CN106339332B - A kind of information processing method, device and terminal - Google Patents

A kind of information processing method, device and terminal Download PDF

Info

Publication number
CN106339332B
CN106339332B CN201610710746.0A CN201610710746A CN106339332B CN 106339332 B CN106339332 B CN 106339332B CN 201610710746 A CN201610710746 A CN 201610710746A CN 106339332 B CN106339332 B CN 106339332B
Authority
CN
China
Prior art keywords
information
application program
target
storage
security classification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610710746.0A
Other languages
Chinese (zh)
Other versions
CN106339332A (en
Inventor
黄宏用
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610710746.0A priority Critical patent/CN106339332B/en
Publication of CN106339332A publication Critical patent/CN106339332A/en
Application granted granted Critical
Publication of CN106339332B publication Critical patent/CN106339332B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1491Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of information processing method, device and terminals;This method is by obtaining information store instruction, the target information that information store instruction instruction needs to store, then, it is determined that application program belonging to target information, and the corresponding security classification of the application program is obtained, then will be in target information storage to memory block corresponding with security classification;The program can the security classification based on application program by its corresponding information storage to corresponding memory block, in terms of existing technologies, improve the safety of information storage.

Description

A kind of information processing method, device and terminal
Technical field
The present invention relates to field of terminal technology more particularly to a kind of information processing methods, device and terminal.
Background technique
With the development of internet with the development of mobile communications network, while also along with the processing capacity of terminal and storage The fast development of ability, the application program of magnanimity have obtained rapid propagation and use;Common application program is facilitating user's work While making and live, it is no lack of the daily life that application program newly developed also enters user, improves the life matter of user Amount, the frequency of using terminal and the amusement sense in use.
Currently, there are the safety problems of information leakage for terminal.It in the prior art, is usually to establish dual system (including routine System and security system) Lai Tisheng terminal, network and application aspect security capabilities.However, for being related to user privacy information Or the application (such as contact person, short message and notepad) of important information, dual system can access these applications pair in existing scheme The information answered, but for a user, the partial information under conventional system is equivalent to the copy of certain information in security system.Though Information security in right security system ensured, once it is present in however, inbreaking of Trojan horse common system steals data information Corresponding data information is also just leaked in security system.
It is found that the safety of information storage is poor in the prior art.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method, device and terminal, and the safety of information storage can be improved.
The embodiment of the present invention provides a kind of information processing method, comprising:
Obtain information store instruction, the target information that the information store instruction instruction needs to store;
Determine application program belonging to the target information;
Obtain the corresponding security classification of the application program;
It will be in target information storage to memory block corresponding with the security classification.
Correspondingly, the embodiment of the invention provides a kind of information processing units, comprising:
Instruction acquisition module, for obtaining information store instruction, the target that the information store instruction instruction needs to store Information;
First determining module, for determining application program belonging to the target information;
First level obtains module, for obtaining the corresponding security classification of the application program;
Memory module, for arriving target information storage in memory block corresponding with the security classification.
Correspondingly, the embodiment of the invention provides a kind of terminal, the terminal includes memory, and with the memory The information processing unit of connection, wherein the information processing unit includes:
Instruction acquisition module, for obtaining information store instruction, the target that the information store instruction instruction needs to store Information;
First determining module, for determining application program belonging to the target information;
First level obtains module, for obtaining the corresponding security classification of the application program;
Memory module, for arriving target information storage in memory block corresponding with the security classification.
The embodiment of the present invention is by obtaining information store instruction, the target letter that information store instruction instruction needs to store Breath, then, it is determined that application program belonging to target information, and the corresponding security classification of the application program is obtained, then target is believed In breath storage to memory block corresponding with security classification;The program can the security classification based on application program by its corresponding letter In breath storage to corresponding memory block, in terms of existing technologies, the safety of information storage is improved.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow diagram for the information processing method that the embodiment of the present invention one provides;
Fig. 2 is the flow diagram of information processing method provided by Embodiment 2 of the present invention;
Fig. 3 is the structural schematic diagram for the first information processing unit that the embodiment of the present invention three provides;
Fig. 4 is the structural schematic diagram for second of information processing unit that the embodiment of the present invention three provides;
Fig. 5 is the structural schematic diagram for the third information processing unit that the embodiment of the present invention three provides;
Fig. 6 is the structural schematic diagram for the 4th kind of information processing unit that the embodiment of the present invention three provides;
Fig. 7 is the structural schematic diagram for the 5th kind of information processing unit that the embodiment of the present invention three provides;
Fig. 8 is the structural schematic diagram for the terminal that the embodiment of the present invention four provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of information processing method, device and terminal.It will be described in detail respectively below.
Embodiment one,
The present embodiment will be described from the angle of information processing unit, which specifically can integrate at end In end, which can be the equipment such as smart phone, tablet computer.
A kind of information processing method, comprising: obtain information store instruction, the mesh that information store instruction instruction needs to store Mark information;Determine application program belonging to target information;Obtain the corresponding security classification of the application program;Target information is stored Into memory block corresponding with security classification.
As shown in Figure 1, information processing method, detailed process be can be such that
101, information store instruction, the target information that information store instruction instruction needs to store are obtained.
Specifically, which can be voluntarily is triggered by terminal, is also possible to grasp terminal by user It triggers;For example, user inputs memo information in " memorandum ", button control " completion " is then clicked by touch screen, with Information store instruction is triggered, further stores the memo information of input.
Wherein, target information can be text information, audio and video information etc., be not especially limited to this.
102, application program belonging to target information is determined.
Specifically, terminal can determine that the source for initiating the information store instruction is answered after getting information store instruction With program, application program belonging to target letter is determined according to source application, for example, can by the source application directly as Application program belonging to the target information;That is, step " determining application program belonging to target information " detailed process is as follows:
Determine the source application for initiating the information store instruction;
Application program belonging to target letter is determined according to source application.
103, the corresponding security classification of the application program is obtained.
Specifically, the corresponding guarantor of the application program can be obtained by the mapping relations between application program and security classification Level of confidentiality is other;That is, step " obtaining the corresponding security classification of the application program " is specifically as follows:
It determines in default set of applications with the presence or absence of the default application program with the application matches;
If it exists, then the corresponding default security rank of application program is preset with this according to presetting mapping relations and obtain;
Using default security rank as the corresponding security classification of the application program.
For example, correspond to level-one secrecy using A, correspond to second level secrecy using B and using C, correspond to three-level secrecy using D etc. Deng if the application program is using B, it is determined that the security classification of the application program is second level secrecy.
In the specific implementation process, need in advance in terminal application setting security classification, with establish application program with Mapping relations between security classification;That is, this method can also include: before obtaining information store instruction
It is that security classification is arranged in the application program according to the corresponding attribute information of application program;
Corresponding memory block is distributed for the security classification.
Specifically, the corresponding attribute information of application program can be title, the unique identification, classification, downloading of application program The information such as address, detailed description, developer.By taking the attribute information is the classification information of application program as an example, it is assumed that applying A is gold Melt class, be social category using B, be social category using C, using D be information class, then terminal can will be set as level-one guarantor using A It is close, will using B and using C be set as second level secrecy, will using D be set as three-level secrecy.Wherein, highest security classification is one Grade, second level are taken second place, and the about big expression rank of number is lower, and so on.It is of course also possible to which level-one secrecy is set as minimum confidential Not, the bigger expression rank of number is higher.
In the specific implementation process, the memory space of terminal need to be divided, different security classifications is set specific Kept secure space can be stored in specific kept secure space according to the relevant information of the higher application program of security classification In, the relevant information of the lower application program of security classification is stored in conventional memory space.Wherein, kept secure space is set It is equipped with specific access rule.
In addition, some embodiments wherein, the security classification of application program can also be by user according to actual needs It is set, for example, level-one secrecy can will be set as using D.
It 104, will be in target information storage to memory block corresponding with security classification.
Specifically, target information can be stored to corresponding according to the corresponding relationship between security classification and memory block In memory block;That is, step " by target information storage to memory block corresponding with security classification " can specifically include:
The corresponding memory block of security classification is determined according to default corresponding relationship;
Determine store path;
Target information is stored according to the store path, it will be in target information to the memory block.
For example, level-one secrecy is set as highest security classification, level-one secrecy corresponds to by taking Android (Android) system as an example Memory block A, second level, which maintain secrecy, corresponds to memory block B, and three-level, which maintains secrecy, corresponds to memory block C.If target application information is pictorial information, the figure Piece information owning application is using B, and the security classification of acquisition is second level secrecy, then terminal, which can determine, needs to believe target Memory block B is arrived in breath storage.If memory block B be stored in terminal inner, available store path are as follows: it is local storage inside Memory block B using B image.Then, terminal can then store target information according to the store path.
At application program access storage areas, in order to improve the safety of application message, need that visit can be set to memory block It asks rule, forbids accessing for example, can be, other application is forbidden to access, or can only read and cannot be written.
In the specific implementation process, its access authority to target storage can be set for different application;? That is, this method can also include: after in by target information storage to memory block corresponding with security classification
Receive formation access requests, the target storage that formation access requests instruction needs to access;
Determine the initiation application program for initiating formation access requests;
Judge to initiate whether application program meets default access conditions;
If satisfied, then being accessed according to formation access requests to the information in target storage.
Wherein, step " judging to initiate whether application program meets default access conditions " is specifically as follows: judgement is initiated to answer Whether there is the access authority to target storage with program.In the specific implementation process, can will will have to target in advance The application identities of the application program of the access authority of memory block are added in sample identification set, based in the sample identification set Sample identification determine initiate application program whether meet default access conditions;That is, step " judges whether initiate application program The default access conditions of satisfaction " detailed process can be such that
Judge in sample identification set with the presence or absence of the matched sample identification of application identities with initiation application program;
If it exists, then determine that the initiation application program meets default access conditions.
In some embodiments, in order to further increase the safety of information, it is alternatively possible to be arranged with access right The application program of limit can access to the memory block of lower security classification, and the memory block of higher security classification is then set It is set to and haves no right to access;That is, after determining that initiating application program meets default access conditions, according to formation access requests to mesh Before information in mark memory block accesses, this method can also include:
Obtain the corresponding security classification in target storage;
Judge whether the corresponding security classification in target storage is lower than default security rank;
If so, executing the step of accessing according to formation access requests to the information in target storage.
Wherein, default security rank can be arranged by those skilled in the art, can also be configured by terminal manufacturer. For example, the default security rank specifically can be set to second level, that is, if target is deposited so that minimum security classification is level-one as an example The corresponding security classification of storage area is level-one (i.e. target storage is conventional memory space), then the application program for meeting condition all may be used To access to the information in target storage.
It is another it is alternatively possible to initiate application program have the access authority to target storage in the case where, into one Step ground verifying authentication information;Namely after determining that initiating application program meets default access conditions, according to formation access requests Before accessing to the information in target storage, this method can also include:
Obtain the authentication information of user's input;
Authentication information is verified;
If being verified, the step of accessing according to formation access requests to the information in target storage is executed.
Wherein, authentication information specifically can be finger print information, encrypted message or identifying code etc., not limit specifically this It is fixed.
For example, can trigger and be shown in terminal display screen after determining that initiating application program meets default access conditions " whether allowing application access memory block B information " shown, user then can choose "Yes" or "No".If user selects "Yes", into one Step ground can show printed words such as " please input access password " in display screen, prompt the access password of user input storage B, such as The access password can be " 1234 ".
In some embodiments, the network state of terminal can also be limited, to further increase information security Property.For example, network can be closed when storing information, lead to letter by interceptions such as wooden horse processes in storing process to avoid information Breath is to outward leakage.Judge that the type of application program, the first kind are to need using wireless network, data network according to Apply Names Application program, the second class be without using wireless network, data network application program.When target information owning application When for without networking, wireless network or data network can be automatically closed in terminal, guarantee that information is deposited to a certain extent It is not leaked when storage.
From the foregoing, it will be observed that the embodiment of the invention provides a kind of information processing method, by obtaining information store instruction, the letter The target information that breath store instruction instruction needs to store, then, it is determined that application program belonging to target information, and obtain the application The corresponding security classification of program, then will be in target information storage to memory block corresponding with security classification;The program can be based on The security classification of application program in terms of existing technologies, is improved in its corresponding information storage to corresponding memory block The safety of information storage.
Embodiment two,
According to method described in embodiment one, citing is described in further detail below.
In the present embodiment, it will be described in detail so that the information processing unit is specifically integrated in mobile terminal as an example.
As shown in Fig. 2, a kind of information processing method, detailed process can be such that
201, mobile terminal is that security classification is arranged in the application program, and being should according to the attribute information that application program carries Security classification distributes corresponding memory block.
Specifically, the attribute information that application program carries can be title, the unique identification, classification, downloading of application program The information such as address, detailed description, developer.By taking the attribute information is the classification information of application program as an example, it is assumed that applying A is gold Melt class, be social category using B, be social category using C, using D be information class, then terminal can will be set as level-one guarantor using A It is close, will using B and using C be set as second level secrecy, will using D be set as three-level secrecy.Wherein, highest security classification is one Grade, second level are taken second place, and the about big expression rank of number is lower, and so on.
In the specific implementation process, the memory space of terminal need to be divided, different security classifications is set specific Kept secure space can be stored in specific kept secure space according to the relevant information of the higher application program of security classification In, the relevant information of the lower application program of security classification is stored in conventional memory space.Wherein, kept secure space is set It is equipped with specific access rule.
In addition, some embodiments wherein, the security classification of application program can also be by user according to actual needs It is set, for example, level-one secrecy can will be set as using D.
202, obtaining information in mobile terminal store instruction, the target information that information store instruction instruction needs to store.
Specifically, which can be voluntarily is triggered by terminal, is also possible to grasp terminal by user It triggers;For example, user inputs memo information in " memorandum ", button control " completion " is then clicked by touch screen, with Information store instruction is triggered, further stores the memo information of input.
Wherein, target information can be text information, audio and video information etc., be not especially limited to this.For example, the target is believed Breath can be a picture.
203, mobile terminal determines the corresponding security classification of application program belonging to target information.
Specifically, mobile terminal can determine after getting information store instruction and initiate the information store instruction Source application determines application program belonging to target letter according to source application, for example, can be direct by the source application As application program belonging to the target information, then, the corresponding security classification of the source application is obtained as application program Corresponding security classification;That is, step " determining the corresponding security classification of application program belonging to target information " specifically can wrap It includes:
Determine the source application for initiating information store instruction;
Determining whether there is and the matched default application program of source application in default set of applications;
If it exists, then it obtains and presets the corresponding default security rank of application program with this;
Using default security rank as the corresponding security classification of the application program.
For example, correspond to level-one secrecy using A, correspond to second level secrecy using B and using C, correspond to three-level secrecy using D etc. Deng if the application program is using B, it is determined that the security classification of the application program is second level secrecy.
204, mobile terminal will be in target information storage to memory block corresponding with security classification.
Specifically, target information can be stored to corresponding according to the corresponding relationship between security classification and memory block In memory block;That is, step " by target information storage to memory block corresponding with security classification " can specifically include:
The corresponding memory block of security classification is determined according to default corresponding relationship;
Determine store path;
Target information is stored according to the store path, it will be in target information to the memory block.
For example, level-one secrecy is set as highest security classification, level-one, which maintains secrecy, corresponds to memory block by taking android system as an example A, second level, which maintains secrecy, corresponds to memory block B, and three-level, which maintains secrecy, corresponds to memory block C.If target application information is pictorial information, the pictorial information Owning application is using B, and the security classification of acquisition is second level secrecy, then terminal, which can determine, needs to store target information To memory block B.If memory block B be stored in terminal inner, available store path are as follows: it is local storage inside memory block B using B image.Then, terminal can then store target information according to the store path.
In some embodiments, the network state of mobile terminal can also be limited, when improving information storage Safety.For example, network can be closed when storing information, intercepted in storing process by wooden horse process etc. to avoid information Cause information to outward leakage.Judge that the type of application program, the first kind are to need using wireless network, number according to Apply Names According to the application program of network, the second class is the application program without using wireless network, data network.It answers belonging to the target information When with program for without networking, wireless network or data network can be automatically closed in terminal, guarantee to a certain extent Information is not leaked when storing.
205, mobile terminal determines the initiation application program for initiating formation access requests when receiving formation access requests, Wherein, the target storage that formation access requests instruction needs to access.
206, mobile terminal judges whether initiation application program has the access authority to target storage;If so, executing Step 207, if it is not, terminating process.
In practical applications, its access authority to target storage can be preset for different application.Than Such as, the application identities of the application program with the access authority to target storage can will be added to sample identification collection in advance In conjunction, is determined based on the sample identification in the sample identification set and initiate whether application program has the access to target storage Permission;That is, step " judging whether initiation application program has the access authority to target storage " detailed process is as follows:
Judge in sample identification set with the presence or absence of the matched sample identification of application identities with initiation application program;
If it exists, then determine that the initiation application program has the access authority to target storage;
If it does not exist, then determine that the initiation application program does not have the access authority to target storage.
207, the authentication information that mobile terminal inputs user is verified, and judges whether to be verified;If so, executing step Rapid 208, if it is not, terminating process.
In some embodiments, in order to further increase the safety of information, can have pair initiating application program In the case where the access authority of target storage, authentication information is further verified.Wherein, authentication information specifically can be fingerprint Information, encrypted message or identifying code etc. are not especially limited this.
For example, can trigger after determining that initiating application program meets default access conditions in mobile terminal display screen Middle display " whether allowing application access memory block B information ", user then can choose "Yes" or "No".If user selects "Yes", It is possible to further show printed words such as " access password please be input " in display screen, prompt the access of user input storage B close Code, if the access password can be " 1234 ".
208, mobile terminal accesses to the information in target storage.
It specifically, can be to target storage when the authentication information that mobile terminal inputs user is verified Interior information accesses.
From the foregoing, it will be observed that the embodiment of the invention provides a kind of information processing methods, by mobile terminal according to application program The attribute information of carrying is that security classification is arranged in the application program, and distributes corresponding memory block for the security classification, and being should Memory block sets access rule;When storing information, mobile terminal application journey according to belonging to target information to be stored The corresponding security classification of sequence, will be in target information storage to memory block corresponding with security classification;Letter in access storage areas When breath, mobile terminal may determine that whether the initiation application program for initiating formation access requests meets access conditions, if satisfied, then It accesses to the information in target storage.The program can when storing information, and the security classification based on application program will In its corresponding information storage to corresponding kept secure area, so that when information in access storage areas, it can be according to visit It asks that rule accesses to the information in the memory block, in terms of existing technologies, improves the safety of information storage, access Property.
Embodiment three,
In order to better implement above method, the embodiment of the present invention also provides a kind of information processing unit, the information processing Device can integrate in the terminal, which can specifically include the equipment such as mobile phone, tablet computer, laptop.Such as Fig. 3 institute Show, which may include instruction acquisition module 301, the first determining module 302, first level acquisition module 303 It is as follows with memory module 304:
Instruction acquisition module 301, for obtaining information store instruction, which indicates the target for needing to store Information;
First determining module 302, for determining application program belonging to target information;
First level obtains module 303, for obtaining the corresponding security classification of application program;
Memory module 304, for arriving target information storage in memory block corresponding with security classification.
Preferably, as shown in figure 4, the device can also include: setup module 305 and distribution module 306;
Setup module 305, for being to answer according to the corresponding attribute information of application program before obtaining information store instruction With program, security classification is set;
Distribution module 306, for distributing corresponding memory block for security classification.
Preferably, as shown in figure 5, the device can also include: request receiving module 307, the second determining module 308, One judgment module 309 and access modules 310;
Request receiving module 307 connects after in by target information storage to memory block corresponding with security classification Receive formation access requests, the target storage that formation access requests instruction needs to access;
Second determining module 308, for determining the initiation application program for initiating formation access requests;
First judgment module 309 initiates whether application program meets default access conditions for judging;
Access modules 310, for when first judgment module 309 is judged to being, according to the formation access requests to mesh Information in mark memory block accesses.
Preferably, as shown in fig. 6, the device can also include: that second level obtains module 311, the second judgment module 312;
Second level obtains module 311, is used for after determining that initiating application program meets default access conditions, according to letter Before breath access request accesses to the information in target storage, the corresponding security classification in target storage is obtained;
Second judgment module 312, for judging whether the corresponding security classification in target storage is lower than default security rank;
Access modules 310, specifically for when the second judgment module 312 is judged to being, according to formation access requests to mesh Information in mark memory block accesses.
Preferably, as shown in fig. 7, the device can also include: data obtaining module 313 and authentication module 314;
Data obtaining module 313, for being visited according to information after determining that initiating application program meets default access conditions Before asking that request accesses to the information in target storage, the authentication information of user's input is obtained;
Authentication module 314, for being verified to authentication information;
Access modules 310, when specifically for being verified to authentication information, according to formation access requests to target storage Interior information accesses.
From the foregoing, it will be observed that being obtained and being believed by instruction acquisition module 301 the embodiment of the invention provides a kind of information processing unit Store instruction, the target information that information store instruction instruction needs to store are ceased, the first determining module 302 determines target information institute The application program of category, first level obtain module 303 and obtain the corresponding security classification of the application program, and memory module 304 is by mesh It marks in information storage to memory block corresponding with security classification;The program can be corresponded to based on the security classification of application program Information storage in corresponding memory block, in terms of existing technologies, improve the safety of information storage.
Example IV,
The present embodiment provides a kind of terminal, which may include memory, and at the information connecting with the memory Manage device.
For example, referring to FIG. 8, a kind of terminal 400, may include memory 410, and the information connecting with the memory Processing unit 420;Wherein, which can specifically include instruction acquisition module, the first determining module, first Rank obtains module and memory module, as follows:
Instruction acquisition module, for obtaining information store instruction, the target that information store instruction instruction needs to store is believed Breath;
First determining module, for determining application program belonging to target information;
First level obtains module, for obtaining the corresponding security classification of application program;
Memory module, for arriving target information storage in memory block corresponding with security classification.
In addition, the terminal can also include radio frequency (RF, Radio Frequency) module, input module, display module, Voicefrequency circuit, includes one or more than one processing core at Wireless Fidelity (Wi-Fi, Wireless Fidelity) module Processor and the components such as power supply.It will be understood by those skilled in the art that the terminal structure does not constitute the limit to the terminal It is fixed, it may include more or fewer components, perhaps combine certain components or a variety of different component layouts.
For example, the processor, which can have instruction acquisition module, the first determining module, first level, obtains module and storage Module;Processor can obtain information store instruction by instruction acquisition module, and information store instruction instruction needs to store Target information, then, processor can lead to the first determining module and determine application program belonging to target information, subsequently, processing Device can lead to first level and obtain the corresponding security classification of module acquisition application program, finally, processor can lead to memory module It will be in target information storage to memory block corresponding with security classification.
From the foregoing, it will be observed that the terminal is by obtaining information store instruction, the information the embodiment of the invention provides a kind of terminal The target information that store instruction instruction needs to store, then, it is determined that application program belonging to target information, and this is obtained using journey The corresponding security classification of sequence, then will be in target information storage to memory block corresponding with security classification;The program can be based on answering With the security classification of program by its corresponding information storage to corresponding memory block, in terms of existing technologies, improve The safety of information storage.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, RandomAccess Memory), disk or CD etc..
A kind of information processing method, device and terminal is provided for the embodiments of the invention above to be described in detail, A specific example illustrates the principle and implementation of the invention for program used herein, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention;Meanwhile for those skilled in the art, according to the present invention Thought, there will be changes in specific embodiment and range of applications, in conclusion the content of the present specification should not manage Solution is limitation of the present invention.

Claims (11)

1. a kind of information processing method characterized by comprising
Obtain information store instruction, the target information that the information store instruction instruction needs to store;
Determine application program belonging to the target information;
The corresponding security classification of the application program is obtained, the security classification is configured according to the type of application program;
By target information storage in memory block corresponding with the security classification, wherein in the application program be nothing When needing the type of networking, before arriving target information storage in memory block corresponding with the security classification, close Close network;
Receive formation access requests, the target storage that the formation access requests instruction needs to access;
Determine the initiation application program for initiating the formation access requests;
Judge whether the initiation application program has the access authority to target storage;
If so, judging whether the corresponding security classification in the target storage is lower than the corresponding default guarantor of the initiation application program Level of confidentiality is other;
If so, being accessed according to the formation access requests to the information in the target storage.
2. information processing method as described in claim 1, which is characterized in that before obtaining information store instruction, the side Method further include:
Corresponding memory block is distributed for the security classification.
3. such as the described in any item information processing methods of claim 1-2, which is characterized in that the judgement target storage Whether corresponding security classification is lower than the corresponding default security rank of the initiation application program, comprising:
Obtain the corresponding security classification in the target storage;
Judge whether the corresponding security classification in the target storage is lower than the corresponding default security grade of the initiation application program Not.
4. such as the described in any item information processing methods of claim 1-2, which is characterized in that determining the initiation application program After the access authority to target storage, according to the formation access requests to the information in the target storage into Before row access, the method also includes:
Obtain the authentication information of user's input;
The authentication information is verified;
If being verified, the step to access according to the formation access requests to the information in the target storage is executed Suddenly.
5. a kind of information processing unit characterized by comprising
Instruction acquisition module, for obtaining information store instruction, the target information that the information store instruction instruction needs to store;
First determining module, for determining application program belonging to the target information;
First level obtains module, and for obtaining the corresponding security classification of the application program, the security classification is according to application The type of program is configured;
Memory module, for arriving target information storage in memory block corresponding with the security classification, wherein described When application program is the type without networking, storage corresponding with the security classification is arrived into target information storage Before in area, network is closed;
Request receiving module, after in by target information storage to memory block corresponding with the security classification, Receive formation access requests, the target storage that the formation access requests instruction needs to access;
Second determining module, for determining the initiation application program for initiating the formation access requests;
First judgment module, for judging whether the initiation application program has the access authority to target storage;
Second judgment module, for when first judgment module, which is determined as, is, judging the corresponding confidential in the target storage Not whether not to be lower than the corresponding default security rank of the initiation application program;
Access modules, for being stored to the target according to the formation access requests when the second judgment module is judged to being Information in area accesses.
6. information processing unit as claimed in claim 5, which is characterized in that described device further include:
Distribution module, for distributing corresponding memory block for the security classification.
7. such as the described in any item information processing units of claim 5-6, which is characterized in that described device further include:
Second level obtains module, for determine it is described initiate application program have to the access authority of target storage it Afterwards, before accessing according to the formation access requests to the information in the target storage, the target storage is obtained The corresponding security classification in area.
8. such as the described in any item information processing units of claim 5-6, which is characterized in that described device further include:
Data obtaining module, for after determining the initiations application program with to the access authority of target storage, root Before accessing according to the formation access requests to the information in the target storage, the authentication letter of user's input is obtained Breath;
Authentication module, for being verified to the authentication information;
The access modules, when specifically for being verified to the authentication information, according to the formation access requests to described Information in target storage accesses.
9. a kind of terminal, which is characterized in that the terminal includes memory, and the information processing apparatus connecting with the memory It sets, wherein the information processing unit includes:
Instruction acquisition module, for obtaining information store instruction, the target information that the information store instruction instruction needs to store;
First determining module, for determining application program belonging to the target information;
First level obtains module, and for obtaining the corresponding security classification of the application program, the security classification is according to application The type of program is configured;
Memory module, for arriving target information storage in memory block corresponding with the security classification, wherein described When application program is the type without networking, storage corresponding with the security classification is arrived into target information storage Before in area, network is closed;
Request receiving module, after in by target information storage to memory block corresponding with the security classification, Receive formation access requests, the target storage that the formation access requests instruction needs to access;
Second determining module, for determining the initiation application program for initiating the formation access requests;
First judgment module, for judging whether the initiation application program has the access authority to target storage;
Second judgment module, for when first judgment module, which is determined as, is, judging the corresponding confidential in the target storage Not whether not to be lower than the corresponding default security rank of the initiation application program;
Access modules, for being stored to the target according to the formation access requests when the second judgment module is judged to being Information in area accesses.
10. a kind of terminal, including memory, processor, which is characterized in that the processor is deposited by calling in the memory The computer program of storage, for executing information processing method according to any one of claims 1 to 4.
11. a kind of storage medium, is stored with computer program, wherein the computer program executes computer as weighed Benefit requires 1 to 4 described in any item information processing methods.
CN201610710746.0A 2016-08-23 2016-08-23 A kind of information processing method, device and terminal Active CN106339332B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610710746.0A CN106339332B (en) 2016-08-23 2016-08-23 A kind of information processing method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610710746.0A CN106339332B (en) 2016-08-23 2016-08-23 A kind of information processing method, device and terminal

Publications (2)

Publication Number Publication Date
CN106339332A CN106339332A (en) 2017-01-18
CN106339332B true CN106339332B (en) 2019-10-25

Family

ID=57825475

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610710746.0A Active CN106339332B (en) 2016-08-23 2016-08-23 A kind of information processing method, device and terminal

Country Status (1)

Country Link
CN (1) CN106339332B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112693360A (en) * 2020-12-10 2021-04-23 重庆邮电大学移通学院 Electric automobile electric quantity management method and related device
EP4328837A1 (en) * 2021-04-16 2024-02-28 Digital Currency Institute, The People's Bank of China Digital currency payment method, apparatus, system security chip, and use method
CN114510736A (en) * 2022-04-18 2022-05-17 武汉龙津科技有限公司 Information processing method, device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101572660A (en) * 2008-04-30 2009-11-04 北京明朝万达科技有限公司 Comprehensive control method for preventing leakage of data
CN103108082A (en) * 2013-01-24 2013-05-15 北京航空航天大学 Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system
CN103369525A (en) * 2013-07-30 2013-10-23 东莞宇龙通信科技有限公司 Terminal and data processing method
CN105205370A (en) * 2015-08-24 2015-12-30 北京恒信安科技有限公司 Safety protection method for mobile terminal, mobile terminal, safety system and application method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060047959A1 (en) * 2004-08-25 2006-03-02 Microsoft Corporation System and method for secure computing
DE102014201682A1 (en) * 2014-01-30 2015-07-30 Robert Bosch Gmbh Method for coexistence of software with different security levels in a multicore processor system
CN105554248A (en) * 2015-12-08 2016-05-04 北京元心科技有限公司 Method and device for ensuring safety of secret region

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101572660A (en) * 2008-04-30 2009-11-04 北京明朝万达科技有限公司 Comprehensive control method for preventing leakage of data
CN103108082A (en) * 2013-01-24 2013-05-15 北京航空航天大学 Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system
CN103369525A (en) * 2013-07-30 2013-10-23 东莞宇龙通信科技有限公司 Terminal and data processing method
CN105205370A (en) * 2015-08-24 2015-12-30 北京恒信安科技有限公司 Safety protection method for mobile terminal, mobile terminal, safety system and application method

Also Published As

Publication number Publication date
CN106339332A (en) 2017-01-18

Similar Documents

Publication Publication Date Title
CN103597492B (en) Cloud service system based on the security function strengthened and the method supporting this system
CN106134143B (en) Method, apparatus and system for dynamic network access-in management
CN101202977B (en) Method and terminal for implementation of information sharing in mobile communication
CN103310169B (en) A kind of method protecting SD card data and protection system
CN107257340A (en) A kind of authentication method, authentication data processing method and equipment based on block chain
CN106685978B (en) Method and device for controlling access authority among multiple devices and mobile terminal
CN106973384B (en) A kind of Wireless Fidelity Wi-Fi connection method and mobile terminal
CN105404819A (en) Data access control method and apparatus and terminal
US10993090B2 (en) Network access method, apparatus, and system
US9172692B2 (en) Systems and methods for securely transferring authentication information between a user and an electronic resource
US10223093B2 (en) Method and system for context-based control over access to personal data
CN106339332B (en) A kind of information processing method, device and terminal
US11907344B2 (en) Systems and methods for establishing connections in a network for matched parties
CN107888589A (en) A kind of method and its system for calling trusted application
US20180268163A1 (en) Context module based personal data protection
CN104700040B (en) Authority control method and device
WO2020253197A1 (en) Method and apparatus for managing virtual user identification card, terminal device and storage medium
JP7204790B2 (en) Data protection inquiry interface
TW201906433A (en) Wireless network type detection method, device and electronic device
US20140310778A1 (en) Method and system for third-party service platform login
CN108924906A (en) Smart machine control method, ZigBee gateway and storage medium
US20130005402A1 (en) Method for accessing at least one service and corresponding system
Wijesekera et al. Dynamically regulating mobile application permissions
Rossi Proposal for the reform of the regulation of digital services
CN106372536B (en) Method and device for protecting privacy information and method for creating device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant