Commercial mobile operating system information protection method based on cloud encryption service

A mobile operating system and encryption service technology, applied in the field of commercial mobile operating system information protection, can solve the problems of application background server information fraud, APP application end injection and Trojan horse, network transmission information tampering and stealing, etc., to avoid being repackaged, The effect of convenient secondary development

Pending Publication Date: 2020-07-10
深圳财通宝网络科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The main purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art, and provide a commercial mobile operating system information protection method based on cloud encryption services. Fraud, network transmission information is tampered with and stolen, APP application end is injected with Trojan horses, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Commercial mobile operating system information protection method based on cloud encryption service
  • Commercial mobile operating system information protection method based on cloud encryption service
  • Commercial mobile operating system information protection method based on cloud encryption service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Such as Figure 4 , 5 , a security solution for location services in the Android system

[0055] 1) Implementation of Android native location service and fraud principle

[0056] a) Location service implementation

[0057] Android positioning service integrates GPS positioning, mobile communication, navigation and other technologies to provide comprehensive application services related to spatial location. In recent years, location-based services have developed more rapidly, involving all aspects of business, medical care, work and life, and providing users with a series of services such as positioning, tracking and warning of sensitive areas.

[0058] b) Java framework development interface:

[0059] The Android platform supports APIs that provide location services, and the LocationManager and LocationProviders objects are mainly used in the development process.

[0060] -LocationManager:

[0061] It is used to obtain the current location, track the movement rout...

Embodiment 2

[0118] Embodiment 2: Safe Interactive Interface

[0119] There are various production and management systems in enterprise users. In the process of evolving to the mobile terminal, facing the security threats of the open network environment, there is no comprehensive solution. Through the secure interaction interface provided by the commercial mobile operating system information security protection method based on cloud encryption services, the APP can access its own information system through the secure interface, thereby realizing a one-stop mobile terminal security solution without spending huge sums of money to process mobile terminal information security interaction scheme. The enterprise-level security interaction interface provides a standardized information interface for enterprises, allowing the enterprise's mobile applications (APP) to realize safe and fraud-free information interaction through the security interaction interface.

[0120] The interaction process of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a commercial mobile operating system information protection method based on cloud encryption service. The method comprises the following steps: 1, initializing a mobile systemend certificate service and a cloud encryption server; and 2, the APP interacting with a background cloud encryption server through certificate service of the system. In order to solve the problem that an android mobile operating system application (app) 'cloud (APP background), management (network) and end (APP running environment)' simultaneously faces threats, the innovation of the invention lies in that the certificate service is introduced into the system, only when the certificate service operates normally, the APP is in a trusted state, all information interaction of the APP is encrypted through the certificate service of the system, and each APP has an independent encryption certificate. Each terminal has a certificate associated with hardware. Besides the certificate service dynamic tamper-proof fingerprint, the background of the application APP can also define a composite tamper-proof fingerprint, so that a multi-factor encryption and tamper-proof system is formed.

Description

technical field [0001] The invention relates to the field of mobile operating system cloud encryption communication, in particular to a commercial mobile operating system information protection method based on cloud encryption service. Background technique [0002] At present, my country's mobile Internet is highly developed, and the penetration rate of smartphones and terminals has greatly exceeded that of PCs. The convenience of mobile terminals brings users higher efficiency, richer experience and more fun in their work, life and entertainment. Currently, the mainstream operating systems for smartphones include Android and IOS. Android has more market penetration due to its openness. Regardless of the Android and IOS systems, the initial design is a consumer-grade product, and there is no design for information security that is concerned by enterprises and institutions, so information security is in a state of complete laissez-faire. In addition, due to system design and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/02H04W12/04H04W12/06
CPCH04W12/02H04W12/04H04W12/37H04W12/069
Inventor 范泽武
Owner 深圳财通宝网络科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products