CN107153792A - A kind of data safety processing method, device and mobile terminal - Google Patents
A kind of data safety processing method, device and mobile terminal Download PDFInfo
- Publication number
- CN107153792A CN107153792A CN201710221966.1A CN201710221966A CN107153792A CN 107153792 A CN107153792 A CN 107153792A CN 201710221966 A CN201710221966 A CN 201710221966A CN 107153792 A CN107153792 A CN 107153792A
- Authority
- CN
- China
- Prior art keywords
- franchise
- read
- service interface
- zones
- transfer service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of data safety processing method, device and mobile terminal, franchise transfer service interface is set in the operating system of electronic equipment, franchise transfer service interface has the operating right for deleting file in read-only zones, and method includes:Franchise transfer service interface receives the removal request and the identification information of security service application of the abnormal document in the request deletion read-only zones that security service application is sent;Based on identification information, franchise transfer service interface is authenticated to security service application;If authentication passes through, franchise transfer service interface response removal request deletes the abnormal document in read-only zones.In above-mentioned technical proposal, applied and the cooperation of the franchise transfer service interface set in operating system by security service, to delete the abnormal document in read-only zones, solve in the prior art because in read-only zones abnormal document can not delete caused by the larger technical problem of electronic equipments safety risk, improve security during electronic equipment operation.
Description
Technical field
The present invention relates to software technology field, more particularly to a kind of data safety processing method, device and mobile terminal.
Background technology
With the continuous development of scientific technology, software engineering has also obtained development at full speed, various application software meet the tendency of and
It is raw, the particularly birth of the security service such as security guard, antivirus software application, it is ensured that the operation safety of electronic equipment.
In the prior art, security service application can carry out scan full hard disk to electronic equipment, but can only be on electronic equipment
Read-write region carries out deletion action.However, as virus, wooden horse etc. endanger the variation of the file of electronic equipments safety, may
The read-only zones of electronic equipment are intruded into, but the operating system of electronic equipment is in order to ensure the file security in read-only zones,
The operation such as do not allow other application software distorted, deleted to the file in the region, moved, is that this security service is applied
When there is the abnormal documents such as virus, wooden horse in scanning discovery read-only zones, the abnormal document in read-only zones can not also be carried out
Delete, there is larger security risk.
It can be seen that, in the prior art because the abnormal document in read-only zones can not be deleted, there is security risk in electronic equipment
Larger technical problem.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on
State a kind of data safety processing method, device and the mobile terminal of problem.
One aspect of the present invention is set there is provided a kind of data safety processing method in the operating system of electronic equipment
Franchise transfer service interface is put, the franchise transfer service interface has the operating right for deleting file in read-only zones, described
Method includes:
The exception that the franchise transfer service interface is received in the request deletion read-only zones that security service application is sent is literary
The removal request of part and the identification information of security service application;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the franchise transfer service interface responds the removal request and deletes described different in read-only zones
Normal file.
Optionally, the operating right includes:Deletion authority to file and the carry power to the electronic equipment disk
Limit.
Optionally, if the authentication passes through, the franchise transfer service interface responds the removal request and deletes read-only region
The abnormal document in domain, including:
If authentication passes through, the franchise transfer service interface responds the removal request, by the carry authority by institute
Read-only zones carry is stated for read-write region, is deleted out of read-write region the abnormal document by the deletion authority,
It is the read-only zones that the read-write region carry after the abnormal document, which will be deleted,.
Optionally, the identification information of the security service application includes:The signature of the security service application;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application,
Including:
Judge whether the signature is consistent with the preset signature that the security service is applied;
If the signature is consistent with the preset signature, authentication passes through;If the signature and the preset signature are inconsistent,
Failed authentication.
Optionally, the identification information of the security service application includes:The signature and function power of the security service application
Limit;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application,
Including:
Judge whether the preset signature of security service application of the signature with being stored in the operating system is consistent,
And whether the function privilege is consistent with authorized function privilege;
If the signature is consistent with the preset signature and the function privilege and authorized function privilege are consistent, authentication
Pass through;If the signature and the preset signature be inconsistent or the function privilege is inconsistent with the function privilege that is authorized to, reflect
Power failure.
Optionally, the exception in the removal request deletion read-only zones is responded in the franchise transfer service interface
Before file, methods described also includes:
The franchise transfer service interface, which judges whether the store path of the abnormal document belongs to, can delete path;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface performs response institute
State the operation that removal request deletes the abnormal document in read-only zones;Can if the store path of the abnormal document is not belonging to
Path is deleted, the franchise transfer service interface terminates the abnormal document in the response removal request deletion read-only zones
Operation.
Optionally, the path of deleting includes at least one in following store path:
The store path of system boot operation code, the store path of configuration file, system software in the operating system
Store path and system software data store path.
Optionally, the exception in the removal request deletion read-only zones is responded in the franchise transfer service interface
Before file, methods described also includes:
The franchise transfer service interface judges whether the file type of the abnormal document is preset kind;
If the file type of the abnormal document is preset kind, the franchise transfer service interface is performed to be deleted described in response
Except the operation of the abnormal document in read-only zones is deleted in request;If the file type of the abnormal document is not default class
Type, the franchise transfer service interface terminates the behaviour that the response removal request deletes the abnormal document in read-only zones
Make.
Optionally, the preset kind is included with least one in Types Below:Installation package file, executable file, pin
This document, word document and text.
Optionally, the abnormal document includes:Virus document and/or wooden horse file.
There is provided a kind of data safe processing device, operating system of the device in electronic equipment for another aspect of the present invention
Middle to set franchise transfer service interface, the franchise transfer service interface has the operating right for deleting file in read-only zones,
Described device includes:
Receiving unit, for receiving the request deletion that security service application is sent by the franchise transfer service interface
The removal request of abnormal document in reading field and the identification information of security service application;
Authenticating unit, for based on the identification information, by the franchise transfer service interface to the security service
Using being authenticated;
Unit is deleted, for when authenticating unit authentication passes through, institute to be responded by the franchise transfer service interface
State the abnormal document in removal request deletion read-only zones.
Optionally, the operating right includes:Deletion authority to file and the carry power to the electronic equipment disk
Limit.
Optionally, the authenticating unit, including:
Carry subelement, in authenticating unit authentication by making, by the carry authority by the read-only region
Domain carry is read-write region;
Subelement is deleted, for deleting out of read-write region the abnormal document by the deletion authority;
It is described that the carry subelement, which is additionally operable to that the read-write region carry after the abnormal document will be deleted,
Reading field.
Optionally, the identification information of the security service application includes:The signature of the security service application;
The authenticating unit, is used for:Judge whether the signature is consistent with the preset signature that the security service is applied;If
The signature is consistent with the preset signature, and authentication passes through;If the signature and inconsistent, the failed authentication of the preset signature.
Optionally, the identification information of the security service application includes:The signature and function power of the security service application
Limit;
The authenticating unit, is used for:Judge the signature and the security service application stored in the operating system
Preset signature it is whether consistent, and whether the function privilege consistent with authorized function privilege;If it is described signature with it is described
Preset signature is consistent and the function privilege is consistent with the function privilege being authorized to, and authentication passes through;If it is described signature with it is described pre-
Put inconsistent signature or the function privilege and authorized function privilege is inconsistent, failed authentication.
Optionally, described device also includes:
Path judging unit, is deleted in read-only zones for responding the removal request in the franchise transfer service interface
The abnormal document before, judge whether the store path of the abnormal document belongs to by the franchise transfer service interface
Path can be deleted;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface performs response institute
State the operation that removal request deletes the abnormal document in read-only zones;Can if the store path of the abnormal document is not belonging to
Path is deleted, the franchise transfer service interface terminates the abnormal document in the response removal request deletion read-only zones
Operation.
Optionally, the path of deleting includes at least one in following store path:
The store path of system boot operation code, the store path of configuration file, system software in the operating system
Store path and system software data store path.
Optionally, described device also includes:
Type judging unit, is deleted in read-only zones for responding the removal request in the franchise transfer service interface
The abnormal document before, whether the file type that the abnormal document is judged by the franchise transfer service interface is pre-
If type;
If the file type of the abnormal document is preset kind, the franchise transfer service interface is performed to be deleted described in response
Except the operation of the abnormal document in read-only zones is deleted in request;If the file type of the abnormal document is not default class
Type, the franchise transfer service interface terminates the behaviour that the response removal request deletes the abnormal document in read-only zones
Make.
Optionally, the preset kind is included with least one in Types Below:Installation package file, executable file, script
File, word document and text.
Optionally, the abnormal document includes:Virus document and/or wooden horse file.
The technical scheme provided in the embodiment of the present application, has at least the following technical effects or advantages:
By setting franchise transfer service interface in the operating system of electronic equipment, the franchise transfer service interface has
The deletion authority of file in read-only zones is deleted, the request that security service application is sent is received by the franchise transfer service interface
The removal request of abnormal document and the identification information of security service application in read-only zones are deleted, and according to the safety clothes received
The security service application that the identification information pair of business application sends removal request is authenticated, whether to judge removal request source
It is legal, if authentication passes through, show that removal request source is legal, then the exception responded in removal request deletion read-only zones is literary
Part, i.e., by security service apply with the cooperation of the franchise transfer service interface set in operating system, to delete read-only zones
Interior abnormal document, it is to avoid abnormal document causes potential safety hazard to electronic equipment, is solved in the prior art because in read-only zones
The larger technical problem of electronic equipments safety risk caused by abnormal document can not be deleted, improves peace during electronic equipment operation
Quan Xing.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of data safety processing method according to an embodiment of the invention;
Fig. 2 shows a kind of structured flowchart of data safe processing device according to an embodiment of the invention;
Fig. 3 shows a kind of structured flowchart of mobile terminal according to an embodiment of the invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
The embodiments of the invention provide show a kind of data safety processing method according to an embodiment of the invention, dress
Put and mobile terminal, there is the technical problem of larger security risk to solve electronic equipment in the prior art.
The embodiment of the present application provides a kind of data safety processing method, applied to an electronic equipment, and the electronic equipment can be with
For PC, smart mobile phone, pad etc., set in the operating system of electronic equipment in franchise transfer service interface, the privilege
Turning service interface has the operating right for deleting file in read-only zones.Specifically, can be by for franchise transfer service interface
Authority and carry authority are deleted in configuration, to make the franchise transfer service interface have the operating rights for deleting file in read-only zones
Limit, wherein carry authority refer to authority in an operating system to disk partition, have carry power in franchise transfer service interface
In limited time, then abnormal document therein, Zai Jianggai areas can then be deleted by being read-write region by the temporary transient carry of read-only zones
Domain carry returns original read-only zones, you can realize the deletion action to the file in read-only zones.
Fig. 1 is refer to, is configured in an operating system after good franchise transfer service interface, the data that the embodiment of the present application is provided
Security processing performs following steps:
S11:The exception that franchise transfer service interface is received in the request deletion read-only zones that security service application is sent is literary
The removal request of part and the identification information of security service application.
There is abnormal document in security service application scanning acquisition electronic equipment read-only zones in the electronic device includes
During the files such as virus, wooden horse, applied by security service and send the removal request for deleting the abnormal document into operating system
Privilege in converting interface, wherein, in removal request can comprising the store path of abnormal document, file type, file size, build
The information such as between immediately.Simultaneously in order to ensure that the file in read-only zones is not deleted by mistake, the embodiment of the present application is also deleted in transmission please
When asking, the identification information that security service is applied is sent into privilege converting interface, security service can be included in the identification information
The information such as signature, the function privilege of application.Franchise transfer service interface receives removal request and the mark that security service application is sent
Next step is performed after knowing information.
S12:Based on the identification information received, franchise transfer service interface is authenticated to security service application.
When the signature comprising security service application in the identification information received, it can be determined that the signature and the safety clothes
Whether the preset signature for being engaged in applying is consistent, and the preset signature of security service application is prestored when can be security service application installation
It is in an operating system or that operating system is obtained by network inquiry, generally inquire about corresponding security service application
Official website obtains corresponding signature, to increase the reliability of preset signature.If judging the signature and preset signature in identification information
Unanimously, then authentication passes through;If conversely, signature and inconsistent, the failed authentication of preset signature in identification information.
When the identification information received comprising security service apply signature and function privilege when, can by signature and
The judgement of function privilege is authenticated.The judgement of signature is consistent with the above method, and the judgement of function privilege specifically judges mark
Whether the function privilege in information is consistent using authorized function privilege with the security service.Under normal circumstances, security service
Using when mounted, user will authorize to the function privilege that it is required, will not generally change after mandate, still, if receiving
To the abnormal documents such as virus, wooden horse invasion when, it is possible to change its function privilege because of invasion, so, further to it
Function privilege carries out judging that the security for deleting read-only zones file can be improved.If signature and preset signature in identification information
Consistent and function privilege is consistent with authorized function privilege, and authentication passes through;If conversely, signature and preset label in identification information
The inconsistent or function privilege of name and authorized function privilege are inconsistent, failed authentication.
S13:If security service weight discriminating passes through, franchise transfer service interface responds its removal request and deletes read-only zones
Interior abnormal document.
It is that this can be with because franchise transfer service interface is configured with the deletion authority to file and the carry authority to disk
Security service weight discriminating by when, first pass through its carry authority by ask delete file where read-only zones carry be
Read-write region, then authority is deleted by it delete out of read-write region the abnormal document, finally by suppressing exception file
Read-write region carry afterwards is read-only zones, and then realizes the deletion to only reading and writing abnormal document in region.
In specific implementation process, deleted or maliciously deleted, the application by mistake in order to avoid only reading and writing the file in region
Embodiment also performs one or two following judgment step before the abnormal document of security service application request is deleted:
1., franchise transfer service interface, which judges whether the store path of abnormal document belongs to, can delete path.Wherein, it can delete
Except path includes more than one following (including one) store path:The storage of system boot operation code in the operating system
Path such as system/bin, configuration file store path such as system/xbin, system software store path such as system/
The app and store path of system software data such as system/priv-app/data.If the store path of abnormal document belongs to
Path can be deleted, franchise transfer service interface performs the operation that response removal request deletes the abnormal document in read-only zones;Instead
It, franchise transfer service interface terminates the operation that response removal request deletes the abnormal document in read-only zones, i.e., do not perform and delete
Except the operation of abnormal document.
2., franchise transfer service interface judge the abnormal document of security service application request deletion file type whether be
Preset kind.Wherein, preset kind includes more than one following (including one) type:The entitled .apk of installation package file such as suffix
File, the entitled .exe of executable file such as suffix file, script file is as extended entitled .vbs, js, wsh, wsfapk
The entitled .txt of file, word document and text such as suffix file.It should be noted that the embodiment of the present application is not limited
The particular type of preset kind processed, preset kind can update with the variation of the abnormal documents such as virus, wooden horse.If abnormal document
File type be preset kind, franchise transfer service interface performs the response removal request and deletes exception in read-only zones
The operation of file;Conversely, franchise transfer service interface terminates the behaviour that response removal request deletes the abnormal document in read-only zones
Make.
In above-described embodiment, by setting franchise transfer service interface in the operating system of electronic equipment, for the privilege
The operating right of file in read-only zones is deleted in the configuration of transfer service interface, then receives safety by the franchise transfer service interface
The removal request of abnormal document and the identification information of security service application in read-only zones are deleted in the request for being served by sending, and
The security service application that the identification information pair applied according to the security service received sends removal request is authenticated, to judge
Whether removal request source is legal, if authentication passes through, and shows that removal request source is legal, then responds removal request and delete only
Abnormal document in reading field, i.e., the matching somebody with somebody using the franchise transfer service interface with being set in operating system by security service
Close, to delete the abnormal document in read-only zones, it is to avoid abnormal document causes potential safety hazard to electronic equipment, solve existing skill
In art because in read-only zones abnormal document can not delete caused by the larger technical problem of electronic equipments safety risk, improve electricity
Security during sub- equipment operation.
Fig. 2 is refer to, the same inventive concept based on above-described embodiment, the embodiment of the present application is also corresponded to and provided, a kind of number
According to secure processing device, the device sets franchise transfer service interface, the franchise transfer in the operating system of electronic equipment
Service interface has the operating right for deleting file in read-only zones, and described device includes:
Receiving unit 21, for receiving the request deletion that security service application is sent by the franchise transfer service interface
The removal request of abnormal document in read-only zones and the identification information of security service application;
Authenticating unit 22, for based on the identification information, by the franchise transfer service interface to the safety clothes
Business application is authenticated;
Unit 23 is deleted, for when authenticating unit authentication passes through, being responded by the franchise transfer service interface
The removal request deletes the abnormal document in read-only zones.
Wherein, the operating right includes:Deletion authority to file and the carry authority to the electronic equipment disk.
The abnormal document includes:Virus document and/or wooden horse file.
In specific implementation process, the authenticating unit 22, including:Carry subelement and deletion subelement.Carry subelement,
For in authenticating unit authentication by making, by the read-only zones carry be read-write region by the carry authority;
Subelement is deleted, for deleting out of read-write region the abnormal document by the deletion authority;Carry is single
It is the read-only zones that member, which is additionally operable to that the read-write region carry after the abnormal document will be deleted,.
As a kind of optional embodiment, the identification information of the security service application includes:The security service application
Signature;The authenticating unit 22, specifically for:Judge it is described signature with the security service apply preset signature whether one
Cause;If the signature is consistent with the preset signature, authentication passes through;If the signature and the preset signature are inconsistent, authentication
Failure.
As an alternative embodiment, the identification information of the security service application includes:The security service should
Signature and function privilege;The authenticating unit 22, specifically for:Judge what is stored in the signature and the operating system
Whether the preset signature of the security service application is consistent, and whether the function privilege is consistent with authorized function privilege;
If the signature is consistent with the preset signature and the function privilege and authorized function privilege are consistent, authentication passes through;If
The signature and the preset signature be inconsistent or the function privilege and the function privilege that is authorized to it is inconsistent, failed authentication.
In specific implementation process, described device also includes:Path judging unit 24, in the franchise transfer service
Interface is responded before the abnormal document that the removal request is deleted in read-only zones, passes through the franchise transfer service interface
Path can be deleted by judging whether the store path of the abnormal document belongs to;If the store path of the abnormal document, which belongs to, to be deleted
Except path, the franchise transfer service interface performs the abnormal document in the response removal request deletion read-only zones
Operation;If the store path of the abnormal document is not belonging to that path can be deleted, the franchise transfer service interface terminates response institute
State the operation that removal request deletes the abnormal document in read-only zones.Wherein, the path of deleting includes following storage
At least one in path:The store path of system boot operation code in the operating system, the store path of configuration file,
The store path of system software and the store path of system software data.
In specific implementation process, described device also includes:Type judging unit 25, in the franchise transfer service
Interface is responded before the abnormal document that the removal request is deleted in read-only zones, passes through the franchise transfer service interface
Whether the file type for judging the abnormal document is preset kind;If the file type of the abnormal document is preset kind,
The franchise transfer service interface performs the operation that the response removal request deletes the abnormal document in read-only zones;If
The file type of the abnormal document is not preset kind, and the franchise transfer service interface terminates the response removal request and deleted
Except the operation of the abnormal document in read-only zones.Wherein, the preset kind is included with least one in Types Below:Peace
Fill APMB package, executable file, script file, word document and text.
On the device in above-described embodiment, wherein unit performs the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
The technical scheme provided in the embodiment of the present application, has at least the following technical effects or advantages:
According to a kind of data safety processing method of the present invention, by being set in the operating system of electronic equipment in privilege
Turn service interface, delete the operating right of file in read-only zones for the franchise transfer service interface configuration, then pass through the privilege
Transfer service interface receives the removal request and safety of abnormal document in the request deletion read-only zones that security service application is sent
The identification information being served by, and the identification information pair applied according to the security service received sends the safety clothes of removal request
Business application is authenticated, to judge whether removal request source is legal, if authentication passes through, shows the conjunction of removal request source
Method, then respond the abnormal document in removal request deletion read-only zones, i.e., applied and set in operating system by security service
Franchise transfer service interface cooperation, to delete the abnormal document in read-only zones, it is to avoid abnormal document is made to electronic equipment
Into potential safety hazard, solve in the prior art because in read-only zones abnormal document can not delete caused by electronic equipments safety risk
Larger technical problem, improves security during electronic equipment operation.
The embodiment of the present invention additionally provides a kind of mobile terminal, as shown in figure 3, for convenience of description, illustrate only and this
The related part of inventive embodiments, particular technique details is not disclosed, refer to present invention method part.The terminal can
Think including mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point
Of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is mobile phone as an example:
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.With reference to figure
3, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 310, memory 320, input block 330, display unit 340,
Sensor 350, voicefrequency circuit 360, Wireless Fidelity (wireless-fidelity, Wi-Fi) module 370, processor 380 and
The grade part of power supply 390.It will be understood by those skilled in the art that the handset structure shown in Fig. 3 does not constitute the restriction to mobile phone,
It can include than illustrating more or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 3:
RF circuits 310 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information is received, handled to processor 380;In addition, being sent to base station by up data are designed.Generally, RF circuits 310
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..In addition, RF circuits 310 can also be communicated by radio communication with network and other equipment.
Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA
(Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution,
LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 320 can be used for storage software program and module, and processor 380 is stored in memory 320 by operation
Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 320 can include height
Fast random access memory, can also include nonvolatile memory, for example, at least one disk memory, flush memory device,
Or other volatile solid-state parts.
Input block 330 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with
And the relevant key signals input of function control.Specifically, input block 330 may include that contact panel 331 and other inputs are set
Standby 332.Contact panel 331, also referred to as touch-screen, collecting touch operation of the user on or near it, (such as user uses
The operation of any suitable object such as finger, stylus or annex on contact panel 331 or near contact panel 331), and root
Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 331 may include touch detecting apparatus and touch
Two parts of controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation is brought,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinates, then give processor 380, and the order sent of reception processing device 380 and can be performed.Furthermore, it is possible to using electricity
The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 331.Except contact panel 331, input
Unit 330 can also include other input equipments 332.Specifically, other input equipments 332 can include but is not limited to secondary or physical bond
One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 340 can be used for the various of the information that is inputted by user of display or the information for being supplied to user and mobile phone
Menu.Display unit 340 may include display panel 341, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 341.Further, contact panel 331 can cover display panel 341, when contact panel 331 is detected thereon or attached
After near touch operation, processor 380 is sent to determine the type of touch event, with preprocessor 380 according to touch event
Type corresponding visual output is provided on display panel 341.Although in figure 3, contact panel 331 and display panel 341
It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control
Panel 331 and the input that is integrated and realizing mobile phone of display panel 341 and output function.
Mobile phone may also include at least one sensor 350, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 341, proximity transducer can close display panel 341 when mobile phone is moved in one's ear
And/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) acceleration
Size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 360, loudspeaker 361, microphone 362 can provide the COBBAIF between user and mobile phone.Audio-frequency electric
Electric signal after the voice data received conversion can be transferred to loudspeaker 361, sound is converted to by loudspeaker 361 by road 360
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 362, by voicefrequency circuit 360 receive after turn
It is changed to voice data, then after voice data output processor 380 is handled, through RF circuits 310 to be sent to such as another mobile phone,
Or export voice data to memory 320 so as to further processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 370
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 3 is shown
WiFi module 370, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely
Become in the essential scope of invention and omit.
Processor 380 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform and be stored in software program and/or module in memory 320, and call and be stored in memory 320
Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 380 can be wrapped
Include one or more processing units;It is preferred that, processor 380 can integrated application processor and modem processor, wherein, should
Operating system, user interface and application program etc. are mainly handled with processor, modem processor mainly handles radio communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 380.
Mobile phone also includes the power supply 390 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 380 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system
Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiments of the present invention, the processor 380 included by the terminal performs one or more than one program bag contains
For the instruction operated below:
Franchise transfer service interface receives the abnormal document in the request deletion read-only zones that security service application is sent
Removal request and the identification information of security service application, wherein, the franchise transfer service interface, which has, deletes read-only region
The operating right of file in domain;Based on the identification information, the franchise transfer service interface enters to the security service application
Row authentication;If authentication passes through, the franchise transfer service interface responds the removal request and deletes described different in read-only zones
Normal file.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system
Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various
Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the specification that this place is provided, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, exist
Above in the description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect
The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself
All as the separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any
Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power
Profit is required, summary and accompanying drawing) disclosed in each feature can or similar purpose identical, equivalent by offer alternative features come generation
Replace.
Although in addition, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments
Including some features rather than further feature, but not the combination of the feature of be the same as Example mean be in the scope of the present invention
Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it
One mode can use in any combination.
The present invention all parts embodiment can be realized with hardware, or with one or more processor run
Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) are realized in gateway according to embodiments of the present invention, proxy server, system
Some or all parts some or all functions.The present invention is also implemented as being used to perform side as described herein
The some or all equipment or program of device (for example, computer program and computer program product) of method.It is such
Realizing the program of the present invention can store on a computer-readable medium, or can have the shape of one or more signal
Formula.Such signal can be downloaded from internet website and obtained, and either be provided or with any other shape on carrier signal
Formula is provided.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of some different elements and coming real by means of properly programmed computer
It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
The invention discloses, A1, a kind of data safety processing method, wherein, set in the operating system of electronic equipment
Franchise transfer service interface, the franchise transfer service interface has the operating right for deleting file in read-only zones, the side
Method includes:
The exception that the franchise transfer service interface is received in the request deletion read-only zones that security service application is sent is literary
The removal request of part and the identification information of security service application;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the franchise transfer service interface responds the removal request and deletes described different in read-only zones
Normal file.
A2, the method according to A1, wherein, the operating right includes:
Deletion authority to file and the carry authority to the electronic equipment disk.
A3, the method according to A2, wherein, if the authentication passes through, the franchise transfer service interface response is described
Removal request deletes the abnormal document in read-only zones, including:
If authentication passes through, the franchise transfer service interface responds the removal request, by the carry authority by institute
Read-only zones carry is stated for read-write region, is deleted out of read-write region the abnormal document by the deletion authority,
It is the read-only zones that the read-write region carry after the abnormal document, which will be deleted,.
A4, the method according to A1, wherein, the identification information of the security service application includes:The security service
The signature of application;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application,
Including:
Judge whether the signature is consistent with the preset signature that the security service is applied;
If the signature is consistent with the preset signature, authentication passes through;If the signature and the preset signature are inconsistent,
Failed authentication.
A5, the method according to A1, wherein, the identification information of the security service application includes:The security service
The signature and function privilege of application;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application,
Including:
Judge whether the preset signature of security service application of the signature with being stored in the operating system is consistent,
And whether the function privilege is consistent with authorized function privilege;
If the signature is consistent with the preset signature and the function privilege and authorized function privilege are consistent, authentication
Pass through;If the signature and the preset signature be inconsistent or the function privilege is inconsistent with the function privilege that is authorized to, reflect
Power failure.
A6, the method according to any one of A1~A5, wherein, deleted described in the franchise transfer service interface response
Deleted except request before the abnormal document in read-only zones, methods described also includes:
The franchise transfer service interface, which judges whether the store path of the abnormal document belongs to, can delete path;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface performs response institute
State the operation that removal request deletes the abnormal document in read-only zones;
If the store path of the abnormal document is not belonging to that path can be deleted, the franchise transfer service interface terminates response
The removal request deletes the operation of the abnormal document in read-only zones.
A7, the method according to A6, wherein, the path of deleting includes at least one in following store path:
The store path of system boot operation code, the store path of configuration file, system software in the operating system
Store path and system software data store path.
A8, the method according to any one of A1~A5, wherein, in the franchise transfer service interface response deletion
Request is deleted before the abnormal document in read-only zones, and methods described also includes:
The franchise transfer service interface judges whether the file type of the abnormal document is preset kind;
If the file type of the abnormal document is preset kind, the franchise transfer service interface performs the response institute
State the operation that removal request deletes the abnormal document in read-only zones;
If the file type of the abnormal document is not preset kind, the franchise transfer service interface terminates the response
The removal request deletes the operation of the abnormal document in read-only zones.
A9, the method according to A8, wherein, the preset kind is included with least one of Types Below:Installation kit text
Part, executable file, script file, word document and text.
A10, the method according to any one of A1~A5, wherein, the abnormal document includes virus document and/or wooden horse
File.
The invention also discloses, B11, a kind of data safe processing device, wherein, operation system of the device in electronic equipment
Franchise transfer service interface is set in system, and the franchise transfer service interface has the operating rights for deleting file in read-only zones
Limit, described device includes:
Receiving unit, for receiving the request deletion that security service application is sent by the franchise transfer service interface
The removal request of abnormal document in reading field and the identification information of security service application;
Authenticating unit, for based on the identification information, by the franchise transfer service interface to the security service
Using being authenticated;
Unit is deleted, for when authenticating unit authentication passes through, institute to be responded by the franchise transfer service interface
State the abnormal document in removal request deletion read-only zones.
B12, the device according to B11, wherein, the operating right includes:
Deletion authority to file and the carry authority to the electronic equipment disk.
B13, the device according to B12, wherein, the authenticating unit, including:
Carry subelement, in authenticating unit authentication by making, by the carry authority by the read-only region
Domain carry is read-write region;
Subelement is deleted, for deleting out of read-write region the abnormal document by the deletion authority;
It is described that the carry subelement, which is additionally operable to that the read-write region carry after the abnormal document will be deleted,
Reading field.
B14, the device according to B11, wherein, the identification information of the security service application includes:The safety clothes
The signature of business application;
The authenticating unit, is used for:Judge whether the signature is consistent with the preset signature that the security service is applied;If
The signature is consistent with the preset signature, and authentication passes through;If the signature and inconsistent, the failed authentication of the preset signature.
B15, the device according to B11, wherein, the identification information of the security service application includes:The safety clothes
The signature and function privilege of business application;
The authenticating unit, is used for:Judge the signature and the security service application stored in the operating system
Preset signature it is whether consistent, and whether the function privilege consistent with authorized function privilege;If it is described signature with it is described
Preset signature is consistent and the function privilege is consistent with the function privilege being authorized to, and authentication passes through;If it is described signature with it is described pre-
Put inconsistent signature or the function privilege and authorized function privilege is inconsistent, failed authentication.
B16, the device according to any one of B11~B15, wherein, described device also includes:
Path judging unit, is deleted in read-only zones for responding the removal request in the franchise transfer service interface
The abnormal document before, judge whether the store path of the abnormal document belongs to by the franchise transfer service interface
Path can be deleted;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface performs response institute
State the operation that removal request deletes the abnormal document in read-only zones;Can if the store path of the abnormal document is not belonging to
Path is deleted, the franchise transfer service interface terminates the abnormal document in the response removal request deletion read-only zones
Operation.
B17, the device according to B16, wherein, the path of deleting includes at least one in following store path
It is individual:
The store path of system boot operation code, the store path of configuration file, system software in the operating system
Store path and system software data store path.
B18, the device according to any one of B11~B15, wherein, described device also includes:
Type judging unit, is deleted in read-only zones for responding the removal request in the franchise transfer service interface
The abnormal document before, whether the file type that the abnormal document is judged by the franchise transfer service interface is pre-
If type;
If the file type of the abnormal document is preset kind, the franchise transfer service interface is performed to be deleted described in response
Except the operation of the abnormal document in read-only zones is deleted in request;If the file type of the abnormal document is not default class
Type, the franchise transfer service interface terminates the behaviour that the response removal request deletes the abnormal document in read-only zones
Make.
B19, the device according to B18, wherein, the preset kind is included with least one in Types Below:Install
APMB package, executable file, script file, word document and text.
20th, the device according to any one of B11~15, wherein, the abnormal document includes:Virus document and/or wood
Marvin's part.
The invention also discloses, C21, a kind of mobile terminal, wherein, including processor and memory;The memory is used
In storage one or more than one program;The processor is used to perform one or more than one program bag containing use
In the instruction for carrying out following operation:
Franchise transfer service interface receives the abnormal document in the request deletion read-only zones that security service application is sent
Removal request and the identification information of security service application, wherein, the franchise transfer service interface, which has, deletes read-only region
The operating right of file in domain;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the franchise transfer service interface responds the removal request and deletes described different in read-only zones
Normal file.
Claims (10)
1. a kind of data safety processing method, it is characterised in that franchise transfer service is set in the operating system of electronic equipment
Interface, the franchise transfer service interface has the operating right for deleting file in read-only zones, and methods described includes:
The franchise transfer service interface receives the abnormal document in the request deletion read-only zones that security service application is sent
Removal request and the identification information of security service application;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the exception that the franchise transfer service interface is responded in the removal request deletion read-only zones is literary
Part.
2. the method as described in claim 1, it is characterised in that the operating right includes:
Deletion authority to file and the carry authority to the electronic equipment disk.
3. method as claimed in claim 2, it is characterised in that if the authentication passes through, the franchise transfer service interface rings
The removal request is answered to delete the abnormal document in read-only zones, including:
If authentication passes through, the franchise transfer service interface responds the removal request, will be described by the carry authority
Reading field carry is read-write region, deletes out of read-write region the abnormal document by the deletion authority, will delete
Except the read-write region carry after the abnormal document is the read-only zones.
4. the method as described in claim 1, it is characterised in that the identification information of the security service application includes:The peace
The signature being served by entirely;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application, including:
Judge whether the signature is consistent with the preset signature that the security service is applied;
If the signature is consistent with the preset signature, authentication passes through;If the signature and the preset signature are inconsistent, authentication
Failure.
5. the method as described in claim 1, it is characterised in that the identification information of the security service application includes:The peace
The signature and function privilege being served by entirely;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application, including:
Judge whether the preset signature of security service application of the signature with being stored in the operating system is consistent, and institute
Whether consistent with authorized function privilege state function privilege;
If the signature is consistent with the preset signature and the function privilege and authorized function privilege are consistent, authentication is logical
Cross;If the signature and the preset signature be inconsistent or the function privilege is inconsistent with the function privilege that is authorized to, authenticate
Failure.
6. such as method according to any one of claims 1 to 5, it is characterised in that responded in the franchise transfer service interface
The removal request is deleted before the abnormal document in read-only zones, and methods described also includes:
The franchise transfer service interface, which judges whether the store path of the abnormal document belongs to, can delete path;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface is performed to be deleted described in response
Except the operation of the abnormal document in read-only zones is deleted in request;
If the store path of the abnormal document is not belonging to that path can be deleted, it is described that the franchise transfer service interface terminates response
Removal request deletes the operation of the abnormal document in read-only zones.
7. method as claimed in claim 6, it is characterised in that the path of deleting is included in following store path at least
One:
The store path of system boot operation code in the operating system, the store path of configuration file, system software are deposited
Store up the store path of path and system software data.
8. the method as described in any one of Claims 1 to 5, it is characterised in that in the franchise transfer service interface response institute
State before the abnormal document that removal request is deleted in read-only zones, methods described also includes:
The franchise transfer service interface judges whether the file type of the abnormal document is preset kind;
If the file type of the abnormal document is preset kind, the franchise transfer service interface is performed to be deleted described in the response
Except the operation of the abnormal document in read-only zones is deleted in request;
If the file type of the abnormal document is not preset kind, the franchise transfer service interface is terminated described in the response
Removal request deletes the operation of the abnormal document in read-only zones.
9. a kind of data safe processing device, it is characterised in that the device is set in the operating system of electronic equipment in privilege
Turn service interface, the franchise transfer service interface has the operating right for deleting file in read-only zones, and described device includes:
Receiving unit, for receiving the request deletion read-only region that security service application is sent by the franchise transfer service interface
The removal request of abnormal document in domain and the identification information of security service application;
Authenticating unit, for based on the identification information, by the franchise transfer service interface to the security service application
Authenticated;
Unit is deleted, for when authenticating unit authentication passes through, by being deleted described in the franchise transfer service interface response
Except the abnormal document in read-only zones is deleted in request.
10. a kind of mobile terminal, it is characterised in that including processor and memory;The memory be used for store one or
More than one program;The processor is used to perform one or more than one program bag containing for carrying out following operation
Instruction:
Franchise transfer service interface receives the deletion of the abnormal document in the request deletion read-only zones that security service application is sent
Request and the identification information of security service application, wherein, the franchise transfer service interface, which has, to be deleted in read-only zones
The operating right of file;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the exception that the franchise transfer service interface is responded in the removal request deletion read-only zones is literary
Part.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710221966.1A CN107153792B (en) | 2017-04-06 | 2017-04-06 | Data security processing method and device and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710221966.1A CN107153792B (en) | 2017-04-06 | 2017-04-06 | Data security processing method and device and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107153792A true CN107153792A (en) | 2017-09-12 |
CN107153792B CN107153792B (en) | 2020-07-24 |
Family
ID=59794006
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710221966.1A Active CN107153792B (en) | 2017-04-06 | 2017-04-06 | Data security processing method and device and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107153792B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108681594A (en) * | 2018-05-16 | 2018-10-19 | Oppo广东移动通信有限公司 | Document handling method and relevant apparatus |
CN109739799A (en) * | 2018-12-29 | 2019-05-10 | 深圳市优必选科技有限公司 | Data interactive method, heterogeneous multi-nucleus processor and the terminal of heterogeneous multi-nucleus processor |
CN110941812A (en) * | 2019-10-23 | 2020-03-31 | 天津智融创新科技发展有限公司 | Privileged function calling method and system |
CN111566632A (en) * | 2018-09-29 | 2020-08-21 | 华为技术有限公司 | Operation control method and electronic equipment |
WO2021022729A1 (en) * | 2019-08-06 | 2021-02-11 | 惠州Tcl移动通信有限公司 | Root permission assignment method and apparatus, storage medium, and terminal device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414329A (en) * | 2007-10-15 | 2009-04-22 | 北京瑞星国际软件有限公司 | Method for deleting in-service virus |
CN102768717A (en) * | 2012-06-29 | 2012-11-07 | 腾讯科技(深圳)有限公司 | Malicious file detection method and malicious file detection device |
CN102855435A (en) * | 2011-06-27 | 2013-01-02 | 奇智软件(北京)有限公司 | File unlocking and shredding method and device |
-
2017
- 2017-04-06 CN CN201710221966.1A patent/CN107153792B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414329A (en) * | 2007-10-15 | 2009-04-22 | 北京瑞星国际软件有限公司 | Method for deleting in-service virus |
CN102855435A (en) * | 2011-06-27 | 2013-01-02 | 奇智软件(北京)有限公司 | File unlocking and shredding method and device |
CN102768717A (en) * | 2012-06-29 | 2012-11-07 | 腾讯科技(深圳)有限公司 | Malicious file detection method and malicious file detection device |
Non-Patent Citations (1)
Title |
---|
AB6326795: "Android使用mount挂载/system/app为读写权限,删除或替换***应用", 《HTTPS://BLOG.CSDN.NET/TABACTIVITY/ARTICLE/DETAILS/12629873》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108681594A (en) * | 2018-05-16 | 2018-10-19 | Oppo广东移动通信有限公司 | Document handling method and relevant apparatus |
CN111566632A (en) * | 2018-09-29 | 2020-08-21 | 华为技术有限公司 | Operation control method and electronic equipment |
CN111566632B (en) * | 2018-09-29 | 2023-11-03 | 华为技术有限公司 | Operation control method and electronic equipment |
CN109739799A (en) * | 2018-12-29 | 2019-05-10 | 深圳市优必选科技有限公司 | Data interactive method, heterogeneous multi-nucleus processor and the terminal of heterogeneous multi-nucleus processor |
WO2021022729A1 (en) * | 2019-08-06 | 2021-02-11 | 惠州Tcl移动通信有限公司 | Root permission assignment method and apparatus, storage medium, and terminal device |
CN110941812A (en) * | 2019-10-23 | 2020-03-31 | 天津智融创新科技发展有限公司 | Privileged function calling method and system |
Also Published As
Publication number | Publication date |
---|---|
CN107153792B (en) | 2020-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104125216B (en) | A kind of method, system and terminal for lifting credible performing environment security | |
CN107153792A (en) | A kind of data safety processing method, device and mobile terminal | |
CN104134034B (en) | Control the method and apparatus that application runs | |
WO2017211205A1 (en) | Method and device for updating whitelist | |
CN106341809B (en) | A kind of data transmission method and equipment | |
CN106570358A (en) | Method and device for setting application permissions | |
CN106960155A (en) | The update method and device of a kind of basic input output system | |
CN106534324A (en) | Data sharing method and cloud server | |
CN106843868A (en) | Method, device and mobile terminal that a kind of many accounts are logged in | |
CN110941821A (en) | Data processing method, device and storage medium | |
CN106056001A (en) | Private data protection method and apparatus based on mobile terminal and mobile terminal | |
CN108604281A (en) | The method and its terminal of data processing | |
CN107219951A (en) | Touch screen control method, device, storage medium and terminal device | |
CN106550361A (en) | A kind of data transmission method and equipment | |
CN109873794A (en) | A kind of means of defence and server of Denial of Service attack | |
CN109687974A (en) | APK verification method, device, mobile terminal and readable storage medium storing program for executing | |
CN106534093A (en) | Terminal data processing method, device and system | |
CN108549826A (en) | Method of calibration, terminal, server and the readable storage medium storing program for executing of application program | |
CN104104656A (en) | Account retrieving method and device | |
CN106959859A (en) | The call method and device of system call function | |
CN104573437A (en) | Information authentication method, device and terminal | |
CN106302603A (en) | The method and apparatus remotely deleting information | |
CN107066324A (en) | A kind of control method and equipment of finger prints processing resource | |
CN106713319B (en) | Remote control method, device and system between terminals and mobile terminal | |
CN106203143A (en) | Method, device and the mobile terminal of a kind of application program locking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |