CN104091119B - The guard method of a kind of mobile terminal and its data, protection system - Google Patents
The guard method of a kind of mobile terminal and its data, protection system Download PDFInfo
- Publication number
- CN104091119B CN104091119B CN201410242670.4A CN201410242670A CN104091119B CN 104091119 B CN104091119 B CN 104091119B CN 201410242670 A CN201410242670 A CN 201410242670A CN 104091119 B CN104091119 B CN 104091119B
- Authority
- CN
- China
- Prior art keywords
- screen
- mobile terminal
- lock
- password file
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
Description
Claims (10)
- A kind of 1. guard method of mobile terminal data, it is characterised in that including:When detecting the operational motion to screen-lock password file, judge whether screen is in the lock state;When judging that the screen is in the lock state, the user data of mobile terminal is protected according to default safeguard measure Shield.
- 2. according to the method for claim 1, it is characterised in thatThe step of default safeguard measure of the basis is protected to the user data of mobile terminal includes:Make mobile terminal factory reset, to delete the user data of the mobile terminal.
- 3. according to the method for claim 1, it is characterised in thatIt is described when detecting the operational motion to screen-lock password file, judge that the step of whether screen is in the lock state is wrapped Include:The change of the screen-lock password file is monitored by file change informing mechanism, is sent out when monitoring the screen-lock password file During changing, the operational motion to the screen-lock password file is as detected;Judge whether screen is in the lock state.
- 4. according to the method for claim 3, it is characterised in thatIt is described the screen-lock password file is monitored by file change informing mechanism change the step of include:Event is deleted or modified by what file change informing mechanism monitored the screen-lock password file, when monitoring the screen locking When event is deleted or modified in cryptogam, the screen-lock password file changes.
- 5. according to the method for claim 3, it is characterised in thatIt is described to judge that the step of whether screen is in the lock state includes:The mark for judging the record mobile terminal released state set by the kernel of the mobile terminal is that screen is in locking shape State or screen are in released state.
- A kind of 6. protection system of mobile terminal data, it is characterised in that including:Judge module, for when detecting the operational motion to screen-lock password file, judging whether screen is in the lock state;Processing module, for when judging that the screen is in the lock state, the use according to default safeguard measure to mobile terminal User data is protected.
- 7. protection system according to claim 6, it is characterised in thatThe processing module is used for when the judge module judges that the screen is in the lock state, and recovers mobile terminal Factory is set, to delete the user data of the mobile terminal.
- 8. protection system according to claim 6, it is characterised in that the judge module includes:Monitoring unit, it is described when monitoring for monitoring the change of the screen-lock password file by file change informing mechanism When screen-lock password file changes, the operational motion to the screen-lock password file is as detected;Judging unit, for judging whether screen is in the lock state.
- 9. protection system according to claim 8, it is characterised in thatThe monitoring unit is used to event be deleted or modified by the file change informing mechanism monitoring screen-lock password file, When monitoring the screen-lock password file event being deleted or modified, the screen-lock password file changes.
- 10. protection system according to claim 8, it is characterised in thatThe judging unit is used to judge the mark of the record mobile terminal released state set by the kernel of the mobile terminal It is that screen is in the lock state or screen is in released state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410242670.4A CN104091119B (en) | 2014-06-03 | 2014-06-03 | The guard method of a kind of mobile terminal and its data, protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410242670.4A CN104091119B (en) | 2014-06-03 | 2014-06-03 | The guard method of a kind of mobile terminal and its data, protection system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104091119A CN104091119A (en) | 2014-10-08 |
CN104091119B true CN104091119B (en) | 2017-12-19 |
Family
ID=51638834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410242670.4A Active CN104091119B (en) | 2014-06-03 | 2014-06-03 | The guard method of a kind of mobile terminal and its data, protection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104091119B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105678171A (en) * | 2014-11-17 | 2016-06-15 | 中兴通讯股份有限公司 | Data processing method, device and mobile terminal |
CN105426778A (en) * | 2015-11-18 | 2016-03-23 | 罗满清 | Information processing method and apparatus |
CN105488429A (en) * | 2015-11-25 | 2016-04-13 | 华勤通讯技术有限公司 | Mobile terminal and data security protection method thereof |
CN105808992A (en) * | 2016-03-14 | 2016-07-27 | 宇龙计算机通信科技(深圳)有限公司 | Data reading method and device and terminal |
CN106973155A (en) * | 2017-03-22 | 2017-07-21 | 清华大学合肥公共安全研究院 | A kind of mobile phone personal information security management method |
CN110113475A (en) * | 2019-04-30 | 2019-08-09 | 大连睿海信息科技有限公司 | Android system mobile phone screen lock crack method based on Lian Fa section MTK processor communication agreement |
US20200387633A1 (en) * | 2019-06-07 | 2020-12-10 | Lenovo (Singapore) Pte. Ltd. | Apparatus, method, and program product for securing personal information in a file |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7373516B2 (en) * | 2004-08-19 | 2008-05-13 | International Business Machines Corporation | Systems and methods of securing resources through passwords |
CN1968467A (en) * | 2006-06-21 | 2007-05-23 | 华为技术有限公司 | Mobile terminal and terminal user information protection method |
CN101216867A (en) * | 2007-01-05 | 2008-07-09 | 黄承雄 | A logging-on process cipher protection method by means of background synchronization |
CN101616495A (en) * | 2008-06-23 | 2009-12-30 | 网秦无限(北京)科技有限公司 | The method and system of individual privacy in the protection mobile phone |
CN102236751A (en) * | 2010-04-22 | 2011-11-09 | 研华股份有限公司 | Computer system with safety lock and method for implementing safety lock |
CN103595851A (en) * | 2012-08-16 | 2014-02-19 | 联芯科技有限公司 | Personal-information leakage-proof method for mobile terminal and mobile terminal |
-
2014
- 2014-06-03 CN CN201410242670.4A patent/CN104091119B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN104091119A (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104091119B (en) | The guard method of a kind of mobile terminal and its data, protection system | |
US10846425B2 (en) | Data protection based on user input during device boot-up, user login, and device shut-down states | |
EP3161720B1 (en) | Data protection based on user and gesture recognition | |
RU2608243C2 (en) | Method and device for screen and terminal unlocking | |
KR101489152B1 (en) | Apparatus and method for preventing screen capture | |
CN103632107B (en) | A kind of information of mobile terminal security protection system and method | |
CN107944292B (en) | Privacy data protection method and system | |
CN106599115B (en) | Data protection method, device and terminal | |
CN103619001A (en) | Short message processing method, device and mobile terminal | |
CN106485170A (en) | A kind of data inputting method and device | |
EP3652647B1 (en) | System and method for detecting a malicious file using image analysis prior to execution of the file | |
CN111079134A (en) | Method and device for controlling authority globally, storage medium and electronic equipment | |
CN101308700A (en) | Divulging secret prevention U disk | |
US9521552B2 (en) | Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely | |
CN104182667B (en) | Data guard method and device based on screen locking | |
CN106453057B (en) | A kind of method and terminal for preventing short message to be stolen | |
US20150213242A1 (en) | Electronics security application | |
EP2863331A1 (en) | Portable terminal, program, and control method | |
CN103530580A (en) | Terminal SD card security management method, device and terminal | |
EP3767507A1 (en) | Data processing method against ransomware, program for executing same, and computer-readable recording medium with program recorded thereon | |
US20150020165A1 (en) | System of executing application and method thereof | |
CN107169354A (en) | Multi-layer android system malicious act monitoring method | |
Desai | A survey on Android ransomware and its detection methods | |
EP3384632B1 (en) | Apparatus and method for camera-based user authentication for content access | |
CN106295274B (en) | Application program control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190715 Address after: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.) Patentee after: Wei Expo information service (Shenzhen) Co., Ltd. Address before: 518053 Guangdong city of Shenzhen province Nanshan District overseas Chinese town in Eastern Industrial Zone H3 building 501B Co-patentee before: Tian Long Electronic Science and Technology Co., Ltd. of Jiangsu Province Patentee before: Shenzhen Tinno Wireless Technology Co., Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190812 Address after: E-S-215-2, Block E, 6596 Dongfanghong Road, Yuanqiao Town, Dezhou Economic and Technological Development Zone, 250000 Shandong Province Patentee after: Dezhou Tang Seng Intellectual Property Service Co., Ltd. Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.) Patentee before: Wei Expo information service (Shenzhen) Co., Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190829 Address after: Room 509, Building 508 Chundong Road, Minhang District, Shanghai 201108 Patentee after: Shanghai Taiyu information technology Limited by Share Ltd Address before: E-S-215-2, Block E, 6596 Dongfanghong Road, Yuanqiao Town, Dezhou Economic and Technological Development Zone, 250000 Shandong Province Patentee before: Dezhou Tang Seng Intellectual Property Service Co., Ltd. |