Unlock instant, AI-driven research and patent intelligence for your innovation.

A data storage method, terminal and computer storage medium

A data storage and data technology, which is applied in the field of preventing leakage of confidential information, can solve problems such as unfavorable protection of confidential information, insufficient protection of confidential information, user leakage, etc., to achieve perfect protection, improve protection, and prevent leakage The effect of venting

Active Publication Date: 2021-06-01
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, many project secrets, especially commercial secrets, are easily leaked by users through some methods, such as taking screenshots and saving documents, even though internal instant messaging tools are used; It can be seen that the existing protection of classified information on classified application software is not perfect, which is not conducive to the protection of classified information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data storage method, terminal and computer storage medium
  • A data storage method, terminal and computer storage medium
  • A data storage method, terminal and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] An embodiment of the present application provides a data storage method, which is applied to a terminal, figure 1 For a schematic flowchart of an optional data storage method provided by the embodiment of this application, refer to figure 1 As shown, the data storage methods may include:

[0081] S101: Receive a data acquisition instruction for the first application software on the terminal;

[0082] Usually, in order to facilitate the development and implementation of projects in some enterprises, many companies will use the instant messaging application software specially developed within the company to communicate and exchange projects. Since the content of the communication involves some confidential information, if outside Leakage will bring huge losses to the company, so the confidentiality of this information becomes particularly important.

[0083] In order to prevent leakage of information in secret-related application software and play a role in protecting i...

Embodiment 2

[0153] Figure 5 Schematic diagram of the structure of a terminal provided in the embodiment of this application Figure 1 ,like Figure 5 As shown, the embodiment of the present application provides a terminal, and the terminal may also include:

[0154] a receiving unit 51, configured to receive a data acquisition instruction for the first application software on the terminal;

[0155] An acquisition unit 52, configured to acquire the data of the first application software according to the data acquisition instruction;

[0156] A judging unit 53, configured to judge whether the first application software is a preset secret-related application software;

[0157] The storage unit 54 is configured to store the data of the first application software in the confidentiality-related folder of the first application software when the first application software is a preset confidentiality-related application software;

[0158] Wherein, the confidential folder of the first applicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a data storage method, the method is applied to a terminal, and the method includes: receiving a data acquisition instruction for the first application software on the terminal, and acquiring the first application software according to the data acquisition instruction data, to determine whether the first application software is a preset application software that involves secrets, and when the first application software is a preset application software that involves secrets, store the data of the first application software in the first application software In the secret-related folder of the first application software, the secret-related folder of the first application software is a folder with read permission set for the first application software. The embodiment of the present application also provides a terminal and a computer storage medium at the same time.

Description

technical field [0001] The present application relates to technologies for preventing leakage of confidential information in application software, and in particular to a data storage method, a terminal and a computer storage medium. Background technique [0002] As a portable communication device, mobile phones bring great convenience to people's communication. Nowadays, people use instant messaging software for daily and work communication. For example, many companies implement projects for convenience and efficiency, and a lot of communication on projects is discussed on WeChat or communicated on instant messaging tools developed by their own companies. [0003] However, many project secrets, especially commercial secrets, are easily leaked by users through some methods, such as taking screenshots and saving documents, even though internal instant messaging tools are used; It can be seen that the existing protection for secret-related information on secret-related applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 李洋
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD