CN107911820A - Secret system data file management method and terminal device - Google Patents

Secret system data file management method and terminal device Download PDF

Info

Publication number
CN107911820A
CN107911820A CN201711466362.XA CN201711466362A CN107911820A CN 107911820 A CN107911820 A CN 107911820A CN 201711466362 A CN201711466362 A CN 201711466362A CN 107911820 A CN107911820 A CN 107911820A
Authority
CN
China
Prior art keywords
secret
terminal device
file
data file
open
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711466362.XA
Other languages
Chinese (zh)
Other versions
CN107911820B (en
Inventor
黎小松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN201711466362.XA priority Critical patent/CN107911820B/en
Publication of CN107911820A publication Critical patent/CN107911820A/en
Application granted granted Critical
Publication of CN107911820B publication Critical patent/CN107911820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0264Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by selectively disabling software applications
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a kind of secret system data file management method and terminal device.The method is applied to terminal device, and open system and secret system are provided with terminal device, and secret file is provided with secret system, and open file folder is provided with open system, the described method includes:Terminal device judges whether the system of present terminal equipment operation is secret system;If the determination result is YES, then terminal device open secret file access limit, wherein, the access limit of secret file is in off state in open system.By the read and write access authority for controlling secret file, so that the data file in this document folder cannot be accessed in open system, realize encryption indirectly, and when entering secret system, each secret file read and write access authority open, but due to the data file in secret file not being encrypted, in read-write without extra decryption, substantially increase the read or write speed in secret Data File.

Description

Secret system data file management method and terminal device
Technical field
This application involves the communications field, more particularly to a kind of secret system data file management method and terminal device.
Background technology
With the development of the communication technology, user also stores more and more data on the terminal device, including very More individual privacy informations, such as private contact, secret short message, private communication record, secret photo, private video, secret text Shelves, secret audio etc., or even some trade secret information can be stored in terminal device.Store data on terminal device, Although great convenience can be brought to people's live and work, the possibility of user information leakage is also considerably increased.
At present, many terminal device manufacturers are all to distinguish depositing for user data by installing dual system in terminal device Path is stored up, i.e. an open system, another is secret system.For open system, user can freely enter open system System, and access associated data files therein;But after then needing user by corresponding authentication for secret system It can enter.Secret system of the prior art, is usually all by being integrally encrypted or fixed space to fixation Each data file in space carries out the privacy protection that individually encrypted mode realizes data file, and user is only inputting After proper password, the file that system just can be private to these is decrypted so that user accesses.
But since the data file in existing secret system is all encryption data, for such data The access of file is required for carrying out decryption oprerations again, so as to result in, the data reading speed in secret system is excessively slow to be showed As having seriously affected user experience.
The content of the invention
The present invention provides a kind of application management method and terminal device, to realize that terminal device is cleared up not in screen locking Necessary application program, greatlys save electricity, and after user unlocks terminal device again, recover necessary related application journey Sequence, further lifts user experience.
In a first aspect, the present invention provides a kind of secret system data file management method, applied to terminal device, the end Open system and secret system are provided with end equipment, secret file, the open system are provided with the secret system In be provided with open file folder, the management method includes:
Terminal device judges whether the system of presently described terminal device operation is the secret system;
If the determination result is YES, then the terminal device opens the access limit of the secret file, wherein, described The access limit of secret file described in open system is in off state.
In a kind of possible design, after the access limit that the terminal device opens the secret file, also Including:
The terminal device obtains secret file access instruction input by user;
The terminal device starts and the corresponding private of secret file according to the secret file access instruction Close application program, wherein, the secret file is used for the data file for storing the secret application program;
The terminal device is according to the listed files of the secret application program, to load the number in the secret file According to file, wherein, all data files in the secret file are shown in the listed files of the secret application program Thumbnail and filename.
In a kind of possible design, the listed files in the terminal device according to the secret application program, to add Before carrying the data file in the secret file, further include:
The terminal device obtains data file move input by user;
Data file during the terminal device presss from both sides the open file according to the data file move moves Into the secret file;
The terminal device obtains store path of the data file in open file folder, and by the data The filename of file and the store path are stored in file path database after establishing mapping relations;
The terminal device deletes the data file in the open file folder, and updates the secret application program Listed files.
In a kind of possible design, the listed files of the secret application program is updated in the terminal device, to add After carrying the data file in the secret file, further include:
The terminal device obtains data file reduction instruction input by user;
The terminal device reduces the filename of the instruction acquisition data file according to the data file;
The terminal device filters out the number according to the filename and the file path database of the data file According to the store path corresponding to file;
The data file is moved in the open file folder by the terminal device according to the store path;
The terminal device deletes the data file in the secret file.
In a kind of possible design, the terminal device judge the operation of presently described terminal device system whether be Before secret system, further include:
The terminal device is used to prompt to use in response to secret system enabled instruction input by user to user output Family inputs the prompt message of authentication information;
The terminal device obtains the authentication information input by user;
The terminal device judge the authentication information input by user and default authentication information whether one Cause;
If the determination result is YES, then the terminal device starts the secret system.
In a kind of possible design, the terminal device judge the authentication information input by user with it is default Whether authentication information is consistent;If judging result is no, the terminal device locks the secret system.
In a kind of possible design, after the access limit that the terminal device opens the secret file, also Including:
The terminal device obtains secret system-off instruction input by user;
The terminal device closes the access limit of the secret file according to the secret system-off instruction.
Second aspect, the present invention provide a kind of terminal device, open system and secret system are provided with the terminal device Unite, secret file is provided with the secret system, open file folder, the terminal device are provided with the open system Including:
Judgment module, whether the system for judging presently described terminal device operation is the secret system;
Opening module, when the system for being run when the terminal device is the secret system, opens the secret text The access limit of part folder, wherein, the access limit of secret file is in off state described in the open system.
In a kind of possible design, the terminal device, further includes:
Acquisition module, for obtaining secret file access instruction input by user;
Starting module, for being started and the corresponding private of secret file according to the secret file access instruction Close application program, wherein, the secret file is used for the data file for storing the secret application program;
Load-on module, for the listed files according to the secret application program, to load in the secret file Data file, wherein, all data text in the secret file is shown in the listed files of the secret application program The thumbnail and filename of part.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain data file move input by user;
Mobile module, is moved for the data file during the open file is pressed from both sides according to the data file move Into the secret file;
The acquisition module, is additionally operable to obtain store path of the data file in open file folder, and will The filename of the data file and the store path are stored in file path database after establishing mapping relations;
Removing module, for deleting the data file in the open file folder, and updates the secret application journey The listed files of sequence.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain data file reduction instruction input by user;
The acquisition module, is additionally operable to the filename for reducing instruction according to the data file and obtaining the data file;
Screening module, the number is filtered out for the filename according to the data file and the file path database According to the store path corresponding to file;
The mobile module, is additionally operable to that the data file is moved to the open file folder according to the store path In;
The removing module, is additionally operable to delete the data file in the secret file.
In a kind of possible design, the terminal device, further includes:
Respond module, in response to secret system enabled instruction input by user, being used to prompt to user output User inputs the prompt message of authentication information;
The acquisition module, is additionally operable to obtain the authentication information input by user;
The judgment module, is additionally operable to judge the authentication information input by user and default authentication information It is whether consistent;
The starting module, is additionally operable to when the authentication information input by user and default authentication information one During cause, start the secret system.
In a kind of possible design, the terminal device, further includes:
Locking module, for when the authentication information input by user and default authentication information it is inconsistent When, lock the secret system.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain secret system-off instruction input by user;
Closedown module, for closing the access limit of the secret file according to the secret system-off instruction.
A kind of third aspect, computer-readable recording medium, is stored thereon with computer program, which is held by processor The various secret system data file management methods that may relate in first aspect and first aspect are realized during row.
Fourth aspect, the present invention also provides a kind of electronic equipment, including:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to perform in first aspect and first aspect via the executable instruction is performed The various secret system data file management methods that may relate to.
The present invention provides a kind of application management method, by judging that the currently running system of terminal device is secret system System or open system determine whether the access limit of open secret file, when the currently running system of terminal device is private During close system, the access limit of secret file is opened, and when the currently running system of terminal device is open system, then close Close the access limit of secret file.By controlling the read and write access authority of secret file so that each application or into Journey cannot access the data file in this document folder in open system, so as to fulfill indirect encryption, and work as and enter secret system When, each secret file read and write access authority open, but due in secret system not to the number in secret file It is encrypted according to file, therefore in read-write without extra decrypting process, implements very efficiently simple, is substantially increased In the read or write speed of secret Data File.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of optional a kind of secret system data file management method usage scenario signal provided by the invention Figure;
Fig. 2 is a kind of secret system data file management method flow of the present invention according to an exemplary embodiment Figure;
Fig. 3 is a kind of secret system data file management method flow that the present invention is shown according to another exemplary embodiment Figure;
Fig. 4 is the structure diagram of a kind of electronic equipment of the present invention according to an exemplary embodiment;
Fig. 5 is the hardware architecture diagram for the electronic equipment that the application provides.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiments obtained without creative efforts, belong to the scope of protection of the invention.
Fig. 1 is a kind of optional application management method usage scenario schematic diagram provided by the invention.As shown in Figure 1, In the present embodiment, open system and secret system are provided with terminal device, wherein, secret text is provided with secret system Part presss from both sides, and open file folder is provided with open system.Shown in Fig. 1 is for the terminal device memory management in secret system Interface, the interface display can have in secret system photo secret file, contact person's secret file, short message secret text Part folder, video privacy file and audio secret file.User can only be after entering in secret system, could be to upper The secret file stated is written and read, if in open system, user's lack of competence is written and read above-mentioned secret file.
Fig. 2 is a kind of secret system data file management method flow of the present invention according to an exemplary embodiment Figure.As shown in Fig. 2, secret system data file management method provided in this embodiment, including:
Step 101, terminal device judge whether the system of present terminal equipment operation is secret system, if judging result is It is then to perform step 102.
Specifically, terminal device can obtain the system information of the system of present terminal equipment operation, then by should System information is compared with the system information in the presets list, so that it is determined that whether the system of present terminal equipment operation is private Close system.Such as the entitled KF of system of the open system set in terminal device, and the system of the secret system set is entitled SM, if the systematic name in the system information of the system for the present terminal equipment operation that then terminal device is got is KF, The system for determining the operation of present terminal equipment is open system;And if the present terminal equipment operation that terminal device is got is When systematic name in the system information of system is SM, it is determined that the system of present terminal equipment operation is secret system.
When usual user's selection enters secret system, also need by corresponding authentication.When terminal device receives use After family starts the secret system enabled instruction of secret system, it will be exported to user and be used to prompt user to input authentication letter The prompt message of breath, wherein, specific prompt message can allow user to input corresponding password, typing fingerprint or typing people Face, is worth explanatorily, and the type for not prompting identity information input by user to terminal device in the present embodiment is defined, Only it need to guarantee that effectively user is identified so that it is guaranteed that the security of secret system.Terminal is obtained in user to set After the authentication information prompt message of the standby input provided, user can input corresponding authentication according to prompting and believe Breath, the identity information can be word passwords, such as pure digi-tal password, alternatively, digits plus letters combine, can also be that fingerprint is believed The biological characteristics such as breath, iris information or face information, wherein, the security of secret system is enabled to more using biological characteristic It is high.
After terminal device gets authentication information input by user, terminal device judges the body of the user's input Whether part checking information and default authentication information are consistent, if the determination result is YES, then start the secret system;But If judging result is no, terminal device locking secret system.Anticipate in order to prevent in user part checking information input process Outer mistake, judges that the authentication information of the user's input and default authentication information are inconsistent first in terminal device When, terminal device can prompt user to input user part checking information again, and user can input user part again according to prompting and test Information is demonstrate,proved, and when user input by user part checking information continuously mistake occurs, terminal device can just carry out secret system Locking.
Step 102, terminal device open the access limit of secret file.
Specifically, when the system that terminal device determines currently to be started is secret system, terminal device may turn on private The access limit of close file, can access secret file so as to fulfill in secret system.And when terminal is set After standby acquisition secret system-off instruction input by user, terminal device will exit secret system, then at this time, terminal device The access limit of all secret files will be closed according to secret system-off instruction, then terminal device will be from secret system Exited in system, and enter open system.In open system, the access limit of secret file is in off state, and therefore, is being opened In place system, user can not carry out any read-write operation to the data file in secret file.
In the present embodiment, by judging that the currently running system of terminal device is secret system or open system come really The fixed access limit for whether opening secret file, when the currently running system of terminal device is secret system, opens secret The access limit of file, and when the currently running system of terminal device is open system, then close the reading of secret file Write permission.By controlling the read and write access authority of secret file so that each application or process in open system not The data file in this document folder can be accessed, so as to fulfill indirect encryption, and when entering secret system, each secret file Read and write access authority is opened, but due to the data file in secret file not being encrypted in secret system, because This without extra decrypting process, implements very efficiently simple in read-write, substantially increases the data in secret system The read or write speed of file.
On the basis of the embodiment shown in Fig. 2, Fig. 3 is that one kind that the present invention is shown according to another exemplary embodiment is private Close system data file management method flow chart.As shown in figure 3, the present embodiment provides
Step 201, terminal device judge whether the system of present terminal equipment operation is secret system, if judging result is It is then to perform step 102.
Step 202, terminal device open the access limit of secret file.
It is worth explanatorily, the description of step 101-102 in the specific implementation reference embodiment one of step 201-202, Which is not described herein again.
Step 203, terminal device obtain secret file access instruction input by user.
Specifically, terminal device obtains secret file access instruction input by user in secret system, which refers to Order can be the instruction that user is triggered by touch screen click secret file or user opens phase by voice control The instruction for the secret file answered, is worth explanatorily, in the present embodiment, does not input secret file access instruction to user Mode specifically limited.
Step 204, terminal device start according to secret file access instruction answers with the corresponding secret of secret file Use program.
After terminal device receives secret file access instruction input by user, terminal device will start secret The corresponding secret application program of file, wherein, secret file is used for the data file for storing secret application program.Example Such as, after user clicks contact person's secret file, terminal device will start contact application, and then user can pass through Contact application accesses private contact;After user clicks short message secret file, terminal device will start short message application, Then user can pass through short message application access secret short message;User click photo, video or audio secret file it Afterwards, terminal device, which will start, sees that figure, video playing or audio play application, and then, user can be by seeing figure, video Play either audio broadcasting and apply short message application access secret photo, video or audio.
Step 205, terminal device obtain data file move input by user.
And when user needs the data file in open system being transferred in secret file, user can pass through length By this document so that this document is in quick condition, then it is dragged in secret file.For example, user can be in photo A photo is chosen in open file folder, is then dragged and is copied in photo secret file.
Step 206, the data file during terminal device presss from both sides open file according to data file move are moved to private In close file.
Step 207, terminal device obtain store path of the data file in open file folder.
After the action that terminal device completes data file movement, terminal obtains the data file in open file folder Store path, and the filename of the data file and store path are established after mapping relations and are stored in file path database In.For example, photo of the store path for the file entitled " landscape " in " Zhao Pian A open files folder " is deposited in for original, " landscape " correspondence " photo A open files folder " will be recorded after movement, in file path database.
Step 208, terminal device delete the data file in open file folder, and update the file row of secret application program Table.
After the action that terminal device completes data file movement, in order to preferably protect the secret of the data file Property, terminal device deletes the data file in open file folder, and updates the listed files of secret application program.
Step 209, terminal device are according to the listed files of secret application program, to load the text of the data in secret file Part.
Step 210, terminal device obtain data file reduction instruction input by user.
And when user needs to be transferred to the data file in secret file in open file folder, user can pass through This document causes this document to be in quick condition, then selects " disclosure " option, then terminal device will turn the data file Move in corresponding open file folder.For example, user, which can open the photo one in photo secret file in photo, carries out long-press, So that the photo is in quick condition, " disclosure " option is then selected.
Step 211, terminal device reduce the filename of instruction acquisition data file according to data file.
After user triggers data file reduction instruction, terminal device reduces instruction according to data file and obtains data The filename of file.
Step 212, terminal device filter out data file institute according to the filename and file path database of data file Corresponding store path.
, will be according to the filename and file of data file after the filename that terminal device gets file to be restored Routing database filters out the store path corresponding to data file.For example, user needs to go back the photograph that old file name is " landscape " Piece to open file press from both sides, then terminal device will be filtered out in file path database " landscape " correspondence " photo A open files Folder ", so that it is determined that the path of the photo original storage of file entitled " landscape " is " Zhao Pian A open files folder ".
Data file is moved in open file folder by step 213, terminal device according to store path.
Step 214, terminal device delete the data file in the secret file.
Fig. 4 is a kind of structure diagram of terminal device of the present invention according to an exemplary embodiment.Such as Fig. 4 institutes Show, open system and secret system are provided with terminal device provided by the embodiment, secret text is provided with the secret system Part presss from both sides, and open file folder is provided with the open system, and the terminal device includes:
Judgment module 301, whether the system for judging presently described terminal device operation is the secret system;
Opening module 302, when the system for being run when the terminal device is the secret system, opens the secret The access limit of file, wherein, the access limit of secret file is in off state described in the open system.
The terminal device that embodiment shown in Fig. 4 provides, it is real shown in above-mentioned embodiment illustrated in fig. 2 and Fig. 3 available for performing The method provided in example is applied, specific implementation is similar with technique effect, and which is not described herein again.
In a kind of possible design, the terminal device, further includes:
Acquisition module, for obtaining secret file access instruction input by user;
Starting module, for being started and the corresponding private of secret file according to the secret file access instruction Close application program, wherein, the secret file is used for the data file for storing the secret application program;
Load-on module, for the listed files according to the secret application program, to load in the secret file Data file, wherein, all data text in the secret file is shown in the listed files of the secret application program The thumbnail and filename of part.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain data file move input by user;
Mobile module, is moved for the data file during the open file is pressed from both sides according to the data file move Into the secret file;
The acquisition module, is additionally operable to obtain store path of the data file in open file folder, and will The filename of the data file and the store path are stored in file path database after establishing mapping relations;
Removing module, for deleting the data file in the open file folder, and updates the secret application journey The listed files of sequence.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain data file reduction instruction input by user;
The acquisition module, is additionally operable to the filename for reducing instruction according to the data file and obtaining the data file;
Screening module, the number is filtered out for the filename according to the data file and the file path database According to the store path corresponding to file;
The mobile module, is additionally operable to that the data file is moved to the open file folder according to the store path In;
The removing module, is additionally operable to delete the data file in the secret file.
In a kind of possible design, the terminal device, further includes:
Respond module, in response to secret system enabled instruction input by user, being used to prompt to user output User inputs the prompt message of authentication information;
The acquisition module, is additionally operable to obtain the authentication information input by user;
The judgment module, is additionally operable to judge the authentication information input by user and default authentication information It is whether consistent;
The starting module, is additionally operable to when the authentication information input by user and default authentication information one During cause, start the secret system.
In a kind of possible design, the terminal device, further includes:
Locking module, for when the authentication information input by user and default authentication information it is inconsistent When, lock the secret system.
In a kind of possible design, the terminal device, further includes:
The acquisition module, is additionally operable to obtain secret system-off instruction input by user;
Closedown module, for closing the access limit of the secret file according to the secret system-off instruction.
Fig. 5 is the hardware architecture diagram for the electronic equipment that the application provides.As shown in figure 5, electricity provided in this embodiment Sub- equipment, including:
Processor 41;And
Memory 42, for storing the executable instruction of the processor;
Wherein, the processor is configured to perform any one of foregoing embodiment of the method via the executable instruction is performed The technical solution, its implementing principle and technical effect is similar, and details are not described herein again.
The function of each module in above device can be realized by processor 41.
The application also provides a kind of computer-readable recording medium, is stored thereon with computer program, which is processed Device realizes the secret system data file management method in Fig. 2 or embodiment illustrated in fig. 3 when performing.
In the embodiment of above-mentioned terminal device, it should be appreciated that processor can be central processing unit (English:Central Processing Unit, referred to as:CPU), it can also be other general processors, digital signal processor (English:Digital Signal Processor, referred to as:DSP), application-specific integrated circuit (English:Application Specific Integrated Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor can also be any conventional place Manage device etc..Hardware processor can be embodied directly in reference to the step of method disclosed in the present application and performs completion, or use Hardware and software module combination in reason device perform completion.
Realizing all or part of step of above-mentioned each method embodiment can be completed by the relevant hardware of programmed instruction. Foregoing program can be stored in a readable access to memory.Upon execution, execution includes above-mentioned each method embodiment to the program The step of;And foregoing memory (storage medium) includes:Read-only storage (English:Read-only memory, abbreviation: ROM), RAM, flash memory, hard disk, solid state hard disc, tape (English:Magnetic tape), floppy disk (English:floppy Disk), CD (English:Optical disc) and its any combination.
Finally it should be noted that:Although this programme is described in detail with reference to foregoing embodiments, this area Those of ordinary skill should be understood:It can still modify the technical solution described in foregoing embodiments, or right Which part or all technical characteristic carry out equivalent substitution;And these modifications or replacement, appropriate technical solution can not be made Essence depart from each embodiment technical solution of the application scope.

Claims (10)

1. a kind of secret system data file management method, it is characterised in that applied to terminal device, set in the terminal device Open system and secret system are equipped with, secret file is provided with the secret system, public affairs are provided with the open system Open file is pressed from both sides, and the management method includes:
Terminal device judges whether the system of presently described terminal device operation is the secret system;
If the determination result is YES, then the terminal device opens the access limit of the secret file, wherein, in the opening The access limit of secret file described in system is in off state.
2. according to the method described in claim 1, it is characterized in that, open the reading of the secret file in the terminal device After write permission, further include:
The terminal device obtains secret file access instruction input by user;
The terminal device starts according to the secret file access instruction should with the corresponding secret of secret file With program, wherein, the secret file is used for the data file for storing the secret application program;
The terminal device is according to the listed files of the secret application program, to load the text of the data in the secret file Part, wherein, the contracting of all data files in the secret file is shown in the listed files of the secret application program Sketch map and filename.
3. according to the method described in claim 2, it is characterized in that, in the terminal device according to the secret application program Listed files, before loading the data file in the secret file, to further include:
The terminal device obtains data file move input by user;
Data file during the terminal device presss from both sides the open file according to the data file move is moved to institute State in secret file;
The terminal device obtains store path of the data file in open file folder, and by the data file Filename and the store path establish mapping relations after be stored in file path database;
The terminal device deletes the data file in the open file folder, and updates the text of the secret application program Part list.
4. according to the method described in claim 2, it is characterized in that, update the secret application program in the terminal device Listed files, after loading the data file in the secret file, further includes:
The terminal device obtains data file reduction instruction input by user;
The terminal device reduces the filename of the instruction acquisition data file according to the data file;
The terminal device filters out the data text according to the filename and the file path database of the data file The store path corresponding to part;
The data file is moved in the open file folder by the terminal device according to the store path;
The terminal device deletes the data file in the secret file.
5. according to the method described in claim 1, it is characterized in that, judge presently described terminal device fortune in the terminal device Before whether capable system is secret system, further include:
The terminal device is used to prompt user defeated in response to secret system enabled instruction input by user to user output Enter the prompt message of authentication information;
The terminal device obtains the authentication information input by user;
The terminal device judges whether the authentication information input by user and default authentication information are consistent;
If the determination result is YES, then the terminal device starts the secret system.
6. according to the method described in claim 5, it is characterized in that, the terminal device judges that the identity input by user is tested Demonstrate,prove information and whether default authentication information is consistent;If judging result is no, the terminal device locks the secret System.
7. according to the method any one of claim 1-6, it is characterised in that open the secret in the terminal device After the access limit of file, further include:
The terminal device obtains secret system-off instruction input by user;
The terminal device closes the access limit of the secret file according to the secret system-off instruction.
8. a kind of terminal device, it is characterised in that open system and secret system, the secret are provided with the terminal device Secret file is provided with system, open file folder is provided with the open system, the terminal device includes:
Judgment module, whether the system for judging presently described terminal device operation is the secret system;
Opening module, when the system for being run when the terminal device is the secret system, opens the secret file Access limit, wherein, the access limit of secret file is in off state described in the open system.
9. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is held by processor Claim 1-7 any one of them secret system data file management methods are realized during row.
10. a kind of electronic equipment, it is characterised in that including:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to carry out perform claim requirement 1-7 any one of them via the execution executable instruction Secret system data file management method.
CN201711466362.XA 2017-12-28 2017-12-28 Private system data file management method and terminal equipment Active CN107911820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711466362.XA CN107911820B (en) 2017-12-28 2017-12-28 Private system data file management method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711466362.XA CN107911820B (en) 2017-12-28 2017-12-28 Private system data file management method and terminal equipment

Publications (2)

Publication Number Publication Date
CN107911820A true CN107911820A (en) 2018-04-13
CN107911820B CN107911820B (en) 2021-02-09

Family

ID=61871933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711466362.XA Active CN107911820B (en) 2017-12-28 2017-12-28 Private system data file management method and terminal equipment

Country Status (1)

Country Link
CN (1) CN107911820B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium
CN109063504A (en) * 2018-07-02 2018-12-21 北京珠穆朗玛移动通信有限公司 Access method, mobile terminal and the storage medium of secret file
CN109815668A (en) * 2019-01-10 2019-05-28 北京珠穆朗玛移动通信有限公司 Dual system method for controlling mobile terminal, mobile terminal and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855432A (en) * 2011-06-27 2013-01-02 奇智软件(北京)有限公司 Document and document folder unlocking and deleting method and system
US20130185555A1 (en) * 2012-01-17 2013-07-18 Apple Inc. System and method for secure erase in copy-on-write file systems
CN105574425A (en) * 2015-04-30 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Method and device for accessing stored data
CN106056000A (en) * 2016-06-24 2016-10-26 北京奇虎科技有限公司 System authority-based mobile device storage partition configuration method and apparatus
US20170041296A1 (en) * 2015-08-05 2017-02-09 Intralinks, Inc. Systems and methods of secure data exchange
CN106919849A (en) * 2015-12-24 2017-07-04 北京三星通信技术研究有限公司 Method for secret protection and device
CN107145794A (en) * 2017-04-20 2017-09-08 北京安云世纪科技有限公司 A kind of data processing method and device and mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855432A (en) * 2011-06-27 2013-01-02 奇智软件(北京)有限公司 Document and document folder unlocking and deleting method and system
US20130185555A1 (en) * 2012-01-17 2013-07-18 Apple Inc. System and method for secure erase in copy-on-write file systems
CN105574425A (en) * 2015-04-30 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Method and device for accessing stored data
US20170041296A1 (en) * 2015-08-05 2017-02-09 Intralinks, Inc. Systems and methods of secure data exchange
CN106919849A (en) * 2015-12-24 2017-07-04 北京三星通信技术研究有限公司 Method for secret protection and device
CN106056000A (en) * 2016-06-24 2016-10-26 北京奇虎科技有限公司 System authority-based mobile device storage partition configuration method and apparatus
CN107145794A (en) * 2017-04-20 2017-09-08 北京安云世纪科技有限公司 A kind of data processing method and device and mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
姚一楠: "《双操作系统移动智能终端安全分析》", 《移动通信》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium
CN109063504A (en) * 2018-07-02 2018-12-21 北京珠穆朗玛移动通信有限公司 Access method, mobile terminal and the storage medium of secret file
CN109063504B (en) * 2018-07-02 2024-02-23 北京珠穆朗玛移动通信有限公司 Private file access method, mobile terminal and storage medium
CN109815668A (en) * 2019-01-10 2019-05-28 北京珠穆朗玛移动通信有限公司 Dual system method for controlling mobile terminal, mobile terminal and storage medium

Also Published As

Publication number Publication date
CN107911820B (en) 2021-02-09

Similar Documents

Publication Publication Date Title
JP4874288B2 (en) Data storage and access to mobile devices and user modules
US8045714B2 (en) Systems and methods for managing multiple keys for file encryption and decryption
US20120324546A1 (en) Providing Secure Dynamic Role Selection and Managing Privileged User Access From a Client Device
US20090077096A1 (en) System and method of managing file and mobile terminal device
US10979450B2 (en) Method and system for blocking phishing or ransomware attack
US9378344B2 (en) Method and apparatus for protecting information based on data card
CN107911820A (en) Secret system data file management method and terminal device
CN101371259A (en) File management system and method, and mobile terminal
CN105335197B (en) The starting control method and device of application program in terminal
US9015826B2 (en) Mobile platform security apparatus and method
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN114730337A (en) Cryptographic key management
CN107767133A (en) Virtual card opens chucking method, apparatus and system, storage medium
KR100975133B1 (en) Security management system for portable memory devices and security management method using the same
CN108319867A (en) Dualized file divulgence prevention method and system based on HOOK and window filter
CN106658463A (en) Operating system login method, device and terminal
CN106681662B (en) Document handling method and mobile terminal based on dual system
CN113779636A (en) File burning control method and device, electronic equipment and storage medium
CN107920153A (en) A kind of mobile terminal and fingerprint recording operation processing method and storage medium
CN107704337A (en) Method, mobile terminal and the device with store function of factory reset
KR20050063174A (en) Personal terminal with multiple password system and control method thereof
JP4866858B2 (en) Data processing apparatus and processing method
WO2002073552A1 (en) Verification of access compliance of subjects with objects in a data processing system with a security policy
CN112632518A (en) Data access method, device, terminal and storage medium
KR100654043B1 (en) Mobile telecommunications terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant