WO2016188079A1 - 终端设备的数据存储方法及终端设备 - Google Patents

终端设备的数据存储方法及终端设备 Download PDF

Info

Publication number
WO2016188079A1
WO2016188079A1 PCT/CN2015/096304 CN2015096304W WO2016188079A1 WO 2016188079 A1 WO2016188079 A1 WO 2016188079A1 CN 2015096304 W CN2015096304 W CN 2015096304W WO 2016188079 A1 WO2016188079 A1 WO 2016188079A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
stored
terminal device
encrypted
security domain
Prior art date
Application number
PCT/CN2015/096304
Other languages
English (en)
French (fr)
Inventor
魏明业
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016188079A1 publication Critical patent/WO2016188079A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers

Definitions

  • This application relates to, but is not limited to, the field of communication technology.
  • the present invention provides a data storage method and a terminal device of a terminal device, which are based on a memory card to store and store data to be stored in a terminal device to avoid loss of storage data when the terminal device is damaged.
  • a data storage method for a terminal device comprising:
  • the data to be stored is confidential data
  • the data to be stored is encrypted, and the data to be stored after being encrypted is stored in the memory card.
  • the terminal device includes a common domain and a security domain, and if the data to be stored is confidential data, encrypting the data to be stored, and storing the data to be stored after being encrypted.
  • the steps of the memory card include:
  • the data to be stored is confidential data
  • the data to be stored is placed in a security domain
  • the encrypted data is stored on the memory card.
  • the step of performing the escaping processing on the header file to obtain escaping data includes:
  • Equivalent data is obtained by performing alphabetic character mapping or character parsing processing on the header file.
  • the step of performing the encryption processing on the data to be stored, and storing the data to be stored after the encryption processing on the memory card further includes:
  • the decrypted stored data is displayed on the terminal device for the user to read.
  • the step of performing decryption processing on the stored data includes:
  • the method further includes:
  • a terminal device comprising:
  • the first obtaining module is configured to: acquire data to be stored of the terminal device;
  • the first determining module is configured to: determine whether the data to be stored is confidential data or non-confidential number according to;
  • the encryption storage module is configured to: if the data to be stored is confidential data, perform encryption processing on the to-be-stored data, and store the encrypted data to be stored in the storage card.
  • the terminal device includes a common domain and a security domain, and the encrypted storage module includes:
  • the first storage unit is configured to: if the data to be stored is confidential data, put the data to be stored into a security domain;
  • An extracting unit configured to: extract a header file of the data to be stored in the security domain
  • the first escaping processing unit is configured to: perform escaping processing on the header file to obtain escaping data;
  • the encryption processing unit is configured to: perform pre-encryption processing on the escaped data to obtain encrypted data;
  • the second storage unit is configured to: store the encrypted data in the memory card.
  • the first escaping processing unit is configured to:
  • Equivalent data is obtained by performing alphabetic character mapping or character parsing processing on the header file.
  • the terminal device further includes:
  • a second acquiring module configured to: acquire storage data in the memory card
  • the second determining module is configured to: determine whether the stored data is in a normal domain or a security domain;
  • a processing module configured to: if the stored data is in a security domain, decrypt and escape the stored data
  • the display module is configured to: display the decrypted stored data on the terminal device for reading by the user.
  • the processing module includes:
  • a receiving unit configured to: if the stored data is in a security domain, receive a decryption password
  • the determining unit is configured to: determine whether the decrypted password is consistent with the pre-encrypted password;
  • the second escaping processing unit is configured to: if the decryption password is consistent with the pre-encrypted password, perform escaping processing on the decrypted stored data.
  • the terminal device further includes:
  • the direct storage module is configured to: if the to-be-stored data is non-secure data, store the to-be-stored data in the memory card.
  • a computer readable storage medium storing computer executable instructions for performing the method of any of the above.
  • the data storage method and the terminal device of the terminal device determine whether the data to be stored is confidential data or non-confidential data by acquiring data to be stored of the terminal device, and if the data to be stored is confidential data, Encrypting the data to be stored, and storing the data to be stored after the encryption processing on the memory card.
  • the data to be stored is confidential data or non-confidential data
  • Encrypting the data to be stored and storing the data to be stored after the encryption processing on the memory card.
  • FIG. 1 is a schematic flowchart of an embodiment of a data storage method of a terminal device according to the present invention
  • FIG. 2 is a schematic diagram of a refinement process of step S103 in FIG. 1;
  • FIG. 3 is a schematic flowchart of another embodiment of a data storage method of a terminal device according to the present invention.
  • step S108 in FIG. 3 is a schematic diagram showing the refinement process of step S108 in FIG. 3;
  • FIG. 5 is a schematic diagram of functional modules of an embodiment of a terminal device according to the present invention.
  • FIG. 6 is a schematic diagram of a refinement function module of the encrypted storage module in FIG. 5;
  • FIG. 7 is a schematic diagram of functional modules of another embodiment of a terminal device according to the present invention.
  • FIG. 8 is a schematic diagram of a refinement function module of the second processing module in FIG. 7.
  • FIG. 8 is a schematic diagram of a refinement function module of the second processing module in FIG. 7.
  • Embodiments of the present invention provide a data storage method for a terminal device, which is implemented in an implementation manner with reference to FIG.
  • the data storage method of the terminal device includes the following steps:
  • Step S101 Acquire data to be stored of the terminal device.
  • the terminal device may be a mobile terminal such as a mobile phone.
  • the data to be stored may be information such as a short message, an address book, a photo, a memo, and the like.
  • Step S102 determining whether the data to be stored is confidential data or non-confidential data
  • the terminal device determines whether it is confidential data or non-confidential data according to the attribute of the data to be stored.
  • a short message, an address book, a photo, a memo, a voice video, a QQ chat record, and a WeChat chat record are all confidential data, and others may be non-confidential data.
  • other confidential data may be selected according to actual needs, and is not limited to the embodiment.
  • Step S103 if the data to be stored is confidential data, performing encryption processing on the data to be stored, and storing the data to be stored after being encrypted in a memory card;
  • the encryption process includes an escaping and a preset password processing manner
  • the memory card includes a SIM card (Subscriber Identity Module) and an SD card (Secure Digital Memory Card).
  • SIM card Subscriber Identity Module
  • SD card Secure Digital Memory Card
  • other types of memory cards may be selected, and are not limited to the embodiment.
  • Step S104 If the to-be-stored data is non-secure data, store the to-be-stored data in the memory card.
  • the terminal device determines the data to be stored, and if the data to be stored is non-secure data, the data to be stored is directly stored in a memory card such as a SIM card.
  • the data storage method of the terminal device determines whether the data to be stored is confidential data or non-confidential data by acquiring data to be stored of the terminal device, and if the data to be stored is confidential data, The data to be stored is subjected to encryption processing, and the encrypted data to be stored is stored in the memory card. In this way, by separately storing and storing the data of the security domain and the common domain of the terminal device based on the memory card, such as the SIM card, not only the security of the data storage but also the loss of the storage data caused by the damage of the terminal device can be avoided.
  • the terminal device includes a common domain and a security domain
  • the step S103 includes:
  • Step S1031 If the data to be stored is confidential data, put the data to be stored into a security domain;
  • the terminal device such as a mobile phone
  • the terminal device usually has two systems: a common domain and a security domain.
  • the mobile phone is an Android operating system, an Apple operating system, or a Symbian operating system
  • the corresponding system can be implemented in the common domain.
  • the security domain users can put private information in the security domain, in which only the most basic functions such as phone, text message and camera are provided, and all network connections are disconnected.
  • the corresponding operating system such as Android system.
  • the two systems are hardware-isolated and installed in two storage spaces, which are completely independent and cannot access each other.
  • the data to be stored is one or more of a type of short message, address book, photo, memo, voice video, QQ chat record, and WeChat chat record, the data to be stored is put into the security domain.
  • Step S1032 extracting a header file of the data to be stored in the security domain
  • Step S1033 performing escaping processing on the header file to obtain escaping data
  • the header file of the data to be stored is extracted, and the header file is encoded, and the header file is encoded as a whole, such as Unicode (Unicode, Unicode, Single Code).
  • the header file is encoded as A0 B2 00 00.
  • the header file A0 B2 00 00 is subjected to alphabetic character mapping or character parsing processing to obtain escaped data, as follows:
  • the header file adopts the alphabetic character mapping mode, that is, the custom mapping between characters and letters, such as the numbers 0 to 9 corresponding to the letters a to j, that is, the header file A0 B2 00 00 is converted to Aa Bc aa aa by alphabetic character mapping. .
  • the header file adopts the parsing character mode, that is, the header file is escaped by characters.
  • the "/" escape character is used to escape the header file A0 B2 00 00 to /A0 B2 00 00.
  • the header file may be directly changed, for example, the header file A0 B2 00 00 is converted to B0 B2 00 00, etc., and the escaping method may be reasonably set according to actual needs.
  • Step S1034 Perform pre-encryption processing on the escaping data to obtain encrypted data.
  • the pre-encryption mode may be a password that the user inputs into the terminal device in advance by using letters and/or numbers, voices, gestures, fingerprints, and the like.
  • Step S1035 storing the encrypted data in the memory card.
  • the terminal device stores the encrypted data after the encryption process in a SIM card, an SD card, or another type of memory card.
  • the stored data is first escaped and encrypted, and then stored, it can ensure that the memory card, such as the SIM card, cannot be read in the secure domain if it does not know the encrypted password when changing to another terminal device. SIM card information.
  • the method further includes:
  • Step S105 acquiring storage data in the memory card
  • Step S106 determining whether the stored data is in a normal domain or a security domain
  • the terminal device acquires the storage data pre-stored in the memory card, such as the SIM card, and determines whether the storage data is in a normal domain or a security domain of the terminal device, such as a mobile phone.
  • Step S107 if the stored data is in a normal domain, the stored data is not read;
  • the terminal device determines that the stored data is in a common domain, since the stored data is subjected to escaping and encryption processing, the data format after the escaping and encryption processing is different from the normal data format, so the normal domain cannot correctly parse the stored data. Therefore, the stored data will not be read, that is, the normal domain does not display the phone's address book and text messages.
  • Step S108 if the stored data is in a security domain, decrypting the stored data
  • the terminal device determines that the stored data is in the security domain, the decryption password input by the user is obtained, and if the password is incorrect, the jump does not read the stored data; if the decryption password entered by the user is correct, the decrypted password is decrypted.
  • Step S109 displaying the decrypted stored data on the terminal device for use. The user reads.
  • the terminal device displays the decrypted and escaping stored data on the terminal device, so that when the mobile phone is damaged or lost, the short message stored on the memory card, such as the SIM card, can still be read normally.
  • Information such as contacts.
  • the step S108 includes:
  • Step S1081 If the stored data is in a security domain, receiving a decryption password
  • Step S1082 determining whether the decryption password is consistent with a pre-encrypted password
  • the decryption password input by the user is received.
  • the pre-encryption mode may be a password that the user inputs into the terminal device in advance by letters and/or numbers, voices, gestures, fingerprints, and the like.
  • the terminal device determines whether the decryption password input by the user is consistent with the pre-encrypted password.
  • step S1083 if they match, the decrypted processed data is subjected to escaping processing.
  • the decrypted processed data is escaping; and when the terminal device determines that the decrypted password is inconsistent with the pre-encrypted password, the decryption operation cannot be performed. That is, the stored data cannot be escaped into the correct SMS and address book information.
  • it is necessary to input a decryption password that is consistent with the pre-encrypted password which not only ensures normal reading in the security domain of other terminal devices when the terminal device such as the mobile phone is damaged, but also ensures storage security.
  • the embodiment of the present invention further provides a terminal device 1.
  • the terminal device 1 includes:
  • the first obtaining module 101 is configured to: acquire data to be stored of the terminal device;
  • the terminal device 1 may be a mobile terminal such as a mobile phone.
  • the data to be stored may be information such as a short message, an address book, a photo, a memo, and the like.
  • the first determining module 102 is configured to: determine whether the data to be stored is confidential data or not Confidential data
  • the terminal device determines whether it is confidential data or non-confidential data according to the attribute of the data to be stored.
  • a short message, an address book, a photo, a memo, a voice video, a QQ chat record, and a WeChat chat record are all confidential data, and others may be non-confidential data.
  • other confidential data may be selected according to actual needs, and is not limited to the embodiment.
  • the encryption storage module 103 is configured to: if the data to be stored is confidential data, perform encryption processing on the data to be stored, and store the data to be stored after being encrypted in a memory card;
  • the encryption process includes an escaping and a preset password processing manner
  • the memory card includes a SIM card (Subscriber Identity Module) and an SD card (Secure Digital Memory Card).
  • SIM card Subscriber Identity Module
  • SD card Secure Digital Memory Card
  • other types of memory cards may be selected, and are not limited to the embodiment.
  • the direct storage module 104 is configured to: if the to-be-stored data is non-secure data, store the to-be-stored data in the memory card.
  • the terminal device 1 determines the data to be stored, and if the data to be stored is non-secure data, the data to be stored is directly stored in a memory card such as a SIM card.
  • the terminal device 1 determines whether the data to be stored is confidential data or non-secure data by acquiring data to be stored in the terminal device, and if the data to be stored is confidential data, the data to be stored is The encryption process is performed, and the encrypted data to be stored is stored in the memory card. In this way, by separately storing and storing the data of the security domain and the common domain of the terminal device based on the memory card, such as the SIM card, not only the security of the data storage but also the loss of the storage data caused by the damage of the terminal device can be avoided.
  • the terminal device includes a common domain and a security domain
  • the encrypted storage module 103 includes:
  • the first storage unit 1031 is configured to: if the data to be stored is confidential data, put the data to be stored into a security domain;
  • the terminal device such as a mobile phone
  • the terminal device usually has two systems: a common domain and a security domain.
  • the mobile phone is one of an Android operating system, an Apple operating system, or a Symbian operating system, in a normal domain.
  • the security domain the user can put the private information in the security domain.
  • the two systems are hardware-isolated and installed in two storage spaces, which are completely independent and cannot access each other. If the data to be stored is one or more of a type of short message, address book, photo, memo, voice video, QQ chat record, and WeChat chat record, the data to be stored is put into the security domain.
  • the extracting unit 1032 is configured to: extract a header file of the data to be stored in the security domain;
  • the first escaping processing unit 1033 is configured to: perform escaping processing on the header file to obtain escaping data;
  • the header file of the data to be stored is extracted, and the header file is encoded, and the header file is encoded as a whole, such as Unicode (Unicode, Unicode, Single Code).
  • the header file is encoded as A0 B2 00 00.
  • the header file A0 B2 00 00 is subjected to alphabetic character mapping or character parsing processing to obtain escaped data, as follows:
  • the header file adopts the alphabetic character mapping mode, that is, the custom mapping between characters and letters, such as the numbers 0 to 9 corresponding to the letters a to j, that is, the header file A0 B2 00 00 is converted to Aa Bc aa aa by alphabetic character mapping. .
  • the header file adopts the parsing character mode, that is, the header file is escaped by characters.
  • the "/" escape character is used to escape the header file A0 B2 00 00 to /A0 B2 00 00.
  • the header file may be directly changed, for example, the header file A0 B2 00 00 is converted to B0 B2 00 00, etc., and the escaping method may be reasonably set according to actual needs.
  • the encryption processing unit 1034 is configured to: perform pre-encryption processing on the escaping data to obtain encrypted data;
  • the pre-encryption mode may be a user pre-designated with letters and/or numbers, voices, hands.
  • the password input to the terminal device 1 in the manner of a potential, a fingerprint, or the like.
  • the second storage unit 1035 is configured to store the encrypted data in the memory card.
  • the terminal device 1 stores the encrypted data after the encryption processing in a SIM card, an SD card, or another type of memory card.
  • the stored data is first escaping and encrypted, and then stored, it is ensured that the memory card, such as the SIM card, cannot be read in the secure domain if it is not changed to the other terminal device 1 without knowing the encrypted password. Take the SIM card information.
  • the terminal device 1 further includes:
  • the second obtaining module 105 is configured to: acquire storage data in the memory card
  • the second determining module 106 is configured to: determine whether the stored data is in a normal domain or a security domain;
  • the terminal device 1 acquires the storage data pre-stored in the memory card, such as the SIM card, and determines whether the stored data is in the normal domain or the security domain of the terminal device 1, such as a mobile phone.
  • the non-reading module 107 is configured to: if the stored data is in a normal domain, the stored data is not read;
  • the terminal device 1 determines that the stored data is in the normal domain, since the stored data is subjected to escaping and encryption processing, the data format after the escaping and encryption processing is different from the normal data format, so the normal domain cannot correctly parse the storage. Data, so the stored data will not be read, that is, the normal domain will not display the phone's address book and SMS messages.
  • the processing module 108 is configured to: if the stored data is in a security domain, perform decryption processing on the stored data;
  • the terminal device 1 determines that the stored data is in the security domain, the decryption password input by the user is obtained, and if the password is incorrect, the jump does not read the stored data; if the decryption password entered by the user is correct, the decryption password is decrypted.
  • the stored data is escaped to escape to the normal header file format.
  • the display module 109 is configured to: the decrypted processed data is input on the terminal device 1 The line is displayed for the user to read.
  • the terminal device 1 displays the decrypted and escaping stored data on the terminal device 1, so that when the mobile phone is damaged or lost, the terminal device 1 can still read and store the memory card, such as a SIM card. SMS and address book and other information.
  • the memory card such as a SIM card. SMS and address book and other information.
  • the processing module 108 includes:
  • the receiving unit 1081 is configured to: if the stored data is in a security domain, receive a decryption password;
  • the determining unit 1082 is configured to: determine whether the decryption password is consistent with the pre-encrypted password;
  • the terminal device 1 when the terminal device 1 determines that the stored data is in the secure domain, it receives the decryption password input by the user.
  • the pre-encryption mode may be a password that the user inputs to the terminal device 1 in advance by letters and/or numbers, voices, gestures, fingerprints, and the like.
  • the terminal device 1 determines whether the decryption password input by the user is consistent with the pre-encrypted password.
  • the second escape processing unit 1083 is configured to perform the escaping processing on the decrypted stored data if the decrypted password matches the pre-encrypted password.
  • the terminal device 1 when the terminal device 1 determines that the decrypted password is consistent with the pre-encrypted password, the decrypted processed stored data is escaped; and when the terminal device 1 determines that the decrypted password is inconsistent with the pre-encrypted password, the terminal device 1 cannot perform the decryption process.
  • the decryption operation that is, the stored data cannot be escaped into the correct text message and address book and other information. In this way, when decrypting, it is necessary to input a decryption password that is consistent with the pre-encrypted password, which not only ensures normal reading in the security domain of other terminal device 1 when the terminal device 1 is damaged, but also ensures storage security. .
  • all or part of the steps of the foregoing embodiments may also be implemented by using an integrated circuit, and the steps may be separately fabricated into integrated circuit modules, or multiple modules thereof or The steps are made into a single integrated circuit module.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • the device/function module/functional unit in the above embodiment When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the data storage method and the terminal device of the terminal device provided by the embodiment of the present invention can store and store the data to be stored by the terminal device based on the memory card, thereby ensuring the security of the data storage and avoiding the loss of the storage data caused by the terminal device being damaged.
  • the phenomenon can be compared to determine whether the data is stored by the terminal device based on the memory card.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

一种终端设备的数据存储方法及终端设备,所述终端设备的数据存储方法包括:获取终端设备的待存储数据(S101);判断所述待存储数据是保密数据还是非保密数据(S102);若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡(S103)。

Description

终端设备的数据存储方法及终端设备 技术领域
本申请涉及但不限于通讯技术领域。
背景技术
目前越来越多的智能终端如手机的短信和电话本等保密信息只能存储在手机侧才能正常读取,而当手机损坏或丢失时,手机端的存储卡如SIM卡则无法区分这些信息是保密信息还是非保密信息,从而导致信息丢失。
上述内容仅用于辅助理解本申请的技术方案,并不代表承认上述内容是现有技术。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本文提供一种终端设备的数据存储方法及终端设备,基于存储卡对终端设备的待存储数据进行区分存储,避免终端设备损坏时造成存储数据丢失的现象。
一种终端设备的数据存储方法,包括:
获取终端设备的待存储数据;
判断所述待存储数据是保密数据还是非保密数据;
若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡。
可选地,所述终端设备包括普通域和安全域,所述若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡的步骤包括:
若所述待存储数据是保密数据,则将所述待存储数据放入安全域;
提取安全域中所述待存储数据的头文件;
对所述头文件进行转义处理,得到转义数据;
将所述转义数据进行预加密处理,得到加密数据;
将所述加密数据存储于所述存储卡。
可选地,所述对所述头文件进行转义处理,得到转义数据的步骤包括:
对所述头文件进行字母字符映射或字符解析处理,得到转义数据。
可选地,所述若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡的步骤之后还包括:
获取所述存储卡中的存储数据;
判断所述存储数据是处于普通域还是安全域;
若所述存储数据处于安全域,则对所述存储数据进行解密处理;
将经解密处理后的存储数据在终端设备上进行显示,以供用户读取。
可选地,所述若所述存储数据处于安全域,则对所述存储数据进行解密处理的步骤包括:
若所述存储数据处于安全域,则接收解密密码;
判断所述解密密码是否与预加密密码一致;
若一致,则对经解密处理后的存储数据进行转义处理。
可选地,所述判断所述待存储数据是保密数据还是非保密数据的步骤之后还包括:
若所述待存储数据是非保密数据,则将所述待存储数据存储于所述存储卡。
一种终端设备,所述终端设备包括:
第一获取模块,设置为:获取终端设备的待存储数据;
第一判断模块,设置为:判断所述待存储数据是保密数据还是非保密数 据;
加密存储模块,设置为:若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡。
所述终端设备包括普通域和安全域,所述加密存储模块包括:
第一存储单元,设置为:若所述待存储数据是保密数据,则将所述待存储数据放入安全域;
提取单元,设置为:提取安全域中所述待存储数据的头文件;
第一转义处理单元,设置为:对所述头文件进行转义处理,得到转义数据;
加密处理单元,设置为:将所述转义数据进行预加密处理,得到加密数据;
第二存储单元,设置为:将所述加密数据存储于所述存储卡。
可选地,所述第一转义处理单元是设置为:
对所述头文件进行字母字符映射或字符解析处理,得到转义数据。
可选地,所述终端设备还包括:
第二获取模块,设置为:获取所述存储卡中的存储数据;
第二判断模块,设置为:判断所述存储数据是处于普通域还是安全域;
处理模块,设置为:若所述存储数据处于安全域,则对所述存储数据进行解密和转义处理;
显示模块,设置为:将经解密处理后的存储数据在终端设备上进行显示,以供用户读取。
可选地,所述处理模块包括:
接收单元,设置为:若所述存储数据处于安全域,则接收解密密码;
判断单元,设置为:判断所述解密密码是否与预加密密码一致;
第二转义处理单元,设置为:若所述解密密码与预加密密码一致,则对经解密处理后的存储数据进行转义处理。
可选地,所述终端设备还包括:
直接存储模块,设置为:若所述待存储数据是非保密数据,则将所述待存储数据存储于所述存储卡。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述任一项的方法。
本发明实施例提供的终端设备的数据存储方法及终端设备,通过获取终端设备的待存储数据,判断所述待存储数据是保密数据还是非保密数据,若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡。这样,通过基于存储卡对终端设备的安全域和普通域的数据进行区分存储,不仅可以保证数据存储的安全性,还可以避免终端设备损坏时造成的存储数据丢失的现象。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明终端设备的数据存储方法一实施例的流程示意图;
图2为图1中步骤S103的细化流程示意图;
图3为本发明终端设备的数据存储方法另一实施例的流程示意图;
图4为图3中步骤S108的细化流程示意图;
图5为本发明终端设备一实施例的功能模块示意图;
图6为图5中加密存储模块的细化功能模块示意图;
图7为本发明终端设备另一实施例的功能模块示意图;
图8为图7中第二处理模块的细化功能模块示意图。
本发明的实施方式
本发明实施例提供一种终端设备的数据存储方法,参照图1,在一实施 例中,所述终端设备的数据存储方法包括以下步骤:
步骤S101,获取终端设备的待存储数据;
本实施例中,终端设备可以为手机等移动终端。以手机为例,所述待存储数据可以是短信、通讯录、照片、备忘录等信息。
步骤S102,判断所述待存储数据是保密数据还是非保密数据;
本实施例中,终端设备根据待存储数据的属性判断是保密数据还是非保密数据。以手机为例,短信、通讯录、照片、备忘录、语音视频、QQ聊天记录以及微信聊天记录等均属于保密数据,其他则可以为非保密数据。在其他实施例中,可以根据实际需要选择其他保密数据,并不局限于本实施例。
步骤S103,若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡;
本实施例中,加密处理包括转义以及预设密码的处理方式,存储卡包括SIM卡(Subscriber Identity Module,客户识别模块卡)以及SD卡(SD卡Secure Digital Memory Card,安全数码卡)等,在其他实施例中,可以选择其他类型存储卡,并不局限于本实施例。
步骤S104,若所述待存储数据是非保密数据,则将所述待存储数据存储于所述存储卡。
本实施例中,终端设备对待存储数据进行判断,若所述待存储数据是非保密数据,则将待存储数据直接存储于存储卡如SIM卡即可。
本发明实施例提供的终端设备的数据存储方法,通过获取终端设备的待存储数据,判断所述待存储数据是保密数据还是非保密数据,若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡。这样,通过基于存储卡如SIM卡对终端设备的安全域和普通域的数据进行区分存储,不仅可以保证数据存储的安全性,还可以避免终端设备损坏时造成的存储数据丢失的现象。
在一实施例中,如图2所示,在图1的实施例的基础上,所述终端设备包括普通域和安全域,所述步骤S103包括:
步骤S1031,若所述待存储数据是保密数据,则将所述待存储数据放入安全域;
本实施例中,终端设备如手机,通常具备普通域和安全域两个系统,若手机是安卓操作系统、苹果操作系统或塞班操作系统等的一种,则在普通域内可以实现对应系统的常规操作;而在安全域,用户可将隐私信息放在安全域内,在此系统内仅提供电话、短信以及拍照等最基础的功能,并断开一切网络连接。当用户需要正常使用手机时,切换到对应的操作系统如安卓系统即可。可以理解的是,这两个系统采用硬件隔离方式,分别安装在两个存储空间,完全独立运行,无法互相访问。若待存储数据是短信、通讯录、照片、备忘录、语音视频、QQ聊天记录以及微信聊天记录等类型中的一种或多种,则将待存储数据放入安全域。
步骤S1032,提取安全域中所述待存储数据的头文件;
步骤S1033,对所述头文件进行转义处理,得到转义数据;
本实施例中,当待存储数据处于安全域时,提取所述待存储数据的头文件,头文件采用编码制度,对头文件进行整体编码,如采用Unicode(统一码、万国码、单一码)编码,头文件编码为A0 B2 00 00。
本实施例中,对所述头文件A0 B2 00 00进行字母字符映射或字符解析处理,得到转义数据,如下:
1、头文件采用字母字符映射模式,即字符与字母间的自定义映射,如数字0~9对应字母a~j,即头文件A0 B2 00 00采用字母字符映射后转义为Aa Bc aa aa。
2、头文件采用解析字符模式,即头文件采用字符转义,例如采用“/”转义字符,将头文件A0 B2 00 00转义为/A0 B2 00 00。
可以理解的是,在其他实施例中,也可以直接改变头文件,如头文件A0 B2 00 00转义后为B0 B2 00 00等,转义方法可以根据实际需要合理设置。
由于头文件经过转义处理,因此,普通域无法正确解析数据,因而不会在通讯录和短信模块等显示安全域的信息。
步骤S1034,将所述转义数据进行预加密处理,得到加密数据;
本实施例中,预加密方式可以为用户预先以字母和/或数字、语音、手势、指纹等方式输入至终端设备的密码。
步骤S1035,将所述加密数据存储于所述存储卡。
本实施例中,终端设备将经加密处理后的转义数据存储于SIM卡、SD卡或其他类型的存储卡内。
由于先对待存储数据进行转义和加密处理,然后才进行存储,这样,可以保证存储卡如SIM卡在更换到另外一台终端设备时,若不知道加密密码,则无法在安全域进行读取SIM卡信息。
在一实施例中,如图3所示,在图1的实施例的基础上,所述步骤S103之后还包括:
步骤S105,获取所述存储卡中的存储数据;
步骤S106,判断所述存储数据是处于普通域还是安全域;
本实施例中,终端设备获取存储卡如SIM卡中预存的存储数据,并判断存储数据处于终端设备如手机的普通域还是安全域。
步骤S107,若所述存储数据处于普通域,则不读取所述存储数据;
本实施例中,若终端设备判断存储数据处于普通域,由于存储数据经过转义和加密处理,转义和加密处理后的数据格式与正常的数据格式不相同,故普通域无法正确解析存储数据,因而不会读取存储数据,也即普通域不会显示手机的通讯录以及短信等信息。
步骤S108,若所述存储数据处于安全域,则对所述存储数据进行解密处理;
本实施例中,若终端设备判断存储数据处于安全域,则获取用户输入的解密密码,若密码错误则跳转到不读取存储数据;若用户输入的解密密码密码正确,则对解密后的存储数据进行转义,以转义为正常的头文件格式。
步骤S109,将经解密处理后的存储数据在终端设备上进行显示,以供用 户读取。
本实施例中,终端设备将经解密和转义处理后的存储数据在终端设备上进行显示,这样,当手机损坏或丢失时,仍可正常读取存储于存储卡如SIM卡上的短信以及通讯录等信息。
在一实施例中,如图4所示,在图3的实施例的基础上,所述步骤S108包括:
步骤S1081,若所述存储数据处于安全域,则接收解密密码;
步骤S1082,判断所述解密密码是否与预加密密码一致;
本实施例中,当终端设备判断存储数据处于安全域时,则会接收用户输入的解密密码。预加密方式可以为用户预先以字母和/或数字、语音、手势、指纹等方式输入至终端设备的密码。终端设备会判断用户输入的解密密码是否与预加密密码一致。
步骤S1083,若一致,则对经解密处理后的存储数据进行转义处理。
本实施例中,在终端设备判断解密密码与预加密密码一致时,则对经解密处理后的存储数据进行转义处理;在终端设备判断解密密码与预加密密码不一致时,则无法进行解密操作,也即存储数据无法转义成正确的短信以及通讯录等信息。这样,在解密时需要输入与预加密密码一致的解密密码,不仅可以保证在终端设备如手机损坏时,仍可在其他终端设备的安全域进行正常读取,还可保证存储的安全性。
本发明实施例还提供一种终端设备1,参照图5,在一实施例中,所述终端设备1包括:
第一获取模块101,设置为:获取终端设备的待存储数据;
本实施例中,终端设备1可以为手机等移动终端。以手机为例,所述待存储数据可以是短信、通讯录、照片、备忘录等信息。
第一判断模块102,设置为:判断所述待存储数据是保密数据还是非保 密数据;
本实施例中,终端设备根据待存储数据的属性判断是保密数据还是非保密数据。以手机为例,短信、通讯录、照片、备忘录、语音视频、QQ聊天记录以及微信聊天记录等均属于保密数据,其他则可以为非保密数据。在其他实施例中,可以根据实际需要选择其他保密数据,并不局限于本实施例。
加密存储模块103,设置为:若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡;
本实施例中,加密处理包括转义以及预设密码的处理方式,存储卡包括SIM卡(Subscriber Identity Module,客户识别模块卡)以及SD卡(SD卡Secure Digital Memory Card,安全数码卡)等,在其他实施例中,可以选择其他类型存储卡,并不局限于本实施例。
直接存储模块104,设置为:若所述待存储数据是非保密数据,则将所述待存储数据存储于所述存储卡。
本实施例中,终端设备1对待存储数据进行判断,若待存储数据是非保密数据,则将待存储数据直接存储于存储卡如SIM卡即可。
本发明实施例提供的终端设备1,通过获取终端设备的待存储数据,判断所述待存储数据是保密数据还是非保密数据,若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡。这样,通过基于存储卡如SIM卡对终端设备的安全域和普通域的数据进行区分存储,不仅可以保证数据存储的安全性,还可以避免终端设备损坏时造成的存储数据丢失的现象。
在一实施例中,如图6所示,在图5的实施例的基础上,所述终端设备包括普通域和安全域,所述加密存储模块103包括:
第一存储单元1031,设置为:若所述待存储数据是保密数据,则将所述待存储数据放入安全域;
本实施例中,终端设备如手机,通常具备普通域和安全域两个系统,若手机是安卓操作系统、苹果操作系统或塞班操作系统等的一种,则在普通域 内可以实现对应系统的常规操作;而在安全域,用户可将隐私信息放在安全域内,在此系统内仅提供电话、短信以及拍照等最基础的功能,并断开一切网络连接。当用户需要正常使用手机时,切换到对应的操作系统如安卓系统即可。可以理解的是,这两个系统采用硬件隔离方式,分别安装在两个存储空间,完全独立运行,无法互相访问。若待存储数据是短信、通讯录、照片、备忘录、语音视频、QQ聊天记录以及微信聊天记录等类型中的一种或多种,则将待存储数据放入安全域。
提取单元1032,设置为:提取安全域中所述待存储数据的头文件;
第一转义处理单元1033,设置为:对所述头文件进行转义处理,得到转义数据;
本实施例中,当待存储数据处于安全域时,提取所述待存储数据的头文件,头文件采用编码制度,对头文件进行整体编码,如采用Unicode(统一码、万国码、单一码)编码,头文件编码为A0 B2 00 00。
本实施例中,对所述头文件A0 B2 00 00进行字母字符映射或字符解析处理,得到转义数据,如下:
1、头文件采用字母字符映射模式,即字符与字母间的自定义映射,如数字0~9对应字母a~j,即头文件A0 B2 00 00采用字母字符映射后转义为Aa Bc aa aa。
2、头文件采用解析字符模式,即头文件采用字符转义,例如采用“/”转义字符,将头文件A0 B2 00 00转义为/A0 B2 00 00。
可以理解的是,在其他实施例中,也可以直接改变头文件,如头文件A0 B2 00 00转义后为B0 B2 00 00等,转义方法可以根据实际需要合理设置。
由于头文件经过转义处理,因此,普通域无法正确解析数据,因而不会在通讯录和短信模块等显示安全域的信息。
加密处理单元1034,设置为:将所述转义数据进行预加密处理,得到加密数据;
本实施例中,预加密方式可以为用户预先以字母和/或数字、语音、手 势、指纹等方式输入至终端设备1的密码。
第二存储单元1035,设置为:将所述加密数据存储于所述存储卡。
本实施例中,终端设备1将经加密处理后的转义数据存储于SIM卡、SD卡或其他类型的存储卡内。
由于先对待存储数据进行转义和加密处理,然后才进行存储,这样,可以保证存储卡如SIM卡在更换到另外一台终端设备1时,若不知道加密密码,则无法在安全域进行读取SIM卡信息。
在一实施例中,如图7所示,在图5的实施例的基础上,所述终端设备1还包括:
第二获取模块105,设置为:获取所述存储卡中的存储数据;
第二判断模块106,设置为:判断所述存储数据是处于普通域还是安全域;
本实施例中,终端设备1获取存储卡如SIM卡中预存的存储数据,并判断存储数据处于终端设备1如手机的普通域还是安全域。
非读取模块107,设置为:若所述存储数据处于普通域,则不读取所述存储数据;
本实施例中,若终端设备1判断存储数据处于普通域,由于存储数据经过转义和加密处理,转义和加密处理后的数据格式与正常的数据格式不相同,故普通域无法正确解析存储数据,因而不会读取存储数据,也即普通域不会显示手机的通讯录以及短信等信息。
处理模块108,设置为:若所述存储数据处于安全域,则对所述存储数据进行解密处理;
本实施例中,若终端设备1判断存储数据处于安全域,则获取用户输入的解密密码,若密码错误则跳转到不读取存储数据;若用户输入的解密密码密码正确,则对解密后的存储数据进行转义,以转义为正常的头文件格式。
显示模块109,设置为:将经解密处理后的存储数据在终端设备1上进 行显示,以供用户读取。
本实施例中,终端设备1将经解密和转义处理后的存储数据在终端设备1上进行显示,这样,当手机损坏或丢失时,仍可正常读取存储于存储卡如SIM卡上的短信以及通讯录等信息。
在一实施例中,如图8所示,在图7的实施例的基础上,所述处理模块108包括:
接收单元1081,设置为:若所述存储数据处于安全域,则接收解密密码;
判断单元1082,设置为:判断所述解密密码是否与预加密密码一致;
本实施例中,当终端设备1判断存储数据处于安全域时,则会接收用户输入的解密密码。预加密方式可以为用户预先以字母和/或数字、语音、手势、指纹等方式输入至终端设备1的密码。终端设备1会判断用户输入的解密密码是否与预加密密码一致。
第二转义处理单元1083,设置为:若所述解密密码与预加密密码一致,则对经解密处理后的存储数据进行转义处理。
本实施例中,在终端设备1判断解密密码与预加密密码一致时,则对经解密处理后的存储数据进行转义处理;在终端设备1判断解密密码与预加密密码不一致时,则无法进行解密操作,也即存储数据无法转义成正确的短信以及通讯录等信息。这样,在解密时需要输入与预加密密码一致的解密密码,不仅可以保证在终端设备1如手机损坏时,仍可在其他终端设备1的安全域进行正常读取,还可保证存储的安全性。
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或 步骤制作成单个集成电路模块来实现。
上述实施例中的装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。
上述实施例中的装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。
工业实用性
本发明实施例提供的终端设备的数据存储方法及终端设备,可以基于存储卡对终端设备的待存储数据进行区分存储,不仅可以保证数据存储的安全性,避免终端设备损坏时造成的存储数据丢失的现象。

Claims (13)

  1. 一种终端设备的数据存储方法,包括:
    获取终端设备的待存储数据;
    判断所述待存储数据是保密数据还是非保密数据;
    若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡。
  2. 如权利要求1所述的终端设备的数据存储方法,其中,所述终端设备包括普通域和安全域,所述若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡的步骤包括:
    若所述待存储数据是保密数据,则将所述待存储数据放入安全域;
    提取安全域中所述待存储数据的头文件;
    对所述头文件进行转义处理,得到转义数据;
    将所述转义数据进行预加密处理,得到加密数据;
    将所述加密数据存储于所述存储卡。
  3. 如权利要求2所述的终端设备的数据存储方法,其中,所述对所述头文件进行转义处理,得到转义数据的步骤包括:
    对所述头文件进行字母字符映射或字符解析处理,得到转义数据。
  4. 如权利要求2所述的终端设备的数据存储方法,其中,所述若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡的步骤之后还包括:
    获取所述存储卡中的存储数据;
    判断所述存储数据是处于普通域还是安全域;
    若所述存储数据处于安全域,则对所述存储数据进行解密处理;
    将经解密处理后的存储数据在终端设备上进行显示,以供用户读取。
  5. 如权利要求4所述的终端设备的数据存储方法,其中,所述若所述 存储数据处于安全域,则对所述存储数据进行解密处理的步骤包括:
    若所述存储数据处于安全域,则接收解密密码;
    判断所述解密密码是否与预加密密码一致;
    若一致,则对经解密处理后的存储数据进行转义处理。
  6. 如权利要求1所述的终端设备的数据存储方法,其中,所述判断所述待存储数据是保密数据还是非保密数据的步骤之后还包括:
    若所述待存储数据是非保密数据,则将所述待存储数据存储于所述存储卡。
  7. 一种终端设备,所述终端设备包括:
    第一获取模块,设置为:获取终端设备的待存储数据;
    第一判断模块,设置为:判断所述待存储数据是保密数据还是非保密数据;
    加密存储模块,设置为:若所述待存储数据是保密数据,则对所述待存储数据进行加密处理,并将经加密处理后的待存储数据存储于存储卡。
  8. 如权利要求7所述的终端设备,其中,所述终端设备包括普通域和安全域,所述加密存储模块包括:
    第一存储单元,设置为:若所述待存储数据是保密数据,则将所述待存储数据放入安全域;
    提取单元,设置为:提取安全域中所述待存储数据的头文件;
    第一转义处理单元,设置为:对所述头文件进行转义处理,得到转义数据;
    加密处理单元,设置为:将所述转义数据进行预加密处理,得到加密数据;
    第二存储单元,设置为:将所述加密数据存储于所述存储卡。
  9. 如权利要求8所述的终端设备,其中,所述第一转义处理单元是设置为:
    对所述头文件进行字母字符映射或字符解析处理,得到转义数据。
  10. 如权利要求8所述的终端设备,所述终端设备还包括:
    第二获取模块,设置为:获取所述存储卡中的存储数据;
    第二判断模块,设置为:判断所述存储数据是处于普通域还是安全域;
    处理模块,设置为:若所述存储数据处于安全域,则对所述存储数据进行解密处理;
    显示模块,设置为:将经解密处理后的存储数据在终端设备上进行显示,以供用户读取。
  11. 如权利要求10所述的终端设备,其中,所述处理模块包括:
    接收单元,设置为:若所述存储数据处于安全域,则接收解密密码;
    判断单元,设置为:判断所述解密密码是否与预加密密码一致;
    第二转义处理单元,设置为:若所述解密密码与预加密密码一致,则对经解密处理后的存储数据进行转义处理。
  12. 如权利要求7所述的终端设备,所述终端设备还包括:
    直接存储模块,设置为:若所述待存储数据是非保密数据,则将所述待存储数据存储于所述存储卡。
  13. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1-6任一项的方法。
PCT/CN2015/096304 2015-05-22 2015-12-03 终端设备的数据存储方法及终端设备 WO2016188079A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510266837.5 2015-05-22
CN201510266837.5A CN106293495A (zh) 2015-05-22 2015-05-22 终端设备的数据存储方法及终端设备

Publications (1)

Publication Number Publication Date
WO2016188079A1 true WO2016188079A1 (zh) 2016-12-01

Family

ID=57393510

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/096304 WO2016188079A1 (zh) 2015-05-22 2015-12-03 终端设备的数据存储方法及终端设备

Country Status (2)

Country Link
CN (1) CN106293495A (zh)
WO (1) WO2016188079A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709378A (zh) * 2017-02-16 2017-05-24 惠州Tcl移动通信有限公司 一种存储卡的加密方法及存储设备
CN109145538B (zh) * 2018-07-27 2020-08-07 国政通科技有限公司 一种保护信息安全性的身份通
CN112671766A (zh) * 2020-12-23 2021-04-16 玖纵网络科技(上海)有限公司 一种使用私有前置服务器实现隐私信息安全存储的方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727458A (zh) * 2008-10-30 2010-06-09 爱思开电讯投资(中国)有限公司 用于智能卡的数据库管理系统和方法
CN103177224A (zh) * 2013-02-06 2013-06-26 东莞宇龙通信科技有限公司 用于终端的外接存储卡数据保护的方法及装置
CN103220300A (zh) * 2012-12-05 2013-07-24 清华大学 一种支持动态远程证明的移动终端系统
WO2014030427A1 (ja) * 2012-08-24 2014-02-27 ソニー株式会社 情報処理装置、情報記憶装置、サーバ、情報処理システム、および情報処理方法、並びにプログラム
CN104184892A (zh) * 2014-08-12 2014-12-03 桂林微网半导体有限责任公司 基于移动终端智能卡的数据传输方法及移动终端

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279752B (zh) * 2011-08-31 2014-03-12 北京华电万通科技有限公司 一种基于Web3D的超大场景实时渲染装置和方法
CN202736492U (zh) * 2012-07-19 2013-02-13 杭州网搜科技有限公司 一种指纹加密usb存储设备
CN102866960A (zh) * 2012-09-05 2013-01-09 中兴通讯股份有限公司 一种在存储卡中实现加密的方法、解密的方法和装置
CN103677654B (zh) * 2012-09-24 2018-03-23 联想(北京)有限公司 一种存储数据的方法及电子设备
CN104104753A (zh) * 2013-04-15 2014-10-15 德信无线通讯科技(北京)有限公司 双t卡手机

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727458A (zh) * 2008-10-30 2010-06-09 爱思开电讯投资(中国)有限公司 用于智能卡的数据库管理系统和方法
WO2014030427A1 (ja) * 2012-08-24 2014-02-27 ソニー株式会社 情報処理装置、情報記憶装置、サーバ、情報処理システム、および情報処理方法、並びにプログラム
CN103220300A (zh) * 2012-12-05 2013-07-24 清华大学 一种支持动态远程证明的移动终端系统
CN103177224A (zh) * 2013-02-06 2013-06-26 东莞宇龙通信科技有限公司 用于终端的外接存储卡数据保护的方法及装置
CN104184892A (zh) * 2014-08-12 2014-12-03 桂林微网半导体有限责任公司 基于移动终端智能卡的数据传输方法及移动终端

Also Published As

Publication number Publication date
CN106293495A (zh) 2017-01-04

Similar Documents

Publication Publication Date Title
US9331856B1 (en) Systems and methods for validating digital signatures
US10922435B2 (en) Image encryption method, image viewing method, system, and terminal
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
Azfar et al. An android social app forensics adversary model
US10461934B2 (en) Authentication-based message display method and communication terminal thereof
KR20140042905A (ko) 신원 인증 관리 장치 및 신원 인증 관리 방법
CN112287372B (zh) 用于保护剪贴板隐私的方法和装置
CN103294961A (zh) 一种文件加/解密方法以及文件加/解密装置
CN103532960B (zh) 解密装置
CN106326018B (zh) 一种数据访问方法及终端
EP3176719A1 (en) Methods and devices for acquiring certification document
CN115795538B (zh) 脱敏文档的反脱敏方法、装置、计算机设备和存储介质
WO2020233047A1 (zh) 页面测试的方法及装置
US20200145389A1 (en) Controlling Access to Data
CN104680078A (zh) 一种拍摄照片的方法、查看图片的方法、系统和终端
WO2016188079A1 (zh) 终端设备的数据存储方法及终端设备
CN114598671B (zh) 会话消息处理方法、装置、存储介质以及电子设备
JP2017516343A (ja) アドレス帳保護方法、装置及び通信システム
CN110417740B (zh) 用户数据的处理方法、智能终端、服务器及存储介质
WO2015154464A1 (zh) 一种加密方法和装置
KR20140043836A (ko) 지문 정보를 이용하는 통신 시스템 및 이러한 통신 시스템의 사용법
JP2007053658A (ja) 問い合わせ対応システム、端末、サーバ及びプログラム
CN109145827A (zh) 视频通讯方法及装置
CN115098464A (zh) 数据的脱敏方法、装置、电子设备和计算机可读存储介质
CN106161365B (zh) 一种数据处理方法、装置及终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15893147

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15893147

Country of ref document: EP

Kind code of ref document: A1