CN107480545B - Data protection method and electronic equipment - Google Patents

Data protection method and electronic equipment Download PDF

Info

Publication number
CN107480545B
CN107480545B CN201710680655.1A CN201710680655A CN107480545B CN 107480545 B CN107480545 B CN 107480545B CN 201710680655 A CN201710680655 A CN 201710680655A CN 107480545 B CN107480545 B CN 107480545B
Authority
CN
China
Prior art keywords
memory
state
information
configuration information
preset verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710680655.1A
Other languages
Chinese (zh)
Other versions
CN107480545A (en
Inventor
廉磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lianbao Information Technology Co Ltd
Original Assignee
Hefei Lianbao Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lianbao Information Technology Co Ltd filed Critical Hefei Lianbao Information Technology Co Ltd
Priority to CN201710680655.1A priority Critical patent/CN107480545B/en
Publication of CN107480545A publication Critical patent/CN107480545A/en
Application granted granted Critical
Publication of CN107480545B publication Critical patent/CN107480545B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
  • Power Sources (AREA)

Abstract

The invention provides a data protection method and an electronic device, wherein the electronic device comprises a first memory and a second memory, only the first memory stores system data, and the method comprises the following steps: judging whether first preset verification information for connecting the second memory is set or not; if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory; and if the first preset verification information is not set, switching on the second memory. The invention has the characteristics of simplicity, convenience and high safety.

Description

Data protection method and electronic equipment
Technical Field
The embodiment of the invention relates to the technical field of data protection, in particular to a data protection method and electronic equipment.
Background
With the development and popularization of computer technology, people move and store more personal information, business data of companies and other information into a computer. This contains a lot of sensitive information of the individual as well as information of the business confidentiality. In order to ensure that privacy information and confidentiality information are not leaked, in addition to installing antivirus software in the system to prevent data from being infected and stolen by hackers, encryption processing is also carried out on the data, so that the safety and the concealment of the data are ensured. The current major encryption method is as follows:
(1) encrypting the file through a certain algorithm;
(2) through a certain technology, the area in the file or the hard disk is hidden, and the file or the hard disk is prevented from being discovered by others.
In the two methods, for the encryption method by a certain algorithm: both the encryption and decryption of the file take time, which affects the user experience, and the usability of the PC is also reduced during the encryption and decryption. And the more secure the encryption, the more complex the algorithm, and the more complex the algorithm, the longer the encryption and decryption will take. And the file can be acquired and cracked in a safe encryption mode.
For the files hidden in the hard disk, or the blocks hidden in the hard disk through software, the files or the hard disk are still hung under the system, and the way is also easy to be obtained and cracked by hackers.
Disclosure of Invention
The embodiment of the invention provides a simple and convenient data protection method with higher safety and electronic equipment.
In order to solve the above technical problem, an embodiment of the present invention provides the following technical solutions:
a data protection method applied in an electronic device including a first memory and a second memory, wherein only the first memory stores system data, and the method comprising:
judging whether first preset verification information for connecting the second memory is set or not;
if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory;
and if the first preset verification information is not set, switching on the second memory.
Wherein the method further comprises:
when a starting program of the electronic equipment is executed, reading starting configuration information of the second memory from the first memory;
and selectively switching on or switching off the second memory according to the first state in the starting configuration information.
Wherein the method further comprises generating the first state comprising:
receiving first configuration information which is input by a user and related to a second memory, wherein the first configuration information comprises a first state of the second memory when a starting program is executed;
and storing the first configuration information into the starting configuration information of the first memory.
Wherein the method further comprises:
judging whether second preset verification information for disconnecting the second memory is received or not;
if so, the second memory is disconnected.
Wherein, when the second preset verification information is judged to be received,
acquiring selection information whether to save the current access state of the second memory as a first state;
performing a disconnection operation of the second memory based on the selection information;
wherein the performing of the disconnection operation of the second memory based on the selection information includes:
when the selection information comprises the current access state of the second memory is stored as the first state, the access state of the second memory is stored as the first state into the starting configuration information of the first memory, and the second memory is disconnected;
directly disconnecting the second memory when the selection information includes not saving the current access state of the second memory.
Wherein, before the obtaining the selection information of whether the current access state of the second memory is stored as the first state or not, the method further comprises judging whether a shutdown instruction is received or not at present,
if so, executing selection information for acquiring whether the current access state of the second memory is stored as the first state;
otherwise, the second memory is disconnected when the second memory is judged not to be read or written.
Wherein said turning on the second memory comprises powering on the second memory; the disconnecting the second memory includes powering down the second memory.
An embodiment of the present invention further provides an electronic device, which applies the data protection method described above, and includes: the first memory and the second memory, and
a controller configured to determine whether first preset authentication information for turning on the second memory is set; if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory;
and if the first preset verification information is not set, switching on the second memory.
The controller is further configured to read the boot configuration information about the second memory from the first memory when executing a boot program of the electronic device;
and selectively switching on or switching off the second memory according to the first state in the starting configuration information.
The controller is further configured to receive first configuration information about the second memory, which is input by a user, wherein the first configuration information comprises a first state of the second memory when a boot program is executed; and storing the first configuration information into the starting configuration information of the first memory.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
the embodiment of the invention separates the memory from the system in a way of electrically disconnecting the hardware, thus completing the thorough protection of the data, not only protecting the data thoroughly, but also reducing the service time of the hard disk; meanwhile, the security is higher, and a hacker cannot acquire the data through a network; in addition, the problem of data encryption and decryption does not exist, so that the time of the system for processing the data is reduced, and the user experience is improved.
Drawings
FIG. 1 is a schematic flow chart of a data protection method in an embodiment of the invention;
FIG. 2 is a schematic flow chart of a data protection method in another embodiment of the present invention;
FIG. 3 is a schematic flow chart of a method for turning off the second memory according to an embodiment of the present invention;
FIG. 4 is a schematic flow chart of a method for turning off the second memory according to another embodiment of the present invention.
Fig. 5 is a schematic configuration diagram of an electronic apparatus in the embodiment of the present invention.
Detailed Description
The following detailed description of specific embodiments of the present invention is provided in connection with the accompanying drawings, which are not intended to limit the invention.
It will be understood that various modifications may be made to the embodiments disclosed herein. Accordingly, the foregoing description should not be construed as limiting, but merely as exemplifications of embodiments. Other modifications will occur to those skilled in the art within the scope and spirit of the disclosure.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and, together with a general description of the disclosure given above, and the detailed description of the embodiments given below, serve to explain the principles of the disclosure.
These and other characteristics of the invention will become apparent from the following description of a preferred form of embodiment, given as a non-limiting example, with reference to the accompanying drawings.
It should also be understood that, although the invention has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of the invention, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present disclosure will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present disclosure are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely examples of the disclosure that may be embodied in various forms. Well-known and/or repeated functions and structures have not been described in detail so as not to obscure the present disclosure with unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the disclosure.
In the following, embodiments of the present invention are described in detail with reference to the accompanying drawings, and embodiments of the present invention provide a data protection method, where non-system data is protected by setting verification information for a memory of a non-system disk, and based on a hot-plug technology for the non-system disk, a hard disk is detached from a system side (i.e., the device cannot be found under the system), so as to perform data protection.
Specifically, fig. 1 is a schematic flow chart illustrating a data protection method according to an embodiment of the present invention, which may be applied to, for example, a mobile phone, a computer, and an electronic device having a plurality of storage devices. The electronic device may include at least a first memory and a second memory, wherein only the first memory is used for storing system data, and in the embodiment of the present invention, an authentication password or a hot key is not provided for the first memory, so that the electronic device can operate normally. The second memory can store the data to be saved by the user or the data with higher confidentiality.
Based on the above, the data protection method in the embodiment of the present invention may include:
judging whether first preset verification information for connecting the second memory is set or not;
if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory;
and if the first preset verification information is not set, switching on the second memory.
The controller in the electronic device may control power-on operations of the first memory and the second memory, and when the first memory and the second memory are powered on, it indicates that the first memory and the second memory are turned on, at this time, a user may query the first memory and the second memory in the electronic device and can read and write data in the memories, and when the first memory and the second memory are powered off, the first memory and the second memory are turned off. At this time, the user cannot inquire the corresponding memory, and thus cannot inquire the data in the memory. Therefore, in the embodiment of the present invention, the data protection in the memory may be performed by controlling the power-on of the memory by the controller.
Specifically, the user may set first preset verification information for the second memory to be protected in advance, where the first preset verification information is used to enable the controller to switch on the second memory, that is, to power on the second memory. The controller can judge whether first preset verification information for connecting the second memory is set after the controller enters an operating system or when the controller is started; if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory; and if the first preset verification information is not set, switching on the second memory.
That is to say, when a user needs to operate the second memory, the user can select to switch on the second memory by inputting the first preset authentication information, or the user can switch off the second memory to make the second memory invisible when the second memory needs to be hidden, and at this time, because the second memory is not accessed to the system, other users cannot access and cannot steal data, the security is higher.
Moreover, when the controller verifies that the first preset verification information for the second memory is not set, the second memory can be directly connected, at this time, the data in the second memory does not need to be kept secret, the data can be directly accessed into the system, and the user can directly perform corresponding operation.
The first preset verification information may be verification information such as a hot key, a password, a fingerprint, an iris, and an audio configured in advance, and may be stored in the controller, or in a memory accessible by other controllers, so that the controller may conveniently verify the input of the first preset verification information and perform corresponding operations.
In addition, as shown in fig. 2, a schematic flow chart of a data protection method in another embodiment of the present invention is shown, where, with respect to the embodiment of fig. 1, the data protection method in the embodiment of the present invention may further include:
when a starting program of the electronic equipment is executed, reading starting configuration information of the second memory from the first memory;
and selectively switching on or switching off the second memory according to the first state in the starting configuration information.
By the configuration, the second memory can be configured according to the pre-stored configuration information about the second memory when the startup operation is executed, that is, the startup configuration information about the second memory is read from the first memory when the startup program of the electronic device is executed. The boot configuration information may include a first state preconfigured for the second memory, where the first state may include turning on or off, and the second memory may be selectively turned on or off according to the first state in the boot configuration information when the boot program is executed.
The first state may be state information configured in advance by a user, or may be an access state of the second memory when the computer is turned off last time. Specifically, the process of generating the first state in the embodiment of the present invention may include:
receiving first configuration information which is input by a user and related to a second memory, wherein the first configuration information comprises a first state of the second memory when a starting program is executed;
and storing the first configuration information into the starting configuration information of the first memory.
Through the configuration process, the first configuration information of the second memory, which is configured in advance by the user, can be stored as the first state and is added into the starting configuration information of the first memory, so that corresponding configuration is carried out when the starting program is executed.
In addition, in the embodiment of the present invention as shown in fig. 3, the turning off the second memory in real time may specifically include:
judging whether second preset verification information for disconnecting the second memory is received or not;
if so, the second memory is disconnected, otherwise, the current state of the second memory is maintained.
The configuration of the first preset verification information is the same as that of the second preset verification information, and the user may set the second preset verification information for the second memory to be protected in advance, where the second preset verification information is used to enable the controller to turn off the second memory, that is, to turn off the power of the second memory. The controller can judge whether second preset verification information for disconnecting the second memory is received or not after the controller enters an operating system or when the controller is started; if yes, disconnecting the second memory; otherwise, the current state of the second memory is maintained.
That is to say, the user may select to disconnect the second storage by inputting the second preset authentication information when the user does not need to operate the second storage or wants to protect the data in the second storage, and at this time, because the second storage is not accessed to the system, other users cannot access and cannot steal the data, and the security is higher. And when the second memory is needed to be used, the second memory can be selected to be switched on, so that the use of a user is facilitated.
Further, in the embodiment of the present invention as shown in fig. 4, upon determining that the second preset authentication information is received,
acquiring selection information whether to save the current access state of the second memory as a first state;
performing a disconnection operation of the second memory based on the selection information;
wherein the performing of the disconnection operation of the second memory based on the selection information includes:
when the selection information comprises the current access state of the second memory is stored as the first state, the access state of the second memory is stored as the first state into the starting configuration information of the first memory, and the second memory is disconnected;
directly disconnecting the second memory when the selection information includes not saving the current access state of the second memory.
That is, when the second preset authentication information is received, whether to save the access state of the second memory to the first state may be performed, so that the second memory may be directly turned on or off at the next boot. That is to say, the second preset verification information in the embodiment of the present invention may be used to disconnect the second memory, and may also be used to store the current state of the second memory as the first state, so as to facilitate configuration of the second memory when the computer is started next time.
Further, in the embodiment of the present invention, before the obtaining the selection information of whether to save the current access state of the second memory to the first state, it is further included to determine whether a shutdown instruction is currently received,
if so, executing selection information for acquiring whether the current access state of the second memory is stored as the first state;
otherwise, the second memory is disconnected when the second memory is judged not to be read or written.
That is to say, when receiving an instruction to disconnect the second preset verification information of the second memory, it may also be determined whether a shutdown instruction is received at this time, and if the shutdown instruction is received, a selection operation to save the first state is performed, otherwise, the second memory is directly disconnected.
Or, in another embodiment of the present invention, when a shutdown instruction is received, the selection information of whether to save the current access state of the second memory to the first state may also be directly executed;
if yes, the current state is saved as the first state, shutdown operation is executed, and otherwise, the shutdown operation is directly executed.
Therefore, the startup configuration information of the second memory can be conveniently acquired when the computer is started next time, and the operation is correspondingly executed.
In summary, in the embodiment of the present invention, the memory is electrically disconnected from the system in a manner of electrically disconnecting the hardware, so as to complete the thorough protection of the data, thereby not only completely protecting the data, but also reducing the service time of the hard disk; meanwhile, the security is higher, and a hacker cannot acquire the data through a network; in addition, the problem of data encryption and decryption does not exist, so that the time of the system for processing the data is reduced, and the user experience is improved.
In addition, an embodiment of the present invention further provides an electronic device, where the electronic device may apply the data protection method described in the foregoing embodiment, and the electronic device includes: a first memory 1 and a second memory 2, and a controller 3.
The electronic device in the embodiment of the present invention may include an electronic device having a plurality of storage devices, such as a mobile phone, a computer, and the like. The electronic device may comprise a first memory 1 and a second memory 2 and at least one second memory 2. Only the first memory 1 is used for storing system data, and in the embodiment of the present invention, an authentication password or a hot key is not provided for the first memory 1, so that the electronic device can operate normally. The second memory 2 can store data to be saved by the user or data with higher security, and can be provided with an authentication password or a hot key.
The controller 3 in the electronic device may control power-on operations of the first memory 1 and the second memory 2, and when the first memory 1 and the second memory 2 are powered on, it indicates that the first memory 1 and the second memory 2 are turned on, at this time, a user may query the first memory 1 and the second memory 2 in the electronic device and can read and write data in the memories, and when the first memory 1 and the second memory 2 are powered off, the first memory 1 and the second memory 2 are turned off. At this time, the user cannot inquire the corresponding memory, and thus cannot inquire the data in the memory. Therefore, in the embodiment of the present invention, the data protection in the memory can be performed by controlling the power-on of the memory by the controller 3.
Specifically, the user may set first preset verification information for the second memory 2 to be protected in advance, where the first preset verification information is used to enable the controller to switch on the second memory, that is, to power on the second memory. The controller can judge whether first preset verification information for connecting the second memory is set after the controller enters an operating system or when the controller is started; if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory; and if the first preset verification information is not set, switching on the second memory.
That is to say, when a user needs to operate the second memory 2, the user may select to turn on the second memory 2 by inputting the first preset authentication information, or may turn off the second memory 2 to make it invisible when the second memory 2 needs to be hidden, at this time, because the second memory 2 is not accessed to the system, other users cannot access and cannot steal data, and the security is higher.
Moreover, the controller 3 may determine whether or not first preset authentication information for turning on the second memory is set; if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory; and if the first preset verification information is not set, the second memory is connected for verification.
That is to say, when a user needs to operate the second memory 2, the user can select to turn on the second memory 2 by inputting the first preset authentication information, or the user can turn off the second memory to make it invisible when the second memory needs to be hidden, and at this time, because the second memory is not accessed to the system, other users cannot access and cannot steal data, the security is higher.
Moreover, when the controller 3 verifies that the first preset verification information for the second memory is not set, the second memory can be directly connected, at this time, it can be considered that the data in the second memory does not need to be kept secret, the data can be directly accessed into the system, and the user can directly perform corresponding operations.
The first preset verification information may be verification information such as a preset hot key, a password, a fingerprint, an iris, an audio and the like, and may be stored in the controller, or in a memory accessible by other controllers, so that the controller may conveniently verify the input of the first preset verification information and correspondingly perform the operation,
Further, when executing a boot program of the electronic device, the controller 3 may also read boot configuration information about the second memory 2 from the first memory 1; and selectively switches on or off the second memory 2 according to the first state in the power-on configuration information.
By the configuration, the second memory can be configured according to the pre-stored configuration information about the second memory when the startup operation is executed, that is, the startup configuration information about the second memory is read from the first memory when the startup program of the electronic device is executed. The boot configuration information may include a first state preconfigured for the second memory, where the first state may include turning on or off, and the second memory may be selectively turned on or off according to the first state in the boot configuration information when the boot program is executed.
The first state may be state information configured in advance by a user, or may be an access state of the second memory when the computer is turned off last time.
Specifically, the process of generating the first state in the embodiment of the present invention may include:
the controller 3 receives first configuration information which is input by a user and related to the second memory, wherein the first configuration information comprises a first state of the second memory when a starting program is executed; and storing the first configuration information into the starting configuration information of the first memory.
Through the configuration process, the first configuration information of the second memory, which is configured in advance by the user, can be stored as the first state and is added into the starting configuration information of the first memory, so that corresponding configuration is carried out when the starting program is executed.
In addition, in another embodiment of the present invention, the turning off the second memory by the controller 3 in real time may specifically include:
the controller 3 judges whether second preset verification information for disconnecting the second memory is received or not; if so, the second memory is disconnected, otherwise, the current state of the second memory is maintained. The configuration of the first preset verification information is the same as that of the second preset verification information, and the user may set the second preset verification information for the second memory to be protected in advance, where the second preset verification information is used to enable the controller to turn off the second memory, that is, to turn off the power of the second memory. The controller can judge whether second preset verification information for disconnecting the second memory is received or not after the controller enters an operating system or when the controller is started; if yes, disconnecting the second memory; otherwise, the current state of the second memory is maintained.
That is to say, the user may select to disconnect the second storage by inputting the second preset authentication information when the user does not need to operate the second storage or wants to protect the data in the second storage, and at this time, because the second storage is not accessed to the system, other users cannot access and cannot steal the data, and the security is higher. And when the second memory is needed to be used, the second memory can be selected to be switched on, so that the use of a user is facilitated.
Further, when the controller 3 determines that the second preset verification information is received, it may further obtain selection information indicating whether to save the current access state of the second memory as the first state; performing a disconnection operation of the second memory based on the selection information; wherein the performing of the disconnection operation of the second memory based on the selection information includes: when the selection information comprises the current access state of the second memory is stored as the first state, the access state of the second memory is stored as the first state into the starting configuration information of the first memory, and the second memory is disconnected; directly disconnecting the second memory when the selection information includes not saving the current access state of the second memory.
That is, when the second preset authentication information is received, whether to save the access state of the second memory to the first state may be performed, so that the second memory may be directly turned on or off at the next boot. That is to say, the second preset verification information in the embodiment of the present invention may be used to disconnect the second memory, and may also be used to store the current state of the second memory as the first state, so as to facilitate configuration of the second memory when the computer is started next time.
Further, in the embodiment of the present invention, before the obtaining the selection information of whether to save the current access state of the second memory to the first state, it is further included to determine whether a shutdown instruction is currently received,
if so, executing selection information for acquiring whether the current access state of the second memory is stored as the first state;
otherwise, the second memory is disconnected when the second memory is judged not to be read or written.
That is to say, when receiving an instruction to disconnect the second preset verification information of the second memory, it may also be determined whether a shutdown instruction is received at this time, and if the shutdown instruction is received, a selection operation to save the first state is performed, otherwise, the second memory is directly disconnected.
Or, in another embodiment of the present invention, when a shutdown instruction is received, the selection information of whether to save the current access state of the second memory to the first state may also be directly executed;
if yes, the current state is saved as the first state, shutdown operation is executed, and otherwise, the shutdown operation is directly executed.
Therefore, the startup configuration information of the second memory can be conveniently acquired when the computer is started next time, and the operation is correspondingly executed.
It should be noted that, in the embodiment of the present invention, the controller 3 may receive the first preset verification information or the second preset verification information by being connected to an input/output module of the electronic device, where the input/output device may include an electronic device such as a keyboard, a mouse, a touch display screen, a touch panel, an audio receiver, and a camera, and a user may input the verification information through the input/output device, and the controller 3 may receive the input information of the user by being connected to the input/output device, and execute a corresponding operation when the verification is passed.
In summary, in the embodiment of the present invention, the memory is electrically disconnected from the system in a manner of electrically disconnecting the hardware, so as to complete the thorough protection of the data, thereby not only completely protecting the data, but also reducing the service time of the hard disk; meanwhile, the security is higher, and a hacker cannot acquire the data through a network; in addition, the problem of data encryption and decryption does not exist, so that the time of the system for processing the data is reduced, and the user experience is improved.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the electronic device to which the data processing method described above is applied may refer to the corresponding description in the foregoing product embodiments, and details are not repeated herein.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present invention, and such modifications and equivalents should also be considered as falling within the scope of the present invention.

Claims (7)

1. A data protection method applied in an electronic device, the electronic device including a first memory and a second memory, wherein only the first memory stores system data, the second memory stores data that needs to be protected or data with higher confidentiality, and the method comprising:
judging whether first preset verification information for connecting the second memory is set or not;
if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory;
if the first preset verification information is not set, switching on the second memory;
wherein said turning on the second memory comprises powering on the second memory; said disconnecting the second memory comprises powering down the second memory;
wherein the method further comprises:
when a starting program of the electronic equipment is executed, reading starting configuration information of the second memory from the first memory;
selectively switching on or switching off a second memory according to a first state in the startup configuration information;
wherein the method further comprises generating the first state comprising:
receiving first configuration information which is input by a user and related to a second memory, wherein the first configuration information comprises a first state of the second memory when a starting program is executed;
and storing the first configuration information into the starting configuration information of the first memory.
2. The method of claim 1, wherein the method further comprises:
judging whether second preset verification information for disconnecting the second memory is received or not;
if so, the second memory is disconnected.
3. The method of claim 2, wherein upon determining that the second preset authentication information is received,
acquiring selection information whether to save the current access state of the second memory as a first state;
performing a disconnection operation of the second memory based on the selection information;
wherein the performing of the disconnection operation of the second memory based on the selection information includes:
when the selection information comprises the current access state of the second memory is stored as the first state, the access state of the second memory is stored as the first state into the starting configuration information of the first memory, and the second memory is disconnected;
directly disconnecting the second memory when the selection information includes not saving the current access state of the second memory.
4. The method of claim 3, wherein prior to said obtaining selection information of whether to save the current access state of the second memory as the first state further comprises determining whether a shutdown instruction is currently received,
if so, executing selection information for acquiring whether the current access state of the second memory is stored as the first state;
otherwise, the second memory is disconnected when the second memory is judged not to be read or written.
5. An electronic device to which the data protection method of claims 1-4 is applied, and which comprises: the first memory and the second memory, and
a controller configured to determine whether first preset authentication information for turning on the second memory is set; if so, switching on the second memory when the first preset verification information is judged to be received; otherwise, disconnecting the second memory;
if the first preset verification information is not set, switching on the second memory;
the controller configured to control the second memory to power up to turn on the second memory; it is further configured to control the second memory to be powered down to disconnect the second memory.
6. The electronic device of claim 5, wherein the controller is further configured to read power-on configuration information about the second memory from the first memory when a power-on program of the electronic device is executed;
and selectively switching on or switching off the second memory according to the first state in the starting configuration information.
7. The electronic device of claim 5, wherein the controller is further configured to receive user input of first configuration information regarding the second memory, wherein the first configuration information includes a first state of the second memory when the boot-up program is executed; and storing the first configuration information into the starting configuration information of the first memory.
CN201710680655.1A 2017-08-10 2017-08-10 Data protection method and electronic equipment Active CN107480545B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710680655.1A CN107480545B (en) 2017-08-10 2017-08-10 Data protection method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710680655.1A CN107480545B (en) 2017-08-10 2017-08-10 Data protection method and electronic equipment

Publications (2)

Publication Number Publication Date
CN107480545A CN107480545A (en) 2017-12-15
CN107480545B true CN107480545B (en) 2020-09-11

Family

ID=60600062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710680655.1A Active CN107480545B (en) 2017-08-10 2017-08-10 Data protection method and electronic equipment

Country Status (1)

Country Link
CN (1) CN107480545B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108491285B (en) * 2018-02-23 2021-08-06 Oppo广东移动通信有限公司 Data protection method applied to electronic equipment test and related product

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201072548Y (en) * 2007-08-23 2008-06-11 陶志强 Multi-hard disk anti-disclosure safety recovery device for computer
CN105760791A (en) * 2016-02-18 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Electronic terminal and power supply and shutdown method and device thereof

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7877563B2 (en) * 2006-12-07 2011-01-25 International Business Machines Corporation Programmable memory device security
US9336387B2 (en) * 2007-07-30 2016-05-10 Stroz Friedberg, Inc. System, method, and computer program product for detecting access to a memory device
CN101989121B (en) * 2009-07-30 2013-10-02 联想(北京)有限公司 Computer system, mixing memory and method for controlling power supply of computer memory
CN202177905U (en) * 2011-08-03 2012-03-28 中国长城计算机深圳股份有限公司 Multi-system physical switch device and computer
CN103164664A (en) * 2011-12-13 2013-06-19 深圳市天方信安电子科技有限公司 Computer for switching different data reservoirs through memory latched switch
CN103257938B (en) * 2012-02-21 2015-12-16 群联电子股份有限公司 Data guard method, Memory Controller and memorizer memory devices
CN104951405B (en) * 2014-03-28 2019-09-06 三星电子株式会社 Storage system and the method that storage system is executed and verifies write-protect
CN105320903B (en) * 2015-09-30 2018-07-06 杨毅 A kind of electronic equipment and the data read-write method based on the electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201072548Y (en) * 2007-08-23 2008-06-11 陶志强 Multi-hard disk anti-disclosure safety recovery device for computer
CN105760791A (en) * 2016-02-18 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Electronic terminal and power supply and shutdown method and device thereof

Also Published As

Publication number Publication date
CN107480545A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
US10762216B2 (en) Anti-theft in firmware
CN108681677B (en) Method, device and system for safely isolating dual-network computer based on USB interface
CN101984575B (en) Method and device for protecting mobile terminal software
US20110131418A1 (en) Method of password management and authentication suitable for trusted platform module
US9378344B2 (en) Method and apparatus for protecting information based on data card
US20150319147A1 (en) System and method for file encrypting and decrypting
CN110598384B (en) Information protection method, information protection device and mobile terminal
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
KR20230064623A (en) Mobile devices with secure personal memory
US20100332854A1 (en) Storage device, method of controlling storage device, and computer program product
JP5440710B2 (en) Information processing apparatus, information processing apparatus control method, and information processing apparatus control program
CN106789085B (en) Computer booting based on mobile phone cipher manages system and method
JP7141663B2 (en) Stored data safe operation method and system
KR100991191B1 (en) Computer security module and computer apparatus using the same
CN107480545B (en) Data protection method and electronic equipment
CN110807186B (en) Method, device, equipment and storage medium for safe storage of storage equipment
CN111159726B (en) UEFI (unified extensible firmware interface) environment variable-based full-disk encryption and decryption method and system
CN103020509B (en) A kind of terminal device encryption and decryption method, device and terminal device
CN112966276B (en) Method, device and medium for safely starting computer
KR101745390B1 (en) Data leakage prevention apparatus and method thereof
CN110851881B (en) Security detection method and device for terminal equipment, electronic equipment and storage medium
KR20210069481A (en) Storage device inlcuding memroy controller and non volatile memory system including and operating method thereof
WO2013056522A1 (en) Device and method for realizing network-locking of mobile terminal
US20230098969A1 (en) Sim, communication device, and writing method for application
CN116127468A (en) Data protection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant