CN104134048B - The encryption method and encryption device of storage card - Google Patents

The encryption method and encryption device of storage card Download PDF

Info

Publication number
CN104134048B
CN104134048B CN201410375047.6A CN201410375047A CN104134048B CN 104134048 B CN104134048 B CN 104134048B CN 201410375047 A CN201410375047 A CN 201410375047A CN 104134048 B CN104134048 B CN 104134048B
Authority
CN
China
Prior art keywords
storage card
encrypted
key
encryption
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410375047.6A
Other languages
Chinese (zh)
Other versions
CN104134048A (en
Inventor
阳得常
燕青洲
程力行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410375047.6A priority Critical patent/CN104134048B/en
Publication of CN104134048A publication Critical patent/CN104134048A/en
Application granted granted Critical
Publication of CN104134048B publication Critical patent/CN104134048B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Abstract

The present invention proposes a kind of encryption method of storage card and a kind of encryption device of storage card, wherein the encryption method of the storage card includes:It is encrypted using storage card described in the key pair being stored in the default subregion of terminal;The encrypted state for the storage card being stored in the storage card is set as encrypting.Key can be stored in terminal by technical solution through the invention, and encrypted state is preserved on a memory card, allows a terminal that multiple storage cards are encrypted respectively, improves the convenience that user uses.

Description

The encryption method and encryption device of storage card
Technical field
The present invention relates to encryption technology fields, the encryption method in particular to a kind of storage card and a kind of storage card Encryption device.
Background technology
Currently, when storage card is encrypted, usually all it is that storage card is inserted into the terminals such as mobile phone, is used on mobile phone When storage card is encrypted in eCryptfs (enterprise-level file encryption system), PIN code (Personal can be used Identification Number, Personal Identity Number) key is encrypted as password.PIN code is the SIM of mobile phone The personal recognition code for blocking (subscriber identification card), for protecting the SIM card of user oneself not obtained by other people.In this way, After booting, carries out cryptographic check and storage card is read out when the password is correct.
However, the encrypted state of this storage card is stored in terminal inner, cause terminal can not be to multiple storage cards simultaneously It is encrypted.After terminal-pair first, which opens storage card, to be encrypted, first storage card is pulled out, and be inserted into second storage card, Terminal can prompt to need to decrypt second storage card at this time, that is, the encrypted state of first storage card can be used to user Second storage card is made troubles.
Therefore, how to make a terminal that multiple storage cards be encrypted respectively, to promote the convenience that user uses, at For current urgent problem to be solved.
Invention content
The present invention is based on the above problem, it is proposed that a kind of new technical solution can make a terminal respectively to more It opens storage card to be encrypted, promotes the convenience that user uses.
In view of this, an aspect of of the present present invention proposes a kind of encryption method of storage card, including:Using being stored in terminal Default subregion in key pair described in storage card be encrypted;And by the storage card being stored in the storage card Encrypted state is set as encrypting.
In the technical scheme, eCryptfs modes may be used storage card is encrypted, storage card is encrypted Key in terminal, and the encrypted state of storage card is saved on a memory card, in this way, it is right respectively to allow for a terminal Multiple storage cards are encrypted, without cause the encrypted state of certain storage card influence other storage cards encrypted state feelings Condition occurs, and greatly improves the convenience that user uses.
In the above-mentioned technical solutions, it is preferable that further include:When not having the key in the default subregion, create The key;And the key is encrypted, and be stored in the default subregion.
In the technical scheme, the key of establishment is for being encrypted storage card, and key is encrypted can be with Prevent key from illegally being erased and leading to not that storage card is decrypted, by key storage in the default subregion of terminal so as to Key pair storage card is called to be encrypted.
In the above-mentioned technical solutions, it is preferable that further include:Using the key pair institute being stored in the default subregion of terminal When stating storage card and being encrypted, increase the encryption number being stored in the default subregion;And it is stored in terminal using When storage card described in key pair in default subregion is decrypted, the encryption number in the default subregion is reduced, and by institute The encrypted state for stating storage card is set as unencryption.
In the technical scheme, encryption number can be counted, by the number of the storage card after the completion of encryption or decryption Mesh is stored in predetermined partition, and when a storage card is encrypted, the number of storage card increases by one, is stored when to one When card is decrypted, the number of storage card reduces one.
In the above-mentioned technical solutions, it is preferable that further include:When the encryption number is zero, the default subregion is removed In the key.
In the technical scheme, when the number of the storage card preserved in subregion is reduced to zero, illustrate currently without encrypted Storage card can remove the key being stored in subregion, to save memory space.
In the above-mentioned technical solutions, it is preferable that further include:Access rights are set for the default subregion, to allow to have The application program of access rights accesses.
In the technical scheme, key is saved in the default subregion of terminal, which is arranged access rights, makes user Need to carry out authorization check when access, the only user with access rights could enter subregion and obtain key, in this way can be to prevent Only key is illegally erased and leads to not decrypt.
Another aspect of the present invention proposes a kind of encryption device of storage card, including:First encryption unit, for using Storage card is encrypted described in the key pair being stored in the default subregion of terminal;Setting unit, for described deposit will to be stored in The encrypted state of the storage card in card storage is set as encrypting.
In the technical scheme, eCryptfs modes may be used storage card is encrypted, storage card is encrypted Key in terminal, and the encrypted state of storage card is saved on a memory card, in this way, it is right respectively to allow for a terminal Multiple storage cards are encrypted, without cause the encrypted state of certain storage card influence other storage cards encrypted state feelings Condition occurs, and greatly improves the convenience that user uses.
In the above-mentioned technical solutions, it is preferable that further include:Creating unit, for not having institute in the default subregion When stating key, the key is created;Second encryption unit, for the key to be encrypted;Storage unit, for that will encrypt The key storage afterwards is in the default subregion.
In the technical scheme, the key of establishment is for being encrypted storage card, and key is encrypted can be with Prevent key from illegally being erased and leading to not that storage card is decrypted, by key storage in the default subregion of terminal so as to Key pair storage card is called to be encrypted.
In the above-mentioned technical solutions, it is preferable that further include:Number adjustment unit is encrypted, the pre- of terminal is stored in using If storage card described in the key pair in subregion is encrypted, increase the encryption number being stored in the default subregion;And When being decrypted using storage card described in the key pair stored in the default subregion of terminal, reduce in the default subregion Number is encrypted, and sets the encrypted state of the storage card to unencryption.
In the technical scheme, encryption number can be counted, by the number of the storage card after the completion of encryption or decryption Mesh is stored in predetermined partition, and when a storage card is encrypted, the number of storage card increases by one, is stored when to one When card is decrypted, the number of storage card reduces one.
In the above-mentioned technical solutions, it is preferable that further include:Clearing cell, when the encryption number is zero, described in removing The key in default subregion.
In the technical scheme, when the number of the storage card preserved in subregion is reduced to zero, illustrate currently without encrypted Storage card can remove the key being stored in subregion, to save memory space.
In the above-mentioned technical solutions, it is preferable that further include:Access right is arranged for the default subregion in priority assignation unit Limit, to allow to have the application program of access rights to access.
In the technical scheme, key is saved in the default subregion of terminal, which is arranged access rights, makes user Need to carry out authorization check when access, the only user with access rights could enter subregion and obtain key, in this way can be to prevent Only key is illegally erased and leads to not decrypt.
By above technical scheme, key can be stored in terminal, encrypted state is preserved on a memory card, is allowed One terminal is simultaneously encrypted multiple storage cards, improves the convenience that user uses.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the encryption method of storage card according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagrams of the encryption method of storage card according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of the encryption device of storage card according to an embodiment of the invention.
Specific implementation mode
To better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real Mode is applied the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the encryption method of storage card according to an embodiment of the invention.
As shown in Figure 1, the encryption method of storage card according to an embodiment of the invention, including:
Step 102, it is encrypted using the key pair storage card being stored in the default subregion of terminal.
Step 104, the encrypted state for the storage card being stored in storage card is set as encrypting.
In the technical scheme, eCryptfs modes may be used storage card is encrypted, storage card is encrypted Key in terminal, and the encrypted state of storage card is saved on a memory card, in this way, it is right respectively to allow for a terminal Multiple storage cards are encrypted, without cause the encrypted state of certain storage card influence other storage cards encrypted state feelings Condition occurs, and greatly improves the convenience that user uses.
In the above-mentioned technical solutions, it is preferable that further include:When not having key in default subregion, key is created;And Key is encrypted, and is stored in default subregion.
In the technical scheme, the key of establishment is for being encrypted storage card, and key is encrypted can be with Prevent key from illegally being erased and leading to not that storage card is decrypted, by key storage in the default subregion of terminal so as to Key pair storage card is called to be encrypted.
In the above-mentioned technical solutions, it is preferable that further include:It is deposited using the key pair being stored in the default subregion of terminal When card storage is encrypted, increase the encryption number being stored in default subregion;And using the default subregion for being stored in terminal In key pair storage card when being decrypted, reduce the encryption number preset in subregion, and the encrypted state of storage card is set It is set to unencryption.
In the technical scheme, encryption number can be counted, by the number of the storage card after the completion of encryption or decryption Mesh is stored in predetermined partition, and when a storage card is encrypted, the number of storage card increases by one, is stored when to one When card is decrypted, the number of storage card reduces one.
In the above-mentioned technical solutions, it is preferable that further include:When it is zero to encrypt number, the key preset in subregion is removed.
In the technical scheme, when the number of the storage card preserved in subregion is reduced to zero, illustrate currently without encrypted Storage card can remove the key being stored in subregion, to save memory space.
In the above-mentioned technical solutions, it is preferable that further include:Access rights are set for default subregion, are accessed with allowing to have The application program of permission accesses.
In the technical scheme, key is saved in the default subregion of terminal, which is arranged access rights, makes user Need to carry out authorization check when access, the only user with access rights could enter subregion and obtain key, in this way can be to prevent Only key is illegally erased and leads to not decrypt.
Fig. 2 shows the schematic flow diagrams of the encryption method of storage card according to an embodiment of the invention.
As shown in Fig. 2, the encryption method of storage card according to an embodiment of the invention, including:
Step 202, storage card is inserted in terminal.
Step 204, password is inputted to verify user identity to terminal.Key is saved in the default subregion of terminal, should Access rights are arranged in subregion, need to carry out authorization check when user being made to access, the only user with access rights could enter Subregion obtains key, can prevent key from illegally being erased and leading to not decrypt in this way.
Step 206, the encrypted state of storage card is obtained.The encrypted state of storage card is encrypted or unencrypted.
Step 208, judge whether the encrypted state of storage card is unencryption, when judging result is to be, enter step 210, when judging result is no, enter step 224.
Step 210, start to storing card encryption.
Step 212, judge to whether there is key in particular zones, when judging result is to be, 214 are entered step, when sentencing When disconnected result is no, 216 are entered step.
Step 214, key is created.
Step 216, key is encrypted using password.The key of establishment is right for storage card is encrypted Key, which is encrypted, key illegally to be erased in order to prevent and lead to not that storage card is decrypted, furthermore it is possible to will Encrypted key storage is in the default subregion of terminal, to call key pair storage card to be encrypted.
Step 218, storage card is encrypted.
Step 220, encrypted state is preserved on a memory card.By encrypted state preserve on a memory card rather than terminal On, so that the encrypted state of any storage card is not all interfered with the encrypted state of other storage cards so that terminal can be deposited to multiple Card storage is encrypted respectively.
Step 222, setting encryption storage card number increases by one.The number of storage card after the completion of encryption is saved in predetermined In subregion, when a storage card is encrypted, the number of storage card increases by one.
Step 224, judge whether to receive storage card decryption instructions, when judging result is to be, enter step 226, it is no Then, terminate process.
Step 226, storage card is decrypted.
Step 228, decryption is completed, the encrypted state of storage card is removed.
Step 230, setting encryption storage card number reduces one.The number of storage card after the completion of decryption is saved in predetermined In subregion, when a storage card is decrypted, the number of storage card increases by one.
Step 232, whether the number for encrypting storage card is zero, when judging result is to be, enters step 234, otherwise, knot Shu Jincheng.
Step 234, key is removed, process is terminated.When the number of the storage card preserved in subregion is reduced to zero, illustrate current There is no encrypted storage card, the key being stored in subregion can be removed, to save memory space.
Fig. 3 shows the schematic block diagram of the encryption device of storage card according to an embodiment of the invention.
As shown in figure 3, the encryption device 300 of storage card according to an embodiment of the invention, including:First encryption unit 302, for using the key pair storage card being stored in the default subregion of terminal to be encrypted;Setting unit 304, for that will protect There are the encrypted states of the storage card in storage card to be set as encrypting.
In the technical scheme, eCryptfs modes may be used storage card is encrypted, storage card is encrypted Key in terminal, and the encrypted state of storage card is saved on a memory card, in this way, it is right respectively to allow for a terminal Multiple storage cards are encrypted, without cause the encrypted state of certain storage card influence other storage cards encrypted state feelings Condition occurs, and greatly improves the convenience that user uses.
In the above-mentioned technical solutions, it is preferable that further include:Creating unit 306, for not having key in default subregion When, create key;Second encryption unit 308, for key to be encrypted;Storage unit, for depositing encrypted key Storage is in default subregion.
In the technical scheme, the key of establishment is for being encrypted storage card, and key is encrypted can be with Prevent key from illegally being erased and leading to not that storage card is decrypted, by key storage in the default subregion of terminal so as to Key pair storage card is called to be encrypted.
In the above-mentioned technical solutions, it is preferable that further include:Number adjustment unit 310 is encrypted, terminal is stored in using When key pair storage card in default subregion is encrypted, increase the encryption number being stored in default subregion;And it is using When storing the key pair storage card in the default subregion of terminal and being decrypted, the encryption number preset in subregion is reduced, and Set the encrypted state of storage card to unencryption.
In the technical scheme, encryption number can be counted, by the number of the storage card after the completion of encryption or decryption Mesh is stored in predetermined partition, and when a storage card is encrypted, the number of storage card increases by one, is stored when to one When card is decrypted, the number of storage card reduces one.
In the above-mentioned technical solutions, it is preferable that further include:Clearing cell 312 is removed default when it is zero to encrypt number Key in subregion.
In the technical scheme, when the number of the storage card preserved in subregion is reduced to zero, illustrate currently without encrypted Storage card can remove the key being stored in subregion, to save memory space.
In the above-mentioned technical solutions, it is preferable that further include:Access right is arranged for default subregion in priority assignation unit 314 Limit, to allow to have the application program of access rights to access.
In the technical scheme, key is saved in the default subregion of terminal, which is arranged access rights, makes user Need to carry out authorization check when access, the only user with access rights could enter subregion and obtain key, in this way can be to prevent Only key is illegally erased and leads to not decrypt.
In the present invention, term " first ", " second " are only used for the purpose described, are not understood to indicate or imply phase To importance.For the ordinary skill in the art, above-mentioned term can be understood as the case may be in the present invention Concrete meaning.
Technical scheme of the present invention is described in detail above in association with attached drawing, technical solution through the invention can will be close Key is stored in terminal, and encrypted state is preserved on a memory card, allows a terminal that multiple storage cards are encrypted simultaneously, Improve the convenience that user uses.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of encryption method of storage card, which is characterized in that including:
It is encrypted using storage card described in the key pair being stored in the default subregion of terminal;And
The encrypted state for the storage card being stored in the storage card is set as encrypting;
Further include:When being encrypted using storage card described in the key pair stored in the default subregion of terminal, increase storage Encryption number in the default subregion;And
When being decrypted using storage card described in the key pair stored in the default subregion of terminal, the default subregion is reduced In encryption number, and set the encrypted state of the storage card to unencryption.
2. encryption method according to claim 1, which is characterized in that further include:
When not having the key in the default subregion, the key is created;And
The key is encrypted, and is stored in the default subregion.
3. encryption method according to claim 1, which is characterized in that further include:
When the encryption number is zero, the key in the default subregion is removed.
4. encryption method according to claim 3, which is characterized in that further include:
Access rights are set for the default subregion, to allow to have the application program of access rights to access.
5. a kind of encryption device of storage card, which is characterized in that including:
First encryption unit, for using storage card described in the key pair being stored in the default subregion of terminal to be encrypted;
Setting unit, for the encrypted state for the storage card being stored in the storage card to be set as encrypting;
Further include:
Number adjustment unit is encrypted, is encrypted using storage card described in the key pair being stored in the default subregion of terminal When, increase the encryption number being stored in the default subregion;And using the key being stored in the default subregion of terminal When the storage card is decrypted, the encryption number in the default subregion is reduced, and by the encryption shape of the storage card State is set as unencryption.
6. encryption device according to claim 5, which is characterized in that further include:
Creating unit creates the key when for not having the key in the default subregion;
Second encryption unit, for the key to be encrypted;
Storage unit is used for the encrypted key storage in the default subregion.
7. encryption device according to claim 5, which is characterized in that further include:
Clearing cell removes the key in the default subregion when the encryption number is zero.
8. encryption device according to claim 7, which is characterized in that further include:
Access rights are arranged for the default subregion in priority assignation unit, to allow to have the application program of access rights to carry out It accesses.
CN201410375047.6A 2014-07-31 2014-07-31 The encryption method and encryption device of storage card Expired - Fee Related CN104134048B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410375047.6A CN104134048B (en) 2014-07-31 2014-07-31 The encryption method and encryption device of storage card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410375047.6A CN104134048B (en) 2014-07-31 2014-07-31 The encryption method and encryption device of storage card

Publications (2)

Publication Number Publication Date
CN104134048A CN104134048A (en) 2014-11-05
CN104134048B true CN104134048B (en) 2018-08-24

Family

ID=51806723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410375047.6A Expired - Fee Related CN104134048B (en) 2014-07-31 2014-07-31 The encryption method and encryption device of storage card

Country Status (1)

Country Link
CN (1) CN104134048B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918877A (en) * 2019-03-21 2019-06-21 深圳市网心科技有限公司 A kind of data ciphering method, system, client and computer readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593308A (en) * 2013-10-10 2014-02-19 福建升腾资讯有限公司 USB (universal serial bus) flash disk write-protection method based on section write-protection

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004072718A (en) * 2002-06-12 2004-03-04 Fuji Photo Film Co Ltd Memory card for digital camera
CN1906885A (en) * 2004-04-28 2007-01-31 松下电器产业株式会社 Communication system, common key control apparatus, and general communication apparatus
US7467404B2 (en) * 2004-09-27 2008-12-16 Bally Garning, Inc. System and method for distributing software licenses
US7660959B2 (en) * 2006-09-28 2010-02-09 International Business Machines Corporation Managing encryption for volumes in storage pools
CN101232638A (en) * 2007-01-24 2008-07-30 中兴通讯股份有限公司 System and method for remote protecting mobile terminal data
CN101286338B (en) * 2007-04-12 2010-06-02 鸿富锦精密工业(深圳)有限公司 Electronic equipment and its data encryption method and data deciphering method
CN101615161B (en) * 2009-07-28 2012-07-18 成都市华为赛门铁克科技有限公司 Method for encrypting and decrypting hard disk, hard disk driving device and hard disk
CN102799540B (en) * 2012-06-21 2017-07-14 南京中兴软件有限责任公司 Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption
CN103065102B (en) * 2012-12-26 2015-05-27 中国人民解放军国防科学技术大学 Data encryption mobile storage management method based on virtual disk
CN103473512B (en) * 2013-08-26 2016-06-15 北京明朝万达科技股份有限公司 A kind of mobile memory medium management method and device
CN103902931A (en) * 2013-12-17 2014-07-02 哈尔滨安天科技股份有限公司 Mobile storage device automatic encryption method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593308A (en) * 2013-10-10 2014-02-19 福建升腾资讯有限公司 USB (universal serial bus) flash disk write-protection method based on section write-protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Android移动设备数据加密机制;陆继翔;《无线互联科技》;20130630(第6期);第169页左栏第6行至第第170页右栏最后一行 *

Also Published As

Publication number Publication date
CN104134048A (en) 2014-11-05

Similar Documents

Publication Publication Date Title
EP2905715B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN102867157B (en) Mobile terminal and data guard method
CN104144411B (en) Encryption, decryption terminal and the encryption and decryption approaches applied to terminal
US20230125083A1 (en) Blockchain data access authorization method, apparatus, and device
EP2693789A1 (en) Mobile terminal encryption method, hardware encryption device and mobile terminal
JP2018500823A (en) Device key protection
EP2881863A1 (en) Method for implementing encryption in storage card, and decryption method and device
WO2019109640A1 (en) Method and device for locking sim card
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN101437067A (en) Mobile terminal and method for implementing network and card locking
CN103338445A (en) File encryption and decryption method and system
CN105554226A (en) Mode switching method and system, and terminal
CN101815292A (en) Device and method for protecting data of mobile terminal
US20150281951A1 (en) Method and device for protecting privacy data of mobile terminal user
CN104270754B (en) A kind of Subscriber Identity Module method for authenticating and device
CN105636043A (en) ESIM (Embedded SIM) card authentication method, eSIM card authentication device and terminal
CN104134048B (en) The encryption method and encryption device of storage card
EP2985712B1 (en) Application encryption processing method, apparatus, and terminal
CN105516500A (en) Method and system for selecting device mode
US20060121882A1 (en) Desktop cellular phone having a SIM card with an encrypted SIM PIN
CN103312500A (en) Methods for protecting universal serial bus (USB) key information
CN114611124A (en) Method and device for preventing data leakage
CN104980913B (en) Protect the method and terminal device of data information security in terminal device
CN205864753U (en) A kind of encryption guard system of terminal unit
CN105554539B (en) Device for processing digital video, digital program system and its matching process

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180824

Termination date: 20210731