Unlock instant, AI-driven research and patent intelligence for your innovation.

Non-invasive data protection method, device, terminal and storage medium

A data protection, non-intrusive technology, applied in the Internet field, can solve the problems of data theft, data acquisition by applications, complex network environment, etc., to achieve the effect of protecting security and ensuring smooth operation

Active Publication Date: 2020-09-29
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to the complex network environment, when the network condition is not good, the application program may not be able to obtain the required data from the background server, resulting in the failure of the application function and even affecting the normal use of the application program
And the data stored in the background server also has the risk of being stolen. Once stolen, the user's private information will be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-invasive data protection method, device, terminal and storage medium
  • Non-invasive data protection method, device, terminal and storage medium
  • Non-invasive data protection method, device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solution and advantages of the present disclosure clearer, the implementation manners of the present disclosure will be further described in detail below in conjunction with the accompanying drawings.

[0046] It can be understood that the terms "each", "multiple" and "any" used in the embodiments of the present disclosure, etc., a plurality includes two or more, and each refers to each of the corresponding plurality, Any refers to any one of the corresponding plurality. For example, the plurality of words includes 10 words, and each word refers to each of the 10 words, and any word refers to any one of the 10 words.

[0047] Before implementing the embodiments of the present disclosure, terms involved in the embodiments of the present disclosure are explained first.

[0048] Non-intrusive is relative to intrusive. Non-intrusive can apply the functions of the application client to the operating system framework, and can also prov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a non-invasive data protection method and device, a terminal and a storage medium, and belongs to the technical field of the Internet. The method comprises the following steps:generating a byte code instrumentation subclass used for inserting a byte code into a parameter value of a specified parameter; and in response to a read-write operation on the parameter value of thespecified parameter, inserting the byte code into the parameter value based on the byte code instrumentation subclass. A first specified type file embedded with the byte code instrumentation subclassis converted into an executable third specified type file, and the byte code is inserted into the parameter value when the parameter value of the specified parameter in the third specified type file is read and written. Because the data does not need to be stored in a server, the required data can be obtained when the network environment is poor, the smooth operation of an application program is ensured, the original content of the data is destroyed after the byte code is inserted into the data, and the original data content cannot be obtained even if the byte code is stolen, so that the security of the private information of the user is protected.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and in particular to a non-intrusive data protection method, device, terminal and storage medium. Background technique [0002] In modern life, in order to meet usage requirements, many users install various applications in terminals, for example, social networking applications, payment applications, shopping applications, navigation applications, and so on. Since these applications may obtain data related to user privacy information during registration or use, such as mobile phone numbers, ID numbers, bank card account numbers, and passwords, etc., once these data are stolen by criminals, it may cause unnecessary harm to users. Therefore, in order to protect the user's private information, it is necessary to protect the data of the application. [0003] When the related technology protects the data of the application program, the data related to the user's privacy information in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/602G06F21/6245
Inventor 黄辉煌
Owner TENCENT TECH (SHENZHEN) CO LTD