CN105224843A - A kind of method of protection information safety, device and equipment - Google Patents

A kind of method of protection information safety, device and equipment Download PDF

Info

Publication number
CN105224843A
CN105224843A CN201410260527.8A CN201410260527A CN105224843A CN 105224843 A CN105224843 A CN 105224843A CN 201410260527 A CN201410260527 A CN 201410260527A CN 105224843 A CN105224843 A CN 105224843A
Authority
CN
China
Prior art keywords
password
port
decryption instructions
device port
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410260527.8A
Other languages
Chinese (zh)
Inventor
张文博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Zhongxing New Software Co Ltd
Original Assignee
Xian Zhongxing New Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Zhongxing New Software Co Ltd filed Critical Xian Zhongxing New Software Co Ltd
Priority to CN201410260527.8A priority Critical patent/CN105224843A/en
Publication of CN105224843A publication Critical patent/CN105224843A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of method of protection information safety; described method comprises: encryption device port; determine that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, port operation is carried out to described device port.The present invention also discloses a kind of device and equipment of protection information safety.

Description

A kind of method of protection information safety, device and equipment
Technical field
The present invention relates to the information security field of data card and focus product hotspot, particularly relate to a kind of method of protection information safety, device and equipment.
Background technology
At present, the port major part of data card and focus product is open to user, such as, and Debugging (diag, diagnosis) port; But also have the port of some focus products to be hiding, but port can be discharged by this hiding by special instruction.Therefore, no matter port is open or hides, all easily via the key message in port modifications data card or focus product.
So the information security how in the equipment such as protected data card and focus product is current problem demanding prompt solution.
Summary of the invention
For solving problems of the prior art, embodiments provide a kind of method of protection information safety, device and equipment.
Embodiments provide a kind of method of protection information safety, described method comprises:
Encryption device port, determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out port operation to described device port.
In such scheme, described encryption device port comprises:
Preset the encryption identification flag of described device port;
The state of described encryption identification flag is set to effective status.
In such scheme, described determine that the password in described decryption instructions is consistent with the password of setting before, described method also comprises: extract the password in described decryption instructions, judges that whether the password in described decryption instructions consistent with the password of setting.
In such scheme, described method also comprises: determine that the instruction received is decryption instructions, and when determining that password in described decryption instructions and the password of setting are inconsistent, described device port maintenance encrypted state.
In such scheme, described method also comprises:
Determine that the instruction received is not decryption instructions, judge whether described device port is encrypted state, when determining that described device port is encrypted state, returns miscue.
In such scheme, described method also comprises: when determining that described device port is non-encrypted state, carries out port operation to described device port.
The embodiment of the present invention additionally provides a kind of device of protection information safety, and described device comprises: encrypting module, determination module; Wherein,
Described encrypting module, for encryption device port;
Described determination module, for determining that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out port operation to described device port.
In such scheme, described encrypting module, specifically for:
Preset the encryption identification flag of described device port;
The original state of described encryption identification flag is set to effective status.
In such scheme, described determination module, also for: before determining that the password in described decryption instructions is consistent with the password of setting, extract the password in described decryption instructions, judge that whether the password in described decryption instructions consistent with the password of setting.
In such scheme, described determination module, also for:
Determine that the instruction received is decryption instructions, and when determining that password in described decryption instructions and the password of setting are inconsistent, described device port maintenance encrypted state.
In such scheme, described determination module, also for:
Determine that the instruction received is not decryption instructions, judge whether described device port is encrypted state, when determining that described device port is encrypted state, returns miscue.
In such scheme, described determination module, also for:
When determining that described device port is non-encrypted state, port operation is carried out to described device port.
The embodiment of the present invention additionally provides a kind of equipment, comprises the device of described protection information safety.
The method of the protection information safety that the embodiment of the present invention provides, device and equipment; encryption device port; determine that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, port operation is carried out to described device port.So, by encryption device port, can effectively prevent user from obtaining and revise the key message in equipment, also can effectively prevent rival from checking the configuration information etc. of device interior by device port.
Accompanying drawing explanation
The method flow schematic diagram of the protection information safety that Fig. 1 provides for the embodiment of the present invention one;
The apparatus structure schematic diagram of the protection information safety that Fig. 2 provides for the embodiment of the present invention two.
Embodiment
In various embodiment of the present invention: encryption device port, determine that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, port operation is carried out to described device port.
Below by drawings and the specific embodiments, technical scheme of the present invention is described in further detail.
Embodiment one
The embodiment of the present invention provides a kind of method of protection information safety, and as shown in Figure 1, described method mainly comprises the following steps:
Step 101, the device port of devices encrypt self;
In this step, equipment before activation, the password of device port can be pre-set, the password of described device port is the character string generated according to cryptographic algorithm, and by device port instruction write device, as in the encrypted file system (EFS, EncryptingFileSystem) of write device.
Equipment is when starting, and can be encrypted the device port of self, described device port can comprise: diag port, AT port and modulation modem port etc.; Described equipment can comprise: data card, focus product etc.The device port of described devices encrypt self, comprising:
Equipment, when starting, is preset the encryption identification flag of described device port, the state of described encryption identification flag is set to effective status.
Wherein, the effective status of described encryption identification flag can be: the value of encryption identification flag is set to 1; Correspondingly, the disarmed state of described encryption identification flag can be: the value of encryption identification flag is set to 0.
Particularly, such as, when described device port is diag port, the password of described diag port can be pre-set, the password of described diag port is the character string generated according to cryptographic algorithm, and by diag instruction write device, as in the encrypted file system EFS of write device.
Described devices encrypt diag port comprises:
Equipment, when starting, is preset the encryption identification flag of described diag port, the state of described encryption identification flag is set to effective status.
Here, the encryption flow of described equipment to AT port and modem port is identical with to the encryption flow of described diag port, is not repeating at this.Wherein,
When equipment operation goes wrong, user is by the running log of described diag port capture apparatus, thus analyze and solve problem; Or when user wants to check or revise device interior parameter, also realize by described diag port.
Described user can send the control of the aspects such as AT instruction is carried out calling out, note, phone directory, data service, fax by AT port.
Described user can also carry out dialing by modem port and set up Microsoft Loopback Adapter.
Step 102, equipment determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out port operation to described device port;
In this step, after device start, when receiving the instruction that user inputted by man-machine interface, judge whether described instruction is decryption instructions, when determining that described instruction is decryption instructions, extract the password in described decryption instructions, password in described decryption instructions is mated with the password of setting, judge that whether the password in described decryption instructions is consistent with the password of setting, when determining that the password in described decryption instructions is consistent with the password of setting, the state of described encryption identification flag is set to disarmed state, port operation is carried out to described device port; Wherein, describedly port operation carried out to described device port comprise: checked by described diag port or information in amendment equipment, capture apparatus running log; Or undertaken calling out by described AT port, the control of note, the aspect such as data transmission; Or set up Microsoft Loopback Adapter by described modem port dialing.The password of described setting can be: the password prestored in the encrypted file system EFS of equipment.
In addition, when described equipment determines that the password of password in described decryption instructions and setting is inconsistent, then by man-machine interface to user's prompt cipher mistake, described device port still keeps encrypted state, to prevent from being modified information.
Here, when the instruction that equipment determines reception is not decryption instructions, whether judgment device port is in encrypted state;
Particularly, when determining that described instruction is not decryption instructions, whether judgment device port is in encrypted state comprises: whether the state judging described encryption identification flag is effective status, when the state determining described encryption identification flag is effective status, namely representing now device port is encrypted state.
Correspondingly, when the state determining described encryption identification flag is disarmed state, namely representing now device port is non-encrypted state, directly can carry out port operation to described device port;
When equipment determines that described device port is encrypted state, then return miscue by man-machine interface to user.
Here, when described device port is described diag port, determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, diag operation is carried out to described diag port.
Particularly, when user wants to check or revise device interior information, then input diag instruction by man-machine interface, i.e. diag port to equipment, equipment receives the diag instruction of user's input, the field detected in the diag instruction received judges whether described diag instruction is decryption instructions, when determining that described diag instruction is decryption instructions, the password in described decryption instructions is extracted according to the field in diag instruction, password in described decryption instructions is mated with the password of setting, judge that whether the password in described decryption instructions is consistent with the password of setting, when determining that the password in described decryption instructions is consistent with the password of setting, the state of described encryption identification flag is set to disarmed state, namely the decrypting process of described diag port is completed, diag operation is carried out to described diag port.
Wherein, described diag instruction has set form, is to generate according to the literary style of described diag directives prescribe, such as, and senddata75370300; Here, can according to the numerical portion in the self-defined described diag instruction of actual conditions.Described to described diag port carry out diag operation comprise: checked by described diag port or revise configuration information and the important parameter of device interior; Or check the treatment scheme etc. of key modules in equipment.
Configuration information and the important parameter of described device interior comprise: the dialing parameters, network-locking parameter, pintle hook lock parameter etc. of equipment;
In described equipment, the treatment scheme of key modules comprises: the flow chart of data processing in independent research module.
In addition, when described equipment determines that the password of password in described decryption instructions and setting is inconsistent, then by man-machine interface to user's prompt cipher mistake, described diag port still keeps encrypted state, to prevent from being modified information.
Here, when described equipment receives diag instruction, determine that the diag instruction received is not when being decryption instructions, judges whether described diag port is in encrypted state;
Particularly, when the diag instruction that equipment is determined to receive is not decryption instructions, judge whether the state of described encryption identification flag is effective status, when the state determining described encryption identification flag is effective status, namely representing now diag port is encrypted state;
Correspondingly, when the state determining described encryption identification flag is disarmed state, namely representing now diag port is non-encrypted state, directly can carry out diag port operation to described diag port.
When equipment determines that described diag port is encrypted state, then return miscue by man-machine interface to user.
In addition, when described device port is described AT port, determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, AT operation is carried out to described AT port.
Particularly, when user wants to control the function of equipment, or when checking the log-on message of equipment, then can be realized to equipment input AT instruction by man-machine interface, i.e. AT port; Such as, when user inputs AT+CMUT instruction, then the mic mute of opertaing device is represented; When user inputs AT+CREG instruction, then represent the login state of acquisition equipment.Wherein, the form of described AT instruction is: in instruction, the first two character must be AT, can select the instruction wanting input according to AT standard instruction set; If when AT standard instruction set does not comprise the instruction wanting to select, can research and develop according to actual conditions.
When described device port is described modem port, determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, modem operation is carried out to described modem port.
When user wants to set up Microsoft Loopback Adapter by dialing, input corresponding modem instruction by man-machine interface, i.e. modem port to equipment, described modem port can set up Microsoft Loopback Adapter according to described modem instruction.
Here, the deciphering flow process of described equipment to AT port and modem port is identical with to the deciphering flow process of described diag port.
The method of the protection information safety that the present embodiment provides, by encryption diag port, can effectively prevent user from obtaining and revise lock network, the pintle hook lock information of equipment, the user of binding machine and card also can be avoided to turn net.
In addition, hacker effectively can also be avoided to be attacked equipment by diag port, obtain and illegally distort the important information etc. in equipment.
Embodiment two
Corresponding to embodiment one, the embodiment of the present invention additionally provides a kind of device of protection information safety, and as shown in Figure 2, described device comprises: encrypting module 21, determination module 22; Wherein,
Described encrypting module 21, for encryption device port;
Described determination module 22, for determining that the instruction received is described decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out port operation to described device port.
Equipment before activation, can pre-set the password of device port, and the password of described device port is the character string generated according to cryptographic algorithm, and by device port instruction write device, as in the encrypted file system EFS of write device.
Equipment when starting, described encrypting module 21, specifically for: preset the encryption identification flag of described device port, the state of described encryption identification flag be set to effective status.
Wherein, the effective status of described encryption identification flag can be: the value of encryption identification flag is set to 1 by described encrypting module 21; Correspondingly, the disarmed state of described encryption identification flag can be: the value of encryption identification flag is set to 0 by described encrypting module 21.
Described device port can comprise: diag port, AT port and modem port etc.; Described equipment comprises the basic structure of the device of protection information safety as shown in Figure 2; Particularly, described equipment can comprise: data card, focus product etc.
Such as, when described device port is diag port, can pre-set the password of described diag port, the password of described diag port is the character string generated according to cryptographic algorithm, and by diag instruction write device, as in the encrypted file system EFS of write device.At this moment, described encrypting module 21, also for: encrypt described diag port; Particularly, equipment is when starting, and described encrypting module 21 presets the encryption identification flag of described diag port, and the original state of described encryption identification flag is set to effective status.
Here, the encryption flow of described encrypting module 21 pairs of AT ports and modem port is identical with to the encryption flow of described diag port, is not repeating at this.Wherein,
When equipment operation goes wrong, user is by the running log of described diag port capture apparatus, thus analyze and solve problem; Or when user wants to check or revise device interior parameter, also realize by described diag port.
Described user can send the control of the aspects such as AT instruction is carried out calling out, note, phone directory, data service, fax by AT port.
Described user can also carry out dialing by modem port and set up Microsoft Loopback Adapter.
Equipment upon actuation, when described determination module 22 receives the instruction that user inputted by man-machine interface, judge whether described instruction is decryption instructions, when determining that described instruction is decryption instructions, extract the password in described decryption instructions, password in described decryption instructions is mated with the password of setting, judge that whether the password in described decryption instructions is consistent with the password of setting, when determining that the password in described decryption instructions is consistent with the password of setting, the state of described encryption identification flag is set to disarmed state, port operation is carried out to described device port; Wherein, the password of described setting can be: the password prestored in the encrypted file system EFS of equipment; Describedly port operation carried out to described device port comprise: checked by described diag port or information in amendment equipment etc., capture apparatus running log; Or undertaken calling out by described AT port, the control of note, the aspect such as data transmission; Or set up Microsoft Loopback Adapter by described modem port dialing.
In addition, when described determination module 22 determines that the password of password in described decryption instructions and setting is inconsistent, then by man-machine interface to user's prompt cipher mistake, described device port still keeps encrypted state, to prevent from being modified information.
Here, when the instruction that described determination module 22 determines reception is not decryption instructions, whether judgment device port is in encrypted state;
Particularly, when described determination module 22 determines that described instruction is not decryption instructions, whether judgment device port is in encrypted state comprises: whether the state judging described encryption identification flag is effective status, when the state determining described encryption identification flag is effective status, namely representing now device port is encrypted state.
Correspondingly, when the state that described determination module 22 determines described encryption identification flag is disarmed state, namely representing now device port is non-encrypted state.
When determination module 22 determines that described device port is encrypted state, then return miscue by man-machine interface to user;
When determination module 22 determines that described device port is non-encrypted state, directly port operation can be carried out to described device port.
Such as, when described device port is described diag port, described determination module 22 determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out diag operation to described diag port.
Particularly, when user wants to check or revise device interior information, then pass through man-machine interface, namely diag port is to equipment input diag instruction, described determination module 22 receives the diag instruction of user's input, the field detected in the diag instruction received judges whether described diag instruction is decryption instructions, when determining that described diag instruction is decryption instructions, the password in described decryption instructions is extracted according to the field in diag instruction, password in described decryption instructions is mated with the password of setting, judge that whether the password in described decryption instructions is consistent with the password of setting, when determining that the password in described decryption instructions is consistent with the password of setting, the state of described encryption identification flag is set to disarmed state, namely the decrypting process of described diag port is completed, diag operation is carried out to described diag port.
Wherein, described diag instruction has set form, is to generate according to the literary style of described diag directives prescribe, such as, and senddata75370300; Here, can according to the numerical portion in the self-defined described diag instruction of actual conditions.Described to described diag port carry out diag operation comprise: checked by described diag port or revise configuration information and the important parameter of device interior; Or check the treatment scheme etc. of key modules in equipment.
Configuration information and the important parameter of described device interior comprise: the dialing parameters, network-locking parameter, pintle hook lock parameter etc. of equipment;
In described equipment, the treatment scheme of key modules comprises: the flow chart of data processing in independent research module.
In addition, when described determination module 22 determines that the password of password in described decryption instructions and setting is inconsistent, then by man-machine interface to user's prompt cipher mistake, described diag port still keeps encrypted state, to prevent from being modified information.
Here, when the diag instruction that described determination module 22 determines reception is not decryption instructions, judge whether described diag port is in encrypted state;
Particularly, when the diag instruction that determination module 22 determines reception is not decryption instructions, whether the state judging described encryption identification flag is effective status, and when the state determining described encryption identification flag is effective status, namely representing now diag port is encrypted state;
Correspondingly, when the state that described determination module 22 determines described encryption identification flag is disarmed state, namely representing now diag port is non-encrypted state, directly can carry out diag port operation to described diag port.
When described determination module 22 determines that described diag port is encrypted state, then return miscue by man-machine interface to user.
In addition, when described device port is described AT port, described determination module 22 determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out AT operation to described AT port.
Particularly, when user wants to control the function of equipment, or when checking the log-on message of equipment, then can be realized to equipment input AT instruction by man-machine interface, i.e. AT port; Such as, when user inputs AT+CMUT instruction, then the mic mute of opertaing device is represented; When user inputs AT+CREG instruction, then represent the login state of acquisition equipment.Wherein, the form of described AT instruction is: in instruction, the first two character must be AT, can select the instruction wanting input according to AT standard instruction set; If when AT standard instruction set does not comprise the instruction wanting to select, can research and develop according to actual conditions.
When described device port is described modem port, described determination module 22 determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out modem operation to described modem port.
Particularly, when user wants to set up Microsoft Loopback Adapter by dialing, input corresponding modem instruction by man-machine interface, i.e. modem port to equipment, described modem port can set up Microsoft Loopback Adapter according to described modem instruction.
Here, the deciphering flow process of described determination module 22 pairs of AT ports and modem port is identical with to the deciphering flow process of described diag port.
During practical application; the encrypting module 21 that the embodiment of the present invention provides and determination module 22 can by the central processing unit (CPU in protection information safety feature; CentralProcessingUnit), digital signal processor (DSP; DigitalSignalProcessor) or programmable logic array (FPGA, Field-ProgrammableGateArray) realize.
Based on the device of above-mentioned protection information safety, the embodiment of the present invention additionally provides a kind of equipment, comprises basic structure and the various distortion thereof of the protection information safety feature shown in Fig. 2 and is equal to replacement, not repeating.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of hardware embodiment, software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory and optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
The above, be only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention, and all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (13)

1. a method for protection information safety, is characterized in that, described method comprises:
Encryption device port, determines that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out port operation to described device port.
2. method according to claim 1, is characterized in that, described encryption device port comprises:
Preset the encryption identification flag of described device port;
The state of described encryption identification flag is set to effective status.
3. method according to claim 1, it is characterized in that, described determine that the password in described decryption instructions is consistent with the password of setting before, described method also comprises: extract the password in described decryption instructions, judges that whether the password in described decryption instructions consistent with the password of setting.
4. method according to claim 1, is characterized in that, described method also comprises: determine that the instruction received is decryption instructions, and when determining that password in described decryption instructions and the password of setting are inconsistent, described device port maintenance encrypted state.
5. method according to claim 1, is characterized in that, described method also comprises:
Determine that the instruction received is not decryption instructions, judge whether described device port is encrypted state, when determining that described device port is encrypted state, returns miscue.
6. method according to claim 5, is characterized in that, described method also comprises: when determining that described device port is non-encrypted state, carries out port operation to described device port.
7. a device for protection information safety, is characterized in that, described device comprises: encrypting module, determination module; Wherein,
Described encrypting module, for encryption device port;
Described determination module, for determining that the instruction received is decryption instructions, and when determining that the password in described decryption instructions is consistent with the password of setting, carries out port operation to described device port.
8. device according to claim 7, is characterized in that, described encrypting module, specifically for:
Preset the encryption identification flag of described device port;
The original state of described encryption identification flag is set to effective status.
9. device according to claim 7, it is characterized in that, described determination module, also for: before determining that the password in described decryption instructions is consistent with the password of setting, extract the password in described decryption instructions, judge that whether the password in described decryption instructions is consistent with the password of setting.
10. device according to claim 7, is characterized in that, described determination module, also for:
Determine that the instruction received is decryption instructions, and when determining that password in described decryption instructions and the password of setting are inconsistent, described device port maintenance encrypted state.
11. devices according to claim 7, is characterized in that, described determination module, also for:
Determine that the instruction received is not decryption instructions, judge whether described device port is encrypted state, when determining that described device port is encrypted state, returns miscue.
12. devices according to claim 11, is characterized in that, described determination module, also for:
When determining that described device port is non-encrypted state, port operation is carried out to described device port.
13. 1 kinds of equipment, is characterized in that, comprise the device of the protection information safety as described in any one of claim 7-12.
CN201410260527.8A 2014-06-12 2014-06-12 A kind of method of protection information safety, device and equipment Pending CN105224843A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410260527.8A CN105224843A (en) 2014-06-12 2014-06-12 A kind of method of protection information safety, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410260527.8A CN105224843A (en) 2014-06-12 2014-06-12 A kind of method of protection information safety, device and equipment

Publications (1)

Publication Number Publication Date
CN105224843A true CN105224843A (en) 2016-01-06

Family

ID=54993807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410260527.8A Pending CN105224843A (en) 2014-06-12 2014-06-12 A kind of method of protection information safety, device and equipment

Country Status (1)

Country Link
CN (1) CN105224843A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108786115A (en) * 2018-05-03 2018-11-13 南京赛宁信息技术有限公司 The method and system of CTF dynamics Flag are generated based on Transparent Proxy

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040123150A1 (en) * 2002-12-18 2004-06-24 Michael Wright Protection of data accessible by a mobile device
CN101296231A (en) * 2008-05-30 2008-10-29 深圳华为通信技术有限公司 Data card operation method and data card
CN101799856A (en) * 2010-03-17 2010-08-11 太仓市同维电子有限公司 Method for encrypting application software private area of EVDO (evolution-data optimized) data card end
CN101951471A (en) * 2010-08-24 2011-01-19 冠捷显示科技(厦门)有限公司 Fingerprint locking technology based on display system
CN102176712A (en) * 2011-02-14 2011-09-07 华为终端有限公司 Identity authentication method and data card
CN102612022A (en) * 2011-01-19 2012-07-25 中兴通讯股份有限公司 System and method for controlling access point name
CN103581882A (en) * 2012-07-24 2014-02-12 中兴通讯股份有限公司 Data card APN locking state control method and device and data card
CN104881602A (en) * 2014-02-28 2015-09-02 Ncr公司 Unattended Secure Device Authorization

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040123150A1 (en) * 2002-12-18 2004-06-24 Michael Wright Protection of data accessible by a mobile device
CN101296231A (en) * 2008-05-30 2008-10-29 深圳华为通信技术有限公司 Data card operation method and data card
CN101799856A (en) * 2010-03-17 2010-08-11 太仓市同维电子有限公司 Method for encrypting application software private area of EVDO (evolution-data optimized) data card end
CN101951471A (en) * 2010-08-24 2011-01-19 冠捷显示科技(厦门)有限公司 Fingerprint locking technology based on display system
CN102612022A (en) * 2011-01-19 2012-07-25 中兴通讯股份有限公司 System and method for controlling access point name
CN102176712A (en) * 2011-02-14 2011-09-07 华为终端有限公司 Identity authentication method and data card
CN103581882A (en) * 2012-07-24 2014-02-12 中兴通讯股份有限公司 Data card APN locking state control method and device and data card
CN104881602A (en) * 2014-02-28 2015-09-02 Ncr公司 Unattended Secure Device Authorization

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108786115A (en) * 2018-05-03 2018-11-13 南京赛宁信息技术有限公司 The method and system of CTF dynamics Flag are generated based on Transparent Proxy
CN108786115B (en) * 2018-05-03 2021-06-01 南京赛宁信息技术有限公司 Method and system for generating CTF dynamic Flag based on transparent proxy

Similar Documents

Publication Publication Date Title
EP3968597B1 (en) Methods for encrypting and decrypting data
CN103973437B (en) The method, apparatus and system of RSA key mandate are obtained when a kind of terminal locking
CN108718233B (en) Encryption method, computer equipment and storage medium
CN104484596A (en) Method and terminal for creating password in multi-operation system
CN107368737A (en) A kind of processing method for preventing copy-attack, server and client
CN111385084A (en) Key management method and device for digital assets and computer readable storage medium
CN102819702A (en) File encryption operation method and file encryption operation system
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
CN102306255A (en) Document protection method and system
CN104951366A (en) Mobile terminal application program login method and equipment
CN100334519C (en) Method for establishing credible input-output channels
CN103200562A (en) Communication terminal locking method and communication terminal
CN103592927A (en) Method for binding product server and service function through license
CN104933361A (en) Device and method for protecting login password
CN114329541A (en) Data encryption method, device, equipment and storage medium
CN107292133B (en) Artificial intelligence confusion technical method and device
CN106789051B (en) method, device and computing equipment for protecting files
CN110932853B (en) Key management device and key management method based on trusted module
CN105022965A (en) Data encryption method and apparatus
CN105404470A (en) Data storage method, data security apparatus and data storage system
CN105224843A (en) A kind of method of protection information safety, device and equipment
CN106453335B (en) Data transmission method and device
CN105610770A (en) Access method, access device, terminal, encryption method, encryption device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160106

RJ01 Rejection of invention patent application after publication