Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dredging and blocking combined privacy protection method and system

A technology combining privacy protection system and unblocking, which is applied in the field of privacy protection method and system combined with unblocking, can solve problems such as program crash, loose audit system, and limited application functions

Active Publication Date: 2016-12-07
CHINA UNIV OF GEOSCIENCES (WUHAN)
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, the audit system of the domestic third-party market is not strict, which makes the security problem of the Android platform worse and threatens the privacy of users at all times.
[0005] The traditional security solution is to intercept sensitive permissions, which usually leads to limited application functions and even program crashes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dredging and blocking combined privacy protection method and system
  • Dredging and blocking combined privacy protection method and system
  • Dredging and blocking combined privacy protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] like figure 1 as shown, figure 1 It is a schematic diagram of the flow chart of authority dredging and prevention and control in the present invention. Introduced the Android API Hook technology based on the Xposed framework, and designed the deception function strategy and the jump function strategy. For the deception function strategy: hook the sensitive permissions involved in the application, implant a deception function in the hooked function, and return a false value to it when the application access sensitive permissions are monitored; for the jump function strategy: extract malicious applications For the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dredging and blocking combined privacy protection method and system. The method comprises steps as follows: 1) an application is scanned, all permissions of the application are listed, and whether the installed application is involved with a sensitive permission is judged; 2) as for the application involved with the sensitive permission, a user is reminded to use a cheat function strategy or a jump function strategy; the cheat function strategy specifically comprises steps as follows: the sensitive permission involved by an application program is hooked, a cheating function is implanted in the hooked function, and when the sensitive permission of application access is monitored, a false value is returned for the application; the jump function strategy specifically comprises steps as follows: a permission involved with a malicious application is extracted, and calling of the malicious application permission is bypassed by modifying an entry address of a permission function; 3) according to the strategy selected by a user, when the sensitive permission applies data, the false value is returned to the sensitive permission or permission calling is directly jumped. The security problems of privacy disclosure, permission abuse and the like of an existing application of a mobile phone can be effectively solved.

Description

technical field [0001] The present invention relates to information security technology, and in particular to a privacy protection method and system combining dredging and blocking. Background technique [0002] The Android operating system is a mobile device operating system jointly developed by Google and the Open Handset Alliance. It has been nearly seven years since the first version of Android (Android 1.1) was released in September 2008, and its development is still showing a rapid growth trend. As an open mobile Internet operating system, Android has become the most widely used mobile Internet platform. According to data from the global market research company Gartner, the global market share of the Android system was 80.7% in 2014, with a total sales volume of 1.245 billion units, firmly occupying the first place in the global smartphone market share. [0003] 360 Internet Security Center classified and counted the Android malicious programs monitored in 2014 accor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 宋军王力哲杨帆王开心赵健顿明
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products