CN107392066A - Method for protecting data security, mobile terminal and computer-readable storage medium - Google Patents

Method for protecting data security, mobile terminal and computer-readable storage medium Download PDF

Info

Publication number
CN107392066A
CN107392066A CN201710590548.XA CN201710590548A CN107392066A CN 107392066 A CN107392066 A CN 107392066A CN 201710590548 A CN201710590548 A CN 201710590548A CN 107392066 A CN107392066 A CN 107392066A
Authority
CN
China
Prior art keywords
data
safe charging
charging mode
event
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710590548.XA
Other languages
Chinese (zh)
Other versions
CN107392066B (en
Inventor
彭凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710590548.XA priority Critical patent/CN107392066B/en
Publication of CN107392066A publication Critical patent/CN107392066A/en
Application granted granted Critical
Publication of CN107392066B publication Critical patent/CN107392066B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a method for protecting data security, which is applied to the technical field of mobile terminals and comprises the following steps: entering a safe charging mode when an event triggering the entering of the safe charging mode is monitored; in the safe charging mode, when data sent by external equipment through a charging wire is received, judging whether the data is program data of a preset type; if the data is program data of a preset type, the data is isolated, so that the data cannot be started or called. The embodiment of the invention also discloses a mobile terminal and a computer readable storage medium. The method for protecting data security, the mobile terminal and the computer readable storage medium can ensure the security of user information during charging.

Description

保护数据安全的方法、移动终端及计算机可读存储介质Method for protecting data security, mobile terminal and computer-readable storage medium

技术领域technical field

本发明属于移动终端技术领域,尤其涉及一种保护数据安全的方法、移动终端及计算机可读存储介质。The invention belongs to the technical field of mobile terminals, and in particular relates to a method for protecting data security, a mobile terminal and a computer-readable storage medium.

背景技术Background technique

随着移动终端技术的发展,人们对智能手机、平板电脑等移动终端的依赖性越来越强。上述移动终端往往承载了用户的许多个人信息和隐私,包括各类账号的登录密码、相册等等。With the development of mobile terminal technology, people are increasingly dependent on mobile terminals such as smartphones and tablet computers. The above-mentioned mobile terminal often carries a lot of personal information and privacy of the user, including login passwords of various accounts, photo albums, and the like.

当前,通过USB(Universal Serial Bus,通用串行总线)外部充电线进行充电是一种很常见的充电方式,但这种充电方式在充电的同时,还可一并进行数据传输,因此具有较大的安全隐患。特别是目前市场上有比较多的共享充电服务,比如共享充电宝,如果不法分子在充电器或者充电宝里面内置控制平台,则很容易在用户充电时,破解终端内的安全防线,窃取用户机密。Currently, charging via a USB (Universal Serial Bus, Universal Serial Bus) external charging cable is a very common charging method, but this charging method can also perform data transmission at the same time as charging, so it has great advantages. security risks. In particular, there are many shared charging services on the market, such as shared charging treasures. If criminals build a control platform in the charger or charging treasure, it is easy to crack the security defense line in the terminal and steal user secrets when the user is charging. .

发明内容Contents of the invention

本发明实施例提供一种保护数据安全的方法、移动终端及计算机可读存储介质,可保证充电期间用户信息的安全。Embodiments of the present invention provide a method for protecting data security, a mobile terminal and a computer-readable storage medium, which can ensure the security of user information during charging.

本发明实施例第一方面提供了一种保护数据安全的方法,应用于为移动终端进行充电时,包括:当监听到触发进入安全充电模式的事件时,进入所述安全充电模式;在所述安全充电模式下,当接收到外部设备通过充电线发送的数据时,判断所述数据是否为预设类型的程序数据;若所述数据为预设类型的程序数据,则将所述数据隔离,以使得所述数据无法启动或被调用。The first aspect of the embodiments of the present invention provides a method for protecting data security, which is applied to charging a mobile terminal, including: when an event triggering entry into the safe charging mode is detected, entering the safe charging mode; In the safe charging mode, when the data sent by the external device through the charging line is received, it is judged whether the data is a preset type of program data; if the data is a preset type of program data, the data is isolated, So that the data cannot be started or called.

本发明实施例第二方面提供了一种移动终端,包括:控制模块,用于当监听到触发进入安全充电模式的事件时,进入所述安全充电模式;判断模块,用于在所述安全充电模式下,当接收到外部设备通过充电线发送的数据时,判断所述数据是否为预设类型的程序数据;隔离模块,用于若所述判断模块的判断结果为所述数据为预设类型的程序数据,则将所述数据隔离,以使得所述数据无法启动或被调用。The second aspect of the embodiments of the present invention provides a mobile terminal, including: a control module, configured to enter the safe charging mode when an event that triggers entering the safe charging mode is detected; a judging module, configured to mode, when the data sent by the external device through the charging line is received, it is judged whether the data is a preset type of program data; the isolation module is used to determine whether the judgment result of the judgment module is that the data is a preset type program data, the data is isolated so that the data cannot be started or called.

本发明实施例第三方面提供了一种移动终端,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时,实现上述本发明实施例第一方面提供的保护数据安全的方法。The third aspect of the embodiment of the present invention provides a mobile terminal, including: a memory, a processor, and a computer program stored on the memory and operable on the processor, when the processor executes the computer program , implementing the method for protecting data security provided by the first aspect of the above-mentioned embodiment of the present invention.

本发明实施例第四方面提供了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时,实现上述本发明实施例第一方面提供的保护数据安全的方法。The fourth aspect of the embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for protecting data security provided by the above-mentioned first aspect of the embodiment of the present invention is implemented. .

上述本发明实施例提供的保护数据安全的方法、移动终端及计算机可读存储介质,通过在安全充电模式下,当接收到外部设备通过充电线发送的数据时,若该数据为预设类型的程序数据,则将该数据隔离,以使得该数据无法启动或被调用,可以有效防止终端在充电时因被植入木马或恶意程序而导致信息泄露,保证充电时用户信息的安全。In the method for protecting data security, the mobile terminal, and the computer-readable storage medium provided by the above-mentioned embodiments of the present invention, in the safe charging mode, when receiving data sent by an external device through a charging cable, if the data is of a preset type Program data, the data is isolated so that the data cannot be started or called, which can effectively prevent information leakage caused by implanting Trojan horses or malicious programs when the terminal is charging, and ensure the security of user information during charging.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only are some embodiments of the present invention.

图1是本发明一实施例提供的移动终端的硬件结构图。FIG. 1 is a hardware structural diagram of a mobile terminal provided by an embodiment of the present invention.

图2是本发明一实施例提供的保护数据安全的方法的实现流程示意图。Fig. 2 is a schematic diagram of the implementation flow of a method for protecting data security provided by an embodiment of the present invention.

图3是本发明另一实施例提供的保护数据安全的方法的实现流程示意图。Fig. 3 is a schematic diagram of an implementation flow of a method for protecting data security provided by another embodiment of the present invention.

图4是本发明一实施例提供的移动终端的结构示意图。Fig. 4 is a schematic structural diagram of a mobile terminal provided by an embodiment of the present invention.

图5是本发明另一实施例提供的移动终端的结构示意图。Fig. 5 is a schematic structural diagram of a mobile terminal provided by another embodiment of the present invention.

图6为在实际应用中利用本发明实施例提供的保护数据安全的方法进行安全充电的移动终端的一示意图。Fig. 6 is a schematic diagram of a mobile terminal that uses the method for protecting data security provided by an embodiment of the present invention to perform safe charging in practical applications.

具体实施方式detailed description

为使得本发明的发明目的、特征、优点能够更加的明显和易懂,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而非全部实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

图1是本发明一实施例提供的移动终端的硬件结构图。如图1所示,本实施例中所描述的移动终端10,包括:FIG. 1 is a hardware structural diagram of a mobile terminal provided by an embodiment of the present invention. As shown in FIG. 1, the mobile terminal 10 described in this embodiment includes:

存储器51、处理器52及存储在存储器51上并可在处理器上运行的计算机程序,处理器执行所述计算机程序时,实现后述图2和图3所示实施例中描述的保护数据安全的方法。The memory 51, the processor 52, and the computer program stored on the memory 51 and operable on the processor, when the processor executes the computer program, realizes the protection of data security described in the embodiment shown in Figure 2 and Figure 3 described later Methods.

进一步地,移动终端10还包括:Further, the mobile terminal 10 also includes:

至少一个输入设备53以及至少一个输出设备54。At least one input device 53 and at least one output device 54 .

上述存储器51、处理器52、输入设备53和输出设备54通过总线55连接。The aforementioned memory 51 , processor 52 , input device 53 and output device 54 are connected through a bus 55 .

其中,输入设备53具体可为摄像头、触控面板、物理按键或者鼠标等等。输出设备54具体可为显示屏。Wherein, the input device 53 may specifically be a camera, a touch panel, a physical button or a mouse, and the like. The output device 54 can specifically be a display screen.

存储器51可以是高速随机存取记忆体(RAM,Random Access Memory)存储器,也可为非不稳定的存储器(non-volatile memory),例如磁盘存储器。存储器51用于存储一组可执行程序代码,处理器52与存储器51耦合。The memory 51 may be a high-speed random access memory (RAM, Random Access Memory) memory, or a non-volatile memory (non-volatile memory), such as a disk memory. The memory 51 is used to store a set of executable program codes, and the processor 52 is coupled with the memory 51 .

进一步地,本发明实施例还提供了一种计算机可读存储介质,该计算机可读存储介质可以是设置于前述和后述各实施例中的移动终端中,该计算机可读存储介质可以是前述图1所示实施例中的存储器。该计算机可读存储介质上存储有计算机程序,该程序被处理器执行时实现后述图2和图3所示实施例中描述的保护数据安全的方法。进一步地,该计算机可存储介质还可以是U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Further, the embodiment of the present invention also provides a computer-readable storage medium, which can be set in the mobile terminal in the foregoing and subsequent embodiments, and the computer-readable storage medium can be the aforementioned Memory in the embodiment shown in Figure 1. A computer program is stored on the computer-readable storage medium, and when the program is executed by a processor, the method for protecting data security described in the embodiments shown in FIG. 2 and FIG. 3 will be implemented later. Further, the computer storage medium may also be various media capable of storing program codes such as a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), RAM, a magnetic disk or an optical disk.

请参阅图2,图2为本发明一实施例提供的保护数据安全的方法的实现流程示意图,该方法可应用于移动终端中,移动终端包括:可通过外部充电线进行充电的智能手机、平板电脑、笔记本电脑等可在移动中使用的电子数据处理设备。如图2所示,该方法主要包括以下步骤:Please refer to Fig. 2. Fig. 2 is a schematic diagram of the implementation flow of a method for protecting data security provided by an embodiment of the present invention. This method can be applied to mobile terminals, and mobile terminals include: smart phones and tablets that can be charged through external charging lines Computers, laptops, and other electronic data processing equipment that can be used on the move. As shown in Figure 2, the method mainly includes the following steps:

S301、当监听到触发进入安全充电模式的事件时,进入安全充电模式。S301. When an event triggering entry into the safe charging mode is detected, enter the safe charging mode.

具体的,用户可以通过按压预设物理按键,或者对预设的安全充电设置界面中各设置菜单及按键的触摸操作,触发移动终端进入安全充电模式。移动终端中设置有事件监听器,通过该事件监听器监听移动终端中发生的各类事件,如:按压物理按键事件、交互界面中发生的触摸事件、焦点事件和菜单事件等等。事件监听器将监听到的事件传递到不同的控件或同一控件的不同事件处理方法,以便进行处理。Specifically, the user can trigger the mobile terminal to enter the safe charging mode by pressing a preset physical button, or by touching each setting menu and button in the preset safe charging setting interface. The mobile terminal is provided with an event listener, through which various events occurring in the mobile terminal are monitored, such as: pressing a physical key event, touch events occurring in an interactive interface, focus events, menu events, and the like. The event listener passes the monitored events to different controls or different event processing methods of the same control for processing.

S302、在该安全充电模式下,当接收到外部设备通过充电线发送的数据时,判断该数据是否为预设类型的程序数据。S302. In the safe charging mode, when receiving data sent by the external device through the charging cable, determine whether the data is program data of a preset type.

外部设备例如可以是:台式计算机、平板电脑、手提电脑、智能手机、移动充电设备(如充电宝)等可对移动终端进行充电的各类设备。The external device may be, for example, a desktop computer, a tablet computer, a laptop computer, a smart phone, a mobile charging device (such as a power bank), and other various devices capable of charging the mobile terminal.

充电线可以是具有充电功能的数据线,如USB充电线,可通过USB或其他数据接口接入移动终端内部。外部设备通过该充电线可以在为移动终端充电的同时,与移动终端进行数据交互。The charging cable can be a data cable with a charging function, such as a USB charging cable, which can be connected to the interior of the mobile terminal through a USB or other data interface. The external device can perform data interaction with the mobile terminal while charging the mobile terminal through the charging line.

预设类型的程序数据可以是可在开机时自启、或自动执行、或可被其他进程调用的程序数据,例如:.exe文件、.sys文件、.com等可执行程序的数据。The preset type of program data can be program data that can be started automatically when booting, or can be executed automatically, or can be called by other processes, for example: data of executable programs such as .exe files, .sys files, and .com.

可以理解的,上述判断只针对外部设备通过充电线传入的数据。这样可以不妨碍终端通过无线网络等其他安全渠道与外部设备进行的数据交互。It can be understood that the above judgment is only for the data transmitted by the external device through the charging cable. In this way, the data interaction between the terminal and the external device through other secure channels such as wireless network will not be hindered.

若该数据为预设类型的程序数据,则执行步骤S303:将该数据隔离,以使得该数据无法启动或被调用。If the data is program data of a preset type, perform step S303: isolate the data so that the data cannot be started or called.

隔离方式具体可以但不限于:基于对数据本身进行的修改而对数据进行的隔离,或者,通过外部环境对数据进行的隔离。其中对数据本身进行的修改,例如:对该数据进行格式转换,修改该数据的后缀名,对该数据进行压缩加密,禁用对该数据的访问权限等等。通过外部环境对数据进行隔离,例如:将该数据存储在特定的存储区域。The isolation method may specifically be but not limited to: isolation of data based on modification of the data itself, or isolation of data through an external environment. Among them, the modification of the data itself, such as: converting the format of the data, modifying the suffix name of the data, compressing and encrypting the data, disabling access to the data, and so on. Isolate data through the external environment, for example: store the data in a specific storage area.

若该数据不是预设类型的程序数据,则执行步骤S304:将该数据按照常规处理逻辑进行处理。例如:将该数据存储在默认的存储目录,并执行对应的操作。像这样,对外部设备发送的数据有区别的进行处理,可以使得数据安全保护更具有针对性,提高安全保护的灵活性。If the data is not program data of a preset type, execute step S304: process the data according to conventional processing logic. For example: store the data in the default storage directory and perform corresponding operations. In this way, the data sent by the external device is processed differently, which can make data security protection more targeted and improve the flexibility of security protection.

本发明实施例中,通过在安全充电模式下,当接收到外部设备通过充电线发送的数据时,若该数据为预设类型的程序数据,则将该数据隔离,以使得该数据无法启动或被调用,可以有效防止终端在充电时因被植入木马或恶意程序而导致信息泄露,保证充电时用户信息的安全。In the embodiment of the present invention, in the safe charging mode, when the data sent by the external device through the charging cable is received, if the data is a preset type of program data, the data is isolated so that the data cannot be started or It can effectively prevent information leakage caused by implanting Trojan horses or malicious programs when the terminal is charging, and ensure the security of user information during charging.

请参阅图3,图3为本发明另一实施例提供的保护数据安全的方法的实现流程示意图,该方法可应用于移动终端中,移动终端包括:可通过外部充电线进行充电的智能手机、平板电脑、笔记本电脑等可在移动中使用的电子数据处理设备。如图3所示,该方法主要包括以下步骤:Please refer to FIG. 3. FIG. 3 is a schematic diagram of the implementation flow of a method for protecting data security provided by another embodiment of the present invention. The method can be applied to mobile terminals. Electronic data processing devices such as tablets and laptops that can be used on the move. As shown in Figure 3, the method mainly includes the following steps:

S401、当监听到触发进入安全充电模式的事件时,进入安全充电模式。S401. When an event triggering entry into the safe charging mode is detected, enter the safe charging mode.

移动终端中设置有事件监听器,通过事件监听器可以监听到移动终端中发生的各类事件。事件监听器将监听到的事件传递到不同的控件或同一控件的不同事件处理方法,以便进行处理。The mobile terminal is provided with an event listener, through which various events occurring in the mobile terminal can be monitored. The event listener passes the monitored events to different controls or different event processing methods of the same control for processing.

可选的,触发进入安全充电模式的事件为预设物理按键的按压事件。具体的,当通过事件监听器监听到预设物理按键的按压事件时,响应于该事件,进入安全充电模式。其中,预设物理按键可以是用户自定义的现有的功能按键,如:开、关机键、音量键、拍照键等。为避免造成功能冲突,优选为非开、关机键,比如音量+键。或者,预设物理按键也可以是专门用于进入安全充电模式的物理按键。按压操作可以但不限于:长按、多次按压等。具体也可由用户自定义。Optionally, the event that triggers entering the safe charging mode is a pressing event of a preset physical button. Specifically, when a press event of a preset physical key is monitored through the event listener, the safe charging mode is entered in response to the event. Wherein, the preset physical button may be an existing function button customized by the user, such as an on/off button, a volume button, a camera button, and the like. In order to avoid function conflicts, it is preferably a non-on and off key, such as the volume + key. Alternatively, the preset physical button may also be a physical button specially used to enter the safe charging mode. The pressing operation may be, but not limited to: long pressing, multiple pressing, and the like. The details can also be customized by the user.

可选的,触发进入安全充电模式的事件为基于安全充电提示信息发生的确认按钮触摸事件。具体的,当通过事件监听器监听到外部充电线插入事件时,输出安全充电提示信息。然后,当通过事件监听器监听到基于输出的安全充电提示信息发生的确认按钮触摸事件时,进入安全充电模式。其中基于安全充电提示信息发生的确认按钮触摸事件,例如:因用户的一个或多个手指在安全充电提示信息输出窗口提供的确认按钮上的接触、离开、移动等操作而产生的触摸事件。Optionally, the event that triggers entering the safe charging mode is a confirmation button touch event that occurs based on the safe charging prompt information. Specifically, when an external charging line insertion event is detected through the event listener, a safe charging prompt message is output. Then, when a confirmation button touch event based on the output safe charging prompt information is monitored through the event listener, the safe charging mode is entered. Among them, the confirmation button touch event that occurs based on the safe charging prompt information, for example: a touch event generated by one or more fingers of the user touching, leaving, moving, etc. on the confirmation button provided by the safe charging prompt information output window.

可选的,若超过预置时长没有监听到基于安全充电提示信息发生的确认按钮触摸事件,或者,监听到基于安全充电提示信息发生的拒绝按钮触摸事件时,取消输出安全充电提示信息,并按照正常充电模式进行充电,即在正常充电模式下,外部设备可与主控芯片进行数据交互。可以理解的,本实施例中的确认按钮是具有确认含义的按钮,如带有“是”、“Y”、“确定”等字样的按钮。拒绝按钮是具有拒绝含义的按钮,如带有“否”、“N”、“关闭”等字样的按钮。Optionally, if the confirmation button touch event based on the safe charging prompt information is not monitored for more than the preset time, or, when the reject button touch event based on the safe charging prompt information is detected, the output of the safe charging prompt information is cancelled, and according to Charging in the normal charging mode, that is, in the normal charging mode, the external device can exchange data with the main control chip. It can be understood that the confirmation button in this embodiment is a button with a confirmation meaning, such as a button with words such as "Yes", "Y", and "OK". A reject button is a button that has a rejecting meaning, such as a button with the words "No", "N", "Close", etc.

为进一步说明本实施例提供的保护数据安全的方法,以图6所示的移动终端为例,当监听到图6中的物理按键1的按压事件时,响应于该按压事件,进入安全充电模式。或者,仍以图6所示的移动终端为例,当监听到外部充电线2插入事件时,弹出窗口3,并在窗口3中输出安全充电提示信息。然后,当监听到窗口3中的确认按钮4触摸事件时,进入安全充电模式。可选的,在响应于物理按键1的按压事件进入安全充电模式前,也可先输出安全充电提示信息,当监听到窗口3中的确认按钮4触摸事件时,进入安全充电模式。In order to further illustrate the method for protecting data security provided by this embodiment, take the mobile terminal shown in FIG. 6 as an example. When the pressing event of the physical button 1 in FIG. 6 is monitored, it enters the safe charging mode in response to the pressing event . Or, still taking the mobile terminal shown in FIG. 6 as an example, when the event of plugging in the external charging line 2 is detected, a window 3 will pop up, and a safe charging prompt message will be output in the window 3 . Then, when the touch event of the confirmation button 4 in the window 3 is detected, it enters the safe charging mode. Optionally, before entering the safe charging mode in response to the pressing event of the physical button 1, the safe charging prompt information may also be output first, and when the touch event of the confirmation button 4 in the window 3 is detected, the safe charging mode is entered.

可选的,触发进入安全充电模式的事件为基于预设的安全充电设置界面发生的确认按钮触摸事件,例如:因用户的一个或多个手指在该界面提供的用于触发进入安全充电模式的各种设置菜单以及按钮上的接触、离开、移动等操作而产生的触摸事件。具体的,在移动终端中预设安全充电设置功能模块,当监听到触发进行安全充电设置的事件时,通过安全充电设置功能模块输出预设的安全充电设置界面。然后,当监听到基于输出的安全充电设置界面发生的确认按钮触摸事件时,进入所述安全充电模式。其中,触发进行安全充电设置的事件,例如:安全充电设置功能模块的快捷图标的触摸事件、安全充电设置快捷物理键的按压事件等等。Optionally, the event that triggers entering the safe charging mode is a confirmation button touch event that occurs based on the preset safe charging setting interface, for example: one or more fingers of the user are provided on the interface for triggering entering the safe charging mode. Various setting menus and touch events generated by operations such as contact, departure, and movement on buttons. Specifically, a safe charging setting function module is preset in the mobile terminal, and when an event triggering safe charging setting is detected, a preset safe charging setting interface is output through the safe charging setting function module. Then, when the touch event of the confirmation button occurring on the output-based safe charging setting interface is monitored, the safe charging mode is entered. Wherein, an event that triggers safe charging setting, for example: a touch event of a shortcut icon of a safe charging setting function module, a pressing event of a shortcut physical key of a safe charging setting, and the like.

S402、在该安全充电模式下,当接收到外部设备通过充电线发送的数据时,判断该数据是否为预设类型的程序数据。S402. In the safe charging mode, when receiving data sent by the external device through the charging cable, determine whether the data is program data of a preset type.

外部设备例如可以是:台式计算机、平板电脑、手提电脑、智能手机、移动充电设备(如充电宝)等可对移动终端进行充电的各类设备。The external device may be, for example, a desktop computer, a tablet computer, a laptop computer, a smart phone, a mobile charging device (such as a power bank), and other various devices capable of charging the mobile terminal.

充电线可以是具有充电功能的数据线,如USB充电线,可通过USB或其他数据接口接入移动终端内部。外部设备通过该充电线可以在为移动终端充电的同时,与移动终端进行数据交互。The charging cable can be a data cable with a charging function, such as a USB charging cable, which can be connected to the interior of the mobile terminal through a USB or other data interface. The external device can perform data interaction with the mobile terminal while charging the mobile terminal through the charging line.

预设类型的程序数据可以是可在开机时自启、或自动执行、或可被其他进程调用的程序数据,例如:.exe文件、.sys文件、.com等可执行程序的数据。The preset type of program data can be program data that can be started automatically when booting, or can be executed automatically, or can be called by other processes, for example: data of executable programs such as .exe files, .sys files, and .com.

若该数据为预设类型的程序数据,则执行步骤S403:将该数据隔离,以使得该数据无法启动或被调用。If the data is program data of a preset type, perform step S403: isolate the data so that the data cannot be started or called.

于本发明其他一实施例中,将该数据隔离具体可以包括:将接收的预设类型的数据存储在预设存储区域,并将该预设存储区域设置为非指定进程不可访问。其中指定进程可根据用户的操作自定义。可选的,默认非系统进程不可访问。In another embodiment of the present invention, the data isolation may specifically include: storing the received data of a preset type in a preset storage area, and setting the preset storage area to be inaccessible to non-designated processes. The specified process can be customized according to the user's operation. Optional, inaccessible by default to non-system processes.

于本发明其他一实施例中,将该数据隔离具体还可以包括:将接收的预设类型的程序数据转换为预设格式的数据文件,例如:转换为压缩格式的加密文件,转换为图形数据文件。对数据进行转换可以调用第三方格式转换程序进行转换,或者,直接修改该数据文件的后缀名,如:将.exe修改为.jpg。In another embodiment of the present invention, the data isolation may specifically include: converting the received program data of a preset type into a data file in a preset format, for example: converting into an encrypted file in a compressed format, converting into a graphic data document. To convert the data, you can call a third-party format conversion program to convert, or directly modify the suffix name of the data file, such as: modify .exe to .jpg.

可选的,也可将接收的预设类型的程序数据转换为预设格式的数据文件后存储在预设存储区域,并将该预设存储区域设置为非指定进程不可访问。Optionally, the received program data of the preset type may also be converted into a data file of a preset format and then stored in the preset storage area, and the preset storage area may be set to be inaccessible to non-designated processes.

若该数据不是预设类型的程序数据,则执行步骤S404:将该数据按照常规处理逻辑进行处理。例如:将该数据存储在默认的存储目录,并执行对应的操作。If the data is not program data of a preset type, perform step S404: process the data according to conventional processing logic. For example: store the data in the default storage directory and perform corresponding operations.

S405、当监听到充电线拔出事件或触发退出安全充电模式事件时,生成安全充电期间接收的所有预设类型的程序数据的描述信息并输出。S405. When an event of pulling out the charging cable is detected or an event of exiting the safe charging mode is triggered, generate and output description information of all preset types of program data received during safe charging.

触发退出安全充电模式事件包括:用户在预设的安全充电设置界面进行的退出安全充电的操作事件,或者,当用户对预设的物理按键进行的用于退出安全充电模式的按压操作事件。The event that triggers the exit of the safe charging mode includes: the operation event of exiting the safe charging performed by the user on the preset safe charging setting interface, or when the user presses the preset physical button to exit the safe charging mode.

当监听到充电线拔出事件或触发退出安全充电模式事件时,退出安全充电模式并进入正常充电模式。并在进入正常充电模式时,生成安全充电期间接收的所有预设类型的程序数据的描述信息。其中安全充电期间接收的所有预设类型的程序数据包括:存储在预设存储区域的数据,或,经过格式转换的数据。程序数据的描述信息可以但不限于包括:该程序数据的类型信息、接收时间、危险等级、标识信息等。其中,危险等级可根据程序数据的类型及运行时具有的权限确定。可以理解的,自启程序数据的危险等级高于可执行程序数据的危险等级。运行时具有读取和修改存储器中数据权限的程序数据的危险等级高于不具有读取和修改存储器中数据权限的程序数据。When the event of pulling out the charging cable is detected or the event of exiting the safe charging mode is triggered, exit the safe charging mode and enter the normal charging mode. And when entering the normal charging mode, generate description information of all preset types of program data received during safe charging. All preset types of program data received during safe charging include: data stored in a preset storage area, or data that has undergone format conversion. The description information of the program data may include, but is not limited to: type information of the program data, receiving time, risk level, identification information, and the like. Among them, the danger level can be determined according to the type of program data and the authority it has at runtime. It can be understood that the danger level of the self-starting program data is higher than that of the executable program data. Program data that has permission to read and modify data in memory at runtime is at a higher risk level than program data that does not have permission to read and modify data in memory.

可选的,描述信息可在屏幕中以列表的方式进行输出。Optionally, the description information can be output in the form of a list on the screen.

S406、当监听到触发数据恢复事件时,恢复该所有预设类型的程序数据中该触发数据恢复事件指向的目标数据,并删除该所有预设类型的程序数据中除该目标数据之外的其他数据。S406. When the trigger data recovery event is detected, restore the target data pointed to by the trigger data recovery event in all the preset types of program data, and delete all the preset types of program data except the target data data.

触发数据恢复事件包括:描述信息输出界面中的描述信息列表项以及用于确认恢复数据的按钮的触摸事件。当监听到上述触摸事件时,恢复安全充电期间接收的所有预设类型的程序数据中该触摸事件指向的目标数据,并删除其他程序数据。其中恢复目标数据包括:若该目标数据被转换为预设格式的数据文件,则将该目标数据恢复为原格式的数据,并进一步地将该目标数据恢复至原预设的存储位置;若该目标数据被存储在预设存储区域,则将该目标数据恢复至原预设的存储位置。The data restoration event triggering includes: a touch event of a description information list item in the description information output interface and a button for confirming data restoration. When the above-mentioned touch event is detected, the target data pointed to by the touch event among all preset types of program data received during safe charging is restored, and other program data is deleted. Restoring the target data includes: if the target data is converted into a data file in a preset format, then restoring the target data to the data in the original format, and further restoring the target data to the original preset storage location; If the target data is stored in the preset storage area, the target data is restored to the original preset storage location.

可以理解的,若超过预设时长未监听到该触发数据恢复事件,则取消描述信息的输出,并在上述所有预设类型的程序数据的存储时长超过预设时长时,删除上述所有预设类型的程序数据,以释放被占用的存储空间。It can be understood that if the triggering data recovery event is not detected beyond the preset duration, the output of the description information will be canceled, and when the storage duration of all the preset types of program data exceeds the preset duration, all the preset types will be deleted program data to release occupied storage space.

本发明实施例中,通过在安全充电模式下,当接收到外部设备通过充电线发送的数据时,若该数据为预设类型的程序数据,则将该数据隔离,以使得该数据无法启动或被调用,可以有效防止终端在充电时因被植入木马或恶意程序而导致信息泄露,保证充电时用户信息的安全。In the embodiment of the present invention, in the safe charging mode, when the data sent by the external device through the charging cable is received, if the data is a preset type of program data, the data is isolated so that the data cannot be started or It can effectively prevent information leakage caused by implanting Trojan horses or malicious programs when the terminal is charging, and ensure the security of user information during charging.

请参阅图4,图4是本发明一实施例提供的移动终端的结构示意图,为了便于说明,仅示出了与本发明实施例相关的部分。图4示例的移动终端可以是前述图2所示实施例提供的保护数据安全的方法的执行主体,主要包括:Please refer to FIG. 4 . FIG. 4 is a schematic structural diagram of a mobile terminal provided by an embodiment of the present invention. For ease of description, only parts related to the embodiment of the present invention are shown. The mobile terminal illustrated in FIG. 4 may be the execution subject of the method for protecting data security provided by the embodiment shown in FIG. 2, which mainly includes:

控制模块501,用于当监听到触发进入安全充电模式的事件时,进入该安全充电模式;The control module 501 is configured to enter the safe charging mode when an event that triggers entering the safe charging mode is detected;

判断模块502,用于在该安全充电模式下,当接收到外部设备通过充电线发送的数据时,判断该数据是否为预设类型的程序数据;A judging module 502, configured to judge whether the data is program data of a preset type when receiving data sent by the external device through the charging cable in the safe charging mode;

隔离模块503,用于若判断模块502的判断结果为该数据为预设类型的程序数据,则将该数据隔离,以使得该数据无法启动或被调用。The isolation module 503 is configured to isolate the data if the determination result of the determination module 502 is that the data is program data of a preset type, so that the data cannot be started or called.

具体的,移动终端中设置有事件监听器,当通过事件监听器监听到触发进入安全充电模式的事件时,通过控制模块501进入安全充电模式。然后,通过判断模块502在该安全充电模式下,当接收到外部设备通过充电线发送的数据时,判断该数据是否为预设类型的程序数据。若判断模块502的判断结果为该数据为预设类型的程序数据,则通过隔离模块503将该数据隔离,以使得该数据无法启动或被调用。其中通过隔离模块503将该数据隔离可以但不限于:基于对数据本身进行的修改而对数据进行的隔离,或者,通过外部环境对数据进行的隔离。其中对数据本身进行的修改,例如:对该数据进行格式转换,修改该数据的后缀名,对该数据进行压缩加密,禁用对该数据的访问权限等等。通过外部环境对数据进行隔离,例如:将该数据存储在特定的存储区域。Specifically, the mobile terminal is provided with an event listener, and when an event triggering entry into the safe charging mode is monitored through the event listener, the mobile terminal enters the safe charging mode through the control module 501 . Then, in the safe charging mode, when the data sent by the external device through the charging cable is received by the judging module 502, it is judged whether the data is the preset type of program data. If the judging result of the judging module 502 is that the data is program data of a preset type, the data is isolated by the isolation module 503 so that the data cannot be started or called. The isolation of the data by the isolation module 503 may be, but not limited to: isolation of the data based on modification of the data itself, or isolation of the data by an external environment. Among them, the modification of the data itself, such as: converting the format of the data, modifying the suffix name of the data, compressing and encrypting the data, disabling access to the data, and so on. Isolate data through the external environment, for example: store the data in a specific storage area.

本实施例未尽之细节,请参阅前述图1至图3所示实施例的描述,此处不再赘述。For details not covered in this embodiment, please refer to the description of the embodiment shown in FIGS. 1 to 3 above, and details will not be repeated here.

需要说明的是,以上图4示例的移动终端的实施方式中,各功能模块的划分仅是举例说明,实际应用中可以根据需要,例如相应硬件的配置要求或者软件的实现的便利考虑,而将上述功能分配由不同的功能模块完成,即将移动终端的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。而且,实际应用中,本实施例中的相应的功能模块可以是由相应的硬件实现,也可以由相应的硬件执行相应的软件完成。本说明书提供的各个实施例都可应用上述描述原则,以下不再赘述。It should be noted that, in the implementation of the mobile terminal illustrated in FIG. 4 above, the division of each functional module is only an example. In actual applications, it can be considered according to needs, such as the configuration requirements of corresponding hardware or the convenience of software implementation. The above function allocation is accomplished by different function modules, that is, the internal structure of the mobile terminal is divided into different function modules, so as to complete all or part of the functions described above. Moreover, in practical applications, the corresponding functional modules in this embodiment may be implemented by corresponding hardware, or may be completed by corresponding hardware executing corresponding software. Each of the embodiments provided in this specification can apply the above-mentioned description principle, which will not be described in detail below.

本发明实施例中,通过在安全充电模式下,当接收到外部设备通过充电线发送的数据时,若该数据为预设类型的程序数据,则将该数据隔离,以使得该数据无法启动或被调用,可以有效防止终端在充电时因被植入木马或恶意程序而导致信息泄露,保证充电时用户信息的安全。In the embodiment of the present invention, in the safe charging mode, when the data sent by the external device through the charging cable is received, if the data is a preset type of program data, the data is isolated so that the data cannot be started or It can effectively prevent information leakage caused by implanting Trojan horses or malicious programs when the terminal is charging, and ensure the security of user information during charging.

请参阅图5,本发明另一实施例提供的移动终端的结构示意图,为了便于说明,仅示出了与本发明实施例相关的部分。图5示例的移动终端可以是前述图2或图3所示实施例提供的保护数据安全的方法的执行主体。图5示例的移动终端,与图4所示实施例中的移动终端的不同之处主要在于:Please refer to FIG. 5 , which is a schematic structural diagram of a mobile terminal provided by another embodiment of the present invention. For ease of description, only parts related to the embodiment of the present invention are shown. The mobile terminal illustrated in FIG. 5 may be the execution subject of the method for protecting data security provided by the embodiment shown in FIG. 2 or FIG. 3 . The mobile terminal illustrated in FIG. 5 differs from the mobile terminal in the embodiment shown in FIG. 4 mainly in that:

进一步的,隔离模块503包括:Further, the isolation module 503 includes:

存储模块5031,用于将该数据存储在预设存储区域;A storage module 5031, configured to store the data in a preset storage area;

设置模块5032,用于将该预设存储区域设置为非指定进程不可访问;A setting module 5032, configured to set the preset storage area to be inaccessible to non-designated processes;

转换模块5033,用于将该数据转换为预设格式的数据文件。A conversion module 5033, configured to convert the data into a data file in a preset format.

进一步的,该移动终端还包括:Further, the mobile terminal also includes:

生成模块601,用于当监听到充电线拔出事件或触发退出安全充电模式事件时,生成安全充电期间接收的所有预设类型的程序数据的描述信息并输出;The generating module 601 is configured to generate and output description information of all preset types of program data received during safe charging when an event of pulling out the charging cable is detected or an event of exiting the safe charging mode is triggered;

处理模块602,用于当监听到触发数据恢复事件时,恢复该所有预设类型的程序数据中该触发数据恢复事件指向的目标数据,并删除该所有预设类型的程序数据中除该目标数据之外的其他数据。The processing module 602 is configured to restore the target data pointed to by the trigger data recovery event in all preset types of program data when a trigger data recovery event is detected, and delete all preset types of program data except the target data other data.

可选的,若判断模块502的判断结果为该数据不是预设类型的程序数据,则通过处理模块602将该数据按照常规处理逻辑进行处理。例如:将该数据存储在默认的存储目录,并执行对应的操作。Optionally, if the judging result of the judging module 502 is that the data is not a preset type of program data, the data is processed by the processing module 602 according to conventional processing logic. For example: store the data in the default storage directory and perform corresponding operations.

进一步的,控制模块501,还用于当监听到预设物理按键的按压事件时,进入该安全充电模式;Further, the control module 501 is also configured to enter the safe charging mode when a preset physical button press event is detected;

该移动终端还包括:The mobile terminal also includes:

信息提示模块603,用于当监听到外部充电线插入事件时,输出安全充电提示信息;An information prompt module 603, configured to output safe charging prompt information when an external charging line insertion event is detected;

控制模块501,还用于当监听到基于该安全充电提示信息发生的确认按钮触摸事件时,进入该安全充电模式;The control module 501 is further configured to enter the safe charging mode when a confirmation button touch event based on the safe charging prompt information is detected;

该移动终端还包括:The mobile terminal also includes:

界面输出模块604,用于当监听到触发进行安全充电设置的事件时,输出预设的安全充电设置界面;An interface output module 604, configured to output a preset safe charging setting interface when an event triggering safe charging setting is monitored;

控制模块501,还用于当监听到基于该安全充电设置界面发生的确认按钮触摸事件时,进入该安全充电模式。The control module 501 is further configured to enter the safe charging mode when a confirmation button touch event based on the safe charging setting interface is detected.

具体的,在通过事件监听器监听到外部充电线插入移动终端的数据接口的事件时,通过信息提示模块603输出安全充电提示信息,以提示用户是否进入安全充电模式。然后,通过控制模块501响应于监听到的基于该安全充电提示信息发生的确认按钮触摸事件,进入该安全充电模式。Specifically, when an event that an external charging cable is inserted into the data interface of the mobile terminal is detected through the event listener, the information prompting module 603 outputs safe charging prompt information to prompt the user whether to enter the safe charging mode. Then, the control module 501 enters the safe charging mode in response to the detected touch event of the confirmation button based on the safe charging prompt information.

具体的,还可在移动终端中预设安全充电设置功能模块。通过事件监听器监听因点击安全充电设置功能模块的快捷图标的操作或按压安全充电设置快捷物理键的操作发生的触发进行安全充电设置的事件。然后,通过界面输出模块604响应于监听到的该触发进行安全充电设置的事件,输出预设的安全充电设置界面。之后,当通过事件监听器监听到基于该安全充电设置界面发生的确认按钮触摸事件时,通过控制模块501响应于监听到的触摸事件,进入安全充电模式。Specifically, the safe charging setting function module can also be preset in the mobile terminal. The event that triggers the safe charging setting due to the operation of clicking the shortcut icon of the safe charging setting function module or pressing the shortcut physical key of the safe charging setting is monitored through the event listener. Then, the interface output module 604 outputs a preset safe charging setting interface in response to the detected event triggering safe charging setting. Afterwards, when the event listener monitors a confirmation button touch event based on the safe charging setting interface, the control module 501 enters the safe charging mode in response to the detected touch event.

本实施例未尽之细节,请参阅前述图1至图4所示实施例的描述,此处不再赘述。For the details not covered in this embodiment, please refer to the description of the embodiment shown in FIG. 1 to FIG.

本发明实施例中,通过在安全充电模式下,当接收到外部设备通过充电线发送的数据时,若该数据为预设类型的程序数据,则将该数据隔离,以使得该数据无法启动或被调用,可以有效防止终端在充电时因被植入木马或恶意程序而导致信息泄露,保证充电时用户信息的安全。In the embodiment of the present invention, in the safe charging mode, when the data sent by the external device through the charging cable is received, if the data is a preset type of program data, the data is isolated so that the data cannot be started or It can effectively prevent information leakage caused by implanting Trojan horses or malicious programs when the terminal is charging, and ensure the security of user information during charging.

在本申请所提供的多个实施例中,应该理解到,所揭露的移动终端和方法,可以通过其它的方式实现。例如,以上所描述的实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个模块或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信链接可以是通过一些接口,模块的间接耦合或通信链接,可以是电性,机械或其它的形式。In the multiple embodiments provided in this application, it should be understood that the disclosed mobile terminal and method can be implemented in other ways. For example, the above-described embodiments are only illustrative. For example, the division of the modules is only a logical function division. In actual implementation, there may be other division methods. For example, multiple modules or components can be combined or can be Integrate into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication link shown or discussed may be through some interfaces, and the indirect coupling or communication link between modules may be in electrical, mechanical or other forms.

所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。The modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, they may be located in one place, or may be distributed to multiple network modules. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.

另外,在本发明各个实施例中的各功能模块可以集成在一个处理模块中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。In addition, each functional module in each embodiment of the present invention may be integrated into one processing module, each module may exist separately physically, or two or more modules may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules.

需要说明的是,对于前述的各方法实施例,为了简便描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其它顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定都是本发明所必须的。It should be noted that, for the sake of simplicity of description, the aforementioned method embodiments are expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the described action sequence. Because of the present invention, certain steps may be performed in other orders or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification belong to preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.

在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其它实施例的相关描述。In the foregoing embodiments, the descriptions of each embodiment have their own emphases, and for parts not described in detail in a certain embodiment, reference may be made to relevant descriptions of other embodiments.

以上为对本发明所提供的保护数据安全的方法、移动终端及计算机可读存储介质的描述,对于本领域的一般技术人员,依据本发明实施例的思想,在具体实施方式及应用范围上均会有改变之处,综上,本说明书内容不应理解为对本发明的限制。The above is the description of the method for protecting data security provided by the present invention, the mobile terminal and the computer-readable storage medium. For those of ordinary skill in the art, based on the ideas of the embodiments of the present invention, they will understand both the specific implementation and the application scope. There are changes, and in summary, the contents of this specification should not be construed as limiting the present invention.

Claims (12)

1.一种保护数据安全的方法,应用于为移动终端进行充电时,其特征在于,所述方法包括:1. A method for protecting data security, when applied to charging a mobile terminal, is characterized in that the method comprises: 当监听到触发进入安全充电模式的事件时,进入所述安全充电模式;Entering the safe charging mode when an event triggering entry into the safe charging mode is detected; 在所述安全充电模式下,当接收到外部设备通过充电线发送的数据时,判断所述数据是否为预设类型的程序数据;In the safe charging mode, when receiving data sent by the external device through the charging cable, judging whether the data is program data of a preset type; 若所述数据为预设类型的程序数据,则将所述数据隔离,以使得所述数据无法启动或被调用。If the data is program data of a preset type, the data is isolated so that the data cannot be started or called. 2.如权利要求1所述的保护数据安全的方法,其特征在于,所述将所述数据隔离,包括:2. The method for protecting data security according to claim 1, wherein said isolating said data comprises: 将所述数据存储在预设存储区域,并将所述预设存储区域设置为非指定进程不可访问;或者storing the data in a preset storage area, and setting the preset storage area to be inaccessible to non-designated processes; or 将所述数据转换为预设格式的数据文件。Convert the data into a data file in a preset format. 3.如权利要1或2所述的保护数据安全的方法,其特征在于,所述若所述数据为预设类型的程序数据,则将所述数据隔离,以使得所述数据无法启动或被调用之后,包括:3. The method for protecting data security according to claim 1 or 2, wherein if the data is program data of a preset type, the data is isolated so that the data cannot be started or After being called, include: 当监听到充电线拔出事件或触发退出安全充电模式事件时,生成安全充电期间接收的所有预设类型的程序数据的描述信息并输出;When the event of pulling out the charging line is detected or the event of exiting the safe charging mode is triggered, the description information of all preset types of program data received during safe charging is generated and output; 当监听到触发数据恢复事件时,恢复所述所有预设类型的程序数据中所述触发数据恢复事件指向的目标数据,并删除所述所有预设类型的程序数据中除所述目标数据之外的其他数据。When the trigger data recovery event is detected, recover the target data pointed to by the trigger data recovery event in all the preset types of program data, and delete all the preset types of program data except the target data other data. 4.如权利要求1所述的保护数据安全的方法,其特征在于,所述当监听到触发进入安全充电模式的事件时,进入所述安全充电模式包括:4. The method for protecting data security according to claim 1, wherein when an event triggering entry into the safe charging mode is detected, entering the safe charging mode comprises: 当监听到预设物理按键的按压事件时,进入所述安全充电模式。When a press event of a preset physical button is detected, the safe charging mode is entered. 5.如权利要求1所述的保护数据安全的方法,其特征在于,所述当监听到触发进入安全充电模式的事件时,进入所述安全充电模式之前包括:5. The method for protecting data security according to claim 1, wherein when an event triggering entry into the safe charging mode is detected, before entering the safe charging mode includes: 当监听到外部充电线插入事件时,输出安全充电提示信息;When an external charging line insertion event is detected, a safe charging prompt message is output; 所述当监听到触发进入安全充电模式的事件时,进入所述安全充电模式包括:The entering into the safe charging mode when the event triggering the safe charging mode is detected includes: 当监听到基于所述安全充电提示信息发生的确认按钮触摸事件时,进入所述安全充电模式。When a confirmation button touch event based on the safe charging prompt information is detected, the safe charging mode is entered. 6.如权利要求1所述的保护数据安全的方法,其特征在于,所述当监听到触发进入安全充电模式的事件时,进入所述安全充电模式之前包括:6. The method for protecting data security according to claim 1, wherein when the event triggering entering the safe charging mode is detected, before entering the safe charging mode includes: 当监听到触发进行安全充电设置的事件时,输出预设的安全充电设置界面;When an event triggering safe charging setting is detected, a preset safe charging setting interface is output; 所述当监听到触发进入安全充电模式的事件时,进入所述安全充电模式包括:The entering into the safe charging mode when the event triggering the safe charging mode is detected includes: 当监听到基于所述安全充电设置界面发生的确认按钮触摸事件时,进入所述安全充电模式。When a confirmation button touch event based on the safe charging setting interface is detected, the safe charging mode is entered. 7.一种移动终端,其特征在于,包括:7. A mobile terminal, characterized in that, comprising: 控制模块,用于当监听到触发进入安全充电模式的事件时,进入所述安全充电模式;A control module, configured to enter the safe charging mode when an event triggering entry into the safe charging mode is monitored; 判断模块,用于在所述安全充电模式下,当接收到外部设备通过充电线发送的数据时,判断所述数据是否为预设类型的程序数据;A judging module, configured to judge whether the data is program data of a preset type when receiving data sent by an external device through a charging cable in the safe charging mode; 隔离模块,用于若所述判断模块的判断结果为所述数据为预设类型的程序数据,则将所述数据隔离,以使得所述数据无法启动或被调用。The isolation module is configured to isolate the data if the determination result of the determination module is that the data is a preset type of program data, so that the data cannot be started or called. 8.如权利要求7所述的移动终端,其特征在于,所述隔离模块包括:8. The mobile terminal according to claim 7, wherein the isolation module comprises: 存储模块,用于将所述数据存储在预设存储区域;a storage module, configured to store the data in a preset storage area; 设置模块,用于将所述预设存储区域设置为非指定进程不可访问;A setting module, configured to set the preset storage area to be inaccessible to non-specified processes; 转换模块,用于将所述数据转换为预设格式的数据文件。The conversion module is used to convert the data into a data file in a preset format. 9.如权利要8所述的移动终端,其特征在于,所述移动终端还包括:9. The mobile terminal according to claim 8, further comprising: 生成模块,用于当监听到充电线拔出事件或触发退出安全充电模式事件时,生成安全充电期间接收的所有预设类型的程序数据的描述信息并输出;The generation module is used to generate and output description information of all preset types of program data received during safe charging when the event of pulling out the charging cable is detected or the event of exiting the safe charging mode is triggered; 处理模块,用于当监听到触发数据恢复事件时,恢复所述所有预设类型的程序数据中所述触发数据恢复事件指向的目标数据,并删除所述所有预设类型的程序数据中除所述目标数据之外的其他数据。The processing module is configured to restore the target data pointed to by the trigger data recovery event in all the preset types of program data when the trigger data recovery event is detected, and delete all the preset types of program data except all Data other than the target data described above. 10.如权利要求7至9中的任一项所述的移动终端,其特征在于,10. The mobile terminal according to any one of claims 7 to 9, characterized in that, 所述控制模块,还用于当监听到预设物理按键的按压事件时,进入所述安全充电模式;The control module is further configured to enter the safe charging mode when a preset physical button press event is detected; 所述移动终端还包括:The mobile terminal also includes: 信息提示模块,用于当监听到外部充电线插入事件时,输出安全充电提示信息;The information prompt module is used to output safe charging prompt information when an external charging line insertion event is monitored; 所述控制模块,还用于当监听到基于所述安全充电提示信息发生的确认按钮触摸事件时,进入所述安全充电模式;The control module is further configured to enter the safe charging mode when a confirmation button touch event based on the safe charging prompt information is heard; 所述移动终端还包括:The mobile terminal also includes: 界面输出模块,用于当监听到触发进行安全充电设置的事件时,输出预设的安全充电设置界面;An interface output module, configured to output a preset safe charging setting interface when an event triggering safe charging setting is monitored; 所述控制模块,还用于当监听到基于所述安全充电设置界面发生的确认按钮触摸事件时,进入所述安全充电模式。The control module is further configured to enter the safe charging mode when a confirmation button touch event based on the safe charging setting interface is detected. 11.一种移动终端,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时,实现如权利要求1至6中的任一项所述的保护数据安全的方法。11. A mobile terminal, comprising: a memory, a processor, and a computer program stored on the memory and operable on the processor, characterized in that, when the processor executes the computer program, the following The method for protecting data security according to any one of claims 1 to 6. 12.一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时,实现如权利要求1至6中的任一项所述的保护数据安全的方法。12. A computer-readable storage medium, on which a computer program is stored, wherein when the computer program is executed by a processor, the data security protection method according to any one of claims 1 to 6 is realized. method.
CN201710590548.XA 2017-07-19 2017-07-19 Data security protection method, mobile terminal and computer-readable storage medium Active CN107392066B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710590548.XA CN107392066B (en) 2017-07-19 2017-07-19 Data security protection method, mobile terminal and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710590548.XA CN107392066B (en) 2017-07-19 2017-07-19 Data security protection method, mobile terminal and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN107392066A true CN107392066A (en) 2017-11-24
CN107392066B CN107392066B (en) 2020-12-01

Family

ID=60335756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710590548.XA Active CN107392066B (en) 2017-07-19 2017-07-19 Data security protection method, mobile terminal and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN107392066B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111311830A (en) * 2020-01-21 2020-06-19 上海纪烨物联网科技有限公司 Intelligent management method and system for shared charger
CN112579484A (en) * 2019-09-29 2021-03-30 北京声智科技有限公司 Power-down state protection method and device for intelligent sound box and main board power supply circuit

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060117664A (en) * 2005-05-13 2006-11-17 주식회사 팬택 Booting method of mobile communication terminal and device thereof
CN102117251A (en) * 2009-12-31 2011-07-06 比亚迪股份有限公司 Method for selecting application mode of universal serial bus (USB) equipment and USB equipment
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103546289A (en) * 2013-09-29 2014-01-29 北京握奇智能科技有限公司 USB (universal serial bus) Key based secure data transmission method and system
CN104200172A (en) * 2014-08-29 2014-12-10 公安部第一研究所 Safe leading-in device, system and method for USB data
CN105550568A (en) * 2015-12-25 2016-05-04 小米科技有限责任公司 Mobile terminal data protection method and apparatus
CN106874232A (en) * 2015-12-14 2017-06-20 中兴通讯股份有限公司 The charging method of general-purpose serial bus USB, device and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060117664A (en) * 2005-05-13 2006-11-17 주식회사 팬택 Booting method of mobile communication terminal and device thereof
CN102117251A (en) * 2009-12-31 2011-07-06 比亚迪股份有限公司 Method for selecting application mode of universal serial bus (USB) equipment and USB equipment
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103546289A (en) * 2013-09-29 2014-01-29 北京握奇智能科技有限公司 USB (universal serial bus) Key based secure data transmission method and system
CN104200172A (en) * 2014-08-29 2014-12-10 公安部第一研究所 Safe leading-in device, system and method for USB data
CN106874232A (en) * 2015-12-14 2017-06-20 中兴通讯股份有限公司 The charging method of general-purpose serial bus USB, device and terminal
CN105550568A (en) * 2015-12-25 2016-05-04 小米科技有限责任公司 Mobile terminal data protection method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579484A (en) * 2019-09-29 2021-03-30 北京声智科技有限公司 Power-down state protection method and device for intelligent sound box and main board power supply circuit
CN111311830A (en) * 2020-01-21 2020-06-19 上海纪烨物联网科技有限公司 Intelligent management method and system for shared charger
CN111311830B (en) * 2020-01-21 2021-11-16 上海纪烨物联网科技有限公司 Intelligent management method and system for shared charger

Also Published As

Publication number Publication date
CN107392066B (en) 2020-12-01

Similar Documents

Publication Publication Date Title
EP3249568B1 (en) Method and apparatus for displaying application and picture, and electronic device
US8595321B2 (en) Supporting system for remote control
KR101198271B1 (en) Display management method for computer controled mobile telephone
EP3160150A1 (en) Electronic device and method for executing function using speech recognition thereof
CN106778175B (en) Interface locking method and device and terminal equipment
CN103019599B (en) Electronic equipment and unlocking screen method thereof
WO2018107396A1 (en) Fingerprint recognition method and terminal device
CN106203035A (en) A data access control method and mobile terminal
CN103034414A (en) Electronic equipment and screen unlocking method thereof
WO2016197337A1 (en) Short message processing method and apparatus, and electronic device
CN106416170A (en) Screen sharing method, sharing device and receiving device
WO2018049934A1 (en) Data migration method and terminals
CN108090345B (en) Linux system external command execution method and device
CN103812996B (en) A kind of information cuing method, device and terminal
WO2014012361A1 (en) Method and device for creating control interface for external device
CN107392066B (en) Data security protection method, mobile terminal and computer-readable storage medium
US10402083B2 (en) Fingerprint event processing method, apparatus, and terminal
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
CN115633021A (en) Remote debugging method and device for terminal equipment
CN106407779A (en) An information acquisition method, device and terminal
CN107392035B (en) Method for protecting data security, mobile terminal and computer readable storage medium
CN107437032B (en) Charging method, mobile terminal and computer-readable storage medium
CN106874738B (en) Response method for touch operation and mobile terminal
WO2020057202A1 (en) Game running method and related product
CN104767882A (en) Terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant