CN102364491A - Method for managing data authority, and terminal - Google Patents
Method for managing data authority, and terminal Download PDFInfo
- Publication number
- CN102364491A CN102364491A CN2011103392453A CN201110339245A CN102364491A CN 102364491 A CN102364491 A CN 102364491A CN 2011103392453 A CN2011103392453 A CN 2011103392453A CN 201110339245 A CN201110339245 A CN 201110339245A CN 102364491 A CN102364491 A CN 102364491A
- Authority
- CN
- China
- Prior art keywords
- data
- application program
- sensitive data
- operating right
- sensitive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000005540 biological transmission Effects 0.000 claims abstract description 34
- 238000007726 management method Methods 0.000 claims description 25
- 230000008569 process Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 241001269238 Data Species 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a method for managing a data authority. The method comprises the following steps of: 102, setting data to be protected as sensitive data; and 104, when the sensitive data is transmitted by an application program, receiving an operation authority of the application program set by a user on the sensitive data. Correspondingly, the invention also provides a terminal. By the technical scheme, in a data transmission stage, data can be monitored and managed, so personal data of the user can be protected; and requirements of individual application programs on personal data transmission can be met.
Description
Technical field
The present invention relates to the administrative skill of data permission, in particular to a kind of management method and a kind of terminal of data permission.
Background technology
Just safe protection has been carried out in the transmission course and the terminal demonstration of personal data in the correlation technique, do not carried out safe protection and data are uploaded at the terminal.Such as when individual short message is transmitted, process comprises: individual short message ciphering process after short message content and short message content confirmation are transfused to, generates secret short message; The secret short message transport process, convert secret short message to the bag data after, convert radiofrequency signal to and transmit; Secret short message is confirmed process, receive secret short message after, when the affirmation information of recipient's input is consistent with confirmation, export short message content.But such operating process is if after data were uploaded by malice, the hacker perhaps also had an opportunity to get access to the key of deciphering, thereby private data safety is threatened.
Therefore, need a kind of administrative skill of new data right, can just monitor and manage in the transmit stage of data, convenient personal data to the user carry out safeguard protection, and satisfy individual application and carry out the personal data transmission requirements.
Summary of the invention
The present invention just is being based on the problems referred to above; A kind of administrative skill of new data right has been proposed; Can just monitor and manage in the transmit stage of data, convenient personal data to the user carry out safeguard protection, and satisfy individual application and carry out the personal data transmission requirements.
In view of this, the present invention proposes a kind of management method of data permission, comprising: step 102, the data setting that needs are protected is a sensitive data; Step 104 when said sensitive data will be employed the program transmission, receives the operating right of the said application program of user's setting to said sensitive data.In this technical scheme; Data on the terminal have a variety of; Both comprised like note, contact person, photo etc. and user-dependent personal data; Common data such as e-book, picture that also comprise download, but be that needs according to user self define for Data Protection are therefore at first by user's which data of selecting to need protection.Data to the user selects are monitored, if when having application program to want to transmit these data, want individual photo upload to network or bluetooth procedures are wanted the contact person is sent to other equipment such as the microblogging program; In case monitor similar action; Then point out the user, and set whether give this application program, only be endowed corresponding operating right with operating right by the user; This application program can really be carried out the transmission of data, otherwise finishes current transmission course.
In technique scheme; Preferably; Said step 104 comprises: when said sensitive data will be employed the program transmission; Judge whether said application program has the operating right to said sensitive data,, then receive the operating right of the said application program of user's setting said sensitive data if do not have.In this technical scheme,, carried out the sign of application program and the operating right of sensitive data has been carried out storage accordingly if after the operating right of application programs is set; Then after this; When if certain application program need be carried out the transmission of sensitive data, at first whether this application program is had corresponding operating right and judge, if store; Then operate, otherwise the operating right of this application program is set according to the operating right of storage.Certainly, for the operating right of having stored, can carry out independent modification, this is for those skilled in the art, and is obvious and be easy to realize.
In technique scheme, preferably, after said step 104, also comprise: application program and said application program are stored the operating right of said sensitive data accordingly.In this technical scheme; Sensitive data to the user sets can all carry out the setting of single job authority when each application program need be carried out the transmission of these data; Also can be for the first time or after certain once sets; Store accordingly with the sign of this application program such as title and to the operating right of sensitive data, in the time of need transmitting again after then, need not to set again.
In technique scheme, preferably, said sensitive data comprises at least a data; And set application program the method for the operating right of said sensitive data is comprised: set the operating right of said application program simultaneously, or set the operating right of said application program respectively the said sensitive data of each kind to the said sensitive data of all categories.In this technical scheme; It is a kind of like photo that sensitive data possibly be merely; Also possibly comprise multiple like photo, note, contact person etc., then when setting application program, under a kind of situation to the operating right of sensitive data; Can once set the sensitive data of all types, application program only exists sensitive data is with or without operating right; And under the another kind of situation, application program can have operating right to one or more sensitive datas wherein, promptly can set separately, thereby reach more careful rights management.
In technique scheme, preferably, in said step 104, also comprise: the kind of judging said sensitive data; And judge whether said application program has the operating right to the sensitive data of said kind.In this technical scheme; Owing to possibly there be multiple sensitive data; And application program all has independent operating right for each data; Thereby when application program need be uploaded certain data, need identify the affiliated kind of these data, judge then whether this application program has the operating right to the sensitive data of this kind.
According to another aspect of the invention, also proposed a kind of terminal, having comprised: the data setting module, the data setting that needs are protected is a sensitive data; Judge module judges whether application program need transmit said sensitive data; The authority setting module is under the situation that is in the judged result of said judge module, sets the operating right of said application program to said sensitive data.In this technical scheme; Data on the terminal have a variety of; Both comprised like note, contact person, photo etc. and user-dependent personal data; Common data such as e-book, picture that also comprise download, but be that needs according to user self define for Data Protection are therefore at first by user's which data of selecting to need protection.Data to the user selects are monitored, if when having application program to want to transmit these data, want individual photo upload to network or bluetooth procedures are wanted the contact person is sent to other equipment such as the microblogging program; In case monitor similar action; Then point out the user, and set whether give this application program, only be endowed corresponding operating right with operating right by the user; This application program can really be carried out the transmission of data, otherwise finishes current transmission course.
In technique scheme, preferably, said judge module also comprises: authority is judged submodule; When said sensitive data will be employed the program transmission; Judge whether said application program has the operating right to said sensitive data,, then set by said authority setting module if do not have.In this technical scheme,, carried out the sign of application program and the operating right of sensitive data has been carried out storage accordingly if after the operating right of application programs is set; Then after this; When if certain application program need be carried out the transmission of sensitive data, at first whether this application program is had corresponding operating right and judge, if store; Then operate, otherwise the operating right of this application program is set according to the operating right of storage.Certainly, for the operating right of having stored, can carry out independent modification, this is for those skilled in the art, and is obvious and be easy to realize.
In technique scheme, preferably, also comprise: memory module, application program and said application program are stored the operating right of said sensitive data accordingly.In this technical scheme; Sensitive data to the user sets can all carry out the setting of single job authority when each application program need be carried out the transmission of these data; Also can be for the first time or after certain once sets; Store accordingly with the sign of this application program such as title and to the operating right of sensitive data, in the time of need transmitting again after then, need not to set again.
In technique scheme, preferably, said sensitive data comprises at least a data; And said authority setting module settings application program comprises the method for the operating right of said sensitive data: set the operating right of said application program to the said sensitive data of all categories simultaneously, or set the operating right of said application program to the said sensitive data of each kind respectively.In this technical scheme; It is a kind of like photo that sensitive data possibly be merely; Also possibly comprise multiple like photo, note, contact person etc., then when setting application program, under a kind of situation to the operating right of sensitive data; Can once set the sensitive data of all types, application program only exists sensitive data is with or without operating right; And under the another kind of situation, application program can have operating right to one or more sensitive datas wherein, promptly can set separately, thereby reach more careful rights management.
In technique scheme, preferably, said judge module further comprises: kind is judged submodule, judges the kind of said sensitive data; And said authority judges that submodule also is used for: judge whether said application program has the operating right to the sensitive data of said kind.In this technical scheme; Owing to possibly there be multiple sensitive data; And application program all has independent operating right for each data; Thereby when application program need be uploaded certain data, need identify the affiliated kind of these data, judge then whether this application program has the operating right to the sensitive data of this kind.
Through above technical scheme, can just monitor and manage in the transmit stage of data, convenient personal data to the user carry out safeguard protection, and satisfy individual application and carry out the personal data transmission requirements.
Description of drawings
Fig. 1 shows the process flow diagram according to the management method of the data permission of the first embodiment of the present invention;
Fig. 2 shows the block diagram at terminal according to a second embodiment of the present invention; And
Fig. 3 A to Fig. 3 F shows the synoptic diagram of the data permission management of a third embodiment in accordance with the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with accompanying drawing and embodiment.
Set forth a lot of details in the following description so that make much of the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following disclosed specific embodiment.
Fig. 1 shows the process flow diagram according to the management method of the data permission of the first embodiment of the present invention.
As shown in Figure 1, the management method according to the data permission of the first embodiment of the present invention comprises: step 102, and the data setting that needs are protected is a sensitive data; Step 104 when sensitive data will be employed the program transmission, receives the operating right of the application program of user's setting to sensitive data.In this technical scheme; Data on the terminal have a variety of; Both comprised like note, contact person, photo etc. and user-dependent personal data; Common data such as e-book, picture that also comprise download, but be that needs according to user self define for Data Protection are therefore at first by user's which data of selecting to need protection.Data to the user selects are monitored, if when having application program to want to transmit these data, want individual photo upload to network or bluetooth procedures are wanted the contact person is sent to other equipment such as the microblogging program; In case monitor similar action; Then point out the user, and set whether give this application program, only be endowed corresponding operating right with operating right by the user; This application program can really be carried out the transmission of data, otherwise finishes current transmission course.
In technique scheme, step 104 also comprises: when sensitive data will be employed the program transmission, judge whether application program has the operating right to sensitive data, if do not have, then receive the operating right of the application program of user's setting to sensitive data.In this technical scheme,, carried out the sign of application program and the operating right of sensitive data has been carried out storage accordingly if after the operating right of application programs is set; Then after this; When if certain application program need be carried out the transmission of sensitive data, at first whether this application program is had corresponding operating right and judge, if store; Then operate, otherwise the operating right of this application program is set according to the operating right of storage.Certainly, for the operating right of having stored, can carry out independent modification, this is for those skilled in the art, and is obvious and be easy to realize.
In technique scheme, after step 104, also comprise: application program and application program are stored the operating right of sensitive data accordingly.In this technical scheme; Sensitive data to the user sets can all carry out the setting of single job authority when each application program need be carried out the transmission of these data; Also can be for the first time or after certain once sets; Store accordingly with the sign of this application program such as title and to the operating right of sensitive data, in the time of need transmitting again after then, need not to set again.
In technique scheme, sensitive data comprises at least a data; And set application program the method for the operating right of sensitive data is comprised: set the operating right of application program simultaneously, or set the operating right of application program respectively the sensitive data of each kind to the sensitive data of all categories.In this technical scheme; It is a kind of like photo that sensitive data possibly be merely; Also possibly comprise multiple like photo, note, contact person etc., then when setting application program, under a kind of situation to the operating right of sensitive data; Can once set the sensitive data of all types, application program only exists sensitive data is with or without operating right; And under the another kind of situation, application program can have operating right to one or more sensitive datas wherein, promptly can set separately, thereby reach more careful rights management.
In technique scheme, in step 104, also comprise: the kind of judging sensitive data; And judge whether application program has the operating right to the sensitive data of kind.In this technical scheme; Owing to possibly there be multiple sensitive data; And application program all has independent operating right for each data; Thereby when application program need be uploaded certain data, need identify the affiliated kind of these data, judge then whether this application program has the operating right to the sensitive data of this kind.
Fig. 2 shows the block diagram at terminal according to a second embodiment of the present invention.
As shown in Figure 2, terminal 200 according to a second embodiment of the present invention comprises: data setting module 202, and the data setting that needs are protected is a sensitive data; Judge module 204 judges whether application program need transmit sensitive data; Authority setting module 206 is under the situation that is in the judged result of judge module 204, sets the operating right of application program to sensitive data.In this technical scheme; Data on the terminal 200 have a variety of; Both comprised like note, contact person, photo etc. and user-dependent personal data; Common data such as e-book, picture that also comprise download, but be that needs according to user self define for Data Protection are therefore at first by user's which data of selecting to need protection.Data to the user selects are monitored, if when having application program to want to transmit these data, want individual photo upload to network or bluetooth procedures are wanted the contact person is sent to other equipment such as the microblogging program; In case monitor similar action; Then point out the user, and set whether give this application program, only be endowed corresponding operating right with operating right by the user; This application program can really be carried out the transmission of data, otherwise finishes current transmission course.
In technique scheme; Judge module 204 also comprises: authority is judged submodule 2040, when sensitive data will be employed the program transmission, judges whether application program has the operating right to sensitive data; If do not have, then set by authority setting module 206.In this technical scheme,, carried out the sign of application program and the operating right of sensitive data has been carried out storage accordingly if after the operating right of application programs is set; Then after this; When if certain application program need be carried out the transmission of sensitive data, at first whether this application program is had corresponding operating right and judge, if store; Then operate, otherwise the operating right of this application program is set according to the operating right of storage.Certainly, for the operating right of having stored, can carry out independent modification, this is for those skilled in the art, and is obvious and be easy to realize.
In technique scheme, also comprise: memory module 208, application program and application program are stored the operating right of sensitive data accordingly.In this technical scheme; Sensitive data to the user sets can all carry out the setting of single job authority when each application program need be carried out the transmission of these data; Also can be for the first time or after certain once sets; Store accordingly with the sign of this application program such as title and to the operating right of sensitive data, in the time of need transmitting again after then, need not to set again.
In technique scheme, sensitive data comprises at least a data; And authority setting module 206 is set application programs the method for the operating right of sensitive data is comprised: set the operating right of application program to the sensitive data of all categories simultaneously, or set the operating right of application program to the sensitive data of each kind respectively.In this technical scheme; It is a kind of like photo that sensitive data possibly be merely; Also possibly comprise multiple like photo, note, contact person etc., then when setting application program, under a kind of situation to the operating right of sensitive data; Can once set the sensitive data of all types, application program only exists sensitive data is with or without operating right; And under the another kind of situation, application program can have operating right to one or more sensitive datas wherein, promptly can set separately, thereby reach more careful rights management.
In technique scheme, judge module 204 further comprises: kind is judged submodule 2042, judges the kind of sensitive data; And authority judges that submodule 2040 also is used for: judge whether application program has the operating right to the sensitive data of this kind.In this technical scheme; Owing to possibly there be multiple sensitive data; And application program all has independent operating right for each data; Thereby when application program need be uploaded certain data, need identify the affiliated kind of these data, judge then whether this application program has the operating right to the sensitive data of this kind.
Below in conjunction with Fig. 3 A to Fig. 3 F the management process of data authority is elaborated, wherein, Fig. 3 A to Fig. 3 F shows the synoptic diagram of the data permission management of a third embodiment in accordance with the invention respectively.
Shown in Fig. 3 A,, on the terminal, the user is pointed out having monitored application program need transmit sensitive data the time.It is thus clear that at first need set which data here is sensitive datas, certainly, this process possibly preset in the terminal, but because each user's demand maybe be different, thereby also can on the terminal, set again by the user.
In Fig. 3 A, through the mode of hint image 302 user is pointed out, certainly, can also carry out modes such as sound, vibrations, this is conspicuous.In hint image 302,, inform that the user need transmit the application program 304 of data, such as being " Wifi finder " this application program here through character express.The user is when handling, and the interface that can set through the direct access entitlements of rights management icon 306 certainly, also can get into through other modes, like independent setting program or be integrated in the default.
Shown in Fig. 3 B; Be the rights management interface 308 that gets into through rights management icon 306 or other modes, in this rights management interface 308, have authority setting situation all application programs; Only one of them application program is indicated among the figure; Such as " the Wifi finder " that mention for preceding text, but be construed as, all have situation identical or roughly the same for each application program.In rights management interface 308, comprise to application icon 310, and corresponding to the application name 312 of this application icon 310; And, can find out through information 314 whether it has opened authority, like " not opening authority " or " having opened authority " to this application program; Can also find out the number of whether opening authority and opening through obtaining authority item number 316; Such as when obtaining authority item number 316 and be 0, authority is not opened in expression, if not 0; Then authority has been opened in expression, and the numerical value that shows is the authority item number of opening.In addition,, also comprise a menu icon 320, be used to open submenu 324, shown in Fig. 3 C on each application icon 310 next door.
In Fig. 3 C; Be the submenu 324 that gets into through menu icon 320; In submenu 324, comprise the sensitive data of a plurality of kinds, the user can set the sensitive data of all categories through total selection icon 325 simultaneously; Also can carry out selecting respectively, thereby reach careful setting and rights management through the sensitive data of categorizing selection icon 326 to each kind.
Such as in Fig. 3 D; For " Wifi finder " this application program, hope to give the operating right of this application program, then through operation to total selection icon 325 to sensitive data; Making total selection icon 325 carry out corresponding icon changes; And information 314 does not become " having opened authority " from original " opening authority ", has obtained authority item number 316 and has become 3 from 0 yet, and " Wifi finder " had the operating right to the sensitive data of all kinds simultaneously at this moment.
For another example in Fig. 3 E; For " Wifi finder " this application program; Selected submenu 324A " contact person ", then categorizing selection icon 326A has carried out corresponding icon variation, and information 314 does not become " can upload the contact person " from original " opening authority "; Obtained authority item number 316 and also become 1 from 0, thereby accomplished the setting of application program the operating right of certain type of sensitive data.
In Fig. 3 F, carry out transmission through launching icon 318, can make the application program " Wifi finder " that has configured operating right, but then can't transmit for the sensitive data of other kinds to " contact person ", set only if proceed.
More than be described with reference to the accompanying drawings technical scheme of the present invention, considered in the correlation technique and just safe protection has been carried out in the transmission course and the terminal demonstration of personal data, do not carried out safe protection and data are uploaded at the terminal.Therefore; The invention provides a kind of management method and a kind of terminal of data right; Can just monitor and manage in the transmit stage of data, convenient personal data to the user carry out safeguard protection, and satisfy individual application and carry out the personal data transmission requirements.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. the management method of a data permission is characterized in that, comprising:
Step 102, the data setting that needs are protected is a sensitive data;
Step 104 when said sensitive data will be employed the program transmission, receives the operating right of the said application program of user's setting to said sensitive data.
2. the management method of data permission according to claim 1 is characterized in that, said step 104 comprises:
When said sensitive data will be employed the program transmission, judge whether said application program has the operating right to said sensitive data, if do not have, then receive the operating right of the said application program of user's setting to said sensitive data.
3. the management method of data permission according to claim 1 is characterized in that, after said step 104, also comprises:
Application program and said application program are stored the operating right of said sensitive data accordingly.
4. according to the management method of each described data permission in the claim 1 to 3, it is characterized in that said sensitive data comprises at least a data; And
The setting application program comprises the method for the operating right of said sensitive data:
Set the operating right of said application program simultaneously, or set the operating right of said application program respectively the said sensitive data of each kind to the said sensitive data of all categories.
5. the management method of data permission according to claim 4 is characterized in that, in said step 104, also comprises:
Judge the kind of said sensitive data; And
Judge whether said application program has the operating right to the sensitive data of said kind.
6. a terminal is characterized in that, comprising:
The data setting module, the data setting that needs are protected is a sensitive data;
Judge module judges whether application program need transmit said sensitive data;
The authority setting module is under the situation that is in the judged result of said judge module, sets the operating right of said application program to said sensitive data.
7. terminal according to claim 6 is characterized in that, said judge module also comprises:
Authority is judged submodule, when said sensitive data will be employed the program transmission, judges whether said application program has the operating right to said sensitive data, if do not have, is then set by said authority setting module.
8. terminal according to claim 6 is characterized in that, also comprises:
Memory module is stored application program and said application program to the operating right of said sensitive data accordingly.
9. according to each described terminal in the claim 6 to 8, it is characterized in that said sensitive data comprises at least a data; And
Said authority setting module settings application program comprises the method for the operating right of said sensitive data:
Set the operating right of said application program simultaneously, or set the operating right of said application program respectively the said sensitive data of each kind to the said sensitive data of all categories.
10. terminal according to claim 9 is characterized in that, said judge module further comprises:
Kind is judged submodule, judges the kind of said sensitive data; And
Said authority judges that submodule also is used for: judge whether said application program has the operating right to the sensitive data of said kind.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103392453A CN102364491A (en) | 2011-11-01 | 2011-11-01 | Method for managing data authority, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103392453A CN102364491A (en) | 2011-11-01 | 2011-11-01 | Method for managing data authority, and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102364491A true CN102364491A (en) | 2012-02-29 |
Family
ID=45691057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011103392453A Pending CN102364491A (en) | 2011-11-01 | 2011-11-01 | Method for managing data authority, and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102364491A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102868813A (en) * | 2012-09-05 | 2013-01-09 | 广东欧珀移动通信有限公司 | Implementation method and mobile phone of a security management mechanism |
CN103294940A (en) * | 2013-05-23 | 2013-09-11 | 广东欧珀移动通信有限公司 | A kind of Android system permission control method and mobile intelligent terminal |
CN103646216A (en) * | 2013-11-13 | 2014-03-19 | 天脉聚源(北京)传媒科技有限公司 | Method and device for monitoring folder of terminal |
CN104778415A (en) * | 2015-02-06 | 2015-07-15 | 北京北信源软件股份有限公司 | Computer behavior-based data anti-leakage system and method |
CN105592452A (en) * | 2014-10-24 | 2016-05-18 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for preventing private data from being read maliciously |
CN107426435A (en) * | 2017-08-04 | 2017-12-01 | 晶赞广告(上海)有限公司 | For the method and system for controlling sensitive data to ask |
CN108763951A (en) * | 2015-10-26 | 2018-11-06 | 青岛海信移动通信技术股份有限公司 | A kind of guard method of data and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1147738A (en) * | 1996-09-02 | 1997-04-16 | 北京天融信技贸有限责任公司 | Fireproof wall system |
EP0978839A1 (en) * | 1998-08-05 | 2000-02-09 | Hewlett-Packard Company | Media content protection utilizing public key cryptography |
EP1045585A1 (en) * | 1999-04-13 | 2000-10-18 | CANAL+ Société Anonyme | Method of and apparatus for providing secure communication of digital data between devices |
CN1478223A (en) * | 2001-02-23 | 2004-02-25 | �ʼҷ����ֵ�������˾ | Authentication method and data transmission system |
CN101076969A (en) * | 2004-11-25 | 2007-11-21 | 软件营有限公司 | Electrical transmission system in secret environment between virtual disks and electrical transmission method thereof |
CN101227488A (en) * | 2007-01-17 | 2008-07-23 | 华为技术有限公司 | A registered portal program communication system, communication device and method |
CN101601044A (en) * | 2005-07-20 | 2009-12-09 | 高通股份有限公司 | Apparatus and method for security architecture in wireless network |
-
2011
- 2011-11-01 CN CN2011103392453A patent/CN102364491A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1147738A (en) * | 1996-09-02 | 1997-04-16 | 北京天融信技贸有限责任公司 | Fireproof wall system |
EP0978839A1 (en) * | 1998-08-05 | 2000-02-09 | Hewlett-Packard Company | Media content protection utilizing public key cryptography |
EP1045585A1 (en) * | 1999-04-13 | 2000-10-18 | CANAL+ Société Anonyme | Method of and apparatus for providing secure communication of digital data between devices |
CN1478223A (en) * | 2001-02-23 | 2004-02-25 | �ʼҷ����ֵ�������˾ | Authentication method and data transmission system |
CN101076969A (en) * | 2004-11-25 | 2007-11-21 | 软件营有限公司 | Electrical transmission system in secret environment between virtual disks and electrical transmission method thereof |
CN101601044A (en) * | 2005-07-20 | 2009-12-09 | 高通股份有限公司 | Apparatus and method for security architecture in wireless network |
CN101227488A (en) * | 2007-01-17 | 2008-07-23 | 华为技术有限公司 | A registered portal program communication system, communication device and method |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102868813A (en) * | 2012-09-05 | 2013-01-09 | 广东欧珀移动通信有限公司 | Implementation method and mobile phone of a security management mechanism |
CN103294940A (en) * | 2013-05-23 | 2013-09-11 | 广东欧珀移动通信有限公司 | A kind of Android system permission control method and mobile intelligent terminal |
CN103646216A (en) * | 2013-11-13 | 2014-03-19 | 天脉聚源(北京)传媒科技有限公司 | Method and device for monitoring folder of terminal |
CN103646216B (en) * | 2013-11-13 | 2016-09-14 | 天脉聚源(北京)传媒科技有限公司 | A kind of monitoring method and device of terminal file |
CN105592452A (en) * | 2014-10-24 | 2016-05-18 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for preventing private data from being read maliciously |
CN104778415A (en) * | 2015-02-06 | 2015-07-15 | 北京北信源软件股份有限公司 | Computer behavior-based data anti-leakage system and method |
CN104778415B (en) * | 2015-02-06 | 2018-02-27 | 北京北信源软件股份有限公司 | A kind of leakage-preventing system and method for data based on computer behavior |
CN108763951A (en) * | 2015-10-26 | 2018-11-06 | 青岛海信移动通信技术股份有限公司 | A kind of guard method of data and device |
CN108763951B (en) * | 2015-10-26 | 2022-02-18 | 青岛海信移动通信技术股份有限公司 | Data protection method and device |
CN107426435A (en) * | 2017-08-04 | 2017-12-01 | 晶赞广告(上海)有限公司 | For the method and system for controlling sensitive data to ask |
CN107426435B (en) * | 2017-08-04 | 2021-01-19 | 晶赞广告(上海)有限公司 | Method and system for controlling sensitive data request |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102364491A (en) | Method for managing data authority, and terminal | |
US10230697B2 (en) | User terminals, and methods and computer-readable recording mediums storing computer programs for transmitting and receiving messages | |
US11115393B2 (en) | Message server, method for operating message server and computer-readable recording medium | |
EP2563056A2 (en) | Apparatus and method for controlling permissions in mobile terminal | |
US12284226B2 (en) | Methods and devices for establishing secure communication channels | |
CN108551517A (en) | Mobile communication equipment | |
CN104247327A (en) | Cryptographic transmission system using key encryption key | |
CN107113286A (en) | The roaming content erasing operation of striding equipment | |
CN104270517A (en) | Information encryption method and mobile terminal | |
EP2081354B1 (en) | Method and devices for handling access privileges | |
KR101589111B1 (en) | Method of providing security chatting service and system performing the same | |
CN102149046B (en) | Wireless Telecom Equipment and wireless communications method | |
US9820119B2 (en) | Method and systems for lockbox secured file transmission | |
EP3149642B1 (en) | Systems and methods for controlling media distribution | |
US20170230369A1 (en) | Access control for digital data | |
WO2018082885A1 (en) | Device and method for providing user-configured trust domains | |
US20160110555A1 (en) | Resource sharing apparatus, method, and non-transitory computer readable storage medium thereof | |
CN101796502A (en) | Method and electronic device for managing applications | |
CN102868766B (en) | A kind of mthods, systems and devices for realizing remote control | |
EP3465410B1 (en) | Encrypted document printing utilizing multiple networks | |
WO2016165312A1 (en) | Encryption method, decryption method and device therefor | |
KR20180005508A (en) | Contents kiosk system providing personalized contents | |
CN107111635A (en) | Content delivery method | |
HK40029324B (en) | Methods and devices for establishing secure communication channels | |
KR20100059517A (en) | Monitoring sysyem and operating method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120229 |