CN106127071B - File access protection method and system based on mobile terminal and mobile terminal - Google Patents
File access protection method and system based on mobile terminal and mobile terminal Download PDFInfo
- Publication number
- CN106127071B CN106127071B CN201610456297.1A CN201610456297A CN106127071B CN 106127071 B CN106127071 B CN 106127071B CN 201610456297 A CN201610456297 A CN 201610456297A CN 106127071 B CN106127071 B CN 106127071B
- Authority
- CN
- China
- Prior art keywords
- file
- mobile terminal
- locked
- locking
- current
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a file access protection method, a system and a mobile terminal based on the mobile terminal, wherein the method specifically comprises the following steps: the mobile terminal sets a locking mark for a stored file in advance; when a mobile terminal receives a command of opening a file, acquiring a locking mark of the current file, and judging whether the current file is locked; if the file is locked, executing a preset file protection process; otherwise, the file is opened normally. The invention marks the file to be locked on the kernel layer of the mobile terminal in advance, and verifies whether the file has the locking mark when the command for accessing the file reaches the kernel layer. If so, access is denied; similarly, after the file is unlocked, the mark originally stored in the file system after being locked is deleted, and the file is restored to the state of the ordinary file, so that the mobile terminal is added with a new file access protection method which is quick and saves the memory resources, and great convenience is brought to the user.
Description
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a file access protection method and system based on a mobile terminal and the mobile terminal.
Background
With the rapid development of mobile internet technology, mobile terminals have entered an intelligent era, such as: smart phones, tablet computers, and the like; people increasingly utilize intelligent mobile terminals for mobile office, mobile e-commerce, mobile payment, mobile entertainment and the like; obviously, more and more personal private information is carried on the intelligent mobile terminal, including financial related programs, private photos, various private files and the like. The smart phone is one of the devices with the most stored personal privacy, and if a user carelessly loses the smart phone and does not have a safety protection measure, information in the smart phone is easily stolen by others. The loss of personal property and social reputation is caused to affect the order of family life, and the illegal stealing of secrets in the government of companies and institutions is caused to cause great loss.
It will thus be seen that improvements and developments in the art are needed.
Disclosure of Invention
The present invention is directed to a method, a system and a mobile terminal for protecting file access based on a mobile terminal, which aim to mark a file to be locked on a kernel layer of the mobile terminal in advance, and verify whether the file has a locking mark when a command for accessing the file reaches the kernel layer. If so, access is denied; similarly, after the file is unlocked, the mark originally stored in the file system after being locked is deleted, and the file is restored to the state of the ordinary file, so that the mobile terminal is added with a new file access protection method which is quick and saves the memory resources, and great convenience is brought to users.
The technical scheme adopted by the invention for solving the technical problem is as follows:
a file access protection method based on a mobile terminal comprises the following steps:
s1, the mobile terminal sets a locking mark for the stored file in advance;
s2, when the mobile terminal receives a command of opening a file, acquiring a locking mark of the current file, and judging whether the current file is locked;
s3, if the file is locked, executing a preset file protection process; otherwise, the file is opened normally.
The file access protection method based on the mobile terminal, wherein the step S1 is preceded by the steps of:
s0, setting and storing a file and attribute information corresponding to the file in the mobile terminal in advance, where the attribute information includes: a file name, a file storage path, and a lock flag for the file, the lock flag comprising: locking, and unlocking.
The file access protection method based on the mobile terminal, wherein the step S1 specifically includes the steps of:
s11, starting the mobile terminal, and starting a Daemon process for locking/unlocking the file;
s12, when the mobile terminal starts an application program, the application program establishes connection with the Daemon process;
s13, the application program sends files needing to be locked/unlocked and attribute information corresponding to the files to a Daemon process;
s14, calling a mobile terminal kernel layer interface by the Daemon process, and sending the received file and the attribute information corresponding to the file to the mobile terminal kernel layer;
and S15, the mobile terminal kernel layer performs locking setting or unlocking null setting operation on the corresponding node attribute flag bit in the file system where the file is located.
The file access protection method based on the mobile terminal, wherein the step S2 specifically includes the steps of:
s21, the mobile terminal receives a command of opening a file by an application program;
s22, the command reaches a mobile terminal kernel layer, and the mobile terminal kernel layer searches a node attribute zone bit of the current file according to the current file path and the file name;
and S23, judging whether the current file is locked or not according to the node attribute zone bit.
The file access protection method based on the mobile terminal, wherein the step S3 specifically includes the steps of:
s31, if the node attribute flag bit of the current file is detected to be set, interrupting a file opening command, and displaying a message that the current file is locked on a screen of the mobile terminal through a push mechanism;
and S32, if the node attribute flag bit of the current file is detected to be null, normally opening the file.
A file access protection system based on a mobile terminal, comprising:
a file information pre-storing module, configured to set and store a file and attribute information corresponding to the file in the mobile terminal in advance, where the attribute information includes: a file name, a file storage path, and a lock flag for the file, the lock flag comprising: locking and unlocking;
the pre-locking module is used for setting a locking mark for a stored file in advance by the mobile terminal;
the locking judging module is used for acquiring a locking mark of the current file and judging whether the current file is locked or not when the mobile terminal receives a command of opening the file;
the file protection module is used for executing a preset file protection process if the file is locked; otherwise, the file is opened normally.
The file access protection system based on the mobile terminal, wherein the pre-locking module specifically includes:
the Daemon process starting unit is used for starting the mobile terminal and simultaneously starting a Daemon process for locking/unlocking the file;
the connection establishing unit is used for establishing connection between the application program and the Daemon process when the mobile terminal starts a certain application program;
the file information first sending unit is used for sending a file needing to be locked/unlocked and attribute information corresponding to the file to a Daemon process by the application program;
the second file information sending unit is used for calling a mobile terminal kernel layer interface by the Daemon process and sending the received file and the attribute information corresponding to the file to the mobile terminal kernel layer;
and the setting/blanking unit is used for the mobile terminal kernel layer to lock, set or unlock the blanking operation of the corresponding node attribute flag bit in the file system where the file is located.
The file access protection system based on the mobile terminal, wherein the locking determination module specifically includes:
the file opening command unit is used for receiving a command of opening a file by an application program by the mobile terminal;
the flag bit searching unit is used for enabling the command to reach a mobile terminal kernel layer, and the mobile terminal kernel layer searches the node attribute flag bit of the current file according to the current file path and the file name;
and the file locking judging unit is used for judging whether the current file is locked or not according to the node attribute zone bit.
The file access protection system based on the mobile terminal, wherein the file protection module specifically includes:
the file opening interruption unit is used for interrupting a file opening command and displaying a message that the current file is locked on a screen of the mobile terminal through a push mechanism if the node attribute flag bit of the current file is set;
and the file normal opening unit is used for normally opening the file if the node attribute flag bit of the current file is detected to be null.
A mobile terminal comprising a mobile terminal based file access protection system according to any of the preceding claims.
The invention provides a file access protection method, a system and a mobile terminal based on the mobile terminal, wherein the method specifically comprises the following steps: the mobile terminal sets a locking mark for a stored file in advance; when a mobile terminal receives a command of opening a file, acquiring a locking mark of the current file, and judging whether the current file is locked; if the file is locked, executing a preset file protection process; otherwise, the file is opened normally. The invention marks the file to be locked on the kernel layer of the mobile terminal in advance, and verifies whether the file has the locking mark when the command for accessing the file reaches the kernel layer. If so, access is denied; similarly, after the file is unlocked, the mark originally stored in the file system after being locked is deleted, and the file is restored to the state of the ordinary file, so that the mobile terminal is added with a new file access protection method which is quick and saves the memory resources, and great convenience is brought to the user.
Drawings
Fig. 1 is a flow chart of a preferred embodiment of the file access protection method based on a mobile terminal according to the invention.
Fig. 2 is a schematic diagram of a file locking/unlocking process of a file access protection method based on a mobile terminal according to the present invention.
Fig. 3 is a flowchart of an application embodiment of the file access protection method based on the mobile terminal according to the present invention.
Fig. 4 is a functional block diagram of a preferred embodiment of the file access protection system based on a mobile terminal according to the present invention.
Detailed Description
The invention discloses a file access protection method and system based on a mobile terminal and the mobile terminal, and in order to make the purpose, technical scheme and advantages of the invention clearer and more clear, the invention is further described in detail below by referring to the attached drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a file access protection method based on a mobile terminal according to a preferred embodiment of the present invention. The file access protection method based on the mobile terminal shown in fig. 1 includes:
step S101, the mobile terminal sets a locking mark for the stored file in advance.
In the embodiment of the present invention, a file and attribute information corresponding to the file need to be set and stored in the mobile terminal in advance, where the attribute information includes: a file name, a file storage path, and a lock flag for the file, the lock flag comprising: locking, and unlocking.
Further, the step S101 specifically includes:
s11, starting the mobile terminal, and starting a Daemon process for locking/unlocking the file;
s12, when the mobile terminal starts an application program, the application program establishes connection with the Daemon process;
s13, the application program sends files needing to be locked/unlocked and attribute information corresponding to the files to a Daemon process;
s14, calling a mobile terminal kernel layer interface by the Daemon process, and sending the received file and the attribute information corresponding to the file to the mobile terminal kernel layer;
and S15, the mobile terminal kernel layer performs locking setting or unlocking null setting operation on the corresponding node attribute flag bit in the file system where the file is located.
Taking the mobile phone of android as an example, the user file is generally established on sdcard. When accessing the file, the bottom layer, namely the linux kernel layer, is needed to open the node of the file system where the file is located, then the flag bit of the file is verified, whether the user has the right of being able to read and write is judged, and if so, the operations of reading and writing and the like can be further performed. Based on the method, the files required to be locked by the user are directly marked on the kernel layer, and the marked result is stored in the file system. After the setup is completed, when the command to access the file reaches the kernel level, we verify that the file has the lock flag. If so, access is denied. Similarly, after the file is unlocked, the mark originally stored in the file system after being locked is deleted, and the file is restored to the state of the ordinary file.
The flow of setting file locking/unlocking according to the embodiment of the present invention is shown in fig. 2. Firstly, when the mobile phone is started, a Daemon process is started, the Daemon process is mainly responsible for managing the locking and unlocking states of files, and can receive commands of application programs and interact with a kernel layer. When the file is required to be locked/unlocked, the user operates the application program and issues a locking/unlocking command. The application will establish a connection with the previously started Daemon in a socket or any other inter-process communication manner. After the connection is successfully established, the application program sends a file path, a file name and a locking command which need to be locked/unlocked to Daemon for further processing. Meanwhile, the application program can also ask Daemon for the state of the current file, whether the current file is in a locked or unlocked state.
And step S102, when the mobile terminal receives a command of opening the file, acquiring a locking mark of the current file, and judging whether the current file is locked.
Further, the step S102 specifically includes:
s21, the mobile terminal receives a command of opening a file by an application program;
s22, the command reaches a mobile terminal kernel layer, and the mobile terminal kernel layer searches a node attribute zone bit of the current file according to the current file path and the file name;
and S23, judging whether the current file is locked or not according to the node attribute zone bit.
That is, after receiving the application command, Daemon calls an interface of the kernel layer, and the interface can be completed by using a standard interface provided by the kernel or added by a developer. And transmitting a file name and a path to the kernel through the interface, and locking, unlocking and acquiring the locking state of the file. Thereafter, logical processing at the kernel layer is triggered. Setting or clearing (locking setting and unlocking null) the corresponding node attribute flag bit of the file in the file system to which the file belongs. This attribute may use existing flags provided by the file system or may be added by the developer himself. If the upper layer issues the query status command, the flag bit information is returned.
Step S103, if the file is locked, executing a preset file protection process; otherwise, the file is opened normally.
Further, the step S103 specifically includes:
s31, if the node attribute flag bit of the current file is detected to be set, interrupting a file opening command, and displaying a message that the current file is locked on a screen of the mobile terminal through a push mechanism;
and S32, if the node attribute flag bit of the current file is detected to be null, normally opening the file.
That is, after the file lock is successfully set, if the user needs to access the locked file, the process of authority verification is triggered, which specifically includes: if the flag bit is not set, the file is unlocked, and only the ordinary file is used, the processing is continued according to the flow of the ordinary file; if the setting is found, the file is locked, the next operation is interrupted, an error code without access authority is returned, and meanwhile, the driving layer reports the event to a frame layer of the android mobile phone, wherein the event comprises information such as a file name, a path, a locking state and the like; a certain service at the frame layer needs to listen to events of this type of file lock at all times. Once the event is received, the fact that the file is locked needs to be reported to the user interface by using the notification mechanism (message pushing mechanism) of the mobile phone.
The invention will be further illustrated by the following specific application examples. Fig. 3 is a schematic diagram of an application embodiment of the file access protection method based on the mobile terminal of the present invention. As shown in fig. 3, includes:
s301, opening a file by an application program; for example, a user needs to open a photo through a picture browser;
s302, executing an open command driven by a file system; firstly, an image browser image browsing program must open the file through an open command, and after the open command reaches a kernel, an open method of a kernel layer is triggered;
s303, detecting a flag bit of file locking;
s304, judging whether the file is locked or not; if yes, go to step S306, otherwise, go to step S305;
s305, if the file is detected to be unlocked, continuing to operate as a common file, and entering the step S309; that is, if the flag bit is not set, it indicates that the file is not locked, and only the ordinary file is used, the flow processing according to the ordinary file is continued;
s306, if the file is detected to be locked, the operation is abandoned, and a notice without permission is returned; that is, if the set is found, indicating that the file is locked, then the command to open the file is interrupted;
s307, reporting the notification that the file is locked; the mobile phone driver layer reports the event to the frame layer, wherein the event comprises information such as a file name, a path, a locking state and the like;
s308, pushing the locked file message and informing the user;
and S309, finishing the operation.
The embodiment of the invention is to prevent a user from reading and writing a locked file and take file access protection measures, if the file needs to be protected from being deleted maliciously, the basic flow is consistent with the flow shown in fig. 3, only in a kernel layer, a mark for file locking needs to be verified in a mobile phone unlink method, and the rest is the same as the logic in the reading and writing flow, and is not repeated.
Therefore, compared with the traditional file secrecy cabinet, the file secrecy cabinet has the following advantages:
(1) no extra storage space is occupied;
(2) a large amount of time necessary for encryption/decryption is saved;
(3) the position of the original file is not required to be changed;
(4) the file folder may be locked.
Based on the foregoing embodiment, the present invention further provides a file access protection system based on a mobile terminal, as shown in fig. 4, including:
a file information pre-storing module 100, configured to set and store a file and attribute information corresponding to the file in the mobile terminal in advance, where the attribute information includes: a file name, a file storage path, and a lock flag for the file, the lock flag comprising: locking and unlocking; as described above.
A pre-locking module 200, configured to set a locking flag for a stored file in advance by a mobile terminal; as described above.
A locking determination module 300, configured to, when the mobile terminal receives a command to open a file, obtain a locking flag of the current file, and determine whether the current file is locked; as described above.
A file protection module 400, configured to execute a preset file protection procedure if the file is locked; otherwise, opening the file normally; as described above.
Further, the pre-locking module 200 specifically includes:
the Daemon process starting unit is used for starting the mobile terminal and simultaneously starting a Daemon process for locking/unlocking the file; as described above.
The connection establishing unit is used for establishing connection between the application program and the Daemon process when the mobile terminal starts a certain application program; as described above.
The file information first sending unit is used for sending a file needing to be locked/unlocked and attribute information corresponding to the file to a Daemon process by the application program; as described above.
The second file information sending unit is used for calling a mobile terminal kernel layer interface by the Daemon process and sending the received file and the attribute information corresponding to the file to the mobile terminal kernel layer; as described above.
The setting/blanking unit is used for the mobile terminal kernel layer to lock, set or unlock the blanking operation of the corresponding node attribute flag bit in the file system where the file is located; as described above.
Further, the locking determination module 300 specifically includes:
the file opening command unit is used for receiving a command of opening a file by an application program by the mobile terminal; as described above.
The flag bit searching unit is used for enabling the command to reach a mobile terminal kernel layer, and the mobile terminal kernel layer searches the node attribute flag bit of the current file according to the current file path and the file name; as described above.
The file locking judging unit is used for judging whether the current file is locked or not according to the node attribute flag bit; as described above.
The descending updating unit is used for updating the face information of the user and the keywords of the user service demand in a descending order according to the matching success times according to a preset period; as described above.
Further, the file protection module 400 specifically includes:
the file opening interruption unit is used for interrupting a file opening command and displaying a message that the current file is locked on a screen of the mobile terminal through a push mechanism if the node attribute flag bit of the current file is set; as described above.
The file normal opening unit is used for normally opening the file if the node attribute flag bit of the current file is detected to be null; as described above.
Further, the present invention provides an embodiment of a mobile terminal, where the mobile terminal in this embodiment includes the above-mentioned file access protection system based on a mobile terminal.
In summary, the file access protection method, system and mobile terminal provided by the present invention include: the mobile terminal sets a locking mark for a stored file in advance; when a mobile terminal receives a command of opening a file, acquiring a locking mark of the current file, and judging whether the current file is locked; if the file is locked, executing a preset file protection process; otherwise, the file is opened normally. The invention marks the file to be locked on the kernel layer of the mobile terminal in advance, and verifies whether the file has the locking mark when the command for accessing the file reaches the kernel layer. If so, access is denied; similarly, after the file is unlocked, the mark originally stored in the file system after being locked is deleted, and the file is restored to the state of the ordinary file, so that the mobile terminal is added with a new file access protection method which is quick and saves the memory resources, and great convenience is brought to the user.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.
Claims (7)
1. A file access protection method based on a mobile terminal is characterized by comprising the following steps:
s1, the mobile terminal sets a locking mark for the stored file in advance;
s2, when the mobile terminal receives a command of opening the file, acquiring a locking mark of the current file, and judging whether the current file is locked;
s3, if the file is locked, executing a preset file protection process; otherwise, opening the file normally;
the step S1 is preceded by the steps of:
s0, setting and storing a file and attribute information corresponding to the file in the mobile terminal in advance, where the attribute information includes: a file name, a file storage path, and a lock flag for the file, the lock flag comprising: locking and unlocking;
the step S1 specifically includes the steps of:
s11, starting the mobile terminal, and starting a Daemon process for locking/unlocking the file;
s12, when the mobile terminal starts an application program, the application program establishes connection with the Daemon process;
s13, the application program sends files needing to be locked/unlocked and attribute information corresponding to the files to a Daemon process;
s14, calling a mobile terminal kernel layer interface by the Daemon process, and sending the received file and the attribute information corresponding to the file to the mobile terminal kernel layer;
and S15, the mobile terminal kernel layer performs locking setting or unlocking null setting operation on the corresponding node attribute flag bit in the file system where the file is located.
2. The method for protecting file access based on a mobile terminal according to claim 1, wherein the step S2 specifically includes the steps of:
s21, the mobile terminal receives a command of opening a file by an application program;
s22, the command reaches a mobile terminal kernel layer, and the mobile terminal kernel layer searches a node attribute zone bit of the current file according to the current file path and the file name;
and S23, judging whether the current file is locked or not according to the node attribute zone bit.
3. The method for protecting file access based on a mobile terminal according to claim 2, wherein the step S3 specifically includes the steps of:
s31, if the node attribute flag bit of the current file is detected to be set, interrupting a file opening command, and displaying a message that the current file is locked on a screen of the mobile terminal through a push mechanism;
and S32, if the node attribute flag bit of the current file is detected to be null, normally opening the file.
4. A file access protection system based on a mobile terminal is characterized by comprising:
a file information pre-storing module, configured to set and store a file and attribute information corresponding to the file in the mobile terminal in advance, where the attribute information includes: a file name, a file storage path, and a lock flag for the file, the lock flag comprising: locking and unlocking;
the pre-locking module is used for setting a locking mark for a stored file in advance by the mobile terminal;
the locking judging module is used for acquiring a locking mark of a current file and judging whether the current file is locked or not when the mobile terminal receives a command of opening the file;
the file protection module is used for executing a preset file protection process if the file is locked; otherwise, opening the file normally;
the pre-locking module specifically comprises:
the Daemon process starting unit is used for starting the mobile terminal and simultaneously starting a Daemon process for locking/unlocking the file;
the connection establishing unit is used for establishing connection between the application program and the Daemon process when the mobile terminal starts a certain application program;
the file information first sending unit is used for sending a file needing to be locked/unlocked and attribute information corresponding to the file to a Daemon process by the application program;
the second file information sending unit is used for calling a mobile terminal kernel layer interface by the Daemon process and sending the received file and the attribute information corresponding to the file to the mobile terminal kernel layer;
and the setting/blanking unit is used for the mobile terminal kernel layer to lock, set or unlock the blanking operation of the corresponding node attribute flag bit in the file system where the file is located.
5. The system for protecting file access based on a mobile terminal according to claim 4, wherein the lock determination module specifically comprises:
the file opening command unit is used for receiving a command of opening a file by an application program by the mobile terminal;
the flag bit searching unit is used for enabling the command to reach a mobile terminal kernel layer, and the mobile terminal kernel layer searches the node attribute flag bit of the current file according to the current file path and the file name;
and the file locking judging unit is used for judging whether the current file is locked or not according to the node attribute zone bit.
6. The system for protecting file access based on a mobile terminal according to claim 5, wherein the file protection module specifically comprises:
the file opening interruption unit is used for interrupting a file opening command and displaying a message that the current file is locked on a screen of the mobile terminal through a push mechanism if the node attribute flag bit of the current file is set;
and the file normal opening unit is used for normally opening the file if the node attribute flag bit of the current file is detected to be null.
7. A mobile terminal, characterized in that it comprises a mobile terminal based file access protection system according to any of claims 5 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610456297.1A CN106127071B (en) | 2016-06-22 | 2016-06-22 | File access protection method and system based on mobile terminal and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610456297.1A CN106127071B (en) | 2016-06-22 | 2016-06-22 | File access protection method and system based on mobile terminal and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106127071A CN106127071A (en) | 2016-11-16 |
CN106127071B true CN106127071B (en) | 2020-03-06 |
Family
ID=57269279
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610456297.1A Active CN106127071B (en) | 2016-06-22 | 2016-06-22 | File access protection method and system based on mobile terminal and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127071B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106874783A (en) * | 2016-12-21 | 2017-06-20 | 捷开通讯(深圳)有限公司 | A kind of file management method and mobile terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1690910A (en) * | 2004-04-23 | 2005-11-02 | 微软公司 | Fire locker and mechanisms for providing and using same |
CN101673269A (en) * | 2008-09-11 | 2010-03-17 | 同方威视技术股份有限公司 | Image file locking method and image file maintenance method |
CN103514298A (en) * | 2013-10-16 | 2014-01-15 | 浪潮(北京)电子信息产业有限公司 | Method for achieving file lock and metadata server |
-
2016
- 2016-06-22 CN CN201610456297.1A patent/CN106127071B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1690910A (en) * | 2004-04-23 | 2005-11-02 | 微软公司 | Fire locker and mechanisms for providing and using same |
CN101673269A (en) * | 2008-09-11 | 2010-03-17 | 同方威视技术股份有限公司 | Image file locking method and image file maintenance method |
CN103514298A (en) * | 2013-10-16 | 2014-01-15 | 浪潮(北京)电子信息产业有限公司 | Method for achieving file lock and metadata server |
Also Published As
Publication number | Publication date |
---|---|
CN106127071A (en) | 2016-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8126506B2 (en) | System and method for securely managing data stored on mobile devices, such as enterprise mobility data | |
CN106534148B (en) | Access control method and device for application | |
US20190334721A1 (en) | Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal | |
WO2016101384A1 (en) | Dual-system switch based data security processing method and apparatus | |
US20070021103A1 (en) | Method of protecting information in a mobile communication device | |
CN103108074A (en) | Apparatus and method for securing mobile terminal | |
US20060186199A1 (en) | Apparatus for authorising access to an electronic device | |
CN103023649A (en) | Method, device and equipment for protecting privacy information | |
KR20050079128A (en) | Usage restriction setting method for mobile communication device | |
CN106599115B (en) | Data protection method, device and terminal | |
EP2840818B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
US7975309B2 (en) | Systems and methods for securing data in an electronic apparatus | |
US9491627B2 (en) | Recovering data in a storage medium of an electronic device that has been tampered with | |
KR101087698B1 (en) | Method for authenticating security of smart-phone | |
CN101895829A (en) | Method and system for retrieving FLASH data from mobile telephone, and mobile telephone | |
CN106127071B (en) | File access protection method and system based on mobile terminal and mobile terminal | |
CN105516500A (en) | Method and system for selecting equipment mode | |
CN106453057B (en) | A kind of method and terminal for preventing short message to be stolen | |
CN107154999B (en) | Terminal and unlocking method and storage device based on environmental information | |
CN106570420B (en) | Secret code-based intelligent equipment privacy protection implementation method and system | |
CN106022162B (en) | A kind of private information guard method and system suitable for communication terminal | |
CN115438374A (en) | Data reading method, device, equipment, system and medium in storage equipment | |
CN103052060A (en) | Method for improving information security of mobile terminal and mobile terminal | |
US8539563B2 (en) | Non-obtrusive security system for devices | |
CN107403114B (en) | Input locking structure and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |