CN106874801B - Data processing method and mobile terminal - Google Patents

Data processing method and mobile terminal Download PDF

Info

Publication number
CN106874801B
CN106874801B CN201710042737.3A CN201710042737A CN106874801B CN 106874801 B CN106874801 B CN 106874801B CN 201710042737 A CN201710042737 A CN 201710042737A CN 106874801 B CN106874801 B CN 106874801B
Authority
CN
China
Prior art keywords
storage space
mobile terminal
preset
data
type data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710042737.3A
Other languages
Chinese (zh)
Other versions
CN106874801A (en
Inventor
王雅丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710042737.3A priority Critical patent/CN106874801B/en
Publication of CN106874801A publication Critical patent/CN106874801A/en
Application granted granted Critical
Publication of CN106874801B publication Critical patent/CN106874801B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1013Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to locations

Abstract

The invention provides a data processing method and a mobile terminal, wherein the method comprises the following steps: detecting the position relation between the geographical position of the mobile terminal and a preset secret area in real time; when the position relation meets a preset position condition, backing up preset type data in the mobile terminal to a second storage space; storing preset type data generated when the mobile terminal is in a preset secret area into the first storage space; and when the geographic position indicates that the mobile terminal leaves the preset security area, deleting all data in the first storage space, and copying all data in the second storage space to the first storage space. The data processing method provided by the invention can effectively avoid the leakage of confidential information generated by the mobile terminal.

Description

Data processing method and mobile terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data processing method and a mobile terminal.
Background
With the rapid development of information technology, networks are more and more widely used by people. Along with the convenience of network information transmission, the confidentiality of information is more and more emphasized, and the larger the company is, the more emphasized the confidentiality of information is. Ensuring that the confidential information of the company is not revealed is a problem that needs to be solved by those skilled in the art urgently.
The information security mechanism at the present stage is mainly realized by the following two aspects: on one hand, information security is carried out from the aspect of network transmission; on the other hand, the information confidentiality is realized by monitoring the computer inside the company. The two existing security mechanisms can solve the problems of monitoring the mobile storage medium by an internal computer of a company and monitoring data transmitted by adopting a company network. However, for portable mobile terminals, such as personal computers of employees, mobile phones of the employees cannot be effectively monitored, and the secret information cannot be effectively prevented from leaking.
Disclosure of Invention
The invention provides a data processing method and a mobile terminal, which aim to solve the problem that secret information generated by the mobile terminal cannot be effectively prevented from leaking in the existing information secret scheme.
In a first aspect, a data processing method is provided, which is applied to a mobile terminal, wherein the method includes: detecting the position relation between the geographical position of the mobile terminal and a preset secret area in real time; when the position relation meets a preset position condition, backing up preset type data in the mobile terminal to a second storage space, wherein the preset type data is stored in a first storage space before being backed up; storing preset type data generated when the mobile terminal is in a preset secret area into the first storage space; and when the geographic position indicates that the mobile terminal leaves the preset security area, deleting all data in the first storage space, and copying all data in the second storage space to the first storage space.
In a second aspect, a mobile terminal is provided, which includes a detection module, configured to detect a location relationship between a geographical location of the mobile terminal and a preset security area in real time; the backup module is used for backing up preset type data in the mobile terminal to a second storage space when the position relation meets a preset position condition, wherein the preset type data is stored in a first storage space before backup; the storage module is used for storing preset type data generated when the mobile terminal is in a preset secret area into the first storage space; and the copy deleting module is used for deleting all data in the first storage space and copying all data in the second storage space to the first storage space after the geographic position indicates that the mobile terminal leaves the preset confidential area.
In this way, according to the data processing scheme provided by the embodiment of the present invention, when the position relationship between the geographical location of the mobile terminal and the preset security area satisfies the preset condition, the preset type data is backed up from the first storage space in the mobile terminal to the second storage space. Storing the preset type data, namely the confidential information generated when the mobile terminal is in the preset confidential area into the first storage space, deleting the data in the first storage space after the mobile terminal leaves the preset confidential area, and copying the data in the second storage space into the first storage space again. Therefore, according to the data processing scheme provided by the embodiment of the invention, the preset type data generated by the mobile terminal in the preset security area is separately stored, and the part of data is deleted after the mobile terminal leaves the preset security area, so that the security information generated by the mobile terminal is effectively prevented from leaking.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a flowchart of a data processing method according to a first embodiment of the present invention;
FIG. 2 is a flow chart of a data processing method according to a second embodiment of the present invention;
FIG. 3 is a flow chart of a data processing method according to a third embodiment of the present invention;
fig. 4 is a block diagram of a mobile terminal according to a fourth embodiment of the present invention;
fig. 5 is a block diagram of another mobile terminal according to a fourth embodiment of the present invention;
fig. 6 is a block diagram of a backup module of a mobile terminal according to a fourth embodiment;
fig. 7 is a block diagram of a delete copy module of a mobile terminal according to a fourth embodiment;
fig. 8 is a block diagram of a mobile terminal according to a fifth embodiment of the present invention;
fig. 9 is a block diagram of a mobile terminal according to a sixth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, a flowchart of a data processing method according to a first embodiment of the present invention is shown.
The data processing method of the embodiment of the invention comprises the following steps:
step 101: and detecting the position relation between the geographical position of the mobile terminal and a preset security area in real time.
The preset security area is preset by a mobile terminal user, the preset security area is an area range, and data of a preset type generated by the mobile terminal in the preset security area is security information.
Step 102: and when the position relation meets a preset position condition, backing up the preset type data in the mobile terminal to a second storage space.
The preset type data is stored in the first storage space before backup, and the second storage space may be a local space of the mobile terminal or a cloud disk.
The position relationship between the geographical position of the mobile terminal and the preset security area includes but is not limited to: the geographic position is located in a preset secret area; the geographical position is positioned outside the secret area, and the distance between the geographical position and the secret area is less than a preset threshold value; the geographic position is located outside the secret area, and the distance between the geographic position and the secret area is larger than or equal to a preset threshold value.
When the position relationship is the first and second relationships listed above, the position relationship is determined to satisfy the predetermined position condition.
Step 103: and storing the preset type data generated when the mobile terminal is in the preset secret area into the first storage space.
At this time, the first storage space stores both the preset type data generated in the preset secret area and the preset type data generated when the first storage space enters the preset secret area.
Step 104: and when the geographical position of the mobile terminal indicates that the mobile terminal leaves the preset confidential area, deleting all data in the first storage space, and copying all data in the second storage space to the first storage space.
Deleting all the data in the first storage space means that the confidential information generated in the preset confidential area is deleted, and copying all the data in the second storage space into the first storage space, so that the operation of the mobile terminal can be maintained through the data.
According to the data processing method provided by the embodiment of the invention, when the position relation between the geographical position of the mobile terminal and the preset security area meets the preset condition, the preset type data is backed up from the first storage space in the mobile terminal to the second storage space. Storing the preset type data, namely the confidential information generated when the mobile terminal is in the preset confidential area into the first storage space, deleting the data in the first storage space after the mobile terminal leaves the preset confidential area, and copying the data in the second storage space into the first storage space again. Therefore, the data processing method provided in the embodiment of the invention stores the preset type data generated by the mobile terminal in the preset security area separately, and deletes the part of data after the mobile terminal leaves the preset security area, thereby effectively avoiding the security information generated by the mobile terminal from leaking.
Example two
Referring to fig. 2, a flowchart of a data processing method according to a second embodiment of the present invention is shown.
The data processing method provided by the embodiment of the invention specifically comprises the following steps:
step 201: and acquiring the geographical position information.
The geographical location information may be set by the mobile terminal user according to actual requirements, which is not specifically limited in the embodiment of the present invention.
The geographical location information may be a unique identification code of the office wireless router, geographical location coordinates, and the like.
Step 202: and acquiring position coordinates corresponding to the geographical position information.
When the position coordinate corresponding to the first position information is obtained, the position coordinate corresponding to the geographical position information can be obtained through GPS positioning or indoor positioning; or, when the office wireless router is connected, the wireless router is identified, and the corresponding position coordinate of the wireless router is determined.
Step 203: and determining the area of the preset range with the position coordinate as the center as a preset secret area.
The edges of the area of the predetermined range may be 50 meters, 40 meters, 30 meters, etc. from the center. For example: assuming that the center is a wireless router, the area within 50 meters of the wireless router is a preset security area.
For example: the preset security area is a first meeting room of a company, and the preset type data is all data generated in the operation of the application program A.
Step 204: and detecting the position relation between the geographical position of the mobile terminal and a preset security area in real time.
When the geographical position of the mobile terminal is detected, the geographical position can be detected by a positioning system installed in the mobile terminal.
The position relationship between the geographical position of the mobile terminal and the preset security area includes but is not limited to: the geographic position is located in a preset secret area; the geographical position is positioned outside the secret area, and the distance between the geographical position and the secret area is less than a preset threshold value; the geographic position is located outside the secret area, and the distance between the geographic position and the secret area is larger than or equal to a preset threshold value.
When a mobile terminal user holds the mobile terminal to enter a first meeting room of a company, the mobile terminal detects that the geographical position is in the first meeting room, all data corresponding to the application program A are set to be in a read-write forbidden state, and the application program A is forbidden at the moment, so that new data cannot be regenerated.
Step 205: and when the position relation is that the geographic position is in a preset security area, setting the preset type data to be in a read-write forbidden state.
Wherein the preset type data includes: the method comprises the steps of presetting an installation package corresponding to an application program and presetting data generated in the running process of the application program. The mobile terminal user may preset the application program according to actual requirements, which is not specifically limited in the embodiment of the present invention.
At this time, the mobile terminal just enters the preset security area, the preset type data is set to be in a read-write forbidden state, and then data backup is started, so that the purpose of preventing new preset type data from being generated in the data copying process is achieved.
Step 206: and backing up the preset type data in the mobile terminal to a second storage space.
The preset type data is stored in the first storage space before backup, and the second storage space is a local storage space of the cloud disk or the mobile terminal.
When the second storage space is a cloud disk, local storage resources of the mobile terminal can be saved, but the network speed of a network connected with the mobile terminal is higher; when the second storage space is a local storage space of the mobile terminal, although there is no requirement for the network speed of the network to which the mobile terminal is connected, the second storage space occupies local storage resources of the mobile terminal. In a specific implementation process, a person skilled in the art may set a specific location of the second storage space according to actual requirements.
And if the data generated by the application program A stored in the first storage space before the mobile terminal enters the secret area is X, backing up the data X to the second storage space after entering the secret area.
Step 207: and after the data backup is finished, restoring the preset type data to a readable and writable state.
At this time, the data X is stored in the second storage space, and all data corresponding to the application a is set to be in a readable and writable state, at which time the application a resumes an operable state, so that new data can be regenerated.
Step 208: and storing the preset type data generated when the mobile terminal is in the preset secret area into the first storage space.
And if the data generated by the application program A in the preset confidential area is Y, storing the generated data into the first storage space in real time in the data generation process.
Step 209: and when the geographical position indicates that the mobile terminal leaves the preset confidential area, deleting all data in the first storage space, and copying all data in the second storage space to the first storage space.
At this time, the first storage space stores data X and Y, the second storage space stores only information X which does not need to be kept secret, X and Y in the first storage space are deleted, and then the data X which is backed up to the second storage space before is copied to the first storage space. Since all the data Y has been deleted, a security effect on the data Y can be achieved.
According to the data processing method provided by the embodiment of the invention, when the position relation between the geographical position of the mobile terminal and the preset security area meets the preset condition, the preset type data is backed up from the first storage space in the mobile terminal to the second storage space. Storing the preset type data, namely the confidential information generated when the mobile terminal is in the preset confidential area into the first storage space, deleting the data in the first storage space after the mobile terminal leaves the preset confidential area, and copying the data in the second storage space into the first storage space again. Therefore, the data processing method provided in the embodiment of the invention stores the preset type data generated by the mobile terminal in the preset security area separately, and deletes the part of data after the mobile terminal leaves the preset security area, thereby effectively avoiding the security information generated by the mobile terminal from leaking.
EXAMPLE III
Referring to fig. 3, a flowchart of a data processing method according to a third embodiment of the present invention is shown.
The data processing method provided by the embodiment of the invention specifically comprises the following steps:
step 301: and acquiring the geographical position information.
The geographical location information may be set by the mobile terminal user according to actual requirements, which is not specifically limited in the embodiment of the present invention.
The geographical location information may be a unique identification code of the office wireless router, geographical location coordinates, and the like.
Step 302: and acquiring position coordinates corresponding to the geographical position information.
When the position coordinate corresponding to the first position information is obtained, the position coordinate corresponding to the geographical position information can be obtained through GPS positioning or indoor positioning; or, when the office wireless router is connected, the wireless router is identified, and the corresponding position coordinate of the wireless router is determined.
Step 303: and determining the area of the preset range with the position coordinate as the center as a preset secret area.
The edges of the area of the predetermined range may be 50 meters, 40 meters, 30 meters, etc. from the center. For example: assuming that the center is a wireless router, an area within 50 meters of the wireless router is a preset security area.
For example: the preset confidential area is a laboratory of a school of the mobile terminal user, and the preset type data is all data generated in the running of the application program B.
Step 304: and detecting the position relation between the geographical position of the mobile terminal and a preset security area in real time.
When the geographical position of the mobile terminal is detected, the geographical position can be detected by a positioning system installed in the mobile terminal.
The position relationship between the geographical position of the mobile terminal and the preset security area includes but is not limited to: the geographic position is located in a preset secret area; the geographical position is positioned outside the secret area, and the distance between the geographical position and the secret area is less than a preset threshold value; the geographic position is located outside the secret area, and the distance between the geographic position and the secret area is larger than or equal to a preset threshold value.
The preset threshold may be set by a person skilled in the art according to actual requirements, for example: the distance is set to 10 meters, 20 meters, 30 meters, etc., and this is not particularly limited in the embodiment of the present invention.
And the mobile terminal detects the geographical position in real time, and when the distance from the handheld mobile terminal of the mobile terminal user to the laboratory is detected to be smaller than the preset distance, all data X corresponding to the application program B stored in the first storage space are backed up to the second storage space.
Step 305: and when the position relationship is that the distance between the geographic position and the preset confidential area is smaller than a preset threshold value, backing up preset type data generated in the operation process of the mobile terminal into the second storage space in real time.
And the second storage space is a local storage space of the cloud disk or the mobile terminal.
And when the distance between the handheld mobile terminal of the mobile terminal user and the laboratory is detected to be smaller than the preset distance, the application program B can also generate the data Z within the period of time when the handheld mobile terminal of the mobile terminal user enters the laboratory, and the generated data Z is also backed up to the second storage space in real time. For example: and when the mobile terminal is 5 meters away from the laboratory, starting to backup data.
Step 306: and stopping executing the step of backing up the preset type data generated in the operation process of the mobile terminal to the second storage space in real time when the mobile terminal is detected to enter the preset secret area.
At this time, the second storage space stores all data X and Z generated by the application program B before entering the laboratory.
When the second storage space is a cloud disk, local storage resources of the mobile terminal can be saved, but the network speed of a network connected with the mobile terminal is higher; when the second storage space is a local storage space of the mobile terminal, although there is no requirement for the network speed of the network to which the mobile terminal is connected, the second storage space occupies local storage resources of the mobile terminal. In a specific implementation process, a person skilled in the art may set a specific location of the second storage space according to actual requirements.
In the embodiment of the present invention, the second storage space is taken as an example of a local storage space of the mobile terminal.
Step 307: and storing the preset type data generated when the mobile terminal is in the preset secret area into the first storage space.
Assuming that the data generated by the application B is Y when the mobile terminal is in the laboratory, the data X, Y and Z are stored in the first storage space.
Step 308: and when the geographic position indicates that the mobile terminal leaves the preset security area, switching the data storage space of the preset type data to a local second storage space of the mobile terminal.
The second storage space stores data X and data Z, but does not contain the secret information Y generated by the lab application B.
The data storage space is directly switched to a local second storage space of the mobile terminal instead of deleting the data in the first storage space, the data in the second storage space is copied to the first storage space, and then the first storage space is used as the data storage space for maintaining the operation of the mobile terminal, so that the time for deleting and copying the data can be saved, and the switching speed of the data storage space is improved.
Step 309: and storing the data generated in the running process of the mobile terminal through the second storage space.
Since the data Y generated by the application program B in the laboratory does not exist in the second storage space, the subsequent reservation of the data in the second storage space does not cause leakage of the secret information, i.e., the data Y.
At this time, the data stored in the second storage space includes: and switching the data storage spaces of the preset type data and the preset type data to generate data in the operation process of the mobile terminal.
Namely data X, Z corresponding to application B and data W generated by application B after the switch to the second storage space in step 308.
Step 310: and deleting the data stored in the first storage space.
Because the first storage space stores the preset type data, namely the confidential information, generated in the preset confidential area, the confidential information can be destroyed by deleting the data in the first storage space, and the confidential information is prevented from leaking.
Step 311: and copying all the data stored in the second storage space to the first storage space.
According to the data processing method provided by the embodiment of the invention, when the mobile terminal does not enter the preset secret area, the first storage space is the use storage space, the data in the first storage space and the data in the second storage space are synchronous in real time, when the mobile terminal enters the preset secret area, the real-time synchronous closing is carried out, and the first storage space is still the use space. And when the mobile terminal leaves the preset confidential area, switching the second storage space into a use space, starting data synchronization of the first storage space and the second storage space, and if the mobile terminal enters the preset confidential area next time, synchronously closing the mobile terminal in real time, wherein the second storage space is the use space. And when the mobile terminal leaves the preset confidential area again, switching the first storage space into a use space, and starting data synchronization of the first storage space and the second storage space. According to the method, only two storage spaces need to be controlled to be synchronously opened and closed, and the storage space switching time is controlled, so that confidential information can be effectively prevented from being leaked, the storage space switching is not required to be carried out after data copying, and the switching speed of the data storage space can be increased.
The data processing method provided by the embodiment of the invention is characterized in that the preset type data generated by the mobile terminal in the preset security area is independently stored, and the part of data is deleted after the mobile terminal leaves the preset security area, so that the security information generated by the mobile terminal is effectively prevented from leaking. In addition, the data processing method provided by the embodiment of the invention can effectively avoid secret information leakage by only controlling the synchronous opening and closing time of the two storage spaces and the switching time of the storage spaces, does not need to spend time waiting for the data to be copied and then switching the storage spaces, and can improve the switching speed of the data storage spaces.
Example four
Referring to fig. 4, a block diagram of a mobile terminal according to a fourth embodiment of the present invention is shown. The mobile terminal 10 can implement the details of the data processing method in the first to third embodiments, and achieve the same effects.
The mobile terminal 10 of the embodiment of the present invention includes: the detection module 101 is used for detecting the position relation between the geographical position of the mobile terminal and a preset security area in real time; the backup module 102 is configured to backup preset type data in the mobile terminal to a second storage space when the position relationship meets a preset position condition, where the preset type data is stored in a first storage space before backup; the storage module 103 is configured to store preset type data generated when the mobile terminal is in a preset secret area into the first storage space; a delete copy module 104, configured to delete all data in the first storage space and copy all data in the second storage space to the first storage space after the geographic location indicates that the mobile terminal leaves the preset security area.
Referring to fig. 5, on the basis of fig. 4, the mobile terminal 10 further includes the following modules:
a position information obtaining module 105, configured to obtain geographic position information before the detecting module 101 detects a position relationship between a geographic position of the mobile terminal and a preset security area in real time; a coordinate obtaining module 106, configured to obtain a position coordinate corresponding to the geographic position information; a secret area determining module 107, configured to determine an area of a preset range with the position coordinate as a center as the preset secret area.
Preferably, a structural block diagram of the backup module 102 is shown in fig. 6, and the backup module 102 includes the following sub-modules:
the read-write state setting submodule 1021 is used for setting the preset type data to be in a read-write forbidding state when the position relationship is that the geographic position is in the preset confidential area; the first backup submodule 1022 is configured to backup the preset type data in the mobile terminal to a second storage space; the read-write state recovery submodule 1023 is used for recovering the preset type data into a readable-write state after the data backup is finished; and the second storage space is a cloud disk or a local storage space of the mobile terminal.
The second backup submodule 1024 is configured to backup the preset type data generated in the operation process of the mobile terminal into a second storage space in real time when the position relationship indicates that the distance between the geographic position and the preset confidential area is smaller than a preset threshold; the pause submodule 1025 is used for stopping executing the operation of backing up the preset type data generated in the running process of the mobile terminal into a second storage space in real time when the mobile terminal is detected to enter a preset security area; and the second storage space is a cloud disk or a local storage space of the mobile terminal.
Preferably, the block diagram of the delete copy module 104 is shown in fig. 7, and the delete copy module 104 includes the following sub-modules:
the switching submodule 1041, configured to, when the second storage space is a local storage space of the mobile terminal, switch the data storage space of the preset type of data to a local second storage space of the mobile terminal after detecting that the mobile terminal leaves the preset security area; the data storage sub-module 1042 is configured to store, through the second storage space, data generated in the operation process of the mobile terminal; a data deleting submodule 1043, configured to delete the data stored in the first storage space; the data copying sub-module 1044 is configured to copy all data stored in the second storage space to the first storage space; wherein the data stored in the second storage space comprises: and data generated in the operation process of the mobile terminal after the preset type data and the data storage space of the preset type data are switched.
Preferably, the preset type data includes: the method comprises the steps of presetting an installation package corresponding to an application program and presetting data generated in the running process of the application program.
The mobile terminal according to the embodiment of the present invention is configured to implement the corresponding data processing method in the first to third embodiments, and details are not repeated here.
When the mobile terminal performs data processing, when the position relation between the geographical position of the mobile terminal and the preset secret area meets the preset condition, the preset type data is backed up from the first storage space in the mobile terminal to the second storage space. Storing the preset type data, namely the confidential information generated when the mobile terminal is in the preset confidential area into the first storage space, deleting the data in the first storage space after the mobile terminal leaves the preset confidential area, and copying the data in the second storage space into the first storage space again. Therefore, the mobile terminal provided by the embodiment of the invention stores the preset type data generated by the mobile terminal in the preset security area separately, and deletes the part of data after the mobile terminal leaves the preset security area, thereby effectively avoiding the leakage of the security information generated by the mobile terminal.
Example four
Referring to fig. 8, a block diagram of a mobile terminal according to a fourth embodiment of the present invention is shown.
The mobile terminal 700 of the embodiment of the present invention includes: at least one processor 701, a memory 702, at least one network interface 704, and a user interface 703. The various components in the mobile terminal 700 are coupled together by a bus system 705. It is understood that the bus system 705 is used to enable communications among the components. The bus system 705 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration the various busses are labeled in figure 8 as the bus system 705.
The user interface 703 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touchpad, or curved touch screen, among others.
It is to be understood that the memory 702 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a Read-only memory (ROM), a programmable Read-only memory (PROM), an erasable programmable Read-only memory (erasabprom, EPROM), an electrically erasable programmable Read-only memory (EEPROM), or a flash memory. The volatile memory may be a Random Access Memory (RAM) which functions as an external cache. By way of example, but not limitation, many forms of RAM are available, such as static random access memory (staticiram, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (syncronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced synchronous SDRAM (ESDRAM), synchronous link SDRAM (SLDRAM), and direct memory bus SDRAM (DRRAM). The memory 702 of the systems and methods described in this embodiment of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 702 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 7021 and application programs 7022.
The operating system 7021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application programs 7022 include various application programs such as a media player (MediaPlayer), a Browser (Browser), and the like, for implementing various application services. Programs that implement methods in accordance with embodiments of the present invention can be included in application 7022.
In the embodiment of the present invention, the processor 701 is configured to detect a position relationship between a geographic position of the mobile terminal and a preset security area in real time by calling a program or an instruction stored in the memory 702, specifically, a program or an instruction stored in the application 7022; when the position relation meets a preset position condition, backing up preset type data in the mobile terminal to a second storage space, wherein the preset type data is stored in a first storage space before being backed up; storing preset type data generated when the mobile terminal is in a preset secret area into the first storage space; and when the geographic position indicates that the mobile terminal leaves the preset security area, deleting all data in the first storage space, and copying all data in the second storage space to the first storage space.
The method disclosed in the above embodiments of the present invention may be applied to the processor 701, or implemented by the processor 701. The processor 701 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 701. The processor 701 may be a general-purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 702, and the processor 701 reads the information in the memory 702 and performs the steps of the above method in combination with the hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described in this embodiment of the invention may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described in this embodiment of the invention. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Optionally, when the position relationship satisfies a preset position condition, the processor 701 is specifically configured to, when backing up the preset type data in the mobile terminal to the second storage space: when the position relationship is that the geographic position is in the preset secret area, setting the preset type data to be in a read-write forbidden state; backing up the preset type data in the mobile terminal to a second storage space; after the data backup is finished, restoring the preset type data to a readable and writable state; and the second storage space is a cloud disk or a local storage space of the mobile terminal.
Optionally, when the position relationship satisfies a preset position condition, the processor 701 is specifically configured to, when backing up the preset type data in the mobile terminal to the second storage space: when the position relation is that the distance between the geographic position and a preset confidential area is smaller than a preset threshold value, backing up the preset type data generated in the operation process of the mobile terminal to a second storage space in real time; stopping executing the step of backing up the preset type data generated in the running process of the mobile terminal into a second storage space in real time when the mobile terminal is detected to enter a preset confidential area; and the second storage space is a cloud disk or a local storage space of the mobile terminal.
Optionally, when the second storage space is a local storage space of the mobile terminal, and after the geographic location indicates that the mobile terminal leaves the preset security area, the processor 701 deletes the data stored in the first storage space, and when copying the data stored in the second storage space to the first storage space, is specifically configured to: when the geographic position indicates that the mobile terminal leaves the preset security area, switching the data storage space of the preset type data to a local second storage space of the mobile terminal; storing data generated in the running process of the mobile terminal through the second storage space; deleting the data stored in the first storage space; copying all data stored in the second storage space to the first storage space; wherein the data stored in the second storage space comprises: and data generated in the operation process of the mobile terminal after the preset type data and the data storage space of the preset type data are switched.
Optionally, the preset type data includes: the method comprises the steps of presetting an installation package corresponding to an application program and presetting data generated in the running process of the application program.
Optionally, before detecting the position relationship between the geographic location of the mobile terminal and the preset security area in real time, the processor 701 is further configured to: acquiring geographical position information; acquiring a position coordinate corresponding to the geographical position information; and determining an area of a preset range with the position coordinate as a center as the preset security area.
The mobile terminal 700 can implement the processes implemented by the mobile terminal in the foregoing embodiments, and details are not repeated here to avoid repetition.
When the mobile terminal performs data processing, when the position relation between the geographical position of the mobile terminal and the preset secret area meets the preset condition, the preset type data is backed up from the first storage space in the mobile terminal to the second storage space. Storing the preset type data, namely the confidential information generated when the mobile terminal is in the preset confidential area into the first storage space, deleting the data in the first storage space after the mobile terminal leaves the preset confidential area, and copying the data in the second storage space into the first storage space again. Therefore, the mobile terminal provided by the embodiment of the invention stores the preset type data generated by the mobile terminal in the preset security area separately, and deletes the part of data after the mobile terminal leaves the preset security area, thereby effectively avoiding the leakage of the security information generated by the mobile terminal.
EXAMPLE five
Referring to fig. 8, a block diagram of a mobile terminal according to a fifth embodiment of the present invention is shown.
The mobile terminal in the embodiment of the present invention may be a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), or a vehicle-mounted computer.
The mobile terminal in fig. 8 includes a Radio Frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a processor 860, an audio circuit 870, a wifi (wireless fidelity) module 880, and a power supply 890.
The input unit 830 may be used, among other things, to receive numeric or character information input by a user and to generate signal inputs related to user settings and function control of the mobile terminal. Specifically, in the embodiment of the present invention, the input unit 830 may include a touch panel 8301. The touch panel 8301, also referred to as a touch screen, may be a curved screen, and may collect touch operations performed by a user on or near the touch panel 8301 (for example, operations performed by the user on the touch panel 8301 by using any suitable object or accessory such as a finger or a stylus), and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 8301 may include two portions, i.e., a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 860, and can receive and execute commands sent by the processor 860. In addition, the touch panel 8301 may be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 8301, the input unit 830 may further include other input devices 8302, and the other input devices 8302 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
Among them, the display unit 840 may be used to display information input by a user or information provided to the user and various menu interfaces of the mobile terminal. The display unit 840 may include a display panel 8401, and optionally, the display panel 8401 may be configured in the form of an LCD or an organic light-emitting diode (OLED), or the like.
It should be noted that the touch panel 8301 may cover the display panel 8401 to form a touch display screen, and when the touch display screen detects a touch operation thereon or nearby, the touch display screen is transmitted to the processor 860 to determine the type of the touch event, and then the processor 860 provides a corresponding visual output on the touch display screen according to the type of the touch event.
The touch display screen comprises an application program interface display area and a common control display area. The arrangement modes of the application program interface display area and the common control display area are not limited, and can be an arrangement mode which can distinguish two display areas, such as vertical arrangement, left-right arrangement and the like. The application interface display area may be used to display an interface of an application. Each interface may include at least one interface element such as an icon and/or widget desktop control for an application. The application interface display area may also be an empty interface that does not include any content. The common control display area is used for displaying controls with high utilization rate, such as application icons like setting buttons, interface numbers, scroll bars, phone book icons and the like.
The processor 860 is a control center of the mobile terminal, connects various parts of the entire mobile phone using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the first memory 8201 and calling data stored in the second memory 8202, thereby integrally monitoring the mobile terminal. Optionally, processor 860 may include one or more processing units.
In the embodiment of the present invention, the processor 860 is configured to detect a location relationship between a geographical location of the mobile terminal and a predetermined security area in real time by calling a software program and/or a module stored in the first memory 8201 and/or data stored in the second memory 8202; when the position relation meets a preset position condition, backing up preset type data in the mobile terminal to a second storage space, wherein the preset type data is stored in a first storage space before being backed up; storing preset type data generated when the mobile terminal is in a preset secret area into the first storage space; and when the geographic position indicates that the mobile terminal leaves the preset security area, deleting all data in the first storage space, and copying all data in the second storage space to the first storage space.
Optionally, when the position relationship satisfies a preset position condition, the processor 860 is specifically configured to, when backing up the preset type data in the mobile terminal to the second storage space: when the position relationship is that the geographic position is in the preset secret area, setting the preset type data to be in a read-write forbidden state; backing up the preset type data in the mobile terminal to a second storage space; after the data backup is finished, restoring the preset type data to a readable and writable state; and the second storage space is a cloud disk or a local storage space of the mobile terminal.
Optionally, when the position relationship satisfies a preset position condition, when the processor 860 backs up preset type data in the mobile terminal to a second storage space, specifically, the processor is configured to: when the position relation is that the distance between the geographic position and a preset confidential area is smaller than a preset threshold value, backing up the preset type data generated in the operation process of the mobile terminal to a second storage space in real time; stopping executing the step of backing up the preset type data generated in the running process of the mobile terminal into a second storage space in real time when the mobile terminal is detected to enter a preset confidential area; and the second storage space is a cloud disk or a local storage space of the mobile terminal.
Optionally, when the second storage space is a local storage space of the mobile terminal, and after the geographic location indicates that the mobile terminal leaves the preset security area, the processor 860 deletes the data stored in the first storage space, and when copying the data stored in the second storage space to the first storage space, specifically: when the geographic position indicates that the mobile terminal leaves the preset security area, switching the data storage space of the preset type data to a local second storage space of the mobile terminal; storing data generated in the running process of the mobile terminal through the second storage space; deleting the data stored in the first storage space; copying all data stored in the second storage space to the first storage space; wherein the data stored in the second storage space comprises: and data generated in the operation process of the mobile terminal after the preset type data and the data storage space of the preset type data are switched.
Optionally, the preset type data includes: the method comprises the steps of presetting an installation package corresponding to an application program and presetting data generated in the running process of the application program.
Optionally, the processor 860 is further configured to, before detecting a location relationship between the geographical location of the mobile terminal and the preset security area in real time: acquiring geographical position information; acquiring a position coordinate corresponding to the geographical position information; and determining an area of a preset range with the position coordinate as a center as the preset security area.
When the mobile terminal performs data processing, when the position relation between the geographical position of the mobile terminal and the preset secret area meets the preset condition, the preset type data is backed up from the first storage space in the mobile terminal to the second storage space. Storing the preset type data, namely the confidential information generated when the mobile terminal is in the preset confidential area into the first storage space, deleting the data in the first storage space after the mobile terminal leaves the preset confidential area, and copying the data in the second storage space into the first storage space again. Therefore, the mobile terminal provided by the embodiment of the invention stores the preset type data generated by the mobile terminal in the preset security area separately, and deletes the part of data after the mobile terminal leaves the preset security area, thereby effectively avoiding the leakage of the security information generated by the mobile terminal.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The data processing methods and mobile terminals provided herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The structure required to construct a system incorporating aspects of the present invention will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those of ordinary skill in the art will appreciate that the modules in the device of an embodiment may be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in a data processing scheme according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A data processing method is applied to a mobile terminal, and is characterized by comprising the following steps:
detecting the position relation between the geographical position of the mobile terminal and a preset secret area in real time;
when the position relation meets a preset position condition, backing up preset type data in the mobile terminal to a second storage space, wherein the preset type data is stored in a first storage space before being backed up;
storing preset type data generated when the mobile terminal is in a preset secret area into the first storage space;
when the geographic position indicates that the mobile terminal leaves the preset confidential area, deleting all data in the first storage space, and copying all data in the second storage space to the first storage space;
when the position relation meets a preset position condition, the step of backing up the preset type data in the mobile terminal to a second storage space comprises the following steps:
when the position relationship is that the geographic position is in the preset secret area, setting the preset type data to be in a read-write forbidden state;
backing up the preset type data in the mobile terminal to a second storage space;
after the data backup is finished, restoring the preset type data to a readable and writable state;
and the second storage space is a cloud disk or a local storage space of the mobile terminal.
2. The method according to claim 1, wherein the step of backing up the preset type data in the mobile terminal to the second storage space when the position relationship satisfies a preset position condition comprises:
when the position relation is that the distance between the geographic position and a preset confidential area is smaller than a preset threshold value, backing up the preset type data generated in the operation process of the mobile terminal to a second storage space in real time;
stopping executing the step of backing up the preset type data generated in the running process of the mobile terminal into a second storage space in real time when the mobile terminal is detected to enter a preset confidential area;
and the second storage space is a cloud disk or a local storage space of the mobile terminal.
3. The method according to claim 2, wherein when the second storage space is a local storage space of the mobile terminal, the step of deleting the data stored in the first storage space and copying the data stored in the second storage space to the first storage space after the geographic location indicates that the mobile terminal leaves the preset security area comprises:
when the geographic position indicates that the mobile terminal leaves the preset security area, switching the data storage space of the preset type data to a local second storage space of the mobile terminal;
storing data generated in the running process of the mobile terminal through the second storage space;
deleting the data stored in the first storage space;
copying all data stored in the second storage space to the first storage space;
wherein the data stored in the second storage space comprises: and data generated in the operation process of the mobile terminal after the preset type data and the data storage space of the preset type data are switched.
4. The method of claim 1, wherein the preset type data comprises: the method comprises the steps of presetting an installation package corresponding to an application program and presetting data generated in the running process of the application program.
5. The method according to claim 1, wherein before the step of detecting the location relationship between the geographical location of the mobile terminal and the preset security area in real time, the method further comprises:
acquiring geographical position information;
acquiring a position coordinate corresponding to the geographical position information;
and determining an area of a preset range with the position coordinate as a center as the preset security area.
6. A mobile terminal, comprising:
the detection module is used for detecting the position relation between the geographical position of the mobile terminal and a preset secret area in real time;
the backup module is used for backing up preset type data in the mobile terminal to a second storage space when the position relation meets a preset position condition, wherein the preset type data is stored in a first storage space before backup;
the storage module is used for storing preset type data generated when the mobile terminal is in a preset secret area into the first storage space;
the deleting and copying module is used for deleting all data in the first storage space and copying all data in the second storage space to the first storage space after the geographic position indicates that the mobile terminal leaves the preset confidential area;
the backup module includes:
the read-write state setting submodule is used for setting the preset type data into a read-write forbidding state when the position relationship is that the geographic position is in the preset secret area;
the first backup submodule is used for backing up the preset type data in the mobile terminal to a second storage space;
the read-write state recovery submodule is used for recovering the preset type data into a readable-write state after the data backup is finished; and the second storage space is a cloud disk or a local storage space of the mobile terminal.
7. The mobile terminal of claim 6, wherein the backup module comprises:
the second backup submodule is used for backing up the preset type data generated in the operation process of the mobile terminal into a second storage space in real time when the position relation is that the distance between the geographic position and a preset confidential area is smaller than a preset threshold value;
the pause submodule is used for stopping executing the operation of backing up the preset type data generated in the running process of the mobile terminal into a second storage space in real time when the mobile terminal is detected to enter a preset security area;
and the second storage space is a cloud disk or a local storage space of the mobile terminal.
8. The mobile terminal of claim 7, wherein the delete copy module comprises:
the switching submodule is used for switching the data storage space of the preset type data to the local second storage space of the mobile terminal after detecting that the mobile terminal leaves the preset security area when the second storage space is the local storage space of the mobile terminal;
the data storage submodule is used for storing data generated in the running process of the mobile terminal through the second storage space;
the data deleting submodule is used for deleting the data stored in the first storage space;
the data copying submodule is used for copying all data stored in the second storage space to the first storage space;
wherein the data stored in the second storage space comprises: and data generated in the operation process of the mobile terminal after the preset type data and the data storage space of the preset type data are switched.
9. The mobile terminal of claim 6, wherein the preset type data comprises: the method comprises the steps of presetting an installation package corresponding to an application program and presetting data generated in the running process of the application program.
10. The mobile terminal of claim 6, wherein the mobile terminal further comprises:
the mobile terminal comprises a position information acquisition module, a position information acquisition module and a position information acquisition module, wherein the position information acquisition module is used for acquiring geographical position information before the detection module detects the position relation between the geographical position of the mobile terminal and a preset secret area in real time;
the coordinate acquisition module is used for acquiring position coordinates corresponding to the geographic position information;
and the secret area determining module is used for determining an area of a preset range taking the position coordinate as a center as the preset secret area.
CN201710042737.3A 2017-01-20 2017-01-20 Data processing method and mobile terminal Active CN106874801B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710042737.3A CN106874801B (en) 2017-01-20 2017-01-20 Data processing method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710042737.3A CN106874801B (en) 2017-01-20 2017-01-20 Data processing method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106874801A CN106874801A (en) 2017-06-20
CN106874801B true CN106874801B (en) 2020-04-03

Family

ID=59158616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710042737.3A Active CN106874801B (en) 2017-01-20 2017-01-20 Data processing method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106874801B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101673249A (en) * 2008-09-12 2010-03-17 颜根泰 Data privacy system and method
CN103401834A (en) * 2013-06-27 2013-11-20 中国人民解放军国防科学技术大学 File security method in limited area based on position information
CN103413095A (en) * 2013-08-21 2013-11-27 北京网秦天下科技有限公司 Method and device for managing mobile terminal
CN104636216A (en) * 2013-11-11 2015-05-20 中兴通讯股份有限公司 Data backup method and device and data recovery method and device
CN105122261A (en) * 2013-04-23 2015-12-02 惠普发展公司,有限责任合伙企业 Recovering from compromised system boot code

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101673249A (en) * 2008-09-12 2010-03-17 颜根泰 Data privacy system and method
CN105122261A (en) * 2013-04-23 2015-12-02 惠普发展公司,有限责任合伙企业 Recovering from compromised system boot code
CN103401834A (en) * 2013-06-27 2013-11-20 中国人民解放军国防科学技术大学 File security method in limited area based on position information
CN103413095A (en) * 2013-08-21 2013-11-27 北京网秦天下科技有限公司 Method and device for managing mobile terminal
CN104636216A (en) * 2013-11-11 2015-05-20 中兴通讯股份有限公司 Data backup method and device and data recovery method and device

Also Published As

Publication number Publication date
CN106874801A (en) 2017-06-20

Similar Documents

Publication Publication Date Title
CN106126077B (en) Display control method of application program icons and mobile terminal
CN107466077B (en) Network switching method and mobile terminal
CN107678644B (en) Image processing method and mobile terminal
KR101825771B1 (en) Multiple-access-level lock screen
RU2706951C2 (en) Method and device for providing a graphical user interface
CN106201632B (en) Application program access method and mobile terminal
CN106951335B (en) Process daemon method and mobile terminal
CN107506130B (en) Character deleting method and mobile terminal
US20110314421A1 (en) Access to Touch Screens
CN106095250B (en) Application icon layout method and mobile terminal
CN107333325B (en) Network searching method and mobile terminal
CN106506401A (en) A kind of flow managing method and mobile terminal
KR20160015814A (en) Electronic device and method for displaying user interface thereof
KR20160136250A (en) Method for launching a second application using a first application icon in an electronic device
US20140215364A1 (en) Method and electronic device for configuring screen
JP6858256B2 (en) Payment application separation methods and devices, as well as terminals
CN107450799B (en) Message display method and mobile terminal
CN106874046B (en) Application program operation method and mobile terminal
CN107423018B (en) A kind of multi-screen display method and terminal
CN110188520B (en) Application authority management method and mobile terminal
CN107566622B (en) Temperature control method and mobile terminal
US20140104178A1 (en) Electronic device for performing mode coversion in performing memo function and method thereof
CN106484262A (en) A kind of generation method of application of attending to anything else, device and terminal
WO2018166469A1 (en) Method for multi-path copying and pasting, and mobile terminal
EP2821910A1 (en) Method for disabling a locking screen by selecting colors and rotation directions and electronic device using the method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant