CN109558749B - Data storage method, terminal and computer storage medium - Google Patents

Data storage method, terminal and computer storage medium Download PDF

Info

Publication number
CN109558749B
CN109558749B CN201811430919.9A CN201811430919A CN109558749B CN 109558749 B CN109558749 B CN 109558749B CN 201811430919 A CN201811430919 A CN 201811430919A CN 109558749 B CN109558749 B CN 109558749B
Authority
CN
China
Prior art keywords
application software
instruction
data
folder
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811430919.9A
Other languages
Chinese (zh)
Other versions
CN109558749A (en
Inventor
李洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201811430919.9A priority Critical patent/CN109558749B/en
Publication of CN109558749A publication Critical patent/CN109558749A/en
Application granted granted Critical
Publication of CN109558749B publication Critical patent/CN109558749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a data storage method, which is applied to a terminal and comprises the following steps: the method comprises the steps of receiving a data acquisition instruction aiming at first application software on a terminal, acquiring data of the first application software according to the data acquisition instruction, judging whether the first application software is application software of a preset secret-related class, and storing the data of the first application software in a secret-related folder of the first application software when the first application software is the application software of the preset secret-related class, wherein the secret-related folder of the first application software is a folder provided with a reading permission aiming at the first application software. The embodiment of the application also provides a terminal and a computer storage medium.

Description

Data storage method, terminal and computer storage medium
Technical Field
The present application relates to a technology for preventing leakage of confidential information in application software, and in particular, to a data storage method, a terminal, and a computer storage medium.
Background
The mobile phone is used as a portable communication device to bring great convenience to the communication of people, and nowadays, people utilize instant messaging software to communicate daily and in work. For example, many companies implement projects for convenience and efficiency, and many communications on the projects are discussed in WeChat or are communicated on instant messaging tools developed by their companies.
However, although internal instant messaging tools are used, many items of confidentiality, especially commercial confidentiality, are easily revealed by users in some ways, for example, by means of screenshot, document saving, and the like; therefore, the existing protection for the confidential information on the confidential application software is not perfect enough, and the protection for the confidential information is not beneficial.
Disclosure of Invention
The embodiment of the application is expected to provide a data storage method, a terminal and a computer storage medium, which can effectively improve the protection of secret-related information on secret-related application software.
The technical scheme of the application is realized as follows:
the embodiment of the application provides a data storage method, which is applied to a terminal and comprises the following steps:
receiving a data acquisition instruction aiming at first application software on the terminal;
acquiring data of the first application software according to the data acquisition instruction;
judging whether the first application software is a preset secret-related application software or not;
when the first application software is the preset secret-related application software, storing the data of the first application software in a secret-related folder of the first application software;
and the confidential folder of the first application software is a folder which is provided with a reading permission aiming at the first application software.
In the above method, after storing the data of the first application software in the confidential folder of the first application software, the method further comprises:
receiving a reading instruction of a secret-related folder of the first application software from second application software on the terminal;
judging whether the second application software is the same as the first application software;
when the second application software is the same as the first application software, reading corresponding data from a confidential folder of the first application software according to the reading instruction;
when the second application software is different from the first application software, generating first prompt information;
the first prompt message is used for prompting that the reading instruction is an illegal instruction.
In the above method, after reading corresponding data from the confidential folder of the first application software according to the reading instruction, the method further includes:
and deleting the corresponding data read from the confidential folder of the first application software.
In the above method, the deleting reading corresponding data from the confidential folder of the first application software includes:
judging whether the available storage capacity of the confidential folder of the first application software is less than or equal to a first preset threshold value or not;
and when the available storage capacity of the confidential folder of the first application software is less than or equal to a first preset threshold value, deleting the corresponding data read from the confidential folder of the first application software.
In the above method, the data obtaining instruction includes:
a screenshot instruction, or a save instruction.
In the above method, when the data obtaining instruction is the screenshot instruction, correspondingly, obtaining the data of the first application software according to the data obtaining instruction includes:
intercepting a picture of the first application software according to the screenshot instruction;
after storing the data of the first application software in a confidential folder of the first application software, the method further comprises:
receiving an editing instruction of a picture aiming at the first application software;
editing the picture of the first application software according to the editing instruction;
storing the edited picture of the first application software in a confidential folder of the first application software;
or receiving a sending instruction of first application software from the terminal aiming at the picture of the first application software;
and sending the picture of the first application software to each target object according to each target object in the first application software carried in the sending instruction.
In the above method, after storing the data of the first application software in the confidential folder of the first application software, the method further comprises:
receiving a copy instruction of interface information aiming at the first application software, or receiving a copy instruction of data in a confidential folder aiming at the first application software;
generating second prompt information;
and the second prompt message is used for prompting that the copy instruction is an illegal instruction.
The embodiment of the application provides a terminal, the terminal includes:
the receiving unit is used for receiving a data acquisition instruction aiming at first application software on the terminal;
the acquisition unit is used for acquiring the data of the first application software according to the data acquisition instruction;
the judging unit is used for judging whether the first application software is preset secret-related application software or not;
the storage unit is used for storing the data of the first application software into a secret folder of the first application software when the first application software is the preset secret-related application software;
and the confidential folder of the first application software is a folder which is provided with a reading permission aiming at the first application software.
In the above terminal, the terminal is further configured to:
after the data of the first application software are stored in the confidential folder of the first application software, receiving a reading instruction of the confidential folder of the first application software from second application software on the terminal;
judging whether the second application software is the same as the first application software;
when the second application software is the same as the first application software, reading corresponding data from a confidential folder of the first application software according to the reading instruction;
when the second application software is different from the first application software, generating first prompt information;
the first prompt message is used for prompting that the reading instruction is an illegal instruction.
In the above terminal, the terminal further includes:
and the deleting unit is used for deleting the corresponding data read from the secret-related folder of the first application software after reading the corresponding data from the secret-related folder of the first application software according to the reading instruction.
In the above terminal, the deleting unit is specifically configured to:
judging whether the available storage capacity of the confidential folder of the first application software is less than or equal to a first preset threshold value or not;
and when the available storage capacity of the confidential folder of the first application software is less than or equal to a first preset threshold value, deleting the corresponding data read from the confidential folder of the first application software.
In the above terminal, the data acquisition instruction includes:
a screenshot instruction, or a save instruction.
In the above terminal, when the data obtaining instruction is the screenshot instruction, correspondingly, the obtaining unit is specifically configured to:
intercepting a picture of the first application software according to the screenshot instruction;
the terminal further comprises:
the editing unit is used for receiving an editing instruction of a picture of the first application software after the data of the first application software is stored in a confidential folder of the first application software;
editing the picture of the first application software according to the editing instruction;
storing the edited picture of the first application software in a confidential folder of the first application software;
in the above terminal, the terminal further includes:
the mass sending unit is used for receiving a sending instruction of first application software from the terminal aiming at the picture of the first application software;
and sending the picture of the first application software to each target object according to each target object in the first application software carried in the sending instruction.
In the above terminal, the terminal further includes:
the copy prohibiting unit is used for receiving a copy instruction of interface information of the first application software or receiving a copy instruction of data in a confidential folder of the first application software after the data of the first application software is stored in the confidential folder of the first application software;
generating second prompt information;
and the second prompt message is used for prompting that the copy instruction is an illegal instruction.
An embodiment of the present application further provides a terminal, where the terminal includes: the storage medium depends on the processor to execute operations through a communication bus, and when the instructions are executed by the processor, the storage method of the data of one or more of the embodiments is executed.
The embodiment of the application provides a computer storage medium, which stores executable instructions, and when the executable instructions are executed by one or more processors, the processors execute the data storage method of one or more embodiments.
The embodiment of the application provides a data storage method, a terminal and a computer storage medium, wherein the method is applied to the terminal and comprises the following steps: firstly, receiving a data acquisition instruction aiming at first application software on a terminal, then acquiring data of the first application software according to the data acquisition instruction, after acquiring the data of the first application software, judging whether the first application software is the preset secret-related application software, and in the judgment result obtained by judgment, when the first application software is the preset secret-related application software, storing the data of the first application software in a secret-related folder of the first application software, so that the data of the secret-related application software is stored in a set folder, so that a secret-related folder is set for each secret-related application software, wherein the secret-related folder of the first application software is a folder which is set with reading permission aiming at the first application software, namely, in the embodiment of the application, if the first application software is the secret-related software, the acquired data of the first application software is stored in a folder which only has a reading permission for the first application software, namely the confidential folder of the first application software, so that the information on the first application software can only be applied to the first application software and cannot be leaked, the protection of the confidential information on the confidential application software is perfected, the protection of the confidential information on the confidential application software is effectively improved, and the leakage of the confidential information on the confidential application software is prevented.
Drawings
Fig. 1 is a schematic flowchart of an alternative data storage method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another alternative data storage method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of an example of an alternative data storage method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of an example of another alternative data storage method provided in an embodiment of the present application;
fig. 5 is a first schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Example one
An embodiment of the present application provides a data storage method, where the method is applied to a terminal, fig. 1 is a schematic flow chart of an optional data storage method provided in the embodiment of the present application, and with reference to fig. 1, the data storage method may include:
s101: receiving a data acquisition instruction aiming at first application software on a terminal;
generally, in order to facilitate the development and implementation of projects in some enterprises, many companies utilize instant messaging application software developed inside the companies to communicate and exchange projects, and since the content of communication and exchange relates to some confidential information, if leakage occurs, great loss is brought to the companies, and thus, confidentiality of the information becomes important.
In order to prevent the information in the confidential application software from being leaked, the information in the confidential application software is protected, and first, the user needs to acquire the data of the first application software.
Generally, before information of the confidential application software is leaked out, data in the first application software needs to be acquired, wherein a user firstly sends an operation to the information in the first application software, so that a terminal receives a data acquisition instruction of the first application software on the terminal, and thus, the data in the first application software can be acquired.
Wherein, the data acquisition instruction comprises: a screenshot instruction, or a save instruction.
In practical application, a user can communicate with a colleague or a superior leader through the security-related application software, so that a lot of security-related information is bound to be related to a chat record in the security-related application software, when the security-related information is leaked out, a screenshot of the chat record may be leaked out, and a document related to the chat record may also be leaked out.
The screenshot command and the saving command are both generated by a screenshot operation and a saving operation sent by a user, specifically, the screenshot operation may be a screenshot of a current whole interface or a part of an interface of the current interface, and the saving operation may be saving of a document in a chat log, saving of a picture, and saving of audio and video, where embodiments of the present application are not particularly limited.
S102: acquiring data of the first application software according to the data acquisition instruction;
after receiving the data acquisition instruction, the terminal responds to the data acquisition instruction, for example, when the data acquisition instruction is video data in a stored chat record, the terminal acquires the video data according to the data acquisition instruction; and when the data acquisition instruction is to intercept the picture of the chat record of the current interface of the first application software, the terminal acquires the picture of the chat record of the current interface according to the data acquisition instruction.
The obtained data of the first application software may be a document, a video, an audio, or a picture, and the embodiment of the present application is not particularly limited herein.
S103: judging whether the first application software is a preset secret-related application software or not;
here, the secret-related application software may be set in advance, for example, instant messaging application software inside a company may be set as the secret-related application software, where the number of the preset secret-related application software may be one or more, and the embodiment of the present application is not particularly limited.
Through judgment, two judgment results can be obtained, wherein one judgment result is that the first application software is the preset secret-related application software, and the other judgment result is that the first application software is not the preset secret-related application software.
When the judgment result is that: the first application software is not preset secret-related application software, and therefore it is required to store the acquired data of the first application software in a default folder, since the acquired data of the first application software does not relate to secret-related information, and the data in the default folder can be acquired by other application software on the terminal.
S104: when the first application software is the preset secret-related application software, storing the data of the first application software in a secret-related folder of the first application software.
Specifically, when the determination result is: the first application software is preset secret-related application software, and then the obtained data of the first application software is related to secret-related information, and the data of the first application software is stored in a preset secret-related folder of the first application software in order to prevent the obtained data of the first application software from being leaked.
The confidential folder of the first application software is a folder which is provided with a reading authority aiming at the first application software.
That is, the permission setting is performed in advance on the confidential folder of the first application software, and for the confidential folder of the first application software, only the reading permission is set on the first application software, so that it can be seen that the data stored in the confidential folder of the first application software can be used only in the first application software and cannot be used in other application software except for the second application software.
Taking a screenshot as an example, authority setting is performed for a confidential folder of Application software (APP), as shown in the following table 1:
authority App
Read permission App
Write permission Screenshot of App
TABLE 1
As can be seen from table 1, the permissions include a read permission and a write permission, and for the APP, only the screenshot of the APP has the write permission, and the APP has the read permission.
Through the storage mode, the data in the first application software can be effectively prevented from being leaked out, and the confidentiality of the confidential application software is improved.
After storing the data of the first application software in the confidential class folder of the first application software, in order to prevent other application software from calling the data therein, in an alternative embodiment, after S104,
fig. 2 is a schematic flow chart of another optional data storage method provided in an embodiment of the present application, and referring to fig. 2, the method may further include:
s201: receiving a reading instruction of a secret-related folder of first application software from second application software on the terminal;
s202: judging whether the second application software is the same as the first application software;
s203: when the second application software is the same as the first application software, reading data from the confidential folder of the first application software according to the reading instruction;
s204: when the second application software is different from the first application software, generating first prompt information;
the first prompt message is used for prompting that the read instruction is an illegal instruction.
Specifically, when a user needs to use data in a secret-related folder of first application software in second application software on the terminal, the user sends a reading instruction of the secret-related folder of the first application software by the second application software, for example, when the user wants to read a picture in the secret-related folder of the first application software in the second application software, the user sends an operation of acquiring the picture in the secret-related folder of the first application software in the second application software, and at this time, the second application software in the terminal cannot directly acquire the picture in the secret-related folder of the first application software.
The method comprises the steps of firstly judging whether second application software is the same as first application software or not, wherein the same means the same application software, if the second application software is judged to be the first application software, the fact that the first application software reads data in a secret-related folder of the first application software at the moment is indicated, and since the secret-related folder of the first application software has a reading permission for the first application software, a terminal reads the data from the folder of the first application software according to a reading instruction.
If the second application software is not the first application software after judgment, the fact that other application software except the first application software reads data in the secret-related folder of the first application software is shown, the secret-related folder of the first application software is provided with reading permission for the first application software, and the other application software is not provided with reading permission, so that the terminal generates first prompt information and sends the prompt information to a display unit of the terminal for displaying.
The illegal command refers to a command for prohibiting a response by the terminal.
In order to prevent the confidential folder of the first application software from exceeding the storage capacity, which results in that the data cannot be stored continuously, in an alternative embodiment, after S203, the method may further include:
and deleting the corresponding data read from the confidential folder of the first application software.
Specifically, in the confidential folder of the first application software, if the data in the confidential folder is read once, the data read once is directly deleted, so that the confidential folder of the first application software is prevented from exceeding the storage capacity.
However, although the above method may prevent the subsequent failure to store data due to the fact that the confidential folder of the first application software exceeds the storage capacity, but delete the confidential folder after being read once, which may cause the situation that the confidential folder has been deleted when needed, so as to prevent the situation that the confidential folder of the first application software may not be stored subsequently due to the fact that the confidential folder of the first application software exceeds the storage capacity, and delete the confidential folder after being read once, which may cause the situation that the confidential folder has been deleted when needed, in an alternative embodiment, deleting the corresponding data read from the confidential folder of the first application software may include:
judging whether the available storage capacity of a confidential folder of the first application software is less than or equal to a first preset threshold value or not;
and when the available storage capacity of the confidential folder of the first application software is less than or equal to a first preset threshold value, deleting the corresponding data read from the confidential folder of the first application software.
The usable storage capacity of the confidential folder of the first application software is judged, the usable storage capacity of the confidential folder of the first application software is judged to be smaller than or equal to a first preset threshold value, if the usable storage capacity of the confidential folder of the first application software is smaller than the first preset threshold value, the storage capacity of the confidential folder of the first application software is indicated to be nearly full, and in order to prevent the problem that data cannot be stored continuously subsequently, corresponding data read from the confidential folder of the first application software is deleted, so that more storage space is released, and the subsequent continuous storage is facilitated.
If the available storage capacity of the confidential folder of the first application software is larger than the first preset threshold, the available storage capacity of the confidential folder of the first application software is larger, and at the moment, corresponding data read from the confidential folder of the first application software does not need to be deleted, so that subsequent needs are prevented.
In an optional embodiment, when the data obtaining instruction is a screenshot instruction, correspondingly, obtaining data of the first application software according to the data obtaining instruction includes:
intercepting a picture of the first application software according to the screenshot instruction;
generally, a user may send a captured picture only by processing the captured picture, and in order to meet the user's requirement, after storing the data of the first application software in a confidential folder of the first application software, the method further includes:
receiving an editing instruction of a picture aiming at first application software;
editing the picture of the first application software according to the editing instruction;
storing the edited picture of the first application software in a confidential folder of the first application software;
that is, the user may also edit the picture stored in the confidential folder of the first application software, for example, some information may be smeared to facilitate subsequent use, but in order to prevent leakage of the confidential information, the edited picture of the first application software still needs to be stored in the confidential folder of the first application software.
The above editing of the picture may include smearing the content of the image, adjusting the brightness of the image, intercepting the content of the image, and the like, and the embodiment of the present application is not particularly limited herein.
Generally, a user needs to send the captured pictures in a mass manner, and in order to meet the user's requirement, after the data of the first application software is stored in a confidential folder of the first application software, the method further includes:
receiving a sending instruction of first application software from a terminal aiming at a picture of the first application software;
and sending the picture of the first application software to each target object according to each target object in the first application software carried in the sending instruction.
Specifically, the user group-sending the data of the confidential folder of the first application software is only limited to the first application software and cannot be applied to other application software.
Here, when receiving a sending instruction of the first application software from the terminal for the picture of the first application software, where the sending instruction carries target objects in the first application software, and the target objects are all users in the first application software.
Therefore, the data in the confidential folder of the first application software has the functions of image editing and mass sending in the first application software, so that the operation of a user is facilitated, and the experience of the user is improved.
In order to prevent the user from copying the data in the first application software by means of copying, in an optional embodiment, after S104, the method further includes:
receiving a copy instruction of interface information aiming at the first application software, or receiving a copy instruction of data in a confidential folder aiming at the first application software, and generating second prompt information;
and the second prompt message is used for prompting that the copy instruction is an illegal instruction.
In practical application, when a user sends a copy operation on the interface information of the first application software, the terminal receives the copy operation on the interface information of the first application software, generates a copy instruction, generates second prompt information in order to prevent the interface information in the first application software from being copied, and sends the second prompt information to a display unit of the terminal for displaying.
When a user sends a copy operation on data in the confidential folder of the first application software, the terminal receives the copy operation on the data in the confidential folder of the first application software, generates a copy instruction, generates second prompt information in order to prevent the data in the confidential folder of the first application software from being copied, and sends the second prompt information to a display unit of the terminal for displaying.
The storage method of data in one or more embodiments described above is described below by way of example.
Fig. 3 is a schematic flowchart of an example of an optional data storage method provided in an embodiment of the present application, and referring to fig. 3, the data storage method may include:
s301: the terminal receives the instruction, judges whether the instruction is a screenshot instruction, if so, executes S302, otherwise, executes S301;
s302: the terminal intercepts the picture according to the intercepting instruction, wherein the file name of the intercepted picture is as follows: screenshot _2018-10-28-15-46-50. png; judging whether the screenshot command is a screenshot command of a classified APP, if so, executing S303, and if not, executing S304;
s303: the terminal stores the captured picture in a classified folder of the APP;
s304: the terminal stores the captured picture in a common folder, wherein the storage path is as follows: pictures/screens/.
Fig. 4 is a schematic flowchart of another example of an optional data storage method provided in an embodiment of the present application, and referring to fig. 4, the data storage method may include:
s401: the terminal receives the instruction, judges whether the instruction is a screenshot instruction, if so, executes S402, otherwise, executes S401;
s402: and the terminal intercepts the picture according to the intercepting instruction, stores the intercepted picture in a classified folder of the APP, and deletes the picture after the intercepted picture is read once.
The embodiment of the application provides a data storage method, which is applied to a terminal and comprises the following steps: firstly, receiving a data acquisition instruction aiming at first application software on a terminal, then acquiring data of the first application software according to the data acquisition instruction, after acquiring the data of the first application software, judging whether the first application software is the preset secret-related application software, and in the judgment result obtained by judgment, when the first application software is the preset secret-related application software, storing the data of the first application software in a secret-related folder of the first application software, so that the data of the secret-related application software is stored in a set folder, so that a secret-related folder is set for each secret-related application software, wherein the secret-related folder of the first application software is a folder which is set with reading permission aiming at the first application software, namely, in the embodiment of the application, if the first application software is the secret-related software, the acquired data of the first application software is stored in a folder which only has a reading permission for the first application software, namely the confidential folder of the first application software, so that the information on the first application software can only be applied to the first application software and cannot be leaked, the protection of the confidential information on the confidential application software is perfected, the protection of the confidential information on the confidential application software is effectively improved, and the leakage of the confidential information on the confidential application software is prevented.
Example two
Fig. 5 is a first schematic structural diagram of a terminal provided in the embodiment of the present application, and as shown in fig. 5, the embodiment of the present application provides a terminal, which may further include:
a receiving unit 51 for receiving a data acquisition instruction for first application software on the terminal;
an obtaining unit 52, configured to obtain data of the first application software according to the data obtaining instruction;
the judging unit 53 is configured to judge whether the first application software is a preset secret-related application software;
the storage unit 54 is configured to, when the first application software is a preset secret-related application software, store data of the first application software in a secret-related folder of the first application software;
the confidential folder of the first application software is a folder which is provided with a reading authority aiming at the first application software.
Optionally, the terminal is further configured to:
after the data of the first application software is stored in the confidential folder of the first application software, receiving a reading instruction of the second application software on the terminal to the confidential folder of the first application software;
judging whether the second application software is the same as the first application software;
when the second application software is the same as the first application software, reading corresponding data from the confidential folder of the first application software according to the reading instruction;
when the second application software is different from the first application software, generating first prompt information;
the first prompt message is used for prompting that the read instruction is an illegal instruction.
Optionally, the terminal further includes:
and the deleting unit is used for deleting the corresponding data read from the secret-related folder of the first application software after reading the corresponding data from the secret-related folder of the first application software according to the reading instruction.
Optionally, the deleting unit is specifically configured to:
judging whether the available storage capacity of a confidential folder of the first application software is less than or equal to a first preset threshold value or not;
and when the available storage capacity of the confidential folder of the first application software is less than or equal to a first preset threshold value, deleting the corresponding data read from the confidential folder of the first application software.
Optionally, the data obtaining instruction includes:
a screenshot instruction, or a save instruction.
Optionally, when the data obtaining instruction is the screenshot instruction, correspondingly, the obtaining unit is specifically configured to:
intercepting a picture of the first application software according to the screenshot instruction;
the above terminal further includes:
the editing unit is used for receiving an editing instruction of the picture of the first application software after the data of the first application software is stored in a confidential folder of the first application software;
editing the picture of the first application software according to the editing instruction;
storing the edited picture of the first application software in a confidential folder of the first application software;
in the above terminal, the above terminal further includes:
the group sending unit is used for receiving a sending instruction of first application software from a terminal aiming at a picture of the first application software;
and sending the picture of the first application software to each target object according to each target object in the first application software carried in the sending instruction.
Optionally, the terminal further includes:
the copying forbidding unit is used for receiving a copying instruction of the interface information of the first application software or receiving a copying instruction of the data in the confidential folder of the first application software after the data of the first application software is stored in the confidential folder of the first application software;
generating second prompt information;
and the second prompt message is used for prompting that the copy instruction is an illegal instruction.
In practical applications, the receiving Unit 51, the obtaining Unit 52, the judging Unit 53, the storing Unit 54, the deleting Unit, the editing Unit, the mass sending Unit and the copy prohibiting Unit may be implemented by a processor located on a terminal, specifically, a Central Processing Unit (CPU), a Microprocessor Unit (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
Fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present application, and as shown in fig. 6, an embodiment of the present application provides a terminal 600, including:
a processor 61 and a storage medium 62 storing instructions executable by the processor 61, wherein the storage medium 62 depends on the processor 61 to perform operations through a communication bus 63, and when the instructions are executed by the processor 61, the storage method of data described in the first embodiment is performed.
It should be noted that, in practical applications, the various components in the terminal are coupled together by a communication bus 63. It will be appreciated that the communication bus 63 is used to enable communications among the components. The communication bus 63 includes a power bus, a control bus, and a status signal bus, in addition to a data bus. But for clarity of illustration the various buses are labeled in figure 6 as communication bus 63.
The embodiment of the application provides a computer storage medium, which stores executable instructions, and when the executable instructions are executed by one or more processors, the processors execute the data storage method of the first embodiment.
The computer-readable storage medium may be a magnetic random access Memory (FRAM), a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM), among others.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application.

Claims (9)

1. A data storage method is applied to a terminal, and the method comprises the following steps:
receiving a data acquisition instruction aiming at first application software on the terminal;
acquiring data of the first application software according to the data acquisition instruction;
judging whether the first application software is a preset secret-related application software or not;
when the first application software is the preset secret-related application software, storing the data of the first application software in a secret-related folder of the first application software;
the confidential folder of the first application software is a folder which is provided with a reading permission aiming at the first application software;
after storing the data of the first application software in a confidential folder of the first application software, the method further comprises:
receiving a reading instruction of a secret-related folder of the first application software from second application software on the terminal;
judging whether the second application software is the same as the first application software;
when the second application software is the same as the first application software, reading corresponding data from a confidential folder of the first application software according to the reading instruction;
when the second application software is different from the first application software, generating first prompt information;
the first prompt message is used for prompting that the reading instruction is an illegal instruction.
2. The method according to claim 1, wherein after reading corresponding data from the confidential folder of the first application software according to the reading instruction, the method further comprises:
and deleting the corresponding data read from the confidential folder of the first application software.
3. The method of claim 2, wherein the deleting reads corresponding data from a confidential folder of the first application software, comprising:
judging whether the available storage capacity of the confidential folder of the first application software is less than or equal to a first preset threshold value or not;
and when the available storage capacity of the confidential folder of the first application software is less than or equal to a first preset threshold value, deleting the corresponding data read from the confidential folder of the first application software.
4. The method of claim 1, wherein the data fetch instruction comprises:
a screenshot instruction, or a save instruction.
5. The method according to claim 4, wherein when the data obtaining instruction is the screenshot instruction, correspondingly, the obtaining data of the first application software according to the data obtaining instruction includes:
intercepting a picture of the first application software according to the screenshot instruction;
after storing the data of the first application software in a confidential folder of the first application software, the method further comprises:
receiving an editing instruction of a picture aiming at the first application software;
editing the picture of the first application software according to the editing instruction;
storing the edited picture of the first application software in a confidential folder of the first application software;
or receiving a sending instruction of first application software from the terminal aiming at the picture of the first application software;
and sending the picture of the first application software to each target object according to each target object in the first application software carried in the sending instruction.
6. The method of claim 1, wherein after storing the data of the first application software in a confidential folder of the first application software, the method further comprises:
receiving a copy instruction of interface information aiming at the first application software, or receiving a copy instruction of data in a confidential folder aiming at the first application software;
generating second prompt information;
and the second prompt message is used for prompting that the copy instruction is an illegal instruction.
7. A terminal, characterized in that the terminal comprises:
the receiving unit is used for receiving a data acquisition instruction aiming at first application software on the terminal;
the acquisition unit is used for acquiring the data of the first application software according to the data acquisition instruction;
the judging unit is used for judging whether the first application software is preset secret-related application software or not;
the storage unit is used for storing the data of the first application software into a secret folder of the first application software when the first application software is the preset secret-related application software;
the confidential folder of the first application software is a folder which is provided with a reading permission aiming at the first application software;
after the data of the first application software is stored in the confidential folder of the first application software, the terminal further includes:
the receiving unit is used for receiving a reading instruction of a secret-related folder of the first application software from second application software on the terminal;
the judging unit is used for judging whether the second application software is the same as the first application software;
the obtaining unit is used for reading corresponding data from the confidential folder of the first application software according to the reading instruction when the second application software is the same as the first application software;
the prompting unit is used for generating first prompting information when the second application software is different from the first application software; the first prompt message is used for prompting that the reading instruction is an illegal instruction.
8. A terminal, characterized in that the terminal comprises:
a processor and a storage medium storing instructions executable by the processor, the storage medium performing operations in dependence on the processor through a communication bus, the instructions when executed by the processor performing the method of storing data according to any one of claims 1 to 6.
9. A computer storage medium having stored thereon executable instructions which, when executed by one or more processors, perform a method of storing data as claimed in any one of claims 1 to 6.
CN201811430919.9A 2018-11-28 2018-11-28 Data storage method, terminal and computer storage medium Active CN109558749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811430919.9A CN109558749B (en) 2018-11-28 2018-11-28 Data storage method, terminal and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811430919.9A CN109558749B (en) 2018-11-28 2018-11-28 Data storage method, terminal and computer storage medium

Publications (2)

Publication Number Publication Date
CN109558749A CN109558749A (en) 2019-04-02
CN109558749B true CN109558749B (en) 2021-06-01

Family

ID=65867649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811430919.9A Active CN109558749B (en) 2018-11-28 2018-11-28 Data storage method, terminal and computer storage medium

Country Status (1)

Country Link
CN (1) CN109558749B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104134042B (en) * 2013-07-18 2016-01-06 腾讯科技(深圳)有限公司 A kind of private file encryption method and device
CN106484779B (en) * 2016-09-14 2020-05-05 Oppo广东移动通信有限公司 File operation method and device
CN107193562A (en) * 2017-05-19 2017-09-22 深圳天珑无线科技有限公司 A kind of image processing method and device
CN107682538A (en) * 2017-09-27 2018-02-09 北京小米移动软件有限公司 The display methods and device of application interface
CN108170844A (en) * 2018-01-17 2018-06-15 广东欧珀移动通信有限公司 Storage method, device, terminal and the storage medium of record screen file

Also Published As

Publication number Publication date
CN109558749A (en) 2019-04-02

Similar Documents

Publication Publication Date Title
US10204235B2 (en) Content item encryption on mobile devices
US20150081644A1 (en) Method and system for backing up and restoring a virtual file system
EP2696305B1 (en) Method and device for file protection
EP2843979A1 (en) Method and apparatus for preventing sound recording during the call
CN106971120B (en) Method and device for realizing file protection and computing equipment
CN110674477A (en) Document source tracing method and device based on electronic file security identification
CN111339543B (en) File processing method and device, equipment and storage medium
CN102281141B (en) Document permission management method, apparatus and system
US10380356B2 (en) Operating system partition protecting system, protecting device, and terminal
CN110347341B (en) Data clearing method and control equipment
WO2017215148A1 (en) File protection method and device
CN105528553A (en) A method and a device for secure sharing of data and a terminal
CN101426198A (en) Mobile phone information protecting method
TWI629891B (en) A method and system for protecting private information of mobile terminal
CN111539010B (en) Clipboard control method, device, electronic equipment and computer readable storage medium
CN109117664A (en) The access control method and device of application program
CN103246834A (en) Control method and electronic device
CN103701978A (en) Terminal and automatic multimedia file encryption method
CN105303074A (en) Method for protecting security of Web application
CN103518205A (en) Method for limiting operation authority and automation device
CN115361184A (en) Privacy protection method and related product
CN110896400A (en) Data anti-disclosure access system
CN110807191B (en) Safe operation method and device of application program
CN105630855A (en) File sharing method, file sharing system and terminal
CN108287988B (en) Security management system and method for mobile terminal file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant