Nothing Special   »   [go: up one dir, main page]

CN104243690A - Method for localizing and safely storing mobile application data - Google Patents

Method for localizing and safely storing mobile application data Download PDF

Info

Publication number
CN104243690A
CN104243690A CN201410375061.6A CN201410375061A CN104243690A CN 104243690 A CN104243690 A CN 104243690A CN 201410375061 A CN201410375061 A CN 201410375061A CN 104243690 A CN104243690 A CN 104243690A
Authority
CN
China
Prior art keywords
data
mobile phone
met
cell
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410375061.6A
Other languages
Chinese (zh)
Inventor
李昌敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DONGGUAN FUXIN COMPUTER TECHNOLOGY Co Ltd
Original Assignee
DONGGUAN FUXIN COMPUTER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DONGGUAN FUXIN COMPUTER TECHNOLOGY Co Ltd filed Critical DONGGUAN FUXIN COMPUTER TECHNOLOGY Co Ltd
Priority to CN201410375061.6A priority Critical patent/CN104243690A/en
Publication of CN104243690A publication Critical patent/CN104243690A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method for localizing and safely storing mobile application data. The method comprises the following steps that first, encryption is conducted, a program client side is installed in a mobile phone, a user uses the client side to send an instruction to a backstage server, confidential data are received from the backstage server and stored into the client side in the mobile phone, the client side in the mobile phone automatically conducts triple encryption, and the data are stored into a database of the mobile phone; second, decryption is conducted, wherein the client side in the mobile phone sends a data request to a mobile phone server, and the mobile phone server conducts triple decryption and displays the confidential data at the client side in the mobile phone; third, data decryption or elimination is conducted. The method for localizing and safely storing the mobile application data can solve the problem that the confidential data are leaked due to the fact that the mobile phone is lost by a user or stolen.

Description

A kind of method of Mobile solution data localization safe storage
Technical field
The present invention relates to technical field of data storage, be specifically related to the method for a kind of Mobile solution data localization safe storage.
Background technology
Mobile solution data store following two kinds of patterns usually, first, and WEB pattern; Advantage: data do not need to download, and real-time property is strong is also a kind of mode of application software selection mostly at present.Shortcoming: to the region of poor signal, impact uses, and result of use is not good enough;
Secondly, data localization; Advantage: can use anywhere, has nothing to do with signal.Shortcoming: Information Security is subject to matter and coagulates.
Summary of the invention
For the deficiencies in the prior art, the object of this invention is to provide the method for a kind of Mobile solution data localization safe storage, it solve these above-mentioned problems.
The technical solution adopted in the present invention is as follows: a kind of method of Mobile solution data localization safe storage,
Comprise the steps:
The first step, encryption, mobile phone installation procedure client, user uses client to send instruction to background server, and from background server receiver ciphertext data to cell-phone customer terminal, cell-phone customer terminal carries out three re-encryptions automatically, and data are stored into mobile phone database;
Second step, deciphering, cell-phone customer terminal sends request of data to handset server, and handset server is through triple deciphering, and confidential data shows at cell-phone customer terminal;
3rd step, data deciphering or removing step, first, program starts, detection of handset card number, if do not met, then starts the request of clearing data and judges, if do not removed, then quit a program; If met, then enter mobile phone IMEI and detect, if do not met, then start the request of clearing data and judge, then start the request of clearing data and judge, if do not removed, then quit a program; If met, then detect user name with cell-phone customer terminal, if service end does not have this user name, then start the request of clearing data and judge, if do not removed, then quit a program, if met, then start data deciphering and read.
Beneficial effect of the present invention comprises:
The problem that confidential data that personnel and these reasons of hand-set from stolen cause exposes can be solved.
Accompanying drawing explanation
Fig. 1 is the encryption flow figure of the method for a kind of Mobile solution data localization of the present invention safe storage;
Fig. 2 is the deciphering flow chart of the method for a kind of Mobile solution data localization of the present invention safe storage;
Fig. 3 is the data deciphering of the method for a kind of Mobile solution data localization of the present invention safe storage or removes flow chart.
Embodiment
Below in conjunction with embodiment, the present invention is described in detail.
A method for Mobile solution data localization safe storage, as Figure 1-3,
Comprise the steps:
The first step, encryption, mobile phone installation procedure client, user uses client to send instruction to background server, and from background server receiver ciphertext data to cell-phone customer terminal, cell-phone customer terminal carries out three re-encryptions automatically, and data are stored into mobile phone database;
Second step, deciphering, cell-phone customer terminal sends request of data to handset server, and handset server is through triple deciphering, and confidential data shows at cell-phone customer terminal;
3rd step, data deciphering or removing step, first, program starts, detection of handset card number, if do not met, then starts the request of clearing data and judges, if do not removed, then quit a program; If met, then enter mobile phone IMEI and detect, if do not met, then start the request of clearing data and judge, then start the request of clearing data and judge, if do not removed, then quit a program; If met, then detect user name with cell-phone customer terminal, if service end does not have this user name, then start the request of clearing data and judge, if do not removed, then quit a program, if met, then start data deciphering and read.
Embodiment:
1, each not in tables of data arranges all needs to be keep secret, and just crucial data need encryption, as the price of product, the phone of client, address, therefore, below encryption is tightly encrypted for sensitive items, need not encrypt, to promote operation efficiency to non-sensitive project.
2, unique number of the mobile phone card number of mobile phone, handset identity number and data is obtained by APP, three re-encryptions are carried out to data, and different key assignments encryptions is carried out in each provisional capital, effectively improves the difficulty of deciphering, stop factor data bank file stolen and relate to dew data, see Fig. 1,2.
3, to the data after encryption, must be decrypted by APP, if inconsistent with former encryption key during deciphering, can only mess code be seen.Therefore, user is more after new cell-phone or Mobile phone card, and data cannot normally be deciphered, and by data copy on computer or miscellaneous equipment, also cannot see normal data, see Fig. 3.
4, send data scrubbing instruction by backstage to mobile phone A PP, the data on mobile phone can being cleared up, for preventing device losses from causing data to relate to dew, providing last salvo, see Fig. 3.
Above-mentioned execution mode is the preferred embodiments of the present invention; be not for limiting enforcement of the present invention and interest field; all equivalences made according to the content described in the present patent application scope of patent protection change and modify, and all should be included in the present patent application the scope of the claims.

Claims (1)

1. a method for Mobile solution data localization safe storage, is characterized in that,
Comprise the steps:
The first step, encryption, mobile phone installation procedure client, user uses client to send instruction to background server, and from background server receiver ciphertext data to cell-phone customer terminal, cell-phone customer terminal carries out three re-encryptions automatically, and data are stored into mobile phone database;
Second step, deciphering, cell-phone customer terminal sends request of data to handset server, and handset server is through triple deciphering, and confidential data shows at cell-phone customer terminal;
3rd step, data deciphering or removing step, first, program starts, detection of handset card number, if do not met, then starts the request of clearing data and judges, if do not removed, then quit a program; If met, then enter mobile phone IMEI and detect, if do not met, then start the request of clearing data and judge, then start the request of clearing data and judge, if do not removed, then quit a program; If met, then detect user name with cell-phone customer terminal, if service end does not have this user name, then start the request of clearing data and judge, if do not removed, then quit a program, if met, then start data deciphering and read.
CN201410375061.6A 2014-07-31 2014-07-31 Method for localizing and safely storing mobile application data Pending CN104243690A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410375061.6A CN104243690A (en) 2014-07-31 2014-07-31 Method for localizing and safely storing mobile application data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410375061.6A CN104243690A (en) 2014-07-31 2014-07-31 Method for localizing and safely storing mobile application data

Publications (1)

Publication Number Publication Date
CN104243690A true CN104243690A (en) 2014-12-24

Family

ID=52231005

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410375061.6A Pending CN104243690A (en) 2014-07-31 2014-07-31 Method for localizing and safely storing mobile application data

Country Status (1)

Country Link
CN (1) CN104243690A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279406A (en) * 2015-10-29 2016-01-27 东莞酷派软件技术有限公司 Method and device of application data safe access

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012110696A1 (en) * 2011-02-15 2012-08-23 P2S Media Group Oy Quarantine method for sellable virtual goods
CN102801730A (en) * 2012-08-16 2012-11-28 厦门市美亚柏科信息股份有限公司 Information protection method and device for communication and portable devices
CN103259651A (en) * 2013-05-30 2013-08-21 成都欣知科技有限公司 Encryption and decryption method and system of terminal data
CN103929743A (en) * 2014-04-28 2014-07-16 深圳市杰瑞特科技有限公司 Method for encrypting transmission data of intelligent mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012110696A1 (en) * 2011-02-15 2012-08-23 P2S Media Group Oy Quarantine method for sellable virtual goods
CN102801730A (en) * 2012-08-16 2012-11-28 厦门市美亚柏科信息股份有限公司 Information protection method and device for communication and portable devices
CN103259651A (en) * 2013-05-30 2013-08-21 成都欣知科技有限公司 Encryption and decryption method and system of terminal data
CN103929743A (en) * 2014-04-28 2014-07-16 深圳市杰瑞特科技有限公司 Method for encrypting transmission data of intelligent mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279406A (en) * 2015-10-29 2016-01-27 东莞酷派软件技术有限公司 Method and device of application data safe access
CN105279406B (en) * 2015-10-29 2018-07-27 东莞酷派软件技术有限公司 A kind of method and device using Data Access Security

Similar Documents

Publication Publication Date Title
CN110798315B (en) Data processing method and device based on block chain and terminal
CN109564598B (en) Terminal detection method and terminal
CN100495421C (en) Authentication protection method based on USB device
CN102136048B (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
CN106937274A (en) A kind of Profile changing methods and device based on EUICC
CN104751036A (en) Computer information security system
CN104318286B (en) Management method, management system and the terminal of NFC label data
CN103634482A (en) Safety protecting method for application software of portable intelligent equipment
CN102647279B (en) Encryption method, encrypted card, terminal equipment and interlocking of phone and card device
CN102831359A (en) Encryption file system of portable mobile storage device
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN102866960A (en) Method for realizing encryption in storage card, decrypting method and device
CN102495983A (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN108667784B (en) System and method for protecting internet identity card verification information
CN105678174A (en) Method for decrypting WeChat encrypted data based on binary system
CN104796262B (en) Data ciphering method and terminal system
CN104936172A (en) Beidou positioning data transmission encryption system
CN103902922A (en) Method and system for preventing file from being stolen
CN104243690A (en) Method for localizing and safely storing mobile application data
CN108696517A (en) A kind of safe communication method, the apparatus and system of unmanned vehicle information
CN107634958A (en) Computer security login method and computer security entering device
CN102647277A (en) Password protection method based on position information
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal
WO2009004590A3 (en) Method, apparatus, system and computer program for key parameter provisioning
CN106656492A (en) Key migration method and device for TPM (Trusted Platform Module) chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141224