CN107392035A - Protect method, mobile terminal and the computer-readable recording medium of data safety - Google Patents
Protect method, mobile terminal and the computer-readable recording medium of data safety Download PDFInfo
- Publication number
- CN107392035A CN107392035A CN201710590892.9A CN201710590892A CN107392035A CN 107392035 A CN107392035 A CN 107392035A CN 201710590892 A CN201710590892 A CN 201710590892A CN 107392035 A CN107392035 A CN 107392035A
- Authority
- CN
- China
- Prior art keywords
- event
- safe charging
- mobile terminal
- module
- confidential information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses it is a kind of protect data safety method, applied to technical field of mobile terminals, including:When listen to triggering into safe charging pattern event when, into safe charging pattern, under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, judge whether the level of security for the target data that data acquisition request is pointed to is more than pre-set level, if the level of security of target data is more than pre-set level, external equipment is sent to after target data is encrypted according to default cipher mode, and solution confidential information is exported by default mode.The embodiment of the invention also discloses a kind of mobile terminal and computer-readable recording medium.Method, mobile terminal and the computer-readable recording medium of above-mentioned protection data safety, it is ensured that the safety of user profile during charging.
Description
Technical field
The invention belongs to technical field of mobile terminals, more particularly to a kind of method for protecting data safety, mobile terminal and
Computer-readable recording medium.
Background technology
With the development of mobile terminal technology, people are more next to the dependence of the mobile terminals such as smart mobile phone, tablet personal computer
It is stronger.Above-mentioned mobile terminal often carries many personal information and privacy of user, including the login password of all kinds of accounts, phase
Volume etc..
Currently, by USB (Universal Serial Bus, USB), external charging line carries out charging is one
Kind very common charging modes, but this charging modes can also carry out data transmission in the lump while charging, thus with compared with
Big potential safety hazard.Particularly there are the shared charging service more than comparison, such as shared charger baby in the market, if illegal point
Son control platform built-in inside charger or charger baby, then be easy to when user charges, the safety cracked in terminal is prevented
Line, steal user's secret.
The content of the invention
The embodiment of the present invention provides a kind of method, mobile terminal and computer-readable recording medium for protecting data safety,
The safety of user profile during can ensureing to charge.
First aspect of the embodiment of the present invention provides a kind of method for protecting data safety, is carried out applied to for mobile terminal
During charging, including:When listen to triggering into safe charging pattern event when, into the safe charging pattern;Described
Under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, judge that the data obtain
Take whether the level of security of the target data of request sensing is more than pre-set level;If the level of security of the target data is more than institute
Pre-set level is stated, then the external equipment is sent to after the target data is encrypted according to default cipher mode, and will solution
Confidential information is exported by default mode.
Second aspect of the embodiment of the present invention provides a kind of mobile terminal, including:Control module, triggering is listened to for working as
Into safe charging pattern event when, into the safe charging pattern;Rank judge module, in the safe charging
Under pattern, when receiving the data acquisition request that external equipment is sent by charging wire, judge that the data acquisition request refers to
To the level of security of target data whether be more than pre-set level;Encrypting module, if the judgement for the rank judge module
As a result it is more than the pre-set level for the level of security of the target data, then by the target data according to default encryption side
Formula is encrypted;Output module, for the target data after encryption to be sent into the external equipment, and solution confidential information is led to
Default mode is crossed to be exported.
The third aspect of the embodiment of the present invention provides a kind of mobile terminal, including:Memory, processor and it is stored in described
It is real described in the computing device during computer program on memory and the computer program that can run on the processor
The method for the protection data safety that existing embodiments of the present invention first aspect provides.
Fourth aspect of the embodiment of the present invention provides a kind of computer-readable recording medium, is stored thereon with computer journey
Sequence, when the computer program is executed by processor, realize the protection data peace that embodiments of the present invention first aspect provides
Full method.
Method, mobile terminal and the computer-readable storage medium for the protection data safety that the embodiments of the present invention provide
Matter, by under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, if the number
It is more than pre-set level according to the level of security for obtaining the target data that request is pointed to, then by the target data according to default encryption side
External equipment is sent to after formula encryption, and solution confidential information is exported by default mode, on the one hand, due to the number of output
According to being by encryption, even if external equipment obtains the data, the data also can not be understood because of that can not decrypt
Content information, so as to the safety of user profile during ensure that charging, on the other hand, solution confidential information is entered by default mode
Row output, ensure that charging during user profile it is safe while, will not hamper normal users data export operation.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention.
Fig. 1 is the hardware structure diagram for the mobile terminal that one embodiment of the invention provides.
Fig. 2 is the implementation process schematic diagram of the method for the protection data safety that one embodiment of the invention provides.
Fig. 3 is the implementation process schematic diagram of the method for the protection data safety that another embodiment of the present invention provides.
Fig. 4 is the structural representation for the mobile terminal that one embodiment of the invention provides.
Fig. 5 is the structural representation for the mobile terminal that another embodiment of the present invention provides.
Fig. 6 is to carry out safe charging using the method for protection data safety provided in an embodiment of the present invention in actual applications
Mobile terminal a schematic diagram.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention
Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described reality
It is only part of the embodiment of the present invention to apply example, and not all embodiments.Based on the embodiment in the present invention, people in the art
The every other embodiment that member is obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 is the hardware structure diagram for the mobile terminal that one embodiment of the invention provides.As shown in figure 1, institute in the present embodiment
The mobile terminal 10 of description, including:
Memory 51, processor 52 and the computer program that can be run on memory 51 and on a processor is stored in, located
When managing device and performing the computer program, the side of the protection data safety described in aftermentioned Fig. 2 and embodiment illustrated in fig. 3 is realized
Method.
Further, mobile terminal 10 also includes:
At least one input equipment 53 and at least one output equipment 54.
Above-mentioned memory 51, processor 52, input equipment 53 and output equipment 54 are connected by bus 55.
Wherein, input equipment 53 concretely camera, contact panel, physical button or mouse etc..Output equipment
54 concretely display screens.
Memory 51 can be high random access memory body (RAM, Random Access Memory) memory, also may be used
For non-labile memory (non-volatile memory), such as magnetic disk storage.Memory 51 is used for one group of storage can
Configuration processor code, processor 52 couple with memory 51.
Further, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, the computer-readable storage
Medium can be disposed in the mobile terminal in foregoing and aftermentioned each embodiment, before the computer-readable recording medium can be
State the memory in embodiment illustrated in fig. 1.Computer program is stored with the computer-readable recording medium, the computer program
When being executed by processor, method that the protection data safety described in aftermentioned Fig. 2 and embodiment illustrated in fig. 3 can be achieved.Further
Ground, the computer can storage medium can also be USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory),
RAM, magnetic disc or CD etc. are various can be with the medium of store program codes.
Referring to Fig. 2, Fig. 2 is the implementation process signal of the method for the protection data safety that one embodiment of the invention provides
Figure, this method can be applied in mobile terminal, and mobile terminal includes:Can by smart mobile phone that external charging line is charged,
The electronic data-processing equipment that tablet personal computer, notebook computer etc. can use on the move.As shown in Fig. 2 this method is mainly wrapped
Following steps S301 is included to step S304.
S301, when listen to triggering into safe charging pattern event when, into safe charging pattern.
Specifically, user can be set in interface respectively by pressing predetermined physical button, or to default safe charging
The touch operation of menu and button is set, and triggering mobile terminal enters safe charging pattern.Event prison is provided with mobile terminal
Device is listened, all kinds of events occurred in mobile terminal are monitored by the event sniffer, such as:Press physical button event, interaction circle
Touch event, focus event and menu event for occurring in face etc..The event listened to is delivered to difference by event sniffer
Control or same control different event processing method, to be handled.
S302, under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire,
Judge whether the level of security for the target data that data acquisition request is pointed to is more than pre-set level.
External equipment for example can be:Desktop computer, tablet personal computer, laptop computer, smart mobile phone, mobile charging device
The various kinds of equipment that (such as charger baby) can be charged to mobile terminal.
Charging wire can be the data wire for having charge function, such as USB charging wires, can pass through USB or other data-interfaces
Access inside mobile terminal.External equipment can be entered by the charging wire while being charged for mobile terminal with mobile terminal
Row data interaction.
The level of security of target data can be self-defined according to the operation of user.In a practical application example, if user not from
Definition, then the level of security for giving tacit consent to all data is highest.
It should be understood that in the present embodiment, the level of security for the data that external equipment is asked by charging wire is only judged
Whether be more than pre-set level, and the level of security for the data asked for external equipment by other modes such as wireless networks whether
More than pre-set level then without judging.In this way, it can avoid influenceing the interactive mode that mobile terminal passes through safety with external equipment
The data interaction of progress.
If the level of security of target data is more than pre-set level, step S303 is performed:By target data according to default
External equipment is sent to after cipher mode encryption, and solution confidential information is exported by default mode.
Cipher mode can be, but not limited to include:Target data is encrypted according to default password, by target data
Attribute be arranged to hiding, change the form of target data and call third party's encipheror to be encrypted etc..It is default
The way of output can be, but not limited to include:Send instant message, short message and mail etc..The specific way of output can be by user certainly
Definition.Solution confidential information can be, but not limited to include:The password of encryption, the password of decryption, the third party of encryption encrypt journey
The description information of sequence or the prompt message of cipher mode etc..
If the level of security of target data is not more than pre-set level, step S304 is performed:Target data is sent to outer
Portion's equipment.Like this, it is distinguishing to the data of outside device request to handle, data security protecting can be had more
Specific aim, improve the flexibility of safeguard protection.
In the embodiment of the present invention, by under safe charging pattern, when receiving what external equipment was sent by charging wire
During data acquisition request, if the level of security for the target data that the data acquisition request is pointed to is more than pre-set level, by the mesh
Mark data are sent to external equipment after being encrypted according to default cipher mode, and will solution confidential information carried out by default mode it is defeated
Go out, on the one hand, because the data of output are by encryption, even if external equipment obtains the data, also because can not
Decrypt and the content information of the data can not be understood, so as to the safety of user profile during ensure that charging, on the other hand, will solve
Confidential information is exported by default mode, ensure that charging during user profile it is safe while, will not hamper
The data export operation of normal users.
Referring to Fig. 3, Fig. 3 is the implementation process signal of the method for the protection data safety that another embodiment of the present invention provides
Figure, this method can be applied in mobile terminal, and mobile terminal includes:Can by smart mobile phone that external charging line is charged,
The electronic data-processing equipment that tablet personal computer, notebook computer etc. can use on the move.As shown in figure 3, this method is mainly wrapped
Following steps S401 is included to step S410.
S401, when listen to triggering into safe charging pattern event when, into safe charging pattern.
Event sniffer is provided with mobile terminal, can be listened to by event sniffer occur in mobile terminal it is each
Class event.The event listened to is delivered to the different event processing method of different controls or same control by event sniffer,
To be handled.
Optionally, the event that triggering enters safe charging pattern is the press event of predetermined physical button.Specifically, when logical
When crossing event sniffer and listening to the press event of predetermined physical button, in response to the event, into safe charging pattern.Its
In, predetermined physical button can be user-defined existing function button, such as:Open and close switch, volume key, camera button etc..
To avoid causing function conflict, preferably non-open and close switch, such as volume+key.Or predetermined physical button can also be special
Door is used for the physical button into safe charging pattern.Pressing operation can be, but not limited to:Long-press, repeatedly pressing etc..It is specific
Can be by User Defined.
Optionally, the event that triggering enters safe charging pattern is the ACK button occurred based on safe charging prompt message
Touch event.Specifically, when listening to external charging line insertion event by event sniffer, output safety charge prompting letter
Breath.Then, when the confirmation button touch thing that the generation of the safe charging prompt message based on output is listened to by event sniffer
During part, into safe charging pattern.The confirmation button touch event wherein occurred based on safe charging prompt message, such as:Cause
Contact of the one or more fingers of user on the ACK button that safe charging prompt message output window provides, leave, move
Dynamic wait operates and caused touch event.
Optionally, if not having to listen to the confirmation button touch based on safe charging prompt message more than preset time period
Event, or, when listening to the refusal button touch event based on the generation of safe charging prompt message, cancel output safety charging
Prompt message, and charged according to normal charge mode, i.e., under normal charge mode, external equipment can enter with main control chip
Row data interaction.It should be understood that the ACK button in the present embodiment be with confirm implication button, such as with "Yes",
" Y ", " it is determined that " etc. printed words button.Refusal button is the button with refusal implication, such as with "No", " N ", " closing " word
The button of sample.
To further illustrate the method for the protection data safety of the present embodiment offer, by taking the mobile terminal shown in Fig. 6 as an example,
When the press event for listening to the physical button 1 in Fig. 6, in response to the press event, into safe charging pattern.Or
Still by taking the mobile terminal shown in Fig. 6 as an example, when listening to external charging 2 insertion event of line, pop-up window 3, and in window 3
Output safety charge prompting information.Then, when listening to 4 touch event of ACK button in window 3, into safe charging mould
Formula.Optionally, before safe charging pattern is entered in response to the press event of physical button 1, also can the charging of first output safety carry
Show information, when listening to 4 touch event of ACK button in window 3, into safe charging pattern.
Optionally, triggering is to set interface generation really based on default safe charging into the event of safe charging pattern
Recognize button touch event, such as:Because the triggering that is used for that one or more fingers of user provide at the interface enters safe charging
The various setting menus of pattern and the contact on button, the operation such as leave, move and caused touch event.Specifically,
Safe charging is preset in mobile terminal functional module is set, when listening to the event of triggering progress safe charging setting, passed through
Safe charging sets functional module to export default safe charging and sets interface.Then, fill when listening to the safety based on output
When electricity sets the confirmation button touch event that interface occurs, into the safe charging pattern.Wherein, triggering carries out safe charging
The event of setting, such as:Safe charging sets the touch event of the shortcut icon of functional module, safe charging to set quick physics
Press event of key etc..
S402, under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire,
Judge whether the level of security for the target data that data acquisition request is pointed to is more than pre-set level.
If the level of security of target data is not more than pre-set level, step S403 is performed:Target data is sent to outer
Portion's equipment.
If the level of security of target data is more than pre-set level, step S404 is performed:Generate random cipher, and according to
Target data is encrypted secret code.
External equipment for example can be:Desktop computer, tablet personal computer, laptop computer, smart mobile phone, mobile charging device
The various kinds of equipment that (such as charger baby) can be charged to mobile terminal.
Charging wire can be the data wire for having charge function, such as USB charging wires, can pass through USB or other data-interfaces
Access inside mobile terminal.External equipment can be entered by the charging wire while being charged for mobile terminal with mobile terminal
Row data interaction.
The level of security of target data can be self-defined according to the operation of user.In a practical application example, if user not from
Definition, then the level of security for giving tacit consent to all data is highest.
Specifically, user can be quickly triggered by any of above-mentioned steps S401 mode into safe charging mould
Formula, under safe charging pattern, the electric current on the one hand inputted using external equipment by charging wire is filled for the battery loaded
Electricity, on the other hand, when receiving the data acquisition request that external equipment is sent by charging wire, judge the data acquisition request
Whether the level of security of the target data of sensing is more than pre-set level.And when the level of security of the target data is more than default level
Not, before sending, random cipher is generated, and according to the random cipher to target data is encrypted.When the number of targets
According to level of security be not more than pre-set level when, the target data is directly sent to external equipment.
Optionally, in other embodiment, the Crypted password as solution confidential information also can be by User Defined.
Whether S405, judgement are currently connected with wireless network.
If being currently connected with wireless network, step S406 is performed:Using random cipher as solution confidential information, with instant message
Mode sent to default account number.
If current be not connected with having wireless network, step S407 is performed:Using random cipher as solution confidential information, with short message
Mode exports.
Judged by network type, select mode the most suitable to export solution confidential information, it can be ensured that solution confidential information can
Really obtained by the actual owner of the machine.Wherein, recipient's account number of instant message and the cell-phone number for receiving short message
Code, can be by User Defined.Optionally, be defaulted as mobile terminal own mobile phone number and mobile terminal in log in it is instant
The user account number of communication software association.That is, user oneself includes the short message or instant message for solving confidential information to oneself transmission one.
S408, when receiving instant message or short message, judge receive instant message or short message in whether comprising decryption
Information.
Specifically, can by extract receive instant message or short message in keyword, judge the keyword whether with
Whether default keyword matches, to judge in the instant message of reception or short message comprising solution confidential information.Default keyword
Such as can be " safe charging ", " decryption ", " password " etc..
If step S409 is not performed comprising solution confidential information in the instant message or short message that receive:Output system push
The instant message of reception or the announcement information of short message.
If perform step S410 comprising solution confidential information in the instant message or short message that receive:Intercepting system push connects
The instant message of receipts or the announcement information of short message.
If receive instant message or short message in comprising solution confidential information, illustrate receive instant message or short message in wrap
What is contained is general information, it is allowed to handled according to General Logic, such as:The instant message or short of the reception of output system push
The announcement information of letter.If receive instant message or short message in comprising solution confidential information, intercepting system push reception it is instant
The announcement information of message or short message, to prevent non-native actual owner from obtaining this by mobile charging devices such as charger babies
After the critical data of machine, by stealing a glance at the PUSH message of the machine, the solution confidential information of the critical data is obtained, so as to further protect
The safety of native data.
In other of the invention embodiments, can not also when receiving instant message or short message, judge to receive i.e.
When message or short message in whether comprising solution confidential information, but when listen to triggering check the event of instant message or short message when,
Judge the event point to instant message or short message in whether comprising solution confidential information, if the event point to instant message or short message
In comprising solution confidential information, then export Xie Ping interfaces.Then, obtained by Xie Ping interfaces and solve screen information, if solution screen information is with presetting
Information match, then export the instant message of event sensing or the content of short message.If the instant message or short that the event is pointed to
Do not include solution confidential information in letter, then export the instant message of event sensing or the content of short message.Wherein, solution screen information can with but
It is not limited to any of fingerprint, character password, picture, gesture etc..In actual applications, the solution screen under safe charging pattern
Information can be identical with the solution screen information under non-security charge mode, can also be different, can specifically be operated according to user self-defined.
Or optionally, while step S408 to step S410 is performed, when listen to triggering check instant message or
During the event of short message, judge the event point to instant message or short message in whether comprising solution confidential information, if the event point to
Comprising solution confidential information in instant message or short message, then Xie Ping interfaces are exported.Then, solution screen information is obtained by Xie Ping interfaces, if
Solution screen information matches with presupposed information, then exports the instant message of event sensing or the content of short message.If the event is pointed to
Instant message or short message in do not include solution confidential information, then export the event sensing instant message or short message content.
Optionally, if solution screen information does not match that with presupposed information, into screen lock state.
Optionally, when listening to external charging line extraction event, safe charging pattern is exited.Or existed according to user
Default safe charging sets the operation for exiting safe charging that interface is carried out, or, when detecting user to default physics
During the pressing operation for exiting safe charging pattern that button is carried out, safe charging pattern is exited and enters charging normal mould
Formula.And when entering normal charge mode, recover the normal transmission of data.
In the embodiment of the present invention, by under safe charging pattern, when receiving what external equipment was sent by charging wire
During data acquisition request, if the level of security for the target data that the data acquisition request is pointed to is more than pre-set level, by the mesh
Mark data are sent to external equipment after being encrypted according to default cipher mode, and will solution confidential information carried out by default mode it is defeated
Go out, on the one hand, because the data of output are by encryption, even if external equipment obtains the data, also because can not
Decrypt and the content information of the data can not be understood, so as to the safety of user profile during ensure that charging, on the other hand, will solve
Confidential information is exported by default mode, ensure that charging during user profile it is safe while, will not hamper
The data export operation of normal users.
Referring to Fig. 4, Fig. 4 is the structural representation for the mobile terminal that one embodiment of the invention provides, for convenience of description,
It illustrate only the part related to the embodiment of the present invention.The mobile terminal of Fig. 4 examples can be that foregoing embodiment illustrated in fig. 2 provides
Protection data safety method executive agent, mainly include:
Control module 501, for when listen to triggering into safe charging pattern event when, into the safe charging mould
Formula.
Rank judge module 502, under the safe charging pattern, being sent when receiving external equipment by charging wire
Data acquisition request when, judge whether the level of security of target data that the data acquisition request is pointed to is more than pre-set level.
Encrypting module 503, if the judged result for rank judge module 502 is more than for the level of security of the target data
The pre-set level, then the target data is encrypted according to default cipher mode.
Output module 504, for the target data after encryption to be sent into the external equipment, and solution confidential information is passed through
Default mode is exported.
Specifically, being provided with event sniffer in mobile terminal, enter safety when listening to triggering by event sniffer
During the event of charge mode, safe charging pattern is entered by control module 501.Then, by rank judge module 502 at this
Under safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, the data acquisition is judged
Whether the level of security for the target data for asking to point to is more than pre-set level.If the judged result of rank judge module 502 is should
The level of security of target data is more than the pre-set level, then by encrypting module 503 by the target data according to default encryption
Mode is encrypted, and the target data after encryption is sent into the external equipment by output module 504, and will solve secret letter
Breath is exported by default mode.
Further, if the judged result of rank judge module 502 is pre- no more than this for the level of security of the target data
If rank, then the target data is sent to by the external equipment by output module 504.
The details of the present embodiment not to the greatest extent, refers to description of the earlier figures 1 to embodiment illustrated in fig. 3, here is omitted.
It should be noted that in the embodiment of the mobile terminal of figure 4 above example, the division of each functional module is only to lift
Example explanation, can be as needed in practical application, such as the convenient consideration of the realization of the configuration requirement or software of corresponding hardware,
And complete above-mentioned function distribution by different functional modules, i.e., the internal structure of mobile terminal is divided into different function moulds
Block, to complete all or part of function described above.Moreover, in practical application, the corresponding function mould in the present embodiment
Block can be realized by corresponding hardware, can also perform corresponding software by corresponding hardware and complete.What this specification provided
Each embodiment can all apply foregoing description principle, repeat no more below.
In the embodiment of the present invention, by under safe charging pattern, when receiving what external equipment was sent by charging wire
During data acquisition request, if the level of security for the target data that the data acquisition request is pointed to is more than pre-set level, by the mesh
Mark data are sent to external equipment after being encrypted according to default cipher mode, and will solution confidential information carried out by default mode it is defeated
Go out, on the one hand, because the data of output are by encryption, even if external equipment obtains the data, also because can not
Decrypt and the content information of the data can not be understood, so as to the safety of user profile during ensure that charging, on the other hand, will solve
Confidential information is exported by default mode, ensure that charging during user profile it is safe while, will not hamper
The data export operation of normal users.
Referring to Fig. 5, the structural representation for the mobile terminal that another embodiment of the present invention provides, for convenience of description, only
Show the part related to the embodiment of the present invention.The mobile terminal of Fig. 5 examples can be earlier figures 2 or embodiment illustrated in fig. 3
The executive agent of the method for the protection data safety of offer.The mobile terminal of Fig. 5 examples, with the movement in embodiment illustrated in fig. 4
The difference of terminal essentially consists in:
Further, encrypting module 503, it is additionally operable to generate random cipher, and according to the random cipher by the target data
It is encrypted.
Optionally, encrypting module 503 is additionally operable to obtain the self-defined password of user's input, and will according to the self-defined password
Target data is encrypted.
Further, the mobile terminal also includes:
Network judge module 601, for judging currently whether be connected with wireless network.
Output module 504, if the judged result for being additionally operable to network judge module 601 is currently to be connected with the wireless network,
Then using the random cipher as the solution confidential information, sent in a manner of instant message to default account number, and if network judge mould
The judged result of block 601 is currently is not connected with the wireless network, then using the random cipher as the solution confidential information, with the side of short message
Formula exports.
Specifically, after target data is encrypted by encrypting module 503, judged by network judge module 601
Currently whether it is connected with wireless network.If being currently connected with the wireless network, the random cipher is made by output module 504
For the solution confidential information, sent in a manner of instant message to default account number.And if currently be not connected with the wireless network, by defeated
Go out module 504 using the random cipher as the solution confidential information, exported in a manner of short message.
Further, the mobile terminal also includes:
Content judgment module 602, for the instant message or short message for when receiving instant message or short message, judging to receive
In whether include the solution confidential information.
Blocking module 603, if the judged result for content judgment module 602 is the instant message or short message bag of the reception
The instant message of the reception or the announcement information of short message containing the solution confidential information, then intercepting system push.
Solve panel module 604, for when listen to triggering check the event of instant message or short message when, if the event point to
The solution confidential information is included in instant message or short message, then exports Xie Ping interfaces, and solution screen information is obtained by the Xie Ping interfaces, if
The solution screen information matches with presupposed information, then triggers output module 504 and export instant message or the short message that the event is pointed to
Content.
Specifically, when receiving instant message or short message, the instant message of reception is judged by content judgment module 602
Or whether include the solution confidential information in short message.If the instant message or short message of the reception include the solution confidential information, pass through interception
The instant message of the reception or the announcement information of short message of the intercepting system of module 603 push.If the instant message of the reception is short
Letter includes the solution confidential information, then the instant message of the reception or the notice of short message pushed by the output system of output module 504
Information.
When listen to triggering check the event of instant message or short message when, if the event point to instant message or short message in
Comprising the solution confidential information, then Xie Ping interfaces are exported by solving panel module 604, and solution screen information is obtained by the Xie Ping interfaces, if
The solution screen information matches with presupposed information, then exports the instant message of event sensing or the content of short message.If the event refers to
To instant message or short message in do not include the solution confidential information, then pass through output module 504 export the event point to immediately disappearing
The content of breath or short message.If in addition, the solution screen information does not match that with presupposed information, into screen lock state.
Further, control module 501, it is additionally operable to when listening to the press event of predetermined physical button, into the peace
Full charge mode.
The mobile terminal also includes:
Nformation alert module 605, for when listening to external charging line insertion event, output safety charge prompting to be believed
Breath.
Control module 501, it is additionally operable to work as the confirmation button touch thing for listening to and occurring based on the safe charging prompt message
During part, into the safe charging pattern.
The mobile terminal also includes:
Interface output module 606, for when listening to the event of triggering progress safe charging setting, exporting default peace
Full charging sets interface.
Control module 501, it is additionally operable to work as the confirmation button touch thing for listening to and setting interface to occur based on the safe charging
During part, into the safe charging pattern.
Specifically, in the event for the data-interface that external charging line insertion mobile terminal is listened to by event sniffer
When, by the output safety charge prompting information of nformation alert module 605, to prompt the user whether to enter safe charging pattern.So
Afterwards, by control module 501 in response to listening to the confirmation button touch event occurred based on the safe charging prompt message,
Into the safe charging pattern.
Specifically, can also preset safe charging in the terminal sets functional module.By event sniffer monitor because
Click on the operation of shortcut icon or the operation hair of the quick secondary or physical bond of pressing safe charging setting that safe charging sets functional module
Raw triggering carries out the event of safe charging setting.Then, by interface output module 606 in response to listen to this trigger into
The event that row safe charging is set, export default safe charging and interface is set.Afterwards, when listening to base by event sniffer
When the confirmation button touch event that the safe charging sets interface to occur, touched by control module 501 in response to what is listened to
Event is touched, into safe charging pattern.
Further, it can also exit safety by control module 501 when listening to external charging line extraction event and fill
Power mode.Or peace can also be exited what default safe charging setting interface was carried out according to user by control module 501
Completely charged operates, or, when detect that user carries out to default physical button for exit safe charging pattern by
During press operation, exit safe charging pattern and enter normal charge mode.And when entering normal charge mode, recover data
Normal transmission.
The details of the present embodiment not to the greatest extent, refers to description of the earlier figures 1 to embodiment illustrated in fig. 4, here is omitted.
In the embodiment of the present invention, by under safe charging pattern, when receiving what external equipment was sent by charging wire
During data acquisition request, if the level of security for the target data that the data acquisition request is pointed to is more than pre-set level, by the mesh
Mark data are sent to external equipment after being encrypted according to default cipher mode, and will solution confidential information carried out by default mode it is defeated
Go out, on the one hand, because the data of output are by encryption, even if external equipment obtains the data, also because can not
Decrypt and the content information of the data can not be understood, so as to the safety of user profile during ensure that charging, on the other hand, will solve
Confidential information is exported by default mode, ensure that charging during user profile it is safe while, will not hamper
The data export operation of normal users.
In multiple embodiments provided herein, it should be understood that disclosed mobile terminal and method, Ke Yitong
Other modes are crossed to realize.For example, embodiments described above is only schematical, for example, the division of the module, only
Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple module or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Mutual coupling or direct-coupling or communication linkage can be by some interfaces, the INDIRECT COUPLING or communication chain of module
Connect, can be electrical, mechanical or other forms.
The module illustrated as separating component can be or may not be physically separate, show as module
The part shown can be or may not be physical module, you can with positioned at a place, or can also be distributed to multiple
On mixed-media network modules mixed-media.Some or all of module therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional module in each embodiment of the present invention can be integrated in a processing module, can also
That modules are individually physically present, can also two or more modules be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, can also be realized in the form of software function module.
It should be noted that for foregoing each method embodiment, in order to which simplicity describes, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not all be this hairs
Necessary to bright.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
It is method, mobile terminal and the computer-readable recording medium to protection data safety provided by the present invention above
Description, for those of ordinary skill in the art, according to the thought of the embodiment of the present invention, in embodiment and using model
There will be changes are placed, to sum up, this specification content should not be construed as limiting the invention.
Claims (13)
- A kind of 1. method for protecting data safety, during applied to being charged for mobile terminal, it is characterised in that methods described bag Include:When listen to triggering into safe charging pattern event when, into the safe charging pattern;Under the safe charging pattern, when receiving the data acquisition request that external equipment is sent by charging wire, judge Whether the level of security for the target data that the data acquisition request is pointed to is more than pre-set level;If the level of security of the target data is more than the pre-set level, by the target data according to default encryption side The external equipment is sent to after formula encryption, and solution confidential information is exported by default mode.
- 2. as claimed in claim 1 protection data safety method, it is characterised in that it is described by the target data according to pre- If cipher mode encryption after be sent to the external equipment, including:Random cipher is generated, and the external equipment is sent to after the target data is encrypted according to the random cipher;It is described to be exported solution confidential information by default mode, including:Whether judgement is currently connected with wireless network;If being connected with the wireless network, using the random cipher as the solution confidential information, in a manner of instant message to Default account number is sent;If being not connected with the wireless network, using the random cipher as the solution confidential information, exported in a manner of short message.
- 3. the method for the protection data safety as described in right wants 2, it is characterised in that described that solution confidential information is passed through into default side After formula output, in addition to:When receiving instant message or short message, judge receive instant message or short message in whether include the solution confidential information;If include the solution confidential information, the instant message of the reception or the announcement information of short message of intercepting system push.
- 4. as claimed in claim 2 or claim 3 protection data safety method, it is characterised in that it is described will solution confidential information pass through it is pre- If mode export after, in addition to:When listen to triggering check the event of instant message or short message when, if the event point to instant message or short message in wrap Containing the solution confidential information, then Xie Ping interfaces are exported;Solution screen information is obtained by the Xie Ping interfaces, if the solution screen information matches with presupposed information, exports the thing The instant message or the content of short message that part points to.
- 5. as claimed in claim 1 protection data safety method, it is characterised in that it is described when listen to triggering enter safety During the event of charge mode, include into the safe charging pattern:When listening to the press event of predetermined physical button, into the safe charging pattern.
- 6. as claimed in claim 1 protection data safety method, it is characterised in that it is described when listen to triggering enter safety During the event of charge mode, include before into the safe charging pattern:When listening to external charging line insertion event, output safety charge prompting information;It is described when listen to triggering into safe charging pattern event when, include into the safe charging pattern:When listening to the confirmation button touch event based on safe charging prompt message generation, into the safe charging Pattern.
- 7. as claimed in claim 1 protection data safety method, it is characterised in that it is described when listen to triggering enter safety During the event of charge mode, include before into the safe charging pattern:When listening to the event of triggering progress safe charging setting, export default safe charging and interface is set;It is described when listen to triggering into safe charging pattern event when, include into the safe charging pattern:When listening to the confirmation button touch event based on safe charging setting interface generation, into the safe charging Pattern.
- A kind of 8. mobile terminal, it is characterised in that including:Control module, for when listen to triggering into safe charging pattern event when, into the safe charging pattern;Rank judge module, under the safe charging pattern, when the number for receiving external equipment and being sent by charging wire During according to obtaining request, judge whether the level of security for the target data that the data acquisition request is pointed to is more than pre-set level;Encrypting module, if the judged result for the rank judge module be more than for the level of security of the target data it is described Pre-set level, then the target data is encrypted according to default cipher mode;Output module, for the target data after encryption to be sent into the external equipment, and solution confidential information is passed through and preset Mode exported.
- 9. mobile terminal as claimed in claim 8, it is characterised in thatThe encrypting module, it is additionally operable to generate random cipher, and the target data is encrypted according to the random cipher;The mobile terminal also includes:Network judge module, for judging currently whether be connected with wireless network;The output module, if the judged result for being additionally operable to the network judge module is currently to be connected with the wireless network, Then using the random cipher as the solution confidential information, sent in a manner of instant message to default account number, and if the net The judged result of network judge module is currently is not connected with the wireless network, then using the random cipher as the solution secret letter Breath, is exported in a manner of short message.
- 10. the mobile terminal as described in right wants 9, it is characterised in that the mobile terminal also includes:Content judgment module, for when receiving instant message or short message, judge receive instant message or short message in whether Include the solution confidential information;Blocking module, if the judged result for the content judgment module includes institute for the instant message or short message of the reception Solution confidential information is stated, then the instant message of the reception or the announcement information of short message of intercepting system push;Solve panel module, for when listen to triggering check the event of instant message or short message when, if the event point to it is instant The solution confidential information is included in message or short message, then exports Xie Ping interfaces, and solution screen information is obtained by the Xie Ping interfaces, if The solution screen information matches with presupposed information, then triggers the output module and export the instant message or short that the event is pointed to The content of letter.
- 11. the mobile terminal as described in any one of claim 8 to 10, it is characterised in thatThe control module, it is additionally operable to when listening to the press event of predetermined physical button, into the safe charging pattern;The mobile terminal also includes:Nformation alert module, for when listening to external charging line insertion event, output safety charge prompting information;The control module, it is additionally operable to work as the confirmation button touch event for listening to and occurring based on the safe charging prompt message When, into the safe charging pattern;The mobile terminal also includes:Interface output module, for when listening to the event of triggering progress safe charging setting, exporting default safe charging Interface is set;The control module, it is additionally operable to work as the confirmation button touch event for listening to and setting interface to occur based on the safe charging When, into the safe charging pattern.
- 12. a kind of mobile terminal, including:Memory, processor and it is stored on the memory and can be on the processor The computer program of operation, it is characterised in that described in the computing device during computer program, realize such as claim 1 to 7 Any one of described in protection data safety method.
- 13. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the computer program When being executed by processor, the method for protection data safety of the realization as described in any one of claim 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710590892.9A CN107392035B (en) | 2017-07-19 | 2017-07-19 | Method for protecting data security, mobile terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710590892.9A CN107392035B (en) | 2017-07-19 | 2017-07-19 | Method for protecting data security, mobile terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107392035A true CN107392035A (en) | 2017-11-24 |
CN107392035B CN107392035B (en) | 2020-08-18 |
Family
ID=60335788
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710590892.9A Expired - Fee Related CN107392035B (en) | 2017-07-19 | 2017-07-19 | Method for protecting data security, mobile terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107392035B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110928467A (en) * | 2019-11-19 | 2020-03-27 | 广东欢太科技有限公司 | Connection option display method and device and computer readable storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060117664A (en) * | 2005-05-13 | 2006-11-17 | 주식회사 팬택 | Method for booting of mobile communication set and apparatus thereof |
CN102117251A (en) * | 2009-12-31 | 2011-07-06 | 比亚迪股份有限公司 | Method for selecting application mode of universal serial bus (USB) equipment and USB equipment |
CN102663283A (en) * | 2012-03-20 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | Method for dynamically isolating computer system |
CN103546289A (en) * | 2013-09-29 | 2014-01-29 | 北京握奇智能科技有限公司 | USB (universal serial bus) Key based secure data transmission method and system |
CN104200172A (en) * | 2014-08-29 | 2014-12-10 | 公安部第一研究所 | Safe leading-in device, system and method for USB data |
CN105550568A (en) * | 2015-12-25 | 2016-05-04 | 小米科技有限责任公司 | Mobile terminal data protection method and apparatus |
CN106874232A (en) * | 2015-12-14 | 2017-06-20 | 中兴通讯股份有限公司 | The charging method of general-purpose serial bus USB, device and terminal |
-
2017
- 2017-07-19 CN CN201710590892.9A patent/CN107392035B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060117664A (en) * | 2005-05-13 | 2006-11-17 | 주식회사 팬택 | Method for booting of mobile communication set and apparatus thereof |
CN102117251A (en) * | 2009-12-31 | 2011-07-06 | 比亚迪股份有限公司 | Method for selecting application mode of universal serial bus (USB) equipment and USB equipment |
CN102663283A (en) * | 2012-03-20 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | Method for dynamically isolating computer system |
CN103546289A (en) * | 2013-09-29 | 2014-01-29 | 北京握奇智能科技有限公司 | USB (universal serial bus) Key based secure data transmission method and system |
CN104200172A (en) * | 2014-08-29 | 2014-12-10 | 公安部第一研究所 | Safe leading-in device, system and method for USB data |
CN106874232A (en) * | 2015-12-14 | 2017-06-20 | 中兴通讯股份有限公司 | The charging method of general-purpose serial bus USB, device and terminal |
CN105550568A (en) * | 2015-12-25 | 2016-05-04 | 小米科技有限责任公司 | Mobile terminal data protection method and apparatus |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110928467A (en) * | 2019-11-19 | 2020-03-27 | 广东欢太科技有限公司 | Connection option display method and device and computer readable storage medium |
CN110928467B (en) * | 2019-11-19 | 2021-07-27 | 广东欢太科技有限公司 | Connection option display method and device and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107392035B (en) | 2020-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106534570B (en) | A kind of method for secret protection and device | |
CN104978109B (en) | A kind of Application Program Interface display methods and terminal | |
CN104077533B (en) | A kind of method and apparatus for operating sensitive data | |
CN104933342B (en) | A kind of picture inspection method and mobile terminal | |
CN108769027B (en) | Secure communication method, device, mobile terminal and storage medium | |
CN104579668B (en) | The verification method and cipher protection apparatus and verifying system of a kind of user identity | |
CN104008346A (en) | Method and device for starting privacy mode of data processing device | |
CN103095457A (en) | Login and verification method for application program | |
CN106611310B (en) | Data processing method, wearable electronic device and system | |
CN106778337B (en) | Document protection method, device and terminal | |
CN106849244B (en) | A kind of voltage control method of charging interface, charger and mobile terminal | |
CN103761201B (en) | Terminal applies event-handling method and device | |
CN104182680A (en) | User name password management and user name password input method and system | |
CN107615294A (en) | A kind of identifying code short message display method and mobile terminal | |
CN105373737A (en) | Application encryption method and mobile terminal | |
CN106503507A (en) | Method and mobile terminal that a kind of password shows | |
CN102984349A (en) | Method and device for screen locking code generating and screen unlocking method and screen unlocking device and mobile terminal | |
CN105653864A (en) | Medical record information sharing method and device | |
CN107273736A (en) | Cipher-code input method, device, computer equipment and storage medium | |
CN106713618A (en) | Processing method of identifying code and mobile terminal | |
CN105574376A (en) | Screen unlocking device, system and method | |
CN105159557B (en) | The generation method and mobile terminal of a kind of unlocking pin | |
CN106447325B (en) | NFC communication-based processing method and device and mobile terminal | |
CN108540591B (en) | Address book management method, address book management device and electronic equipment | |
CN106529236A (en) | Unlocking method, apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200818 |