CN106709369A - Data processing method and data processing apparatus for terminal exception - Google Patents

Data processing method and data processing apparatus for terminal exception Download PDF

Info

Publication number
CN106709369A
CN106709369A CN201611221219.XA CN201611221219A CN106709369A CN 106709369 A CN106709369 A CN 106709369A CN 201611221219 A CN201611221219 A CN 201611221219A CN 106709369 A CN106709369 A CN 106709369A
Authority
CN
China
Prior art keywords
terminal
critical data
data processing
storage areas
secure storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201611221219.XA
Other languages
Chinese (zh)
Inventor
王少锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201611221219.XA priority Critical patent/CN106709369A/en
Publication of CN106709369A publication Critical patent/CN106709369A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

The invention provides a data processing method and a data processing apparatus for terminal exception. The data processing method for terminal exception comprises the steps of monitoring whether a terminal is in a preset exceptional state or not; if it is monitored that the terminal is in the exceptional state, obtaining key data in the terminal; and moving the key data to a security storage region with access right limitation from an initial position of the key data for performing storage. Through the technical scheme, the security of the key data in the terminal can be ensured in the exceptional state of the terminal.

Description

Data processing method and data processing equipment during terminal abnormal
Technical field
The present invention relates to field of terminal technology, data processing method during in particular to a kind of terminal abnormal and Plant data processing equipment during terminal abnormal.
Background technology
With the popularization of various terminals (such as mobile phone, panel computer), user freely can install various in terminal APP (Application, application program), can meet various demands.But, the APP of various malice is there may be in network, Once maloperation is installed, may result in terminal poisoning or by unauthorized access, now the critical data in terminal be easy to by Intercept, distort, unsafe hidden danger is brought to user.
Therefore, the safety of the critical data in how ensureing terminal under terminal abnormal state turns into technology urgently to be resolved hurrily Problem.
The content of the invention
The present invention is based on above mentioned problem, it is proposed that a kind of new technical scheme, can be protected under terminal abnormal state The safety of the critical data in card terminal.
In view of this, data processing method when the first aspect of the present invention proposes a kind of terminal abnormal, including:Monitoring Whether terminal is in default abnormality;If monitoring, the terminal is in the abnormality, in obtaining the terminal Critical data;The critical data is moved on to from its initial position and is deposited in the secure storage areas with access rights limitation Storage.
In the technical scheme, when terminal is in abnormality, safety is transferred to by by the critical data in terminal In memory block, because at access safety memory block, the user with access rights limitation could access, without access rights The user of limitation can not access, and so as to critical data isolation be got up, and then ensure that the security of critical data.
In the above-mentioned technical solutions, alternatively, also include:If the terminal returns to normal shape from the abnormality State, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
It is original initial by the way that critical data returned to when terminal returns to normal condition in the technical scheme Position, it is to avoid the data of storing excess in secure storage areas, during so as to ensure that next terminal occurs abnormal, in secure storage areas There are enough memory spaces to store critical data.
In any of the above-described technical scheme, alternatively, whether the step of default abnormality is in the monitoring terminal Before rapid, also include:When the establishment signal triggered when the terminal is first powered on is received, the secure storage areas are created.
In the technical scheme, secure storage areas are created that when terminal is first powered on, so as to begin to use it in terminal Afterwards it is ensured that the security of critical data.
It is alternatively, described that the critical data is moved on to visit from its initial position in any of the above-described technical scheme After the step of being stored in the secure storage areas for asking authority limitation, also include:The critical data is moved on to institute by output State the prompting in secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the technical scheme, when terminal occurs abnormal, pointed out by exporting, to point out user to move critical data To in secure storage areas, so that the critical data that user is understood in present terminal is safe, do not made due to terminal abnormal Critical data is obtained to be illegally accessed.In addition, processed for the exception of terminal by pointing out user, to enable the terminals to as early as possible Return to normal condition.
In any of the above-described technical scheme, alternatively, the critical data includes one below or various combinations:Pay Information, account log-on message, associated person information, chat record, user's travel information, the short message that includes identifying code.
In the technical scheme, it is isolated in secure storage section by the critical data in will be above-mentioned, it is to avoid crucial number According to being compromised, so as to ensure that the security of critical data.
The second aspect of the present invention proposes data processing equipment during a kind of terminal abnormal, including:Monitoring unit, is used for Whether monitoring terminal is in default abnormality;Acquiring unit, if monitoring that the terminal is in for the monitoring unit The abnormality, then obtain the critical data in the terminal;Memory cell, for by the critical data from its initial bit Put move on to access rights limitation secure storage areas in stored.
In the technical scheme, when terminal is in abnormality, safety is transferred to by by the critical data in terminal In memory block, because at access safety memory block, the user with access rights limitation could access, without access rights The user of limitation can not access, and so as to critical data isolation be got up, and then ensure that the security of critical data.
In the above-mentioned technical solutions, alternatively, the memory cell is additionally operable to, if the terminal is extensive from the abnormality Normal condition is arrived again, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
It is original initial by the way that critical data returned to when terminal returns to normal condition in the technical scheme Position, it is to avoid the data of storing excess in secure storage areas, during so as to ensure that next terminal occurs abnormal, in secure storage areas There are enough memory spaces to store critical data.
In any of the above-described technical scheme, alternatively, also include:Creating unit, for receiving the terminal first During the establishment signal triggered during start, the secure storage areas are created.
In the technical scheme, secure storage areas are created that when terminal is first powered on, so as to begin to use it in terminal Afterwards it is ensured that the security of critical data.
In any of the above-described technical scheme, alternatively, also include:Output unit, for exporting by the critical data Move on to the prompting in the secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the technical scheme, when terminal occurs abnormal, pointed out by exporting, to point out user to move critical data To in secure storage areas, so that the critical data that user is understood in present terminal is safe, do not made due to terminal abnormal Critical data is obtained to be illegally accessed.In addition, processed for the exception of terminal by pointing out user, to enable the terminals to as early as possible Return to normal condition.
In any of the above-described technical scheme, alternatively, the critical data includes one below or various combinations:Pay Information, account log-on message, associated person information, chat record, user's travel information, the short message that includes identifying code.
In the technical scheme, it is isolated in secure storage section by the critical data in will be above-mentioned, it is to avoid crucial number According to being compromised, so as to ensure that the security of critical data.
By technical scheme, the safety of the critical data in can ensureing terminal under terminal abnormal state.
Brief description of the drawings
The flow of data processing method when Fig. 1 shows terminal abnormal according to an embodiment of the invention is illustrated Figure;
The flow of data processing method when Fig. 2 shows terminal abnormal according to another embodiment of the invention is illustrated Figure;
The structural representation of data processing equipment when Fig. 3 shows terminal abnormal according to an embodiment of the invention Figure;
Fig. 4 shows the structural representation of terminal according to an embodiment of the invention.
Specific embodiment
It is below in conjunction with the accompanying drawings and specific real in order to the above objects, features and advantages of the present invention can be more clearly understood that Mode is applied to be further described in detail the present invention.It should be noted that in the case where not conflicting, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description in order to fully understand the present invention, but, the present invention may be used also Implemented with being different from other modes described here using other, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
The flow of data processing method when Fig. 1 shows terminal abnormal according to an embodiment of the invention is illustrated Figure.
As shown in figure 1, data processing method during terminal abnormal according to an embodiment of the invention, including:
Whether step 102, monitoring terminal is in default abnormality.
Alternatively, abnormality is including terminal poisoning, by malicious access and by malicious attack.
Step 104, if monitoring, the terminal is in the abnormality, obtains the critical data in the terminal.
Alternatively, critical data includes but is not limited to one below or various combinations:Payment information, account log in letter Breath, associated person information, chat record, user's travel information, the short message that includes identifying code.
Wherein, payment information can be the payment of the payment softwares such as payment cipher, or Alipay, the wechat of bank Password and payment fingerprint etc..Account log-on message can be logged on the account and password of Web bank, can also be wechat, QQ etc. The account and password of application program.Associated person information can be the associated person information in address list, can also be QQ or wechat In associated person information.Chat record includes the chat record in application program (such as wechat, QQ).
Step 106, the critical data is moved on in the secure storage areas with access rights limitation from its initial position Stored.
In the technical scheme, when terminal is in abnormality, safety is transferred to by by the critical data in terminal In memory block, because at access safety memory block, the user with access rights limitation could access, without access rights The user of limitation can not access, and so as to critical data isolation be got up, and then ensure that the security of critical data.
In addition, by critical data from its initial position move on to secure storage areas in stored after, if receiving use The request of family access safety memory block, judges whether the user has the authority for accessing the secure storage areas, if the user has visiting Ask that authority is limited, then allow user's access safety memory block, if the user limits without access rights, forbid user to access Secure storage areas.
Wherein, by critical data from its initial position move on to secure storage areas in stored after, by encrypt calculate Method is encrypted to secure storage areas, if receiving the request of user's access safety memory block, to the decruption key of the user Verified to judge whether the user has the authority of access safety memory block.Wherein, AES includes RSA public key encryptions Algorithm.
Or detect whether the user judges whether the user has access safety memory block in the default trust group Authority.
In the above-mentioned technical solutions, alternatively, also include:If the terminal returns to normal shape from the abnormality State, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
It is original initial by the way that critical data returned to when terminal returns to normal condition in the technical scheme Position, it is to avoid the data of storing excess in secure storage areas, during so as to ensure that next terminal occurs abnormal, in secure storage areas There are enough memory spaces to store critical data.
In any of the above-described technical scheme, alternatively, before step 102, also include:Opened first the terminal is received During the establishment signal triggered during machine, the secure storage areas are created.
In the technical scheme, secure storage areas are created that when terminal is first powered on, so as to begin to use it in terminal Afterwards it is ensured that the security of critical data.
In any of the above-described technical scheme, alternatively, after step 106, also include:Output moves the critical data To the prompting in the secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the technical scheme, when terminal occurs abnormal, critical data is moved on into safe storage by pointing out user Qu Zhong, so that the critical data that user is understood in present terminal is safe, critical data is caused not due to terminal abnormal It is illegally accessed.In addition, processed for the exception of terminal by pointing out user, to enable the terminals to return to as early as possible normally State.
The flow of data processing method when Fig. 2 shows terminal abnormal according to another embodiment of the invention is illustrated Figure.
As shown in Fig. 2 data processing method during terminal abnormal according to another embodiment of the invention, including:
Step 202, creates secure storage areas.
Step 204, the state of monitoring terminal.
Step 206, judges that whether terminal, in abnormality, if it is determined that terminal is in abnormality, then performs step 208, if monitoring, terminal is not in abnormality, terminates this flow.
Step 208, the critical data in identification terminal.Wherein, critical data includes but is not limited to one below or various Combination:Payment information, account log-on message, associated person information, chat record, user's travel information, include identifying code Short message.
Step 210, is stored during critical data is moved on into the secure storage areas with access rights limitation.
Step 212, points out that specific which critical data of user is moved in secure storage areas.
The structural representation of data processing equipment when Fig. 3 shows terminal abnormal according to an embodiment of the invention Figure.
As shown in figure 3, the data processing equipment 300 during terminal abnormal according to an embodiment of the invention, including:Prison Survey unit 302, acquiring unit 304 and memory cell 306.
Whether monitoring unit 302, default abnormality is in for monitoring terminal;Acquiring unit 304, if for described Monitoring unit 302 monitors that the terminal is in the abnormality, then obtain the critical data in the terminal;Memory cell 306, stored in the secure storage areas with access rights limitation for the critical data to be moved on to from its initial position.
In the technical scheme, when terminal is in abnormality, safety is transferred to by by the critical data in terminal In memory block, because at access safety memory block, the user with access rights limitation could access, without access rights The user of limitation can not access, and so as to critical data isolation be got up, and then ensure that the security of critical data.
In the above-mentioned technical solutions, alternatively, the memory cell 306 is additionally operable to, if the terminal is from the abnormal shape State returns to normal condition, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
It is original initial by the way that critical data returned to when terminal returns to normal condition in the technical scheme Position, it is to avoid the data of storing excess in secure storage areas, during so as to ensure that next terminal occurs abnormal, in secure storage areas There are enough memory spaces to store critical data.
In any of the above-described technical scheme, alternatively, also include:Creating unit 308, for receiving the terminal head During the establishment signal triggered during secondary start, the secure storage areas are created.
In the technical scheme, secure storage areas are created that when terminal is first powered on, so as to begin to use it in terminal Afterwards it is ensured that the security of critical data.
In any of the above-described technical scheme, alternatively, also include:Output unit 310, for exporting by the crucial number According to the prompting moved on in the secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the technical scheme, when terminal occurs abnormal, pointed out by exporting, to point out user to move critical data To in secure storage areas, so that the critical data that user is understood in present terminal is safe, do not made due to terminal abnormal Critical data is obtained to be illegally accessed.In addition, processed for the exception of terminal by pointing out user, to enable the terminals to as early as possible Return to normal condition.
In any of the above-described technical scheme, alternatively, the critical data includes one below or various combinations:Pay Information, account log-on message, associated person information, chat record, user's travel information, the short message that includes identifying code.
In the technical scheme, it is isolated in secure storage section by the critical data in will be above-mentioned, it is to avoid crucial number According to being compromised, so as to ensure that the security of critical data.
Fig. 4 shows the structural representation of terminal according to another embodiment of the invention.
As shown in figure 4, terminal 400 according to another embodiment of the invention, including processor 402, the and of memory 404 Communication bus 406.
Processor 402 can be general processor, for example central processing unit (Central Processing Unit, CPU), can also be digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention One or more integrated circuits.Memory 404, for store program codes, and is transferred to processor by the program code 402.Memory 404 can include volatile memory (Volatile Memory), such as random access memory (Random Access Memory, RAM);Memory 404 can also include nonvolatile memory (Non-Volatile Memory), example Such as read-only storage (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid state hard disc (Solid-State Drive, SSD);Memory 404 can also include the storage of mentioned kind The combination of device.Communication bus 406 is used to realize the connection communication between processor 402 and memory 404.Communication bus 406 can Being industry standard architecture (Industry Standard Architecture, ISA) bus, external equipment interconnection (Peripheral Component Interconnect, PCI) bus or extension standards architecture (Extended Industry Standard Architecture, EISA) bus etc..The communication bus 406 can be divided into address bus, data Bus, controlling bus etc..
Wherein, processor 402 is used for the program code for calling memory 404 to store, and performs following operation:Monitoring terminal Whether 400 be in default abnormality;If monitoring, the terminal 400 is in the abnormality, obtains the terminal Critical data in 400;The critical data is moved on in the secure storage areas with access rights limitation from its initial position Stored.
In the above-mentioned technical solutions, alternatively, processor 402 is additionally operable to, if the terminal 400 is extensive from the abnormality Normal condition is arrived again, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
In any of the above-described technical scheme, alternatively, processor 402 is additionally operable to, and is opened first the terminal 400 is received During the establishment signal triggered during machine, the secure storage areas are created.
In any of the above-described technical scheme, alternatively, processor 402 is additionally operable to, and output moves on to the critical data Prompting in the secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the above-mentioned technical solutions, alternatively, the critical data includes one below or various combinations:Disbursement letter Breath, account log-on message, associated person information, chat record, user's travel information, the short message for including identifying code.
Technical scheme is described in detail above in association with accompanying drawing, by technical scheme, can be at end Ensure the safety of the critical data in terminal under the abnormality of end.
In the present invention, term " first ", " second " are only used for the purpose for describing, and it is not intended that indicating or implying phase To importance;Term " multiple " represents two or more;Term " connection " etc. all should be interpreted broadly, for example, it may be It is fixedly connected, or is detachably connected, or be integrally connected, it is also possible to is indirectly connected with by intermediary.For ability For the those of ordinary skill in domain, above-mentioned term concrete meaning in the present invention can be as the case may be understood.
The preferred embodiments of the present invention are the foregoing is only, is not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.It is all within the spirit and principles in the present invention, made any repair Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (10)

1. data processing method during a kind of terminal abnormal, it is characterised in that including:
Whether monitoring terminal is in default abnormality;
If monitoring, the terminal is in the abnormality, obtains the critical data in the terminal;
The critical data is moved on to from its initial position and is stored in the secure storage areas with access rights limitation.
2. data processing method during terminal abnormal according to claim 1, it is characterised in that also include:
If the terminal returns to normal condition from the abnormality, the critical data is moved from the secure storage areas To the initial position of the critical data.
3. data processing method during terminal abnormal according to claim 1, it is characterised in that be in the monitoring terminal It is no in default abnormality the step of before, also include:
When the establishment signal triggered when the terminal is first powered on is received, the secure storage areas are created.
4. data processing method during terminal abnormal according to any one of claim 1 to 3, it is characterised in that described By the critical data from its initial position move on to access rights limitation secure storage areas in stored the step of it Afterwards, also include:
The critical data is moved on to the prompting in the secure storage areas, and/or output for the different of the terminal by output The prompting for often being processed.
5. data processing method during terminal abnormal according to any one of claim 1 to 3, it is characterised in that described Critical data includes one below or various combinations:Payment information, account log-on message, associated person information, chat record, use Family travel information, the short message for including identifying code.
6. data processing equipment during a kind of terminal abnormal, it is characterised in that including:
Whether monitoring unit, default abnormality is in for monitoring terminal;
Acquiring unit, if monitoring that the terminal is in the abnormality for the monitoring unit, obtains the terminal In critical data;
Memory cell, for the critical data to be moved on in the secure storage areas with access rights limitation from its initial position Stored.
7. data processing equipment during terminal abnormal according to claim 6, it is characterised in that the memory cell is also used In,
If the terminal returns to normal condition from the abnormality, the critical data is moved from the secure storage areas To the initial position of the critical data.
8. data processing equipment during terminal abnormal according to claim 6, it is characterised in that also include:
Creating unit, for when the establishment signal triggered when the terminal is first powered on is received, creating the safety storage Area.
9. data processing equipment during terminal abnormal according to any one of claim 6 to 8, it is characterised in that also wrap Include:
Output unit, the prompting in the secure storage areas is moved on to for exporting by the critical data, and/or output is directed to The prompting that the exception of the terminal is processed.
10. data processing equipment during terminal abnormal according to any one of claim 6 to 8, it is characterised in that described Critical data includes one below or various combinations:Payment information, account log-on message, associated person information, chat record, use Family travel information, the short message for including identifying code.
CN201611221219.XA 2016-12-26 2016-12-26 Data processing method and data processing apparatus for terminal exception Withdrawn CN106709369A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611221219.XA CN106709369A (en) 2016-12-26 2016-12-26 Data processing method and data processing apparatus for terminal exception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611221219.XA CN106709369A (en) 2016-12-26 2016-12-26 Data processing method and data processing apparatus for terminal exception

Publications (1)

Publication Number Publication Date
CN106709369A true CN106709369A (en) 2017-05-24

Family

ID=58902686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611221219.XA Withdrawn CN106709369A (en) 2016-12-26 2016-12-26 Data processing method and data processing apparatus for terminal exception

Country Status (1)

Country Link
CN (1) CN106709369A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332989A (en) * 2017-06-27 2017-11-07 中国联合网络通信集团有限公司 The data protection system and data guard method of mobile terminal
CN110071896A (en) * 2018-01-22 2019-07-30 中兴通讯股份有限公司 A kind of identity identifying method and computer equipment based on network communication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2642685A1 (en) * 2010-11-19 2013-09-25 Hwang, Young Man Method for providing active security authentication, and terminal and system for supporting same
CN105847554A (en) * 2016-03-24 2016-08-10 维沃移动通信有限公司 Data processing method during abnormal shutdown of mobile terminal and mobile terminal
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal
CN105930283A (en) * 2016-04-12 2016-09-07 珠海市魅族科技有限公司 Information storage method and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2642685A1 (en) * 2010-11-19 2013-09-25 Hwang, Young Man Method for providing active security authentication, and terminal and system for supporting same
CN105847554A (en) * 2016-03-24 2016-08-10 维沃移动通信有限公司 Data processing method during abnormal shutdown of mobile terminal and mobile terminal
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal
CN105930283A (en) * 2016-04-12 2016-09-07 珠海市魅族科技有限公司 Information storage method and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332989A (en) * 2017-06-27 2017-11-07 中国联合网络通信集团有限公司 The data protection system and data guard method of mobile terminal
CN107332989B (en) * 2017-06-27 2020-09-15 中国联合网络通信集团有限公司 Data protection system and data protection method of mobile terminal
CN110071896A (en) * 2018-01-22 2019-07-30 中兴通讯股份有限公司 A kind of identity identifying method and computer equipment based on network communication

Similar Documents

Publication Publication Date Title
CN101079882B (en) Posture-based data protection
CN105447406A (en) Method and apparatus for accessing storage space
US20030229791A1 (en) Method for private personal identification number management
US20070168677A1 (en) Changing user authentication method by timer and the user context
CN109412812B (en) Data security processing system, method, device and storage medium
JP2005196776A (en) Safe data communication method and its system between communication terminal and communication equipment
CN101340281A (en) Method and system for safe login input on network
CN107077561B (en) Method for verifying identity of upper-layer application, self-service terminal and application server
CN111813614A (en) Debugging processing method and device and debugging processing system
EP2767922A1 (en) Password audit system
US7596531B2 (en) Method and apparatus for protecting against side channel attacks against personal identification numbers
CN106485170A (en) A kind of data inputting method and device
CN104883364A (en) Method and device for judging abnormity of server accessed by user
US8978150B1 (en) Data recovery service with automated identification and response to compromised user credentials
CN106709369A (en) Data processing method and data processing apparatus for terminal exception
CN111046405A (en) Data processing method, device, equipment and storage medium
CN110691352B (en) SIM card access control method, device, medium and equipment
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN104955043B (en) A kind of intelligent terminal security protection system
CN112434301A (en) Risk assessment method and device
CN109347791B (en) Dual I/O bus SIM card
CN106778334A (en) The guard method of account information and mobile terminal
CN114861180B (en) Application program security detection method and device
KR101551537B1 (en) Information spill prevention apparatus
KR20100085459A (en) Personal information protecting device for using filtering network transferring data method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170524