CN106603625B - Data protection method and device - Google Patents
Data protection method and device Download PDFInfo
- Publication number
- CN106603625B CN106603625B CN201610974399.2A CN201610974399A CN106603625B CN 106603625 B CN106603625 B CN 106603625B CN 201610974399 A CN201610974399 A CN 201610974399A CN 106603625 B CN106603625 B CN 106603625B
- Authority
- CN
- China
- Prior art keywords
- data
- registered terminal
- backup data
- terminal
- backup
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000000903 blocking effect Effects 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000003139 buffering effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention relates to the technical field of communication, and discloses a data protection method and a device, wherein the method comprises the following steps: detecting whether a data protection mode trigger event for a registered terminal is received; if so, sending a data protection mode starting instruction to the registered terminal, wherein the data protection mode starting instruction is used for instructing the registered terminal to send backup data and format the registered terminal; and receiving the backup data sent by the registered terminal, and backing up the backup data. By implementing the embodiment of the invention, the probability of data leakage can be reduced.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data protection method and apparatus.
Background
The mobile terminals such as the smart phones store personal privacy data such as photos and short messages and data related to personal property safety such as account numbers and passwords of payment treasures and mobile phone banks. Once the smart phone is lost, private data of the person can be leaked and property security of the person can be threatened.
Currently, when a smart phone is lost, a Subscriber Identity Module (SIM) replacement monitoring method may be used to determine the current location of the smart phone, that is, when the lost smart phone detects that a SIM card is replaced, the system may identify that the smart phone is lost and notify the current location of the smart phone. However, the SIM card replacement monitoring method only informs the current location of the mobile phone, and does not protect the data stored in the mobile phone to prevent the data from leaking, so that the probability of data leakage is high.
Disclosure of Invention
The embodiment of the invention discloses a data protection method and device, which can reduce the probability of data leakage.
The first aspect of the embodiments of the present invention discloses a data protection method, including:
detecting whether a data protection mode trigger event for a registered terminal is received;
if so, sending a data protection mode starting instruction to the registered terminal, wherein the data protection mode starting instruction is used for instructing the registered terminal to send backup data and format the registered terminal;
and receiving the backup data sent by the registered terminal, and backing up the backup data.
The second aspect of the embodiment of the present invention discloses another data protection method, including:
receiving a data protection mode starting instruction aiming at a registered terminal and sent by a server;
sending backup data to the server according to the data protection mode starting instruction;
and formatting the registered terminal according to the data protection mode starting instruction.
A third aspect of the embodiments of the present invention discloses a server, including:
a receiving unit for detecting whether a data protection mode trigger event for a registered terminal is received;
a sending unit, configured to send a data protection mode starting instruction to the registered terminal when the receiving unit receives the data protection mode trigger event, where the data protection mode starting instruction is used to instruct the registered terminal to send backup data and format the registered terminal;
the receiving unit is further configured to receive the backup data sent by the registered terminal;
and the processing unit is used for backing up the backup data received by the receiving unit.
A fourth aspect of the present invention discloses a registration terminal, including:
the receiving unit is used for receiving a data protection mode starting instruction which is sent by the server and aims at the registered terminal;
a sending unit, configured to send backup data to the server according to the data protection mode start instruction received by the receiving unit;
and the processing unit is used for formatting the registered terminal according to the data protection mode starting instruction received by the receiving unit.
In the embodiment of the invention, the server can send the data protection mode starting instruction to the registered terminal to back up the backup data sent by the registered terminal and format the registered terminal. Therefore, by implementing the embodiment of the invention, when the registered terminal is lost, the server can back up the data stored in the registered terminal to avoid data loss, and can format the registered terminal to reduce the leakage probability of the data stored in the registered terminal.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data protection method disclosed in an embodiment of the present invention;
FIG. 2A is a schematic diagram of a server registration interface according to an embodiment of the present invention;
FIG. 2B is a schematic diagram of a data protection interface according to an embodiment of the present invention;
FIG. 2C is a schematic flow chart illustrating another data protection method according to an embodiment of the present invention;
FIG. 3 is a flow chart of a data protection system according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a server according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal disclosed in the embodiment of the present invention;
fig. 6 is a computer system based on von neumann architecture for executing the above application interface switching method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It is to be understood that the terminology used in the embodiments of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the listed items that are shared.
The embodiment can be applied to terminals such as a smart phone and an ipad which are registered in a server, when the terminals such as the smart phone and the ipad are lost, a user can send an instruction to the terminals such as the smart phone and the ipad through the server, and after receiving the instruction, the terminals such as the smart phone and the ipad can send data stored in the terminals such as the smart phone and the ipad to the server for backup; meanwhile, the server can also send instructions to the terminals such as the smart phone and the ipad to format the terminals such as the smart phone and the ipad.
The embodiment of the invention discloses a data protection method and device, which can reduce the probability of data leakage. The following are detailed below.
Referring to fig. 1, fig. 1 is a schematic flow chart of a data protection method according to an embodiment of the present invention. As shown in fig. 1, the data protection method may include the following steps.
S101, the server detects whether a data protection mode trigger event aiming at the registered terminal is received, if so, the steps S102 and S103 are executed, otherwise, the process is ended.
In the embodiment of the present invention, the server may refer to a computer device having performance such as computing capability, storage capability, and stability. Examples of the server include a non-86 server such as a mainframe, a mini-machine, and a UNIX server, and an x86 server. Alternatively, a personal computer with general performance may be used as the server.
The registered terminal may include a user equipment running an Android operating system, an iOS operating system, a Windows operating system, or other operating systems, such as a mobile phone, a mobile computer, an ipad tablet, a Personal Digital Assistant (PDA), etc., or a colloquially-called storage medium such as a mobile hard disk, a usb disk, etc.
The registered terminal may include a terminal registered in advance on the server, and the terminal registered on the server may be one or more. For example, when the registration terminal is a smart phone, the smart phone may input a phone serial number (IMEI) corresponding to the smart phone on a server registration interface shown in fig. 2A, and if the server verifies that the IMEI code is legal, the smart phone is successfully registered. It should be noted that the registered terminal in this embodiment and other embodiments of the present invention may be understood as a terminal that has been successfully registered with the server.
The data protection mode trigger event may include an identification number (e.g., a cell phone serial number, a user id, etc.) of the registered terminal and a data protection operation performed on the registered terminal. For example, a user (other terminal) may send the data protection mode trigger event on a data protection interface of the other terminal, and the user may send the data protection mode trigger event by clicking a registered terminal of the data protection interface and a data protection mode trigger key shown in fig. 2B, where clicking the registered terminal sends an id of the registered terminal, clicking the data protection mode trigger key sends a data protection operation executed by the registered terminal, and the like.
S102, the server sends a data protection mode starting instruction to the registered terminal, wherein the data protection mode starting instruction is used for instructing the registered terminal to send backup data and format the registered terminal.
When the server detects that the registered terminal is used through the identification number (e.g., a mobile phone serial number, a user id, etc.) of the registered terminal, step S102 may be executed. When the server detects that a terminal with the same id number as that of the registered terminal is accessing the internet in the network, step S102 may be executed. For example, when a terminal such as a smart phone or an ipad having the same id number as the id number of the registered terminal is accessing the internet, the server may execute step S102; or, when the server detects that the mobile hard disk and the usb disk with the same id number as the id number of the registered terminal are connected to a computer through a data line to read data, the server may execute step S102. Wherein, the network may include a mobile voice call network, a mobile data network, or a WIreless Fidelity (wifi) network; the data line may include an OTG line (english: On The Go), RS232, or RS485, etc.
The backup data according to the present invention may refer to a part of or all of data stored in a registered terminal such as a smart phone, an ipad, a mobile hard disk, or a usb disk. Formatting the registered terminal can restore the registered terminal to factory settings or completely delete all data in the registered terminal, etc. Where the data may refer to pictures, video, audio, or documents, etc.
The embodiment can be applied to the case that when a registered terminal such as a smart phone, an ipad, a mobile hard disk or a usb disk is lost, a user can start a registered terminal data protection mode on the data protection interface by using a registered terminal of the data protection interface and a data protection mode trigger key, when the server detects that the registered terminal is used (for example, when the mobile phone, the ipad is powered on to surf the internet, or the mobile hard disk or the usb disk is connected to a computer through a data line and other equipment is used for reading data), the server can send a data protection mode start instruction to the registered terminal, and after receiving the data protection mode start instruction, the registered terminal sends data such as an internally stored picture, video or audio to the server and restores factory settings.
S103, the server receives the backup data sent by the registered terminal and backs up the backup data.
Optionally, after step S103 is executed, the server detects whether the backup data is successfully backed up, if so, performs formatting on the registered terminal, and if not, may execute at least one backup data operation of step S102, and then perform formatting on the registered terminal, and the like.
Optionally, the server may further receive target backup data sent by the registered terminal, and backup the target backup data, where the target backup data is selected by the registered terminal from high to low according to the current network state and a preset data backup priority.
In this embodiment, the current network state may include a network unblocked state, a network blocked state, and the like, the registration terminal may store a plurality of data, each data in the plurality of data corresponds to one preset data backup priority, and if the current network state is the network unblocked state, the registration terminal may select a larger number of data as the target backup data in a sequence from high to low according to the preset data backup priorities; if the current network state is the network congestion state, the registration terminal may select less data as the target backup data according to the preset data backup priority from high to low.
For example, if the plurality of data are the picture 1, the picture 2, the picture 3, and the picture 4, the preset data backup priority corresponding to the picture 1 is 10, the preset data backup priority corresponding to the picture 2 is 20, the preset data backup priority corresponding to the picture 3 is 30, and the preset data backup priority corresponding to the picture 4 is 40, and if the current network state is the network smooth state, the registration terminal may select the picture 4, the picture 3, and the picture 2 as the target backup data according to the preset data backup priorities corresponding to the plurality of data from high to low. If the current network state is the network congestion state, the registration terminal may select the picture 4 and the picture 3 as the target backup data according to the preset data backup priorities corresponding to the plurality of data from high to low.
The higher the preset data backup priority is, the more important the data is, so that in the embodiment, when the network is relatively blocked, the important data can be preferentially selected for backup, and the serious loss caused by the failure of the important data backup due to the network blockage is avoided.
Optionally, after step S103 is executed, the server may further send a registered terminal locking instruction to the registered terminal, where the registered terminal locking instruction is used to enable the registered terminal to be in a locked state; or, the server may also send a geographic location request instruction to the registered terminal to trigger the registered terminal to send the current geographic location to the server, and the like.
By implementing the embodiment, under the condition that the registered terminal such as a smart phone is lost, a non-user can be prevented from using the registered terminal and the lost registered terminal can be positioned, so that the registered terminal can be conveniently found subsequently.
In the method described in fig. 1, the server may send a data protection mode on command to the registered terminal to backup the backup data sent by the registered terminal, and format the registered terminal. It can be seen that, by implementing the method described in fig. 1, when the registered terminals such as the smart phone and the ipad are lost, the server can back up the data stored in the registered terminals such as the smart phone and the ipad to avoid data loss, and can format the registered terminals such as the smart phone and the ipad to reduce the leakage probability of the data stored in the registered terminals such as the smart phone and the ipad.
Referring to fig. 2C, fig. 2C is a schematic flow chart of another data protection method according to an embodiment of the invention. As shown in fig. 2C, the data protection method may include the following steps.
S201, the registered terminal receives a data protection mode starting instruction which is sent by the server and aims at the registered terminal.
And S202, the registered terminal sends backup data to the server according to the data protection mode starting instruction.
The backup data according to the present invention may refer to a part of or all of data stored in a registered terminal such as a smart phone, an ipad, a mobile hard disk, or a usb disk. Where the data may refer to pictures, video, audio, or documents, etc.
And S203, the registered terminal formats the registered terminal according to the data protection mode starting instruction.
Formatting the registered terminal can restore the registered terminal to factory settings or completely delete all data in the registered terminal, etc.
Optionally, the registered terminal may further obtain a current network state, where the current network state includes clear or blocked; if the current network state is smooth, selecting first target backup data; if the current network state is blocking, selecting second target backup data; and sending the first target backup data or the second target backup data to the server.
Optionally, if the current network state is congestion, selecting corresponding second target backup data from high to low according to a preset data backup priority.
In this embodiment, the registration terminal may store a plurality of data, each of the plurality of data corresponds to one preset data backup priority, and if the current network state is the network unblocked state, the registration terminal may select more data as the first target backup data in an order from high to low according to the preset data backup priorities; if the current network state is the network congestion state, the registration terminal may select less data as the second target backup data according to the preset data backup priority from high to low.
For example, if the plurality of data are the picture 1, the picture 2, the picture 3, and the picture 4, the preset data backup priority corresponding to the picture 1 is 10, the preset data backup priority corresponding to the picture 2 is 20, the preset data backup priority corresponding to the picture 3 is 30, and the preset data backup priority corresponding to the picture 4 is 40, and if the current network state is the network smooth state, the registration terminal may select the picture 4, the picture 3, and the picture 2 as the first target backup data according to the preset data backup priorities corresponding to the plurality of data from high to low. If the current network state is the network congestion state, the registration terminal may select the picture 4 and the picture 3 as the second target backup data according to the preset data backup priorities corresponding to the plurality of data from high to low.
In the method described in fig. 2C, when a registration terminal such as a smartphone or an ipad is lost, the registration terminal may send data stored inside to the server for backup, and the registration terminal performs formatting at the same time, it can be seen that by implementing the method described in fig. 2C, when a registration terminal such as a smartphone or an ipad is lost, the leakage probability of the data stored in the registration terminal can be reduced.
Referring to fig. 3, fig. 3 is a schematic flow chart of a data protection system according to an embodiment of the present invention. As shown in fig. 3, the data protection system may include the following steps.
S301, the server detects whether a data protection mode trigger event for the registered terminal is received, if so, steps S301 to S306 are executed, otherwise, the process is ended.
The data protection mode trigger event may include an identification number (e.g., a mobile phone serial number, a user id, etc.) of the registered terminal and a data protection operation performed on the registered terminal; for example, the user may send the data protection mode trigger event by clicking a registered terminal of the data protection interface and a data protection mode trigger key shown in fig. 2B, where the user clicks an id of the registered terminal that is sent by the registered terminal, and clicks the data protection mode trigger key, i.e., sends a data protection operation executed by the registered terminal.
S302, the server sends a data protection mode opening instruction to the registered terminal, wherein the data protection mode opening instruction is used for instructing the registered terminal to send backup data and format the registered terminal.
In this embodiment, the definitions of the registered terminal and the server may refer to the description in fig. 1, and are not described herein again.
When the server detects that the registered terminal is used through the identification number (e.g., a mobile phone serial number, a user id, etc.) of the registered terminal, step S302 may be executed. When the server detects that a terminal with the same identification number as that of the registered terminal is in networking use, the server may execute step S302. For example, when a terminal such as a smart phone or an ipad with the same id number as the registered terminal is being used for networking, the server may execute step S302; or, when the server detects that the mobile hard disk and the usb disk with the same id number as the id number of the registered terminal are connected to a computer through a data line to read data, the server may execute step S302. Wherein, the network may include a mobile voice call network, a mobile data network, or a WIreless Fidelity (wifi) network; the data line may include an OTG line (english: On The Go), RS232, or RS485, etc.
S303, the registered terminal receives the data protection mode opening instruction for the registered terminal sent by the server.
And S304, the registered terminal sends backup data to the server according to the data protection mode starting instruction.
The backup data according to the present invention may refer to a part of or all of data stored in a registered terminal such as a smart phone, an ipad, a mobile hard disk, or a usb disk. Where the data may refer to pictures, video, audio, or documents, etc.
S305, the server receives the backup data sent by the registered terminal, and backs up the backup data.
S306, the registered terminal carries out formatting on the registered terminal according to the data protection mode starting instruction.
Formatting the registered terminal can restore the registered terminal to factory settings or completely delete all data in the registered terminal, etc.
Therefore, the system described by implementing fig. 3 can reduce the leakage probability of the data stored in the registration terminal when the registration terminal such as a smart phone, an ipad, etc. is lost.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a server according to an embodiment of the present invention. Wherein, the server shown in fig. 4 may include:
a receiving unit 402, configured to detect whether a data protection mode trigger event for a registered terminal is received.
A sending unit 401, configured to send a data protection mode starting instruction to a registered terminal when the receiving unit 402 receives the data protection mode trigger event, where the data protection mode starting instruction is used to instruct the registered terminal to send backup data and format the registered terminal.
The receiving unit 402 is further configured to receive the backup data sent by the registered terminal.
A processing unit 403, configured to backup the backup data received by the receiving unit 402.
Optionally, the receiving unit 402 is specifically configured to receive the target backup data sent by the registered terminal.
The processing unit 403 is specifically configured to backup the target backup data received by the receiving unit 402, where the target backup data is selected by the registered terminal according to a current network state and a preset data backup priority from high to low.
In this embodiment, the current network state may include a network unblocked state, a network blocked state, and the like, the registration terminal may store a plurality of data, each data in the plurality of data corresponds to one preset data backup priority, and if the current network state is the network unblocked state, the registration terminal may select a larger number of data as the target backup data in a sequence from high to low according to the preset data backup priorities; if the current network state is the network congestion state, the registration terminal may select less data as the target backup data according to the preset data backup priority from high to low.
For example, if the plurality of data are the picture 1, the picture 2, the picture 3, and the picture 4, the preset data backup priority corresponding to the picture 1 is 10, the preset data backup priority corresponding to the picture 2 is 20, the preset data backup priority corresponding to the picture 3 is 30, and the preset data backup priority corresponding to the picture 4 is 40, and if the current network state is the network smooth state, the registration terminal may select the picture 4, the picture 3, and the picture 2 as the target backup data according to the preset data backup priorities corresponding to the plurality of data from high to low. If the current network state is the network congestion state, the registration terminal may select the picture 4 and the picture 3 as the target backup data according to the preset data backup priorities corresponding to the plurality of data from high to low.
The sending unit 401 is further configured to send a registered terminal lock instruction to the registered terminal after the backup data is backed up, where the registered terminal lock instruction is used to enable the registered terminal to be in a locked state.
Therefore, the server described in the embodiment of fig. 4 can reduce the leakage probability of the data stored in the registration terminal when the registration terminal such as a smart phone, an ipad, etc. is lost.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a registration terminal according to an embodiment of the present invention. The registering terminal shown in fig. 5 may include:
the receiving unit 501 receives a data protection mode activation instruction for a registered terminal sent by a server.
A sending unit 502, configured to send backup data to the server according to the data protection mode start instruction received by the receiving unit 501.
A processing unit 503, configured to format the registered terminal according to the data protection mode activation instruction received by the receiving unit 501.
Optionally, the sending unit 502 is specifically configured to obtain a current network state, where the current network state includes clear or blocked; if the current network state is smooth, selecting first target backup data; if the current network state is blocking, selecting second target backup data; and sending the first target backup data or the second target backup data to the server.
The sending unit 502, when executing the step of selecting the second target backup data if the current network state is congestion, is specifically configured to select the corresponding second target backup data from high to low according to the preset data backup priority if the current network state is congestion.
In this embodiment, the registration terminal may store a plurality of data, each of the plurality of data corresponds to one preset data backup priority, and if the current network state is the network unblocked state, the registration terminal may select more data as the first target backup data in an order from high to low according to the preset data backup priorities; if the current network state is the network congestion state, the registration terminal may select less data as the second target backup data according to the preset data backup priority from high to low.
For example, if the plurality of data are the picture 1, the picture 2, the picture 3, and the picture 4, the preset data backup priority corresponding to the picture 1 is 10, the preset data backup priority corresponding to the picture 2 is 20, the preset data backup priority corresponding to the picture 3 is 30, and the preset data backup priority corresponding to the picture 4 is 40, and if the current network state is the network smooth state, the registration terminal may select the picture 4, the picture 3, and the picture 2 as the first target backup data according to the preset data backup priorities corresponding to the plurality of data from high to low. If the current network state is the network congestion state, the registration terminal may select the picture 4 and the picture 3 as the second target backup data according to the preset data backup priorities corresponding to the plurality of data from high to low.
Therefore, the registration terminal described in the implementation of fig. 5 can reduce the leakage probability of the data stored in the registration terminal when the registration terminal such as a smart phone, an ipad, etc. is lost.
Fig. 6 shows a computer system 10 based on the von neumann architecture running the above-described application interface switching method. The computer system 10 may be a user terminal device such as a smart phone, a tablet computer, a palm computer, a notebook computer or a personal computer. Specifically, an external input interface 1001, a processor 1002, a memory 1003, and an output interface 1004 connected through a system bus may be included. The external input interface 1001 may include a touch screen 10016, and optionally a network interface 10018. Memory 1003 can include external memory 10032 (e.g., a hard disk, optical or floppy disk, etc.) and internal memory 10034. Output interfaces 1004 may include devices such as a display 10042 and speakers 10044.
In the present embodiment, the method is executed based on a computer program, the program file of the computer program is stored in the external memory 10032 of the computer system 10 based on the von neumann system, and is loaded into the internal memory 10034 during the execution, and then is compiled into machine code and then is transmitted to the processor 1002 for execution, so that the operation monitoring module 310, the fingerprint detection module 320, the interface switching module 330, the pressure value judging module 340, the first step size determining module 350 and the second step size determining module 360 which are logically formed in the computer system 10 based on the von neumann system are all received through the external input interface 1001 during the execution of the application interface switching method, and are transmitted to the memory 1003 for buffering, and then are input to the processor 1002 for processing, and the result data of the processing is buffered in the memory 1003 for subsequent processing, or passed to the output interface 1004 for output.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the server in the embodiment of the invention can be merged, divided and deleted according to actual needs.
The units in the registration terminal of the embodiment of the invention can be merged, divided and deleted according to actual needs.
It will be understood by those skilled in the art that all or part of the steps in the methods of the embodiments described above may be implemented by program instructions associated with hardware, and the program may be stored in a computer-readable storage medium, which includes Read-Only Memory (ROM), Random Access Memory (RAM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), One-time Programmable Read-Only Memory (OTPROM), electrically Erasable Programmable Read-Only Memory (EEPROM), compact disc-Read-Only Memory (CD-ROM), or other Memory, magnetic disk, magnetic tape, or magnetic tape, Or any other medium which can be used to carry or store data and which can be read by a computer.
The data protection method and device disclosed by the embodiment of the invention are described in detail, a specific example is applied in the text to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in view of the above, the content of the present specification should not be construed as a limitation to the present invention.
Claims (7)
1. A method for data protection, the method comprising:
detecting whether a data protection mode trigger event aiming at a registered terminal sent by other terminals is received or not, and detecting that a terminal with the same identity number as that of the registered terminal exists in a network or detecting that a mobile hard disk and a U disk with the same identity number as that of the registered terminal are connected with computer equipment by a server;
if so, sending a data protection mode starting instruction to the registered terminal, wherein the data protection mode starting instruction is used for instructing the registered terminal to send backup data and format the registered terminal;
receiving the backup data sent by the registered terminal, and backing up the backup data;
the receiving the backup data sent by the registered terminal and backing up the backup data includes:
receiving target backup data sent by the registration terminal, and backing up the target backup data, wherein the target backup data is selected by the registration terminal from high to low according to the current network state and a preset data backup priority, and each piece of data in the target terminal corresponds to one backup priority; the amount of the target backup data is determined according to the current network state.
2. The method of claim 1, wherein after the backup of the backup data, the method further comprises:
and sending a registered terminal locking instruction to the registered terminal, wherein the registered terminal locking instruction is used for enabling the registered terminal to be in a locking state.
3. A method for data protection, the method comprising:
receiving a data protection mode starting instruction aiming at a registered terminal and sent by a server;
sending backup data to the server according to the data protection mode starting instruction;
formatting the registered terminal according to the data protection mode starting instruction;
the sending backup data to the server according to the data protection mode starting instruction comprises:
acquiring a current network state, wherein the current network state comprises unblocked or blocked;
if the current network state is smooth, selecting first target backup data;
if the current network state is blocking, selecting second target backup data;
sending the first target backup data or the second target backup data to the server;
the first target backup data and the second target backup data are selected from high to low according to the current network state and the preset data backup priority of the terminal, and each piece of data in the target terminal corresponds to one backup priority; the amount of the target backup data is determined according to the current network state.
4. The method of claim 3, wherein selecting a second target backup data if the current network status is congested comprises:
and if the current network state is blocking, selecting corresponding second target backup data from high to low according to a preset data backup priority.
5. A server, characterized in that the server comprises:
the receiving unit is used for detecting whether a data protection mode trigger event aiming at a registered terminal sent by other terminals is received or not, and the server detects that a terminal with the same identity number as that of the registered terminal exists in a network or the server detects that a mobile hard disk and a U disk with the same identity number as that of the registered terminal are connected with computer equipment;
a sending unit, configured to send a data protection mode starting instruction to the registered terminal when the receiving unit receives the data protection mode trigger event, where the data protection mode starting instruction is used to instruct the registered terminal to send backup data and format the registered terminal;
the receiving unit is further configured to receive the backup data sent by the registered terminal;
the processing unit is used for backing up the backup data received by the receiving unit;
the receiving unit is specifically configured to receive the target backup data sent by the registration terminal;
the processing unit is specifically configured to backup the target backup data received by the receiving unit, where the target backup data is selected by the registration terminal from high to low according to a current network state and a preset data backup priority, and each piece of data in the target terminal corresponds to one backup priority; the amount of the target backup data is determined according to the current network state.
6. The server according to claim 5, wherein the receiving unit is specifically configured to receive the target backup data sent by the registered terminal;
the processing unit is specifically configured to backup the target backup data received by the receiving unit, where the target backup data is selected by the registration terminal from high to low according to a current network state and a preset data backup priority;
the sending unit is further configured to send a registered terminal locking instruction to the registered terminal after the backup data is backed up, where the registered terminal locking instruction is used to enable the registered terminal to be in a locked state.
7. A registered terminal, characterized in that the registered terminal comprises:
the receiving unit is used for receiving a data protection mode starting instruction which is sent by the server and aims at the registered terminal;
a sending unit, configured to send backup data to the server according to the data protection mode start instruction received by the receiving unit;
the processing unit is used for formatting the registered terminal according to the data protection mode starting instruction received by the receiving unit;
the sending unit is specifically configured to obtain a current network state, where the current network state includes unblocked or blocked;
if the current network state is smooth, selecting first target backup data;
if the current network state is blocking, selecting second target backup data;
sending the first target backup data or the second target backup data to the server;
the sending unit is specifically configured to select corresponding second target backup data from high to low according to a preset data backup priority if the current network state is blocked, and each piece of data in the target terminal corresponds to one backup priority when the step of selecting the second target backup data is executed if the current network state is blocked; the amount of the target backup data is determined according to the current network state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610974399.2A CN106603625B (en) | 2016-11-04 | 2016-11-04 | Data protection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610974399.2A CN106603625B (en) | 2016-11-04 | 2016-11-04 | Data protection method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106603625A CN106603625A (en) | 2017-04-26 |
CN106603625B true CN106603625B (en) | 2020-03-03 |
Family
ID=58589739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610974399.2A Expired - Fee Related CN106603625B (en) | 2016-11-04 | 2016-11-04 | Data protection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106603625B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109544289B (en) * | 2018-11-15 | 2020-12-18 | 深圳市福尔科技有限公司 | Method and system for realizing online wholesale |
CN110445980A (en) * | 2019-07-04 | 2019-11-12 | 深圳市大拿科技有限公司 | A kind of mobile phone remote image capture method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7380279B2 (en) * | 2001-07-16 | 2008-05-27 | Lenel Systems International, Inc. | System for integrating security and access for facilities and information systems |
US7860793B2 (en) * | 2008-04-02 | 2010-12-28 | Microsoft Corporation | Smart secure storage |
CN103235703A (en) * | 2013-04-11 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Method and device for storing preset resource |
CN104346579A (en) * | 2014-10-29 | 2015-02-11 | 北京数字天域科技股份有限公司 | Method, device and system for protecting private information of mobile terminal |
CN104853032A (en) * | 2015-03-28 | 2015-08-19 | 深圳市金立通信设备有限公司 | Data processing method |
US9189170B2 (en) * | 2012-06-12 | 2015-11-17 | Commvault Systems, Inc. | External storage manager for a data storage cell |
CN105430178A (en) * | 2015-11-05 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Wristband, mobile terminal and security information processing method and system thereof, and communication system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106066968A (en) * | 2016-05-30 | 2016-11-02 | 北京小米移动软件有限公司 | Data guard method and device |
-
2016
- 2016-11-04 CN CN201610974399.2A patent/CN106603625B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7380279B2 (en) * | 2001-07-16 | 2008-05-27 | Lenel Systems International, Inc. | System for integrating security and access for facilities and information systems |
US7860793B2 (en) * | 2008-04-02 | 2010-12-28 | Microsoft Corporation | Smart secure storage |
US9189170B2 (en) * | 2012-06-12 | 2015-11-17 | Commvault Systems, Inc. | External storage manager for a data storage cell |
CN103235703A (en) * | 2013-04-11 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Method and device for storing preset resource |
CN104346579A (en) * | 2014-10-29 | 2015-02-11 | 北京数字天域科技股份有限公司 | Method, device and system for protecting private information of mobile terminal |
CN104853032A (en) * | 2015-03-28 | 2015-08-19 | 深圳市金立通信设备有限公司 | Data processing method |
CN105430178A (en) * | 2015-11-05 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Wristband, mobile terminal and security information processing method and system thereof, and communication system |
Also Published As
Publication number | Publication date |
---|---|
CN106603625A (en) | 2017-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9569607B2 (en) | Security verification method and apparatus | |
US20090298468A1 (en) | System and method for deleting data in a communication device | |
US10104063B2 (en) | Android-based mobile equipment security protection method, and device | |
US8359008B2 (en) | Security system and method for an electronic device | |
CN106227585B (en) | Application program starting method, device and equipment | |
CN104320756A (en) | Account information changing method and device | |
CN107645582B (en) | Information changing method, terminal equipment and computer readable medium | |
CN106681813B (en) | System management method and device | |
KR20130066901A (en) | Apparatus and method for analyzing malware in data analysis system | |
CN106599115B (en) | Data protection method, device and terminal | |
CN106648974A (en) | Data backup method and mobile terminal | |
CN106603625B (en) | Data protection method and device | |
US9626676B2 (en) | Secured online transactions | |
CN106507300A (en) | A kind of method for giving loss terminal for change, device and terminal | |
CN108762983B (en) | Multimedia data recovery method and device | |
CN103152724A (en) | Method and system for locking SIM (subscriber identity module) card by utilizing hardware | |
US9854444B2 (en) | Apparatus and methods for preventing information disclosure | |
CN109829279B (en) | Unlocking event processing method and related equipment | |
CN106102011A (en) | Method, device and the terminal that a kind of terminal positioning processes | |
CN112989323B (en) | Process detection method, device, terminal and storage medium | |
CN104281811A (en) | Terminal self-destruction method, system and device | |
CN111093186B (en) | eSIM card operator file management method and system | |
CN104036203A (en) | Information security management method and information security management system | |
CN108897639B (en) | File processing method and device | |
CN109104759B (en) | Interaction method of electronic equipment, electronic equipment and computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200303 |