CN106339332B - A kind of information processing method, device and terminal - Google Patents
A kind of information processing method, device and terminal Download PDFInfo
- Publication number
- CN106339332B CN106339332B CN201610710746.0A CN201610710746A CN106339332B CN 106339332 B CN106339332 B CN 106339332B CN 201610710746 A CN201610710746 A CN 201610710746A CN 106339332 B CN106339332 B CN 106339332B
- Authority
- CN
- China
- Prior art keywords
- information
- application program
- target
- storage
- security classification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1491—Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of information processing method, device and terminals;This method is by obtaining information store instruction, the target information that information store instruction instruction needs to store, then, it is determined that application program belonging to target information, and the corresponding security classification of the application program is obtained, then will be in target information storage to memory block corresponding with security classification;The program can the security classification based on application program by its corresponding information storage to corresponding memory block, in terms of existing technologies, improve the safety of information storage.
Description
Technical field
The present invention relates to field of terminal technology more particularly to a kind of information processing methods, device and terminal.
Background technique
With the development of internet with the development of mobile communications network, while also along with the processing capacity of terminal and storage
The fast development of ability, the application program of magnanimity have obtained rapid propagation and use;Common application program is facilitating user's work
While making and live, it is no lack of the daily life that application program newly developed also enters user, improves the life matter of user
Amount, the frequency of using terminal and the amusement sense in use.
Currently, there are the safety problems of information leakage for terminal.It in the prior art, is usually to establish dual system (including routine
System and security system) Lai Tisheng terminal, network and application aspect security capabilities.However, for being related to user privacy information
Or the application (such as contact person, short message and notepad) of important information, dual system can access these applications pair in existing scheme
The information answered, but for a user, the partial information under conventional system is equivalent to the copy of certain information in security system.Though
Information security in right security system ensured, once it is present in however, inbreaking of Trojan horse common system steals data information
Corresponding data information is also just leaked in security system.
It is found that the safety of information storage is poor in the prior art.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method, device and terminal, and the safety of information storage can be improved.
The embodiment of the present invention provides a kind of information processing method, comprising:
Obtain information store instruction, the target information that the information store instruction instruction needs to store;
Determine application program belonging to the target information;
Obtain the corresponding security classification of the application program;
It will be in target information storage to memory block corresponding with the security classification.
Correspondingly, the embodiment of the invention provides a kind of information processing units, comprising:
Instruction acquisition module, for obtaining information store instruction, the target that the information store instruction instruction needs to store
Information;
First determining module, for determining application program belonging to the target information;
First level obtains module, for obtaining the corresponding security classification of the application program;
Memory module, for arriving target information storage in memory block corresponding with the security classification.
Correspondingly, the embodiment of the invention provides a kind of terminal, the terminal includes memory, and with the memory
The information processing unit of connection, wherein the information processing unit includes:
Instruction acquisition module, for obtaining information store instruction, the target that the information store instruction instruction needs to store
Information;
First determining module, for determining application program belonging to the target information;
First level obtains module, for obtaining the corresponding security classification of the application program;
Memory module, for arriving target information storage in memory block corresponding with the security classification.
The embodiment of the present invention is by obtaining information store instruction, the target letter that information store instruction instruction needs to store
Breath, then, it is determined that application program belonging to target information, and the corresponding security classification of the application program is obtained, then target is believed
In breath storage to memory block corresponding with security classification;The program can the security classification based on application program by its corresponding letter
In breath storage to corresponding memory block, in terms of existing technologies, the safety of information storage is improved.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow diagram for the information processing method that the embodiment of the present invention one provides;
Fig. 2 is the flow diagram of information processing method provided by Embodiment 2 of the present invention;
Fig. 3 is the structural schematic diagram for the first information processing unit that the embodiment of the present invention three provides;
Fig. 4 is the structural schematic diagram for second of information processing unit that the embodiment of the present invention three provides;
Fig. 5 is the structural schematic diagram for the third information processing unit that the embodiment of the present invention three provides;
Fig. 6 is the structural schematic diagram for the 4th kind of information processing unit that the embodiment of the present invention three provides;
Fig. 7 is the structural schematic diagram for the 5th kind of information processing unit that the embodiment of the present invention three provides;
Fig. 8 is the structural schematic diagram for the terminal that the embodiment of the present invention four provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of information processing method, device and terminal.It will be described in detail respectively below.
Embodiment one,
The present embodiment will be described from the angle of information processing unit, which specifically can integrate at end
In end, which can be the equipment such as smart phone, tablet computer.
A kind of information processing method, comprising: obtain information store instruction, the mesh that information store instruction instruction needs to store
Mark information;Determine application program belonging to target information;Obtain the corresponding security classification of the application program;Target information is stored
Into memory block corresponding with security classification.
As shown in Figure 1, information processing method, detailed process be can be such that
101, information store instruction, the target information that information store instruction instruction needs to store are obtained.
Specifically, which can be voluntarily is triggered by terminal, is also possible to grasp terminal by user
It triggers;For example, user inputs memo information in " memorandum ", button control " completion " is then clicked by touch screen, with
Information store instruction is triggered, further stores the memo information of input.
Wherein, target information can be text information, audio and video information etc., be not especially limited to this.
102, application program belonging to target information is determined.
Specifically, terminal can determine that the source for initiating the information store instruction is answered after getting information store instruction
With program, application program belonging to target letter is determined according to source application, for example, can by the source application directly as
Application program belonging to the target information;That is, step " determining application program belonging to target information " detailed process is as follows:
Determine the source application for initiating the information store instruction;
Application program belonging to target letter is determined according to source application.
103, the corresponding security classification of the application program is obtained.
Specifically, the corresponding guarantor of the application program can be obtained by the mapping relations between application program and security classification
Level of confidentiality is other;That is, step " obtaining the corresponding security classification of the application program " is specifically as follows:
It determines in default set of applications with the presence or absence of the default application program with the application matches;
If it exists, then the corresponding default security rank of application program is preset with this according to presetting mapping relations and obtain;
Using default security rank as the corresponding security classification of the application program.
For example, correspond to level-one secrecy using A, correspond to second level secrecy using B and using C, correspond to three-level secrecy using D etc.
Deng if the application program is using B, it is determined that the security classification of the application program is second level secrecy.
In the specific implementation process, need in advance in terminal application setting security classification, with establish application program with
Mapping relations between security classification;That is, this method can also include: before obtaining information store instruction
It is that security classification is arranged in the application program according to the corresponding attribute information of application program;
Corresponding memory block is distributed for the security classification.
Specifically, the corresponding attribute information of application program can be title, the unique identification, classification, downloading of application program
The information such as address, detailed description, developer.By taking the attribute information is the classification information of application program as an example, it is assumed that applying A is gold
Melt class, be social category using B, be social category using C, using D be information class, then terminal can will be set as level-one guarantor using A
It is close, will using B and using C be set as second level secrecy, will using D be set as three-level secrecy.Wherein, highest security classification is one
Grade, second level are taken second place, and the about big expression rank of number is lower, and so on.It is of course also possible to which level-one secrecy is set as minimum confidential
Not, the bigger expression rank of number is higher.
In the specific implementation process, the memory space of terminal need to be divided, different security classifications is set specific
Kept secure space can be stored in specific kept secure space according to the relevant information of the higher application program of security classification
In, the relevant information of the lower application program of security classification is stored in conventional memory space.Wherein, kept secure space is set
It is equipped with specific access rule.
In addition, some embodiments wherein, the security classification of application program can also be by user according to actual needs
It is set, for example, level-one secrecy can will be set as using D.
It 104, will be in target information storage to memory block corresponding with security classification.
Specifically, target information can be stored to corresponding according to the corresponding relationship between security classification and memory block
In memory block;That is, step " by target information storage to memory block corresponding with security classification " can specifically include:
The corresponding memory block of security classification is determined according to default corresponding relationship;
Determine store path;
Target information is stored according to the store path, it will be in target information to the memory block.
For example, level-one secrecy is set as highest security classification, level-one secrecy corresponds to by taking Android (Android) system as an example
Memory block A, second level, which maintain secrecy, corresponds to memory block B, and three-level, which maintains secrecy, corresponds to memory block C.If target application information is pictorial information, the figure
Piece information owning application is using B, and the security classification of acquisition is second level secrecy, then terminal, which can determine, needs to believe target
Memory block B is arrived in breath storage.If memory block B be stored in terminal inner, available store path are as follows: it is local storage inside
Memory block B using B image.Then, terminal can then store target information according to the store path.
At application program access storage areas, in order to improve the safety of application message, need that visit can be set to memory block
It asks rule, forbids accessing for example, can be, other application is forbidden to access, or can only read and cannot be written.
In the specific implementation process, its access authority to target storage can be set for different application;?
That is, this method can also include: after in by target information storage to memory block corresponding with security classification
Receive formation access requests, the target storage that formation access requests instruction needs to access;
Determine the initiation application program for initiating formation access requests;
Judge to initiate whether application program meets default access conditions;
If satisfied, then being accessed according to formation access requests to the information in target storage.
Wherein, step " judging to initiate whether application program meets default access conditions " is specifically as follows: judgement is initiated to answer
Whether there is the access authority to target storage with program.In the specific implementation process, can will will have to target in advance
The application identities of the application program of the access authority of memory block are added in sample identification set, based in the sample identification set
Sample identification determine initiate application program whether meet default access conditions;That is, step " judges whether initiate application program
The default access conditions of satisfaction " detailed process can be such that
Judge in sample identification set with the presence or absence of the matched sample identification of application identities with initiation application program;
If it exists, then determine that the initiation application program meets default access conditions.
In some embodiments, in order to further increase the safety of information, it is alternatively possible to be arranged with access right
The application program of limit can access to the memory block of lower security classification, and the memory block of higher security classification is then set
It is set to and haves no right to access;That is, after determining that initiating application program meets default access conditions, according to formation access requests to mesh
Before information in mark memory block accesses, this method can also include:
Obtain the corresponding security classification in target storage;
Judge whether the corresponding security classification in target storage is lower than default security rank;
If so, executing the step of accessing according to formation access requests to the information in target storage.
Wherein, default security rank can be arranged by those skilled in the art, can also be configured by terminal manufacturer.
For example, the default security rank specifically can be set to second level, that is, if target is deposited so that minimum security classification is level-one as an example
The corresponding security classification of storage area is level-one (i.e. target storage is conventional memory space), then the application program for meeting condition all may be used
To access to the information in target storage.
It is another it is alternatively possible to initiate application program have the access authority to target storage in the case where, into one
Step ground verifying authentication information;Namely after determining that initiating application program meets default access conditions, according to formation access requests
Before accessing to the information in target storage, this method can also include:
Obtain the authentication information of user's input;
Authentication information is verified;
If being verified, the step of accessing according to formation access requests to the information in target storage is executed.
Wherein, authentication information specifically can be finger print information, encrypted message or identifying code etc., not limit specifically this
It is fixed.
For example, can trigger and be shown in terminal display screen after determining that initiating application program meets default access conditions
" whether allowing application access memory block B information " shown, user then can choose "Yes" or "No".If user selects "Yes", into one
Step ground can show printed words such as " please input access password " in display screen, prompt the access password of user input storage B, such as
The access password can be " 1234 ".
In some embodiments, the network state of terminal can also be limited, to further increase information security
Property.For example, network can be closed when storing information, lead to letter by interceptions such as wooden horse processes in storing process to avoid information
Breath is to outward leakage.Judge that the type of application program, the first kind are to need using wireless network, data network according to Apply Names
Application program, the second class be without using wireless network, data network application program.When target information owning application
When for without networking, wireless network or data network can be automatically closed in terminal, guarantee that information is deposited to a certain extent
It is not leaked when storage.
From the foregoing, it will be observed that the embodiment of the invention provides a kind of information processing method, by obtaining information store instruction, the letter
The target information that breath store instruction instruction needs to store, then, it is determined that application program belonging to target information, and obtain the application
The corresponding security classification of program, then will be in target information storage to memory block corresponding with security classification;The program can be based on
The security classification of application program in terms of existing technologies, is improved in its corresponding information storage to corresponding memory block
The safety of information storage.
Embodiment two,
According to method described in embodiment one, citing is described in further detail below.
In the present embodiment, it will be described in detail so that the information processing unit is specifically integrated in mobile terminal as an example.
As shown in Fig. 2, a kind of information processing method, detailed process can be such that
201, mobile terminal is that security classification is arranged in the application program, and being should according to the attribute information that application program carries
Security classification distributes corresponding memory block.
Specifically, the attribute information that application program carries can be title, the unique identification, classification, downloading of application program
The information such as address, detailed description, developer.By taking the attribute information is the classification information of application program as an example, it is assumed that applying A is gold
Melt class, be social category using B, be social category using C, using D be information class, then terminal can will be set as level-one guarantor using A
It is close, will using B and using C be set as second level secrecy, will using D be set as three-level secrecy.Wherein, highest security classification is one
Grade, second level are taken second place, and the about big expression rank of number is lower, and so on.
In the specific implementation process, the memory space of terminal need to be divided, different security classifications is set specific
Kept secure space can be stored in specific kept secure space according to the relevant information of the higher application program of security classification
In, the relevant information of the lower application program of security classification is stored in conventional memory space.Wherein, kept secure space is set
It is equipped with specific access rule.
In addition, some embodiments wherein, the security classification of application program can also be by user according to actual needs
It is set, for example, level-one secrecy can will be set as using D.
202, obtaining information in mobile terminal store instruction, the target information that information store instruction instruction needs to store.
Specifically, which can be voluntarily is triggered by terminal, is also possible to grasp terminal by user
It triggers;For example, user inputs memo information in " memorandum ", button control " completion " is then clicked by touch screen, with
Information store instruction is triggered, further stores the memo information of input.
Wherein, target information can be text information, audio and video information etc., be not especially limited to this.For example, the target is believed
Breath can be a picture.
203, mobile terminal determines the corresponding security classification of application program belonging to target information.
Specifically, mobile terminal can determine after getting information store instruction and initiate the information store instruction
Source application determines application program belonging to target letter according to source application, for example, can be direct by the source application
As application program belonging to the target information, then, the corresponding security classification of the source application is obtained as application program
Corresponding security classification;That is, step " determining the corresponding security classification of application program belonging to target information " specifically can wrap
It includes:
Determine the source application for initiating information store instruction;
Determining whether there is and the matched default application program of source application in default set of applications;
If it exists, then it obtains and presets the corresponding default security rank of application program with this;
Using default security rank as the corresponding security classification of the application program.
For example, correspond to level-one secrecy using A, correspond to second level secrecy using B and using C, correspond to three-level secrecy using D etc.
Deng if the application program is using B, it is determined that the security classification of the application program is second level secrecy.
204, mobile terminal will be in target information storage to memory block corresponding with security classification.
Specifically, target information can be stored to corresponding according to the corresponding relationship between security classification and memory block
In memory block;That is, step " by target information storage to memory block corresponding with security classification " can specifically include:
The corresponding memory block of security classification is determined according to default corresponding relationship;
Determine store path;
Target information is stored according to the store path, it will be in target information to the memory block.
For example, level-one secrecy is set as highest security classification, level-one, which maintains secrecy, corresponds to memory block by taking android system as an example
A, second level, which maintains secrecy, corresponds to memory block B, and three-level, which maintains secrecy, corresponds to memory block C.If target application information is pictorial information, the pictorial information
Owning application is using B, and the security classification of acquisition is second level secrecy, then terminal, which can determine, needs to store target information
To memory block B.If memory block B be stored in terminal inner, available store path are as follows: it is local storage inside memory block
B using B image.Then, terminal can then store target information according to the store path.
In some embodiments, the network state of mobile terminal can also be limited, when improving information storage
Safety.For example, network can be closed when storing information, intercepted in storing process by wooden horse process etc. to avoid information
Cause information to outward leakage.Judge that the type of application program, the first kind are to need using wireless network, number according to Apply Names
According to the application program of network, the second class is the application program without using wireless network, data network.It answers belonging to the target information
When with program for without networking, wireless network or data network can be automatically closed in terminal, guarantee to a certain extent
Information is not leaked when storing.
205, mobile terminal determines the initiation application program for initiating formation access requests when receiving formation access requests,
Wherein, the target storage that formation access requests instruction needs to access.
206, mobile terminal judges whether initiation application program has the access authority to target storage;If so, executing
Step 207, if it is not, terminating process.
In practical applications, its access authority to target storage can be preset for different application.Than
Such as, the application identities of the application program with the access authority to target storage can will be added to sample identification collection in advance
In conjunction, is determined based on the sample identification in the sample identification set and initiate whether application program has the access to target storage
Permission;That is, step " judging whether initiation application program has the access authority to target storage " detailed process is as follows:
Judge in sample identification set with the presence or absence of the matched sample identification of application identities with initiation application program;
If it exists, then determine that the initiation application program has the access authority to target storage;
If it does not exist, then determine that the initiation application program does not have the access authority to target storage.
207, the authentication information that mobile terminal inputs user is verified, and judges whether to be verified;If so, executing step
Rapid 208, if it is not, terminating process.
In some embodiments, in order to further increase the safety of information, can have pair initiating application program
In the case where the access authority of target storage, authentication information is further verified.Wherein, authentication information specifically can be fingerprint
Information, encrypted message or identifying code etc. are not especially limited this.
For example, can trigger after determining that initiating application program meets default access conditions in mobile terminal display screen
Middle display " whether allowing application access memory block B information ", user then can choose "Yes" or "No".If user selects "Yes",
It is possible to further show printed words such as " access password please be input " in display screen, prompt the access of user input storage B close
Code, if the access password can be " 1234 ".
208, mobile terminal accesses to the information in target storage.
It specifically, can be to target storage when the authentication information that mobile terminal inputs user is verified
Interior information accesses.
From the foregoing, it will be observed that the embodiment of the invention provides a kind of information processing methods, by mobile terminal according to application program
The attribute information of carrying is that security classification is arranged in the application program, and distributes corresponding memory block for the security classification, and being should
Memory block sets access rule;When storing information, mobile terminal application journey according to belonging to target information to be stored
The corresponding security classification of sequence, will be in target information storage to memory block corresponding with security classification;Letter in access storage areas
When breath, mobile terminal may determine that whether the initiation application program for initiating formation access requests meets access conditions, if satisfied, then
It accesses to the information in target storage.The program can when storing information, and the security classification based on application program will
In its corresponding information storage to corresponding kept secure area, so that when information in access storage areas, it can be according to visit
It asks that rule accesses to the information in the memory block, in terms of existing technologies, improves the safety of information storage, access
Property.
Embodiment three,
In order to better implement above method, the embodiment of the present invention also provides a kind of information processing unit, the information processing
Device can integrate in the terminal, which can specifically include the equipment such as mobile phone, tablet computer, laptop.Such as Fig. 3 institute
Show, which may include instruction acquisition module 301, the first determining module 302, first level acquisition module 303
It is as follows with memory module 304:
Instruction acquisition module 301, for obtaining information store instruction, which indicates the target for needing to store
Information;
First determining module 302, for determining application program belonging to target information;
First level obtains module 303, for obtaining the corresponding security classification of application program;
Memory module 304, for arriving target information storage in memory block corresponding with security classification.
Preferably, as shown in figure 4, the device can also include: setup module 305 and distribution module 306;
Setup module 305, for being to answer according to the corresponding attribute information of application program before obtaining information store instruction
With program, security classification is set;
Distribution module 306, for distributing corresponding memory block for security classification.
Preferably, as shown in figure 5, the device can also include: request receiving module 307, the second determining module 308,
One judgment module 309 and access modules 310;
Request receiving module 307 connects after in by target information storage to memory block corresponding with security classification
Receive formation access requests, the target storage that formation access requests instruction needs to access;
Second determining module 308, for determining the initiation application program for initiating formation access requests;
First judgment module 309 initiates whether application program meets default access conditions for judging;
Access modules 310, for when first judgment module 309 is judged to being, according to the formation access requests to mesh
Information in mark memory block accesses.
Preferably, as shown in fig. 6, the device can also include: that second level obtains module 311, the second judgment module
312;
Second level obtains module 311, is used for after determining that initiating application program meets default access conditions, according to letter
Before breath access request accesses to the information in target storage, the corresponding security classification in target storage is obtained;
Second judgment module 312, for judging whether the corresponding security classification in target storage is lower than default security rank;
Access modules 310, specifically for when the second judgment module 312 is judged to being, according to formation access requests to mesh
Information in mark memory block accesses.
Preferably, as shown in fig. 7, the device can also include: data obtaining module 313 and authentication module 314;
Data obtaining module 313, for being visited according to information after determining that initiating application program meets default access conditions
Before asking that request accesses to the information in target storage, the authentication information of user's input is obtained;
Authentication module 314, for being verified to authentication information;
Access modules 310, when specifically for being verified to authentication information, according to formation access requests to target storage
Interior information accesses.
From the foregoing, it will be observed that being obtained and being believed by instruction acquisition module 301 the embodiment of the invention provides a kind of information processing unit
Store instruction, the target information that information store instruction instruction needs to store are ceased, the first determining module 302 determines target information institute
The application program of category, first level obtain module 303 and obtain the corresponding security classification of the application program, and memory module 304 is by mesh
It marks in information storage to memory block corresponding with security classification;The program can be corresponded to based on the security classification of application program
Information storage in corresponding memory block, in terms of existing technologies, improve the safety of information storage.
Example IV,
The present embodiment provides a kind of terminal, which may include memory, and at the information connecting with the memory
Manage device.
For example, referring to FIG. 8, a kind of terminal 400, may include memory 410, and the information connecting with the memory
Processing unit 420;Wherein, which can specifically include instruction acquisition module, the first determining module, first
Rank obtains module and memory module, as follows:
Instruction acquisition module, for obtaining information store instruction, the target that information store instruction instruction needs to store is believed
Breath;
First determining module, for determining application program belonging to target information;
First level obtains module, for obtaining the corresponding security classification of application program;
Memory module, for arriving target information storage in memory block corresponding with security classification.
In addition, the terminal can also include radio frequency (RF, Radio Frequency) module, input module, display module,
Voicefrequency circuit, includes one or more than one processing core at Wireless Fidelity (Wi-Fi, Wireless Fidelity) module
Processor and the components such as power supply.It will be understood by those skilled in the art that the terminal structure does not constitute the limit to the terminal
It is fixed, it may include more or fewer components, perhaps combine certain components or a variety of different component layouts.
For example, the processor, which can have instruction acquisition module, the first determining module, first level, obtains module and storage
Module;Processor can obtain information store instruction by instruction acquisition module, and information store instruction instruction needs to store
Target information, then, processor can lead to the first determining module and determine application program belonging to target information, subsequently, processing
Device can lead to first level and obtain the corresponding security classification of module acquisition application program, finally, processor can lead to memory module
It will be in target information storage to memory block corresponding with security classification.
From the foregoing, it will be observed that the terminal is by obtaining information store instruction, the information the embodiment of the invention provides a kind of terminal
The target information that store instruction instruction needs to store, then, it is determined that application program belonging to target information, and this is obtained using journey
The corresponding security classification of sequence, then will be in target information storage to memory block corresponding with security classification;The program can be based on answering
With the security classification of program by its corresponding information storage to corresponding memory block, in terms of existing technologies, improve
The safety of information storage.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage
Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, RandomAccess
Memory), disk or CD etc..
A kind of information processing method, device and terminal is provided for the embodiments of the invention above to be described in detail,
A specific example illustrates the principle and implementation of the invention for program used herein, and the explanation of above embodiments is only
It is to be used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to the present invention
Thought, there will be changes in specific embodiment and range of applications, in conclusion the content of the present specification should not manage
Solution is limitation of the present invention.
Claims (11)
1. a kind of information processing method characterized by comprising
Obtain information store instruction, the target information that the information store instruction instruction needs to store;
Determine application program belonging to the target information;
The corresponding security classification of the application program is obtained, the security classification is configured according to the type of application program;
By target information storage in memory block corresponding with the security classification, wherein in the application program be nothing
When needing the type of networking, before arriving target information storage in memory block corresponding with the security classification, close
Close network;
Receive formation access requests, the target storage that the formation access requests instruction needs to access;
Determine the initiation application program for initiating the formation access requests;
Judge whether the initiation application program has the access authority to target storage;
If so, judging whether the corresponding security classification in the target storage is lower than the corresponding default guarantor of the initiation application program
Level of confidentiality is other;
If so, being accessed according to the formation access requests to the information in the target storage.
2. information processing method as described in claim 1, which is characterized in that before obtaining information store instruction, the side
Method further include:
Corresponding memory block is distributed for the security classification.
3. such as the described in any item information processing methods of claim 1-2, which is characterized in that the judgement target storage
Whether corresponding security classification is lower than the corresponding default security rank of the initiation application program, comprising:
Obtain the corresponding security classification in the target storage;
Judge whether the corresponding security classification in the target storage is lower than the corresponding default security grade of the initiation application program
Not.
4. such as the described in any item information processing methods of claim 1-2, which is characterized in that determining the initiation application program
After the access authority to target storage, according to the formation access requests to the information in the target storage into
Before row access, the method also includes:
Obtain the authentication information of user's input;
The authentication information is verified;
If being verified, the step to access according to the formation access requests to the information in the target storage is executed
Suddenly.
5. a kind of information processing unit characterized by comprising
Instruction acquisition module, for obtaining information store instruction, the target information that the information store instruction instruction needs to store;
First determining module, for determining application program belonging to the target information;
First level obtains module, and for obtaining the corresponding security classification of the application program, the security classification is according to application
The type of program is configured;
Memory module, for arriving target information storage in memory block corresponding with the security classification, wherein described
When application program is the type without networking, storage corresponding with the security classification is arrived into target information storage
Before in area, network is closed;
Request receiving module, after in by target information storage to memory block corresponding with the security classification,
Receive formation access requests, the target storage that the formation access requests instruction needs to access;
Second determining module, for determining the initiation application program for initiating the formation access requests;
First judgment module, for judging whether the initiation application program has the access authority to target storage;
Second judgment module, for when first judgment module, which is determined as, is, judging the corresponding confidential in the target storage
Not whether not to be lower than the corresponding default security rank of the initiation application program;
Access modules, for being stored to the target according to the formation access requests when the second judgment module is judged to being
Information in area accesses.
6. information processing unit as claimed in claim 5, which is characterized in that described device further include:
Distribution module, for distributing corresponding memory block for the security classification.
7. such as the described in any item information processing units of claim 5-6, which is characterized in that described device further include:
Second level obtains module, for determine it is described initiate application program have to the access authority of target storage it
Afterwards, before accessing according to the formation access requests to the information in the target storage, the target storage is obtained
The corresponding security classification in area.
8. such as the described in any item information processing units of claim 5-6, which is characterized in that described device further include:
Data obtaining module, for after determining the initiations application program with to the access authority of target storage, root
Before accessing according to the formation access requests to the information in the target storage, the authentication letter of user's input is obtained
Breath;
Authentication module, for being verified to the authentication information;
The access modules, when specifically for being verified to the authentication information, according to the formation access requests to described
Information in target storage accesses.
9. a kind of terminal, which is characterized in that the terminal includes memory, and the information processing apparatus connecting with the memory
It sets, wherein the information processing unit includes:
Instruction acquisition module, for obtaining information store instruction, the target information that the information store instruction instruction needs to store;
First determining module, for determining application program belonging to the target information;
First level obtains module, and for obtaining the corresponding security classification of the application program, the security classification is according to application
The type of program is configured;
Memory module, for arriving target information storage in memory block corresponding with the security classification, wherein described
When application program is the type without networking, storage corresponding with the security classification is arrived into target information storage
Before in area, network is closed;
Request receiving module, after in by target information storage to memory block corresponding with the security classification,
Receive formation access requests, the target storage that the formation access requests instruction needs to access;
Second determining module, for determining the initiation application program for initiating the formation access requests;
First judgment module, for judging whether the initiation application program has the access authority to target storage;
Second judgment module, for when first judgment module, which is determined as, is, judging the corresponding confidential in the target storage
Not whether not to be lower than the corresponding default security rank of the initiation application program;
Access modules, for being stored to the target according to the formation access requests when the second judgment module is judged to being
Information in area accesses.
10. a kind of terminal, including memory, processor, which is characterized in that the processor is deposited by calling in the memory
The computer program of storage, for executing information processing method according to any one of claims 1 to 4.
11. a kind of storage medium, is stored with computer program, wherein the computer program executes computer as weighed
Benefit requires 1 to 4 described in any item information processing methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610710746.0A CN106339332B (en) | 2016-08-23 | 2016-08-23 | A kind of information processing method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610710746.0A CN106339332B (en) | 2016-08-23 | 2016-08-23 | A kind of information processing method, device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106339332A CN106339332A (en) | 2017-01-18 |
CN106339332B true CN106339332B (en) | 2019-10-25 |
Family
ID=57825475
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610710746.0A Active CN106339332B (en) | 2016-08-23 | 2016-08-23 | A kind of information processing method, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106339332B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112693360A (en) * | 2020-12-10 | 2021-04-23 | 重庆邮电大学移通学院 | Electric automobile electric quantity management method and related device |
EP4328837A1 (en) * | 2021-04-16 | 2024-02-28 | Digital Currency Institute, The People's Bank of China | Digital currency payment method, apparatus, system security chip, and use method |
CN114510736A (en) * | 2022-04-18 | 2022-05-17 | 武汉龙津科技有限公司 | Information processing method, device, terminal and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101572660A (en) * | 2008-04-30 | 2009-11-04 | 北京明朝万达科技有限公司 | Comprehensive control method for preventing leakage of data |
CN103108082A (en) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system |
CN103369525A (en) * | 2013-07-30 | 2013-10-23 | 东莞宇龙通信科技有限公司 | Terminal and data processing method |
CN105205370A (en) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | Safety protection method for mobile terminal, mobile terminal, safety system and application method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060047959A1 (en) * | 2004-08-25 | 2006-03-02 | Microsoft Corporation | System and method for secure computing |
DE102014201682A1 (en) * | 2014-01-30 | 2015-07-30 | Robert Bosch Gmbh | Method for coexistence of software with different security levels in a multicore processor system |
CN105554248A (en) * | 2015-12-08 | 2016-05-04 | 北京元心科技有限公司 | Method and device for ensuring safety of secret region |
-
2016
- 2016-08-23 CN CN201610710746.0A patent/CN106339332B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101572660A (en) * | 2008-04-30 | 2009-11-04 | 北京明朝万达科技有限公司 | Comprehensive control method for preventing leakage of data |
CN103108082A (en) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system |
CN103369525A (en) * | 2013-07-30 | 2013-10-23 | 东莞宇龙通信科技有限公司 | Terminal and data processing method |
CN105205370A (en) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | Safety protection method for mobile terminal, mobile terminal, safety system and application method |
Also Published As
Publication number | Publication date |
---|---|
CN106339332A (en) | 2017-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103597492B (en) | Cloud service system based on the security function strengthened and the method supporting this system | |
CN106134143B (en) | Method, apparatus and system for dynamic network access-in management | |
CN101202977B (en) | Method and terminal for implementation of information sharing in mobile communication | |
CN103310169B (en) | A kind of method protecting SD card data and protection system | |
CN107257340A (en) | A kind of authentication method, authentication data processing method and equipment based on block chain | |
CN106685978B (en) | Method and device for controlling access authority among multiple devices and mobile terminal | |
CN106973384B (en) | A kind of Wireless Fidelity Wi-Fi connection method and mobile terminal | |
CN105404819A (en) | Data access control method and apparatus and terminal | |
US10993090B2 (en) | Network access method, apparatus, and system | |
US9172692B2 (en) | Systems and methods for securely transferring authentication information between a user and an electronic resource | |
US10223093B2 (en) | Method and system for context-based control over access to personal data | |
CN106339332B (en) | A kind of information processing method, device and terminal | |
US11907344B2 (en) | Systems and methods for establishing connections in a network for matched parties | |
CN107888589A (en) | A kind of method and its system for calling trusted application | |
US20180268163A1 (en) | Context module based personal data protection | |
CN104700040B (en) | Authority control method and device | |
WO2020253197A1 (en) | Method and apparatus for managing virtual user identification card, terminal device and storage medium | |
JP7204790B2 (en) | Data protection inquiry interface | |
TW201906433A (en) | Wireless network type detection method, device and electronic device | |
US20140310778A1 (en) | Method and system for third-party service platform login | |
CN108924906A (en) | Smart machine control method, ZigBee gateway and storage medium | |
US20130005402A1 (en) | Method for accessing at least one service and corresponding system | |
Wijesekera et al. | Dynamically regulating mobile application permissions | |
Rossi | Proposal for the reform of the regulation of digital services | |
CN106372536B (en) | Method and device for protecting privacy information and method for creating device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |