Data storage method and device
A data storage and data technology, applied in the computer field, can solve problems such as low security and easy data theft, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] In order to solve the problem of low security of application programs in the prior art, an embodiment of the present application provides a data storage method. The execution subject of the data storage method provided by the embodiment of the present application may be a terminal device, such as a mobile phone, a tablet computer, etc., or, in addition, the execution subject of the method may also be software that implements the method, for example, to ensure the security of the application module, which is commonly referred to in the art as a hardened shell for application hardening.
[0025] For the convenience of description, the implementation of the method will be introduced below by taking the reinforced shell as an example to execute the method. It can be understood that the implementation subject of the method is the reinforcement shell is only an exemplary description, and should not be understood as a limitation of the method.
[0026] The schematic diagram o...
Embodiment 2
[0050] Based on the aforementioned embodiment 1, the inventive concept of the present application has been described in detail. In order to facilitate a better understanding of the technical features, means and effects of the present application, the data storage method of the present application will be further described below, thus forming another implementation of the present application example.
[0051] The data storage process in Embodiment 2 of the present application is similar to the data storage process described in Embodiment 1. For other steps not introduced in Embodiment 2, refer to the relevant description in Embodiment 1, which will not be repeated here.
[0052] Before the implementation of the solution is introduced in detail, the implementation scenario of the solution is briefly introduced.
[0053] In this implementation scenario, it is desired to encrypt and store the file in a predetermined format saved by the application program in the local file.
[00...
Embodiment 3
[0066] In order to solve the problem of low security of application programs in the prior art, based on the foregoing embodiments 1 and 2, embodiment 3 of the present application provides a data storage device. The structure diagram of the data storage device is as follows: image 3 As shown, it mainly includes the following functional units:
[0067] The interception unit 31 is configured to intercept the data operation of the application program when the application program is running, and the data operation is a read and write operation for data in a local file of the application program;
[0068] The operation unit 32 is configured to, when it is determined that the data targeted by the data operation is data that needs to be encrypted in the storage medium, and the data operation is an operation of writing the data into the storage medium, perform an operation on the The data is encrypted, and the encrypted data is written into the storage medium.
[0069] In one embodi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


