Information protection method and device

An information protection and short message technology, applied in the field of information security, can solve problems such as re-encryption, abrupt private information, and difficulty in encryption algorithm key management, so as to ensure absolute security and reduce system overhead

Inactive Publication Date: 2015-04-29
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Some third-party software often requires users to provide access permissions for contacts and text messages. Failure to provide the corresponding permissions will affect the user's application experience and even limit the user's use
Although the method of encrypting contacts and short messages will increase the difficulty for others to obtain private information, there are several problems: first, there is no encryption algorithm that cannot be cracked, and once private information is leaked, it is still unsafe; second, Encryption algorithms that are more difficult to crack often require terminal configuration support with higher computing power; third, any information update needs to be re-encrypted, which brings considerable computing pressure to the terminal
Fourth, encryption algorithms have a certain degree of difficulty in key management; fifth, the encrypted private information is too obtrusive, and it is too easy to attract the attention of others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection method and device
  • Information protection method and device
  • Information protection method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 2 example

[0068] The second embodiment of the present invention is an information protection method. The method described in this embodiment is roughly the same as that in the first embodiment. The difference is that in step S101 of this embodiment, the trust level of each application set also includes: danger application, the dangerous application has not been granted any access permissions.

[0069] The method described in this embodiment also includes in step S103:

[0070] Determine whether the application requesting access to contact information is a dangerous application, and if so, refuse to provide any information for the dangerous application.

no. 3 example

[0071] The third embodiment of the present invention corresponds to the first embodiment or the second embodiment. This embodiment introduces an information protection device, such as Figure 4 shown, including the following components:

[0072] A generating module 100, configured to generate false contact information.

[0073] The setting module 200 is used to set the trust level of each application, and classify the applications into at least the following trust levels: trusted applications and untrusted applications, and the untrusted applications are granted the right to access false contact information.

[0074] The processing module 300 is configured to determine whether the application requesting to access the contact information is an untrusted application, and if so, provide the false contact information to the untrusted application.

[0075] Specifically, taking the false contact information as the name of the false contact and the corresponding short message chat r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information protection method and device. The method comprises the steps that false contact person information is generated; the trusted levels of all applications are set, the applications are at least classified to be the trusted applications and the non-trusted applications, and the authority of accessing the false contact person information is given to the non-trusted applications; whether the applications which request to access the contact person information are the non-trusted applications or not is judged; if yes, the false contact person information is provided for the non-trusted applications. The information protection device comprises a generation module, a setting module and a processing module. According to the information protection method and device, the false contact person information is provided for the non-trusted applications, the effects of confusing the public and lulling opponents are achieved, no chance of breaking is given to the opponents, and the absolute safety of privacy-sensitive information is guaranteed. The false contact person information generated by the method and device can be repeatedly used, compared with an existing encryption scheme, the system overhead is lowered to a great extent, and the maintaining problem of keys is solved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an information protection method and device. Background technique [0002] Existing terminals use rights management to control access rights to contacts and short messages, or encrypt the content of contacts and short messages. [0003] Some third-party software often requires users to provide access permissions for contacts and text messages. Failure to provide corresponding permissions will affect the user's application experience or even limit the user's use. Although the method of encrypting contacts and short messages will increase the difficulty for others to obtain private information, there are several problems: first, there is no encryption algorithm that cannot be cracked, and once private information is leaked, it is still unsafe; second, Encryption algorithms that are more difficult to crack often require terminal configuration support with highe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 赵冰
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products