Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method of Realizing Sensitive Data Cloud Locking Based on Refactoring Technology

一种敏感数据、云端的技术,应用在代码重构、数字数据保护、电数字数据处理等方向,能够解决不能完全避免恶意应用各种攻击、没有解决数据保存在终端数据泄露、手机丢失等问题,达到解决敏感数据泄露的效果

Active Publication Date: 2018-02-09
PEKING UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of technology only solves the problem of data loss caused by lost or damaged mobile phones, but does not solve the problem of data leakage caused by data stored in the terminal
Even if the existing data isolation is used for protection, since the data is still stored on the mobile phone, no matter how good the data encryption and isolation mechanism is, it cannot completely avoid various attacks from malicious applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Realizing Sensitive Data Cloud Locking Based on Refactoring Technology
  • A Method of Realizing Sensitive Data Cloud Locking Based on Refactoring Technology
  • A Method of Realizing Sensitive Data Cloud Locking Based on Refactoring Technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] This section presents the implementation of cloud-terminal data fusion in Android applications. The following takes a piece of code as an example to introduce an example of the refactoring process and an example of the refactored runtime architecture.

[0043] like image 3 As shown in (a), the above code is the code before refactoring, and a total of three file-related objects are generated: one is that new File(paramString) generates a File object; the other is that the File object is used as a parameter and passed to open() A ParcelFileDescriptor object is generated; the third is to use the getFileDescriptor() operation of the ParcelFileDescriptor object to generate a FileDescriptor object. The first of these three objects is created by the new keyword, the second is generated by the factory ParcelFileDescriptor.open function; the third is generated by the normal operation getFileDescriptor of the framework layer object ParcelFileDescriptor.

[0044] The refactored...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for cloud locking sensitive data based on refactoring technology is disclosed. Binary byte codes of a mobile application are modified and refactored, and an application program interface related to the file operation used by the mobile application is replaced, so that a sub-file system specified in the cloud is fused with the file system in the client. The refactored application is capable of transparently reading and writing cloud data and cloud locking sensitive data. The method includes: carrying out programmed analysis on the existing mobile application; finding a computational logic related to the file operation and carrying out corresponding refactoring; and re-generating an application with direct cloud data reading / writing capability. The invention method is conducive to improving the security of sensitive data on mobile phones, and has particular significance for users that want to protect sensitive data without storing them on their clients.

Description

technical field [0001] The invention is a method for realizing cloud locking of sensitive data by using program analysis and reconstruction technology to integrate files in multiple devices in an existing application, belonging to the technical field of software, and applicable to software maintenance. Background technique [0002] With the development of smart phones, more and more users use mobile office and mobile business to improve the efficiency of life and work. At the same time, more and more user sensitive data is stored on mobile phones. However, there are still various threats to these sensitive data: such as loss of mobile phone, data loss due to damage, malicious applications, mobile phone viruses causing sensitive data leakage and other issues. In response to data loss and data leakage, cloud storage data isolation and protection technologies represented by network disks have emerged. However, for various current network disks, when users need to read and wri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6218G06F8/72G06F16/16G06F16/1774G06F16/1794G06F2221/2147
Inventor 梅宏黄罡张颖蔡华谦
Owner PEKING UNIV