CN104243690A - Method for localizing and safely storing mobile application data - Google Patents
Method for localizing and safely storing mobile application data Download PDFInfo
- Publication number
- CN104243690A CN104243690A CN201410375061.6A CN201410375061A CN104243690A CN 104243690 A CN104243690 A CN 104243690A CN 201410375061 A CN201410375061 A CN 201410375061A CN 104243690 A CN104243690 A CN 104243690A
- Authority
- CN
- China
- Prior art keywords
- data
- mobile phone
- met
- cell
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method for localizing and safely storing mobile application data. The method comprises the following steps that first, encryption is conducted, a program client side is installed in a mobile phone, a user uses the client side to send an instruction to a backstage server, confidential data are received from the backstage server and stored into the client side in the mobile phone, the client side in the mobile phone automatically conducts triple encryption, and the data are stored into a database of the mobile phone; second, decryption is conducted, wherein the client side in the mobile phone sends a data request to a mobile phone server, and the mobile phone server conducts triple decryption and displays the confidential data at the client side in the mobile phone; third, data decryption or elimination is conducted. The method for localizing and safely storing the mobile application data can solve the problem that the confidential data are leaked due to the fact that the mobile phone is lost by a user or stolen.
Description
Technical field
The present invention relates to technical field of data storage, be specifically related to the method for a kind of Mobile solution data localization safe storage.
Background technology
Mobile solution data store following two kinds of patterns usually, first, and WEB pattern; Advantage: data do not need to download, and real-time property is strong is also a kind of mode of application software selection mostly at present.Shortcoming: to the region of poor signal, impact uses, and result of use is not good enough;
Secondly, data localization; Advantage: can use anywhere, has nothing to do with signal.Shortcoming: Information Security is subject to matter and coagulates.
Summary of the invention
For the deficiencies in the prior art, the object of this invention is to provide the method for a kind of Mobile solution data localization safe storage, it solve these above-mentioned problems.
The technical solution adopted in the present invention is as follows: a kind of method of Mobile solution data localization safe storage,
Comprise the steps:
The first step, encryption, mobile phone installation procedure client, user uses client to send instruction to background server, and from background server receiver ciphertext data to cell-phone customer terminal, cell-phone customer terminal carries out three re-encryptions automatically, and data are stored into mobile phone database;
Second step, deciphering, cell-phone customer terminal sends request of data to handset server, and handset server is through triple deciphering, and confidential data shows at cell-phone customer terminal;
3rd step, data deciphering or removing step, first, program starts, detection of handset card number, if do not met, then starts the request of clearing data and judges, if do not removed, then quit a program; If met, then enter mobile phone IMEI and detect, if do not met, then start the request of clearing data and judge, then start the request of clearing data and judge, if do not removed, then quit a program; If met, then detect user name with cell-phone customer terminal, if service end does not have this user name, then start the request of clearing data and judge, if do not removed, then quit a program, if met, then start data deciphering and read.
Beneficial effect of the present invention comprises:
The problem that confidential data that personnel and these reasons of hand-set from stolen cause exposes can be solved.
Accompanying drawing explanation
Fig. 1 is the encryption flow figure of the method for a kind of Mobile solution data localization of the present invention safe storage;
Fig. 2 is the deciphering flow chart of the method for a kind of Mobile solution data localization of the present invention safe storage;
Fig. 3 is the data deciphering of the method for a kind of Mobile solution data localization of the present invention safe storage or removes flow chart.
Embodiment
Below in conjunction with embodiment, the present invention is described in detail.
A method for Mobile solution data localization safe storage, as Figure 1-3,
Comprise the steps:
The first step, encryption, mobile phone installation procedure client, user uses client to send instruction to background server, and from background server receiver ciphertext data to cell-phone customer terminal, cell-phone customer terminal carries out three re-encryptions automatically, and data are stored into mobile phone database;
Second step, deciphering, cell-phone customer terminal sends request of data to handset server, and handset server is through triple deciphering, and confidential data shows at cell-phone customer terminal;
3rd step, data deciphering or removing step, first, program starts, detection of handset card number, if do not met, then starts the request of clearing data and judges, if do not removed, then quit a program; If met, then enter mobile phone IMEI and detect, if do not met, then start the request of clearing data and judge, then start the request of clearing data and judge, if do not removed, then quit a program; If met, then detect user name with cell-phone customer terminal, if service end does not have this user name, then start the request of clearing data and judge, if do not removed, then quit a program, if met, then start data deciphering and read.
Embodiment:
1, each not in tables of data arranges all needs to be keep secret, and just crucial data need encryption, as the price of product, the phone of client, address, therefore, below encryption is tightly encrypted for sensitive items, need not encrypt, to promote operation efficiency to non-sensitive project.
2, unique number of the mobile phone card number of mobile phone, handset identity number and data is obtained by APP, three re-encryptions are carried out to data, and different key assignments encryptions is carried out in each provisional capital, effectively improves the difficulty of deciphering, stop factor data bank file stolen and relate to dew data, see Fig. 1,2.
3, to the data after encryption, must be decrypted by APP, if inconsistent with former encryption key during deciphering, can only mess code be seen.Therefore, user is more after new cell-phone or Mobile phone card, and data cannot normally be deciphered, and by data copy on computer or miscellaneous equipment, also cannot see normal data, see Fig. 3.
4, send data scrubbing instruction by backstage to mobile phone A PP, the data on mobile phone can being cleared up, for preventing device losses from causing data to relate to dew, providing last salvo, see Fig. 3.
Above-mentioned execution mode is the preferred embodiments of the present invention; be not for limiting enforcement of the present invention and interest field; all equivalences made according to the content described in the present patent application scope of patent protection change and modify, and all should be included in the present patent application the scope of the claims.
Claims (1)
1. a method for Mobile solution data localization safe storage, is characterized in that,
Comprise the steps:
The first step, encryption, mobile phone installation procedure client, user uses client to send instruction to background server, and from background server receiver ciphertext data to cell-phone customer terminal, cell-phone customer terminal carries out three re-encryptions automatically, and data are stored into mobile phone database;
Second step, deciphering, cell-phone customer terminal sends request of data to handset server, and handset server is through triple deciphering, and confidential data shows at cell-phone customer terminal;
3rd step, data deciphering or removing step, first, program starts, detection of handset card number, if do not met, then starts the request of clearing data and judges, if do not removed, then quit a program; If met, then enter mobile phone IMEI and detect, if do not met, then start the request of clearing data and judge, then start the request of clearing data and judge, if do not removed, then quit a program; If met, then detect user name with cell-phone customer terminal, if service end does not have this user name, then start the request of clearing data and judge, if do not removed, then quit a program, if met, then start data deciphering and read.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410375061.6A CN104243690A (en) | 2014-07-31 | 2014-07-31 | Method for localizing and safely storing mobile application data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410375061.6A CN104243690A (en) | 2014-07-31 | 2014-07-31 | Method for localizing and safely storing mobile application data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104243690A true CN104243690A (en) | 2014-12-24 |
Family
ID=52231005
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410375061.6A Pending CN104243690A (en) | 2014-07-31 | 2014-07-31 | Method for localizing and safely storing mobile application data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104243690A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105279406A (en) * | 2015-10-29 | 2016-01-27 | 东莞酷派软件技术有限公司 | Method and device of application data safe access |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012110696A1 (en) * | 2011-02-15 | 2012-08-23 | P2S Media Group Oy | Quarantine method for sellable virtual goods |
CN102801730A (en) * | 2012-08-16 | 2012-11-28 | 厦门市美亚柏科信息股份有限公司 | Information protection method and device for communication and portable devices |
CN103259651A (en) * | 2013-05-30 | 2013-08-21 | 成都欣知科技有限公司 | Encryption and decryption method and system of terminal data |
CN103929743A (en) * | 2014-04-28 | 2014-07-16 | 深圳市杰瑞特科技有限公司 | Method for encrypting transmission data of intelligent mobile terminal |
-
2014
- 2014-07-31 CN CN201410375061.6A patent/CN104243690A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012110696A1 (en) * | 2011-02-15 | 2012-08-23 | P2S Media Group Oy | Quarantine method for sellable virtual goods |
CN102801730A (en) * | 2012-08-16 | 2012-11-28 | 厦门市美亚柏科信息股份有限公司 | Information protection method and device for communication and portable devices |
CN103259651A (en) * | 2013-05-30 | 2013-08-21 | 成都欣知科技有限公司 | Encryption and decryption method and system of terminal data |
CN103929743A (en) * | 2014-04-28 | 2014-07-16 | 深圳市杰瑞特科技有限公司 | Method for encrypting transmission data of intelligent mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105279406A (en) * | 2015-10-29 | 2016-01-27 | 东莞酷派软件技术有限公司 | Method and device of application data safe access |
CN105279406B (en) * | 2015-10-29 | 2018-07-27 | 东莞酷派软件技术有限公司 | A kind of method and device using Data Access Security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110798315B (en) | Data processing method and device based on block chain and terminal | |
CN109564598B (en) | Terminal detection method and terminal | |
CN100495421C (en) | Authentication protection method based on USB device | |
CN102136048B (en) | Mobile phone Bluetooth-based ambient intelligent computer protection device and method | |
CN106937274A (en) | A kind of Profile changing methods and device based on EUICC | |
CN104751036A (en) | Computer information security system | |
CN104318286B (en) | Management method, management system and the terminal of NFC label data | |
CN103634482A (en) | Safety protecting method for application software of portable intelligent equipment | |
CN102647279B (en) | Encryption method, encrypted card, terminal equipment and interlocking of phone and card device | |
CN102831359A (en) | Encryption file system of portable mobile storage device | |
CN111178884A (en) | Information processing method, device, equipment and readable storage medium | |
CN102866960A (en) | Method for realizing encryption in storage card, decrypting method and device | |
CN102495983A (en) | Method for encrypting and decrypting data of intelligent mobile terminal in real time | |
CN108667784B (en) | System and method for protecting internet identity card verification information | |
CN105678174A (en) | Method for decrypting WeChat encrypted data based on binary system | |
CN104796262B (en) | Data ciphering method and terminal system | |
CN104936172A (en) | Beidou positioning data transmission encryption system | |
CN103902922A (en) | Method and system for preventing file from being stolen | |
CN104243690A (en) | Method for localizing and safely storing mobile application data | |
CN108696517A (en) | A kind of safe communication method, the apparatus and system of unmanned vehicle information | |
CN107634958A (en) | Computer security login method and computer security entering device | |
CN102647277A (en) | Password protection method based on position information | |
CN104239809A (en) | File protecting method, file protecting device, file decryption method, file decryption device and terminal | |
WO2009004590A3 (en) | Method, apparatus, system and computer program for key parameter provisioning | |
CN106656492A (en) | Key migration method and device for TPM (Trusted Platform Module) chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141224 |