CN105468988A - Data protection method and device during connection of terminal and PC (Personal Computer) - Google Patents
Data protection method and device during connection of terminal and PC (Personal Computer) Download PDFInfo
- Publication number
- CN105468988A CN105468988A CN201410407914.XA CN201410407914A CN105468988A CN 105468988 A CN105468988 A CN 105468988A CN 201410407914 A CN201410407914 A CN 201410407914A CN 105468988 A CN105468988 A CN 105468988A
- Authority
- CN
- China
- Prior art keywords
- terminal
- connection
- user
- unlocking
- data interaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000003993 interaction Effects 0.000 claims abstract description 51
- 238000012545 processing Methods 0.000 claims description 19
- 238000001514 detection method Methods 0.000 abstract 1
- 230000006870 function Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000004888 barrier function Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000000429 assembly Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data protection method and device during the connection of a terminal and a PC (Personal Computer). The method comprises the following steps: setting a connection password in the terminal; after a detection result shows that the terminal is connected with the PC, forbidding the terminal to carry out any data interaction with the PC, and obtaining the connection password input by the user; and judging whether the connection password input by the user is correct or not, if the connection password input by the user is correct, permitting the terminal to carry out data interaction with the PC, and if the connection password is incorrect, forbidding the terminal to carry out any data interaction with the PC. By virtue of the technical scheme of the invention, user privacy can be effectively protected, and a phenomenon that an illegal user obtains and exports data in terminal settings through the PC is avoided.
Description
Technical Field
The invention relates to the field of mobile communication, in particular to a data protection method and device when a terminal is connected with a PC.
Background
Mobile terminal products (hereinafter referred to as terminals) are more and more appeared in daily life of people, people are more and more dependent on the terminals, and the terminals become main equipment for daily communication of people. Many personal privacy of the user are also maintained in the terminal, such as contacts, short messages, pictures, videos, and other documents. With the popularization of terminal products, management software of terminals is also produced. In particular, software for managing a Personal Computer (PC) side terminal, for example, 360 mobile phone assistant, 91 assistant, pea pod, PC side terminal management software owned by each major manufacturer, and the like. In order to highlight the advantages of the management software, the management software has very powerful functions, is convenient and quick, and manages the terminal comprehensively. As long as you set the mobile phone to the debugging mode, nothing needs to be done, the terminal management software can automatically install the driver, various information on the terminal can be displayed on the PC very fast, and the information is exported to the PC. Thus, it becomes easy to set and manage the terminal. People often download various kinds of information for installing and managing terminals through PC-side management software. In the above scenario, although the terminal of the user is provided with the screen locking interface, the PC-side management software can perform information interaction with the terminal through various ports, bypassing the screen locking interface, without any interception. When an illegal user takes the terminal, information in the terminal is at risk of being illegally exported, and the leakage of personal privacy of the user faces a great risk.
Disclosure of Invention
In view of the problem that the personal privacy of the terminal user is easy to leak in the prior art, the invention provides a data protection method and device when the terminal is connected with a PC.
The invention provides a data protection method when a terminal is connected with a PC (personal computer), which comprises the following steps:
setting a connection password in the terminal;
after the connection between the terminal and the PC is detected, prohibiting the terminal from performing any data interaction with the PC, and acquiring a connection password input by a user;
and judging whether the connection password input by the user is correct or not, if so, allowing the terminal to perform data interaction with the PC, and if not, forbidding the terminal to perform any data interaction with the PC.
Preferably, after the connection password is set in the terminal, the method further includes: and setting the unlocking connection mark in the terminal to be in a protection state, wherein in the protection state, the terminal is prohibited from performing any data interaction with the PC.
Preferably, after detecting that the terminal is connected to the PC, the method further comprises:
and judging the state of the unlocking connection mark, if the unlocking connection mark is in a protection state, prohibiting the terminal from performing any data interaction with the PC, and prompting a user to input a connection password.
Preferably, the acquiring the connection password input by the user specifically includes:
acquiring a connection password input by a user through a PC; or,
and acquiring a connection password input by a user through the terminal.
Preferably, further comprising:
under the condition that the connection password input by the user is judged to be correct, setting an unlocking connection mark in the terminal to be in a data interaction state;
and after the disconnection of the terminal and the PC is detected, resetting the unlocking connection mark in the terminal to be in a protection state.
The invention also provides a data protection device when the terminal is connected with the PC, which comprises:
the setting module is used for setting a connection password in the terminal;
the processing module is used for forbidding the terminal and the PC to perform any data interaction after detecting that the terminal is connected with the PC, and acquiring a connection password input by a user;
and the judging module is used for judging whether the connection password input by the user is correct or not, if so, allowing the terminal to perform data interaction with the PC, and if not, forbidding the terminal to perform any data interaction with the PC.
Preferably, the setting module is further configured to:
and after the connection password is set in the terminal, setting an unlocking connection mark in the terminal to be in a protection state, wherein in the protection state, the terminal is prohibited from performing any data interaction with the PC.
Preferably, the processing module is further configured to: and after the connection between the terminal and the PC is detected, judging the state of the unlocking connection mark, if the unlocking connection mark is in a protection state, prohibiting the terminal and the PC from performing any data interaction, and prompting a user to input a connection password.
Preferably, the processing module is specifically configured to:
acquiring a connection password input by a user through a PC; or,
and acquiring the connection password input by the user through the terminal.
Preferably, the processing module is further configured to:
under the condition that the connection password input by the user is judged to be correct, setting an unlocking connection mark in the terminal to be in a data interaction state;
and after the disconnection of the terminal and the PC is detected, resetting the unlocking connection mark in the terminal to be in a protection state.
The invention has the following beneficial effects:
by means of the technical scheme of the embodiment of the invention, when the terminal is connected with the PC side, a protection barrier is added, when the PC side has a requirement for interaction with the terminal, the terminal must be unlocked first, and normal data interaction can be carried out with the terminal after the unlocking is successful, otherwise, any information in the user terminal cannot be read.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart of a data protection method when a terminal is connected to a PC according to an embodiment of the present invention;
FIG. 2 is a schematic illustration of the process flow of example 1 of an embodiment of the invention;
FIG. 3 is a schematic illustration of the process flow of example 2 of an embodiment of the invention;
fig. 4 is a schematic structural diagram of a data protection device when a terminal is connected to a PC according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In order to solve the problem that the personal privacy of a terminal user is easy to leak in the prior art, the invention provides a data protection method and a data protection device when the terminal is connected with a PC (personal computer). The present invention will be described in further detail below with reference to the drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
Method embodiment
According to an embodiment of the present invention, a data protection method when a terminal is connected to a PC is provided, fig. 1 is a flowchart of the data protection method when the terminal is connected to the PC according to the embodiment of the present invention, and as shown in fig. 1, the data protection method when the terminal is connected to the PC according to the embodiment of the present invention includes the following processing:
step 101, setting a connection password in a terminal;
in step 101, after the connection password is set in the terminal, the unlock connection flag in the terminal may also be set to be in a protection state, wherein in the protection state, the terminal is prohibited from performing any data interaction with the PC.
That is to say, in the embodiment of the present invention, the terminal adds a setting password item in a storable chip (hereinafter referred to as Flash) for the user to set the connection password. The password is set, and after the password is set, the terminal sets the unlocking connection mark to be true to indicate that the terminal is in a connection protection state.
102, after detecting that the terminal is connected with the PC, forbidding the terminal and the PC to perform any data interaction, and acquiring a connection password input by a user;
in the embodiment of the invention, when the PC is connected with the terminal, if the unlocking connection mark is true, the terminal is in a protection state, and the terminal does not support any instruction for data interaction with the terminal. The terminal interface may also prompt the user that the terminal is in a protected state.
In step 102, after the connection between the terminal and the PC is detected, how to set the unlocking connection flag needs to be determined, and if the unlocking connection flag is in a protection state, the terminal and the PC are prohibited from performing any data interaction, and the user is prompted to input a connection password.
In addition, there are two ways to obtain the connection password input by the user, which specifically include: acquiring a connection password input by a user through a PC; or acquiring a connection password input by the user through the terminal.
Specifically, this unlocking includes two ways: one is that an unlocking password is input through a PC, the PC encrypts the unlocking password by using a secret key, and then the encrypted data is sent to the terminal through an unlocking instruction by an unlocking instruction appointed with the terminal. And after receiving the unlocking instruction, the terminal takes out the encrypted data in the unlocking instruction, and decrypts the encrypted data by using a decryption key matched with the encryption key to obtain the password input by the user from the PC. And the other method is that the terminal prompts to input a connection unlocking password on an interface, and the user inputs the unlocking password on the terminal interface to unlock the terminal. The password format can comprise a plurality of password input modes at the terminal side, such as a graphic unlocking password, a fingerprint password, a data password input in a password input box and the like which are widely used at present.
And 103, judging whether the connection password input by the user is correct or not, if so, allowing the terminal to perform data interaction with the PC, and if not, forbidding the terminal to perform any data interaction with the PC.
In step 103, in case that the connection password input by the user is judged to be correct, the unlock connection flag in the terminal is set to be in a data interaction state, and the terminal is allowed to perform data interaction with the PC.
In the embodiment of the invention, after the terminal acquires the connection unlocking password, whether the connection unlocking password provided by the user is consistent with the connection unlocking password stored in the terminal is judged, and if so, the unlocking connection mark is set to be false, which indicates that the terminal connection protection is unlocked. If the password is inconsistent with the password, the user is prompted to input the password again.
In the embodiment of the invention, in order to protect the data of the terminal, after the disconnection between the terminal and the PC is detected, the unlocking connection mark in the terminal is reset to be in a protection state.
That is, after detecting that the USB charging state is cancelled, the terminal indicates to disconnect from the PC, resets the unlock connection flag to true, and is in a connection protection state.
The above technical solutions of the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Example 1
Fig. 2 is a schematic diagram of a processing flow of example 1 according to an embodiment of the present invention, and provides a flow of a PC connection terminal protection mechanism, which specifically includes the following processing as shown in fig. 2:
step 1, in the terminal setting, providing a password setting function for setting a password for connection and unlocking when the terminal is connected with a PC, wherein the password is stored in a terminal Flash by adopting a ciphertext.
And 2, in cooperation with the step 1, adding a connection unlocking mark in the terminal, wherein the connection unlocking mark is invisible to a user, and the mark has the function of blocking an interactive instruction between the PC and the terminal when the mark is true and does not support the PC to acquire data from the terminal or send data to the terminal through the instruction.
And 3, connecting the PC with the terminal, and performing connection unlocking operation when data interaction is performed.
And 3.1, inputting a connection unlocking password by the user at the PC, and encrypting the password by using the secret key by the PC.
And 3.2, the PC packages the encrypted data into an unlocking instruction and sends the unlocking instruction to the terminal.
And 4, the terminal receives the connection unlocking instruction, processes the instruction to acquire the password input by the user and judges the validity of the password.
And 4.1, the terminal takes out the encrypted data in the unlocking instruction sent by the PC, and decrypts the encrypted data by using the password matched with the PC encryption key to obtain the password plaintext sent by the PC.
And 4.2, the terminal compares the obtained password with the password stored in the terminal Flash, and the password is taken as a basis for judging whether the PC is a legal user.
And 5, judging whether the user is legal or not by the terminal, and carrying out corresponding processing. If the passwords are not consistent, the PC is an illegal user, and the terminal informs the PC that unlocking fails and the user is illegal. If the passwords are consistent and the PC is a legal user, the connection unlocking mark is set to be false, the unlocking is indicated, and the PC is informed of successful unlocking.
And 6, after the PC is successfully unlocked, the PC and the terminal data interaction command are in a normal response state, and the PC can perform information interaction with the terminal.
And 7, disconnecting the PC from the terminal, resetting the connection unlocking mark to be true when the terminal detects that the terminal is not in the USB charging state, and entering a connection protection state. The PC is connected with the terminal again, and the steps 1 to 6 are required to be executed again.
Example 2
For a smart terminal capable of performing screen protection, an embodiment of the present invention will be described in detail below with reference to fig. 3. Fig. 3 is a schematic diagram of a processing flow of example 2 according to an embodiment of the present invention, and as shown in fig. 3, the processing specifically includes the following steps:
step 1, in the terminal setting, providing a password setting function for setting a password for connection and unlocking when the terminal is connected with a PC, and storing the password in Flash in a reasonable mode such as encryption and the like. The password format can comprise a plurality of password input modes at the terminal side, such as a graphic unlocking password, a fingerprint password, a data password input in a password input box and the like which are widely used at present.
And 2, in cooperation with the step 1, adding a connection unlocking mark in the terminal, wherein the connection unlocking mark is invisible to a user, and the mark has the function of blocking an interactive instruction between the PC and the terminal when the mark is true and does not support the PC to acquire data from the terminal or send data to the terminal through the instruction.
And 3, when the terminal is connected to the PC, prompting a user to input a connection unlocking password through a terminal interface, wherein the password input format is set and presented.
And 4, inputting a connection unlocking password by the user, and judging whether the user is legal or not by the terminal according to the connection unlocking password. If the passwords are inconsistent, the user is an illegal user, the terminal connection is not unlocked, and the user is prompted that the passwords are wrong. If the passwords are consistent, the user is a legal user, the terminal sets the connection unlocking mark to be false, the unlocking is indicated, and the user is prompted to carry out data interaction.
And 5, after the unlocking is successful, all instructions of the terminal are in a normal response state, and the PC can perform information interaction with the terminal.
And 6, disconnecting the PC from the terminal, resetting the connection unlocking mark to be true when the terminal detects that the terminal is not in the USB charging state, and entering a connection protection state. The PC is connected with the terminal again, and the steps 1 to 5 are required to be executed again.
The technical scheme of the embodiment of the invention has no special requirements on the PC and the terminal, and can be realized as long as the PC can perform instruction interaction with the terminal. User data in the terminal can be effectively protected from being threatened.
Device embodiment
According to an embodiment of the present invention, there is provided a data protection device when a terminal is connected to a PC, fig. 4 is a schematic structural diagram of the data protection device when the terminal is connected to the PC according to the embodiment of the present invention, and as shown in fig. 4, the data protection device when the terminal is connected to the PC according to the embodiment of the present invention includes: the setting module 40, the processing module 42, and the determining module 44 are described in detail below.
A setting module 40, configured to set a connection password in the terminal; the setup module 40 is further configured to:
and after the connection password is set in the terminal, setting an unlocking connection mark in the terminal to be in a protection state, wherein in the protection state, the terminal is prohibited from performing any data interaction with the PC.
The processing module 42 is configured to prohibit any data interaction between the terminal and the PC after detecting that the terminal is connected to the PC, and acquire a connection password input by the user; the processing module 42 is further configured to: and after the connection between the terminal and the PC is detected, judging the state of the unlocking connection mark, if the unlocking connection mark is in a protection state, prohibiting the terminal and the PC from performing any data interaction, and prompting a user to input a connection password.
The processing module 42 is specifically configured to: acquiring a connection password input by a user through a PC; or, acquiring a connection password input by the user through the terminal.
The processing module 42 is further configured to: under the condition that the connection password input by the user is judged to be correct, setting an unlocking connection mark in the terminal to be in a data interaction state; and after the disconnection of the terminal and the PC is detected, resetting the unlocking connection mark in the terminal to be in a protection state.
And the judging module 44 is used for judging whether the connection password input by the user is correct or not, if so, allowing the terminal to perform data interaction with the PC, and if not, forbidding the terminal to perform any data interaction with the PC.
In summary, according to the technical scheme of the embodiment of the present invention, when the terminal is connected to the PC side, a protection barrier is added, when the PC side needs to interact with the terminal, the terminal must be unlocked first, and normal data interaction with the terminal can be performed after the unlocking is successful, otherwise, any information in the user terminal cannot be read.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the client in an embodiment may be adaptively changed and provided in one or more clients different from the embodiment. The modules of the embodiments may be combined into one module and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or client so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in a client loaded with a ranking website according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
Claims (10)
1. A data protection method when a terminal is connected with a Personal Computer (PC), which is characterized by comprising the following steps:
setting a connection password in the terminal;
after detecting that the terminal is connected with the PC, prohibiting the terminal from performing any data interaction with the PC, and acquiring the connection password input by the user;
and judging whether the connection password input by the user is correct or not, if so, allowing the terminal to perform data interaction with the PC, and if not, forbidding the terminal to perform any data interaction with the PC.
2. The method of claim 1, wherein after setting the connection password in the terminal, the method further comprises: and setting an unlocking connection mark in the terminal to be in a protection state, wherein in the protection state, the terminal is prohibited from performing any data interaction with the PC.
3. The method of claim 2, wherein upon detecting that the terminal is connected to the PC, the method further comprises:
and judging the state of the unlocking connection mark, if the unlocking connection mark is in a protection state, prohibiting the terminal from performing any data interaction with the PC, and prompting a user to input the connection password.
4. The method of claim 1, wherein obtaining the connection password entered by the user specifically comprises:
acquiring the connection password input by the user through the PC; or,
and acquiring the connection password input by the user through the terminal.
5. The method of claim 2, wherein the method further comprises:
under the condition that the connection password input by the user is correct, setting an unlocking connection mark in the terminal to be in a data interaction state;
and after the disconnection between the terminal and the PC is detected, resetting the unlocking connection mark in the terminal to be in a protection state.
6. A data protection apparatus when a terminal is connected to a personal computer PC, comprising:
the setting module is used for setting a connection password in the terminal;
the processing module is used for forbidding the terminal and the PC to perform any data interaction after detecting that the terminal is connected with the PC, and acquiring the connection password input by the user;
and the judging module is used for judging whether the connection password input by the user is correct or not, if so, allowing the terminal to perform data interaction with the PC, and if not, forbidding the terminal to perform any data interaction with the PC.
7. The apparatus of claim 6, wherein the setup module is further to:
and after the connection password is set in the terminal, setting an unlocking connection mark in the terminal to be in a protection state, wherein under the protection state, the terminal is prohibited from performing any data interaction with the PC.
8. The apparatus of claim 7, wherein the processing module is further to: and after the connection between the terminal and the PC is detected, judging the state of the unlocking connection mark, if the unlocking connection mark is in a protection state, forbidding the terminal and the PC to carry out any data interaction, and prompting a user to input the connection password.
9. The apparatus of claim 6, wherein the processing module is specifically configured to:
acquiring the connection password input by the user through the PC; or,
and acquiring the connection password input by the user through the terminal.
10. The apparatus of claim 7, wherein the processing module is further to:
under the condition that the connection password input by the user is correct, setting an unlocking connection mark in the terminal to be in a data interaction state;
and after the disconnection between the terminal and the PC is detected, resetting the unlocking connection mark in the terminal to be in a protection state.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410407914.XA CN105468988A (en) | 2014-08-19 | 2014-08-19 | Data protection method and device during connection of terminal and PC (Personal Computer) |
PCT/CN2015/079261 WO2016026333A1 (en) | 2014-08-19 | 2015-05-19 | Data protection method, device and storage medium in connection between terminal and pc |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410407914.XA CN105468988A (en) | 2014-08-19 | 2014-08-19 | Data protection method and device during connection of terminal and PC (Personal Computer) |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105468988A true CN105468988A (en) | 2016-04-06 |
Family
ID=55350172
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410407914.XA Pending CN105468988A (en) | 2014-08-19 | 2014-08-19 | Data protection method and device during connection of terminal and PC (Personal Computer) |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105468988A (en) |
WO (1) | WO2016026333A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529236A (en) * | 2016-11-02 | 2017-03-22 | 广东欧珀移动通信有限公司 | Unlocking method, apparatus and system |
CN110226164A (en) * | 2017-01-22 | 2019-09-10 | 华为技术有限公司 | A kind of verification method, mobile terminal, equipment and system |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112132524B (en) * | 2020-07-10 | 2024-03-29 | 北京云族佳科技有限公司 | Monitoring method, performance management method, client and server |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1976511A (en) * | 2005-11-28 | 2007-06-06 | 中兴通讯股份有限公司 | Method for conducting secrete handling for PC broadside-on mobile terminal information |
CN101123769A (en) * | 2007-08-02 | 2008-02-13 | 深圳市杰特电信控股有限公司 | A method for editing mobile phone information using computer |
CN101493867A (en) * | 2008-01-25 | 2009-07-29 | 希姆通信息技术(上海)有限公司 | Method and system for mutually transmitting shared data safely between mobile phone and computer |
CN101369895B (en) * | 2008-08-27 | 2011-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and mobile terminal for establishing connection with PC terminal |
-
2014
- 2014-08-19 CN CN201410407914.XA patent/CN105468988A/en active Pending
-
2015
- 2015-05-19 WO PCT/CN2015/079261 patent/WO2016026333A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1976511A (en) * | 2005-11-28 | 2007-06-06 | 中兴通讯股份有限公司 | Method for conducting secrete handling for PC broadside-on mobile terminal information |
CN101123769A (en) * | 2007-08-02 | 2008-02-13 | 深圳市杰特电信控股有限公司 | A method for editing mobile phone information using computer |
CN101493867A (en) * | 2008-01-25 | 2009-07-29 | 希姆通信息技术(上海)有限公司 | Method and system for mutually transmitting shared data safely between mobile phone and computer |
CN101369895B (en) * | 2008-08-27 | 2011-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and mobile terminal for establishing connection with PC terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529236A (en) * | 2016-11-02 | 2017-03-22 | 广东欧珀移动通信有限公司 | Unlocking method, apparatus and system |
CN110226164A (en) * | 2017-01-22 | 2019-09-10 | 华为技术有限公司 | A kind of verification method, mobile terminal, equipment and system |
US11222104B2 (en) | 2017-01-22 | 2022-01-11 | Huawei Technologies Co., Ltd. | Verification method, mobile terminal, device, and system |
CN110226164B (en) * | 2017-01-22 | 2022-02-08 | 华为技术有限公司 | Verification method, mobile terminal, equipment and system |
Also Published As
Publication number | Publication date |
---|---|
WO2016026333A1 (en) | 2016-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112771826B (en) | Application program login method, application program login device and mobile terminal | |
CN106104542B (en) | Content protection for data as a service (DaaS) | |
CN104115152B (en) | The method and apparatus that digital content is protected for use device certification | |
US20140096179A1 (en) | System and method for performing secure communications | |
CN103279411A (en) | Method and system of entering application programs based on fingerprint identification | |
CN104424409A (en) | Application unlocking method and device | |
US10198600B2 (en) | Transparent execution of secret content | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
GB2556638A (en) | Protecting usage of key store content | |
CN111538961A (en) | Software activation method, device, equipment and storage medium | |
CN106548065B (en) | Application program installation detection method and device | |
CN104580170A (en) | Data reading method and device | |
CN106685945B (en) | Service request processing method, service handling number verification method and terminal thereof | |
CN103036852A (en) | Method and device for achieving network login | |
CN105468988A (en) | Data protection method and device during connection of terminal and PC (Personal Computer) | |
CN107070842B (en) | Method and system for authenticating surrounding web applications by embedding web applications | |
EP3026620A1 (en) | Network authentication method using a card device | |
CN205160564U (en) | System security starting drive and intelligent terminal | |
CN107707550B (en) | Method, device and system for accessing virtual machine | |
CN105912942A (en) | Mobile terminal image encryption and decryption processing method and system based on NFC | |
CN112020065B (en) | Information processing method, terminal equipment, server and storage medium | |
Igor et al. | Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. | |
CN105610775A (en) | Decryption method and system thereof, encryption method and system thereof, and mobile terminal | |
CN106603237A (en) | Security payment method and apparatus | |
KR102374193B1 (en) | Method and device of providing log-in service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160406 |
|
WD01 | Invention patent application deemed withdrawn after publication |