CN107153792A - A kind of data safety processing method, device and mobile terminal - Google Patents

A kind of data safety processing method, device and mobile terminal Download PDF

Info

Publication number
CN107153792A
CN107153792A CN201710221966.1A CN201710221966A CN107153792A CN 107153792 A CN107153792 A CN 107153792A CN 201710221966 A CN201710221966 A CN 201710221966A CN 107153792 A CN107153792 A CN 107153792A
Authority
CN
China
Prior art keywords
franchise
read
service interface
zones
transfer service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710221966.1A
Other languages
Chinese (zh)
Other versions
CN107153792B (en
Inventor
徐志克
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Anyun Century Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Anyun Century Technology Co Ltd filed Critical Beijing Anyun Century Technology Co Ltd
Priority to CN201710221966.1A priority Critical patent/CN107153792B/en
Publication of CN107153792A publication Critical patent/CN107153792A/en
Application granted granted Critical
Publication of CN107153792B publication Critical patent/CN107153792B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data safety processing method, device and mobile terminal, franchise transfer service interface is set in the operating system of electronic equipment, franchise transfer service interface has the operating right for deleting file in read-only zones, and method includes:Franchise transfer service interface receives the removal request and the identification information of security service application of the abnormal document in the request deletion read-only zones that security service application is sent;Based on identification information, franchise transfer service interface is authenticated to security service application;If authentication passes through, franchise transfer service interface response removal request deletes the abnormal document in read-only zones.In above-mentioned technical proposal, applied and the cooperation of the franchise transfer service interface set in operating system by security service, to delete the abnormal document in read-only zones, solve in the prior art because in read-only zones abnormal document can not delete caused by the larger technical problem of electronic equipments safety risk, improve security during electronic equipment operation.

Description

A kind of data safety processing method, device and mobile terminal
Technical field
The present invention relates to software technology field, more particularly to a kind of data safety processing method, device and mobile terminal.
Background technology
With the continuous development of scientific technology, software engineering has also obtained development at full speed, various application software meet the tendency of and It is raw, the particularly birth of the security service such as security guard, antivirus software application, it is ensured that the operation safety of electronic equipment.
In the prior art, security service application can carry out scan full hard disk to electronic equipment, but can only be on electronic equipment Read-write region carries out deletion action.However, as virus, wooden horse etc. endanger the variation of the file of electronic equipments safety, may The read-only zones of electronic equipment are intruded into, but the operating system of electronic equipment is in order to ensure the file security in read-only zones, The operation such as do not allow other application software distorted, deleted to the file in the region, moved, is that this security service is applied When there is the abnormal documents such as virus, wooden horse in scanning discovery read-only zones, the abnormal document in read-only zones can not also be carried out Delete, there is larger security risk.
It can be seen that, in the prior art because the abnormal document in read-only zones can not be deleted, there is security risk in electronic equipment Larger technical problem.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State a kind of data safety processing method, device and the mobile terminal of problem.
One aspect of the present invention is set there is provided a kind of data safety processing method in the operating system of electronic equipment Franchise transfer service interface is put, the franchise transfer service interface has the operating right for deleting file in read-only zones, described Method includes:
The exception that the franchise transfer service interface is received in the request deletion read-only zones that security service application is sent is literary The removal request of part and the identification information of security service application;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the franchise transfer service interface responds the removal request and deletes described different in read-only zones Normal file.
Optionally, the operating right includes:Deletion authority to file and the carry power to the electronic equipment disk Limit.
Optionally, if the authentication passes through, the franchise transfer service interface responds the removal request and deletes read-only region The abnormal document in domain, including:
If authentication passes through, the franchise transfer service interface responds the removal request, by the carry authority by institute Read-only zones carry is stated for read-write region, is deleted out of read-write region the abnormal document by the deletion authority, It is the read-only zones that the read-write region carry after the abnormal document, which will be deleted,.
Optionally, the identification information of the security service application includes:The signature of the security service application;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application, Including:
Judge whether the signature is consistent with the preset signature that the security service is applied;
If the signature is consistent with the preset signature, authentication passes through;If the signature and the preset signature are inconsistent, Failed authentication.
Optionally, the identification information of the security service application includes:The signature and function power of the security service application Limit;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application, Including:
Judge whether the preset signature of security service application of the signature with being stored in the operating system is consistent, And whether the function privilege is consistent with authorized function privilege;
If the signature is consistent with the preset signature and the function privilege and authorized function privilege are consistent, authentication Pass through;If the signature and the preset signature be inconsistent or the function privilege is inconsistent with the function privilege that is authorized to, reflect Power failure.
Optionally, the exception in the removal request deletion read-only zones is responded in the franchise transfer service interface Before file, methods described also includes:
The franchise transfer service interface, which judges whether the store path of the abnormal document belongs to, can delete path;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface performs response institute State the operation that removal request deletes the abnormal document in read-only zones;Can if the store path of the abnormal document is not belonging to Path is deleted, the franchise transfer service interface terminates the abnormal document in the response removal request deletion read-only zones Operation.
Optionally, the path of deleting includes at least one in following store path:
The store path of system boot operation code, the store path of configuration file, system software in the operating system Store path and system software data store path.
Optionally, the exception in the removal request deletion read-only zones is responded in the franchise transfer service interface Before file, methods described also includes:
The franchise transfer service interface judges whether the file type of the abnormal document is preset kind;
If the file type of the abnormal document is preset kind, the franchise transfer service interface is performed to be deleted described in response Except the operation of the abnormal document in read-only zones is deleted in request;If the file type of the abnormal document is not default class Type, the franchise transfer service interface terminates the behaviour that the response removal request deletes the abnormal document in read-only zones Make.
Optionally, the preset kind is included with least one in Types Below:Installation package file, executable file, pin This document, word document and text.
Optionally, the abnormal document includes:Virus document and/or wooden horse file.
There is provided a kind of data safe processing device, operating system of the device in electronic equipment for another aspect of the present invention Middle to set franchise transfer service interface, the franchise transfer service interface has the operating right for deleting file in read-only zones, Described device includes:
Receiving unit, for receiving the request deletion that security service application is sent by the franchise transfer service interface The removal request of abnormal document in reading field and the identification information of security service application;
Authenticating unit, for based on the identification information, by the franchise transfer service interface to the security service Using being authenticated;
Unit is deleted, for when authenticating unit authentication passes through, institute to be responded by the franchise transfer service interface State the abnormal document in removal request deletion read-only zones.
Optionally, the operating right includes:Deletion authority to file and the carry power to the electronic equipment disk Limit.
Optionally, the authenticating unit, including:
Carry subelement, in authenticating unit authentication by making, by the carry authority by the read-only region Domain carry is read-write region;
Subelement is deleted, for deleting out of read-write region the abnormal document by the deletion authority;
It is described that the carry subelement, which is additionally operable to that the read-write region carry after the abnormal document will be deleted, Reading field.
Optionally, the identification information of the security service application includes:The signature of the security service application;
The authenticating unit, is used for:Judge whether the signature is consistent with the preset signature that the security service is applied;If The signature is consistent with the preset signature, and authentication passes through;If the signature and inconsistent, the failed authentication of the preset signature.
Optionally, the identification information of the security service application includes:The signature and function power of the security service application Limit;
The authenticating unit, is used for:Judge the signature and the security service application stored in the operating system Preset signature it is whether consistent, and whether the function privilege consistent with authorized function privilege;If it is described signature with it is described Preset signature is consistent and the function privilege is consistent with the function privilege being authorized to, and authentication passes through;If it is described signature with it is described pre- Put inconsistent signature or the function privilege and authorized function privilege is inconsistent, failed authentication.
Optionally, described device also includes:
Path judging unit, is deleted in read-only zones for responding the removal request in the franchise transfer service interface The abnormal document before, judge whether the store path of the abnormal document belongs to by the franchise transfer service interface Path can be deleted;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface performs response institute State the operation that removal request deletes the abnormal document in read-only zones;Can if the store path of the abnormal document is not belonging to Path is deleted, the franchise transfer service interface terminates the abnormal document in the response removal request deletion read-only zones Operation.
Optionally, the path of deleting includes at least one in following store path:
The store path of system boot operation code, the store path of configuration file, system software in the operating system Store path and system software data store path.
Optionally, described device also includes:
Type judging unit, is deleted in read-only zones for responding the removal request in the franchise transfer service interface The abnormal document before, whether the file type that the abnormal document is judged by the franchise transfer service interface is pre- If type;
If the file type of the abnormal document is preset kind, the franchise transfer service interface is performed to be deleted described in response Except the operation of the abnormal document in read-only zones is deleted in request;If the file type of the abnormal document is not default class Type, the franchise transfer service interface terminates the behaviour that the response removal request deletes the abnormal document in read-only zones Make.
Optionally, the preset kind is included with least one in Types Below:Installation package file, executable file, script File, word document and text.
Optionally, the abnormal document includes:Virus document and/or wooden horse file.
The technical scheme provided in the embodiment of the present application, has at least the following technical effects or advantages:
By setting franchise transfer service interface in the operating system of electronic equipment, the franchise transfer service interface has The deletion authority of file in read-only zones is deleted, the request that security service application is sent is received by the franchise transfer service interface The removal request of abnormal document and the identification information of security service application in read-only zones are deleted, and according to the safety clothes received The security service application that the identification information pair of business application sends removal request is authenticated, whether to judge removal request source It is legal, if authentication passes through, show that removal request source is legal, then the exception responded in removal request deletion read-only zones is literary Part, i.e., by security service apply with the cooperation of the franchise transfer service interface set in operating system, to delete read-only zones Interior abnormal document, it is to avoid abnormal document causes potential safety hazard to electronic equipment, is solved in the prior art because in read-only zones The larger technical problem of electronic equipments safety risk caused by abnormal document can not be deleted, improves peace during electronic equipment operation Quan Xing.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of data safety processing method according to an embodiment of the invention;
Fig. 2 shows a kind of structured flowchart of data safe processing device according to an embodiment of the invention;
Fig. 3 shows a kind of structured flowchart of mobile terminal according to an embodiment of the invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
The embodiments of the invention provide show a kind of data safety processing method according to an embodiment of the invention, dress Put and mobile terminal, there is the technical problem of larger security risk to solve electronic equipment in the prior art.
The embodiment of the present application provides a kind of data safety processing method, applied to an electronic equipment, and the electronic equipment can be with For PC, smart mobile phone, pad etc., set in the operating system of electronic equipment in franchise transfer service interface, the privilege Turning service interface has the operating right for deleting file in read-only zones.Specifically, can be by for franchise transfer service interface Authority and carry authority are deleted in configuration, to make the franchise transfer service interface have the operating rights for deleting file in read-only zones Limit, wherein carry authority refer to authority in an operating system to disk partition, have carry power in franchise transfer service interface In limited time, then abnormal document therein, Zai Jianggai areas can then be deleted by being read-write region by the temporary transient carry of read-only zones Domain carry returns original read-only zones, you can realize the deletion action to the file in read-only zones.
Fig. 1 is refer to, is configured in an operating system after good franchise transfer service interface, the data that the embodiment of the present application is provided Security processing performs following steps:
S11:The exception that franchise transfer service interface is received in the request deletion read-only zones that security service application is sent is literary The removal request of part and the identification information of security service application.
There is abnormal document in security service application scanning acquisition electronic equipment read-only zones in the electronic device includes During the files such as virus, wooden horse, applied by security service and send the removal request for deleting the abnormal document into operating system Privilege in converting interface, wherein, in removal request can comprising the store path of abnormal document, file type, file size, build The information such as between immediately.Simultaneously in order to ensure that the file in read-only zones is not deleted by mistake, the embodiment of the present application is also deleted in transmission please When asking, the identification information that security service is applied is sent into privilege converting interface, security service can be included in the identification information The information such as signature, the function privilege of application.Franchise transfer service interface receives removal request and the mark that security service application is sent Next step is performed after knowing information.
S12:Based on the identification information received, franchise transfer service interface is authenticated to security service application.
When the signature comprising security service application in the identification information received, it can be determined that the signature and the safety clothes Whether the preset signature for being engaged in applying is consistent, and the preset signature of security service application is prestored when can be security service application installation It is in an operating system or that operating system is obtained by network inquiry, generally inquire about corresponding security service application Official website obtains corresponding signature, to increase the reliability of preset signature.If judging the signature and preset signature in identification information Unanimously, then authentication passes through;If conversely, signature and inconsistent, the failed authentication of preset signature in identification information.
When the identification information received comprising security service apply signature and function privilege when, can by signature and The judgement of function privilege is authenticated.The judgement of signature is consistent with the above method, and the judgement of function privilege specifically judges mark Whether the function privilege in information is consistent using authorized function privilege with the security service.Under normal circumstances, security service Using when mounted, user will authorize to the function privilege that it is required, will not generally change after mandate, still, if receiving To the abnormal documents such as virus, wooden horse invasion when, it is possible to change its function privilege because of invasion, so, further to it Function privilege carries out judging that the security for deleting read-only zones file can be improved.If signature and preset signature in identification information Consistent and function privilege is consistent with authorized function privilege, and authentication passes through;If conversely, signature and preset label in identification information The inconsistent or function privilege of name and authorized function privilege are inconsistent, failed authentication.
S13:If security service weight discriminating passes through, franchise transfer service interface responds its removal request and deletes read-only zones Interior abnormal document.
It is that this can be with because franchise transfer service interface is configured with the deletion authority to file and the carry authority to disk Security service weight discriminating by when, first pass through its carry authority by ask delete file where read-only zones carry be Read-write region, then authority is deleted by it delete out of read-write region the abnormal document, finally by suppressing exception file Read-write region carry afterwards is read-only zones, and then realizes the deletion to only reading and writing abnormal document in region.
In specific implementation process, deleted or maliciously deleted, the application by mistake in order to avoid only reading and writing the file in region Embodiment also performs one or two following judgment step before the abnormal document of security service application request is deleted:
1., franchise transfer service interface, which judges whether the store path of abnormal document belongs to, can delete path.Wherein, it can delete Except path includes more than one following (including one) store path:The storage of system boot operation code in the operating system Path such as system/bin, configuration file store path such as system/xbin, system software store path such as system/ The app and store path of system software data such as system/priv-app/data.If the store path of abnormal document belongs to Path can be deleted, franchise transfer service interface performs the operation that response removal request deletes the abnormal document in read-only zones;Instead It, franchise transfer service interface terminates the operation that response removal request deletes the abnormal document in read-only zones, i.e., do not perform and delete Except the operation of abnormal document.
2., franchise transfer service interface judge the abnormal document of security service application request deletion file type whether be Preset kind.Wherein, preset kind includes more than one following (including one) type:The entitled .apk of installation package file such as suffix File, the entitled .exe of executable file such as suffix file, script file is as extended entitled .vbs, js, wsh, wsfapk The entitled .txt of file, word document and text such as suffix file.It should be noted that the embodiment of the present application is not limited The particular type of preset kind processed, preset kind can update with the variation of the abnormal documents such as virus, wooden horse.If abnormal document File type be preset kind, franchise transfer service interface performs the response removal request and deletes exception in read-only zones The operation of file;Conversely, franchise transfer service interface terminates the behaviour that response removal request deletes the abnormal document in read-only zones Make.
In above-described embodiment, by setting franchise transfer service interface in the operating system of electronic equipment, for the privilege The operating right of file in read-only zones is deleted in the configuration of transfer service interface, then receives safety by the franchise transfer service interface The removal request of abnormal document and the identification information of security service application in read-only zones are deleted in the request for being served by sending, and The security service application that the identification information pair applied according to the security service received sends removal request is authenticated, to judge Whether removal request source is legal, if authentication passes through, and shows that removal request source is legal, then responds removal request and delete only Abnormal document in reading field, i.e., the matching somebody with somebody using the franchise transfer service interface with being set in operating system by security service Close, to delete the abnormal document in read-only zones, it is to avoid abnormal document causes potential safety hazard to electronic equipment, solve existing skill In art because in read-only zones abnormal document can not delete caused by the larger technical problem of electronic equipments safety risk, improve electricity Security during sub- equipment operation.
Fig. 2 is refer to, the same inventive concept based on above-described embodiment, the embodiment of the present application is also corresponded to and provided, a kind of number According to secure processing device, the device sets franchise transfer service interface, the franchise transfer in the operating system of electronic equipment Service interface has the operating right for deleting file in read-only zones, and described device includes:
Receiving unit 21, for receiving the request deletion that security service application is sent by the franchise transfer service interface The removal request of abnormal document in read-only zones and the identification information of security service application;
Authenticating unit 22, for based on the identification information, by the franchise transfer service interface to the safety clothes Business application is authenticated;
Unit 23 is deleted, for when authenticating unit authentication passes through, being responded by the franchise transfer service interface The removal request deletes the abnormal document in read-only zones.
Wherein, the operating right includes:Deletion authority to file and the carry authority to the electronic equipment disk. The abnormal document includes:Virus document and/or wooden horse file.
In specific implementation process, the authenticating unit 22, including:Carry subelement and deletion subelement.Carry subelement, For in authenticating unit authentication by making, by the read-only zones carry be read-write region by the carry authority; Subelement is deleted, for deleting out of read-write region the abnormal document by the deletion authority;Carry is single It is the read-only zones that member, which is additionally operable to that the read-write region carry after the abnormal document will be deleted,.
As a kind of optional embodiment, the identification information of the security service application includes:The security service application Signature;The authenticating unit 22, specifically for:Judge it is described signature with the security service apply preset signature whether one Cause;If the signature is consistent with the preset signature, authentication passes through;If the signature and the preset signature are inconsistent, authentication Failure.
As an alternative embodiment, the identification information of the security service application includes:The security service should Signature and function privilege;The authenticating unit 22, specifically for:Judge what is stored in the signature and the operating system Whether the preset signature of the security service application is consistent, and whether the function privilege is consistent with authorized function privilege; If the signature is consistent with the preset signature and the function privilege and authorized function privilege are consistent, authentication passes through;If The signature and the preset signature be inconsistent or the function privilege and the function privilege that is authorized to it is inconsistent, failed authentication.
In specific implementation process, described device also includes:Path judging unit 24, in the franchise transfer service Interface is responded before the abnormal document that the removal request is deleted in read-only zones, passes through the franchise transfer service interface Path can be deleted by judging whether the store path of the abnormal document belongs to;If the store path of the abnormal document, which belongs to, to be deleted Except path, the franchise transfer service interface performs the abnormal document in the response removal request deletion read-only zones Operation;If the store path of the abnormal document is not belonging to that path can be deleted, the franchise transfer service interface terminates response institute State the operation that removal request deletes the abnormal document in read-only zones.Wherein, the path of deleting includes following storage At least one in path:The store path of system boot operation code in the operating system, the store path of configuration file, The store path of system software and the store path of system software data.
In specific implementation process, described device also includes:Type judging unit 25, in the franchise transfer service Interface is responded before the abnormal document that the removal request is deleted in read-only zones, passes through the franchise transfer service interface Whether the file type for judging the abnormal document is preset kind;If the file type of the abnormal document is preset kind, The franchise transfer service interface performs the operation that the response removal request deletes the abnormal document in read-only zones;If The file type of the abnormal document is not preset kind, and the franchise transfer service interface terminates the response removal request and deleted Except the operation of the abnormal document in read-only zones.Wherein, the preset kind is included with least one in Types Below:Peace Fill APMB package, executable file, script file, word document and text.
On the device in above-described embodiment, wherein unit performs the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
The technical scheme provided in the embodiment of the present application, has at least the following technical effects or advantages:
According to a kind of data safety processing method of the present invention, by being set in the operating system of electronic equipment in privilege Turn service interface, delete the operating right of file in read-only zones for the franchise transfer service interface configuration, then pass through the privilege Transfer service interface receives the removal request and safety of abnormal document in the request deletion read-only zones that security service application is sent The identification information being served by, and the identification information pair applied according to the security service received sends the safety clothes of removal request Business application is authenticated, to judge whether removal request source is legal, if authentication passes through, shows the conjunction of removal request source Method, then respond the abnormal document in removal request deletion read-only zones, i.e., applied and set in operating system by security service Franchise transfer service interface cooperation, to delete the abnormal document in read-only zones, it is to avoid abnormal document is made to electronic equipment Into potential safety hazard, solve in the prior art because in read-only zones abnormal document can not delete caused by electronic equipments safety risk Larger technical problem, improves security during electronic equipment operation.
The embodiment of the present invention additionally provides a kind of mobile terminal, as shown in figure 3, for convenience of description, illustrate only and this The related part of inventive embodiments, particular technique details is not disclosed, refer to present invention method part.The terminal can Think including mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point Of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is mobile phone as an example:
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.With reference to figure 3, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 310, memory 320, input block 330, display unit 340, Sensor 350, voicefrequency circuit 360, Wireless Fidelity (wireless-fidelity, Wi-Fi) module 370, processor 380 and The grade part of power supply 390.It will be understood by those skilled in the art that the handset structure shown in Fig. 3 does not constitute the restriction to mobile phone, It can include than illustrating more or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 3:
RF circuits 310 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, handled to processor 380;In addition, being sent to base station by up data are designed.Generally, RF circuits 310 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 310 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 320 can be used for storage software program and module, and processor 380 is stored in memory 320 by operation Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 320 can include height Fast random access memory, can also include nonvolatile memory, for example, at least one disk memory, flush memory device, Or other volatile solid-state parts.
Input block 330 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 330 may include that contact panel 331 and other inputs are set Standby 332.Contact panel 331, also referred to as touch-screen, collecting touch operation of the user on or near it, (such as user uses The operation of any suitable object such as finger, stylus or annex on contact panel 331 or near contact panel 331), and root Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 331 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation is brought, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 380, and the order sent of reception processing device 380 and can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 331.Except contact panel 331, input Unit 330 can also include other input equipments 332.Specifically, other input equipments 332 can include but is not limited to secondary or physical bond One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 340 can be used for the various of the information that is inputted by user of display or the information for being supplied to user and mobile phone Menu.Display unit 340 may include display panel 341, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 341.Further, contact panel 331 can cover display panel 341, when contact panel 331 is detected thereon or attached After near touch operation, processor 380 is sent to determine the type of touch event, with preprocessor 380 according to touch event Type corresponding visual output is provided on display panel 341.Although in figure 3, contact panel 331 and display panel 341 It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control Panel 331 and the input that is integrated and realizing mobile phone of display panel 341 and output function.
Mobile phone may also include at least one sensor 350, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 341, proximity transducer can close display panel 341 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) acceleration Size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 360, loudspeaker 361, microphone 362 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data received conversion can be transferred to loudspeaker 361, sound is converted to by loudspeaker 361 by road 360 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 362, by voicefrequency circuit 360 receive after turn It is changed to voice data, then after voice data output processor 380 is handled, through RF circuits 310 to be sent to such as another mobile phone, Or export voice data to memory 320 so as to further processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 370 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 3 is shown WiFi module 370, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 380 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform and be stored in software program and/or module in memory 320, and call and be stored in memory 320 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 380 can be wrapped Include one or more processing units;It is preferred that, processor 380 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly handled with processor, modem processor mainly handles radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 380.
Mobile phone also includes the power supply 390 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 380 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiments of the present invention, the processor 380 included by the terminal performs one or more than one program bag contains For the instruction operated below:
Franchise transfer service interface receives the abnormal document in the request deletion read-only zones that security service application is sent Removal request and the identification information of security service application, wherein, the franchise transfer service interface, which has, deletes read-only region The operating right of file in domain;Based on the identification information, the franchise transfer service interface enters to the security service application Row authentication;If authentication passes through, the franchise transfer service interface responds the removal request and deletes described different in read-only zones Normal file.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place is provided, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself All as the separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can or similar purpose identical, equivalent by offer alternative features come generation Replace.
Although in addition, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments Including some features rather than further feature, but not the combination of the feature of be the same as Example mean be in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it One mode can use in any combination.
The present invention all parts embodiment can be realized with hardware, or with one or more processor run Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) are realized in gateway according to embodiments of the present invention, proxy server, system Some or all parts some or all functions.The present invention is also implemented as being used to perform side as described herein The some or all equipment or program of device (for example, computer program and computer program product) of method.It is such Realizing the program of the present invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from internet website and obtained, and either be provided or with any other shape on carrier signal Formula is provided.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and coming real by means of properly programmed computer It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
The invention discloses, A1, a kind of data safety processing method, wherein, set in the operating system of electronic equipment Franchise transfer service interface, the franchise transfer service interface has the operating right for deleting file in read-only zones, the side Method includes:
The exception that the franchise transfer service interface is received in the request deletion read-only zones that security service application is sent is literary The removal request of part and the identification information of security service application;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the franchise transfer service interface responds the removal request and deletes described different in read-only zones Normal file.
A2, the method according to A1, wherein, the operating right includes:
Deletion authority to file and the carry authority to the electronic equipment disk.
A3, the method according to A2, wherein, if the authentication passes through, the franchise transfer service interface response is described Removal request deletes the abnormal document in read-only zones, including:
If authentication passes through, the franchise transfer service interface responds the removal request, by the carry authority by institute Read-only zones carry is stated for read-write region, is deleted out of read-write region the abnormal document by the deletion authority, It is the read-only zones that the read-write region carry after the abnormal document, which will be deleted,.
A4, the method according to A1, wherein, the identification information of the security service application includes:The security service The signature of application;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application, Including:
Judge whether the signature is consistent with the preset signature that the security service is applied;
If the signature is consistent with the preset signature, authentication passes through;If the signature and the preset signature are inconsistent, Failed authentication.
A5, the method according to A1, wherein, the identification information of the security service application includes:The security service The signature and function privilege of application;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application, Including:
Judge whether the preset signature of security service application of the signature with being stored in the operating system is consistent, And whether the function privilege is consistent with authorized function privilege;
If the signature is consistent with the preset signature and the function privilege and authorized function privilege are consistent, authentication Pass through;If the signature and the preset signature be inconsistent or the function privilege is inconsistent with the function privilege that is authorized to, reflect Power failure.
A6, the method according to any one of A1~A5, wherein, deleted described in the franchise transfer service interface response Deleted except request before the abnormal document in read-only zones, methods described also includes:
The franchise transfer service interface, which judges whether the store path of the abnormal document belongs to, can delete path;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface performs response institute State the operation that removal request deletes the abnormal document in read-only zones;
If the store path of the abnormal document is not belonging to that path can be deleted, the franchise transfer service interface terminates response The removal request deletes the operation of the abnormal document in read-only zones.
A7, the method according to A6, wherein, the path of deleting includes at least one in following store path:
The store path of system boot operation code, the store path of configuration file, system software in the operating system Store path and system software data store path.
A8, the method according to any one of A1~A5, wherein, in the franchise transfer service interface response deletion Request is deleted before the abnormal document in read-only zones, and methods described also includes:
The franchise transfer service interface judges whether the file type of the abnormal document is preset kind;
If the file type of the abnormal document is preset kind, the franchise transfer service interface performs the response institute State the operation that removal request deletes the abnormal document in read-only zones;
If the file type of the abnormal document is not preset kind, the franchise transfer service interface terminates the response The removal request deletes the operation of the abnormal document in read-only zones.
A9, the method according to A8, wherein, the preset kind is included with least one of Types Below:Installation kit text Part, executable file, script file, word document and text.
A10, the method according to any one of A1~A5, wherein, the abnormal document includes virus document and/or wooden horse File.
The invention also discloses, B11, a kind of data safe processing device, wherein, operation system of the device in electronic equipment Franchise transfer service interface is set in system, and the franchise transfer service interface has the operating rights for deleting file in read-only zones Limit, described device includes:
Receiving unit, for receiving the request deletion that security service application is sent by the franchise transfer service interface The removal request of abnormal document in reading field and the identification information of security service application;
Authenticating unit, for based on the identification information, by the franchise transfer service interface to the security service Using being authenticated;
Unit is deleted, for when authenticating unit authentication passes through, institute to be responded by the franchise transfer service interface State the abnormal document in removal request deletion read-only zones.
B12, the device according to B11, wherein, the operating right includes:
Deletion authority to file and the carry authority to the electronic equipment disk.
B13, the device according to B12, wherein, the authenticating unit, including:
Carry subelement, in authenticating unit authentication by making, by the carry authority by the read-only region Domain carry is read-write region;
Subelement is deleted, for deleting out of read-write region the abnormal document by the deletion authority;
It is described that the carry subelement, which is additionally operable to that the read-write region carry after the abnormal document will be deleted, Reading field.
B14, the device according to B11, wherein, the identification information of the security service application includes:The safety clothes The signature of business application;
The authenticating unit, is used for:Judge whether the signature is consistent with the preset signature that the security service is applied;If The signature is consistent with the preset signature, and authentication passes through;If the signature and inconsistent, the failed authentication of the preset signature.
B15, the device according to B11, wherein, the identification information of the security service application includes:The safety clothes The signature and function privilege of business application;
The authenticating unit, is used for:Judge the signature and the security service application stored in the operating system Preset signature it is whether consistent, and whether the function privilege consistent with authorized function privilege;If it is described signature with it is described Preset signature is consistent and the function privilege is consistent with the function privilege being authorized to, and authentication passes through;If it is described signature with it is described pre- Put inconsistent signature or the function privilege and authorized function privilege is inconsistent, failed authentication.
B16, the device according to any one of B11~B15, wherein, described device also includes:
Path judging unit, is deleted in read-only zones for responding the removal request in the franchise transfer service interface The abnormal document before, judge whether the store path of the abnormal document belongs to by the franchise transfer service interface Path can be deleted;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface performs response institute State the operation that removal request deletes the abnormal document in read-only zones;Can if the store path of the abnormal document is not belonging to Path is deleted, the franchise transfer service interface terminates the abnormal document in the response removal request deletion read-only zones Operation.
B17, the device according to B16, wherein, the path of deleting includes at least one in following store path It is individual:
The store path of system boot operation code, the store path of configuration file, system software in the operating system Store path and system software data store path.
B18, the device according to any one of B11~B15, wherein, described device also includes:
Type judging unit, is deleted in read-only zones for responding the removal request in the franchise transfer service interface The abnormal document before, whether the file type that the abnormal document is judged by the franchise transfer service interface is pre- If type;
If the file type of the abnormal document is preset kind, the franchise transfer service interface is performed to be deleted described in response Except the operation of the abnormal document in read-only zones is deleted in request;If the file type of the abnormal document is not default class Type, the franchise transfer service interface terminates the behaviour that the response removal request deletes the abnormal document in read-only zones Make.
B19, the device according to B18, wherein, the preset kind is included with least one in Types Below:Install APMB package, executable file, script file, word document and text.
20th, the device according to any one of B11~15, wherein, the abnormal document includes:Virus document and/or wood Marvin's part.
The invention also discloses, C21, a kind of mobile terminal, wherein, including processor and memory;The memory is used In storage one or more than one program;The processor is used to perform one or more than one program bag containing use In the instruction for carrying out following operation:
Franchise transfer service interface receives the abnormal document in the request deletion read-only zones that security service application is sent Removal request and the identification information of security service application, wherein, the franchise transfer service interface, which has, deletes read-only region The operating right of file in domain;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the franchise transfer service interface responds the removal request and deletes described different in read-only zones Normal file.

Claims (10)

1. a kind of data safety processing method, it is characterised in that franchise transfer service is set in the operating system of electronic equipment Interface, the franchise transfer service interface has the operating right for deleting file in read-only zones, and methods described includes:
The franchise transfer service interface receives the abnormal document in the request deletion read-only zones that security service application is sent Removal request and the identification information of security service application;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the exception that the franchise transfer service interface is responded in the removal request deletion read-only zones is literary Part.
2. the method as described in claim 1, it is characterised in that the operating right includes:
Deletion authority to file and the carry authority to the electronic equipment disk.
3. method as claimed in claim 2, it is characterised in that if the authentication passes through, the franchise transfer service interface rings The removal request is answered to delete the abnormal document in read-only zones, including:
If authentication passes through, the franchise transfer service interface responds the removal request, will be described by the carry authority Reading field carry is read-write region, deletes out of read-write region the abnormal document by the deletion authority, will delete Except the read-write region carry after the abnormal document is the read-only zones.
4. the method as described in claim 1, it is characterised in that the identification information of the security service application includes:The peace The signature being served by entirely;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application, including:
Judge whether the signature is consistent with the preset signature that the security service is applied;
If the signature is consistent with the preset signature, authentication passes through;If the signature and the preset signature are inconsistent, authentication Failure.
5. the method as described in claim 1, it is characterised in that the identification information of the security service application includes:The peace The signature and function privilege being served by entirely;
Described to be based on the identification information, the franchise transfer service interface is authenticated to the security service application, including:
Judge whether the preset signature of security service application of the signature with being stored in the operating system is consistent, and institute Whether consistent with authorized function privilege state function privilege;
If the signature is consistent with the preset signature and the function privilege and authorized function privilege are consistent, authentication is logical Cross;If the signature and the preset signature be inconsistent or the function privilege is inconsistent with the function privilege that is authorized to, authenticate Failure.
6. such as method according to any one of claims 1 to 5, it is characterised in that responded in the franchise transfer service interface The removal request is deleted before the abnormal document in read-only zones, and methods described also includes:
The franchise transfer service interface, which judges whether the store path of the abnormal document belongs to, can delete path;
If the store path of the abnormal document, which belongs to, can delete path, the franchise transfer service interface is performed to be deleted described in response Except the operation of the abnormal document in read-only zones is deleted in request;
If the store path of the abnormal document is not belonging to that path can be deleted, it is described that the franchise transfer service interface terminates response Removal request deletes the operation of the abnormal document in read-only zones.
7. method as claimed in claim 6, it is characterised in that the path of deleting is included in following store path at least One:
The store path of system boot operation code in the operating system, the store path of configuration file, system software are deposited Store up the store path of path and system software data.
8. the method as described in any one of Claims 1 to 5, it is characterised in that in the franchise transfer service interface response institute State before the abnormal document that removal request is deleted in read-only zones, methods described also includes:
The franchise transfer service interface judges whether the file type of the abnormal document is preset kind;
If the file type of the abnormal document is preset kind, the franchise transfer service interface is performed to be deleted described in the response Except the operation of the abnormal document in read-only zones is deleted in request;
If the file type of the abnormal document is not preset kind, the franchise transfer service interface is terminated described in the response Removal request deletes the operation of the abnormal document in read-only zones.
9. a kind of data safe processing device, it is characterised in that the device is set in the operating system of electronic equipment in privilege Turn service interface, the franchise transfer service interface has the operating right for deleting file in read-only zones, and described device includes:
Receiving unit, for receiving the request deletion read-only region that security service application is sent by the franchise transfer service interface The removal request of abnormal document in domain and the identification information of security service application;
Authenticating unit, for based on the identification information, by the franchise transfer service interface to the security service application Authenticated;
Unit is deleted, for when authenticating unit authentication passes through, by being deleted described in the franchise transfer service interface response Except the abnormal document in read-only zones is deleted in request.
10. a kind of mobile terminal, it is characterised in that including processor and memory;The memory be used for store one or More than one program;The processor is used to perform one or more than one program bag containing for carrying out following operation Instruction:
Franchise transfer service interface receives the deletion of the abnormal document in the request deletion read-only zones that security service application is sent Request and the identification information of security service application, wherein, the franchise transfer service interface, which has, to be deleted in read-only zones The operating right of file;
Based on the identification information, the franchise transfer service interface is authenticated to the security service application;
If authentication passes through, the exception that the franchise transfer service interface is responded in the removal request deletion read-only zones is literary Part.
CN201710221966.1A 2017-04-06 2017-04-06 Data security processing method and device and mobile terminal Active CN107153792B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710221966.1A CN107153792B (en) 2017-04-06 2017-04-06 Data security processing method and device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710221966.1A CN107153792B (en) 2017-04-06 2017-04-06 Data security processing method and device and mobile terminal

Publications (2)

Publication Number Publication Date
CN107153792A true CN107153792A (en) 2017-09-12
CN107153792B CN107153792B (en) 2020-07-24

Family

ID=59794006

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710221966.1A Active CN107153792B (en) 2017-04-06 2017-04-06 Data security processing method and device and mobile terminal

Country Status (1)

Country Link
CN (1) CN107153792B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681594A (en) * 2018-05-16 2018-10-19 Oppo广东移动通信有限公司 Document handling method and relevant apparatus
CN109739799A (en) * 2018-12-29 2019-05-10 深圳市优必选科技有限公司 Data interactive method, heterogeneous multi-nucleus processor and the terminal of heterogeneous multi-nucleus processor
CN110941812A (en) * 2019-10-23 2020-03-31 天津智融创新科技发展有限公司 Privileged function calling method and system
CN111566632A (en) * 2018-09-29 2020-08-21 华为技术有限公司 Operation control method and electronic equipment
WO2021022729A1 (en) * 2019-08-06 2021-02-11 惠州Tcl移动通信有限公司 Root permission assignment method and apparatus, storage medium, and terminal device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414329A (en) * 2007-10-15 2009-04-22 北京瑞星国际软件有限公司 Method for deleting in-service virus
CN102768717A (en) * 2012-06-29 2012-11-07 腾讯科技(深圳)有限公司 Malicious file detection method and malicious file detection device
CN102855435A (en) * 2011-06-27 2013-01-02 奇智软件(北京)有限公司 File unlocking and shredding method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414329A (en) * 2007-10-15 2009-04-22 北京瑞星国际软件有限公司 Method for deleting in-service virus
CN102855435A (en) * 2011-06-27 2013-01-02 奇智软件(北京)有限公司 File unlocking and shredding method and device
CN102768717A (en) * 2012-06-29 2012-11-07 腾讯科技(深圳)有限公司 Malicious file detection method and malicious file detection device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
AB6326795: "Android使用mount挂载/system/app为读写权限,删除或替换***应用", 《HTTPS://BLOG.CSDN.NET/TABACTIVITY/ARTICLE/DETAILS/12629873》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681594A (en) * 2018-05-16 2018-10-19 Oppo广东移动通信有限公司 Document handling method and relevant apparatus
CN111566632A (en) * 2018-09-29 2020-08-21 华为技术有限公司 Operation control method and electronic equipment
CN111566632B (en) * 2018-09-29 2023-11-03 华为技术有限公司 Operation control method and electronic equipment
CN109739799A (en) * 2018-12-29 2019-05-10 深圳市优必选科技有限公司 Data interactive method, heterogeneous multi-nucleus processor and the terminal of heterogeneous multi-nucleus processor
WO2021022729A1 (en) * 2019-08-06 2021-02-11 惠州Tcl移动通信有限公司 Root permission assignment method and apparatus, storage medium, and terminal device
CN110941812A (en) * 2019-10-23 2020-03-31 天津智融创新科技发展有限公司 Privileged function calling method and system

Also Published As

Publication number Publication date
CN107153792B (en) 2020-07-24

Similar Documents

Publication Publication Date Title
CN104125216B (en) A kind of method, system and terminal for lifting credible performing environment security
CN107153792A (en) A kind of data safety processing method, device and mobile terminal
CN104134034B (en) Control the method and apparatus that application runs
WO2017211205A1 (en) Method and device for updating whitelist
CN106341809B (en) A kind of data transmission method and equipment
CN106570358A (en) Method and device for setting application permissions
CN106960155A (en) The update method and device of a kind of basic input output system
CN106534324A (en) Data sharing method and cloud server
CN106843868A (en) Method, device and mobile terminal that a kind of many accounts are logged in
CN110941821A (en) Data processing method, device and storage medium
CN106056001A (en) Private data protection method and apparatus based on mobile terminal and mobile terminal
CN108604281A (en) The method and its terminal of data processing
CN107219951A (en) Touch screen control method, device, storage medium and terminal device
CN106550361A (en) A kind of data transmission method and equipment
CN109873794A (en) A kind of means of defence and server of Denial of Service attack
CN109687974A (en) APK verification method, device, mobile terminal and readable storage medium storing program for executing
CN106534093A (en) Terminal data processing method, device and system
CN108549826A (en) Method of calibration, terminal, server and the readable storage medium storing program for executing of application program
CN104104656A (en) Account retrieving method and device
CN106959859A (en) The call method and device of system call function
CN104573437A (en) Information authentication method, device and terminal
CN106302603A (en) The method and apparatus remotely deleting information
CN107066324A (en) A kind of control method and equipment of finger prints processing resource
CN106713319B (en) Remote control method, device and system between terminals and mobile terminal
CN106203143A (en) Method, device and the mobile terminal of a kind of application program locking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant