Data protection method and terminal

A data protection and terminal technology, applied in electrical components, wireless communication, security devices, etc., can solve problems such as stealing information, hidden dangers, and insecurity, and achieve the effect of ensuring data security

Active Publication Date: 2011-12-21
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the USIM stores highly private data such as contacts and short messages, this approach is very unsafe, and it is easy for malicious programs or Trojans to steal information in the shared area
[0004] The current technical solution puts the data read from the USIM into the shared data area, so that any application program can read it arbitrarily. It is not safe to put the data read from the USIM into the shared data area, and it is easy for malicious programs or Trojans to steal information in the shared area, causing security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and terminal
  • Data protection method and terminal
  • Data protection method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0023] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the present invention is not limited to the specific embodiments disclosed below limit.

[0024] figure 1 is a flowchart of a data protection method according to an embodiment of the present invention.

[0025] like figure 1 As shown, the present invention provides a data protection method, comprising: step 102, encrypting the shared data area in the terminal, and the shared data area is used to store the data of the global subscriber identification card of the terminal; step 104, encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data protection method and a terminal. The data protection method comprises the following steps: step 102, encrypting a shared data area in the terminal; step 104, authorizing at least one application program; and step 106: when the application program needs to read and / or write the shared data area, determining whether the application program is authorized; if the application program is authorized, allowing the application program to read and / or write the shared data area; if the application program is not authorized, forbidding the application program to read and / or write the shared data area. According to the invention, as the shared area is encrypted so that only a part of application programs authorized by a user can access the shared area, malicious programs can be prevented from damaging the data security of the shared area.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular, to a data protection method and a terminal. Background technique [0002] In the current mobile terminal, some important data need to be frequently used by multiple different functional modules. For example, for a multi-mode multi-card mobile phone, multiple communication modules therein often need to use the data in the USIM card (Universal Subscriber Identity Module, Global Subscriber Identity Module), which requires the data of the USIM card to be shared. After a communication module is closed, the user can still read the data of the USIM card corresponding to the module. [0003] For the above content, the current solution is to read the information in each USIM card after the mobile phone is turned on, and store it in a shared area, that is, an area where multiple functional modules or application programs can perform read and write operations, and the AP ( The Ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W88/02
Inventor 陈华星陈一槐刘珍珍
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products