Unlock instant, AI-driven research and patent intelligence for your innovation.

Desensitization encryption method for information sent by chat tool of mobile equipment

A chat tool and technology for sending information, applied in the computer field, can solve problems such as being easily infested by Trojan horses, viruses, and hidden dangers of mobile phone security, and achieve the effect of strong versatility and good support effect.

Pending Publication Date: 2020-03-03
山东华软金盾软件股份有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To a large extent, any desired data can be obtained through the root method, and the improvement of permissions after rooting can realize many functions that can only be realized at the system level, such as: forced modification of third-party data or disabling some functions of third-party applications, etc., but The solution must be that the Android device has obtained root privileges, the physical characteristics of the hardware itself and the standards of major hardware manufacturers are different, and the rooted mobile phone has great security risks, and it is easy to be invaded by Trojan horses and viruses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Desensitization encryption method for information sent by chat tool of mobile equipment
  • Desensitization encryption method for information sent by chat tool of mobile equipment
  • Desensitization encryption method for information sent by chat tool of mobile equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] The English abbreviations or technical terms involved in this embodiment are explained as follows:

[0024] Service is a component that runs in the background for an indeterminate period of time and does not interact with the user. It is invisible and has no interface. We can start a service Service to play music, or record the change of geographic information location, or start a service to run and monitor some kind of action all the time.

[0025] Metadata is a set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A desensitization encryption method for information sent by a chat tool of a mobile device comprises the following steps: step 1, defining a Service class in an Android, and enabling the class to inherit a self-assistance class; 2, further declaring the service class in the step 1 in a configuration file automatically generated by the Android project; 3, realizing an auxiliary service event processing method and an auxiliary service terminal method in the subclass service; 4, setting auxiliary functions in the mobile phone to find the auxiliary class realized in the step 3, and then opening the auxiliary class; 5, according to the strategy of the secret-related field issued from the server, starting an examination mechanism according to the monitored text content, and judging whether the currently monitored content has violation behaviors or not; according to the method, the content input by the soft keyboard can be acquired and monitored, and then the sensitive vocabulary designed inthe monitored content is forcibly encrypted and desensitized.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method for desensitizing and encrypting information sent by a chat tool of a mobile device. Background technique [0002] At present, more and more efforts are being invested in the protection of sensitive information leaks and the tracing of leakers in departments or institutions with high confidentiality. For example, instant messaging software is not allowed in relevant departments or sending some related information to third-party forums Confidential or sensitive text, and will also monitor the content of the sent text to implement relevant review mechanisms and track secret-related personnel. [0003] In the existing solutions, it is generally necessary to root the mobile phone and then use the xposed framework to forcibly modify the sent content, or not allow the use of certain modules of the application. [0004] To a large extent, any desired data can be obtained thr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L29/06
CPCG06F21/602H04L63/0428
Inventor 吕法文
Owner 山东华软金盾软件股份有限公司