Unlock instant, AI-driven research and patent intelligence for your innovation.

A data security processing method, device and mobile terminal

A data security and processing method technology, applied in the direction of electronic digital data processing, computer security devices, digital data protection, etc., can solve problems such as large security risks, tampering, deletion, movement of files, and high security risks of electronic equipment, etc., to achieve Solve the larger safety risks, avoid safety hazards, and improve the effect of safety

Active Publication Date: 2020-07-24
BEIJING ANYUNSHIJI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the mutation of files that endanger the security of electronic equipment such as viruses and Trojan horses, they may invade the read-only area of ​​the electronic equipment. However, in order to ensure the security of files in the read-only area, the operating system of the electronic equipment does not allow other application software to The files in the read-only area are tampered with, deleted, moved, etc. Therefore, when the security service application scans and finds abnormal files such as viruses and Trojans in the read-only area, it cannot delete the abnormal files in the read-only area. security risk
[0004] It can be seen that in the prior art, because the abnormal files in the read-only area cannot be deleted, there is a technical problem of high security risk in electronic equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security processing method, device and mobile terminal
  • A data security processing method, device and mobile terminal
  • A data security processing method, device and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0062] Embodiments of the present invention provide a data security processing method, device, and mobile terminal according to an embodiment of the present invention, so as to solve the technical problem of relatively large security risks in electronic equipment in the prior art.

[0063] The embodiment of the present application provides a data security processing method, which is applied to an electronic device. The electronic de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security processing method and device and a mobile terminal. A privilege transfer service interface is arranged in an operation system of electronic equipment and has an operation right of deleting files in a read-only zone. The data security processing method comprises the steps that the privilege transfer service interface receives a deletion request which is sent by a security service application and requests to delete abnormal files in the read-only zone, and receives identification information of the security service application; based on the identification information, authentication is conducted on the security service application by the privilege transfer service interface; if the authentication is successful, the privilege transfer service interface responds to the deletion request to delete the abnormal files in the read-only zone. According to the data security processing method, the security service application cooperates with the privilege transfer service interface arranged in the operation system to delete the abnormal files in the read-only zone, the technical problem in the prior art is resolved that the abnormal files in the read-only zone cannot be deleted and accordingly electronic equipment security risk is large, and the security of the electronic equipment in operation is improved.

Description

technical field [0001] The present invention relates to the field of software technology, in particular to a data security processing method, device and mobile terminal. Background technique [0002] With the continuous development of science and technology, software technology has also developed rapidly, and various application software have emerged, especially the birth of security service applications such as security guards and antivirus software, which ensure the safe operation of electronic equipment. [0003] In the prior art, the security service application can perform a full scan on the electronic device, but can only perform a delete operation on the readable and writable area on the electronic device. However, with the mutation of files that endanger the security of electronic equipment such as viruses and Trojan horses, they may invade the read-only area of ​​the electronic equipment. However, in order to ensure the security of files in the read-only area, the o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/64
CPCG06F21/6218G06F21/64G06F2221/2141
Inventor 徐志克
Owner BEIJING ANYUNSHIJI TECH CO LTD