CN105956493A - Mobile phone file protection method and mobile phone file protection device - Google Patents
Mobile phone file protection method and mobile phone file protection device Download PDFInfo
- Publication number
- CN105956493A CN105956493A CN201610498879.6A CN201610498879A CN105956493A CN 105956493 A CN105956493 A CN 105956493A CN 201610498879 A CN201610498879 A CN 201610498879A CN 105956493 A CN105956493 A CN 105956493A
- Authority
- CN
- China
- Prior art keywords
- file
- mobile phone
- user
- safeguard rule
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The invention discloses a mobile phone file protection method and a mobile phone file protection device. The method comprises the following steps of: receiving file protection rules set by a user by use of an application program capable of setting file access permission; acquiring and storing the file protection rules; when receiving an operation request for the file, verifying fingerprints of the user; and under a condition that the verified fingerprints of the user are correct, judging whether the operation request conforms to the file protection rules or not, and if the operation request conforms to the file protection rules, allowing the operation request. According to the method disclosed by the invention, a real-time protection function for files in a mobile phone can be realized, and the information security is improved.
Description
Technical field
The present invention relates to mobile phone information safety technology, more particularly, to the protection of a kind of mobile phone file
Method and protection device.
Background technology
Along with the development of information technology, mobile phone becomes requisite electronics in daily life and sets
Standby.Various information are more and more stored in mobile phone by people, such as, photo, video data,
Personal information etc..The leakage of these information can cause the user be lost greatly.Therefore, user for
The safety of mobile phone Chinese part is had higher requirement.
Generally, in the prior art, the protection mechanism of cellphone information has: access based on container technique
Isolation, it is to set up mutually isolated running environment to application that isolation based on container accesses, and mutually can not
See the data of the other side;Access based on SElinux (Security-Enhanced Linux) controls,
It is the rule-based control that conducts interviews file.
But, isolation access based on container can produce too much isolation environment, thus consumes more
System resource so that mobile phone is slack-off.And it is based on SElinux (Security-Enhanced Linux)
Accessing and control, the rule of file is arranged when dispatching from the factory, and user can not modify, and generally
Limited only for some executable file, it is impossible to meet many demands of user.
Accordingly, it would be desirable to improve prior art to solve at least one above-mentioned problem.
Summary of the invention
It is an object of the present invention to provide the new solution of the guard method of a kind of mobile phone file.
According to the first aspect of the invention, it is provided that the guard method of a kind of mobile phone file.The method bag
Include: utilize and the application program of file access authority is set to receive the file safeguard rule of user setup;
The safeguard rule of the file described in acquisition carries out and stores;Please receiving the operation for described file
When asking, the fingerprint of checking user;And in the case of the fingerprint of described checking user passes through, it is judged that
Whether described operation requests meets the safeguard rule of described file, if met, then allows described operation
Request.
Preferably, the safeguard rule of described file include readable, writeable, can executory at least one.
Preferably, described method also includes: arrange condom icon on the desktop of mobile phone;By file
Drag and drop are to described condom icon, next to start the described application program for arranging file access authority
Receive the file safeguard rule of user setup.
Preferably, the safeguard rule of described file is stored in the memory block of the encryption of mobile phone.
Preferably, mobile phone is carried out full disk encryption.
According to the second aspect of the invention, it is provided that a kind of protection device for mobile phone file.This dress
Put and include: user-application module, for utilizing the application program arranging file access authority to connect
Receive the file safeguard rule of user setup;Data obtaining module, for obtaining described file protection rule
Then and store;First security module: be used for when receiving the operation requests for described file,
The fingerprint of checking user;Second security module: for situation about passing through when the fingerprint of described checking user
Under, it is judged that whether described operation requests meets the safeguard rule of described file, if met, then allows
Described operation requests.
Preferably, the safeguard rule of described file include readable, writeable, can executory at least one.
Preferably, described device also includes: for arranging the mould of condom icon on the desktop of mobile phone
Block;And for being used for arranging file access described in starting by file drag and drop to described condom icon
The application program of authority receives the module of the file safeguard rule of user setup.
Preferably, described device also includes: for the safeguard rule of described file is stored in mobile phone
The module of the memory block of encryption.
Preferably, described device also includes: for mobile phone carries out the module of full disk encryption.
Compared with prior art, the method and device protected according to the mobile phone file of the present invention, it is possible to real
Time the safeguard rule that mobile phone Chinese part is set, and determine whether that operation is subject to by fingerprint authentication
The file of protection.In this way, it is possible to during mobile phone runs, the safety of file is increased
Rank, prevents the leakage of mobile phone private data.
By detailed description to the exemplary embodiment of the present invention referring to the drawings, its of the present invention
Its feature and advantage thereof will be made apparent from.
Accompanying drawing explanation
Combined in the description and the accompanying drawing of the part that constitutes description shows the reality of the present invention
Execute example, and together with its explanation for explaining the principle of the present invention.
Fig. 1 is the flow chart of the guard method for mobile phone file according to the present invention.
Fig. 2 is the schematic block diagram of the protection device for mobile phone file according to the present invention.
Fig. 3 is the schematic frame of the protection device of mobile phone file according to an embodiment of the invention
Figure.
Detailed description of the invention
The various exemplary embodiments of the present invention are described in detail now with reference to accompanying drawing.It should also be noted that
Unless specifically stated otherwise, the parts that illustrate the most in these embodiments and step positioned opposite,
Numerical expression and numerical value do not limit the scope of the invention.
Description only actually at least one exemplary embodiment is illustrative below, never makees
For to the present invention and application thereof or any restriction of use.
May not beg in detail for technology, method and apparatus known to person of ordinary skill in the relevant
Opinion, but in the appropriate case, described technology, method and apparatus should be considered a part for description.
Shown here with in all examples discussed, any occurrence should be construed as merely example
Property rather than as limit.Therefore, other example of exemplary embodiment can have different
Value.
It should also be noted that similar label and letter represent similar terms, therefore, one in following accompanying drawing
A certain Xiang Yi the accompanying drawing of denier is defined, then need not it is carried out further in accompanying drawing subsequently
Discuss.
Fig. 1 is the flow chart of the guard method for mobile phone file according to the present invention.
As it is shown in figure 1, in step S110, utilize the application program arranging file access authority to receive
The file safeguard rule of user setup.
Described application program is used for mutual between user or information exchange, for user setup file
Access rights.Such as, described application program provides the connection interface of user, so that user setup file
Safeguard rule.In this way, it is provided that friendly interface, user is made to join intuitively
Put the safeguard rule of file.
In one example, the desktop of mobile phone is placed shortcut icon, such as, condom icon,
User can start user interface by the way of by file drag and drop to this shortcut icon.Example
As, during by user by file drag and drop to shortcut icon, pop-up dialogue box is for the protection arranging file
Rule.In another embodiment, user can be by the way of pressing file for a long time, to eject dish
Single mode starts the safeguard rule arranging file.The safeguard rule of file is set by application program
Mode, the safeguard rule of file can be set or changed in real time, with according to reality when mobile phone runs
Border needs the protection level of file in configurating mobile.
In one example, the safeguard rule of described file include readable, writeable maybe can perform at least
One.
Described file include picture, video, notepad file, word class file, executable file,
Application class software and systems soft ware etc..It will be understood by those of skill in the art that of the present invention
File includes single file, also includes file directory.
In step S120, file safeguard rule described in acquisition also stores.
In order to increase the safety of described file safeguard rule further, in one example, by described
The safeguard rule of file is stored in the safety zone of mobile phone, such as, is deposited by the safeguard rule of described file
Storage is in the encryption memory block of mobile phone.When reading the file safeguard rule stored, need first to carry out
Corresponding deciphering could obtain the safeguard rule of file.In this way, peace can be further enhanced
Quan Xing, reduces the risk that the safeguard rule of described file is modified.
In one example, the safeguard rule of described file is stored in the form of a file, such as,
It is stored as the form of text.The safeguard rule of described file can be stored in the storage medium of mobile phone
In.When the safeguard rule of the file of storage, it is possible that different file safeguard rules has phase
Situation with title.In this case, the safeguard rule of file may produce conflict.Such as,
Posterior file may cover file formerly, thus causes loss of data.
Furthermore, it is also possible to occur that identical file safeguard rule has the situation of different names.This may
Content can be duplicated in the storage medium of mobile phone, and form garbage files, and take mobile phone storage
Resource.
Therefore, in another example, alternatively, the cryptographic Hash using described file safeguard rule is made
Title for described safeguard rule.In this way, above-mentioned file can be avoided to a certain extent
The conflict of safeguard rule and/or rubbish.
Additionally, the transmission of the safeguard rule of file and/or use during, be often damaged
Situation.In some cases, if having invoked the file safeguard rule of damage, being likely to result in and calling journey
The card of sequence pauses and/or collapses.
Therefore, in another embodiment, when reading the safeguard rule of described file, it is also possible to logical
Cross and use the title of file safeguard rule to verify the integrity of described file safeguard rule.By this
Mode, can avoid the generation of the problems referred to above easily by the title of file safeguard rule.
Further, for the risk preventing mobile phone to be physically attacked after losing, such as, by dividing
Analysis chip for cell phone, to obtain the information of user, can carry out full disk encryption to mobile phone.In this way,
The file security in mobile phone can be protected when user shuts down.
In step S130, when receiving the operation requests for described file, the fingerprint of checking user.
Described operation requests includes the reading and writing for file, deletes, revises the operation such as filename.Example
As, when receiving described operation requests, application prompts user inputs fingerprint, and will input
Fingerprint mate with the fingerprint template prestored, if the match is successful, then fingerprint authentication passes through.?
In the case of fingerprint matching is unsuccessful, the operation of refusal user.
In step S140, in the case of the fingerprint of described checking user passes through, it is judged that described operation please
The no safeguard rule meeting described file of Seeking Truth, if met, then allows described operation requests.
User is by, after fingerprint authentication, determining whether whether described operation requests meets described literary composition
The safeguard rule of part, if met, then allows described operation requests.Otherwise, the operation of user is refused
Request.Such as, if the safeguard rule of certain file is set to readable by user, when user ask right
When file renames or revises, then refuse the operation requests of user.
It will be understood to those skilled in the art that at electronic technology field, software, hardware can be passed through
And the mode that software and hardware combines, said method is embodied in the product.Those skilled in the art
Member is easy to, based on method as disclosed above, produce the protection device of a kind of mobile phone file.
Fig. 2 is the schematic diagram of the protection device of mobile phone file according to an embodiment of the invention.
As in figure 2 it is shown, this device 200 includes: user-application module 210, set for utilization
Put the application program of file access authority to receive the file safeguard rule of user setup;Acquisition of information mould
Block 220, for obtaining described file safeguard rule and storing;First security module 230, uses
In when receiving the operation requests for described file, verify the fingerprint of user;Second security module
250: in the case of passing through when the fingerprint of described checking user, it is judged that whether described operation requests accords with
Closing the safeguard rule of described file, if met, then allowing described operation requests.
In one example, this device 200 also includes memory module 240, is used for storing user setup
File safeguard rule.
Alternatively, the safeguard rule of described file include readable, writeable, can executory at least one.
Alternatively, described device 200 also includes: for arranging condom icon on the desktop of mobile phone
Module;And for being used for arranging file described in starting by file drag and drop to described condom icon
The application program of access rights receives the module of the file safeguard rule of user setup.By this side
Formula, user can arrange the safeguard rule of various file easily.
Alternatively, described device 200 also includes: for the safeguard rule of described file is stored in hands
The module of the encryption memory block of machine.In this way, the safety of the safeguard rule of file can be strengthened
Property, reduce the risk being modified.
Alternatively, described device 200 also includes the module for mobile phone carries out full disk encryption.Pass through
This mode, is possible to prevent mobile phone in the power-offstate, is physically attacked.
It will be understood by those of skill in the art that said apparatus is segmented into separate module, or
They can be combined realization by person.
Fig. 3 is the schematic frame of the protection device of mobile phone file according to another embodiment of the invention
Figure.
As it is shown on figure 3, this device 300 include user-application module 310, interface module 320,
Security module 330 and memory module 340.
Described user-application module 310, is configured for receiving user setup file safeguard rule
Or it is mutual with other of user.
Described interface module 320, be configured for application program module 310 and security module 330 it
Between information transmission.
Described security module 330, is configured to, when receiving the operation requests for file, carry out fingerprint
Comparison safeguard rule based on described file determine refusal or accept described operation requests.
Described memory module 340, is configured to store the safeguard rule of described file.
In the embodiment shown in fig. 3, according to the protection process of the mobile phone file of the present invention it is: user
The safeguard rule of file is set by application program module 310;Application program module 310 is by described
File safeguard rule is sent to security module 330 by interface module 320;Security module 330 is by institute
The file safeguard rule stated stores to memory module 340;When the shielded above-mentioned file of user operation,
Application program module 310 points out user to carry out fingerprint authentication;After fingerprint authentication passes through, application program mould
By interface module 320, block 310 informs that this user of security module 330 is to carry out fingerprint mandate;Safety
Module 330 reads the safeguard rule of this document from memory module 340, if rule verification is correct,
Then allow this operation, otherwise, refuse this operation.
The guard method of the mobile phone file according to the present invention and protection device can be at polytype handss
Realize on machine, such as, operating system based on linux exploitation, the mobile phone etc. of Saipan operating system.
According to the present invention mobile phone file protection method and protection device, can when mobile phone runs,
By real-time the arranging or the safeguard rule of amendment file of user application, meet user many-sided
Demand.Additionally, for the operation of shielded mobile phone file, the mode carrying out fingerprint comparison enters one
Step enhances the safety of mobile phone.Full disk encryption function in conjunction with mobile phone prevents mobile phone by thing further
The risk that reason is attacked, it is achieved that duplicate protection when mobile phone runs and shuts down.
It will be appreciated by those skilled in the art that, said apparatus can be realized by various modes.Such as,
Said apparatus can be realized by instruction configuration processor.For example, it is possible to instruction is stored in ROM
In, and when starting the device, instruction is read from ROM programming device realizes above-mentioned dress
Put.For example, it is possible to said apparatus is cured in dedicated devices (such as ASIC).Can be by above-mentioned
Device is divided into separate unit, or they are combined realization.Said apparatus can lead to
The one crossing above-mentioned various embodiment realizes, or can by two kinds of above-mentioned various embodiments or
More combination realizes.For a person skilled in the art, these are all of equal value.
Well known to those skilled in the art, along with the electronic information technology of such as integrated circuit technique
Development and the trend of hardware and software, clear and definite dividing system soft and hardware boundary to seem and compare
Difficulty.Because any operation can realize with software, it is also possible to is realized by hardware.Any finger
The execution of order can be completed by hardware, can also be completed by software equally.For a certain machine function
Use hardware implementations still use software implement scheme, depend on price, speed, reliability,
The Non-technical factors such as memory capacity, change cycle.Therefore, general for electronic information technical field
For logical technical staff, mode the most direct and that a technical scheme is explicitly described is to describe the party
Each operation in case.Knowing in the case of operation to be performed, those skilled in the art can
Directly to design desired product or device based on to the consideration of described Non-technical factor.
Although some specific embodiments of the present invention being described in detail by example, but
It should be appreciated by those skilled in the art, example above is merely to illustrate rather than in order to limit
The scope of the present invention processed.It should be appreciated by those skilled in the art, can be without departing from the scope of the present invention
In the case of spirit, above example is modified.The scope of the present invention is by claims
Limit.
Claims (10)
1. a guard method for mobile phone file, including:
Utilize and the application program of file access authority is set to receive the file safeguard rule of user setup;
File safeguard rule described in acquisition also stores;
When receiving the operation requests for described file, the fingerprint of checking user;And
In the case of the fingerprint of described checking user passes through, it is judged that whether described operation requests meets institute
Stating the safeguard rule of file, if met, then allowing described operation requests.
Method the most according to claim 1, wherein, the safeguard rule of described file includes can
Read, writeable, can executory at least one.
Method the most according to claim 1, also includes:
The desktop of mobile phone arranges condom icon;
By file drag and drop to described condom icon, described for arranging file access authority to start
Application program receives the file safeguard rule of user setup.
Method the most according to claim 1, also includes: deposited by the safeguard rule of described file
Storage is in the encryption memory block of mobile phone.
Method the most according to claim 4, also includes: mobile phone is carried out full disk encryption.
6. for a protection device for mobile phone file, including:
User-application module: the application program of file access authority is set to receive use for utilizing
The file safeguard rule that family is arranged;
Data obtaining module: for obtaining described file safeguard rule and storing
First security module: for when receiving the operation requests for described file, verify user
Fingerprint;
Second security module: in the case of passing through when the fingerprint of described checking user, it is judged that described
Whether operation requests meets the safeguard rule of described file, if met, then allows described operation requests.
Device the most according to claim 6, wherein, the safeguard rule of described file includes can
Read, writeable, can executory at least one.
Device the most according to claim 6, also includes:
For arranging the module of condom icon on the desktop of mobile phone;
For being used for arranging file access power described in starting by file drag and drop to described condom icon
The application program of limit receives the module of the file safeguard rule of user setup.
Device the most according to claim 6, also includes: for the protection of described file being advised
Then it is stored in the module of the encryption memory block of mobile phone.
Device the most according to claim 9, also includes: for mobile phone is carried out full disk encryption
Module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610498879.6A CN105956493A (en) | 2016-06-29 | 2016-06-29 | Mobile phone file protection method and mobile phone file protection device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610498879.6A CN105956493A (en) | 2016-06-29 | 2016-06-29 | Mobile phone file protection method and mobile phone file protection device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105956493A true CN105956493A (en) | 2016-09-21 |
Family
ID=56901648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610498879.6A Pending CN105956493A (en) | 2016-06-29 | 2016-06-29 | Mobile phone file protection method and mobile phone file protection device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105956493A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446653A (en) * | 2016-09-30 | 2017-02-22 | 北京小米移动软件有限公司 | Application authority management method and device and electronic equipment |
CN108205630A (en) * | 2016-12-20 | 2018-06-26 | 中国移动通信有限公司研究院 | Resource access method and device based on SeLinux under a kind of multi-user |
CN108763892A (en) * | 2018-04-18 | 2018-11-06 | Oppo广东移动通信有限公司 | Right management method, device, mobile terminal and storage medium |
CN108763884A (en) * | 2018-04-18 | 2018-11-06 | Oppo广东移动通信有限公司 | Right management method, device, mobile terminal and storage medium |
CN114417426A (en) * | 2022-03-29 | 2022-04-29 | 北京凝思软件股份有限公司 | Trusted verification method and device based on tight coupling rule, storage medium and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239804A (en) * | 2013-06-07 | 2014-12-24 | 腾讯科技(深圳)有限公司 | Data protecting method and device |
CN104318171A (en) * | 2014-10-09 | 2015-01-28 | 中国科学院信息工程研究所 | Android privacy data protection method and system based on authority tags |
CN104573507A (en) * | 2015-02-05 | 2015-04-29 | 浪潮电子信息产业股份有限公司 | Secure container and design method thereof |
CN104680084A (en) * | 2015-03-20 | 2015-06-03 | 北京瑞星信息技术有限公司 | Method and system for protecting user privacy in computer |
CN104951708A (en) * | 2015-06-11 | 2015-09-30 | 浪潮电子信息产业股份有限公司 | File measurement and protection method and device |
CN105574374A (en) * | 2014-10-10 | 2016-05-11 | 富泰华工业(深圳)有限公司 | System and method for protecting special information |
-
2016
- 2016-06-29 CN CN201610498879.6A patent/CN105956493A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239804A (en) * | 2013-06-07 | 2014-12-24 | 腾讯科技(深圳)有限公司 | Data protecting method and device |
CN104318171A (en) * | 2014-10-09 | 2015-01-28 | 中国科学院信息工程研究所 | Android privacy data protection method and system based on authority tags |
CN105574374A (en) * | 2014-10-10 | 2016-05-11 | 富泰华工业(深圳)有限公司 | System and method for protecting special information |
CN104573507A (en) * | 2015-02-05 | 2015-04-29 | 浪潮电子信息产业股份有限公司 | Secure container and design method thereof |
CN104680084A (en) * | 2015-03-20 | 2015-06-03 | 北京瑞星信息技术有限公司 | Method and system for protecting user privacy in computer |
CN104951708A (en) * | 2015-06-11 | 2015-09-30 | 浪潮电子信息产业股份有限公司 | File measurement and protection method and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446653A (en) * | 2016-09-30 | 2017-02-22 | 北京小米移动软件有限公司 | Application authority management method and device and electronic equipment |
CN108205630A (en) * | 2016-12-20 | 2018-06-26 | 中国移动通信有限公司研究院 | Resource access method and device based on SeLinux under a kind of multi-user |
CN108763892A (en) * | 2018-04-18 | 2018-11-06 | Oppo广东移动通信有限公司 | Right management method, device, mobile terminal and storage medium |
CN108763884A (en) * | 2018-04-18 | 2018-11-06 | Oppo广东移动通信有限公司 | Right management method, device, mobile terminal and storage medium |
CN108763884B (en) * | 2018-04-18 | 2022-01-11 | Oppo广东移动通信有限公司 | Authority management method, device, mobile terminal and storage medium |
CN114417426A (en) * | 2022-03-29 | 2022-04-29 | 北京凝思软件股份有限公司 | Trusted verification method and device based on tight coupling rule, storage medium and electronic equipment |
CN114417426B (en) * | 2022-03-29 | 2022-07-01 | 北京凝思软件股份有限公司 | Trusted verification method and device based on tight coupling rule, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110990804B (en) | Resource access method, device and equipment | |
CN105956493A (en) | Mobile phone file protection method and mobile phone file protection device | |
US11386191B2 (en) | Trusted hardware-based identity management methods, apparatuses, and devices | |
US10812477B2 (en) | Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device | |
TW202116040A (en) | Block chain-based creation method, apparatus, device and system for verifiable claim | |
CN113542288B (en) | Service authorization method, device, equipment and system | |
CN108108611B (en) | A kind of intelligent seal carrying intelligent chip | |
US20180285578A1 (en) | Temporally isolating data accessed by a computing device | |
CN111814195B (en) | Data management method, device and equipment based on trusted hardware | |
EP3014511A1 (en) | Process authentication and resource permissions | |
CN107622203A (en) | Guard method, device, storage medium and the electronic equipment of sensitive information | |
CN110990820B (en) | Tax disk authorization method and device, electronic equipment and storage medium | |
US20090119772A1 (en) | Secure file access | |
CN108964925A (en) | A kind of document authentication device, method, device, equipment and readable medium | |
CN106022039A (en) | Secure storage system and storage method of electronic information | |
Marsh et al. | Defining and investigating device comfort | |
AU2012266675A1 (en) | Access control to data stored in a cloud | |
CN105701420A (en) | Method for managing user data and terminal | |
CN112560110A (en) | Signing method and device of authorization protocol, electronic equipment and storage medium | |
CN115185605A (en) | Service execution method, device, storage medium and electronic equipment | |
CN113704826A (en) | Privacy protection-based business risk detection method, device and equipment | |
CN114244598B (en) | Intranet data access control method, device, equipment and storage medium | |
CN109377611A (en) | Caller management method, system, computer equipment and storage medium based on bio-identification | |
CN113221142A (en) | Authorization service processing method, device, equipment and system | |
CN116415217A (en) | Instant authorization system based on zero trust architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160921 |