CN107392035A - Protect method, mobile terminal and the computer-readable recording medium of data safety - Google Patents

Protect method, mobile terminal and the computer-readable recording medium of data safety Download PDF

Info

Publication number
CN107392035A
CN107392035A CN201710590892.9A CN201710590892A CN107392035A CN 107392035 A CN107392035 A CN 107392035A CN 201710590892 A CN201710590892 A CN 201710590892A CN 107392035 A CN107392035 A CN 107392035A
Authority
CN
China
Prior art keywords
event
safe charging
mobile terminal
module
confidential information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710590892.9A
Other languages
Chinese (zh)
Other versions
CN107392035B (en
Inventor
彭凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710590892.9A priority Critical patent/CN107392035B/en
Publication of CN107392035A publication Critical patent/CN107392035A/en
Application granted granted Critical
Publication of CN107392035B publication Critical patent/CN107392035B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses it is a kind of protect data safety method, applied to technical field of mobile terminals, including:When listen to triggering into safe charging pattern event when, into safe charging pattern, under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, judge whether the level of security for the target data that data acquisition request is pointed to is more than pre-set level, if the level of security of target data is more than pre-set level, external equipment is sent to after target data is encrypted according to default cipher mode, and solution confidential information is exported by default mode.The embodiment of the invention also discloses a kind of mobile terminal and computer-readable recording medium.Method, mobile terminal and the computer-readable recording medium of above-mentioned protection data safety, it is ensured that the safety of user profile during charging.

Description

Protect method, mobile terminal and the computer-readable recording medium of data safety
Technical field
The invention belongs to technical field of mobile terminals, more particularly to a kind of method for protecting data safety, mobile terminal and Computer-readable recording medium.
Background technology
With the development of mobile terminal technology, people are more next to the dependence of the mobile terminals such as smart mobile phone, tablet personal computer It is stronger.Above-mentioned mobile terminal often carries many personal information and privacy of user, including the login password of all kinds of accounts, phase Volume etc..
Currently, by USB (Universal Serial Bus, USB), external charging line carries out charging is one Kind very common charging modes, but this charging modes can also carry out data transmission in the lump while charging, thus with compared with Big potential safety hazard.Particularly there are the shared charging service more than comparison, such as shared charger baby in the market, if illegal point Son control platform built-in inside charger or charger baby, then be easy to when user charges, the safety cracked in terminal is prevented Line, steal user's secret.
The content of the invention
The embodiment of the present invention provides a kind of method, mobile terminal and computer-readable recording medium for protecting data safety, The safety of user profile during can ensureing to charge.
First aspect of the embodiment of the present invention provides a kind of method for protecting data safety, is carried out applied to for mobile terminal During charging, including:When listen to triggering into safe charging pattern event when, into the safe charging pattern;Described Under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, judge that the data obtain Take whether the level of security of the target data of request sensing is more than pre-set level;If the level of security of the target data is more than institute Pre-set level is stated, then the external equipment is sent to after the target data is encrypted according to default cipher mode, and will solution Confidential information is exported by default mode.
Second aspect of the embodiment of the present invention provides a kind of mobile terminal, including:Control module, triggering is listened to for working as Into safe charging pattern event when, into the safe charging pattern;Rank judge module, in the safe charging Under pattern, when receiving the data acquisition request that external equipment is sent by charging wire, judge that the data acquisition request refers to To the level of security of target data whether be more than pre-set level;Encrypting module, if the judgement for the rank judge module As a result it is more than the pre-set level for the level of security of the target data, then by the target data according to default encryption side Formula is encrypted;Output module, for the target data after encryption to be sent into the external equipment, and solution confidential information is led to Default mode is crossed to be exported.
The third aspect of the embodiment of the present invention provides a kind of mobile terminal, including:Memory, processor and it is stored in described It is real described in the computing device during computer program on memory and the computer program that can run on the processor The method for the protection data safety that existing embodiments of the present invention first aspect provides.
Fourth aspect of the embodiment of the present invention provides a kind of computer-readable recording medium, is stored thereon with computer journey Sequence, when the computer program is executed by processor, realize the protection data peace that embodiments of the present invention first aspect provides Full method.
Method, mobile terminal and the computer-readable storage medium for the protection data safety that the embodiments of the present invention provide Matter, by under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, if the number It is more than pre-set level according to the level of security for obtaining the target data that request is pointed to, then by the target data according to default encryption side External equipment is sent to after formula encryption, and solution confidential information is exported by default mode, on the one hand, due to the number of output According to being by encryption, even if external equipment obtains the data, the data also can not be understood because of that can not decrypt Content information, so as to the safety of user profile during ensure that charging, on the other hand, solution confidential information is entered by default mode Row output, ensure that charging during user profile it is safe while, will not hamper normal users data export operation.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention.
Fig. 1 is the hardware structure diagram for the mobile terminal that one embodiment of the invention provides.
Fig. 2 is the implementation process schematic diagram of the method for the protection data safety that one embodiment of the invention provides.
Fig. 3 is the implementation process schematic diagram of the method for the protection data safety that another embodiment of the present invention provides.
Fig. 4 is the structural representation for the mobile terminal that one embodiment of the invention provides.
Fig. 5 is the structural representation for the mobile terminal that another embodiment of the present invention provides.
Fig. 6 is to carry out safe charging using the method for protection data safety provided in an embodiment of the present invention in actual applications Mobile terminal a schematic diagram.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described reality It is only part of the embodiment of the present invention to apply example, and not all embodiments.Based on the embodiment in the present invention, people in the art The every other embodiment that member is obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 is the hardware structure diagram for the mobile terminal that one embodiment of the invention provides.As shown in figure 1, institute in the present embodiment The mobile terminal 10 of description, including:
Memory 51, processor 52 and the computer program that can be run on memory 51 and on a processor is stored in, located When managing device and performing the computer program, the side of the protection data safety described in aftermentioned Fig. 2 and embodiment illustrated in fig. 3 is realized Method.
Further, mobile terminal 10 also includes:
At least one input equipment 53 and at least one output equipment 54.
Above-mentioned memory 51, processor 52, input equipment 53 and output equipment 54 are connected by bus 55.
Wherein, input equipment 53 concretely camera, contact panel, physical button or mouse etc..Output equipment 54 concretely display screens.
Memory 51 can be high random access memory body (RAM, Random Access Memory) memory, also may be used For non-labile memory (non-volatile memory), such as magnetic disk storage.Memory 51 is used for one group of storage can Configuration processor code, processor 52 couple with memory 51.
Further, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, the computer-readable storage Medium can be disposed in the mobile terminal in foregoing and aftermentioned each embodiment, before the computer-readable recording medium can be State the memory in embodiment illustrated in fig. 1.Computer program is stored with the computer-readable recording medium, the computer program When being executed by processor, method that the protection data safety described in aftermentioned Fig. 2 and embodiment illustrated in fig. 3 can be achieved.Further Ground, the computer can storage medium can also be USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), RAM, magnetic disc or CD etc. are various can be with the medium of store program codes.
Referring to Fig. 2, Fig. 2 is the implementation process signal of the method for the protection data safety that one embodiment of the invention provides Figure, this method can be applied in mobile terminal, and mobile terminal includes:Can by smart mobile phone that external charging line is charged, The electronic data-processing equipment that tablet personal computer, notebook computer etc. can use on the move.As shown in Fig. 2 this method is mainly wrapped Following steps S301 is included to step S304.
S301, when listen to triggering into safe charging pattern event when, into safe charging pattern.
Specifically, user can be set in interface respectively by pressing predetermined physical button, or to default safe charging The touch operation of menu and button is set, and triggering mobile terminal enters safe charging pattern.Event prison is provided with mobile terminal Device is listened, all kinds of events occurred in mobile terminal are monitored by the event sniffer, such as:Press physical button event, interaction circle Touch event, focus event and menu event for occurring in face etc..The event listened to is delivered to difference by event sniffer Control or same control different event processing method, to be handled.
S302, under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, Judge whether the level of security for the target data that data acquisition request is pointed to is more than pre-set level.
External equipment for example can be:Desktop computer, tablet personal computer, laptop computer, smart mobile phone, mobile charging device The various kinds of equipment that (such as charger baby) can be charged to mobile terminal.
Charging wire can be the data wire for having charge function, such as USB charging wires, can pass through USB or other data-interfaces Access inside mobile terminal.External equipment can be entered by the charging wire while being charged for mobile terminal with mobile terminal Row data interaction.
The level of security of target data can be self-defined according to the operation of user.In a practical application example, if user not from Definition, then the level of security for giving tacit consent to all data is highest.
It should be understood that in the present embodiment, the level of security for the data that external equipment is asked by charging wire is only judged Whether be more than pre-set level, and the level of security for the data asked for external equipment by other modes such as wireless networks whether More than pre-set level then without judging.In this way, it can avoid influenceing the interactive mode that mobile terminal passes through safety with external equipment The data interaction of progress.
If the level of security of target data is more than pre-set level, step S303 is performed:By target data according to default External equipment is sent to after cipher mode encryption, and solution confidential information is exported by default mode.
Cipher mode can be, but not limited to include:Target data is encrypted according to default password, by target data Attribute be arranged to hiding, change the form of target data and call third party's encipheror to be encrypted etc..It is default The way of output can be, but not limited to include:Send instant message, short message and mail etc..The specific way of output can be by user certainly Definition.Solution confidential information can be, but not limited to include:The password of encryption, the password of decryption, the third party of encryption encrypt journey The description information of sequence or the prompt message of cipher mode etc..
If the level of security of target data is not more than pre-set level, step S304 is performed:Target data is sent to outer Portion's equipment.Like this, it is distinguishing to the data of outside device request to handle, data security protecting can be had more Specific aim, improve the flexibility of safeguard protection.
In the embodiment of the present invention, by under safe charging pattern, when receiving what external equipment was sent by charging wire During data acquisition request, if the level of security for the target data that the data acquisition request is pointed to is more than pre-set level, by the mesh Mark data are sent to external equipment after being encrypted according to default cipher mode, and will solution confidential information carried out by default mode it is defeated Go out, on the one hand, because the data of output are by encryption, even if external equipment obtains the data, also because can not Decrypt and the content information of the data can not be understood, so as to the safety of user profile during ensure that charging, on the other hand, will solve Confidential information is exported by default mode, ensure that charging during user profile it is safe while, will not hamper The data export operation of normal users.
Referring to Fig. 3, Fig. 3 is the implementation process signal of the method for the protection data safety that another embodiment of the present invention provides Figure, this method can be applied in mobile terminal, and mobile terminal includes:Can by smart mobile phone that external charging line is charged, The electronic data-processing equipment that tablet personal computer, notebook computer etc. can use on the move.As shown in figure 3, this method is mainly wrapped Following steps S401 is included to step S410.
S401, when listen to triggering into safe charging pattern event when, into safe charging pattern.
Event sniffer is provided with mobile terminal, can be listened to by event sniffer occur in mobile terminal it is each Class event.The event listened to is delivered to the different event processing method of different controls or same control by event sniffer, To be handled.
Optionally, the event that triggering enters safe charging pattern is the press event of predetermined physical button.Specifically, when logical When crossing event sniffer and listening to the press event of predetermined physical button, in response to the event, into safe charging pattern.Its In, predetermined physical button can be user-defined existing function button, such as:Open and close switch, volume key, camera button etc.. To avoid causing function conflict, preferably non-open and close switch, such as volume+key.Or predetermined physical button can also be special Door is used for the physical button into safe charging pattern.Pressing operation can be, but not limited to:Long-press, repeatedly pressing etc..It is specific Can be by User Defined.
Optionally, the event that triggering enters safe charging pattern is the ACK button occurred based on safe charging prompt message Touch event.Specifically, when listening to external charging line insertion event by event sniffer, output safety charge prompting letter Breath.Then, when the confirmation button touch thing that the generation of the safe charging prompt message based on output is listened to by event sniffer During part, into safe charging pattern.The confirmation button touch event wherein occurred based on safe charging prompt message, such as:Cause Contact of the one or more fingers of user on the ACK button that safe charging prompt message output window provides, leave, move Dynamic wait operates and caused touch event.
Optionally, if not having to listen to the confirmation button touch based on safe charging prompt message more than preset time period Event, or, when listening to the refusal button touch event based on the generation of safe charging prompt message, cancel output safety charging Prompt message, and charged according to normal charge mode, i.e., under normal charge mode, external equipment can enter with main control chip Row data interaction.It should be understood that the ACK button in the present embodiment be with confirm implication button, such as with "Yes", " Y ", " it is determined that " etc. printed words button.Refusal button is the button with refusal implication, such as with "No", " N ", " closing " word The button of sample.
To further illustrate the method for the protection data safety of the present embodiment offer, by taking the mobile terminal shown in Fig. 6 as an example, When the press event for listening to the physical button 1 in Fig. 6, in response to the press event, into safe charging pattern.Or Still by taking the mobile terminal shown in Fig. 6 as an example, when listening to external charging 2 insertion event of line, pop-up window 3, and in window 3 Output safety charge prompting information.Then, when listening to 4 touch event of ACK button in window 3, into safe charging mould Formula.Optionally, before safe charging pattern is entered in response to the press event of physical button 1, also can the charging of first output safety carry Show information, when listening to 4 touch event of ACK button in window 3, into safe charging pattern.
Optionally, triggering is to set interface generation really based on default safe charging into the event of safe charging pattern Recognize button touch event, such as:Because the triggering that is used for that one or more fingers of user provide at the interface enters safe charging The various setting menus of pattern and the contact on button, the operation such as leave, move and caused touch event.Specifically, Safe charging is preset in mobile terminal functional module is set, when listening to the event of triggering progress safe charging setting, passed through Safe charging sets functional module to export default safe charging and sets interface.Then, fill when listening to the safety based on output When electricity sets the confirmation button touch event that interface occurs, into the safe charging pattern.Wherein, triggering carries out safe charging The event of setting, such as:Safe charging sets the touch event of the shortcut icon of functional module, safe charging to set quick physics Press event of key etc..
S402, under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, Judge whether the level of security for the target data that data acquisition request is pointed to is more than pre-set level.
If the level of security of target data is not more than pre-set level, step S403 is performed:Target data is sent to outer Portion's equipment.
If the level of security of target data is more than pre-set level, step S404 is performed:Generate random cipher, and according to Target data is encrypted secret code.
External equipment for example can be:Desktop computer, tablet personal computer, laptop computer, smart mobile phone, mobile charging device The various kinds of equipment that (such as charger baby) can be charged to mobile terminal.
Charging wire can be the data wire for having charge function, such as USB charging wires, can pass through USB or other data-interfaces Access inside mobile terminal.External equipment can be entered by the charging wire while being charged for mobile terminal with mobile terminal Row data interaction.
The level of security of target data can be self-defined according to the operation of user.In a practical application example, if user not from Definition, then the level of security for giving tacit consent to all data is highest.
Specifically, user can be quickly triggered by any of above-mentioned steps S401 mode into safe charging mould Formula, under safe charging pattern, the electric current on the one hand inputted using external equipment by charging wire is filled for the battery loaded Electricity, on the other hand, when receiving the data acquisition request that external equipment is sent by charging wire, judge the data acquisition request Whether the level of security of the target data of sensing is more than pre-set level.And when the level of security of the target data is more than default level Not, before sending, random cipher is generated, and according to the random cipher to target data is encrypted.When the number of targets According to level of security be not more than pre-set level when, the target data is directly sent to external equipment.
Optionally, in other embodiment, the Crypted password as solution confidential information also can be by User Defined.
Whether S405, judgement are currently connected with wireless network.
If being currently connected with wireless network, step S406 is performed:Using random cipher as solution confidential information, with instant message Mode sent to default account number.
If current be not connected with having wireless network, step S407 is performed:Using random cipher as solution confidential information, with short message Mode exports.
Judged by network type, select mode the most suitable to export solution confidential information, it can be ensured that solution confidential information can Really obtained by the actual owner of the machine.Wherein, recipient's account number of instant message and the cell-phone number for receiving short message Code, can be by User Defined.Optionally, be defaulted as mobile terminal own mobile phone number and mobile terminal in log in it is instant The user account number of communication software association.That is, user oneself includes the short message or instant message for solving confidential information to oneself transmission one.
S408, when receiving instant message or short message, judge receive instant message or short message in whether comprising decryption Information.
Specifically, can by extract receive instant message or short message in keyword, judge the keyword whether with Whether default keyword matches, to judge in the instant message of reception or short message comprising solution confidential information.Default keyword Such as can be " safe charging ", " decryption ", " password " etc..
If step S409 is not performed comprising solution confidential information in the instant message or short message that receive:Output system push The instant message of reception or the announcement information of short message.
If perform step S410 comprising solution confidential information in the instant message or short message that receive:Intercepting system push connects The instant message of receipts or the announcement information of short message.
If receive instant message or short message in comprising solution confidential information, illustrate receive instant message or short message in wrap What is contained is general information, it is allowed to handled according to General Logic, such as:The instant message or short of the reception of output system push The announcement information of letter.If receive instant message or short message in comprising solution confidential information, intercepting system push reception it is instant The announcement information of message or short message, to prevent non-native actual owner from obtaining this by mobile charging devices such as charger babies After the critical data of machine, by stealing a glance at the PUSH message of the machine, the solution confidential information of the critical data is obtained, so as to further protect The safety of native data.
In other of the invention embodiments, can not also when receiving instant message or short message, judge to receive i.e. When message or short message in whether comprising solution confidential information, but when listen to triggering check the event of instant message or short message when, Judge the event point to instant message or short message in whether comprising solution confidential information, if the event point to instant message or short message In comprising solution confidential information, then export Xie Ping interfaces.Then, obtained by Xie Ping interfaces and solve screen information, if solution screen information is with presetting Information match, then export the instant message of event sensing or the content of short message.If the instant message or short that the event is pointed to Do not include solution confidential information in letter, then export the instant message of event sensing or the content of short message.Wherein, solution screen information can with but It is not limited to any of fingerprint, character password, picture, gesture etc..In actual applications, the solution screen under safe charging pattern Information can be identical with the solution screen information under non-security charge mode, can also be different, can specifically be operated according to user self-defined.
Or optionally, while step S408 to step S410 is performed, when listen to triggering check instant message or During the event of short message, judge the event point to instant message or short message in whether comprising solution confidential information, if the event point to Comprising solution confidential information in instant message or short message, then Xie Ping interfaces are exported.Then, solution screen information is obtained by Xie Ping interfaces, if Solution screen information matches with presupposed information, then exports the instant message of event sensing or the content of short message.If the event is pointed to Instant message or short message in do not include solution confidential information, then export the event sensing instant message or short message content.
Optionally, if solution screen information does not match that with presupposed information, into screen lock state.
Optionally, when listening to external charging line extraction event, safe charging pattern is exited.Or existed according to user Default safe charging sets the operation for exiting safe charging that interface is carried out, or, when detecting user to default physics During the pressing operation for exiting safe charging pattern that button is carried out, safe charging pattern is exited and enters charging normal mould Formula.And when entering normal charge mode, recover the normal transmission of data.
In the embodiment of the present invention, by under safe charging pattern, when receiving what external equipment was sent by charging wire During data acquisition request, if the level of security for the target data that the data acquisition request is pointed to is more than pre-set level, by the mesh Mark data are sent to external equipment after being encrypted according to default cipher mode, and will solution confidential information carried out by default mode it is defeated Go out, on the one hand, because the data of output are by encryption, even if external equipment obtains the data, also because can not Decrypt and the content information of the data can not be understood, so as to the safety of user profile during ensure that charging, on the other hand, will solve Confidential information is exported by default mode, ensure that charging during user profile it is safe while, will not hamper The data export operation of normal users.
Referring to Fig. 4, Fig. 4 is the structural representation for the mobile terminal that one embodiment of the invention provides, for convenience of description, It illustrate only the part related to the embodiment of the present invention.The mobile terminal of Fig. 4 examples can be that foregoing embodiment illustrated in fig. 2 provides Protection data safety method executive agent, mainly include:
Control module 501, for when listen to triggering into safe charging pattern event when, into the safe charging mould Formula.
Rank judge module 502, under the safe charging pattern, being sent when receiving external equipment by charging wire Data acquisition request when, judge whether the level of security of target data that the data acquisition request is pointed to is more than pre-set level.
Encrypting module 503, if the judged result for rank judge module 502 is more than for the level of security of the target data The pre-set level, then the target data is encrypted according to default cipher mode.
Output module 504, for the target data after encryption to be sent into the external equipment, and solution confidential information is passed through Default mode is exported.
Specifically, being provided with event sniffer in mobile terminal, enter safety when listening to triggering by event sniffer During the event of charge mode, safe charging pattern is entered by control module 501.Then, by rank judge module 502 at this Under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, the data acquisition is judged Whether the level of security for the target data for asking to point to is more than pre-set level.If the judged result of rank judge module 502 is should The level of security of target data is more than the pre-set level, then by encrypting module 503 by the target data according to default encryption Mode is encrypted, and the target data after encryption is sent into the external equipment by output module 504, and will solve secret letter Breath is exported by default mode.
Further, if the judged result of rank judge module 502 is pre- no more than this for the level of security of the target data If rank, then the target data is sent to by the external equipment by output module 504.
The details of the present embodiment not to the greatest extent, refers to description of the earlier figures 1 to embodiment illustrated in fig. 3, here is omitted.
It should be noted that in the embodiment of the mobile terminal of figure 4 above example, the division of each functional module is only to lift Example explanation, can be as needed in practical application, such as the convenient consideration of the realization of the configuration requirement or software of corresponding hardware, And complete above-mentioned function distribution by different functional modules, i.e., the internal structure of mobile terminal is divided into different function moulds Block, to complete all or part of function described above.Moreover, in practical application, the corresponding function mould in the present embodiment Block can be realized by corresponding hardware, can also perform corresponding software by corresponding hardware and complete.What this specification provided Each embodiment can all apply foregoing description principle, repeat no more below.
In the embodiment of the present invention, by under safe charging pattern, when receiving what external equipment was sent by charging wire During data acquisition request, if the level of security for the target data that the data acquisition request is pointed to is more than pre-set level, by the mesh Mark data are sent to external equipment after being encrypted according to default cipher mode, and will solution confidential information carried out by default mode it is defeated Go out, on the one hand, because the data of output are by encryption, even if external equipment obtains the data, also because can not Decrypt and the content information of the data can not be understood, so as to the safety of user profile during ensure that charging, on the other hand, will solve Confidential information is exported by default mode, ensure that charging during user profile it is safe while, will not hamper The data export operation of normal users.
Referring to Fig. 5, the structural representation for the mobile terminal that another embodiment of the present invention provides, for convenience of description, only Show the part related to the embodiment of the present invention.The mobile terminal of Fig. 5 examples can be earlier figures 2 or embodiment illustrated in fig. 3 The executive agent of the method for the protection data safety of offer.The mobile terminal of Fig. 5 examples, with the movement in embodiment illustrated in fig. 4 The difference of terminal essentially consists in:
Further, encrypting module 503, it is additionally operable to generate random cipher, and according to the random cipher by the target data It is encrypted.
Optionally, encrypting module 503 is additionally operable to obtain the self-defined password of user's input, and will according to the self-defined password Target data is encrypted.
Further, the mobile terminal also includes:
Network judge module 601, for judging currently whether be connected with wireless network.
Output module 504, if the judged result for being additionally operable to network judge module 601 is currently to be connected with the wireless network, Then using the random cipher as the solution confidential information, sent in a manner of instant message to default account number, and if network judge mould The judged result of block 601 is currently is not connected with the wireless network, then using the random cipher as the solution confidential information, with the side of short message Formula exports.
Specifically, after target data is encrypted by encrypting module 503, judged by network judge module 601 Currently whether it is connected with wireless network.If being currently connected with the wireless network, the random cipher is made by output module 504 For the solution confidential information, sent in a manner of instant message to default account number.And if currently be not connected with the wireless network, by defeated Go out module 504 using the random cipher as the solution confidential information, exported in a manner of short message.
Further, the mobile terminal also includes:
Content judgment module 602, for the instant message or short message for when receiving instant message or short message, judging to receive In whether include the solution confidential information.
Blocking module 603, if the judged result for content judgment module 602 is the instant message or short message bag of the reception The instant message of the reception or the announcement information of short message containing the solution confidential information, then intercepting system push.
Solve panel module 604, for when listen to triggering check the event of instant message or short message when, if the event point to The solution confidential information is included in instant message or short message, then exports Xie Ping interfaces, and solution screen information is obtained by the Xie Ping interfaces, if The solution screen information matches with presupposed information, then triggers output module 504 and export instant message or the short message that the event is pointed to Content.
Specifically, when receiving instant message or short message, the instant message of reception is judged by content judgment module 602 Or whether include the solution confidential information in short message.If the instant message or short message of the reception include the solution confidential information, pass through interception The instant message of the reception or the announcement information of short message of the intercepting system of module 603 push.If the instant message of the reception is short Letter includes the solution confidential information, then the instant message of the reception or the notice of short message pushed by the output system of output module 504 Information.
When listen to triggering check the event of instant message or short message when, if the event point to instant message or short message in Comprising the solution confidential information, then Xie Ping interfaces are exported by solving panel module 604, and solution screen information is obtained by the Xie Ping interfaces, if The solution screen information matches with presupposed information, then exports the instant message of event sensing or the content of short message.If the event refers to To instant message or short message in do not include the solution confidential information, then pass through output module 504 export the event point to immediately disappearing The content of breath or short message.If in addition, the solution screen information does not match that with presupposed information, into screen lock state.
Further, control module 501, it is additionally operable to when listening to the press event of predetermined physical button, into the peace Full charge mode.
The mobile terminal also includes:
Nformation alert module 605, for when listening to external charging line insertion event, output safety charge prompting to be believed Breath.
Control module 501, it is additionally operable to work as the confirmation button touch thing for listening to and occurring based on the safe charging prompt message During part, into the safe charging pattern.
The mobile terminal also includes:
Interface output module 606, for when listening to the event of triggering progress safe charging setting, exporting default peace Full charging sets interface.
Control module 501, it is additionally operable to work as the confirmation button touch thing for listening to and setting interface to occur based on the safe charging During part, into the safe charging pattern.
Specifically, in the event for the data-interface that external charging line insertion mobile terminal is listened to by event sniffer When, by the output safety charge prompting information of nformation alert module 605, to prompt the user whether to enter safe charging pattern.So Afterwards, by control module 501 in response to listening to the confirmation button touch event occurred based on the safe charging prompt message, Into the safe charging pattern.
Specifically, can also preset safe charging in the terminal sets functional module.By event sniffer monitor because Click on the operation of shortcut icon or the operation hair of the quick secondary or physical bond of pressing safe charging setting that safe charging sets functional module Raw triggering carries out the event of safe charging setting.Then, by interface output module 606 in response to listen to this trigger into The event that row safe charging is set, export default safe charging and interface is set.Afterwards, when listening to base by event sniffer When the confirmation button touch event that the safe charging sets interface to occur, touched by control module 501 in response to what is listened to Event is touched, into safe charging pattern.
Further, it can also exit safety by control module 501 when listening to external charging line extraction event and fill Power mode.Or peace can also be exited what default safe charging setting interface was carried out according to user by control module 501 Completely charged operates, or, when detect that user carries out to default physical button for exit safe charging pattern by During press operation, exit safe charging pattern and enter normal charge mode.And when entering normal charge mode, recover data Normal transmission.
The details of the present embodiment not to the greatest extent, refers to description of the earlier figures 1 to embodiment illustrated in fig. 4, here is omitted.
In the embodiment of the present invention, by under safe charging pattern, when receiving what external equipment was sent by charging wire During data acquisition request, if the level of security for the target data that the data acquisition request is pointed to is more than pre-set level, by the mesh Mark data are sent to external equipment after being encrypted according to default cipher mode, and will solution confidential information carried out by default mode it is defeated Go out, on the one hand, because the data of output are by encryption, even if external equipment obtains the data, also because can not Decrypt and the content information of the data can not be understood, so as to the safety of user profile during ensure that charging, on the other hand, will solve Confidential information is exported by default mode, ensure that charging during user profile it is safe while, will not hamper The data export operation of normal users.
In multiple embodiments provided herein, it should be understood that disclosed mobile terminal and method, Ke Yitong Other modes are crossed to realize.For example, embodiments described above is only schematical, for example, the division of the module, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple module or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed Mutual coupling or direct-coupling or communication linkage can be by some interfaces, the INDIRECT COUPLING or communication chain of module Connect, can be electrical, mechanical or other forms.
The module illustrated as separating component can be or may not be physically separate, show as module The part shown can be or may not be physical module, you can with positioned at a place, or can also be distributed to multiple On mixed-media network modules mixed-media.Some or all of module therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional module in each embodiment of the present invention can be integrated in a processing module, can also That modules are individually physically present, can also two or more modules be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, can also be realized in the form of software function module.
It should be noted that for foregoing each method embodiment, in order to which simplicity describes, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this hairs Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
It is method, mobile terminal and the computer-readable recording medium to protection data safety provided by the present invention above Description, for those of ordinary skill in the art, according to the thought of the embodiment of the present invention, in embodiment and using model There will be changes are placed, to sum up, this specification content should not be construed as limiting the invention.

Claims (13)

  1. A kind of 1. method for protecting data safety, during applied to being charged for mobile terminal, it is characterised in that methods described bag Include:
    When listen to triggering into safe charging pattern event when, into the safe charging pattern;
    Under the safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, judge Whether the level of security for the target data that the data acquisition request is pointed to is more than pre-set level;
    If the level of security of the target data is more than the pre-set level, by the target data according to default encryption side The external equipment is sent to after formula encryption, and solution confidential information is exported by default mode.
  2. 2. as claimed in claim 1 protection data safety method, it is characterised in that it is described by the target data according to pre- If cipher mode encryption after be sent to the external equipment, including:
    Random cipher is generated, and the external equipment is sent to after the target data is encrypted according to the random cipher;
    It is described to be exported solution confidential information by default mode, including:
    Whether judgement is currently connected with wireless network;
    If being connected with the wireless network, using the random cipher as the solution confidential information, in a manner of instant message to Default account number is sent;
    If being not connected with the wireless network, using the random cipher as the solution confidential information, exported in a manner of short message.
  3. 3. the method for the protection data safety as described in right wants 2, it is characterised in that described that solution confidential information is passed through into default side After formula output, in addition to:
    When receiving instant message or short message, judge receive instant message or short message in whether include the solution confidential information;
    If include the solution confidential information, the instant message of the reception or the announcement information of short message of intercepting system push.
  4. 4. as claimed in claim 2 or claim 3 protection data safety method, it is characterised in that it is described will solution confidential information pass through it is pre- If mode export after, in addition to:
    When listen to triggering check the event of instant message or short message when, if the event point to instant message or short message in wrap Containing the solution confidential information, then Xie Ping interfaces are exported;
    Solution screen information is obtained by the Xie Ping interfaces, if the solution screen information matches with presupposed information, exports the thing The instant message or the content of short message that part points to.
  5. 5. as claimed in claim 1 protection data safety method, it is characterised in that it is described when listen to triggering enter safety During the event of charge mode, include into the safe charging pattern:
    When listening to the press event of predetermined physical button, into the safe charging pattern.
  6. 6. as claimed in claim 1 protection data safety method, it is characterised in that it is described when listen to triggering enter safety During the event of charge mode, include before into the safe charging pattern:
    When listening to external charging line insertion event, output safety charge prompting information;
    It is described when listen to triggering into safe charging pattern event when, include into the safe charging pattern:
    When listening to the confirmation button touch event based on safe charging prompt message generation, into the safe charging Pattern.
  7. 7. as claimed in claim 1 protection data safety method, it is characterised in that it is described when listen to triggering enter safety During the event of charge mode, include before into the safe charging pattern:
    When listening to the event of triggering progress safe charging setting, export default safe charging and interface is set;
    It is described when listen to triggering into safe charging pattern event when, include into the safe charging pattern:
    When listening to the confirmation button touch event based on safe charging setting interface generation, into the safe charging Pattern.
  8. A kind of 8. mobile terminal, it is characterised in that including:
    Control module, for when listen to triggering into safe charging pattern event when, into the safe charging pattern;
    Rank judge module, under the safe charging pattern, when the number for receiving external equipment and being sent by charging wire During according to obtaining request, judge whether the level of security for the target data that the data acquisition request is pointed to is more than pre-set level;
    Encrypting module, if the judged result for the rank judge module be more than for the level of security of the target data it is described Pre-set level, then the target data is encrypted according to default cipher mode;
    Output module, for the target data after encryption to be sent into the external equipment, and solution confidential information is passed through and preset Mode exported.
  9. 9. mobile terminal as claimed in claim 8, it is characterised in that
    The encrypting module, it is additionally operable to generate random cipher, and the target data is encrypted according to the random cipher;
    The mobile terminal also includes:
    Network judge module, for judging currently whether be connected with wireless network;
    The output module, if the judged result for being additionally operable to the network judge module is currently to be connected with the wireless network, Then using the random cipher as the solution confidential information, sent in a manner of instant message to default account number, and if the net The judged result of network judge module is currently is not connected with the wireless network, then using the random cipher as the solution secret letter Breath, is exported in a manner of short message.
  10. 10. the mobile terminal as described in right wants 9, it is characterised in that the mobile terminal also includes:
    Content judgment module, for when receiving instant message or short message, judge receive instant message or short message in whether Include the solution confidential information;
    Blocking module, if the judged result for the content judgment module includes institute for the instant message or short message of the reception Solution confidential information is stated, then the instant message of the reception or the announcement information of short message of intercepting system push;
    Solve panel module, for when listen to triggering check the event of instant message or short message when, if the event point to it is instant The solution confidential information is included in message or short message, then exports Xie Ping interfaces, and solution screen information is obtained by the Xie Ping interfaces, if The solution screen information matches with presupposed information, then triggers the output module and export the instant message or short that the event is pointed to The content of letter.
  11. 11. the mobile terminal as described in any one of claim 8 to 10, it is characterised in that
    The control module, it is additionally operable to when listening to the press event of predetermined physical button, into the safe charging pattern;
    The mobile terminal also includes:
    Nformation alert module, for when listening to external charging line insertion event, output safety charge prompting information;
    The control module, it is additionally operable to work as the confirmation button touch event for listening to and occurring based on the safe charging prompt message When, into the safe charging pattern;
    The mobile terminal also includes:
    Interface output module, for when listening to the event of triggering progress safe charging setting, exporting default safe charging Interface is set;
    The control module, it is additionally operable to work as the confirmation button touch event for listening to and setting interface to occur based on the safe charging When, into the safe charging pattern.
  12. 12. a kind of mobile terminal, including:Memory, processor and it is stored on the memory and can be on the processor The computer program of operation, it is characterised in that described in the computing device during computer program, realize such as claim 1 to 7 Any one of described in protection data safety method.
  13. 13. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program When being executed by processor, the method for protection data safety of the realization as described in any one of claim 1 to 7.
CN201710590892.9A 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium Expired - Fee Related CN107392035B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710590892.9A CN107392035B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710590892.9A CN107392035B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107392035A true CN107392035A (en) 2017-11-24
CN107392035B CN107392035B (en) 2020-08-18

Family

ID=60335788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710590892.9A Expired - Fee Related CN107392035B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107392035B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110928467A (en) * 2019-11-19 2020-03-27 广东欢太科技有限公司 Connection option display method and device and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060117664A (en) * 2005-05-13 2006-11-17 주식회사 팬택 Method for booting of mobile communication set and apparatus thereof
CN102117251A (en) * 2009-12-31 2011-07-06 比亚迪股份有限公司 Method for selecting application mode of universal serial bus (USB) equipment and USB equipment
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103546289A (en) * 2013-09-29 2014-01-29 北京握奇智能科技有限公司 USB (universal serial bus) Key based secure data transmission method and system
CN104200172A (en) * 2014-08-29 2014-12-10 公安部第一研究所 Safe leading-in device, system and method for USB data
CN105550568A (en) * 2015-12-25 2016-05-04 小米科技有限责任公司 Mobile terminal data protection method and apparatus
CN106874232A (en) * 2015-12-14 2017-06-20 中兴通讯股份有限公司 The charging method of general-purpose serial bus USB, device and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060117664A (en) * 2005-05-13 2006-11-17 주식회사 팬택 Method for booting of mobile communication set and apparatus thereof
CN102117251A (en) * 2009-12-31 2011-07-06 比亚迪股份有限公司 Method for selecting application mode of universal serial bus (USB) equipment and USB equipment
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103546289A (en) * 2013-09-29 2014-01-29 北京握奇智能科技有限公司 USB (universal serial bus) Key based secure data transmission method and system
CN104200172A (en) * 2014-08-29 2014-12-10 公安部第一研究所 Safe leading-in device, system and method for USB data
CN106874232A (en) * 2015-12-14 2017-06-20 中兴通讯股份有限公司 The charging method of general-purpose serial bus USB, device and terminal
CN105550568A (en) * 2015-12-25 2016-05-04 小米科技有限责任公司 Mobile terminal data protection method and apparatus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110928467A (en) * 2019-11-19 2020-03-27 广东欢太科技有限公司 Connection option display method and device and computer readable storage medium
CN110928467B (en) * 2019-11-19 2021-07-27 广东欢太科技有限公司 Connection option display method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN107392035B (en) 2020-08-18

Similar Documents

Publication Publication Date Title
CN106534570B (en) A kind of method for secret protection and device
CN104978109B (en) A kind of Application Program Interface display methods and terminal
CN104077533B (en) A kind of method and apparatus for operating sensitive data
CN104933342B (en) A kind of picture inspection method and mobile terminal
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
CN104579668B (en) The verification method and cipher protection apparatus and verifying system of a kind of user identity
CN104008346A (en) Method and device for starting privacy mode of data processing device
CN103095457A (en) Login and verification method for application program
CN106611310B (en) Data processing method, wearable electronic device and system
CN106778337B (en) Document protection method, device and terminal
CN106849244B (en) A kind of voltage control method of charging interface, charger and mobile terminal
CN103761201B (en) Terminal applies event-handling method and device
CN104182680A (en) User name password management and user name password input method and system
CN107615294A (en) A kind of identifying code short message display method and mobile terminal
CN105373737A (en) Application encryption method and mobile terminal
CN106503507A (en) Method and mobile terminal that a kind of password shows
CN102984349A (en) Method and device for screen locking code generating and screen unlocking method and screen unlocking device and mobile terminal
CN105653864A (en) Medical record information sharing method and device
CN107273736A (en) Cipher-code input method, device, computer equipment and storage medium
CN106713618A (en) Processing method of identifying code and mobile terminal
CN105574376A (en) Screen unlocking device, system and method
CN105159557B (en) The generation method and mobile terminal of a kind of unlocking pin
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN106529236A (en) Unlocking method, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200818