Code injection based privacy information protection method

A privacy information, code injection technology, applied in digital data protection, instruments, electrical digital data processing, etc., can solve the problems of complex operation, poor applicability, poor reliability, etc., and achieve the effect of easy and deep optimization

Inactive Publication Date: 2016-06-08
ENJOYOR COMPANY LIMITED
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the deficiencies of poor applicability, complicated operation, and poor reliability of existing privacy protection methods, the present invention provides a privacy information protection method based on code injection with good applicability, convenient operation, and good reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code injection based privacy information protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the accompanying drawings.

[0023] refer to figure 1 , a method for protecting private information based on code injection, comprising the following steps:

[0024] 101 Obtain the highest root authority of the Android system;

[0025] 102 Use the file manager to download the zygote program of the Android system (Reference 1: "Source Code Analysis of the Android System Process Zygote Startup Process", the source of the document is: http: / / blog.csdn.net / luoshengyang / article / details / 6768304 ) to replace, and create a new process through the system call fork() function (Reference 2: "Fork(systemcall)", the source of the document is: https: / / en.wikipedia.org / wiki / Fork_(system_call)), so that When a new process is generated, it can reflect and intercept the new process, and inject new code for a specific function call;

[0026] 103 reverse root the system after replacing the zygote program;

[0027...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a code injection based privacy information protection method. The method comprises the following steps: (1) obtaining the highest root privilege of an Android system; (2) replacing a zygote program of the Android system by means of a file manager, and adding a new process by calling a fork() function by a system; (3) un-rooting the system; (4) detecting a specific request proposed by an application; (5) intercepting the request in the manner of reflection, and adding an Xposed frame based hook function for a specific permission access when a program that needs to be spoofed in the request is started; (6) when an application runs, processing read parameter data before access of a privacy function; and (7) modifying and spoofing an acquired reality return value after the function ends, so as to achieve the purpose of privacy information protection. The method provided by the present invention is excellent in applicability, convenient for operation and excellent in reliability.

Description

technical field [0001] The invention relates to mobile terminal-oriented applications and rights management issues, in particular to a method for protecting private information based on code injection, which belongs to the field of privacy protection. Background technique [0002] 2014 is the 20th anniversary of China's official access to the Internet. The rapid development of mobile communication technology has led to an exponential increase in the number of mobile devices. In 2014, there were about 500 million mobile Internet users. The exponential growth of mobile phone viruses is undoubtedly the breaking point of mobile security, and mobile payment security has become a new challenge for the mobile Internet. New mobile applications and new functions, such as online banking, games, mobile phone charging, etc., bring convenience to users, but also bring security risks such as privacy leakage. Compared with the closed system of iOS, the flexible and open Android system is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 温晓岳樊锦祥王毅柳展陈才君
Owner ENJOYOR COMPANY LIMITED
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products