CN113032849A - Data protection method, device, terminal and storage medium - Google Patents

Data protection method, device, terminal and storage medium Download PDF

Info

Publication number
CN113032849A
CN113032849A CN202110331079.6A CN202110331079A CN113032849A CN 113032849 A CN113032849 A CN 113032849A CN 202110331079 A CN202110331079 A CN 202110331079A CN 113032849 A CN113032849 A CN 113032849A
Authority
CN
China
Prior art keywords
terminal
maintenance
mode
data
maintenance mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110331079.6A
Other languages
Chinese (zh)
Inventor
凌松
陶钧
杨若鹏
王光欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202110331079.6A priority Critical patent/CN113032849A/en
Publication of CN113032849A publication Critical patent/CN113032849A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Telephone Function (AREA)

Abstract

The application relates to a data protection method, a device, a terminal and a storage medium, wherein the method comprises the following steps: controlling the terminal to enter a maintenance mode based on the control information when the terminal is in an engineering mode, wherein in the maintenance mode, the personal space data created in the terminal is accessed, and the main space data of the terminal is encrypted; when the maintenance mode enters the main space mode, sending prompt information for inputting a preset password; and if the received input password is determined not to be matched with the preset password, controlling the terminal to be in a maintenance mode. According to the method, when after-sale maintenance is carried out, a maintenance worker can enter a maintenance mode under the condition that a preset password of the terminal is not known, in the maintenance mode, main space data of the terminal are in an encrypted state, the space data of the terminal are divided for access, and in addition, when the maintenance mode enters the main space mode, a correct preset password needs to be input, so that the privacy pain point is thoroughly solved, and the problem of protection of user data in after-sale maintenance of the mobile phone is solved.

Description

Data protection method, device, terminal and storage medium
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a data protection method and apparatus, a terminal, and a storage medium.
Background
In the field of after-sales repair, the main business forms include sending, sending and getting on the door. Since terminals such as mobile phones often have power-on passwords, in the above-mentioned service forms, users generally delete the passwords or actively provide the power-on passwords for maintenance personnel to maintain. The service form causes the hidden danger of leakage of the private data of the user.
Disclosure of Invention
In order to overcome the problems in the related art, the application provides a data protection method, a device, a terminal and a storage medium.
According to a first aspect of an embodiment of the present application, a data protection method is provided, which is applied to a terminal, and the method includes:
controlling the terminal to enter a maintenance mode based on control information when the terminal is in an engineering mode, wherein in the maintenance mode, the personal space data created in the terminal is accessed, and the main space data of the terminal is encrypted;
when the maintenance mode enters a main space mode, sending prompt information for inputting a preset password;
and if the received input password is determined not to be matched with the preset password, controlling the terminal to be in the maintenance mode.
Optionally, the method comprises:
in the maintenance mode, the main space data is encrypted by a file-level encryption technique.
Optionally, the method further comprises:
and when the terminal is restarted in the maintenance mode, controlling the terminal to enter the maintenance mode.
Optionally, the method further comprises:
and deleting current maintenance data when the maintenance mode is exited, wherein the current maintenance data refers to the maintenance data generated in the maintenance mode.
Optionally, the entering the maintenance mode based on the control information includes:
determining to start the maintenance mode based on the control information, and detecting whether a preset password exists;
and if the preset password is determined to exist, controlling the terminal to restart so that the terminal enters the maintenance mode.
Optionally, the entering a maintenance mode based on the control information further includes:
if the preset password does not exist, outputting prompt information for setting the preset password, and controlling the terminal to restart after the preset password is determined to be set.
Optionally, before the determining to start the maintenance mode, the method further includes:
detecting whether old maintenance data exists; the old maintenance data refers to maintenance data which are generated in the last maintenance mode and cannot be deleted;
and if the old maintenance data exist, deleting the old maintenance data.
Optionally, the method further comprises:
and if the old maintenance data is not deleted within the preset time length, determining that the maintenance module fails to be opened.
According to a second aspect of the embodiments of the present application, there is provided a data protection apparatus, applied to a terminal, the apparatus including:
the control module is used for controlling the terminal to enter a maintenance mode based on control information when the terminal is in an engineering mode, wherein in the maintenance mode, the personal space data created in the terminal is accessed, and the main space data of the terminal is encrypted;
the encryption module is used for sending prompt information for inputting a preset password when the maintenance mode enters the main space mode;
and the control module is used for controlling the terminal to be in the maintenance mode if the received input password is determined not to be matched with the preset password.
According to a third aspect of embodiments of the present application, there is provided a terminal, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of the first aspect.
According to a fourth aspect of embodiments herein, there is provided a non-transitory computer readable storage medium having instructions which, when executed by a processor of a terminal, enable the terminal to perform the method of the first aspect.
The technical scheme provided by the embodiment of the application can have the following beneficial effects: according to the method, the maintenance mode can be entered in the engineering mode, so that when after-sales maintenance is carried out, a maintenance worker can enter the maintenance mode under the condition that a preset password of the terminal is not known, in the maintenance mode, main space data of the terminal is in an encrypted state, the space data of the terminal is subjected to access, and when the maintenance mode enters the main space mode, a correct preset password needs to be input, so that privacy data exposure of a user is better avoided, and the problem of protecting user data in after-sales maintenance of a mobile phone is solved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow diagram illustrating a method of data protection according to an example embodiment.
Fig. 1a is a schematic diagram of a first display interface of a terminal in an engineering mode according to an exemplary embodiment.
Fig. 1b is a schematic diagram of a second display interface of the terminal in the engineering mode according to an exemplary embodiment.
Fig. 1c is a schematic diagram of a third display interface of the terminal in the engineering mode according to an exemplary embodiment.
Fig. 1d is a diagram illustrating a fourth display interface of the terminal in the engineering mode according to an exemplary embodiment.
FIG. 2 is a block diagram illustrating a data protection device according to an example embodiment.
Fig. 3 is a block diagram of a terminal shown in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
In the related art, application encryption technology is adopted, so that private data such as an album cannot be accessed under a file system, but a photo under an album path can still be viewed through an instruction (such as adb or shell). Therefore, the method does not really solve the privacy pain point, and the privacy data of the user still has exposure risk.
The disclosure provides a data protection method applied to a terminal. According to the method, the maintenance mode can be entered in the engineering mode, so that when after-sales maintenance is carried out, a maintenance worker can enter the maintenance mode under the condition that a preset password of the terminal is not known, in the maintenance mode, main space data of the terminal is in an encrypted state, the space data of the terminal is subjected to individual access, and when the maintenance mode enters the main space mode, a correct preset password needs to be input, so that exposure of privacy data of a user is better avoided, privacy pain spots are thoroughly solved, after-sales maintenance is more convenient, and use experience is improved.
In one exemplary embodiment, a data protection method is provided and applied to a terminal. Referring to fig. 1, the terminal is based on the android system. The method comprises the following steps:
s110, controlling the terminal to enter a maintenance mode based on the control information when the terminal is in an engineering mode, wherein in the maintenance mode, the personal space data created in the terminal is accessed, and the main space data of the terminal is encrypted;
s120, when the maintenance mode enters a main space mode, sending prompt information for inputting a preset password;
and S130, if the received input password is determined not to be matched with the preset password, controlling the terminal to be in a maintenance mode.
In step S110, the engineering mode refers to a Recovery mode in the android system, and is a mode that can modify data or a system inside a terminal (e.g., a mobile phone). Generally, when the terminal is in a power-off state, the terminal can enter an engineering mode directly by a key combination mode without inputting a password.
For example, when the terminal is in the power-off state, the volume "+" key and the power key are pressed at the same time, and the terminal can enter the engineering mode after being pressed for 3 seconds.
For another example, when the terminal is in the power-off state, the volume "-" key and the power key are pressed at the same time, and the terminal can enter the engineering mode after being pressed for 3 seconds.
For another example, when the terminal is in a power-off state, the volume "+" key, the Home key (the key of the terminal returning to the main interface) and the power key are pressed at the same time, and after the terminal vibrates, the power key (the volume "+" key and the Home key are continuously pressed) is released, so that the engineering mode can be entered.
It should be noted that different terminals enter the engineering mode in different ways, which is not described herein.
In step S110, an entrance for entering a maintenance mode is provided in the engineering mode of the terminal, and after the terminal enters the engineering mode, a user can enter the maintenance mode through the entrance.
For example, referring to FIG. 1a, in the engineering mode, the display interface of the terminal is designed with an option "enter after-sales service mode", and the user selects the option to enter the service mode.
In step S110, after the terminal enters the maintenance mode, the relevant person (e.g., the maintenance person) can only access the personal space data, and the main space data is in an encrypted state and cannot be accessed. The body-separated space data refers to data of a body-separated space created in a maintenance mode, and the data of the body-separated space can be set as data that must be used when the terminal is maintained. The main space data refers to data of a main space when a user normally uses the terminal, and the part of data mainly comprises data of a third application program and data related to user privacy, such as photos, videos, short messages, address lists, instant chat data, payment data and the like.
It should be noted that, the user can set the accessible personal space data and the encrypted main space data by himself, so that the user can set the necessary data to be in the access state according to the maintenance condition required by the terminal, and set other data to be in the encrypted state, so as to better adapt to different maintenance conditions, and further improve the user experience.
In the maintenance mode, the main space data may be encrypted by a file-level encryption technique, that is, the main space data may be encrypted by a file-level encryption technique (FBE), and all the main space data may not be accessible before decryption. In the method, the sub-space is created for the maintenance mode, the main space data is encrypted, the main space data cannot be accessed from the sub-space under a file system, the main space data cannot be accessed through adb or shell, the hidden danger that the main space data is accessed by a non-main space (sub-space) is thoroughly avoided, and the protection strength of the user privacy data is improved.
In step S120, when the maintenance mode needs to enter the main space mode, the terminal sends a prompt message for inputting a preset password. The preset password may be an unlock password, a power-on password, or the like of the terminal, or may be a password separately set for exiting the maintenance mode, or a password separately set for entering the main space mode, and a specific form of the preset password is not described herein.
In step S130, after the relevant person inputs the password, the terminal receives the entered password input by the relevant person, and if the entered password is not matched with the preset password, that is, the entered password is inconsistent with the preset password, the control terminal is still in the maintenance mode, so that other persons can be better prevented from exiting the maintenance mode, the exposure of the private data of the user is better avoided, and the data protection intensity is further improved.
It should be noted that if it is determined that the entered password is matched with the preset password, that is, the entered password is consistent with the preset password, the terminal is controlled to exit the maintenance mode, and the terminal enters the main space mode.
According to the method, when the terminal is maintained after sale, maintenance personnel can directly enter a maintenance mode from an engineering mode without knowing a preset password of the terminal, and in the maintenance mode, the personal space data is accessed and the main space data is encrypted, so that the maintenance of the maintenance personnel is facilitated, the private data of a user can be better prevented from being leaked, and the use experience of the user is improved.
In one exemplary embodiment, a data protection method is provided and applied to a terminal. According to the method, when the terminal is restarted in a maintenance mode, the terminal is controlled to enter the maintenance mode.
That is, when the relevant person restarts the terminal while the terminal is in the maintenance mode, the terminal still enters the maintenance mode.
It can be understood that in the process of after-sales maintenance, the terminal in the maintenance mode may be shut down due to insufficient electric quantity, and in this state, the terminal is restarted after being charged in time, and still enters the original maintenance mode, so that the leakage of the privacy data of the user can be better avoided.
In the method, as can be seen from the steps S120 and S130 in the above exemplary embodiment, once the terminal enters the maintenance mode, the maintenance mode must be initiated by inputting the preset password, and the main space mode is entered. In the after-sale maintenance process, the maintenance personnel do not know the preset password, so that the method can well enable the maintenance personnel to finish maintenance and well protect the privacy data of the user in the after-sale maintenance process.
In one exemplary embodiment, a data protection method is provided and applied to a terminal. The method further comprises the following steps:
and deleting the current maintenance data when the maintenance mode is exited, wherein the current maintenance data refers to the maintenance data generated in the maintenance mode.
In the method, after the maintenance is finished, a user can push out the maintenance mode by inputting the preset password, and when the maintenance mode is pushed out, the current maintenance data generated by the maintenance is deleted, so that the occupation of the maintenance data on the memory of the terminal can be well avoided, the accumulation of the maintenance data can be well avoided, and the performance of the terminal is ensured.
In one exemplary embodiment, a data protection method is provided and applied to a terminal. In the method, entering a maintenance mode based on the control information comprises:
s210, determining to start a maintenance mode based on the control information, and detecting whether a preset password exists or not; if the preset password is determined to exist, executing step S230; if it is determined that the preset password does not exist, performing step S220;
s230, outputting prompt information for setting a preset password, and executing the step S230 after the preset password is determined to be set;
and S240, controlling the terminal to restart so that the terminal enters a maintenance mode.
In step S210, the control information refers to information for determining that the maintenance mode is turned on. The control information may include only a single piece of information or may include a plurality of pieces of information, that is, the control information may refer to a set of information.
In the case of example 1, the following examples,
referring to fig. 1a, the control information is single information. An option button for entering an after-sale maintenance mode is arranged in an engineering mode of the terminal, and after a user clicks the option button, the terminal can receive corresponding control information and determine to start the maintenance mode.
In the case of example 2, the following example was carried out,
referring to fig. 1a to 1d, the control information is a set of information, and includes first sub-control information, second sub-control information, third sub-control information, and fourth sub-control information in sequence. An option button for entering an after-sale maintenance mode is arranged in an engineering mode of the terminal, after a user clicks the option button, the terminal can receive first sub-control information of a response, and the terminal enters a prompt interface for starting the maintenance mode based on the first sub-control information.
The prompt interface can include: the maintenance mode may have an achievable effect (e.g., private data of the user may be protected), a prompt to remind the user to backup important data in advance, an option button to confirm an exemption protocol, an option button to turn on the maintenance mode, and so on. The related personnel can know the function of the maintenance mode, the possible risks and the like through the prompt interface.
And the user clicks the option button for confirming the exemption protocol, the terminal can receive the second sub-control information, confirm that the exemption protocol is confirmed by the related personnel, switch the option button for starting the maintenance mode into a highlighted state and remind the user that the option button is in a selectable state at the moment.
The user can click the option button in the highlight state, the terminal can receive the third sub-control information, a display interface of the control terminal pops up a popup window for opening the maintenance mode, the popup window prompts that the maintenance mode needs to be started and the terminal needs to be restarted, and an option button for determining to immediately start the maintenance mode is provided.
The user can click the option button of 'open immediately', the terminal can receive the fourth sub-control information, control the terminal to restart, and enable the terminal to enter a maintenance mode after restarting.
In step S210, after determining to start the maintenance mode, the terminal detects whether a preset password exists. The preset password may be a power-on password of the terminal. And controlling the terminal to enter different processes according to the detection result. The detection method of the preset password is not described herein.
As an example of this, it is possible to illustrate,
the control information is a group of information, and sequentially comprises first sub-control information, second sub-control information, third sub-control information and fourth sub-control information. When the terminal is controlled to restart based on the fourth sub-control information, the terminal detects whether a preset password exists or not, and then the terminal is controlled to enter different processes according to a detection result.
In the method, when the preset password is determined to exist, the step S230 is directly entered, the terminal is controlled to restart, the restarted terminal enters a maintenance mode, and the setting of the maintenance mode is completed. When the preset password does not exist, outputting prompt information for setting the preset password, wherein the prompt information may include a password input interface for setting the preset password. After the user sets the preset password, the terminal may determine that the preset password is set, and then the method proceeds to step S230, and controls the terminal to restart, so that the restarted terminal enters the maintenance mode to complete the setting of the maintenance mode. The specific setting mode of the preset password and the specific form of the preset password are not described herein.
In one example, the preset password is a power-on password or an unlock password of the terminal. Generally, users set a power-on password or an unlocking password. When the user sends the terminal to after-sale to be maintained, maintenance personnel can directly enter a maintenance mode from an engineering mode without knowing a preset password, and the terminal is maintained. Furthermore, since the maintenance staff does not know the preset password, the maintenance staff cannot enter the main space mode and cannot acquire the private data (main space data) of the user.
After the maintenance is finished, the preset password is the starting password or the unlocking password which is set in advance by the user, so that the user can exit the maintenance mode and enter the main space mode to normally use the terminal by inputting the preset password when taking the terminal.
The method can well solve the problem of private data exposure in the after-sales maintenance process, is convenient for maintenance personnel and users, and improves the use experience.
In one exemplary embodiment, a data protection method is provided and applied to a terminal. In the method, before determining to start the maintenance mode, the method further comprises:
s310, detecting whether old maintenance data exist or not;
and S320, if the old maintenance data exist, deleting the old maintenance data.
The old maintenance data refers to the maintenance data which is generated in the last maintenance mode and cannot be deleted, and if the maintenance mode needs to be started for the first time, the last maintenance mode does not exist, and certainly, the old maintenance data does not exist.
In this method, although the current repair data is deleted each time the repair mode is exited, there is a possibility that the data may not be completely deleted or may be directly flashed back due to some reason. Therefore, when the maintenance mode is started each time, whether old maintenance data exist needs to be detected, and if the old maintenance data exist, the old maintenance data are deleted, and then the maintenance mode is determined to be started, so that the leakage of the old maintenance data is avoided.
The method can also set a preset time length, and if the old maintenance data is not deleted within the preset time length, the failure of opening the maintenance module is determined. That is, if the old maintenance data is not completely deleted within the preset time period, the maintenance mode is not started, and the step of "determining to start the maintenance mode" is not performed.
Illustratively, if the maintenance mode is failed to be started, the terminal is controlled to restart, so that the terminal is restored to the previous state, such as a screen locking state.
It is supplementary to be noted that if it is determined that there is no old maintenance data, it may be determined to start the maintenance mode according to the control information.
In the method, when the maintenance mode is started, whether old maintenance data exist needs to be detected, and the maintenance mode is determined to be started only after the old maintenance data do not exist or are deleted completely, so that the leakage of the old maintenance data is avoided, and the protection strength of the privacy data of a user is further improved.
In one exemplary application scenario, such as an after-market repair scenario.
When a user needs to maintain the mobile phone, the mobile phone can be directly sent to an after-sales maintenance center, and when a maintenance worker of the after-sales maintenance center maintains the mobile phone, the user does not need to need a password, the mobile phone can directly enter an engineering mode by a key combination mode, and then the mobile phone is maintained by entering the maintenance mode in the engineering mode.
When the terminal is in a maintenance mode, the body-separated space provides necessary body-separated space data for maintenance, the partial data is accessed, and maintenance personnel can perform maintenance based on the body-separated space data. The main space data of the main space is encrypted by adopting a file-level encryption technology, and if no password is preset, maintenance personnel cannot access the encrypted main space data, so that the privacy data of users are protected.
Also, when exiting the service mode, a password needs to be entered. After the terminal acquires the input password input by the related personnel, if the input password is inconsistent with the preset password, the mobile phone is controlled to be in the maintenance mode continuously, so that the situation that people without knowing the preset password check the main space data is avoided.
In addition, when the terminal is in the maintenance mode, the mobile phone is still in the maintenance mode after being restarted, so that the situation that the mobile phone is restarted to exit the maintenance mode is better avoided, and privacy data of a user can be better protected.
The method can well protect the private data of the user. Especially for after-sale maintenance in a sending mode, maintenance personnel can complete maintenance under the condition of not knowing a preset password conveniently, and privacy data of a user can be prevented from being leaked.
In one exemplary embodiment, a data protection device is provided and applied to a terminal. Referring to fig. 2, the apparatus is used to implement the data protection method described above. The device comprises a control module 101 and an encryption module 102, and in the process of implementing the method,
the control module 101 is used for controlling the terminal to enter a maintenance mode based on the control information when the terminal is in an engineering mode, wherein in the maintenance mode, the personal space data created in the terminal is accessed, and the main space data of the terminal is encrypted;
the encryption module 102 is used for sending prompt information for inputting a preset password when the maintenance mode enters the main space mode;
the control module 101 is further configured to control the terminal to be in a maintenance mode if it is determined that the received entered password is not matched with the preset password.
In one exemplary embodiment, a data protection device is provided and applied to a terminal. Referring to fig. 2, in the apparatus, the encryption module 102 is further configured to:
in the maintenance mode, the main space data is encrypted by a file-level encryption technique.
In one exemplary embodiment, a data protection device is provided and applied to a terminal. Referring to fig. 2, in the apparatus, the control module 101 is further configured to:
and when the terminal is restarted in the maintenance mode, controlling the terminal to enter the maintenance mode.
In one exemplary embodiment, a data protection device is provided and applied to a terminal. Referring to fig. 2, the apparatus further includes:
and a deleting module 104, configured to delete the current maintenance data when the maintenance mode is exited, where the current maintenance data refers to the maintenance data generated in the maintenance mode.
In one exemplary embodiment, a data protection device is provided and applied to a terminal. Referring to fig. 2, in the apparatus, the control module 101 is further configured to:
determining to start a maintenance mode based on the control information, and detecting whether a preset password exists;
and if the preset password is determined to exist, the terminal is controlled to be restarted, so that the terminal enters a maintenance mode.
In one exemplary embodiment, a data protection device is provided and applied to a terminal. Referring to fig. 2, in the apparatus, the control module 101 is further configured to:
if the preset password does not exist, outputting prompt information for setting the preset password, and after the preset password is determined to be set, controlling the terminal to restart so that the terminal enters a maintenance mode.
In one exemplary embodiment, a data protection device is provided and applied to a terminal. Referring to fig. 2, the apparatus further includes a detection module and a deletion module, wherein,
the detection module 103 is used for detecting whether old maintenance data exist; wherein, the old maintenance data refers to the maintenance data which is generated in the last maintenance mode and can not be deleted;
a deleting module 104, configured to delete the old repair data if it is determined that the old repair data exists.
The deleting module may be the same as the deleting module for deleting the current maintenance data in the above example.
In one exemplary embodiment, a data protection device is provided and applied to a terminal. Referring to fig. 2, in the apparatus, the control module 101 is further configured to:
and if the old maintenance data is not deleted within the preset time length, determining that the maintenance module fails to be opened.
The application also provides a terminal which can be a mobile phone, a tablet computer, a notebook computer, a video camera, a camera and other equipment.
In an exemplary embodiment, as illustrated with reference to fig. 3, the terminal 400 may include one or more of the following components: a processing component 402, a memory 404, a power component 406, a multimedia component 408, an audio component 410, an interface for input/output (I/O) 412, a sensor component 414, and a communication component 416.
The processing component 402 generally controls overall operation of the terminal 400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 402 may include one or more processors 420 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 402 can include one or more modules that facilitate interaction between the processing component 402 and other components. For example, the processing component 402 can include a multimedia module to facilitate interaction between the multimedia component 408 and the processing component 402.
The memory 404 is configured to store various types of data to support operations at the terminal 400. Examples of such data include instructions for any application or method operating on the terminal 400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 404 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power components 406 provide power to the various components of the terminal 400. The power components 406 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal 400.
The multimedia component 408 includes a screen providing an output interface between the terminal 400 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 408 includes a front camera module and/or a rear camera module. The front camera module and/or the rear camera module can receive external multimedia data when the terminal 400 is in an operation mode, such as a shooting mode or a video mode. Each front camera module and rear camera module may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 410 is configured to output and/or input audio signals. For example, the audio component 410 includes a Microphone (MIC) configured to receive external audio signals when the terminal 400 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 404 or transmitted via the communication component 416. In some embodiments, audio component 410 also includes a speaker for outputting audio signals.
The I/O interface 412 provides an interface between the processing component 402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 414 includes one or more sensors for providing various aspects of status assessment for the terminal 400. For example, the sensor assembly 414 can detect an open/closed state of the terminal 400, relative positioning of components, such as a display and keypad of the terminal 400, the sensor assembly 414 can also detect a change in position of the terminal 400 or a component of the terminal 400, the presence or absence of user contact with the terminal 400, orientation or acceleration/deceleration of the terminal 400, and a change in temperature of the terminal 400. The sensor assembly 414 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 414 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 414 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 416 is configured to facilitate communications between the terminal 400 and other devices in a wired or wireless manner. The device 700 may access a wireless network based on a communication standard, such as WiFi, 2G, 3G, 4G, 5G, or a combination thereof. In an exemplary embodiment, the communication component 416 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 416 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the terminal 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 404 comprising instructions, executable by the processor 420 of the terminal 400 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The instructions in the storage medium, when executed by a processor of the terminal, enable the terminal to perform the methods shown in the above-described embodiments.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (11)

1. A data protection method is applied to a terminal, and is characterized by comprising the following steps:
controlling the terminal to enter a maintenance mode based on control information when the terminal is in an engineering mode, wherein in the maintenance mode, the personal space data created in the terminal is accessed, and the main space data of the terminal is encrypted;
when the maintenance mode enters a main space mode, sending prompt information for inputting a preset password;
and if the received input password is determined not to be matched with the preset password, controlling the terminal to be in the maintenance mode.
2. The method according to claim 1, characterized in that it comprises:
in the maintenance mode, the main space data is encrypted by a file-level encryption technique.
3. The method of claim 1, further comprising:
and when the terminal is restarted in the maintenance mode, controlling the terminal to enter the maintenance mode.
4. The method of claim 1, further comprising:
and deleting current maintenance data when the maintenance mode is exited, wherein the current maintenance data refers to the maintenance data generated in the maintenance mode.
5. The method of claim 1, wherein entering a service mode based on the control information comprises:
determining to start the maintenance mode based on the control information, and detecting whether a preset password exists;
and if the preset password is determined to exist, controlling the terminal to restart so that the terminal enters the maintenance mode.
6. The method of claim 5, wherein entering a service mode based on the control information further comprises:
if the preset password does not exist, outputting prompt information for setting the preset password, and controlling the terminal to restart after the preset password is determined to be set.
7. The method of claim 5, wherein prior to the determining to initiate the service mode, the method further comprises:
detecting whether old maintenance data exists; the old maintenance data refers to maintenance data which are generated in the last maintenance mode and cannot be deleted;
and if the old maintenance data exist, deleting the old maintenance data.
8. The method of claim 7, further comprising:
and if the old maintenance data is not deleted within the preset time length, determining that the maintenance module fails to be opened.
9. A data protection device applied to a terminal is characterized by comprising:
the control module is used for controlling the terminal to enter a maintenance mode based on control information when the terminal is in an engineering mode, wherein in the maintenance mode, the personal space data created in the terminal is accessed, and the main space data of the terminal is encrypted;
the encryption module is used for sending prompt information for inputting a preset password when the maintenance mode enters the main space mode;
and the control module controls the terminal to be in the maintenance mode if the received input password is determined not to be matched with the preset password.
10. A terminal, characterized in that the terminal comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of any one of claims 1 to 8.
11. A non-transitory computer readable storage medium, wherein instructions in the storage medium, when executed by a processor of a terminal, enable the terminal to perform the method of any of claims 1 to 8.
CN202110331079.6A 2021-03-29 2021-03-29 Data protection method, device, terminal and storage medium Pending CN113032849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110331079.6A CN113032849A (en) 2021-03-29 2021-03-29 Data protection method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110331079.6A CN113032849A (en) 2021-03-29 2021-03-29 Data protection method, device, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN113032849A true CN113032849A (en) 2021-06-25

Family

ID=76473286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110331079.6A Pending CN113032849A (en) 2021-03-29 2021-03-29 Data protection method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113032849A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024114046A1 (en) * 2022-11-30 2024-06-06 华为技术有限公司 Vehicle control method, vehicle control system, and related device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024114046A1 (en) * 2022-11-30 2024-06-06 华为技术有限公司 Vehicle control method, vehicle control system, and related device

Similar Documents

Publication Publication Date Title
US10123196B2 (en) Method and device for alarm triggering
EP3133528B1 (en) Method and apparatus for fingerprint identification
CN109557999B (en) Bright screen control method and device and storage medium
US11100735B2 (en) Method and apparatus for controlling entrance guard
CN105491229B (en) The method and apparatus of remote control mobile terminal
CN110675539B (en) Identity verification method and device, electronic equipment and storage medium
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
CN104391712B (en) Closedown method and device
CN109325336B (en) Unlocking method, unlocking device and computer readable storage medium
US20180239915A1 (en) Methods, apparatuses, and storage mediums for protecting information
CN107147815B (en) Call processing method and device based on taxi taking
CN106302528B (en) Short message processing method and device
CN107197107B (en) Method and device for processing starting instruction
CN106066763B (en) Terminal unlocking method and device
CN107450950B (en) Method and device for processing starting instruction
CN108664216B (en) Data storage method and device
CN113032849A (en) Data protection method, device, terminal and storage medium
CN112969182A (en) PIN code setting method and device and terminal equipment
CN106570381B (en) Fingerprint unlocking method and device
CN106485151B (en) Method and device for controlling flashing
CN106980454B (en) Unlocking method and device
CN110290526B (en) Data access method, device and medium
CN114221788A (en) Login method, login device, electronic equipment and storage medium
CN108011882B (en) Method, device and system for data synchronization
CN107133531B (en) Application lock use reminding method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination