CN106709369A - Data processing method and data processing apparatus for terminal exception - Google Patents
Data processing method and data processing apparatus for terminal exception Download PDFInfo
- Publication number
- CN106709369A CN106709369A CN201611221219.XA CN201611221219A CN106709369A CN 106709369 A CN106709369 A CN 106709369A CN 201611221219 A CN201611221219 A CN 201611221219A CN 106709369 A CN106709369 A CN 106709369A
- Authority
- CN
- China
- Prior art keywords
- terminal
- critical data
- data processing
- storage areas
- secure storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Abstract
The invention provides a data processing method and a data processing apparatus for terminal exception. The data processing method for terminal exception comprises the steps of monitoring whether a terminal is in a preset exceptional state or not; if it is monitored that the terminal is in the exceptional state, obtaining key data in the terminal; and moving the key data to a security storage region with access right limitation from an initial position of the key data for performing storage. Through the technical scheme, the security of the key data in the terminal can be ensured in the exceptional state of the terminal.
Description
Technical field
The present invention relates to field of terminal technology, data processing method during in particular to a kind of terminal abnormal and
Plant data processing equipment during terminal abnormal.
Background technology
With the popularization of various terminals (such as mobile phone, panel computer), user freely can install various in terminal
APP (Application, application program), can meet various demands.But, the APP of various malice is there may be in network,
Once maloperation is installed, may result in terminal poisoning or by unauthorized access, now the critical data in terminal be easy to by
Intercept, distort, unsafe hidden danger is brought to user.
Therefore, the safety of the critical data in how ensureing terminal under terminal abnormal state turns into technology urgently to be resolved hurrily
Problem.
The content of the invention
The present invention is based on above mentioned problem, it is proposed that a kind of new technical scheme, can be protected under terminal abnormal state
The safety of the critical data in card terminal.
In view of this, data processing method when the first aspect of the present invention proposes a kind of terminal abnormal, including:Monitoring
Whether terminal is in default abnormality;If monitoring, the terminal is in the abnormality, in obtaining the terminal
Critical data;The critical data is moved on to from its initial position and is deposited in the secure storage areas with access rights limitation
Storage.
In the technical scheme, when terminal is in abnormality, safety is transferred to by by the critical data in terminal
In memory block, because at access safety memory block, the user with access rights limitation could access, without access rights
The user of limitation can not access, and so as to critical data isolation be got up, and then ensure that the security of critical data.
In the above-mentioned technical solutions, alternatively, also include:If the terminal returns to normal shape from the abnormality
State, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
It is original initial by the way that critical data returned to when terminal returns to normal condition in the technical scheme
Position, it is to avoid the data of storing excess in secure storage areas, during so as to ensure that next terminal occurs abnormal, in secure storage areas
There are enough memory spaces to store critical data.
In any of the above-described technical scheme, alternatively, whether the step of default abnormality is in the monitoring terminal
Before rapid, also include:When the establishment signal triggered when the terminal is first powered on is received, the secure storage areas are created.
In the technical scheme, secure storage areas are created that when terminal is first powered on, so as to begin to use it in terminal
Afterwards it is ensured that the security of critical data.
It is alternatively, described that the critical data is moved on to visit from its initial position in any of the above-described technical scheme
After the step of being stored in the secure storage areas for asking authority limitation, also include:The critical data is moved on to institute by output
State the prompting in secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the technical scheme, when terminal occurs abnormal, pointed out by exporting, to point out user to move critical data
To in secure storage areas, so that the critical data that user is understood in present terminal is safe, do not made due to terminal abnormal
Critical data is obtained to be illegally accessed.In addition, processed for the exception of terminal by pointing out user, to enable the terminals to as early as possible
Return to normal condition.
In any of the above-described technical scheme, alternatively, the critical data includes one below or various combinations:Pay
Information, account log-on message, associated person information, chat record, user's travel information, the short message that includes identifying code.
In the technical scheme, it is isolated in secure storage section by the critical data in will be above-mentioned, it is to avoid crucial number
According to being compromised, so as to ensure that the security of critical data.
The second aspect of the present invention proposes data processing equipment during a kind of terminal abnormal, including:Monitoring unit, is used for
Whether monitoring terminal is in default abnormality;Acquiring unit, if monitoring that the terminal is in for the monitoring unit
The abnormality, then obtain the critical data in the terminal;Memory cell, for by the critical data from its initial bit
Put move on to access rights limitation secure storage areas in stored.
In the technical scheme, when terminal is in abnormality, safety is transferred to by by the critical data in terminal
In memory block, because at access safety memory block, the user with access rights limitation could access, without access rights
The user of limitation can not access, and so as to critical data isolation be got up, and then ensure that the security of critical data.
In the above-mentioned technical solutions, alternatively, the memory cell is additionally operable to, if the terminal is extensive from the abnormality
Normal condition is arrived again, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
It is original initial by the way that critical data returned to when terminal returns to normal condition in the technical scheme
Position, it is to avoid the data of storing excess in secure storage areas, during so as to ensure that next terminal occurs abnormal, in secure storage areas
There are enough memory spaces to store critical data.
In any of the above-described technical scheme, alternatively, also include:Creating unit, for receiving the terminal first
During the establishment signal triggered during start, the secure storage areas are created.
In the technical scheme, secure storage areas are created that when terminal is first powered on, so as to begin to use it in terminal
Afterwards it is ensured that the security of critical data.
In any of the above-described technical scheme, alternatively, also include:Output unit, for exporting by the critical data
Move on to the prompting in the secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the technical scheme, when terminal occurs abnormal, pointed out by exporting, to point out user to move critical data
To in secure storage areas, so that the critical data that user is understood in present terminal is safe, do not made due to terminal abnormal
Critical data is obtained to be illegally accessed.In addition, processed for the exception of terminal by pointing out user, to enable the terminals to as early as possible
Return to normal condition.
In any of the above-described technical scheme, alternatively, the critical data includes one below or various combinations:Pay
Information, account log-on message, associated person information, chat record, user's travel information, the short message that includes identifying code.
In the technical scheme, it is isolated in secure storage section by the critical data in will be above-mentioned, it is to avoid crucial number
According to being compromised, so as to ensure that the security of critical data.
By technical scheme, the safety of the critical data in can ensureing terminal under terminal abnormal state.
Brief description of the drawings
The flow of data processing method when Fig. 1 shows terminal abnormal according to an embodiment of the invention is illustrated
Figure;
The flow of data processing method when Fig. 2 shows terminal abnormal according to another embodiment of the invention is illustrated
Figure;
The structural representation of data processing equipment when Fig. 3 shows terminal abnormal according to an embodiment of the invention
Figure;
Fig. 4 shows the structural representation of terminal according to an embodiment of the invention.
Specific embodiment
It is below in conjunction with the accompanying drawings and specific real in order to the above objects, features and advantages of the present invention can be more clearly understood that
Mode is applied to be further described in detail the present invention.It should be noted that in the case where not conflicting, the implementation of the application
Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description in order to fully understand the present invention, but, the present invention may be used also
Implemented with being different from other modes described here using other, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
The flow of data processing method when Fig. 1 shows terminal abnormal according to an embodiment of the invention is illustrated
Figure.
As shown in figure 1, data processing method during terminal abnormal according to an embodiment of the invention, including:
Whether step 102, monitoring terminal is in default abnormality.
Alternatively, abnormality is including terminal poisoning, by malicious access and by malicious attack.
Step 104, if monitoring, the terminal is in the abnormality, obtains the critical data in the terminal.
Alternatively, critical data includes but is not limited to one below or various combinations:Payment information, account log in letter
Breath, associated person information, chat record, user's travel information, the short message that includes identifying code.
Wherein, payment information can be the payment of the payment softwares such as payment cipher, or Alipay, the wechat of bank
Password and payment fingerprint etc..Account log-on message can be logged on the account and password of Web bank, can also be wechat, QQ etc.
The account and password of application program.Associated person information can be the associated person information in address list, can also be QQ or wechat
In associated person information.Chat record includes the chat record in application program (such as wechat, QQ).
Step 106, the critical data is moved on in the secure storage areas with access rights limitation from its initial position
Stored.
In the technical scheme, when terminal is in abnormality, safety is transferred to by by the critical data in terminal
In memory block, because at access safety memory block, the user with access rights limitation could access, without access rights
The user of limitation can not access, and so as to critical data isolation be got up, and then ensure that the security of critical data.
In addition, by critical data from its initial position move on to secure storage areas in stored after, if receiving use
The request of family access safety memory block, judges whether the user has the authority for accessing the secure storage areas, if the user has visiting
Ask that authority is limited, then allow user's access safety memory block, if the user limits without access rights, forbid user to access
Secure storage areas.
Wherein, by critical data from its initial position move on to secure storage areas in stored after, by encrypt calculate
Method is encrypted to secure storage areas, if receiving the request of user's access safety memory block, to the decruption key of the user
Verified to judge whether the user has the authority of access safety memory block.Wherein, AES includes RSA public key encryptions
Algorithm.
Or detect whether the user judges whether the user has access safety memory block in the default trust group
Authority.
In the above-mentioned technical solutions, alternatively, also include:If the terminal returns to normal shape from the abnormality
State, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
It is original initial by the way that critical data returned to when terminal returns to normal condition in the technical scheme
Position, it is to avoid the data of storing excess in secure storage areas, during so as to ensure that next terminal occurs abnormal, in secure storage areas
There are enough memory spaces to store critical data.
In any of the above-described technical scheme, alternatively, before step 102, also include:Opened first the terminal is received
During the establishment signal triggered during machine, the secure storage areas are created.
In the technical scheme, secure storage areas are created that when terminal is first powered on, so as to begin to use it in terminal
Afterwards it is ensured that the security of critical data.
In any of the above-described technical scheme, alternatively, after step 106, also include:Output moves the critical data
To the prompting in the secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the technical scheme, when terminal occurs abnormal, critical data is moved on into safe storage by pointing out user
Qu Zhong, so that the critical data that user is understood in present terminal is safe, critical data is caused not due to terminal abnormal
It is illegally accessed.In addition, processed for the exception of terminal by pointing out user, to enable the terminals to return to as early as possible normally
State.
The flow of data processing method when Fig. 2 shows terminal abnormal according to another embodiment of the invention is illustrated
Figure.
As shown in Fig. 2 data processing method during terminal abnormal according to another embodiment of the invention, including:
Step 202, creates secure storage areas.
Step 204, the state of monitoring terminal.
Step 206, judges that whether terminal, in abnormality, if it is determined that terminal is in abnormality, then performs step
208, if monitoring, terminal is not in abnormality, terminates this flow.
Step 208, the critical data in identification terminal.Wherein, critical data includes but is not limited to one below or various
Combination:Payment information, account log-on message, associated person information, chat record, user's travel information, include identifying code
Short message.
Step 210, is stored during critical data is moved on into the secure storage areas with access rights limitation.
Step 212, points out that specific which critical data of user is moved in secure storage areas.
The structural representation of data processing equipment when Fig. 3 shows terminal abnormal according to an embodiment of the invention
Figure.
As shown in figure 3, the data processing equipment 300 during terminal abnormal according to an embodiment of the invention, including:Prison
Survey unit 302, acquiring unit 304 and memory cell 306.
Whether monitoring unit 302, default abnormality is in for monitoring terminal;Acquiring unit 304, if for described
Monitoring unit 302 monitors that the terminal is in the abnormality, then obtain the critical data in the terminal;Memory cell
306, stored in the secure storage areas with access rights limitation for the critical data to be moved on to from its initial position.
In the technical scheme, when terminal is in abnormality, safety is transferred to by by the critical data in terminal
In memory block, because at access safety memory block, the user with access rights limitation could access, without access rights
The user of limitation can not access, and so as to critical data isolation be got up, and then ensure that the security of critical data.
In the above-mentioned technical solutions, alternatively, the memory cell 306 is additionally operable to, if the terminal is from the abnormal shape
State returns to normal condition, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
It is original initial by the way that critical data returned to when terminal returns to normal condition in the technical scheme
Position, it is to avoid the data of storing excess in secure storage areas, during so as to ensure that next terminal occurs abnormal, in secure storage areas
There are enough memory spaces to store critical data.
In any of the above-described technical scheme, alternatively, also include:Creating unit 308, for receiving the terminal head
During the establishment signal triggered during secondary start, the secure storage areas are created.
In the technical scheme, secure storage areas are created that when terminal is first powered on, so as to begin to use it in terminal
Afterwards it is ensured that the security of critical data.
In any of the above-described technical scheme, alternatively, also include:Output unit 310, for exporting by the crucial number
According to the prompting moved on in the secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the technical scheme, when terminal occurs abnormal, pointed out by exporting, to point out user to move critical data
To in secure storage areas, so that the critical data that user is understood in present terminal is safe, do not made due to terminal abnormal
Critical data is obtained to be illegally accessed.In addition, processed for the exception of terminal by pointing out user, to enable the terminals to as early as possible
Return to normal condition.
In any of the above-described technical scheme, alternatively, the critical data includes one below or various combinations:Pay
Information, account log-on message, associated person information, chat record, user's travel information, the short message that includes identifying code.
In the technical scheme, it is isolated in secure storage section by the critical data in will be above-mentioned, it is to avoid crucial number
According to being compromised, so as to ensure that the security of critical data.
Fig. 4 shows the structural representation of terminal according to another embodiment of the invention.
As shown in figure 4, terminal 400 according to another embodiment of the invention, including processor 402, the and of memory 404
Communication bus 406.
Processor 402 can be general processor, for example central processing unit (Central Processing Unit,
CPU), can also be digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), or be arranged to implement the embodiment of the present invention
One or more integrated circuits.Memory 404, for store program codes, and is transferred to processor by the program code
402.Memory 404 can include volatile memory (Volatile Memory), such as random access memory (Random
Access Memory, RAM);Memory 404 can also include nonvolatile memory (Non-Volatile Memory), example
Such as read-only storage (Read-Only Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk
Drive, HDD) or solid state hard disc (Solid-State Drive, SSD);Memory 404 can also include the storage of mentioned kind
The combination of device.Communication bus 406 is used to realize the connection communication between processor 402 and memory 404.Communication bus 406 can
Being industry standard architecture (Industry Standard Architecture, ISA) bus, external equipment interconnection
(Peripheral Component Interconnect, PCI) bus or extension standards architecture (Extended
Industry Standard Architecture, EISA) bus etc..The communication bus 406 can be divided into address bus, data
Bus, controlling bus etc..
Wherein, processor 402 is used for the program code for calling memory 404 to store, and performs following operation:Monitoring terminal
Whether 400 be in default abnormality;If monitoring, the terminal 400 is in the abnormality, obtains the terminal
Critical data in 400;The critical data is moved on in the secure storage areas with access rights limitation from its initial position
Stored.
In the above-mentioned technical solutions, alternatively, processor 402 is additionally operable to, if the terminal 400 is extensive from the abnormality
Normal condition is arrived again, then the critical data is moved on to the initial position of the critical data from the secure storage areas.
In any of the above-described technical scheme, alternatively, processor 402 is additionally operable to, and is opened first the terminal 400 is received
During the establishment signal triggered during machine, the secure storage areas are created.
In any of the above-described technical scheme, alternatively, processor 402 is additionally operable to, and output moves on to the critical data
Prompting in the secure storage areas, and/or the prompting that output is processed for the exception of the terminal.
In the above-mentioned technical solutions, alternatively, the critical data includes one below or various combinations:Disbursement letter
Breath, account log-on message, associated person information, chat record, user's travel information, the short message for including identifying code.
Technical scheme is described in detail above in association with accompanying drawing, by technical scheme, can be at end
Ensure the safety of the critical data in terminal under the abnormality of end.
In the present invention, term " first ", " second " are only used for the purpose for describing, and it is not intended that indicating or implying phase
To importance;Term " multiple " represents two or more;Term " connection " etc. all should be interpreted broadly, for example, it may be
It is fixedly connected, or is detachably connected, or be integrally connected, it is also possible to is indirectly connected with by intermediary.For ability
For the those of ordinary skill in domain, above-mentioned term concrete meaning in the present invention can be as the case may be understood.
The preferred embodiments of the present invention are the foregoing is only, is not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.It is all within the spirit and principles in the present invention, made any repair
Change, equivalent, improvement etc., should be included within the scope of the present invention.
Claims (10)
1. data processing method during a kind of terminal abnormal, it is characterised in that including:
Whether monitoring terminal is in default abnormality;
If monitoring, the terminal is in the abnormality, obtains the critical data in the terminal;
The critical data is moved on to from its initial position and is stored in the secure storage areas with access rights limitation.
2. data processing method during terminal abnormal according to claim 1, it is characterised in that also include:
If the terminal returns to normal condition from the abnormality, the critical data is moved from the secure storage areas
To the initial position of the critical data.
3. data processing method during terminal abnormal according to claim 1, it is characterised in that be in the monitoring terminal
It is no in default abnormality the step of before, also include:
When the establishment signal triggered when the terminal is first powered on is received, the secure storage areas are created.
4. data processing method during terminal abnormal according to any one of claim 1 to 3, it is characterised in that described
By the critical data from its initial position move on to access rights limitation secure storage areas in stored the step of it
Afterwards, also include:
The critical data is moved on to the prompting in the secure storage areas, and/or output for the different of the terminal by output
The prompting for often being processed.
5. data processing method during terminal abnormal according to any one of claim 1 to 3, it is characterised in that described
Critical data includes one below or various combinations:Payment information, account log-on message, associated person information, chat record, use
Family travel information, the short message for including identifying code.
6. data processing equipment during a kind of terminal abnormal, it is characterised in that including:
Whether monitoring unit, default abnormality is in for monitoring terminal;
Acquiring unit, if monitoring that the terminal is in the abnormality for the monitoring unit, obtains the terminal
In critical data;
Memory cell, for the critical data to be moved on in the secure storage areas with access rights limitation from its initial position
Stored.
7. data processing equipment during terminal abnormal according to claim 6, it is characterised in that the memory cell is also used
In,
If the terminal returns to normal condition from the abnormality, the critical data is moved from the secure storage areas
To the initial position of the critical data.
8. data processing equipment during terminal abnormal according to claim 6, it is characterised in that also include:
Creating unit, for when the establishment signal triggered when the terminal is first powered on is received, creating the safety storage
Area.
9. data processing equipment during terminal abnormal according to any one of claim 6 to 8, it is characterised in that also wrap
Include:
Output unit, the prompting in the secure storage areas is moved on to for exporting by the critical data, and/or output is directed to
The prompting that the exception of the terminal is processed.
10. data processing equipment during terminal abnormal according to any one of claim 6 to 8, it is characterised in that described
Critical data includes one below or various combinations:Payment information, account log-on message, associated person information, chat record, use
Family travel information, the short message for including identifying code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611221219.XA CN106709369A (en) | 2016-12-26 | 2016-12-26 | Data processing method and data processing apparatus for terminal exception |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611221219.XA CN106709369A (en) | 2016-12-26 | 2016-12-26 | Data processing method and data processing apparatus for terminal exception |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106709369A true CN106709369A (en) | 2017-05-24 |
Family
ID=58902686
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611221219.XA Withdrawn CN106709369A (en) | 2016-12-26 | 2016-12-26 | Data processing method and data processing apparatus for terminal exception |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106709369A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107332989A (en) * | 2017-06-27 | 2017-11-07 | 中国联合网络通信集团有限公司 | The data protection system and data guard method of mobile terminal |
CN110071896A (en) * | 2018-01-22 | 2019-07-30 | 中兴通讯股份有限公司 | A kind of identity identifying method and computer equipment based on network communication |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2642685A1 (en) * | 2010-11-19 | 2013-09-25 | Hwang, Young Man | Method for providing active security authentication, and terminal and system for supporting same |
CN105847554A (en) * | 2016-03-24 | 2016-08-10 | 维沃移动通信有限公司 | Data processing method during abnormal shutdown of mobile terminal and mobile terminal |
CN105873028A (en) * | 2016-03-28 | 2016-08-17 | 宇龙计算机通信科技(深圳)有限公司 | Terminal control method, terminal control device, and terminal |
CN105930283A (en) * | 2016-04-12 | 2016-09-07 | 珠海市魅族科技有限公司 | Information storage method and mobile terminal |
-
2016
- 2016-12-26 CN CN201611221219.XA patent/CN106709369A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2642685A1 (en) * | 2010-11-19 | 2013-09-25 | Hwang, Young Man | Method for providing active security authentication, and terminal and system for supporting same |
CN105847554A (en) * | 2016-03-24 | 2016-08-10 | 维沃移动通信有限公司 | Data processing method during abnormal shutdown of mobile terminal and mobile terminal |
CN105873028A (en) * | 2016-03-28 | 2016-08-17 | 宇龙计算机通信科技(深圳)有限公司 | Terminal control method, terminal control device, and terminal |
CN105930283A (en) * | 2016-04-12 | 2016-09-07 | 珠海市魅族科技有限公司 | Information storage method and mobile terminal |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107332989A (en) * | 2017-06-27 | 2017-11-07 | 中国联合网络通信集团有限公司 | The data protection system and data guard method of mobile terminal |
CN107332989B (en) * | 2017-06-27 | 2020-09-15 | 中国联合网络通信集团有限公司 | Data protection system and data protection method of mobile terminal |
CN110071896A (en) * | 2018-01-22 | 2019-07-30 | 中兴通讯股份有限公司 | A kind of identity identifying method and computer equipment based on network communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101079882B (en) | Posture-based data protection | |
CN105447406A (en) | Method and apparatus for accessing storage space | |
US20030229791A1 (en) | Method for private personal identification number management | |
US20070168677A1 (en) | Changing user authentication method by timer and the user context | |
CN109412812B (en) | Data security processing system, method, device and storage medium | |
JP2005196776A (en) | Safe data communication method and its system between communication terminal and communication equipment | |
CN101340281A (en) | Method and system for safe login input on network | |
CN107077561B (en) | Method for verifying identity of upper-layer application, self-service terminal and application server | |
CN111813614A (en) | Debugging processing method and device and debugging processing system | |
EP2767922A1 (en) | Password audit system | |
US7596531B2 (en) | Method and apparatus for protecting against side channel attacks against personal identification numbers | |
CN106485170A (en) | A kind of data inputting method and device | |
CN104883364A (en) | Method and device for judging abnormity of server accessed by user | |
US8978150B1 (en) | Data recovery service with automated identification and response to compromised user credentials | |
CN106709369A (en) | Data processing method and data processing apparatus for terminal exception | |
CN111046405A (en) | Data processing method, device, equipment and storage medium | |
CN110691352B (en) | SIM card access control method, device, medium and equipment | |
US20170201528A1 (en) | Method for providing trusted service based on secure area and apparatus using the same | |
CN104955043B (en) | A kind of intelligent terminal security protection system | |
CN112434301A (en) | Risk assessment method and device | |
CN109347791B (en) | Dual I/O bus SIM card | |
CN106778334A (en) | The guard method of account information and mobile terminal | |
CN114861180B (en) | Application program security detection method and device | |
KR101551537B1 (en) | Information spill prevention apparatus | |
KR20100085459A (en) | Personal information protecting device for using filtering network transferring data method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170524 |