Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and apparatus for protect privacy data of a mobile terminal user

A mobile terminal, privacy data technology, applied in the field of information security, can solve the problems of poor user experience, difficult to restrict effects, and difficulty in generating any prompts for user privacy threats, so as to improve user experience, save system resources, and improve efficiency.

Inactive Publication Date: 2019-02-26
WUHAN ANTIY MOBILE SECURITY
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to deal with malicious code attacks, security personnel have invented a variety of protection methods, including static malicious code detection (that is, traditional antivirus engines), rights management (through the control of rights to protect private data), and other technologies. To a certain extent, the problem of malicious code is solved, but there are still some limitations. For example, static malicious code detection is to detect whether there is malicious code that meets the predefined rules in the captured code after the antivirus engine is started. This method cannot provide real-time protection. , and can only provide qualitative threat descriptions for detected malicious applications (such as applications that may steal user text messages, photos, etc.), users cannot know exactly whether malicious behaviors have occurred and what adverse consequences may result; the rights management function allows users It can independently limit the sensitive permissions of the application, but ordinary users have a vague concept of permissions and usage methods, and often do not make appropriate settings, and it is difficult to play a restrictive role. When users are threatened by privacy threats, it is even difficult to generate any prompts
In addition, users generally have different definitions of private information. The same protection for all private information cannot meet the real needs of users, and the user experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and apparatus for protect privacy data of a mobile terminal user
  • A method and apparatus for protect privacy data of a mobile terminal user
  • A method and apparatus for protect privacy data of a mobile terminal user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] The invention discloses a mobile terminal user privacy data protection device, such as figure 1 As shown, the device includes a privacy data collection module 10, a warning strategy module 20, and a user interaction module 30. According to the division of installation permissions, the privacy data collection module 10 and the warning strategy module 20 are located at the system layer, and the user interaction module 30 is located at the application layer. :

[0028] The privacy data collection module 10 is distributed in several privacy data interfaces corresponding to predefined privacy da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses A method and apparatus for protect privacy data of a mobile terminal user.The privacy data collection module can monitor the access of the application program to the user's privacy data in real time, and the warning policy module stores and analyzes the access information, and judges whether the application program needs to be judged on the risk or not according to the predefined rules, and generates the corresponding disposal policy. Generating different disposal strategies for privacy data according to predefined rules is conducive to meet the actual needs of users and enhance the user experience; Moreover, the efficiency of privacy protection is greatly improved and the system resources are saved because all applications do not need to be detected. In addition, the user can know exactly whether the malicious behavior has occurred and the possible adverse consequences according to the access information policy received by the user interaction module, and can process the malicious behavior in a timely and effective manner by using the provided disposal strategy, which greatly improves the effect of privacy data protection. The invention discloses a mobile terminal user privacy data protection method.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a mobile terminal user privacy data protection method and device. Background technique [0002] At present, mobile terminals are becoming more and more popular, carrying more and more user privacy information on them, and more and more malicious codes launch attacks on mobile phone privacy information, and the situation is becoming more and more serious. [0003] In order to deal with malicious code attacks, security personnel have invented a variety of protection methods, including static malicious code detection (that is, traditional antivirus engines), rights management (through the control of rights to protect private data), and other technologies. To a certain extent, the problem of malicious code is solved, but there are still some limitations. For example, static malicious code detection is to detect whether there is malicious code that meets the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/55G06F21/56
CPCG06F21/554G06F21/566G06F21/6245
Inventor 张超严志润陈相如马志远
Owner WUHAN ANTIY MOBILE SECURITY