Unlock instant, AI-driven research and patent intelligence for your innovation.

Data storage method and device

A data storage and data technology, applied in the computer field, can solve problems such as low security and easy data theft, and achieve the effect of improving security

Inactive Publication Date: 2017-09-05
BEIJING BANGCLE TECH CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] That is, in the prior art, the data in the local file of the application program is easy to be stolen, and the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage method and device
  • Data storage method and device
  • Data storage method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] In order to solve the problem of low security of application programs in the prior art, an embodiment of the present application provides a data storage method. The execution subject of the data storage method provided by the embodiment of the present application may be a terminal device, such as a mobile phone, a tablet computer, etc., or, in addition, the execution subject of the method may also be software that implements the method, for example, to ensure the security of the application module, which is commonly referred to in the art as a hardened shell for application hardening.

[0025] For the convenience of description, the implementation of the method will be introduced below by taking the reinforced shell as an example to execute the method. It can be understood that the implementation subject of the method is the reinforcement shell is only an exemplary description, and should not be understood as a limitation of the method.

[0026] The schematic diagram o...

Embodiment 2

[0050] Based on the aforementioned embodiment 1, the inventive concept of the present application has been described in detail. In order to facilitate a better understanding of the technical features, means and effects of the present application, the data storage method of the present application will be further described below, thus forming another implementation of the present application example.

[0051] The data storage process in Embodiment 2 of the present application is similar to the data storage process described in Embodiment 1. For other steps not introduced in Embodiment 2, refer to the relevant description in Embodiment 1, which will not be repeated here.

[0052] Before the implementation of the solution is introduced in detail, the implementation scenario of the solution is briefly introduced.

[0053] In this implementation scenario, it is desired to encrypt and store the file in a predetermined format saved by the application program in the local file.

[00...

Embodiment 3

[0066] In order to solve the problem of low security of application programs in the prior art, based on the foregoing embodiments 1 and 2, embodiment 3 of the present application provides a data storage device. The structure diagram of the data storage device is as follows: image 3 As shown, it mainly includes the following functional units:

[0067] The interception unit 31 is configured to intercept the data operation of the application program when the application program is running, and the data operation is a read and write operation for data in a local file of the application program;

[0068] The operation unit 32 is configured to, when it is determined that the data targeted by the data operation is data that needs to be encrypted in the storage medium, and the data operation is an operation of writing the data into the storage medium, perform an operation on the The data is encrypted, and the encrypted data is written into the storage medium.

[0069] In one embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data storage method, and is used for solving the problem that the safety of application procedures in the prior art is low. The method comprises the following steps: when an application procedure runs, intercepting data operation of the application procedure, wherein the data operation is used as reading and writing operation for data in a local file of the application procedure; when judging whether the operated data are data which require to be encrypted in a storage medium, encrypting the data if the data operation is writing operation of the data in the storage medium, and writing the encrypted data in the storage medium. The invention further provides a data storage device.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data storage method and device. Background technique [0002] With the rapid development of the mobile Internet industry, mobile devices have penetrated into every aspect of users' lives, and the number of mobile applications has increased significantly. [0003] Mobile applications usually need to use local files to store some configuration information, user information, etc. These information are all data with high security requirements, but in the prior art, there is a lack of effective protection for these data. Taking the Android system as an example, when the Android system is not rooted, other programs cannot read these files due to the sandbox mechanism of the Android system itself, but after the Android system is rooted, malicious programs can directly read these files. So as to achieve the purpose of stealing user data. [0004] That is, in the prior ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/78
CPCG06F21/602G06F21/78
Inventor 阚志刚陈彪程显龙卢佐华方宁
Owner BEIJING BANGCLE TECH CO LTD