Data processing method, device and system

A data processing device and data processing technology, applied in the field of information security, can solve problems such as information security loopholes, achieve the effects of avoiding leakage, increasing hardware costs, and improving user experience

Inactive Publication Date: 2016-11-09
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the information security loopholes in the communication field are very large. For various applications installed on mobile terminals, some Trojan horse programs and phishing websites often cut into mobile terminals to steal user account information and verification codes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device and system
  • Data processing method, device and system
  • Data processing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0069] Account information leakage mainly includes three aspects: account number, password and verification code. The account information of the end user is finally transmitted to the network platform in two ways: information in the data domain and signaling domain. Malicious programs can obtain account information by reading the information content of the data domain and signaling do...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a data processing method, device and system. The method comprises the following steps: when an application of an application layer executes a data transmission operation, acquiring protocol data unit data transmitted by the application; when the protocol data unit data include preset sensitive information, acquiring an application identifier of the application; and when the application identifier does not belong to a preset identifier set, stopping the data transmission operation and instructing the application to execute the data transmission operation. Through the technical scheme, sensitive information in a terminal can be prevented from being stolen by Trojan programs or phishing websites; a user can easily and accurately get the Trojan programs hidden in the terminal; and the information security and property security of the terminal user are protected. Moreover, on the basis of not influencing the work of trusted applications, the information intercepting accuracy and the suspicious Trojan program identification accuracy are increased; the sensitive information of the user is protected from being leaked; and the user experience of the terminal is improved.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and in particular to a data processing method, device and system. Background technique [0002] At present, the information security loopholes in the communication field are very large. For various applications installed on mobile terminals, some Trojan horse programs and phishing websites often cut into mobile terminals to steal user account information and verification codes. In order to prevent various Trojan horse programs from stealing account passwords and verification code information, a more secure mechanism is urgently needed to ensure the security of user information. Contents of the invention [0003] Embodiments of the present disclosure provide a data processing method, device, and system. Described technical scheme is as follows: [0004] According to the first aspect of the embodiments of the present disclosure, a data processing method is provided, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/302H04L63/145H04L63/308
Inventor 席春艳高毅辛向磊
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products