Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud computing-based android database security protection method and system

A security protection and database technology, applied in the field of Android database security protection based on cloud computing, can solve the problems of insufficient security processing efficiency and accuracy, increasing the memory burden of local clients, and easy cracking of passwords and passwords. Achieve the effect of ensuring high efficiency and stability, ensuring encryption efficiency, and fast encryption speed

Active Publication Date: 2016-10-05
WUHAN ANTIY MOBILE SECURITY
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the first type mostly uses methods such as data encryption, user passwords, and role-based authority control, and its security mechanisms are mostly implemented locally, which not only increases the memory burden of the local client, but also passwords and passwords are easy to crack, and lack access operations. The mechanism for detecting malicious SQL injection behavior in the database; the second type is realized by means of a WEB server, which reduces the memory burden of the local client and ensures the performance of the local client and the security mechanism, but is not sufficient in terms of security processing efficiency and accuracy. Guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud computing-based android database security protection method and system
  • Cloud computing-based android database security protection method and system
  • Cloud computing-based android database security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0038] The present invention provides an embodiment of a cloud security mechanism deployment method based on a cloud computing-based Android database security protection method, such as figure 1 shown, including:

[0039] S101: Obtain user biometric information and Android device identification information to form user identity features, and store user identity features in a feature table in the cloud;

[0040] S102: Organize known malicious SQL injection behavior information, and store it in a cloud SQL injection behavior library;

[0041] S103: Encrypt the database, and s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a cloud computing-based android database security protection method and system. A security mechanism of database protection is realized based on a cloud terminal by virtue of a cloud computing technology; and three-layer protection of a database is realized through a user bio-feature identification-based authentication method, an SQL injection protection method and a hybrid encryption algorithm. According to the cloud computing-based android database security protection method and system, the deficiencies of lack of an SQL injection detection mechanism and difficulty in ensuring performance and efficiency in an existing android platform database protection technology are made up for and the security protection is realized based on the cloud terminal, so that the load pressure of a local mobile terminal is effectively reduced, the device performance is ensured, the security protection of the android database is perfecter and more reliable, and the high efficiency and stability of the security protection are ensured.

Description

technical field [0001] The invention relates to the technical field of Android database security protection, in particular to a cloud computing-based Android database security protection method and system. Background technique [0002] The embedded mobile database SQLite is integrated in the Android system, which stores important private information such as address book, Notes, user configuration, etc. Most of the applications in the Android system will call SQLite to store and process data, so the Android platform database Security is especially important. [0003] At present, most of the research on Android platform security focuses on malicious behavior identification, etc., and there are few studies on its database. Most of the existing research on Android platform database is on its application and performance, while its security research not enough attention. [0004] The existing research on the security of the Android platform can be divided into two categories. On...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/6218
Inventor 邹艳梅潘宣辰
Owner WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products