CN107911820B - Private system data file management method and terminal equipment - Google Patents

Private system data file management method and terminal equipment Download PDF

Info

Publication number
CN107911820B
CN107911820B CN201711466362.XA CN201711466362A CN107911820B CN 107911820 B CN107911820 B CN 107911820B CN 201711466362 A CN201711466362 A CN 201711466362A CN 107911820 B CN107911820 B CN 107911820B
Authority
CN
China
Prior art keywords
private
folder
terminal equipment
data file
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711466362.XA
Other languages
Chinese (zh)
Other versions
CN107911820A (en
Inventor
黎小松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN201711466362.XA priority Critical patent/CN107911820B/en
Publication of CN107911820A publication Critical patent/CN107911820A/en
Application granted granted Critical
Publication of CN107911820B publication Critical patent/CN107911820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0264Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by selectively disabling software applications
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides a private system data file management method and terminal equipment. The method is applied to terminal equipment, an open system and a private system are arranged in the terminal equipment, a private folder is arranged in the private system, and a public folder is arranged in the open system, and the method comprises the following steps: the terminal equipment judges whether a system operated by the current terminal equipment is a private system or not; and if the judgment result is yes, the terminal equipment opens the read-write permission of the private folder, wherein the read-write permission of the private folder in the open system is in a closed state. The read-write access authority of the private folder is controlled, so that the data files in the folder cannot be accessed in an open system, indirect encryption is realized, when the private system is accessed, the read-write access authority of each private folder is opened, but the data files in the private folders are not encrypted, so that extra decryption is not needed during reading and writing, and the read-write speed of the data files in the private system is greatly improved.

Description

Private system data file management method and terminal equipment
Technical Field
The present application relates to the field of communications, and in particular, to a method for managing data files of a private system and a terminal device.
Background
With the development of communication technology, users also store more and more data on terminal devices, wherein the more and more data include many personal private information, such as private contacts, private short messages, private communication records, private photos, private videos, private documents, private audios, and the like, and even store some commercial confidential information in the terminal devices. The data is stored on the terminal equipment, which brings great convenience to life and work of people, but also greatly increases the possibility of user information leakage.
At present, many terminal equipment manufacturers differentiate storage paths of user data by installing dual systems in terminal equipment, that is, one is an open system, and the other is a private system. For an open system, a user can freely enter the open system and access related data files in the open system; but for a private system it is necessary that the user can enter after a corresponding authentication. In the privacy system in the prior art, privacy protection of data files is generally realized by encrypting the whole fixed space or individually encrypting each data file in the fixed space, and only after a user inputs a correct password, the system decrypts the private files for the user to access.
However, since the data files in the existing private system are all encrypted data, the access to such data files requires a re-decryption operation, which results in a phenomenon that the data reading speed in the private system is too slow, and seriously affects the user experience.
Disclosure of Invention
The invention provides an application program management method and terminal equipment, which are used for cleaning unnecessary application programs when the terminal equipment locks a screen, greatly saving electric quantity, recovering necessary related application programs after a user unlocks the terminal equipment again, and further improving user experience.
In a first aspect, the present invention provides a method for managing data files of a private system, which is applied to a terminal device, wherein the terminal device is provided with an open system and a private system, the private system is provided with a private folder, the open system is provided with a public folder, and the method for managing data files of the private system comprises:
the terminal equipment judges whether a system operated by the current terminal equipment is the private system or not;
and if the judgment result is yes, the terminal equipment opens the read-write permission of the private folder, wherein the read-write permission of the private folder in the open system is in a closed state.
In a possible design, after the terminal device opens the read-write permission of the private folder, the method further includes:
the terminal equipment acquires a private folder access instruction input by a user;
the terminal equipment starts a private application program corresponding to the private folder according to the private folder access instruction, wherein the private folder is used for storing a data file of the private application program;
and the terminal equipment loads the data files in the private folder according to the file list of the private application program, wherein thumbnails and file names of all the data files in the private folder are displayed in the file list of the private application program.
In a possible design, before the terminal device loads the data file in the private folder according to the file list of the private application, the method further includes:
the terminal equipment acquires a data file moving instruction input by a user;
the terminal equipment moves the data files in the public folder to the private folder according to the data file moving instruction;
the terminal equipment acquires a storage path of the data file in the public folder, establishes a mapping relation between the file name of the data file and the storage path and stores the mapping relation in a file path database;
and the terminal equipment deletes the data file in the public folder and updates a file list of the private application program.
In one possible design, after the terminal device updates the file list of the private application to load the data file in the private folder, the method further includes:
the terminal equipment acquires a data file reduction instruction input by a user;
the terminal equipment acquires the file name of the data file according to the data file reduction instruction;
the terminal equipment screens out the storage path corresponding to the data file according to the file name of the data file and the file path database;
the terminal equipment moves the data file to the public folder according to the storage path;
and the terminal equipment deletes the data file in the private folder.
In a possible design, before the terminal device determines whether a system currently operated by the terminal device is a private system, the method further includes:
the terminal equipment responds to a private system starting instruction input by a user and outputs prompt information for prompting the user to input authentication information to the user;
the terminal equipment acquires the identity authentication information input by the user;
the terminal equipment judges whether the authentication information input by the user is consistent with preset authentication information or not;
and if the judgment result is yes, the terminal equipment starts the private system.
In one possible design, the terminal device determines whether the authentication information input by the user is consistent with preset authentication information; and if the judgment result is negative, the terminal equipment locks the private system.
In a possible design, after the terminal device opens the read-write permission of the private folder, the method further includes:
the terminal equipment acquires a private system closing instruction input by a user;
and the terminal equipment closes the read-write permission of the private folder according to the private system closing instruction.
In a second aspect, the present invention provides a terminal device, where the terminal device is provided with an open system and a private system, the private system is provided with a private folder, the open system is provided with a public folder, and the terminal device includes:
the judging module is used for judging whether a system operated by the current terminal equipment is the private system or not;
and the opening module is used for opening the read-write permission of the private folder when the system operated by the terminal equipment is the private system, wherein the read-write permission of the private folder in the open system is in a closed state.
In one possible design, the terminal device further includes:
the acquisition module is used for acquiring a private folder access instruction input by a user;
the starting module is used for starting a private application program corresponding to the private folder according to the private folder access instruction, wherein the private folder is used for storing a data file of the private application program;
and the loading module is used for loading the data files in the private folder according to the file list of the private application program, wherein thumbnails and file names of all the data files in the private folder are displayed in the file list of the private application program.
In one possible design, the terminal device further includes:
the acquisition module is also used for acquiring a data file moving instruction input by a user;
the moving module is used for moving the data files in the public folder to the private folder according to the data file moving instruction;
the acquisition module is further configured to acquire a storage path of the data file in the public folder, and store the file name of the data file and the storage path in a file path database after establishing a mapping relationship;
and the deleting module is used for deleting the data files in the public folder and updating the file list of the private application program.
In one possible design, the terminal device further includes:
the acquisition module is also used for acquiring a data file reduction instruction input by a user;
the obtaining module is further configured to obtain a file name of the data file according to the data file reduction instruction;
the screening module is used for screening out the storage path corresponding to the data file according to the file name of the data file and the file path database;
the moving module is further used for moving the data file to the public folder according to the storage path;
the deleting module is further configured to delete the data file in the private folder.
In one possible design, the terminal device further includes:
the response module is used for responding to a private system starting instruction input by a user and outputting prompt information for prompting the user to input authentication information to the user;
the acquisition module is further used for acquiring the identity authentication information input by the user;
the judging module is also used for judging whether the authentication information input by the user is consistent with the preset authentication information;
the starting module is further configured to start the private system when the authentication information input by the user is consistent with preset authentication information.
In one possible design, the terminal device further includes:
and the locking module is used for locking the private system when the authentication information input by the user is inconsistent with the preset authentication information.
In one possible design, the terminal device further includes:
the acquisition module is also used for acquiring a private system closing instruction input by a user;
and the closing module is used for closing the read-write permission of the private folder according to the private system closing instruction.
In a third aspect, a computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the first aspect and various possible related methods of managing data files of a privacy system as described in the first aspect.
In a fourth aspect, the present invention further provides an electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the first aspect and various possible related private system data file management methods of the first aspect via execution of the executable instructions.
The invention provides an application program management method, which determines whether to open the read-write permission of a private folder by judging whether a system currently operated by a terminal device is a private system or an open system. By controlling the read-write access authority of the private folder, each application or process can not access the data file in the folder in the open system, so that indirect encryption is realized, and when the private system is accessed, the read-write access authority of each private folder is opened, but because the data file in the private folder is not encrypted in the private system, an additional decryption process is not needed during reading and writing, the realization is very efficient and simple, and the read-write speed of the data file in the private system is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic view of an optional usage scenario of a data file management method for a private system according to the present invention;
FIG. 2 is a flowchart illustrating a method for managing data files of a privacy system according to an exemplary embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for privacy system data file management according to another exemplary embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating an electronic device according to an exemplary embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of an electronic device provided in the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic view of an optional application management method according to the present invention. As shown in fig. 1, in the present embodiment, an open system and a private system are provided in a terminal device, wherein a private folder is provided in the private system, and a public folder is provided in the open system. Fig. 1 shows an interface for managing the memory of the terminal device in the private system, where the interface shows that the private system may include a private photo folder, a private contact folder, a private short message folder, a private video folder, and a private audio folder. The user can only read and write the private folder after entering the private system, and if the user is in the open system, the user does not have the authority to read and write the private folder.
Fig. 2 is a flowchart illustrating a method for managing data files of a private system according to an exemplary embodiment of the present invention. As shown in fig. 2, the method for managing data files of a private system provided in this embodiment includes:
step 101, the terminal device judges whether the system operated by the current terminal device is a private system, if so, step 102 is executed.
Specifically, the terminal device may obtain system information of a system operated by the current terminal device, and then determine whether the system operated by the current terminal device is a private system by comparing the system information with system information in a preset list. For example, if the system name of the open system set in the terminal device is KF and the system name of the private system set in the terminal device is SM, if the system name in the system information of the system operated by the current terminal device, which is acquired by the terminal device, is KF, it is determined that the system operated by the current terminal device is the open system; and if the system name in the system information of the system operated by the current terminal equipment, which is acquired by the terminal equipment, is SM, determining that the system operated by the current terminal equipment is a private system.
Usually, when a user selects to enter a private system, the user also needs to pass corresponding identity authentication. After the terminal device receives a private system starting instruction for starting the private system by a user, prompt information for prompting the user to input authentication information is output to the user, wherein specific prompt information can be that the user inputs a corresponding password, inputs a fingerprint or inputs a face. After the user obtains the input authentication information prompt information provided by the terminal device, the user can input corresponding authentication information according to the prompt, the authentication information can be a character password, such as a pure digital password, or a combination of a number and a letter, and can also be biological characteristics such as fingerprint information, iris information or face information, wherein the security of the private system can be higher by adopting the biological characteristics.
After the terminal equipment acquires the identity authentication information input by the user, the terminal equipment judges whether the identity authentication information input by the user is consistent with the preset identity authentication information or not, and if the judgment result is yes, the private system is started; if the judgment result is negative, the terminal equipment locks the private system. In order to prevent unexpected errors in the process of inputting the user identification verification information, when the terminal equipment judges that the authentication information input by the user is inconsistent with the preset authentication information for the first time, the terminal equipment prompts the user to input the user identification verification information again, the user can input the user identification verification information again according to the prompt, and when the user identification verification information input by the user is continuously incorrect, the terminal equipment locks the private system.
And 102, the terminal equipment opens the read-write permission of the private folder.
Specifically, when the terminal device determines that the currently started system is the private system, the terminal device will open the read-write permission of the private folder, so that the private folder can be accessed in the private system. And after the terminal device obtains the private system closing instruction input by the user, the terminal device will quit the private system, at this moment, the terminal device will close the read-write permission of all the private folders according to the private system closing instruction, and then the terminal device will quit from the private system and enter the open system. In the open system, the read-write authority of the private folder is in a closed state, so that in the open system, a user cannot perform any read-write operation on the data file in the private folder.
In this embodiment, whether to open the read-write permission of the private folder is determined by judging whether the system currently operated by the terminal device is a private system or an open system, and when the system currently operated by the terminal device is the private system, the read-write permission of the private folder is opened, and when the system currently operated by the terminal device is the open system, the read-write permission of the private folder is closed. By controlling the read-write access authority of the private folder, each application or process can not access the data file in the folder in the open system, so that indirect encryption is realized, and when the private system is accessed, the read-write access authority of each private folder is opened, but because the data file in the private folder is not encrypted in the private system, an additional decryption process is not needed during reading and writing, the realization is very efficient and simple, and the read-write speed of the data file in the private system is greatly improved.
Based on the embodiment shown in fig. 2, fig. 3 is a flowchart illustrating a method for managing data files of a privacy system according to another exemplary embodiment of the present invention. As shown in FIG. 3, the present embodiment provides
Step 201, the terminal device determines whether the system operated by the current terminal device is a private system, and if the determination result is yes, step 102 is executed.
Step 202, the terminal equipment opens the read-write permission of the private folder.
It should be noted that, the specific implementation manner of the steps 201-202 refers to the description of the steps 101-102 in the first embodiment, and is not described herein again.
Step 203, the terminal device obtains a private folder access instruction input by the user.
Specifically, the terminal device obtains a private folder access instruction input by a user in the private system, where the access instruction may be an instruction triggered by the user clicking a private folder through a touch screen, or may also be an instruction for the user to open a corresponding private folder through voice control, and it is worth to say that, in this embodiment, a specific limitation is not performed on a manner in which the user inputs the private folder access instruction.
And step 204, the terminal equipment starts a private application program corresponding to the private folder according to the private folder access instruction.
After the terminal device receives a private folder access instruction input by a user, the terminal device starts a private application program corresponding to the private folder, wherein the private folder is used for storing data files of the private application program. For example, after the user clicks a contact private file, the terminal device starts a contact application, and then the user can access the private contact through the contact application; after the user clicks the short message private file, the terminal equipment starts the short message application, and then the user can access the private short message through the short message application; after the user clicks the private photo, video or audio file, the terminal device starts an application for viewing pictures, playing videos or playing audios, and then the user can access the private photo, video or audio through a short message application of the application for viewing pictures, playing videos or playing audios.
Step 205, the terminal device obtains a data file movement instruction input by the user.
When the user needs to transfer the data file in the open system to the private folder, the user can make the file in a floating state by long-pressing the file, and then drag the file to the private folder. For example, a user may select a photo in the photo public folder and then drag copy it into the photo private folder.
And step 206, the terminal equipment moves the data files in the public folder to the private folder according to the data file moving instruction.
Step 207, the terminal device obtains the storage path of the data file in the public folder.
After the terminal equipment completes the movement of the data file, the terminal acquires the storage path of the data file in the public folder, establishes a mapping relation between the file name and the storage path of the data file and stores the mapping relation in a file path database. For example, for a photo with a file name of "landscape" originally stored in the "photo \ a public folder" storage path, after moving, the "landscape" corresponding to the "photo \ a public folder" is recorded in the file path database.
And step 208, the terminal equipment deletes the data file in the public folder and updates the file list of the private application program.
After the terminal device completes the action of moving the data file, in order to better protect the privacy of the data file, the terminal device deletes the data file in the public folder and updates the file list of the private application program.
And step 209, the terminal equipment loads the data file in the private folder according to the file list of the private application program.
Step 210, the terminal device obtains a data file restoration instruction input by the user.
When the user needs to transfer the data file in the private folder to the public folder, the user can enable the file to be in a floating state through the file, and then selects the 'public' option, so that the terminal device can transfer the data file to the corresponding public folder. For example, the user may long press a photo in the photo private folder, so that the photo is in a floating state, and then select the "public" option.
And step 211, the terminal device acquires the file name of the data file according to the data file reduction instruction.
After the user triggers the data file reduction instruction, the terminal equipment acquires the file name of the data file according to the data file reduction instruction.
And step 212, the terminal device screens out a storage path corresponding to the data file according to the file name of the data file and the file path database.
After the terminal device obtains the file name of the file to be restored, the storage path corresponding to the data file is screened out according to the file name of the data file and the file path database. For example, if the user needs to restore a photo with a "landscape" file name to the public folder, the terminal device will screen out the "landscape" corresponding to the "photo \ a public folder in the file path database, so as to determine that the path of the original storage of the photo with the" landscape "file name is the" photo \ a public folder ".
And step 213, the terminal device moves the data file to the public folder according to the storage path.
And step 214, the terminal equipment deletes the data file in the private folder.
Fig. 4 is a schematic structural diagram of a terminal device according to an exemplary embodiment of the present invention. As shown in fig. 4, the terminal device provided in this embodiment is provided with an open system and a private system, the private system is provided with a private folder, the open system is provided with a public folder, and the terminal device includes:
a judging module 301, configured to judge whether a system currently running on the terminal device is the private system;
an opening module 302, configured to open, when the system in which the terminal device operates is the private system, the read-write permission of the private folder, where the read-write permission of the private folder in the open system is in a closed state.
The terminal device provided in the embodiment shown in fig. 4 may be configured to execute the method provided in the embodiments shown in fig. 2 and fig. 3, and the specific implementation manner and the technical effect are similar and are not described again here.
In one possible design, the terminal device further includes:
the acquisition module is used for acquiring a private folder access instruction input by a user;
the starting module is used for starting a private application program corresponding to the private folder according to the private folder access instruction, wherein the private folder is used for storing a data file of the private application program;
and the loading module is used for loading the data files in the private folder according to the file list of the private application program, wherein thumbnails and file names of all the data files in the private folder are displayed in the file list of the private application program.
In one possible design, the terminal device further includes:
the acquisition module is also used for acquiring a data file moving instruction input by a user;
the moving module is used for moving the data files in the public folder to the private folder according to the data file moving instruction;
the acquisition module is further configured to acquire a storage path of the data file in the public folder, and store the file name of the data file and the storage path in a file path database after establishing a mapping relationship;
and the deleting module is used for deleting the data files in the public folder and updating the file list of the private application program.
In one possible design, the terminal device further includes:
the acquisition module is also used for acquiring a data file reduction instruction input by a user;
the obtaining module is further configured to obtain a file name of the data file according to the data file reduction instruction;
the screening module is used for screening out the storage path corresponding to the data file according to the file name of the data file and the file path database;
the moving module is further used for moving the data file to the public folder according to the storage path;
the deleting module is further configured to delete the data file in the private folder.
In one possible design, the terminal device further includes:
the response module is used for responding to a private system starting instruction input by a user and outputting prompt information for prompting the user to input authentication information to the user;
the acquisition module is further used for acquiring the identity authentication information input by the user;
the judging module is also used for judging whether the authentication information input by the user is consistent with the preset authentication information;
the starting module is further configured to start the private system when the authentication information input by the user is consistent with preset authentication information.
In one possible design, the terminal device further includes:
and the locking module is used for locking the private system when the authentication information input by the user is inconsistent with the preset authentication information.
In one possible design, the terminal device further includes:
the acquisition module is also used for acquiring a private system closing instruction input by a user;
and the closing module is used for closing the read-write permission of the private folder according to the private system closing instruction.
Fig. 5 is a schematic diagram of a hardware structure of an electronic device provided in the present application. As shown in fig. 5, the electronic device provided in this embodiment includes:
a processor 41; and
a memory 42 for storing executable instructions of the processor;
the processor is configured to execute the technical solution of any one of the foregoing method embodiments by executing the executable instructions, and the implementation principle and technical effect thereof are similar, and are not described herein again.
The functions of the modules in the above-described apparatus may be implemented by the processor 41.
The present application also provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the method for managing data files of a privacy system in the embodiment shown in fig. 2 or fig. 3.
In the above embodiments of the terminal device, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present application may be embodied directly in a hardware processor, or in a combination of the hardware and software modules in the processor.
All or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The aforementioned program may be stored in a readable memory. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned memory (storage medium) includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape (magnetic tape), floppy disk (flexible disk), optical disk (optical disk), and any combination thereof.
Finally, it should be noted that: while the present solution has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; however, these modifications and substitutions do not cause the essential features of the corresponding technical solutions to depart from the scope of the technical solutions of the embodiments of the present application.

Claims (7)

1. A private system data file management method is characterized in that the method is applied to terminal equipment, an open system and a private system are arranged in the terminal equipment, a private folder is arranged in the private system, a public folder is arranged in the open system, and the management method comprises the following steps:
the terminal equipment judges whether a system operated by the current terminal equipment is the private system or not;
if the judgment result is yes, the terminal equipment opens the read-write permission of the private folder, wherein the read-write permission of the private folder in the open system is in a closed state;
after the terminal device opens the read-write permission of the private folder, the method further includes:
the terminal equipment acquires a private folder access instruction input by a user;
the terminal equipment starts a private application program corresponding to the private folder according to the private folder access instruction, wherein the private folder is used for storing a data file of the private application program;
the terminal equipment loads the data files in the private folder according to the file list of the private application program, wherein thumbnails and file names of all the data files in the private folder are displayed in the file list of the private application program;
before the terminal device loads the data file in the private folder according to the file list of the private application program, the method further includes:
the terminal equipment acquires a data file moving instruction input by a user;
the terminal equipment moves the data files in the public folder to the private folder according to the data file moving instruction;
the terminal equipment acquires a storage path of the data file in the public folder, establishes a mapping relation between the file name of the data file and the storage path and stores the mapping relation in a file path database;
the terminal equipment deletes the data file in the public folder and updates a file list of the private application program;
the terminal equipment acquires a private system closing instruction input by a user;
and the terminal equipment closes the read-write permission of the private folder according to the private system closing instruction.
2. The method of claim 1, wherein after the terminal device updates the file list of the private application to load the data file in the private folder, the method further comprises:
the terminal equipment acquires a data file reduction instruction input by a user;
the terminal equipment acquires the file name of the data file according to the data file reduction instruction;
the terminal equipment screens out the storage path corresponding to the data file according to the file name of the data file and the file path database;
the terminal equipment moves the data file to the public folder according to the storage path;
and the terminal equipment deletes the data file in the private folder.
3. The method according to claim 1, before the terminal device determines whether the system currently operated by the terminal device is a private system, further comprising:
the terminal equipment responds to a private system starting instruction input by a user and outputs prompt information for prompting the user to input authentication information to the user;
the terminal equipment acquires the identity authentication information input by the user;
the terminal equipment judges whether the authentication information input by the user is consistent with preset authentication information or not;
and if the judgment result is yes, the terminal equipment starts the private system.
4. The method according to claim 3, wherein the terminal device determines whether the authentication information input by the user is consistent with preset authentication information; and if the judgment result is negative, the terminal equipment locks the private system.
5. The utility model provides a terminal equipment, its characterized in that is provided with open system and private system among the terminal equipment, be provided with the private folder among the private system, be provided with the public folder among the open system, terminal equipment includes:
the judging module is used for judging whether a system operated by the current terminal equipment is the private system or not;
the opening module is used for opening the read-write permission of the private folder when the system operated by the terminal equipment is the private system, wherein the read-write permission of the private folder in the open system is in a closed state;
wherein, the terminal equipment still includes:
the acquisition module is used for acquiring a private folder access instruction input by a user;
the starting module is used for starting a private application program corresponding to the private folder according to the private folder access instruction, wherein the private folder is used for storing a data file of the private application program;
the loading module is used for loading the data files in the private folder according to the file list of the private application program, wherein thumbnails and file names of all the data files in the private folder are displayed in the file list of the private application program;
wherein, the terminal equipment still includes:
the acquisition module is also used for acquiring a data file moving instruction input by a user;
the moving module is used for moving the data files in the public folder to the private folder according to the data file moving instruction;
the acquisition module is further configured to acquire a storage path of the data file in the public folder, and store the file name of the data file and the storage path in a file path database after establishing a mapping relationship;
the deleting module is used for deleting the data files in the public folder and updating the file list of the private application program;
the acquisition module is also used for acquiring a private system closing instruction input by a user;
and the closing module is used for closing the read-write permission of the private folder according to the private system closing instruction.
6. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the privacy system data file management method of any one of claims 1 to 4.
7. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the privacy system data file management method of any one of claims 1-4 via execution of the executable instructions.
CN201711466362.XA 2017-12-28 2017-12-28 Private system data file management method and terminal equipment Active CN107911820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711466362.XA CN107911820B (en) 2017-12-28 2017-12-28 Private system data file management method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711466362.XA CN107911820B (en) 2017-12-28 2017-12-28 Private system data file management method and terminal equipment

Publications (2)

Publication Number Publication Date
CN107911820A CN107911820A (en) 2018-04-13
CN107911820B true CN107911820B (en) 2021-02-09

Family

ID=61871933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711466362.XA Active CN107911820B (en) 2017-12-28 2017-12-28 Private system data file management method and terminal equipment

Country Status (1)

Country Link
CN (1) CN107911820B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108804932A (en) * 2018-05-29 2018-11-13 北京珠穆朗玛移动通信有限公司 Picture storage method, mobile terminal and storage medium
CN109063504B (en) * 2018-07-02 2024-02-23 北京珠穆朗玛移动通信有限公司 Private file access method, mobile terminal and storage medium
CN109815668A (en) * 2019-01-10 2019-05-28 北京珠穆朗玛移动通信有限公司 Dual system method for controlling mobile terminal, mobile terminal and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855432A (en) * 2011-06-27 2013-01-02 奇智软件(北京)有限公司 Document and document folder unlocking and deleting method and system
CN106056000A (en) * 2016-06-24 2016-10-26 北京奇虎科技有限公司 System authority-based mobile device storage partition configuration method and apparatus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8762431B2 (en) * 2012-01-17 2014-06-24 Apple Inc. System and method for secure erase in copy-on-write file systems
CN105574425B (en) * 2015-04-30 2018-06-15 宇龙计算机通信科技(深圳)有限公司 Access the method and device of storage data
US10033702B2 (en) * 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange
CN117633868A (en) * 2015-12-24 2024-03-01 北京三星通信技术研究有限公司 Privacy protection method and device
CN107145794B (en) * 2017-04-20 2021-01-12 北京安云世纪科技有限公司 Data processing method and device and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855432A (en) * 2011-06-27 2013-01-02 奇智软件(北京)有限公司 Document and document folder unlocking and deleting method and system
CN106056000A (en) * 2016-06-24 2016-10-26 北京奇虎科技有限公司 System authority-based mobile device storage partition configuration method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《双操作系统移动智能终端安全分析》;姚一楠;《移动通信》;20171115;全文 *

Also Published As

Publication number Publication date
CN107911820A (en) 2018-04-13

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US9569605B1 (en) Systems and methods for enabling biometric authentication options
CN105519038B (en) User input data protection method and system
US10016083B1 (en) Secure mailbox and a mailbox application in a connected user device
CN107911820B (en) Private system data file management method and terminal equipment
US9800577B2 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
CN105138252B (en) Control method and electronic equipment
US20070022478A1 (en) Information processing apparatus and method of ensuring security thereof
CN105701420B (en) A kind of management method and terminal of user data
WO2016155072A1 (en) Method and apparatus for hiding and opening applications
CN106599115B (en) Data protection method, device and terminal
CN103324874A (en) Verification method and electronic device
CN106909827A (en) Using account management method and device
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
WO2020024686A1 (en) Facial recognition-based differential application loading method and apparatus, and terminal device
CN109857505A (en) Execution method, apparatus, terminal and the storage medium of operation
WO2019011083A1 (en) Private information processing method and apparatus, and mobile terminal
WO2018049883A1 (en) File operation method and device
CN107704337B (en) Factory setting restoring method, mobile terminal and device with storage function
CN113779636A (en) File burning control method and device, electronic equipment and storage medium
TWI779230B (en) Method, system, device and device for enabling biometric application function
US11372961B2 (en) Method and device for assigning application usage permission
KR101763184B1 (en) File recovery method using backup
JP2017060154A (en) Digital evidence creation device, digital evidence creation program, and digital evidence creation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant