Privacy information leakage prevention method and device as well as terminal

A technology of private information and private data, which is applied in the field of preventing privacy information leakage, can solve the problems of not being able to adapt to changes in the application security situation, security policies are not flexible enough, etc., and achieve the effect of stability and universal applicability

Active Publication Date: 2017-04-26
ZTE CORP
View PDF19 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a method, device and terminal for preventing privacy information leakage, which overco

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy information leakage prevention method and device as well as terminal
  • Privacy information leakage prevention method and device as well as terminal
  • Privacy information leakage prevention method and device as well as terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0042] In the first embodiment of the present invention, a method for preventing leakage of private information, such as figure 1 shown, including the following specific steps:

[0043] Step S101, determining the application that first accesses the private data and then performs the pre-propagation operation;

[0044] Specifically, determine the applications that first access private data and then perform pre-propagation operations, including:

[0045] According to the operation information recorded by the application behavior control service in the operating system for each application, determine the application that first accesses the private data and then performs the pre-propagation operation; the recorded operation information includes: application name, operation type and time when the operation is performed, in,

[0046] The operation type is used to determine whether the application performs access to private data and pre-propagation operations;

[0047] The time wh...

no. 2 example

[0057] The second embodiment of the present invention is a method for preventing privacy information leakage. The method in this embodiment is substantially the same as that in the first embodiment, the difference is that in the method in this embodiment, the recorded operation information, Also includes: the last time the app was denied an action;

[0058] Such as figure 2 As shown, the method for preventing privacy information leakage also includes:

[0059] Step S103 , judging whether the number of times the application is rejected for accessing the private data exceeds a set number, and if the number exceeds the set number, a risk prompt is given to the user for the application.

[0060] It should be noted that, in this embodiment, step S103 and step S102 are judged based on different aspects, and there is no strict sequence of execution.

no. 3 example

[0061] The third embodiment of the present invention corresponds to the first embodiment. This embodiment introduces a device for preventing leakage of private information, such as image 3 shown, including the following components:

[0062] 1) A determining module 301, configured to determine an application that first accesses private data and then performs a pre-propagation operation;

[0063] Specifically, the determination module 301 is used for:

[0064] According to the operation information recorded by the application behavior control service in the operating system for each application, determine the application that first accesses the private data and then performs the pre-propagation operation; the recorded operation information includes: application name, operation type and time when the operation is performed, in,

[0065] The operation type is used to determine whether the application performs access to private data and pre-propagation operations;

[0066] The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy information leakage prevention method and device as well as a terminal. The method comprises: after determining that privacy data is accessed, performing a pre-spreading operation application; judging whether the privacy data accessing time of the application meets a preset condition; and when the time meets the preset condition, performing risk prompt on the user by aiming at the application. According to the privacy information leakage prevention method and device as well as the terminal, which are provided by the invention, an operation behavior of a normal application an abnormal application to the privacy data can be analyzed by utilizing application behavior operation data collected by the system, so that the privacy data leakage risk can be prompted to the user immediately, the behavior of the application can be further limited, and the privacy data of the user can be prevented from being leaked. The privacy information leakage prevention method and device as well as the terminal further have the advantages that the user does not need professional safety knowledge; the extracted features have stability and universal applicability and can adapt to continuously changing malicious applications.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, device and terminal for preventing privacy information leakage. Background technique [0002] Various application behavior operation data are collected in the Android system, and these data are not currently being effectively utilized. Leakage of user privacy information is an important part of mobile phone security. The essence of privacy information leakage is that the application illegally obtains user privacy information and spreads it beyond the range of the mobile phone. [0003] At present, there are two typical privacy data leakage prevention methods: the first is to pre-configure various application security policies, and when it is monitored that the application intends to call system resources, it is judged according to the pre-configured security policy whether the application has the ability to call the If there is no permission for th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F21/62
Inventor 古幼鹏
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products