Data protection method and device

A technology of data protection and target data, applied in the field of communication, can solve the problems of long time, can not really ensure the security of user data, etc., to achieve the effect of ensuring security

Inactive Publication Date: 2016-11-02
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the method of erasing data takes a long time, and illegal users can terminate the process of e

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method and device
  • Data protection method and device
  • Data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0085] The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure provides a data protection method and device; the method comprises the following steps: receiving a data protection order sent by a server and used for protecting target data, wherein the data protection order at least comprises a target data ID of the target data; determining a target secret key corresponding to the target data according to the target data ID; destroying the target secret key according to the data protection order, thus preventing the target data from being accessed. In the disclosure, the first terminal receives the data protection order sent by the server, and destroys the target secret key; the method and device can fast ensure the target data on the first terminal not to be accessed, thus ensuring user data safety, and improving user data safety protection speed.

Description

technical field [0001] The present disclosure relates to the communication field, in particular to a data protection method and device. Background technique [0002] In related technologies, once a user's terminal, such as a mobile phone, is lost, the security of user data can be ensured by remotely erasing data on the terminal. However, the method of erasing data takes a long time, and an illegal user can terminate the process of erasing data by forcefully restarting the terminal. Therefore, user data security cannot be truly ensured. Contents of the invention [0003] In view of this, the present disclosure provides a data protection method and device to solve the deficiencies in related technologies. [0004] According to the first aspect of the embodiments of the present disclosure, there is provided a data protection method for a first terminal, the method comprising: [0005] receiving a data protection instruction for protecting target data sent by the server, wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04L9/08
CPCG06F21/6218H04L9/0891
Inventor 王江少杨冬东程洋冯静敏
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products