Unlock instant, AI-driven research and patent intelligence for your innovation.

Data protection method and terminal

A data protection and terminal technology, applied in the field of mobile communication, can solve the problems of easy leakage of USIM, leakage of information, security risks, etc., and achieve the effect of avoiding frequent reading and use

Active Publication Date: 2011-12-14
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The memory is divided into RAM (data lost after power failure) and FLASH (data is still saved after power failure). If the mobile phone automatically saves data in FLASH, the data will exist even if the mobile phone is turned off or power off, which is a potential safety hazard.
[0005] For example, the user's USIM information is copied to the FLASH by the application program without the user's knowledge. After the user shuts down the phone normally, takes out the USIM card, and then turns it on again, the information in the original USIM is still saved in the mobile phone. This is not what the user wants. Or in some cases, the user may temporarily use the mobile phone to other users, even if the original USIM has been taken out and replaced by another user's USIM, but because the data in the original USIM is saved in FLASH, The information in the original USIM will be leaked inadvertently, which is a potential safety hazard
That is to say, when the application program in the terminal saves the data in the mobile phone without the user's knowledge, it is easy to leak the highly private information in the USIM, causing a security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and terminal
  • Data protection method and terminal
  • Data protection method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the present invention is not limited to the specific embodiments disclosed below limit.

[0025] figure 1 is a flowchart of a data protection method according to an embodiment of the present invention.

[0026] like figure 1 As shown, the present invention provides a data protection method, including: step 102, when receiving an instruction from an application program to store data in a shared data area, confirm whether the instruction is automatically issued by the application program; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data protection method and a terminal, wherein the data protection method comprises the following steps: step 102, receiving an instruction of saving data to a shared data region from an application program and then confirming whether the instruction is automatically sent out by the application program; and step 104, saving the data to an RAM (random access memory) in the shared data region if the instruction is automatically sent out by the application program. By the invention, data probably read by a malicious program autonomously can be saved to the RAM while the data can be lost if the RAM is powered down, thus the potential safety hazard can be prevented from keeping for a long time and the data can be prevented from being used by the malicious program.

Description

technical field [0001] The present invention relates to mobile communication technology, in particular, to a data protection method and a terminal. Background technique [0002] In the current mobile terminal, some important data need to be frequently used by multiple different functional modules. For example, for a multi-mode multi-card mobile phone, multiple communication modules therein often need to use the data in the USIM card (Universal Subscriber Identity Module, Global Subscriber Identity Module), which requires the data of the USIM card to be shared. After a communication module is closed, the user can still read the data of the USIM card corresponding to the module. [0003] For the above content, the current solution is to read the information in each USIM card after the mobile phone is turned on, and store it in a shared area, that is, an area where multiple functional modules or application programs can perform read and write operations, and the AP ( The Appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14
Inventor 陈华星陈一槐刘珍珍
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD