User privacy information protection method and user privacy information protection system

An information protection and user privacy technology, applied in transmission systems, electrical components, etc., can solve problems such as difficulty in active discovery, limited types of monitoring data, and inability to effectively block, and achieve the effect of protecting user privacy data.

Active Publication Date: 2014-04-09
INST OF INFORMATION ENG CAS
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide an active detection and application programming interface hook based on log information to solve the problems of limited types of monitoring d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User privacy information protection method and user privacy information protection system
  • User privacy information protection method and user privacy information protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0060] Such as figure 1 As shown, it is a method for protecting user privacy information described in Embodiment 1 of the present invention, which specifically includes the following steps:

[0061] Step 1: A call operation occurs, and the hook module obtains basic interface information;

[0062] Step 2: Determine whether the API application programming interface call is normal, if yes, proceed to the next step, otherwise, jump to step 1;

[0063] Step 3: Hook and redirect sensitive information-related interfaces, monitor API application programming interface calls in real time, and filter and analyze information related to call operations that may access sensitive information;

[0064] Step 4: Write the call oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user privacy information protection method. The method comprises steps that: step 1, a pick-up module carries out interface calling operation to acquire basic interface information, and a redirection filtering method is employed to carry out filtering analysis on operation which may access to sensitive information; step 2, operation log data information sent by terminal equipment is received by a parsing module, information in an interface calling database is called, and an operation log of sensitive operation is recorded; step 3, processing on information in a suspected-behavior operation database is carried out by a detection module, information-stealing operation is screened out based on information of a black list database, and information-stealing operation behavior information is stored in the black list database, and step 4, information-stealing operation is processed according to the information-stealing operation behavior information stored in the black list database. According to the user privacy information protection method, an information-stealing behavior can be monitored, a latent information-stealing threat can be discovered, and the information-stealing operation is stopped; sensitive information circulation is monitored; and user privacy data can be comprehensively monitored and protected.

Description

technical field [0001] The invention relates to a method and system for protecting user privacy information, belonging to the technical field of network and information security. Background technique [0002] With the rapid development of mobile Internet and the continuous increase of mobile smart terminal service applications, mobile smart terminals have become more and more important tools in people's life and work. Compared with terminals such as desktop computers and notebook computers, mobile smart terminals are more suitable for people to carry with them, may store more private information, and are online in real time for a long time. These features are more beneficial to attackers. They use phishing, malicious codes and other illegal means to trick users into installing mobile phone Trojans or spyware, and collect their private data (including contacts, text messages, call recordings, and even It is the current location information, real-time audio and video informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 张永铮李书豪云晓春周宇常鹏
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products