CN107911820A - Secret system data file management method and terminal device - Google Patents
Secret system data file management method and terminal device Download PDFInfo
- Publication number
- CN107911820A CN107911820A CN201711466362.XA CN201711466362A CN107911820A CN 107911820 A CN107911820 A CN 107911820A CN 201711466362 A CN201711466362 A CN 201711466362A CN 107911820 A CN107911820 A CN 107911820A
- Authority
- CN
- China
- Prior art keywords
- secret
- terminal device
- file
- data file
- open
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 23
- 238000000034 method Methods 0.000 claims abstract description 18
- 230000009467 reduction Effects 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims description 3
- 238000013461 design Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 230000009897 systematic effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 210000004209 hair Anatomy 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
- H04W52/0264—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by selectively disabling software applications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention provides a kind of secret system data file management method and terminal device.The method is applied to terminal device, and open system and secret system are provided with terminal device, and secret file is provided with secret system, and open file folder is provided with open system, the described method includes:Terminal device judges whether the system of present terminal equipment operation is secret system;If the determination result is YES, then terminal device open secret file access limit, wherein, the access limit of secret file is in off state in open system.By the read and write access authority for controlling secret file, so that the data file in this document folder cannot be accessed in open system, realize encryption indirectly, and when entering secret system, each secret file read and write access authority open, but due to the data file in secret file not being encrypted, in read-write without extra decryption, substantially increase the read or write speed in secret Data File.
Description
Technical field
This application involves the communications field, more particularly to a kind of secret system data file management method and terminal device.
Background technology
With the development of the communication technology, user also stores more and more data on the terminal device, including very
More individual privacy informations, such as private contact, secret short message, private communication record, secret photo, private video, secret text
Shelves, secret audio etc., or even some trade secret information can be stored in terminal device.Store data on terminal device,
Although great convenience can be brought to people's live and work, the possibility of user information leakage is also considerably increased.
At present, many terminal device manufacturers are all to distinguish depositing for user data by installing dual system in terminal device
Path is stored up, i.e. an open system, another is secret system.For open system, user can freely enter open system
System, and access associated data files therein;But after then needing user by corresponding authentication for secret system
It can enter.Secret system of the prior art, is usually all by being integrally encrypted or fixed space to fixation
Each data file in space carries out the privacy protection that individually encrypted mode realizes data file, and user is only inputting
After proper password, the file that system just can be private to these is decrypted so that user accesses.
But since the data file in existing secret system is all encryption data, for such data
The access of file is required for carrying out decryption oprerations again, so as to result in, the data reading speed in secret system is excessively slow to be showed
As having seriously affected user experience.
The content of the invention
The present invention provides a kind of application management method and terminal device, to realize that terminal device is cleared up not in screen locking
Necessary application program, greatlys save electricity, and after user unlocks terminal device again, recover necessary related application journey
Sequence, further lifts user experience.
In a first aspect, the present invention provides a kind of secret system data file management method, applied to terminal device, the end
Open system and secret system are provided with end equipment, secret file, the open system are provided with the secret system
In be provided with open file folder, the management method includes:
Terminal device judges whether the system of presently described terminal device operation is the secret system;
If the determination result is YES, then the terminal device opens the access limit of the secret file, wherein, described
The access limit of secret file described in open system is in off state.
In a kind of possible design, after the access limit that the terminal device opens the secret file, also
Including:
The terminal device obtains secret file access instruction input by user;
The terminal device starts and the corresponding private of secret file according to the secret file access instruction
Close application program, wherein, the secret file is used for the data file for storing the secret application program;
The terminal device is according to the listed files of the secret application program, to load the number in the secret file
According to file, wherein, all data files in the secret file are shown in the listed files of the secret application program
Thumbnail and filename.
In a kind of possible design, the listed files in the terminal device according to the secret application program, to add
Before carrying the data file in the secret file, further include:
The terminal device obtains data file move input by user;
Data file during the terminal device presss from both sides the open file according to the data file move moves
Into the secret file;
The terminal device obtains store path of the data file in open file folder, and by the data
The filename of file and the store path are stored in file path database after establishing mapping relations;
The terminal device deletes the data file in the open file folder, and updates the secret application program
Listed files.
In a kind of possible design, the listed files of the secret application program is updated in the terminal device, to add
After carrying the data file in the secret file, further include:
The terminal device obtains data file reduction instruction input by user;
The terminal device reduces the filename of the instruction acquisition data file according to the data file;
The terminal device filters out the number according to the filename and the file path database of the data file
According to the store path corresponding to file;
The data file is moved in the open file folder by the terminal device according to the store path;
The terminal device deletes the data file in the secret file.
In a kind of possible design, the terminal device judge the operation of presently described terminal device system whether be
Before secret system, further include:
The terminal device is used to prompt to use in response to secret system enabled instruction input by user to user output
Family inputs the prompt message of authentication information;
The terminal device obtains the authentication information input by user;
The terminal device judge the authentication information input by user and default authentication information whether one
Cause;
If the determination result is YES, then the terminal device starts the secret system.
In a kind of possible design, the terminal device judge the authentication information input by user with it is default
Whether authentication information is consistent;If judging result is no, the terminal device locks the secret system.
In a kind of possible design, after the access limit that the terminal device opens the secret file, also
Including:
The terminal device obtains secret system-off instruction input by user;
The terminal device closes the access limit of the secret file according to the secret system-off instruction.
Second aspect, the present invention provide a kind of terminal device, open system and secret system are provided with the terminal device
Unite, secret file is provided with the secret system, open file folder, the terminal device are provided with the open system
Including:
Judgment module, whether the system for judging presently described terminal device operation is the secret system;
Opening module, when the system for being run when the terminal device is the secret system, opens the secret text
The access limit of part folder, wherein, the access limit of secret file is in off state described in the open system.
In a kind of possible design, the terminal device, further includes:
Acquisition module, for obtaining secret file access instruction input by user;
Starting module, for being started and the corresponding private of secret file according to the secret file access instruction
Close application program, wherein, the secret file is used for the data file for storing the secret application program;
Load-on module, for the listed files according to the secret application program, to load in the secret file
Data file, wherein, all data text in the secret file is shown in the listed files of the secret application program
The thumbnail and filename of part.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain data file move input by user;
Mobile module, is moved for the data file during the open file is pressed from both sides according to the data file move
Into the secret file;
The acquisition module, is additionally operable to obtain store path of the data file in open file folder, and will
The filename of the data file and the store path are stored in file path database after establishing mapping relations;
Removing module, for deleting the data file in the open file folder, and updates the secret application journey
The listed files of sequence.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain data file reduction instruction input by user;
The acquisition module, is additionally operable to the filename for reducing instruction according to the data file and obtaining the data file;
Screening module, the number is filtered out for the filename according to the data file and the file path database
According to the store path corresponding to file;
The mobile module, is additionally operable to that the data file is moved to the open file folder according to the store path
In;
The removing module, is additionally operable to delete the data file in the secret file.
In a kind of possible design, the terminal device, further includes:
Respond module, in response to secret system enabled instruction input by user, being used to prompt to user output
User inputs the prompt message of authentication information;
The acquisition module, is additionally operable to obtain the authentication information input by user;
The judgment module, is additionally operable to judge the authentication information input by user and default authentication information
It is whether consistent;
The starting module, is additionally operable to when the authentication information input by user and default authentication information one
During cause, start the secret system.
In a kind of possible design, the terminal device, further includes:
Locking module, for when the authentication information input by user and default authentication information it is inconsistent
When, lock the secret system.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain secret system-off instruction input by user;
Closedown module, for closing the access limit of the secret file according to the secret system-off instruction.
A kind of third aspect, computer-readable recording medium, is stored thereon with computer program, which is held by processor
The various secret system data file management methods that may relate in first aspect and first aspect are realized during row.
Fourth aspect, the present invention also provides a kind of electronic equipment, including:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to perform in first aspect and first aspect via the executable instruction is performed
The various secret system data file management methods that may relate to.
The present invention provides a kind of application management method, by judging that the currently running system of terminal device is secret system
System or open system determine whether the access limit of open secret file, when the currently running system of terminal device is private
During close system, the access limit of secret file is opened, and when the currently running system of terminal device is open system, then close
Close the access limit of secret file.By controlling the read and write access authority of secret file so that each application or into
Journey cannot access the data file in this document folder in open system, so as to fulfill indirect encryption, and work as and enter secret system
When, each secret file read and write access authority open, but due in secret system not to the number in secret file
It is encrypted according to file, therefore in read-write without extra decrypting process, implements very efficiently simple, is substantially increased
In the read or write speed of secret Data File.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs
Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of optional a kind of secret system data file management method usage scenario signal provided by the invention
Figure;
Fig. 2 is a kind of secret system data file management method flow of the present invention according to an exemplary embodiment
Figure;
Fig. 3 is a kind of secret system data file management method flow that the present invention is shown according to another exemplary embodiment
Figure;
Fig. 4 is the structure diagram of a kind of electronic equipment of the present invention according to an exemplary embodiment;
Fig. 5 is the hardware architecture diagram for the electronic equipment that the application provides.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
All other embodiments obtained without creative efforts, belong to the scope of protection of the invention.
Fig. 1 is a kind of optional application management method usage scenario schematic diagram provided by the invention.As shown in Figure 1,
In the present embodiment, open system and secret system are provided with terminal device, wherein, secret text is provided with secret system
Part presss from both sides, and open file folder is provided with open system.Shown in Fig. 1 is for the terminal device memory management in secret system
Interface, the interface display can have in secret system photo secret file, contact person's secret file, short message secret text
Part folder, video privacy file and audio secret file.User can only be after entering in secret system, could be to upper
The secret file stated is written and read, if in open system, user's lack of competence is written and read above-mentioned secret file.
Fig. 2 is a kind of secret system data file management method flow of the present invention according to an exemplary embodiment
Figure.As shown in Fig. 2, secret system data file management method provided in this embodiment, including:
Step 101, terminal device judge whether the system of present terminal equipment operation is secret system, if judging result is
It is then to perform step 102.
Specifically, terminal device can obtain the system information of the system of present terminal equipment operation, then by should
System information is compared with the system information in the presets list, so that it is determined that whether the system of present terminal equipment operation is private
Close system.Such as the entitled KF of system of the open system set in terminal device, and the system of the secret system set is entitled
SM, if the systematic name in the system information of the system for the present terminal equipment operation that then terminal device is got is KF,
The system for determining the operation of present terminal equipment is open system;And if the present terminal equipment operation that terminal device is got is
When systematic name in the system information of system is SM, it is determined that the system of present terminal equipment operation is secret system.
When usual user's selection enters secret system, also need by corresponding authentication.When terminal device receives use
After family starts the secret system enabled instruction of secret system, it will be exported to user and be used to prompt user to input authentication letter
The prompt message of breath, wherein, specific prompt message can allow user to input corresponding password, typing fingerprint or typing people
Face, is worth explanatorily, and the type for not prompting identity information input by user to terminal device in the present embodiment is defined,
Only it need to guarantee that effectively user is identified so that it is guaranteed that the security of secret system.Terminal is obtained in user to set
After the authentication information prompt message of the standby input provided, user can input corresponding authentication according to prompting and believe
Breath, the identity information can be word passwords, such as pure digi-tal password, alternatively, digits plus letters combine, can also be that fingerprint is believed
The biological characteristics such as breath, iris information or face information, wherein, the security of secret system is enabled to more using biological characteristic
It is high.
After terminal device gets authentication information input by user, terminal device judges the body of the user's input
Whether part checking information and default authentication information are consistent, if the determination result is YES, then start the secret system;But
If judging result is no, terminal device locking secret system.Anticipate in order to prevent in user part checking information input process
Outer mistake, judges that the authentication information of the user's input and default authentication information are inconsistent first in terminal device
When, terminal device can prompt user to input user part checking information again, and user can input user part again according to prompting and test
Information is demonstrate,proved, and when user input by user part checking information continuously mistake occurs, terminal device can just carry out secret system
Locking.
Step 102, terminal device open the access limit of secret file.
Specifically, when the system that terminal device determines currently to be started is secret system, terminal device may turn on private
The access limit of close file, can access secret file so as to fulfill in secret system.And when terminal is set
After standby acquisition secret system-off instruction input by user, terminal device will exit secret system, then at this time, terminal device
The access limit of all secret files will be closed according to secret system-off instruction, then terminal device will be from secret system
Exited in system, and enter open system.In open system, the access limit of secret file is in off state, and therefore, is being opened
In place system, user can not carry out any read-write operation to the data file in secret file.
In the present embodiment, by judging that the currently running system of terminal device is secret system or open system come really
The fixed access limit for whether opening secret file, when the currently running system of terminal device is secret system, opens secret
The access limit of file, and when the currently running system of terminal device is open system, then close the reading of secret file
Write permission.By controlling the read and write access authority of secret file so that each application or process in open system not
The data file in this document folder can be accessed, so as to fulfill indirect encryption, and when entering secret system, each secret file
Read and write access authority is opened, but due to the data file in secret file not being encrypted in secret system, because
This without extra decrypting process, implements very efficiently simple in read-write, substantially increases the data in secret system
The read or write speed of file.
On the basis of the embodiment shown in Fig. 2, Fig. 3 is that one kind that the present invention is shown according to another exemplary embodiment is private
Close system data file management method flow chart.As shown in figure 3, the present embodiment provides
Step 201, terminal device judge whether the system of present terminal equipment operation is secret system, if judging result is
It is then to perform step 102.
Step 202, terminal device open the access limit of secret file.
It is worth explanatorily, the description of step 101-102 in the specific implementation reference embodiment one of step 201-202,
Which is not described herein again.
Step 203, terminal device obtain secret file access instruction input by user.
Specifically, terminal device obtains secret file access instruction input by user in secret system, which refers to
Order can be the instruction that user is triggered by touch screen click secret file or user opens phase by voice control
The instruction for the secret file answered, is worth explanatorily, in the present embodiment, does not input secret file access instruction to user
Mode specifically limited.
Step 204, terminal device start according to secret file access instruction answers with the corresponding secret of secret file
Use program.
After terminal device receives secret file access instruction input by user, terminal device will start secret
The corresponding secret application program of file, wherein, secret file is used for the data file for storing secret application program.Example
Such as, after user clicks contact person's secret file, terminal device will start contact application, and then user can pass through
Contact application accesses private contact;After user clicks short message secret file, terminal device will start short message application,
Then user can pass through short message application access secret short message;User click photo, video or audio secret file it
Afterwards, terminal device, which will start, sees that figure, video playing or audio play application, and then, user can be by seeing figure, video
Play either audio broadcasting and apply short message application access secret photo, video or audio.
Step 205, terminal device obtain data file move input by user.
And when user needs the data file in open system being transferred in secret file, user can pass through length
By this document so that this document is in quick condition, then it is dragged in secret file.For example, user can be in photo
A photo is chosen in open file folder, is then dragged and is copied in photo secret file.
Step 206, the data file during terminal device presss from both sides open file according to data file move are moved to private
In close file.
Step 207, terminal device obtain store path of the data file in open file folder.
After the action that terminal device completes data file movement, terminal obtains the data file in open file folder
Store path, and the filename of the data file and store path are established after mapping relations and are stored in file path database
In.For example, photo of the store path for the file entitled " landscape " in " Zhao Pian A open files folder " is deposited in for original,
" landscape " correspondence " photo A open files folder " will be recorded after movement, in file path database.
Step 208, terminal device delete the data file in open file folder, and update the file row of secret application program
Table.
After the action that terminal device completes data file movement, in order to preferably protect the secret of the data file
Property, terminal device deletes the data file in open file folder, and updates the listed files of secret application program.
Step 209, terminal device are according to the listed files of secret application program, to load the text of the data in secret file
Part.
Step 210, terminal device obtain data file reduction instruction input by user.
And when user needs to be transferred to the data file in secret file in open file folder, user can pass through
This document causes this document to be in quick condition, then selects " disclosure " option, then terminal device will turn the data file
Move in corresponding open file folder.For example, user, which can open the photo one in photo secret file in photo, carries out long-press,
So that the photo is in quick condition, " disclosure " option is then selected.
Step 211, terminal device reduce the filename of instruction acquisition data file according to data file.
After user triggers data file reduction instruction, terminal device reduces instruction according to data file and obtains data
The filename of file.
Step 212, terminal device filter out data file institute according to the filename and file path database of data file
Corresponding store path.
, will be according to the filename and file of data file after the filename that terminal device gets file to be restored
Routing database filters out the store path corresponding to data file.For example, user needs to go back the photograph that old file name is " landscape "
Piece to open file press from both sides, then terminal device will be filtered out in file path database " landscape " correspondence " photo A open files
Folder ", so that it is determined that the path of the photo original storage of file entitled " landscape " is " Zhao Pian A open files folder ".
Data file is moved in open file folder by step 213, terminal device according to store path.
Step 214, terminal device delete the data file in the secret file.
Fig. 4 is a kind of structure diagram of terminal device of the present invention according to an exemplary embodiment.Such as Fig. 4 institutes
Show, open system and secret system are provided with terminal device provided by the embodiment, secret text is provided with the secret system
Part presss from both sides, and open file folder is provided with the open system, and the terminal device includes:
Judgment module 301, whether the system for judging presently described terminal device operation is the secret system;
Opening module 302, when the system for being run when the terminal device is the secret system, opens the secret
The access limit of file, wherein, the access limit of secret file is in off state described in the open system.
The terminal device that embodiment shown in Fig. 4 provides, it is real shown in above-mentioned embodiment illustrated in fig. 2 and Fig. 3 available for performing
The method provided in example is applied, specific implementation is similar with technique effect, and which is not described herein again.
In a kind of possible design, the terminal device, further includes:
Acquisition module, for obtaining secret file access instruction input by user;
Starting module, for being started and the corresponding private of secret file according to the secret file access instruction
Close application program, wherein, the secret file is used for the data file for storing the secret application program;
Load-on module, for the listed files according to the secret application program, to load in the secret file
Data file, wherein, all data text in the secret file is shown in the listed files of the secret application program
The thumbnail and filename of part.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain data file move input by user;
Mobile module, is moved for the data file during the open file is pressed from both sides according to the data file move
Into the secret file;
The acquisition module, is additionally operable to obtain store path of the data file in open file folder, and will
The filename of the data file and the store path are stored in file path database after establishing mapping relations;
Removing module, for deleting the data file in the open file folder, and updates the secret application journey
The listed files of sequence.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain data file reduction instruction input by user;
The acquisition module, is additionally operable to the filename for reducing instruction according to the data file and obtaining the data file;
Screening module, the number is filtered out for the filename according to the data file and the file path database
According to the store path corresponding to file;
The mobile module, is additionally operable to that the data file is moved to the open file folder according to the store path
In;
The removing module, is additionally operable to delete the data file in the secret file.
In a kind of possible design, the terminal device, further includes:
Respond module, in response to secret system enabled instruction input by user, being used to prompt to user output
User inputs the prompt message of authentication information;
The acquisition module, is additionally operable to obtain the authentication information input by user;
The judgment module, is additionally operable to judge the authentication information input by user and default authentication information
It is whether consistent;
The starting module, is additionally operable to when the authentication information input by user and default authentication information one
During cause, start the secret system.
In a kind of possible design, the terminal device, further includes:
Locking module, for when the authentication information input by user and default authentication information it is inconsistent
When, lock the secret system.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain secret system-off instruction input by user;
Closedown module, for closing the access limit of the secret file according to the secret system-off instruction.
Fig. 5 is the hardware architecture diagram for the electronic equipment that the application provides.As shown in figure 5, electricity provided in this embodiment
Sub- equipment, including:
Processor 41;And
Memory 42, for storing the executable instruction of the processor;
Wherein, the processor is configured to perform any one of foregoing embodiment of the method via the executable instruction is performed
The technical solution, its implementing principle and technical effect is similar, and details are not described herein again.
The function of each module in above device can be realized by processor 41.
The application also provides a kind of computer-readable recording medium, is stored thereon with computer program, which is processed
Device realizes the secret system data file management method in Fig. 2 or embodiment illustrated in fig. 3 when performing.
In the embodiment of above-mentioned terminal device, it should be appreciated that processor can be central processing unit (English:Central
Processing Unit, referred to as:CPU), it can also be other general processors, digital signal processor (English:Digital
Signal Processor, referred to as:DSP), application-specific integrated circuit (English:Application Specific Integrated
Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor can also be any conventional place
Manage device etc..Hardware processor can be embodied directly in reference to the step of method disclosed in the present application and performs completion, or use
Hardware and software module combination in reason device perform completion.
Realizing all or part of step of above-mentioned each method embodiment can be completed by the relevant hardware of programmed instruction.
Foregoing program can be stored in a readable access to memory.Upon execution, execution includes above-mentioned each method embodiment to the program
The step of;And foregoing memory (storage medium) includes:Read-only storage (English:Read-only memory, abbreviation:
ROM), RAM, flash memory, hard disk, solid state hard disc, tape (English:Magnetic tape), floppy disk (English:floppy
Disk), CD (English:Optical disc) and its any combination.
Finally it should be noted that:Although this programme is described in detail with reference to foregoing embodiments, this area
Those of ordinary skill should be understood:It can still modify the technical solution described in foregoing embodiments, or right
Which part or all technical characteristic carry out equivalent substitution;And these modifications or replacement, appropriate technical solution can not be made
Essence depart from each embodiment technical solution of the application scope.
Claims (10)
1. a kind of secret system data file management method, it is characterised in that applied to terminal device, set in the terminal device
Open system and secret system are equipped with, secret file is provided with the secret system, public affairs are provided with the open system
Open file is pressed from both sides, and the management method includes:
Terminal device judges whether the system of presently described terminal device operation is the secret system;
If the determination result is YES, then the terminal device opens the access limit of the secret file, wherein, in the opening
The access limit of secret file described in system is in off state.
2. according to the method described in claim 1, it is characterized in that, open the reading of the secret file in the terminal device
After write permission, further include:
The terminal device obtains secret file access instruction input by user;
The terminal device starts according to the secret file access instruction should with the corresponding secret of secret file
With program, wherein, the secret file is used for the data file for storing the secret application program;
The terminal device is according to the listed files of the secret application program, to load the text of the data in the secret file
Part, wherein, the contracting of all data files in the secret file is shown in the listed files of the secret application program
Sketch map and filename.
3. according to the method described in claim 2, it is characterized in that, in the terminal device according to the secret application program
Listed files, before loading the data file in the secret file, to further include:
The terminal device obtains data file move input by user;
Data file during the terminal device presss from both sides the open file according to the data file move is moved to institute
State in secret file;
The terminal device obtains store path of the data file in open file folder, and by the data file
Filename and the store path establish mapping relations after be stored in file path database;
The terminal device deletes the data file in the open file folder, and updates the text of the secret application program
Part list.
4. according to the method described in claim 2, it is characterized in that, update the secret application program in the terminal device
Listed files, after loading the data file in the secret file, further includes:
The terminal device obtains data file reduction instruction input by user;
The terminal device reduces the filename of the instruction acquisition data file according to the data file;
The terminal device filters out the data text according to the filename and the file path database of the data file
The store path corresponding to part;
The data file is moved in the open file folder by the terminal device according to the store path;
The terminal device deletes the data file in the secret file.
5. according to the method described in claim 1, it is characterized in that, judge presently described terminal device fortune in the terminal device
Before whether capable system is secret system, further include:
The terminal device is used to prompt user defeated in response to secret system enabled instruction input by user to user output
Enter the prompt message of authentication information;
The terminal device obtains the authentication information input by user;
The terminal device judges whether the authentication information input by user and default authentication information are consistent;
If the determination result is YES, then the terminal device starts the secret system.
6. according to the method described in claim 5, it is characterized in that, the terminal device judges that the identity input by user is tested
Demonstrate,prove information and whether default authentication information is consistent;If judging result is no, the terminal device locks the secret
System.
7. according to the method any one of claim 1-6, it is characterised in that open the secret in the terminal device
After the access limit of file, further include:
The terminal device obtains secret system-off instruction input by user;
The terminal device closes the access limit of the secret file according to the secret system-off instruction.
8. a kind of terminal device, it is characterised in that open system and secret system, the secret are provided with the terminal device
Secret file is provided with system, open file folder is provided with the open system, the terminal device includes:
Judgment module, whether the system for judging presently described terminal device operation is the secret system;
Opening module, when the system for being run when the terminal device is the secret system, opens the secret file
Access limit, wherein, the access limit of secret file is in off state described in the open system.
9. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is held by processor
Claim 1-7 any one of them secret system data file management methods are realized during row.
10. a kind of electronic equipment, it is characterised in that including:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to carry out perform claim requirement 1-7 any one of them via the execution executable instruction
Secret system data file management method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711466362.XA CN107911820B (en) | 2017-12-28 | 2017-12-28 | Private system data file management method and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711466362.XA CN107911820B (en) | 2017-12-28 | 2017-12-28 | Private system data file management method and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107911820A true CN107911820A (en) | 2018-04-13 |
CN107911820B CN107911820B (en) | 2021-02-09 |
Family
ID=61871933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711466362.XA Active CN107911820B (en) | 2017-12-28 | 2017-12-28 | Private system data file management method and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107911820B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804932A (en) * | 2018-05-29 | 2018-11-13 | 北京珠穆朗玛移动通信有限公司 | Picture storage method, mobile terminal and storage medium |
CN109063504A (en) * | 2018-07-02 | 2018-12-21 | 北京珠穆朗玛移动通信有限公司 | Access method, mobile terminal and the storage medium of secret file |
CN109815668A (en) * | 2019-01-10 | 2019-05-28 | 北京珠穆朗玛移动通信有限公司 | Dual system method for controlling mobile terminal, mobile terminal and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102855432A (en) * | 2011-06-27 | 2013-01-02 | 奇智软件(北京)有限公司 | Document and document folder unlocking and deleting method and system |
US20130185555A1 (en) * | 2012-01-17 | 2013-07-18 | Apple Inc. | System and method for secure erase in copy-on-write file systems |
CN105574425A (en) * | 2015-04-30 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for accessing stored data |
CN106056000A (en) * | 2016-06-24 | 2016-10-26 | 北京奇虎科技有限公司 | System authority-based mobile device storage partition configuration method and apparatus |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
CN106919849A (en) * | 2015-12-24 | 2017-07-04 | 北京三星通信技术研究有限公司 | Method for secret protection and device |
CN107145794A (en) * | 2017-04-20 | 2017-09-08 | 北京安云世纪科技有限公司 | A kind of data processing method and device and mobile terminal |
-
2017
- 2017-12-28 CN CN201711466362.XA patent/CN107911820B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102855432A (en) * | 2011-06-27 | 2013-01-02 | 奇智软件(北京)有限公司 | Document and document folder unlocking and deleting method and system |
US20130185555A1 (en) * | 2012-01-17 | 2013-07-18 | Apple Inc. | System and method for secure erase in copy-on-write file systems |
CN105574425A (en) * | 2015-04-30 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for accessing stored data |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
CN106919849A (en) * | 2015-12-24 | 2017-07-04 | 北京三星通信技术研究有限公司 | Method for secret protection and device |
CN106056000A (en) * | 2016-06-24 | 2016-10-26 | 北京奇虎科技有限公司 | System authority-based mobile device storage partition configuration method and apparatus |
CN107145794A (en) * | 2017-04-20 | 2017-09-08 | 北京安云世纪科技有限公司 | A kind of data processing method and device and mobile terminal |
Non-Patent Citations (1)
Title |
---|
姚一楠: "《双操作系统移动智能终端安全分析》", 《移动通信》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804932A (en) * | 2018-05-29 | 2018-11-13 | 北京珠穆朗玛移动通信有限公司 | Picture storage method, mobile terminal and storage medium |
CN109063504A (en) * | 2018-07-02 | 2018-12-21 | 北京珠穆朗玛移动通信有限公司 | Access method, mobile terminal and the storage medium of secret file |
CN109063504B (en) * | 2018-07-02 | 2024-02-23 | 北京珠穆朗玛移动通信有限公司 | Private file access method, mobile terminal and storage medium |
CN109815668A (en) * | 2019-01-10 | 2019-05-28 | 北京珠穆朗玛移动通信有限公司 | Dual system method for controlling mobile terminal, mobile terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107911820B (en) | 2021-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4874288B2 (en) | Data storage and access to mobile devices and user modules | |
US8045714B2 (en) | Systems and methods for managing multiple keys for file encryption and decryption | |
US20120324546A1 (en) | Providing Secure Dynamic Role Selection and Managing Privileged User Access From a Client Device | |
US20090077096A1 (en) | System and method of managing file and mobile terminal device | |
US10979450B2 (en) | Method and system for blocking phishing or ransomware attack | |
US9378344B2 (en) | Method and apparatus for protecting information based on data card | |
CN107911820A (en) | Secret system data file management method and terminal device | |
CN101371259A (en) | File management system and method, and mobile terminal | |
CN105335197B (en) | The starting control method and device of application program in terminal | |
US9015826B2 (en) | Mobile platform security apparatus and method | |
CN106936999A (en) | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently | |
CN114730337A (en) | Cryptographic key management | |
CN107767133A (en) | Virtual card opens chucking method, apparatus and system, storage medium | |
KR100975133B1 (en) | Security management system for portable memory devices and security management method using the same | |
CN108319867A (en) | Dualized file divulgence prevention method and system based on HOOK and window filter | |
CN106658463A (en) | Operating system login method, device and terminal | |
CN106681662B (en) | Document handling method and mobile terminal based on dual system | |
CN113779636A (en) | File burning control method and device, electronic equipment and storage medium | |
CN107920153A (en) | A kind of mobile terminal and fingerprint recording operation processing method and storage medium | |
CN107704337A (en) | Method, mobile terminal and the device with store function of factory reset | |
KR20050063174A (en) | Personal terminal with multiple password system and control method thereof | |
JP4866858B2 (en) | Data processing apparatus and processing method | |
WO2002073552A1 (en) | Verification of access compliance of subjects with objects in a data processing system with a security policy | |
CN112632518A (en) | Data access method, device, terminal and storage medium | |
KR100654043B1 (en) | Mobile telecommunications terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |