CN107392035B - Method for protecting data security, mobile terminal and computer readable storage medium - Google Patents

Method for protecting data security, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN107392035B
CN107392035B CN201710590892.9A CN201710590892A CN107392035B CN 107392035 B CN107392035 B CN 107392035B CN 201710590892 A CN201710590892 A CN 201710590892A CN 107392035 B CN107392035 B CN 107392035B
Authority
CN
China
Prior art keywords
preset
charging mode
target data
monitored
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710590892.9A
Other languages
Chinese (zh)
Other versions
CN107392035A (en
Inventor
彭凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710590892.9A priority Critical patent/CN107392035B/en
Publication of CN107392035A publication Critical patent/CN107392035A/en
Application granted granted Critical
Publication of CN107392035B publication Critical patent/CN107392035B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a method for protecting data security, which is applied to the technical field of mobile terminals and comprises the following steps: the method comprises the steps of entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored, judging whether the security level of target data pointed by a data acquisition request is larger than a preset level or not when the data acquisition request sent by external equipment through a charging wire is received in the safe charging mode, if the security level of the target data is larger than the preset level, encrypting the target data according to a preset encryption mode, sending the encrypted target data to the external equipment, and outputting decryption information in a preset mode. The embodiment of the invention also discloses a mobile terminal and a computer readable storage medium. The method for protecting data security, the mobile terminal and the computer readable storage medium can ensure the security of user information during charging.

Description

Method for protecting data security, mobile terminal and computer readable storage medium
Technical Field
The invention belongs to the technical field of mobile terminals, and particularly relates to a method for protecting data security, a mobile terminal and a computer readable storage medium.
Background
With the development of mobile terminal technology, people have stronger and stronger dependence on mobile terminals such as smart phones and tablet computers. The mobile terminal often bears much personal information and privacy of the user, including login passwords, photo albums, and the like of various accounts.
Currently, charging through a USB (Universal Serial Bus) external charging line is a common charging method, but this charging method can also perform data transmission while charging, and therefore has a great potential safety hazard. Especially, there are many shared charging services in the current market, such as shared charging treasured, if lawless persons build a control platform in a charger or the charging treasured, it is very easy to crack the security defense line in the terminal when the user charges, and steal the user's secret.
Disclosure of Invention
The embodiment of the invention provides a method for protecting data security, a mobile terminal and a computer readable storage medium, which can ensure the security of user information during charging.
A first aspect of an embodiment of the present invention provides a method for protecting data security, which is applied to charging a mobile terminal, and includes: entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored; in the safe charging mode, when a data acquisition request sent by an external device through a charging line is received, judging whether the security level of target data pointed by the data acquisition request is greater than a preset level; and if the security level of the target data is greater than the preset level, encrypting the target data according to a preset encryption mode, sending the encrypted target data to the external equipment, and outputting decryption information in a preset mode.
A second aspect of an embodiment of the present invention provides a mobile terminal, including: the control module is used for entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored; the level judging module is used for judging whether the security level of target data pointed by a data acquisition request is greater than a preset level or not when the data acquisition request sent by external equipment through a charging wire is received in the safe charging mode; the encryption module is used for encrypting the target data according to a preset encryption mode if the judgment result of the level judgment module is that the security level of the target data is greater than the preset level; and the output module is used for sending the encrypted target data to the external equipment and outputting the decryption information in a preset mode.
A third aspect of the embodiments of the present invention provides a mobile terminal, including: the present invention also provides a method for protecting data security, which is provided by the first aspect of the embodiments of the present invention, when the processor executes the computer program.
A fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for protecting data security provided in the first aspect of the embodiments of the present invention.
The method for protecting data security, the mobile terminal and the computer-readable storage medium according to the embodiments of the present invention described above enable, in the secure charging mode, when a data acquisition request sent by an external device through a charging wire is received, if the security level of target data pointed by the data acquisition request is greater than a preset level, the target data is encrypted according to a preset encryption mode and then sent to the external equipment, and the decryption information is output through a preset mode, on one hand, because the output data is encrypted, even if the external device acquires the data, the content information of the data cannot be known because the external device cannot decrypt the data, thereby ensuring the safety of user information during charging, on the other hand, outputting the decryption information in a preset mode, the data export operation of a normal user is not hindered while the safety of user information during charging is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 is a hardware configuration diagram of a mobile terminal according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of an implementation of a method for protecting data security according to an embodiment of the present invention.
Fig. 3 is a schematic flow chart of an implementation of a method for protecting data security according to another embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention.
Fig. 6 is a schematic diagram of a mobile terminal that performs secure charging by using the method for protecting data security according to the embodiment of the present invention in practical application.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a hardware configuration diagram of a mobile terminal according to an embodiment of the present invention. As shown in fig. 1, the mobile terminal 10 described in the present embodiment includes:
a memory 51, a processor 52 and a computer program stored on the memory 51 and executable on the processor, which when executed by the processor implements the method of securing data as described in the embodiments of fig. 2 and 3 described below.
Further, the mobile terminal 10 further includes:
at least one input device 53 and at least one output device 54.
The memory 51, the processor 52, the input device 53, and the output device 54 are connected via a bus 55.
The input device 53 may be a camera, a touch panel, a physical button, or a mouse. The output device 54 may specifically be a display screen.
The Memory 51 may be a high-speed Random Access Memory (RAM) Memory or a non-volatile Memory (non-volatile Memory), such as a disk Memory. The memory 51 is used for storing a set of executable program codes, and the processor 52 is coupled to the memory 51.
Further, an embodiment of the present invention further provides a computer-readable storage medium, which may be disposed in the mobile terminal in the foregoing and the following embodiments, and the computer-readable storage medium may be the memory in the foregoing embodiment shown in fig. 1. The computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the method of securing data as described in the embodiments of fig. 2 and 3 described below. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a RAM, a magnetic disk, or an optical disk.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating an implementation flow of a method for protecting data security according to an embodiment of the present invention, where the method is applicable to a mobile terminal, and the mobile terminal includes: the mobile electronic data processing device comprises an electronic data processing device which can be used in moving, such as a smart phone, a tablet personal computer and a notebook computer and can be charged through an external charging wire. As shown in fig. 2, the method mainly includes the following steps S301 to S304.
S301, entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored.
Specifically, the user may trigger the mobile terminal to enter the safe charging mode by pressing a preset physical key, or by touching a setting menu and a key in a preset safe charging setting interface. The mobile terminal is provided with an event monitor, and various events occurring in the mobile terminal are monitored through the event monitor, such as: a physical key press event, a touch event occurring in an interactive interface, a focus event, a menu event, and the like. The event monitor transmits the monitored events to different controls or different event processing methods of the same control so as to process the events.
S302, in a safe charging mode, when a data acquisition request sent by an external device through a charging line is received, whether the security level of target data pointed by the data acquisition request is greater than a preset level is judged.
The external device may be, for example: desktop computer, panel computer, portable computer, smart mobile phone, mobile charging equipment (like the treasured that charges) etc. can carry out the all kinds of equipment that charge to mobile terminal.
The charging wire can be a data line with a charging function, such as a USB charging wire, and can be accessed into the mobile terminal through a USB or other data interface. The external device can perform data interaction with the mobile terminal through the charging wire while charging the mobile terminal.
The security level of the target data can be customized according to the operation of a user. In an actual application example, if the user is not self-defined, the security level of all data is the highest by default.
It can be understood that, in this embodiment, only whether the security level of the data requested by the external device through the charging line is greater than the preset level is determined, and whether the security level of the data requested by the external device through other methods such as the wireless network is greater than the preset level is not determined. Therefore, data interaction between the mobile terminal and the external equipment in a safe interaction mode can be prevented from being influenced.
If the security level of the target data is greater than the preset level, step S303 is executed: and encrypting the target data according to a preset encryption mode, sending the encrypted target data to external equipment, and outputting decryption information in a preset mode.
The encryption method may include, but is not limited to: encrypting the target data according to a preset password, setting the attribute of the target data to be hidden, modifying the format of the target data, calling a third party encryption program for encryption and the like. The preset output mode may include, but is not limited to: instant messages, short messages, emails, and the like. The specific output mode can be customized by a user. Decryption information may include, but is not limited to: encryption password, decryption password, description information of third party encryption program for encryption, and presentation information of encryption method.
If the security level of the target data is not greater than the preset level, step S304 is executed: and transmitting the target data to the external device. In this way, the data requested by the external device is processed differently, so that the data security protection is more targeted, and the flexibility of the security protection is improved.
In the embodiment of the invention, in a safe charging mode, when a data acquisition request sent by an external device through a charging wire is received, if the security level of target data pointed by the data acquisition request is greater than a preset level, the target data is encrypted according to a preset encryption mode and then sent to the external device, and decryption information is output in a preset mode.
Referring to fig. 3, fig. 3 is a schematic diagram illustrating an implementation flow of a method for protecting data security according to another embodiment of the present invention, where the method is applicable to a mobile terminal, and the mobile terminal includes: the mobile electronic data processing device comprises an electronic data processing device which can be used in moving, such as a smart phone, a tablet personal computer and a notebook computer and can be charged through an external charging wire. As shown in fig. 3, the method mainly includes the following steps S401 to S410.
S401, when an event triggering the safe charging mode is monitored, the safe charging mode is entered.
The mobile terminal is provided with an event monitor, and various events occurring in the mobile terminal can be monitored through the event monitor. The event monitor transmits the monitored events to different controls or different event processing methods of the same control so as to process the events.
Optionally, the event triggering the secure charging mode is a pressing event of a preset physical key. Specifically, when the event monitor monitors that a preset physical key is pressed, the event monitor responds to the event and enters a safe charging mode. The preset physical keys can be the existing functional keys customized by a user, such as: a power-on key, a power-off key, a volume key, a photographing key and the like. To avoid functional conflicts, it is preferable to have non-on and off keys, such as volume + key. Alternatively, the preset physical key may be a physical key dedicated to entering the secure charging mode. The pressing operation may be, but is not limited to: long press, multiple presses, etc. And the method can be customized by a user.
Optionally, the event triggering the entering of the secure charging mode is a confirmation button touch event occurring based on the secure charging prompt information. Specifically, when an external charging wire insertion event is monitored through an event monitor, the safety charging prompt information is output. Then, when a confirmation button touch event occurring based on the output safety charging prompt information is monitored through the event listener, a safety charging mode is entered. Wherein the confirmation button touch event occurs based on the secure charging alert information, for example: a touch event generated by an operation of one or more fingers of the user contacting, leaving, moving, etc. on a confirmation button provided in the safe charging prompt information output window.
Optionally, if a confirmation button touch event based on the safe charging prompt information is not monitored over a preset time period, or a rejection button touch event based on the safe charging prompt information is monitored, the output of the safe charging prompt information is cancelled, and charging is performed according to a normal charging mode, that is, in the normal charging mode, the external device can perform data interaction with the main control chip. It is understood that the confirmation button in the present embodiment is a button having a confirmation meaning, such as a button with the words "yes", "Y", "ok", and the like. The reject button is a button having a reject meaning, such as a button with the words "no", "N", "off", and the like.
To further illustrate the method for protecting data security provided by the present embodiment, taking the mobile terminal shown in fig. 6 as an example, when a pressing event of the physical key 1 in fig. 6 is monitored, a secure charging mode is entered in response to the pressing event. Or, still taking the mobile terminal shown in fig. 6 as an example, when an external charging wire 2 insertion event is monitored, popping up the window 3, and outputting the safe charging prompt information in the window 3. Then, when a confirmation button 4 touch event in the window 3 is monitored, the secure charging mode is entered. Optionally, before entering the safe charging mode in response to the pressing event of the physical key 1, the safe charging prompt message may also be output, and when a confirmation button 4 touch event in the window 3 is monitored, the safe charging mode is entered.
Optionally, the event triggering the entering of the secure charging mode is a confirmation button touch event occurring on the basis of a preset secure charging setting interface, for example: a touch event generated by operations of contact, exit, movement, etc. on various setup menus and buttons provided by one or more fingers of the user at the interface for triggering entry into the secure charging mode. Specifically, a safety charging setting function module is preset in the mobile terminal, and when an event triggering safety charging setting is monitored, a preset safety charging setting interface is output through the safety charging setting function module. And then, when a confirmation button touch event which occurs on the basis of the output safety charging setting interface is monitored, entering the safety charging mode. Wherein events that trigger a safe charging setting, such as: a touch event of a shortcut icon of the secure charging setting function module, a pressing event of a secure charging setting shortcut physical key, and the like.
S402, in the safe charging mode, when a data acquisition request sent by an external device through a charging line is received, whether the security level of target data pointed by the data acquisition request is larger than a preset level or not is judged.
If the security level of the target data is not greater than the preset level, step S403 is executed: and transmitting the target data to the external device.
If the security level of the target data is greater than the preset level, step S404 is executed: and generating a random password, and encrypting the target data according to the random password.
The external device may be, for example: desktop computer, panel computer, portable computer, smart mobile phone, mobile charging equipment (like the treasured that charges) etc. can carry out the all kinds of equipment that charge to mobile terminal.
The charging wire can be a data line with a charging function, such as a USB charging wire, and can be accessed into the mobile terminal through a USB or other data interface. The external device can perform data interaction with the mobile terminal through the charging wire while charging the mobile terminal.
The security level of the target data can be customized according to the operation of a user. In an actual application example, if the user is not self-defined, the security level of all data is the highest by default.
Specifically, the user may quickly trigger to enter the secure charging mode through any one of the manners in step S401, and in the secure charging mode, on one hand, the current input by the external device through the charging line is used to charge the loaded battery, and on the other hand, when a data acquisition request sent by the external device through the charging line is received, it is determined whether the security level of the target data pointed by the data acquisition request is greater than a preset level. And when the security level of the target data is greater than the preset level, generating a random password before sending, and encrypting the target data according to the random password. And when the security level of the target data is not more than the preset level, directly transmitting the target data to the external equipment.
Optionally, in other embodiments, the encryption password as the decryption information may also be customized by the user.
S405, judging whether a wireless network is connected currently.
If the wireless network is currently connected, step S406 is executed: and sending the random password as decryption information to a preset account in an instant message mode.
If no wireless network is currently connected, step S407 is executed: and outputting the random password as decryption information in a short message mode.
Through the judgment of the network type, the decryption information is output in the most appropriate mode, and the decryption information can be ensured to be really obtained by the actual owner of the computer. The account number of the receiver of the instant message and the mobile phone number for receiving the short message can be customized by the user. Optionally, the default is the local phone number of the mobile terminal and the user account associated with the instant messaging software logged in the mobile terminal. I.e. the user himself sends himself a short message or instant message containing decryption information.
S408, when the instant message or the short message is received, whether the received instant message or the short message contains the decryption information is judged.
Specifically, whether the received instant message or short message contains decryption information can be determined by extracting a keyword in the received instant message or short message and determining whether the keyword is matched with a preset keyword. The preset keyword may be, for example, "secure charging", "decryption", "password", or the like.
If the received instant message or short message does not contain the decryption information, step S409 is executed: and outputting the notification information of the received instant message or short message pushed by the system.
If the received instant message or short message contains decryption information, step S410 is executed: and intercepting the notification information of the received instant message or short message pushed by the system.
If the received instant message or short message does not contain the decryption information, it indicates that the received instant message or short message contains common information, and allows processing according to common logic, for example: and outputting the notification information of the received instant message or short message pushed by the system. If the received instant message or short message contains decryption information, the notification information of the received instant message or short message pushed by the system is intercepted, so that the situation that an actual owner who is not the local machine obtains key data of the local machine through mobile charging equipment such as a charging pal and the like and obtains the decryption information of the key data through peeping the push message of the local machine is prevented, and the data security of the local machine is further protected.
In another embodiment of the present invention, it may also be determined whether the received instant message or short message includes decryption information, instead of when the instant message or short message is received, when an event triggering the viewing of the instant message or short message is monitored, whether the instant message or short message to which the event points includes decryption information is determined, and if the instant message or short message to which the event points includes decryption information, an unlocking interface is output. And then, screen-off information is acquired through a screen-off interface, and if the screen-off information is matched with preset information, the content of the instant message or the short message pointed by the event is output. And if the instant message or the short message pointed by the event does not contain the decryption information, outputting the content of the instant message or the short message pointed by the event. Wherein, the screen-off information can be, but is not limited to, any one of fingerprint, character password, picture, gesture, and the like. In practical application, the screen unlocking information in the safe charging mode can be the same as or different from the screen unlocking information in the non-safe charging mode, and can be customized according to user operation.
Or, optionally, when the event triggering the viewing of the instant message or the short message is monitored while the steps S408 to S410 are executed, whether the instant message or the short message to which the event points includes the decryption information is determined, and if the instant message or the short message to which the event points includes the decryption information, a screen-unlocking interface is output. And then, screen-off information is acquired through a screen-off interface, and if the screen-off information is matched with preset information, the content of the instant message or the short message pointed by the event is output. And if the instant message or the short message pointed by the event does not contain the decryption information, outputting the content of the instant message or the short message pointed by the event.
Optionally, if the screen unlocking information is not matched with the preset information, the screen locking state is entered.
Optionally, when an external charging wire pull-out event is monitored, the secure charging mode is exited. Or exiting the safe charging mode and entering the normal charging mode according to the operation of exiting the safe charging performed by the user on a preset safe charging setting interface, or when detecting that the user presses a preset physical key to exit the safe charging mode. And resumes normal transmission of data when entering the normal charging mode.
In the embodiment of the invention, in a safe charging mode, when a data acquisition request sent by an external device through a charging wire is received, if the security level of target data pointed by the data acquisition request is greater than a preset level, the target data is encrypted according to a preset encryption mode and then sent to the external device, and decryption information is output in a preset mode.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention, and for convenience of description, only the parts related to the embodiment of the present invention are shown. The mobile terminal illustrated in fig. 4 may be an execution subject of the method for protecting data security provided in the foregoing embodiment illustrated in fig. 2, and mainly includes:
the control module 501 is configured to enter the secure charging mode when an event triggering entry into the secure charging mode is monitored.
The level determining module 502 is configured to, in the secure charging mode, determine whether a security level of target data pointed by a data obtaining request is greater than a preset level when the data obtaining request sent by the external device through a charging line is received.
An encrypting module 503, configured to encrypt the target data according to a preset encrypting method if the determination result of the level determining module 502 is that the security level of the target data is greater than the preset level.
The output module 504 is configured to send the encrypted target data to the external device, and output the decryption information in a preset manner.
Specifically, the mobile terminal is provided with an event monitor, and when an event triggering the entering of the secure charging mode is monitored through the event monitor, the secure charging mode is entered through the control module 501. Then, in the secure charging mode, the level determining module 502 determines whether the security level of the target data indicated by the data obtaining request is greater than a preset level when receiving the data obtaining request sent by the external device through the charging line. If the determination result of the level determining module 502 is that the security level of the target data is greater than the preset level, the target data is encrypted according to a preset encryption method through the encryption module 503, the encrypted target data is sent to the external device through the output module 504, and the decryption information is output in a preset manner.
Further, if the determination result of the level determining module 502 is that the security level of the target data is not greater than the preset level, the target data is sent to the external device through the output module 504.
For details that are not described in the present embodiment, please refer to the description of the embodiment shown in fig. 1 to fig. 3, which will not be described herein again.
It should be noted that, in the embodiment of the mobile terminal illustrated in fig. 4, the division of the functional modules is only an example, and in practical applications, the above functions may be allocated by different functional modules according to needs, for example, configuration requirements of corresponding hardware or convenience of implementation of software, that is, the internal structure of the mobile terminal is divided into different functional modules to complete all or part of the functions described above. In addition, in practical applications, the corresponding functional modules in this embodiment may be implemented by corresponding hardware, or may be implemented by corresponding hardware executing corresponding software. The above description principles can be applied to various embodiments provided in the present specification, and are not described in detail below.
In the embodiment of the invention, in a safe charging mode, when a data acquisition request sent by an external device through a charging wire is received, if the security level of target data pointed by the data acquisition request is greater than a preset level, the target data is encrypted according to a preset encryption mode and then sent to the external device, and decryption information is output in a preset mode.
Referring to fig. 5, a schematic structural diagram of a mobile terminal according to another embodiment of the present invention is shown, which only shows portions related to the embodiment of the present invention for convenience of description. The mobile terminal illustrated in fig. 5 may be an execution subject of the method for protecting data security provided by the foregoing embodiments illustrated in fig. 2 or fig. 3. The mobile terminal illustrated in fig. 5 differs from the mobile terminal in the embodiment illustrated in fig. 4 mainly in that:
further, the encryption module 503 is further configured to generate a random password, and encrypt the target data according to the random password.
Optionally, the encryption module 503 is further configured to obtain a user-defined password input by the user, and encrypt the target data according to the user-defined password.
Further, the mobile terminal further includes:
the network determining module 601 is configured to determine whether a wireless network is currently connected.
The output module 504 is further configured to, if the determination result of the network determining module 601 is that the wireless network is currently connected, send the random password as the decryption information to a preset account in an instant message manner, and if the determination result of the network determining module 601 is that the wireless network is not currently connected, output the random password as the decryption information in a short message manner.
Specifically, after the target data is encrypted by the encryption module 503, the network determination module 601 determines whether a wireless network is currently connected. If the wireless network is currently connected, the random password is used as the decryption information through the output module 504, and is sent to a preset account in an instant message manner. And if the wireless network is not connected currently, the random password is used as the decryption information through the output module 504 and is output in a short message mode.
Further, the mobile terminal further includes:
the content determining module 602 is configured to determine whether the received instant message or short message includes the decryption information when the instant message or short message is received.
The intercepting module 603 is configured to intercept notification information of the received instant message or short message pushed by the system if the determination result of the content determining module 602 is that the received instant message or short message includes the decryption information.
The screen-off module 604 is configured to, when an event triggering the viewing of the instant message or the short message is monitored, output a screen-off interface if the instant message or the short message pointed by the event includes the decryption information, acquire screen-off information through the screen-off interface, and trigger the output module 504 to output the content of the instant message or the short message pointed by the event if the screen-off information matches preset information.
Specifically, when an instant message or a short message is received, the content determining module 602 determines whether the received instant message or short message includes the decryption information. If the received instant message or short message contains the decryption information, the notification information of the received instant message or short message pushed by the system is intercepted by the intercepting module 603. If the received instant message or short message contains the decryption information, the notification information of the received instant message or short message pushed by the system is output through the output module 504.
When an event triggering the viewing of the instant message or the short message is monitored, if the instant message or the short message pointed by the event contains the decryption information, the screen-unlocking module 604 outputs a screen-unlocking interface, acquires screen-unlocking information through the screen-unlocking interface, and if the screen-unlocking information is matched with preset information, outputs the content of the instant message or the short message pointed by the event. If the instant message or short message to which the event points does not include the decryption information, the content of the instant message or short message to which the event points is output through the output module 504. In addition, if the screen unlocking information is not matched with the preset information, the screen locking state is entered.
Further, the control module 501 is further configured to enter the safe charging mode when a pressing event of a preset physical key is monitored.
The mobile terminal further includes:
and an information prompt module 605, configured to output a safe charging prompt message when an external charging wire insertion event is monitored.
The control module 501 is further configured to enter the secure charging mode when a confirmation button touch event occurring based on the secure charging prompt information is monitored.
The mobile terminal further includes:
the interface output module 606 is configured to output a preset safe charging setting interface when an event triggering the safe charging setting is monitored.
The control module 501 is further configured to enter the secure charging mode when a confirmation button touch event occurring based on the secure charging setting interface is monitored.
Specifically, when an event that an external charging line is inserted into a data interface of the mobile terminal is monitored through the event monitor, the information prompt module 605 outputs a safe charging prompt message to prompt a user whether to enter a safe charging mode. Then, the secure charging mode is entered by the control module 501 in response to a confirmation button touch event being monitored to occur based on the secure charging alert information.
Specifically, a safety charging setting function module can be preset in the mobile terminal. And monitoring an event which triggers the safe charging setting due to the operation of clicking a shortcut icon of the safe charging setting function module or the operation of pressing a safe charging setting shortcut physical key through the event monitor. Then, a preset safe charging setting interface is output through the interface output module 606 in response to the monitored event of safe charging setting triggered. Thereafter, when a confirmation button touch event occurring based on the secure charging setting interface is monitored through the event listener, a secure charging mode is entered through the control module 501 in response to the monitored touch event.
Further, the secure charging mode may also be exited by the control module 501 when an external charging wire pull-out event is monitored. Or, the control module 501 may further perform an operation of exiting the secure charging according to a preset secure charging setting interface performed by the user, or exit the secure charging mode and enter the normal charging mode when a pressing operation of exiting the secure charging mode performed by the user on a preset physical key is detected. And resumes normal transmission of data when entering the normal charging mode.
For details that are not described in the present embodiment, please refer to the description of the embodiment shown in fig. 1 to fig. 4, which will not be described herein again.
In the embodiment of the invention, in a safe charging mode, when a data acquisition request sent by an external device through a charging wire is received, if the security level of target data pointed by the data acquisition request is greater than a preset level, the target data is encrypted according to a preset encryption mode and then sent to the external device, and decryption information is output in a preset mode.
In the embodiments provided in the present application, it should be understood that the disclosed mobile terminal and method may be implemented in other ways. For example, the above-described embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication link may be through some interfaces, and the indirect coupling or communication link of the modules may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The above description of the method for protecting data security, the mobile terminal and the computer readable storage medium provided by the present invention is provided for those skilled in the art, and the idea of the embodiment of the present invention may be changed in the specific implementation manner and the application scope.

Claims (12)

1. A method for protecting data security is applied to charging of a mobile terminal, and is characterized in that the method comprises the following steps:
entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored;
in the safe charging mode, when a data acquisition request sent by an external device through a charging line is received, judging whether the security level of target data pointed by the data acquisition request is greater than a preset level;
if the security level of the target data is greater than the preset level, encrypting the target data according to a preset encryption mode and then sending the encrypted target data to the external equipment, and outputting decryption information in a preset mode so that the external equipment performs data interaction with the mobile terminal in the safe charging mode;
the preset mode comprises instant messages or short messages;
after the decryption information is output in a preset manner, the method further includes:
when receiving the instant message or the short message, judging whether the received instant message or the short message contains the decryption information;
if the decryption information is contained, intercepting the notification information of the received instant message or short message pushed by the system;
if the security level of the target data is not greater than the preset level, sending the target data to an external device;
in the safe charging mode, when the data acquisition request is not sent through the charging line, the step of judging whether the security level of the target data pointed by the data acquisition request is greater than a preset level is not executed.
2. The method for protecting data security according to claim 1, wherein the encrypting the target data according to a preset encryption method and then sending the encrypted target data to the external device includes:
generating a random password, encrypting the target data according to the random password and then sending the encrypted target data to the external equipment;
the outputting the decryption information in a preset mode comprises:
judging whether a wireless network is connected currently;
if the wireless network is connected, the random password is used as the decryption information and is sent to a preset account in an instant message mode;
and if the wireless network is not connected, the random password is used as the decryption information and is output in a short message mode.
3. The method for protecting data security according to claim 1 or 2, wherein after outputting the decryption information in a predetermined manner, further comprising:
when an event triggering the viewing of instant messages or short messages is monitored, if the instant messages or short messages pointed by the event contain the decryption information, an unlocking interface is output;
and acquiring screen unlocking information through the screen unlocking interface, and if the screen unlocking information is matched with preset information, outputting the content of the instant message or the short message pointed by the event.
4. The method of securing data as recited in claim 1, wherein said entering a secure charging mode when an event is monitored that triggers entry into the secure charging mode comprises:
and entering the safe charging mode when a pressing event of a preset physical key is monitored.
5. The method of securing data as recited in claim 1, wherein said entering into a secure charging mode when an event triggering entry into said secure charging mode is monitored comprises, prior to entering into said secure charging mode:
when an external charging wire insertion event is monitored, outputting safe charging prompt information;
when an event triggering entry into a secure charging mode is monitored, entering the secure charging mode includes:
and entering the safe charging mode when a confirmation button touch event occurring based on the safe charging prompt information is monitored.
6. The method of securing data as recited in claim 1, wherein said entering into a secure charging mode when an event triggering entry into said secure charging mode is monitored comprises, prior to entering into said secure charging mode:
outputting a preset safe charging setting interface when an event triggering the safe charging setting is monitored;
when an event triggering entry into a secure charging mode is monitored, entering the secure charging mode includes:
and entering the safe charging mode when a confirmation button touch event occurring on the basis of the safe charging setting interface is monitored.
7. A mobile terminal, comprising:
the control module is used for entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored;
the level judging module is used for judging whether the security level of target data pointed by a data acquisition request is greater than a preset level or not when the data acquisition request sent by external equipment through a charging wire is received in the safe charging mode;
the encryption module is used for encrypting the target data according to a preset encryption mode if the judgment result of the level judgment module is that the security level of the target data is greater than the preset level;
the output module is used for sending the encrypted target data to the external equipment and outputting the decryption information in a preset mode;
the output module is further configured to send the target data to an external device if the security level of the target data is not greater than the preset level, so that the external device performs data interaction with the mobile terminal in the secure charging mode;
in the safe charging mode, when the data acquisition request is not sent through the charging line, the level judgment module does not execute the step of judging whether the security level of the target data pointed by the data acquisition request is greater than a preset level;
the preset mode comprises instant messages or short messages;
the mobile terminal further includes:
the content judgment module is used for judging whether the received instant message or short message contains the decryption information when the instant message or short message is received;
and the interception module is used for intercepting the notification information of the received instant message or short message pushed by the system if the judgment result of the content judgment module is that the received instant message or short message contains the decryption information.
8. The mobile terminal of claim 7,
the encryption module is further used for generating a random password and encrypting the target data according to the random password;
the mobile terminal further includes:
the network judging module is used for judging whether a wireless network is connected currently;
the output module is further configured to send the random password as the decryption information to a preset account in an instant message manner if the judgment result of the network judgment module indicates that the wireless network is currently connected, and output the random password as the decryption information in a short message manner if the judgment result of the network judgment module indicates that the wireless network is not currently connected.
9. The mobile terminal of claim 8, wherein the mobile terminal further comprises:
and the screen unlocking module is used for outputting a screen unlocking interface if the instant message or the short message pointed by the event contains the decryption information when an event triggering the checking of the instant message or the short message is monitored, acquiring screen unlocking information through the screen unlocking interface, and triggering the output module to output the content of the instant message or the short message pointed by the event if the screen unlocking information is matched with preset information.
10. The mobile terminal of any of claims 7 to 9,
the control module is further used for entering the safe charging mode when a pressing event of a preset physical key is monitored;
the mobile terminal further includes:
the information prompt module is used for outputting safe charging prompt information when an external charging wire insertion event is monitored;
the control module is further used for entering the safe charging mode when a confirmation button touch event based on the safe charging prompt information is monitored;
the mobile terminal further includes:
the interface output module is used for outputting a preset safe charging setting interface when an event triggering the safe charging setting is monitored;
the control module is further used for entering the safe charging mode when a confirmation button touch event occurring on the basis of the safe charging setting interface is monitored.
11. A mobile terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements a method of securing data according to any of claims 1 to 6 when executing the computer program.
12. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of securing data according to any one of claims 1 to 6.
CN201710590892.9A 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium Expired - Fee Related CN107392035B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710590892.9A CN107392035B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710590892.9A CN107392035B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107392035A CN107392035A (en) 2017-11-24
CN107392035B true CN107392035B (en) 2020-08-18

Family

ID=60335788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710590892.9A Expired - Fee Related CN107392035B (en) 2017-07-19 2017-07-19 Method for protecting data security, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107392035B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110928467B (en) * 2019-11-19 2021-07-27 广东欢太科技有限公司 Connection option display method and device and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117251A (en) * 2009-12-31 2011-07-06 比亚迪股份有限公司 Method for selecting application mode of universal serial bus (USB) equipment and USB equipment
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103546289A (en) * 2013-09-29 2014-01-29 北京握奇智能科技有限公司 USB (universal serial bus) Key based secure data transmission method and system
CN104200172A (en) * 2014-08-29 2014-12-10 公安部第一研究所 Safe leading-in device, system and method for USB data
CN106874232A (en) * 2015-12-14 2017-06-20 中兴通讯股份有限公司 The charging method of general-purpose serial bus USB, device and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060117664A (en) * 2005-05-13 2006-11-17 주식회사 팬택 Method for booting of mobile communication set and apparatus thereof
CN105550568B (en) * 2015-12-25 2019-03-15 小米科技有限责任公司 The method and device of mobile terminal data protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117251A (en) * 2009-12-31 2011-07-06 比亚迪股份有限公司 Method for selecting application mode of universal serial bus (USB) equipment and USB equipment
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103546289A (en) * 2013-09-29 2014-01-29 北京握奇智能科技有限公司 USB (universal serial bus) Key based secure data transmission method and system
CN104200172A (en) * 2014-08-29 2014-12-10 公安部第一研究所 Safe leading-in device, system and method for USB data
CN106874232A (en) * 2015-12-14 2017-06-20 中兴通讯股份有限公司 The charging method of general-purpose serial bus USB, device and terminal

Also Published As

Publication number Publication date
CN107392035A (en) 2017-11-24

Similar Documents

Publication Publication Date Title
US20220385471A1 (en) Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal
EP3493056B1 (en) Information displaying method for terminal device, and terminal device
CN102467462B (en) Method for protecting data stored in device and corresponding device
US10885218B2 (en) Privacy protection method and terminal device
CN110651270B (en) Data access method and device
CN108038393B (en) Application privacy protection method and mobile terminal
US20150128257A1 (en) Method for unlocking terminal device and terminal device
CN102880560A (en) User privacy data protection method and mobile terminal using user privacy data protection method
CN105281907B (en) Encrypted data processing method and device
US11405193B2 (en) Encrypted photographing method and system based on fingerprint recognition
CN104346560A (en) Security authentication method and security authentication device
CN113259301A (en) Account data sharing method and electronic equipment
CN112533072A (en) Image sending method and device and electronic equipment
CN112887922B (en) Message sending method and electronic equipment
CN107392035B (en) Method for protecting data security, mobile terminal and computer readable storage medium
CN107392066B (en) Method for protecting data security, mobile terminal and computer readable storage medium
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
WO2021092769A1 (en) Security protection method and device, mobile terminal, and storage medium
CN105808995A (en) Password prompting method and device and terminal
CN108763884B (en) Authority management method, device, mobile terminal and storage medium
CN106161481A (en) A kind of mobile terminal physical button isolation safe module takes precautions against the device of security risk
CN112637195B (en) Method and device for controlling electronic equipment and electronic equipment
CN107026817B (en) System for automatically inputting password
CN104243476A (en) Account protection method and device
US20160259925A1 (en) Terminal unlocking method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200818