Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reverse-sandbox-based mobilephone payment protection method

A technology of mobile payment and sandbox, which is applied in the field of computer security, can solve problems such as mobile phone security without a solution, and achieve the effect of caching data protection

Active Publication Date: 2011-09-14
BEIJING BANGCLE TECH CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But for 3, there is currently no reliable solution for the local security of mobile phones

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reverse-sandbox-based mobilephone payment protection method
  • Reverse-sandbox-based mobilephone payment protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] A reverse sandbox-based mobile phone payment protection method provided by the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0014] Reference in this specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase "in one embodiment" in various places throughout the specification are not necessarily all referring to the same embodiment.

[0015] What is described below is presented in terms of computational algorithms, or symbolic representations, which are the means used by those skilled in the art to convey the substance of the work in the most effective manner to those skilled in the art. In the following description, the features, structure and logic of these embodiments may be included in other emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a reverse-sandbox-based mobilephone payment protection method, comprising the following steps: 1. classifying application programs on the operating system of an Android mobile phone according to the file identification strategy; and 2. stopping non-trusted program and running a protection program on the basis of a reverse sandbox, and starting the non-trusted program after the protection program is running over. The invention further provides an encrypted file system, and all reading and writing of the protection program are redirected to the file system.

Description

technical field [0001] The present invention relates to the technical field of computer security, and more specifically, the present invention relates to a mobile phone payment protection method based on a reverse sandbox. Background technique [0002] With the continuous growth of 3G users, the convenience of mobile payment is developing more and more rapidly, and has great potential. Mobile payment, an emerging shopping mode, is not only an extension of online shopping, but also a symbol of the fast-paced lifestyle of urban young people. one. However, a major bottleneck of mobile payment is that mobile phone users worry about the security of these payment services. [0003] Viruses are a common problem for mobile phone users. A typical attack mode is to send emails containing file attachments to unsuspecting users. The attachments contain malicious codes, and induce users to activate the attachments through emails. The attack code will modify the phone user's files or ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06Q20/00G06F21/53
Inventor 陈彪
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products