Transparent encryption and decryption method for intelligent terminal file

An intelligent terminal, encryption and decryption technology, applied in the field of mobile applications, can solve problems such as operational complexity, achieve the effect of protecting user privacy, ensuring reliability, taking into account efficiency, and avoiding personal information leakage

Active Publication Date: 2015-02-04
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And when the user needs to read the file in plain text, the user needs to enter the password again, and the encryption software decrypts the file according to the password, which has a certain complexity in operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transparent encryption and decryption method for intelligent terminal file
  • Transparent encryption and decryption method for intelligent terminal file
  • Transparent encryption and decryption method for intelligent terminal file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0035] The present invention aims at the current situation of insufficient security protection of personal sensitive data of users of Linux-based intelligent terminal operating system (such as Android) platforms at home and abroad, and proposes a set of solutions for transparent encryption and decryption of intelligent terminal files based on LKM, which is common in the market. User mode encryption software, its main innovations include:

[0036] (1) The present invention can monitor and manage user data access operations, so that unauthorized processes or other intelligent terminals cannot obtain protected file content;

[0037] (2), the present invention is based on the research basis of transparent encryption and decryption of Linux files, and is specially aime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a transparent encryption and decryption method for an intelligent terminal file. The method comprises the following steps: setting an authorized progress list and a to-be-protected file list on an application layer and sending the authorized progress list and the to-be-protected file list to a dynamic link library. so; acquiring an operation command for an operation file from an access progress, calling for the dynamic link library. so through JNI, and transmitting the name of the access progress, the address of the operation file and the operation command to a hook module of a nucleus layer of an operating system of the intelligent terminal when the dynamic link library. so determines that the access progress is the authorized progress and the operation file is the to-be-protected file; seeking for a system call table by the hook module; acquiring the address of a system call function corresponding to the operation command from the system call table; replacing the address of the system call function in the system call table with the address of the function with a decryption function preset in the nucleus layer.

Description

technical field [0001] The embodiments of the present invention belong to the technical field of mobile applications, in particular to a transparent encryption and decryption method for smart terminal files. Background technique [0002] With the rapid development and global popularity of the mobile Internet, smart terminals integrating business and entertainment functions have become an indispensable part of people's daily life. At the same time, various application software have sprung up to meet people's daily work learning and living needs. However, with the rapid development of the mobile Internet and the widespread popularization of smart terminals, malicious application code dissemination activities are becoming more and more rampant, and technological means are constantly being innovated, seriously threatening the security of the network and users. However, today's mobile application stores lack unified review standards, good and bad applications are intermingled, m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/62
CPCG06F16/1734G06F21/6218G06F21/6245G06F2221/2107G06F2221/2141
Inventor 杨昕雨张淼郭燕慧李祺徐国爱
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products