect to the single system notebook, possesses processing unit, input block, and storage unit, but do not possess display unit; The first equipment is arranged at the display screen side with respect to the single system notebook, possesses processing unit, input block, storage unit, display unit.When the first equipment and the second equipment connection and combination work, two terminals can shared portion hardware cell, for example display unit.Because display unit and the first integration of equipments, therefore when the first equipment during with the disconnection of the second equipment or wired the separation, only for the first equipment; When the first equipment and the second equipment connection, can use for the first equipment, also can use for the second equipment, operation result/output content of namely using (containing operating system) in the first equipment and/or the second equipment can show by display unit.
Be in the portable terminal device of above-mentioned composition hybrid system configuration, have from the equipment of the similar panel computer (PAD) of system and be equivalent to the first equipment the embodiment of the present application that the main process equipment with main system is equivalent to the second equipment in the embodiment of the present application.
Concrete, take the first equipment as comprising the panel computer equipment (pad) from operating system, the second equipment is that the main process equipment (base) with master operating system is example, when the first equipment and the second equipment connection, the output that the display unit of the first equipment is used as the second equipment, when the user need to leave from current working environment, the first equipment need to be separated with the second equipment is wired, according to the first condition that pre-sets before, the first equipment obtains operative scenario data corresponding to described at least one application according to the current duty of at least one application in the operation of the second equipment.
Based on above-mentioned composition hybrid system configuration, a kind of possible example is that above-mentioned the first equipment is the equipment that possesses display and operating system, such as PAD; Above-mentioned the second equipment is for only possessing the equipment of operating system, such as pedestal (BASE).Another kind of possible example is that above-mentioned the second equipment is the equipment that possesses display and operating system, such as PAD; Above-mentioned the first equipment is for only possessing the equipment of operating system, such as pedestal (BASE).
Use the method that the application provides, do not need to increase special hardware adaptor, protect specific data in first and second equipment according to the sign (ID) of equipment by hardware identification, cost is low and safe.
Below in conjunction with an example the application is elaborated again.
In this example, suppose that the first equipment is PAD, the second equipment is BASE.
BASE and PAD have unique device id, carry out the matching inspection by the device id to them, to finish the protection operation to file.Concrete matching inspection can be adopted one of aforementioned dual mode.
The file of being protected by the user inside the BASE/PAD when the match is successful is de-preservation all, namely can see file, and can operate file; When coupling when unsuccessful, the file that BASE/PAD is protected by the user the inside all is added protection, and namely invisible the or file of file cannot operate.
Particularly; BASE/PAD can be regarded as a hardware USB key; after after PAD inserts BASE, being the first equipment and the second equipment connection; BASE and PAD system can read the other side's device id mutually; the match is successful if the device id of BASE/PAD is verified; BASE and PAD For Solutions of Systems are except the file protection function, and the user can access and operate files all in the BASE/PAD.If device id mates unsuccessful words, protected file can not access and operate in the BASE/PAD system.
In the situation that does not increase peripheral hardware, realized hardware encipher like this; protect private data among the BASE/PAD by hardware identification; by mating their device id; can well protect the file among the BASE/PAD; so that the personal data safety of BASE/PAD improves greatly, strengthened the security performance of agent-protected file.
The embodiment of the invention also provides a kind of device of protected data, referring to Fig. 2, is applied to the second equipment; Described device specifically comprises:
Acquiring unit 201 is used for when the first equipment and the second equipment connection, obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment;
Judging unit 202 is used for judging whether described the first sign and the second sign mate,
Data protection unit 203 is used for identifying when not mating in described the first sign and second, and the specific data in described the first equipment and/or the second equipment is set to shielded state.
Above-mentioned data protection unit 203 also is used in described the first sign and second when marking matched, and the specific data in described the first equipment and/or the second equipment is set to the state of de-preservation.
Above-mentioned data protection unit can specifically comprise,
The data determining unit is used for determining specific data;
Instruction issues the unit, is used for sending the first data protection instruction to described the first equipment, so that described the first equipment is set to guard mode according to the described specific data of instruction that receives; And/or, send the second data protection instruction for described the second equipment, so that described the second equipment is set to guard mode according to the described specific data of instruction that receives.
Wherein, described specific data is set to guard mode and comprises: for hiding, or the read-write properties of described specific data are set to read-onlyly with the hiding setup of attribute of described specific data, or the access attribute of described specific data is set to denied access.
Use the device that the application provides, do not need to increase special hardware adaptor, protect specific data in first and second equipment according to the sign (ID) of equipment by hardware identification, cost is low and safe.
The embodiment of the invention also provides a kind of equipment, referring to Fig. 3, specifically comprises:
Storage unit 301 is used for second of preservation equipment self and identifies;
Processing unit 302 is used for when the first equipment and the second equipment connection, obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment; Judge whether described the first sign and the second sign mate; Identify when not mating in described the first sign and second, the specific data in described the first equipment and/or the second equipment is set to shielded state.
Above-mentioned processing unit 302 also is used in described the first sign and second when marking matched, and the specific data in described the first equipment and/or the second equipment is set to the state of de-preservation.
Described the first equipment is the equipment that possesses display and operating system, such as PAD; Described the second equipment is for only possessing the equipment of operating system, such as BASE.
Use the equipment that the application provides, do not need to increase special hardware adaptor, protect specific data in first and second equipment according to the sign (ID) of equipment by hardware identification, cost is low and safe.
For device and apparatus embodiments because its basic simlarity is in embodiment of the method, so describe fairly simple, relevant part gets final product referring to the part explanation of embodiment of the method.
Need to prove, in this article, relational terms such as the first and second grades only is used for an entity or operation are made a distinction with another entity or operation, and not necessarily requires or hint and have the relation of any this reality or sequentially between these entities or the operation.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby not only comprise those key elements so that comprise process, method, article or the equipment of a series of key elements, but also comprise other key elements of clearly not listing, or also be included as the intrinsic key element of this process, method, article or equipment.Do not having in the situation of more restrictions, the key element that is limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment that comprises described key element and also have other identical element.
One of ordinary skill in the art will appreciate that all or part of step that realizes in the said method embodiment is to come the relevant hardware of instruction to finish by program, described program can be stored in the computer read/write memory medium, here alleged storage medium, as: ROM/RAM, magnetic disc, CD etc.
The above is preferred embodiment of the present invention only, is not for limiting protection scope of the present invention.All any modifications of doing within the spirit and principles in the present invention, be equal to replacement, improvement etc., all be included in protection scope of the present invention.

Claims (11)

1. the method for a protected data is characterized in that, is applied to the second equipment; Described method comprises:
When the first equipment and the second equipment connection,
The second equipment obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment;
Judge whether described the first sign and the second sign mate,
If described the first sign and the second sign are not mated, then the specific data in described the first equipment and/or the second equipment is set to shielded state.
2. described method according to claim 1 is characterized in that, if described the first sign and second marking matched, then the interior specific data of described the first equipment and/or the second equipment is set to the state of de-preservation.
3. described method according to claim 1 is characterized in that the specific data in described the first equipment and/or the second equipment is set to shielded state and comprises:
Determine specific data;
Send the first data protection instruction for described the first equipment, so that described the first equipment is set to guard mode according to the described specific data of instruction that receives; And/or,
Send the second data protection instruction for described the second equipment, so that described the second equipment is set to guard mode according to the described specific data of instruction that receives.
4. according to claim 1 or 3 described methods, it is characterized in that described specific data is set to guard mode and comprises:
For hiding, or the read-write properties of described specific data are set to read-onlyly with the hiding setup of attribute of described specific data, or the access attribute of described specific data is set to denied access.
5. the device of a protected data is characterized in that, is applied to the second equipment; Described device comprises:
Acquiring unit is used for when the first equipment and the second equipment connection, obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment;
Judging unit is used for judging whether described the first sign and the second sign mate,
Data protection unit is used for identifying when not mating in described the first sign and second, and the specific data in described the first equipment and/or the second equipment is set to shielded state.
6. described device according to claim 5 is characterized in that,
Described data protection unit also is used in described the first sign and second when marking matched, and the specific data in described the first equipment and/or the second equipment is set to the state of de-preservation.
7. described device according to claim 5 is characterized in that, described data protection unit comprises,
The data determining unit is used for determining specific data;
Instruction issues the unit, is used for sending the first data protection instruction to described the first equipment, so that described the first equipment is set to guard mode according to the described specific data of instruction that receives; And/or, send the second data protection instruction for described the second equipment, so that described the second equipment is set to guard mode according to the described specific data of instruction that receives.
8. want 5 or 7 described devices according to right, it is characterized in that, described specific data is set to guard mode and comprises:
For hiding, or the read-write properties of described specific data are set to read-onlyly with the hiding setup of attribute of described specific data, or the access attribute of described specific data is set to denied access.
9. an equipment is characterized in that, comprising:
Storage unit is used for second of preservation equipment self and identifies;
Processing unit is used for when the first equipment and the second equipment connection, obtains the first sign and the second sign; Wherein, described first is designated the unique identification of the first equipment, and described second is designated the unique identification of the second equipment; Judge whether described the first sign and the second sign mate; Identify when not mating in described the first sign and second, the specific data in described the first equipment and/or the second equipment is set to shielded state.
10. described equipment according to claim 9 is characterized in that,
Described processing unit also is used in described the first sign and second when marking matched, and the specific data in described the first equipment and/or the second equipment is set to the state of de-preservation.
11. according to claim 9 or 10 described equipment, it is characterized in that,
Described the first equipment is the equipment that possesses display and operating system; Described the second equipment is for only possessing the equipment of operating system.
CN201110251500.9A 2011-08-29 2011-08-29 A kind of method of protected data, device and equipment Active CN102955917B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110251500.9A CN102955917B (en) 2011-08-29 2011-08-29 A kind of method of protected data, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110251500.9A CN102955917B (en) 2011-08-29 2011-08-29 A kind of method of protected data, device and equipment

Publications (2)

Publication Number Publication Date
CN102955917A true CN102955917A (en) 2013-03-06
CN102955917B CN102955917B (en) 2016-03-30

Family

ID=47764708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110251500.9A Active CN102955917B (en) 2011-08-29 2011-08-29 A kind of method of protected data, device and equipment

Country Status (1)

Country Link
CN (1) CN102955917B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103996010A (en) * 2014-06-12 2014-08-20 联想(北京)有限公司 Control method and device
CN104239244A (en) * 2014-08-25 2014-12-24 小米科技有限责任公司 Method and device for display management over data to be accessed
CN104318177A (en) * 2014-10-29 2015-01-28 小米科技有限责任公司 Protection method and protection device for data of terminal equipment
CN104318170A (en) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 Multi-mobile terminal-based data security protection method and device
CN104917837A (en) * 2015-06-11 2015-09-16 百度在线网络技术(北京)有限公司 Message processing method and system
CN105103161A (en) * 2013-03-19 2015-11-25 惠普发展公司,有限责任合伙企业 Interconnect assembly
CN105704837A (en) * 2014-11-28 2016-06-22 华为终端(东莞)有限公司 Method and equipment for establishing wireless connection
CN106875655A (en) * 2017-03-21 2017-06-20 广东容祺智能科技有限公司 A kind of unmanned aerial vehicle data communication jamproof system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1372179A (en) * 2001-02-23 2002-10-02 株式会社东芝 Telecommunication setting method and electronic equipment thereof
CN1691578A (en) * 2004-04-29 2005-11-02 华为技术有限公司 A method of self validity verification for an equipment
CN1818919A (en) * 2006-03-02 2006-08-16 王清华 Permission verification and verifying system for electronic file
CN101114901A (en) * 2006-07-26 2008-01-30 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN101393587A (en) * 2007-09-21 2009-03-25 鸿富锦精密工业(深圳)有限公司 Mobile equipment with security protection function and security protection method thereof
CN101751524A (en) * 2008-12-04 2010-06-23 联想(北京)有限公司 Device, method and computer for management of computer external equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1372179A (en) * 2001-02-23 2002-10-02 株式会社东芝 Telecommunication setting method and electronic equipment thereof
CN1691578A (en) * 2004-04-29 2005-11-02 华为技术有限公司 A method of self validity verification for an equipment
CN1818919A (en) * 2006-03-02 2006-08-16 王清华 Permission verification and verifying system for electronic file
CN101114901A (en) * 2006-07-26 2008-01-30 联想(北京)有限公司 Safety authentication system, apparatus and method for non-contact type wireless data transmission
CN101393587A (en) * 2007-09-21 2009-03-25 鸿富锦精密工业(深圳)有限公司 Mobile equipment with security protection function and security protection method thereof
CN101751524A (en) * 2008-12-04 2010-06-23 联想(北京)有限公司 Device, method and computer for management of computer external equipment

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105103161A (en) * 2013-03-19 2015-11-25 惠普发展公司,有限责任合伙企业 Interconnect assembly
CN103996010A (en) * 2014-06-12 2014-08-20 联想(北京)有限公司 Control method and device
CN104239244A (en) * 2014-08-25 2014-12-24 小米科技有限责任公司 Method and device for display management over data to be accessed
CN104318170A (en) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 Multi-mobile terminal-based data security protection method and device
CN104318170B (en) * 2014-09-29 2018-02-16 广东欧珀移动通信有限公司 A kind of method and device based on multi-mobile-terminal protection data safety
CN104318177A (en) * 2014-10-29 2015-01-28 小米科技有限责任公司 Protection method and protection device for data of terminal equipment
CN105704837A (en) * 2014-11-28 2016-06-22 华为终端(东莞)有限公司 Method and equipment for establishing wireless connection
US10366214B2 (en) 2014-11-28 2019-07-30 Huawei Technologies Co., Ltd. Method and device for establishing wireless connection
CN105704837B (en) * 2014-11-28 2020-02-14 华为终端有限公司 Method and equipment for establishing wireless connection
CN104917837A (en) * 2015-06-11 2015-09-16 百度在线网络技术(北京)有限公司 Message processing method and system
CN104917837B (en) * 2015-06-11 2018-05-04 百度在线网络技术(北京)有限公司 A kind of method and system for Message Processing
CN106875655A (en) * 2017-03-21 2017-06-20 广东容祺智能科技有限公司 A kind of unmanned aerial vehicle data communication jamproof system and method

Also Published As

Publication number Publication date
CN102955917B (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN102955917A (en) Method, device and equipment for protecting data
CN102571708B (en) Safety certifying method, portable terminal device and portable mobile equipment
CN100437618C (en) Portable information safety device
CN105493538A (en) Systems and methods for NFC access control in a secure element centric nfc architecture
US20120072655A1 (en) Storage device and access control system thereof, sd card and data access control method thereof
CN105393258A (en) System and method for providing secure access control to a graphics processing unit
CN105307287A (en) Connection method and wearable equipment
CN101661442A (en) Data card information protection method and device
CN114239015B (en) Data security management method and device, data cloud platform and storage medium
GB2434661A (en) Portable communication device with smart card functionality
CN102883323A (en) Method and device for protecting user private data of mobile terminal
CN103049705B (en) A kind of based on virtualized method for secure storing, terminal and system
CN104768204A (en) Network access management method, wearable device and system
CN204697108U (en) A kind of Portable movable fire compartment wall
CN116628708B (en) Method for starting chip, electronic equipment and readable storage medium
CN104268483A (en) Data protecting system, device and method
CN104281415A (en) Data processing method and device for air conditioner
CN108287988B (en) Security management system and method for mobile terminal file
CN103455767A (en) System and method for multi-network safety isolation
CN105740719A (en) Wireless safe USB (Universal Serial Bus) flash disk and implementation method thereof
CN102750230B (en) Access control system and method of universal serial bus (USB) storage equipment
CN107332670A (en) Safety control, system, method and mobile device based on UFS interfaces
CN106951790A (en) USB storage medium transparent encryption methods
CN112165706B (en) Equipment connection management method and device and Bluetooth equipment
CN106296192A (en) The safe transmission method of password, system and close shield

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant