CN104134048B - The encryption method and encryption device of storage card - Google Patents
The encryption method and encryption device of storage card Download PDFInfo
- Publication number
- CN104134048B CN104134048B CN201410375047.6A CN201410375047A CN104134048B CN 104134048 B CN104134048 B CN 104134048B CN 201410375047 A CN201410375047 A CN 201410375047A CN 104134048 B CN104134048 B CN 104134048B
- Authority
- CN
- China
- Prior art keywords
- storage card
- encrypted
- key
- encryption
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention proposes a kind of encryption method of storage card and a kind of encryption device of storage card, wherein the encryption method of the storage card includes:It is encrypted using storage card described in the key pair being stored in the default subregion of terminal;The encrypted state for the storage card being stored in the storage card is set as encrypting.Key can be stored in terminal by technical solution through the invention, and encrypted state is preserved on a memory card, allows a terminal that multiple storage cards are encrypted respectively, improves the convenience that user uses.
Description
Technical field
The present invention relates to encryption technology fields, the encryption method in particular to a kind of storage card and a kind of storage card
Encryption device.
Background technology
Currently, when storage card is encrypted, usually all it is that storage card is inserted into the terminals such as mobile phone, is used on mobile phone
When storage card is encrypted in eCryptfs (enterprise-level file encryption system), PIN code (Personal can be used
Identification Number, Personal Identity Number) key is encrypted as password.PIN code is the SIM of mobile phone
The personal recognition code for blocking (subscriber identification card), for protecting the SIM card of user oneself not obtained by other people.In this way,
After booting, carries out cryptographic check and storage card is read out when the password is correct.
However, the encrypted state of this storage card is stored in terminal inner, cause terminal can not be to multiple storage cards simultaneously
It is encrypted.After terminal-pair first, which opens storage card, to be encrypted, first storage card is pulled out, and be inserted into second storage card,
Terminal can prompt to need to decrypt second storage card at this time, that is, the encrypted state of first storage card can be used to user
Second storage card is made troubles.
Therefore, how to make a terminal that multiple storage cards be encrypted respectively, to promote the convenience that user uses, at
For current urgent problem to be solved.
Invention content
The present invention is based on the above problem, it is proposed that a kind of new technical solution can make a terminal respectively to more
It opens storage card to be encrypted, promotes the convenience that user uses.
In view of this, an aspect of of the present present invention proposes a kind of encryption method of storage card, including:Using being stored in terminal
Default subregion in key pair described in storage card be encrypted;And by the storage card being stored in the storage card
Encrypted state is set as encrypting.
In the technical scheme, eCryptfs modes may be used storage card is encrypted, storage card is encrypted
Key in terminal, and the encrypted state of storage card is saved on a memory card, in this way, it is right respectively to allow for a terminal
Multiple storage cards are encrypted, without cause the encrypted state of certain storage card influence other storage cards encrypted state feelings
Condition occurs, and greatly improves the convenience that user uses.
In the above-mentioned technical solutions, it is preferable that further include:When not having the key in the default subregion, create
The key;And the key is encrypted, and be stored in the default subregion.
In the technical scheme, the key of establishment is for being encrypted storage card, and key is encrypted can be with
Prevent key from illegally being erased and leading to not that storage card is decrypted, by key storage in the default subregion of terminal so as to
Key pair storage card is called to be encrypted.
In the above-mentioned technical solutions, it is preferable that further include:Using the key pair institute being stored in the default subregion of terminal
When stating storage card and being encrypted, increase the encryption number being stored in the default subregion;And it is stored in terminal using
When storage card described in key pair in default subregion is decrypted, the encryption number in the default subregion is reduced, and by institute
The encrypted state for stating storage card is set as unencryption.
In the technical scheme, encryption number can be counted, by the number of the storage card after the completion of encryption or decryption
Mesh is stored in predetermined partition, and when a storage card is encrypted, the number of storage card increases by one, is stored when to one
When card is decrypted, the number of storage card reduces one.
In the above-mentioned technical solutions, it is preferable that further include:When the encryption number is zero, the default subregion is removed
In the key.
In the technical scheme, when the number of the storage card preserved in subregion is reduced to zero, illustrate currently without encrypted
Storage card can remove the key being stored in subregion, to save memory space.
In the above-mentioned technical solutions, it is preferable that further include:Access rights are set for the default subregion, to allow to have
The application program of access rights accesses.
In the technical scheme, key is saved in the default subregion of terminal, which is arranged access rights, makes user
Need to carry out authorization check when access, the only user with access rights could enter subregion and obtain key, in this way can be to prevent
Only key is illegally erased and leads to not decrypt.
Another aspect of the present invention proposes a kind of encryption device of storage card, including:First encryption unit, for using
Storage card is encrypted described in the key pair being stored in the default subregion of terminal;Setting unit, for described deposit will to be stored in
The encrypted state of the storage card in card storage is set as encrypting.
In the technical scheme, eCryptfs modes may be used storage card is encrypted, storage card is encrypted
Key in terminal, and the encrypted state of storage card is saved on a memory card, in this way, it is right respectively to allow for a terminal
Multiple storage cards are encrypted, without cause the encrypted state of certain storage card influence other storage cards encrypted state feelings
Condition occurs, and greatly improves the convenience that user uses.
In the above-mentioned technical solutions, it is preferable that further include:Creating unit, for not having institute in the default subregion
When stating key, the key is created;Second encryption unit, for the key to be encrypted;Storage unit, for that will encrypt
The key storage afterwards is in the default subregion.
In the technical scheme, the key of establishment is for being encrypted storage card, and key is encrypted can be with
Prevent key from illegally being erased and leading to not that storage card is decrypted, by key storage in the default subregion of terminal so as to
Key pair storage card is called to be encrypted.
In the above-mentioned technical solutions, it is preferable that further include:Number adjustment unit is encrypted, the pre- of terminal is stored in using
If storage card described in the key pair in subregion is encrypted, increase the encryption number being stored in the default subregion;And
When being decrypted using storage card described in the key pair stored in the default subregion of terminal, reduce in the default subregion
Number is encrypted, and sets the encrypted state of the storage card to unencryption.
In the technical scheme, encryption number can be counted, by the number of the storage card after the completion of encryption or decryption
Mesh is stored in predetermined partition, and when a storage card is encrypted, the number of storage card increases by one, is stored when to one
When card is decrypted, the number of storage card reduces one.
In the above-mentioned technical solutions, it is preferable that further include:Clearing cell, when the encryption number is zero, described in removing
The key in default subregion.
In the technical scheme, when the number of the storage card preserved in subregion is reduced to zero, illustrate currently without encrypted
Storage card can remove the key being stored in subregion, to save memory space.
In the above-mentioned technical solutions, it is preferable that further include:Access right is arranged for the default subregion in priority assignation unit
Limit, to allow to have the application program of access rights to access.
In the technical scheme, key is saved in the default subregion of terminal, which is arranged access rights, makes user
Need to carry out authorization check when access, the only user with access rights could enter subregion and obtain key, in this way can be to prevent
Only key is illegally erased and leads to not decrypt.
By above technical scheme, key can be stored in terminal, encrypted state is preserved on a memory card, is allowed
One terminal is simultaneously encrypted multiple storage cards, improves the convenience that user uses.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the encryption method of storage card according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagrams of the encryption method of storage card according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of the encryption device of storage card according to an embodiment of the invention.
Specific implementation mode
To better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real
Mode is applied the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also
To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the encryption method of storage card according to an embodiment of the invention.
As shown in Figure 1, the encryption method of storage card according to an embodiment of the invention, including:
Step 102, it is encrypted using the key pair storage card being stored in the default subregion of terminal.
Step 104, the encrypted state for the storage card being stored in storage card is set as encrypting.
In the technical scheme, eCryptfs modes may be used storage card is encrypted, storage card is encrypted
Key in terminal, and the encrypted state of storage card is saved on a memory card, in this way, it is right respectively to allow for a terminal
Multiple storage cards are encrypted, without cause the encrypted state of certain storage card influence other storage cards encrypted state feelings
Condition occurs, and greatly improves the convenience that user uses.
In the above-mentioned technical solutions, it is preferable that further include:When not having key in default subregion, key is created;And
Key is encrypted, and is stored in default subregion.
In the technical scheme, the key of establishment is for being encrypted storage card, and key is encrypted can be with
Prevent key from illegally being erased and leading to not that storage card is decrypted, by key storage in the default subregion of terminal so as to
Key pair storage card is called to be encrypted.
In the above-mentioned technical solutions, it is preferable that further include:It is deposited using the key pair being stored in the default subregion of terminal
When card storage is encrypted, increase the encryption number being stored in default subregion;And using the default subregion for being stored in terminal
In key pair storage card when being decrypted, reduce the encryption number preset in subregion, and the encrypted state of storage card is set
It is set to unencryption.
In the technical scheme, encryption number can be counted, by the number of the storage card after the completion of encryption or decryption
Mesh is stored in predetermined partition, and when a storage card is encrypted, the number of storage card increases by one, is stored when to one
When card is decrypted, the number of storage card reduces one.
In the above-mentioned technical solutions, it is preferable that further include:When it is zero to encrypt number, the key preset in subregion is removed.
In the technical scheme, when the number of the storage card preserved in subregion is reduced to zero, illustrate currently without encrypted
Storage card can remove the key being stored in subregion, to save memory space.
In the above-mentioned technical solutions, it is preferable that further include:Access rights are set for default subregion, are accessed with allowing to have
The application program of permission accesses.
In the technical scheme, key is saved in the default subregion of terminal, which is arranged access rights, makes user
Need to carry out authorization check when access, the only user with access rights could enter subregion and obtain key, in this way can be to prevent
Only key is illegally erased and leads to not decrypt.
Fig. 2 shows the schematic flow diagrams of the encryption method of storage card according to an embodiment of the invention.
As shown in Fig. 2, the encryption method of storage card according to an embodiment of the invention, including:
Step 202, storage card is inserted in terminal.
Step 204, password is inputted to verify user identity to terminal.Key is saved in the default subregion of terminal, should
Access rights are arranged in subregion, need to carry out authorization check when user being made to access, the only user with access rights could enter
Subregion obtains key, can prevent key from illegally being erased and leading to not decrypt in this way.
Step 206, the encrypted state of storage card is obtained.The encrypted state of storage card is encrypted or unencrypted.
Step 208, judge whether the encrypted state of storage card is unencryption, when judging result is to be, enter step
210, when judging result is no, enter step 224.
Step 210, start to storing card encryption.
Step 212, judge to whether there is key in particular zones, when judging result is to be, 214 are entered step, when sentencing
When disconnected result is no, 216 are entered step.
Step 214, key is created.
Step 216, key is encrypted using password.The key of establishment is right for storage card is encrypted
Key, which is encrypted, key illegally to be erased in order to prevent and lead to not that storage card is decrypted, furthermore it is possible to will
Encrypted key storage is in the default subregion of terminal, to call key pair storage card to be encrypted.
Step 218, storage card is encrypted.
Step 220, encrypted state is preserved on a memory card.By encrypted state preserve on a memory card rather than terminal
On, so that the encrypted state of any storage card is not all interfered with the encrypted state of other storage cards so that terminal can be deposited to multiple
Card storage is encrypted respectively.
Step 222, setting encryption storage card number increases by one.The number of storage card after the completion of encryption is saved in predetermined
In subregion, when a storage card is encrypted, the number of storage card increases by one.
Step 224, judge whether to receive storage card decryption instructions, when judging result is to be, enter step 226, it is no
Then, terminate process.
Step 226, storage card is decrypted.
Step 228, decryption is completed, the encrypted state of storage card is removed.
Step 230, setting encryption storage card number reduces one.The number of storage card after the completion of decryption is saved in predetermined
In subregion, when a storage card is decrypted, the number of storage card increases by one.
Step 232, whether the number for encrypting storage card is zero, when judging result is to be, enters step 234, otherwise, knot
Shu Jincheng.
Step 234, key is removed, process is terminated.When the number of the storage card preserved in subregion is reduced to zero, illustrate current
There is no encrypted storage card, the key being stored in subregion can be removed, to save memory space.
Fig. 3 shows the schematic block diagram of the encryption device of storage card according to an embodiment of the invention.
As shown in figure 3, the encryption device 300 of storage card according to an embodiment of the invention, including:First encryption unit
302, for using the key pair storage card being stored in the default subregion of terminal to be encrypted;Setting unit 304, for that will protect
There are the encrypted states of the storage card in storage card to be set as encrypting.
In the technical scheme, eCryptfs modes may be used storage card is encrypted, storage card is encrypted
Key in terminal, and the encrypted state of storage card is saved on a memory card, in this way, it is right respectively to allow for a terminal
Multiple storage cards are encrypted, without cause the encrypted state of certain storage card influence other storage cards encrypted state feelings
Condition occurs, and greatly improves the convenience that user uses.
In the above-mentioned technical solutions, it is preferable that further include:Creating unit 306, for not having key in default subregion
When, create key;Second encryption unit 308, for key to be encrypted;Storage unit, for depositing encrypted key
Storage is in default subregion.
In the technical scheme, the key of establishment is for being encrypted storage card, and key is encrypted can be with
Prevent key from illegally being erased and leading to not that storage card is decrypted, by key storage in the default subregion of terminal so as to
Key pair storage card is called to be encrypted.
In the above-mentioned technical solutions, it is preferable that further include:Number adjustment unit 310 is encrypted, terminal is stored in using
When key pair storage card in default subregion is encrypted, increase the encryption number being stored in default subregion;And it is using
When storing the key pair storage card in the default subregion of terminal and being decrypted, the encryption number preset in subregion is reduced, and
Set the encrypted state of storage card to unencryption.
In the technical scheme, encryption number can be counted, by the number of the storage card after the completion of encryption or decryption
Mesh is stored in predetermined partition, and when a storage card is encrypted, the number of storage card increases by one, is stored when to one
When card is decrypted, the number of storage card reduces one.
In the above-mentioned technical solutions, it is preferable that further include:Clearing cell 312 is removed default when it is zero to encrypt number
Key in subregion.
In the technical scheme, when the number of the storage card preserved in subregion is reduced to zero, illustrate currently without encrypted
Storage card can remove the key being stored in subregion, to save memory space.
In the above-mentioned technical solutions, it is preferable that further include:Access right is arranged for default subregion in priority assignation unit 314
Limit, to allow to have the application program of access rights to access.
In the technical scheme, key is saved in the default subregion of terminal, which is arranged access rights, makes user
Need to carry out authorization check when access, the only user with access rights could enter subregion and obtain key, in this way can be to prevent
Only key is illegally erased and leads to not decrypt.
In the present invention, term " first ", " second " are only used for the purpose described, are not understood to indicate or imply phase
To importance.For the ordinary skill in the art, above-mentioned term can be understood as the case may be in the present invention
Concrete meaning.
Technical scheme of the present invention is described in detail above in association with attached drawing, technical solution through the invention can will be close
Key is stored in terminal, and encrypted state is preserved on a memory card, allows a terminal that multiple storage cards are encrypted simultaneously,
Improve the convenience that user uses.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (8)
1. a kind of encryption method of storage card, which is characterized in that including:
It is encrypted using storage card described in the key pair being stored in the default subregion of terminal;And
The encrypted state for the storage card being stored in the storage card is set as encrypting;
Further include:When being encrypted using storage card described in the key pair stored in the default subregion of terminal, increase storage
Encryption number in the default subregion;And
When being decrypted using storage card described in the key pair stored in the default subregion of terminal, the default subregion is reduced
In encryption number, and set the encrypted state of the storage card to unencryption.
2. encryption method according to claim 1, which is characterized in that further include:
When not having the key in the default subregion, the key is created;And
The key is encrypted, and is stored in the default subregion.
3. encryption method according to claim 1, which is characterized in that further include:
When the encryption number is zero, the key in the default subregion is removed.
4. encryption method according to claim 3, which is characterized in that further include:
Access rights are set for the default subregion, to allow to have the application program of access rights to access.
5. a kind of encryption device of storage card, which is characterized in that including:
First encryption unit, for using storage card described in the key pair being stored in the default subregion of terminal to be encrypted;
Setting unit, for the encrypted state for the storage card being stored in the storage card to be set as encrypting;
Further include:
Number adjustment unit is encrypted, is encrypted using storage card described in the key pair being stored in the default subregion of terminal
When, increase the encryption number being stored in the default subregion;And using the key being stored in the default subregion of terminal
When the storage card is decrypted, the encryption number in the default subregion is reduced, and by the encryption shape of the storage card
State is set as unencryption.
6. encryption device according to claim 5, which is characterized in that further include:
Creating unit creates the key when for not having the key in the default subregion;
Second encryption unit, for the key to be encrypted;
Storage unit is used for the encrypted key storage in the default subregion.
7. encryption device according to claim 5, which is characterized in that further include:
Clearing cell removes the key in the default subregion when the encryption number is zero.
8. encryption device according to claim 7, which is characterized in that further include:
Access rights are arranged for the default subregion in priority assignation unit, to allow to have the application program of access rights to carry out
It accesses.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410375047.6A CN104134048B (en) | 2014-07-31 | 2014-07-31 | The encryption method and encryption device of storage card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410375047.6A CN104134048B (en) | 2014-07-31 | 2014-07-31 | The encryption method and encryption device of storage card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104134048A CN104134048A (en) | 2014-11-05 |
CN104134048B true CN104134048B (en) | 2018-08-24 |
Family
ID=51806723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410375047.6A Expired - Fee Related CN104134048B (en) | 2014-07-31 | 2014-07-31 | The encryption method and encryption device of storage card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104134048B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109918877A (en) * | 2019-03-21 | 2019-06-21 | 深圳市网心科技有限公司 | A data encryption method, system, client and computer-readable storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103593308A (en) * | 2013-10-10 | 2014-02-19 | 福建升腾资讯有限公司 | USB (universal serial bus) flash disk write-protection method based on section write-protection |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004072718A (en) * | 2002-06-12 | 2004-03-04 | Fuji Photo Film Co Ltd | Memory card for digital camera |
US7796762B2 (en) * | 2004-04-28 | 2010-09-14 | Panasonic Corporation | Communication system, common key control apparatus, and general communication apparatus |
US7467404B2 (en) * | 2004-09-27 | 2008-12-16 | Bally Garning, Inc. | System and method for distributing software licenses |
US7660959B2 (en) * | 2006-09-28 | 2010-02-09 | International Business Machines Corporation | Managing encryption for volumes in storage pools |
CN101232638A (en) * | 2007-01-24 | 2008-07-30 | 中兴通讯股份有限公司 | System and method for remote protecting mobile terminal data |
CN101286338B (en) * | 2007-04-12 | 2010-06-02 | 鸿富锦精密工业(深圳)有限公司 | Electronic equipment and its data encryption method and data deciphering method |
CN101615161B (en) * | 2009-07-28 | 2012-07-18 | 成都市华为赛门铁克科技有限公司 | Method for encrypting and decrypting hard disk, hard disk driving device and hard disk |
CN102799540B (en) * | 2012-06-21 | 2017-07-14 | 南京中兴软件有限责任公司 | Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption |
CN103065102B (en) * | 2012-12-26 | 2015-05-27 | 中国人民解放军国防科学技术大学 | Data encryption mobile storage management method based on virtual disk |
CN103473512B (en) * | 2013-08-26 | 2016-06-15 | 北京明朝万达科技股份有限公司 | A kind of mobile memory medium management method and device |
CN103902931A (en) * | 2013-12-17 | 2014-07-02 | 哈尔滨安天科技股份有限公司 | Mobile storage device automatic encryption method |
-
2014
- 2014-07-31 CN CN201410375047.6A patent/CN104134048B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103593308A (en) * | 2013-10-10 | 2014-02-19 | 福建升腾资讯有限公司 | USB (universal serial bus) flash disk write-protection method based on section write-protection |
Non-Patent Citations (1)
Title |
---|
Android移动设备数据加密机制;陆继翔;《无线互联科技》;20130630(第6期);第169页左栏第6行至第第170页右栏最后一行 * |
Also Published As
Publication number | Publication date |
---|---|
CN104134048A (en) | 2014-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2905715B1 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
CN106301774B (en) | Security chip, encryption key generation method and encryption method thereof | |
CN101437067B (en) | Mobile terminal and method for implementing network and card locking | |
CN102867157B (en) | Mobile terminal and data guard method | |
EP2693789A1 (en) | Mobile terminal encryption method, hardware encryption device and mobile terminal | |
CN111552935A (en) | Block chain data authorization access method and device | |
CN102291717B (en) | Data protection method and terminal | |
JP2018500823A (en) | Device key protection | |
CN104144411B (en) | Encryption, decryption terminal and the encryption and decryption approaches applied to terminal | |
EP2881863A1 (en) | Method for implementing encryption in storage card, and decryption method and device | |
WO2019109640A1 (en) | Method and device for locking sim card | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN104270754B (en) | A kind of Subscriber Identity Module method for authenticating and device | |
CN105554226A (en) | Mode switching method and system, and terminal | |
US20150281951A1 (en) | Method and device for protecting privacy data of mobile terminal user | |
CN111245620B (en) | Mobile security application architecture in terminal and construction method thereof | |
CN104134048B (en) | The encryption method and encryption device of storage card | |
CN114611124A (en) | Method and device for preventing data leakage | |
US20060121882A1 (en) | Desktop cellular phone having a SIM card with an encrypted SIM PIN | |
EP2985712B1 (en) | Application encryption processing method, apparatus, and terminal | |
CN105636043A (en) | ESIM (Embedded SIM) card authentication method, eSIM card authentication device and terminal | |
CN103312500A (en) | Methods for protecting universal serial bus (USB) key information | |
CN105245526B (en) | Call the method and apparatus of SIM card application | |
CN104980913B (en) | Protect the method and terminal device of data information security in terminal device | |
CN205864753U (en) | A kind of encryption guard system of terminal unit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180824 Termination date: 20210731 |