CN105956493A - Mobile phone file protection method and mobile phone file protection device - Google Patents

Mobile phone file protection method and mobile phone file protection device Download PDF

Info

Publication number
CN105956493A
CN105956493A CN201610498879.6A CN201610498879A CN105956493A CN 105956493 A CN105956493 A CN 105956493A CN 201610498879 A CN201610498879 A CN 201610498879A CN 105956493 A CN105956493 A CN 105956493A
Authority
CN
China
Prior art keywords
file
mobile phone
user
safeguard rule
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610498879.6A
Other languages
Chinese (zh)
Inventor
孙鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610498879.6A priority Critical patent/CN105956493A/en
Publication of CN105956493A publication Critical patent/CN105956493A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention discloses a mobile phone file protection method and a mobile phone file protection device. The method comprises the following steps of: receiving file protection rules set by a user by use of an application program capable of setting file access permission; acquiring and storing the file protection rules; when receiving an operation request for the file, verifying fingerprints of the user; and under a condition that the verified fingerprints of the user are correct, judging whether the operation request conforms to the file protection rules or not, and if the operation request conforms to the file protection rules, allowing the operation request. According to the method disclosed by the invention, a real-time protection function for files in a mobile phone can be realized, and the information security is improved.

Description

The guard method of a kind of mobile phone file and protection device
Technical field
The present invention relates to mobile phone information safety technology, more particularly, to the protection of a kind of mobile phone file Method and protection device.
Background technology
Along with the development of information technology, mobile phone becomes requisite electronics in daily life and sets Standby.Various information are more and more stored in mobile phone by people, such as, photo, video data, Personal information etc..The leakage of these information can cause the user be lost greatly.Therefore, user for The safety of mobile phone Chinese part is had higher requirement.
Generally, in the prior art, the protection mechanism of cellphone information has: access based on container technique Isolation, it is to set up mutually isolated running environment to application that isolation based on container accesses, and mutually can not See the data of the other side;Access based on SElinux (Security-Enhanced Linux) controls, It is the rule-based control that conducts interviews file.
But, isolation access based on container can produce too much isolation environment, thus consumes more System resource so that mobile phone is slack-off.And it is based on SElinux (Security-Enhanced Linux) Accessing and control, the rule of file is arranged when dispatching from the factory, and user can not modify, and generally Limited only for some executable file, it is impossible to meet many demands of user.
Accordingly, it would be desirable to improve prior art to solve at least one above-mentioned problem.
Summary of the invention
It is an object of the present invention to provide the new solution of the guard method of a kind of mobile phone file.
According to the first aspect of the invention, it is provided that the guard method of a kind of mobile phone file.The method bag Include: utilize and the application program of file access authority is set to receive the file safeguard rule of user setup; The safeguard rule of the file described in acquisition carries out and stores;Please receiving the operation for described file When asking, the fingerprint of checking user;And in the case of the fingerprint of described checking user passes through, it is judged that Whether described operation requests meets the safeguard rule of described file, if met, then allows described operation Request.
Preferably, the safeguard rule of described file include readable, writeable, can executory at least one.
Preferably, described method also includes: arrange condom icon on the desktop of mobile phone;By file Drag and drop are to described condom icon, next to start the described application program for arranging file access authority Receive the file safeguard rule of user setup.
Preferably, the safeguard rule of described file is stored in the memory block of the encryption of mobile phone.
Preferably, mobile phone is carried out full disk encryption.
According to the second aspect of the invention, it is provided that a kind of protection device for mobile phone file.This dress Put and include: user-application module, for utilizing the application program arranging file access authority to connect Receive the file safeguard rule of user setup;Data obtaining module, for obtaining described file protection rule Then and store;First security module: be used for when receiving the operation requests for described file, The fingerprint of checking user;Second security module: for situation about passing through when the fingerprint of described checking user Under, it is judged that whether described operation requests meets the safeguard rule of described file, if met, then allows Described operation requests.
Preferably, the safeguard rule of described file include readable, writeable, can executory at least one.
Preferably, described device also includes: for arranging the mould of condom icon on the desktop of mobile phone Block;And for being used for arranging file access described in starting by file drag and drop to described condom icon The application program of authority receives the module of the file safeguard rule of user setup.
Preferably, described device also includes: for the safeguard rule of described file is stored in mobile phone The module of the memory block of encryption.
Preferably, described device also includes: for mobile phone carries out the module of full disk encryption.
Compared with prior art, the method and device protected according to the mobile phone file of the present invention, it is possible to real Time the safeguard rule that mobile phone Chinese part is set, and determine whether that operation is subject to by fingerprint authentication The file of protection.In this way, it is possible to during mobile phone runs, the safety of file is increased Rank, prevents the leakage of mobile phone private data.
By detailed description to the exemplary embodiment of the present invention referring to the drawings, its of the present invention Its feature and advantage thereof will be made apparent from.
Accompanying drawing explanation
Combined in the description and the accompanying drawing of the part that constitutes description shows the reality of the present invention Execute example, and together with its explanation for explaining the principle of the present invention.
Fig. 1 is the flow chart of the guard method for mobile phone file according to the present invention.
Fig. 2 is the schematic block diagram of the protection device for mobile phone file according to the present invention.
Fig. 3 is the schematic frame of the protection device of mobile phone file according to an embodiment of the invention Figure.
Detailed description of the invention
The various exemplary embodiments of the present invention are described in detail now with reference to accompanying drawing.It should also be noted that Unless specifically stated otherwise, the parts that illustrate the most in these embodiments and step positioned opposite, Numerical expression and numerical value do not limit the scope of the invention.
Description only actually at least one exemplary embodiment is illustrative below, never makees For to the present invention and application thereof or any restriction of use.
May not beg in detail for technology, method and apparatus known to person of ordinary skill in the relevant Opinion, but in the appropriate case, described technology, method and apparatus should be considered a part for description.
Shown here with in all examples discussed, any occurrence should be construed as merely example Property rather than as limit.Therefore, other example of exemplary embodiment can have different Value.
It should also be noted that similar label and letter represent similar terms, therefore, one in following accompanying drawing A certain Xiang Yi the accompanying drawing of denier is defined, then need not it is carried out further in accompanying drawing subsequently Discuss.
Fig. 1 is the flow chart of the guard method for mobile phone file according to the present invention.
As it is shown in figure 1, in step S110, utilize the application program arranging file access authority to receive The file safeguard rule of user setup.
Described application program is used for mutual between user or information exchange, for user setup file Access rights.Such as, described application program provides the connection interface of user, so that user setup file Safeguard rule.In this way, it is provided that friendly interface, user is made to join intuitively Put the safeguard rule of file.
In one example, the desktop of mobile phone is placed shortcut icon, such as, condom icon, User can start user interface by the way of by file drag and drop to this shortcut icon.Example As, during by user by file drag and drop to shortcut icon, pop-up dialogue box is for the protection arranging file Rule.In another embodiment, user can be by the way of pressing file for a long time, to eject dish Single mode starts the safeguard rule arranging file.The safeguard rule of file is set by application program Mode, the safeguard rule of file can be set or changed in real time, with according to reality when mobile phone runs Border needs the protection level of file in configurating mobile.
In one example, the safeguard rule of described file include readable, writeable maybe can perform at least One.
Described file include picture, video, notepad file, word class file, executable file, Application class software and systems soft ware etc..It will be understood by those of skill in the art that of the present invention File includes single file, also includes file directory.
In step S120, file safeguard rule described in acquisition also stores.
In order to increase the safety of described file safeguard rule further, in one example, by described The safeguard rule of file is stored in the safety zone of mobile phone, such as, is deposited by the safeguard rule of described file Storage is in the encryption memory block of mobile phone.When reading the file safeguard rule stored, need first to carry out Corresponding deciphering could obtain the safeguard rule of file.In this way, peace can be further enhanced Quan Xing, reduces the risk that the safeguard rule of described file is modified.
In one example, the safeguard rule of described file is stored in the form of a file, such as, It is stored as the form of text.The safeguard rule of described file can be stored in the storage medium of mobile phone In.When the safeguard rule of the file of storage, it is possible that different file safeguard rules has phase Situation with title.In this case, the safeguard rule of file may produce conflict.Such as, Posterior file may cover file formerly, thus causes loss of data.
Furthermore, it is also possible to occur that identical file safeguard rule has the situation of different names.This may Content can be duplicated in the storage medium of mobile phone, and form garbage files, and take mobile phone storage Resource.
Therefore, in another example, alternatively, the cryptographic Hash using described file safeguard rule is made Title for described safeguard rule.In this way, above-mentioned file can be avoided to a certain extent The conflict of safeguard rule and/or rubbish.
Additionally, the transmission of the safeguard rule of file and/or use during, be often damaged Situation.In some cases, if having invoked the file safeguard rule of damage, being likely to result in and calling journey The card of sequence pauses and/or collapses.
Therefore, in another embodiment, when reading the safeguard rule of described file, it is also possible to logical Cross and use the title of file safeguard rule to verify the integrity of described file safeguard rule.By this Mode, can avoid the generation of the problems referred to above easily by the title of file safeguard rule.
Further, for the risk preventing mobile phone to be physically attacked after losing, such as, by dividing Analysis chip for cell phone, to obtain the information of user, can carry out full disk encryption to mobile phone.In this way, The file security in mobile phone can be protected when user shuts down.
In step S130, when receiving the operation requests for described file, the fingerprint of checking user.
Described operation requests includes the reading and writing for file, deletes, revises the operation such as filename.Example As, when receiving described operation requests, application prompts user inputs fingerprint, and will input Fingerprint mate with the fingerprint template prestored, if the match is successful, then fingerprint authentication passes through.? In the case of fingerprint matching is unsuccessful, the operation of refusal user.
In step S140, in the case of the fingerprint of described checking user passes through, it is judged that described operation please The no safeguard rule meeting described file of Seeking Truth, if met, then allows described operation requests.
User is by, after fingerprint authentication, determining whether whether described operation requests meets described literary composition The safeguard rule of part, if met, then allows described operation requests.Otherwise, the operation of user is refused Request.Such as, if the safeguard rule of certain file is set to readable by user, when user ask right When file renames or revises, then refuse the operation requests of user.
It will be understood to those skilled in the art that at electronic technology field, software, hardware can be passed through And the mode that software and hardware combines, said method is embodied in the product.Those skilled in the art Member is easy to, based on method as disclosed above, produce the protection device of a kind of mobile phone file.
Fig. 2 is the schematic diagram of the protection device of mobile phone file according to an embodiment of the invention.
As in figure 2 it is shown, this device 200 includes: user-application module 210, set for utilization Put the application program of file access authority to receive the file safeguard rule of user setup;Acquisition of information mould Block 220, for obtaining described file safeguard rule and storing;First security module 230, uses In when receiving the operation requests for described file, verify the fingerprint of user;Second security module 250: in the case of passing through when the fingerprint of described checking user, it is judged that whether described operation requests accords with Closing the safeguard rule of described file, if met, then allowing described operation requests.
In one example, this device 200 also includes memory module 240, is used for storing user setup File safeguard rule.
Alternatively, the safeguard rule of described file include readable, writeable, can executory at least one.
Alternatively, described device 200 also includes: for arranging condom icon on the desktop of mobile phone Module;And for being used for arranging file described in starting by file drag and drop to described condom icon The application program of access rights receives the module of the file safeguard rule of user setup.By this side Formula, user can arrange the safeguard rule of various file easily.
Alternatively, described device 200 also includes: for the safeguard rule of described file is stored in hands The module of the encryption memory block of machine.In this way, the safety of the safeguard rule of file can be strengthened Property, reduce the risk being modified.
Alternatively, described device 200 also includes the module for mobile phone carries out full disk encryption.Pass through This mode, is possible to prevent mobile phone in the power-offstate, is physically attacked.
It will be understood by those of skill in the art that said apparatus is segmented into separate module, or They can be combined realization by person.
Fig. 3 is the schematic frame of the protection device of mobile phone file according to another embodiment of the invention Figure.
As it is shown on figure 3, this device 300 include user-application module 310, interface module 320, Security module 330 and memory module 340.
Described user-application module 310, is configured for receiving user setup file safeguard rule Or it is mutual with other of user.
Described interface module 320, be configured for application program module 310 and security module 330 it Between information transmission.
Described security module 330, is configured to, when receiving the operation requests for file, carry out fingerprint Comparison safeguard rule based on described file determine refusal or accept described operation requests.
Described memory module 340, is configured to store the safeguard rule of described file.
In the embodiment shown in fig. 3, according to the protection process of the mobile phone file of the present invention it is: user The safeguard rule of file is set by application program module 310;Application program module 310 is by described File safeguard rule is sent to security module 330 by interface module 320;Security module 330 is by institute The file safeguard rule stated stores to memory module 340;When the shielded above-mentioned file of user operation, Application program module 310 points out user to carry out fingerprint authentication;After fingerprint authentication passes through, application program mould By interface module 320, block 310 informs that this user of security module 330 is to carry out fingerprint mandate;Safety Module 330 reads the safeguard rule of this document from memory module 340, if rule verification is correct, Then allow this operation, otherwise, refuse this operation.
The guard method of the mobile phone file according to the present invention and protection device can be at polytype handss Realize on machine, such as, operating system based on linux exploitation, the mobile phone etc. of Saipan operating system.
According to the present invention mobile phone file protection method and protection device, can when mobile phone runs, By real-time the arranging or the safeguard rule of amendment file of user application, meet user many-sided Demand.Additionally, for the operation of shielded mobile phone file, the mode carrying out fingerprint comparison enters one Step enhances the safety of mobile phone.Full disk encryption function in conjunction with mobile phone prevents mobile phone by thing further The risk that reason is attacked, it is achieved that duplicate protection when mobile phone runs and shuts down.
It will be appreciated by those skilled in the art that, said apparatus can be realized by various modes.Such as, Said apparatus can be realized by instruction configuration processor.For example, it is possible to instruction is stored in ROM In, and when starting the device, instruction is read from ROM programming device realizes above-mentioned dress Put.For example, it is possible to said apparatus is cured in dedicated devices (such as ASIC).Can be by above-mentioned Device is divided into separate unit, or they are combined realization.Said apparatus can lead to The one crossing above-mentioned various embodiment realizes, or can by two kinds of above-mentioned various embodiments or More combination realizes.For a person skilled in the art, these are all of equal value.
Well known to those skilled in the art, along with the electronic information technology of such as integrated circuit technique Development and the trend of hardware and software, clear and definite dividing system soft and hardware boundary to seem and compare Difficulty.Because any operation can realize with software, it is also possible to is realized by hardware.Any finger The execution of order can be completed by hardware, can also be completed by software equally.For a certain machine function Use hardware implementations still use software implement scheme, depend on price, speed, reliability, The Non-technical factors such as memory capacity, change cycle.Therefore, general for electronic information technical field For logical technical staff, mode the most direct and that a technical scheme is explicitly described is to describe the party Each operation in case.Knowing in the case of operation to be performed, those skilled in the art can Directly to design desired product or device based on to the consideration of described Non-technical factor.
Although some specific embodiments of the present invention being described in detail by example, but It should be appreciated by those skilled in the art, example above is merely to illustrate rather than in order to limit The scope of the present invention processed.It should be appreciated by those skilled in the art, can be without departing from the scope of the present invention In the case of spirit, above example is modified.The scope of the present invention is by claims Limit.

Claims (10)

1. a guard method for mobile phone file, including:
Utilize and the application program of file access authority is set to receive the file safeguard rule of user setup;
File safeguard rule described in acquisition also stores;
When receiving the operation requests for described file, the fingerprint of checking user;And
In the case of the fingerprint of described checking user passes through, it is judged that whether described operation requests meets institute Stating the safeguard rule of file, if met, then allowing described operation requests.
Method the most according to claim 1, wherein, the safeguard rule of described file includes can Read, writeable, can executory at least one.
Method the most according to claim 1, also includes:
The desktop of mobile phone arranges condom icon;
By file drag and drop to described condom icon, described for arranging file access authority to start Application program receives the file safeguard rule of user setup.
Method the most according to claim 1, also includes: deposited by the safeguard rule of described file Storage is in the encryption memory block of mobile phone.
Method the most according to claim 4, also includes: mobile phone is carried out full disk encryption.
6. for a protection device for mobile phone file, including:
User-application module: the application program of file access authority is set to receive use for utilizing The file safeguard rule that family is arranged;
Data obtaining module: for obtaining described file safeguard rule and storing
First security module: for when receiving the operation requests for described file, verify user Fingerprint;
Second security module: in the case of passing through when the fingerprint of described checking user, it is judged that described Whether operation requests meets the safeguard rule of described file, if met, then allows described operation requests.
Device the most according to claim 6, wherein, the safeguard rule of described file includes can Read, writeable, can executory at least one.
Device the most according to claim 6, also includes:
For arranging the module of condom icon on the desktop of mobile phone;
For being used for arranging file access power described in starting by file drag and drop to described condom icon The application program of limit receives the module of the file safeguard rule of user setup.
Device the most according to claim 6, also includes: for the protection of described file being advised Then it is stored in the module of the encryption memory block of mobile phone.
Device the most according to claim 9, also includes: for mobile phone is carried out full disk encryption Module.
CN201610498879.6A 2016-06-29 2016-06-29 Mobile phone file protection method and mobile phone file protection device Pending CN105956493A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610498879.6A CN105956493A (en) 2016-06-29 2016-06-29 Mobile phone file protection method and mobile phone file protection device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610498879.6A CN105956493A (en) 2016-06-29 2016-06-29 Mobile phone file protection method and mobile phone file protection device

Publications (1)

Publication Number Publication Date
CN105956493A true CN105956493A (en) 2016-09-21

Family

ID=56901648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610498879.6A Pending CN105956493A (en) 2016-06-29 2016-06-29 Mobile phone file protection method and mobile phone file protection device

Country Status (1)

Country Link
CN (1) CN105956493A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446653A (en) * 2016-09-30 2017-02-22 北京小米移动软件有限公司 Application authority management method and device and electronic equipment
CN108205630A (en) * 2016-12-20 2018-06-26 中国移动通信有限公司研究院 Resource access method and device based on SeLinux under a kind of multi-user
CN108763892A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN108763884A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN114417426A (en) * 2022-03-29 2022-04-29 北京凝思软件股份有限公司 Trusted verification method and device based on tight coupling rule, storage medium and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239804A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 Data protecting method and device
CN104318171A (en) * 2014-10-09 2015-01-28 中国科学院信息工程研究所 Android privacy data protection method and system based on authority tags
CN104573507A (en) * 2015-02-05 2015-04-29 浪潮电子信息产业股份有限公司 Secure container and design method thereof
CN104680084A (en) * 2015-03-20 2015-06-03 北京瑞星信息技术有限公司 Method and system for protecting user privacy in computer
CN104951708A (en) * 2015-06-11 2015-09-30 浪潮电子信息产业股份有限公司 File measurement and protection method and device
CN105574374A (en) * 2014-10-10 2016-05-11 富泰华工业(深圳)有限公司 System and method for protecting special information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239804A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 Data protecting method and device
CN104318171A (en) * 2014-10-09 2015-01-28 中国科学院信息工程研究所 Android privacy data protection method and system based on authority tags
CN105574374A (en) * 2014-10-10 2016-05-11 富泰华工业(深圳)有限公司 System and method for protecting special information
CN104573507A (en) * 2015-02-05 2015-04-29 浪潮电子信息产业股份有限公司 Secure container and design method thereof
CN104680084A (en) * 2015-03-20 2015-06-03 北京瑞星信息技术有限公司 Method and system for protecting user privacy in computer
CN104951708A (en) * 2015-06-11 2015-09-30 浪潮电子信息产业股份有限公司 File measurement and protection method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446653A (en) * 2016-09-30 2017-02-22 北京小米移动软件有限公司 Application authority management method and device and electronic equipment
CN108205630A (en) * 2016-12-20 2018-06-26 中国移动通信有限公司研究院 Resource access method and device based on SeLinux under a kind of multi-user
CN108763892A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN108763884A (en) * 2018-04-18 2018-11-06 Oppo广东移动通信有限公司 Right management method, device, mobile terminal and storage medium
CN108763884B (en) * 2018-04-18 2022-01-11 Oppo广东移动通信有限公司 Authority management method, device, mobile terminal and storage medium
CN114417426A (en) * 2022-03-29 2022-04-29 北京凝思软件股份有限公司 Trusted verification method and device based on tight coupling rule, storage medium and electronic equipment
CN114417426B (en) * 2022-03-29 2022-07-01 北京凝思软件股份有限公司 Trusted verification method and device based on tight coupling rule, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN110990804B (en) Resource access method, device and equipment
CN105956493A (en) Mobile phone file protection method and mobile phone file protection device
US11386191B2 (en) Trusted hardware-based identity management methods, apparatuses, and devices
US10812477B2 (en) Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
TW202116040A (en) Block chain-based creation method, apparatus, device and system for verifiable claim
CN113542288B (en) Service authorization method, device, equipment and system
CN108108611B (en) A kind of intelligent seal carrying intelligent chip
US20180285578A1 (en) Temporally isolating data accessed by a computing device
CN111814195B (en) Data management method, device and equipment based on trusted hardware
EP3014511A1 (en) Process authentication and resource permissions
CN107622203A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN110990820B (en) Tax disk authorization method and device, electronic equipment and storage medium
US20090119772A1 (en) Secure file access
CN108964925A (en) A kind of document authentication device, method, device, equipment and readable medium
CN106022039A (en) Secure storage system and storage method of electronic information
Marsh et al. Defining and investigating device comfort
AU2012266675A1 (en) Access control to data stored in a cloud
CN105701420A (en) Method for managing user data and terminal
CN112560110A (en) Signing method and device of authorization protocol, electronic equipment and storage medium
CN115185605A (en) Service execution method, device, storage medium and electronic equipment
CN113704826A (en) Privacy protection-based business risk detection method, device and equipment
CN114244598B (en) Intranet data access control method, device, equipment and storage medium
CN109377611A (en) Caller management method, system, computer equipment and storage medium based on bio-identification
CN113221142A (en) Authorization service processing method, device, equipment and system
CN116415217A (en) Instant authorization system based on zero trust architecture

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160921