Data processing method, device, terminal and storage medium
A data processing and terminal technology, applied in network data management, security devices, secure communication devices, etc., can solve problems such as theft, insecurity, and poor user experience, and achieve the effect of increasing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] A data processing method provided in this embodiment, figure 1 It is a schematic diagram of the implementation flow of a data processing method in the embodiment of the present invention Figure 1 ,Such as figure 1 As shown, the method includes:
[0065] Step S101, the terminal generates a lock flag and unlock parameters based on the lock object according to the user's lock operation;
[0066] Here, the user performs a locking operation on the locked object on the terminal, and the terminal generates a locking flag and an unlocking parameter according to the user's locking operation. The locked object may be a communication network provided by an operator, a private application such as a secure payment application, or a user's private data. Correspondingly, the locking operation may be a network locking operation, a private application locking operation, or a private data locking operation.
[0067] Here, the setting operation is included before the locking operatio...
Embodiment 2
[0081] This embodiment provides a data processing method, figure 2 It is a schematic diagram of the implementation flow of a data processing method in the embodiment of the present invention Figure II ,Such as figure 2 As shown, the method includes:
[0082] Step S201, when the terminal meets the preset third condition, sending a message that the terminal meets the preset third condition to the server;
[0083] Here, the preset third condition is the third condition set by the user in step S101, and the message that the terminal meets the preset third condition includes the terminal identifier of the terminal.
[0084] It should be understood that step S201 can be applied to a variety of different scenarios during the specific implementation process. The following will introduce it in detail based on the introduction of several scenarios. Of course, it can also be applied to other different scenarios during the specific implementation process. The scenarios are not limit...
Embodiment 3
[0103] This embodiment provides a data processing method, image 3 It is a schematic diagram of the implementation flow of a data processing method in the embodiment of the present invention Figure three ,Such as image 3 As shown, the method includes:
[0104] Step S301, when the terminal meets the preset third condition, sending a message that the terminal meets the preset third condition to the server;
[0105] Step S302, receiving the first parameter of the unlocking object and the first secret key of the unlocking object issued by the server;
[0106] It should be understood that step S301 is similar to step S201, and step S302 is similar to step S202, so details are not described here.
[0107] Step S303, reading the first parameter from the storage area on the modem side;
[0108] It should be understood that the first parameter and the first secret key issued by the server in step S302 are received by the modem processor in the terminal. The terminal stores the f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


