Application data encryption method and device, terminal and storage medium
A technology of application data and encryption method, which is applied in the Internet field, can solve problems such as application data leakage, and achieve the effect of ensuring privacy security, improving security, and complete encryption range
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0042] Embodiment 1: According to the instruction of the interface processing logic, the kernel I / O interface can be improved to generate the proxy I / O interface. Specifically, the terminal under this embodiment can intercept the kernel I / O interface through the Hook technology, and improve the program code in the kernel I / O interface to generate a proxy I / O interface, so that the proxy I / O interface can be used in the future. The O interface proxies the kernel I / O interface. Among them, the Hook technology can also be called the hook function; it refers to capturing the function call message through a specific program before the system function (ie program code) in the I / O interface is called, thereby obtaining the function control right in advance, processing Techniques for manipulating (changing) the execution behavior and message passing of the system's functions (that is, program code). That is to say, this embodiment can implement the interception agent on the underlyin...
Embodiment approach 2
[0043] Embodiment 2: According to the instructions of the interface processing logic, the operating system of the counterfeit terminal can be implemented as a simplified version of the virtual system, and the underlying I / O interface of the virtual system can be customized according to the kernel I / O interface in the operating system Retrofit to generate a proxy I / O interface. That is to say, in this embodiment, the proxy I / O interface can be generated by forging the entire operating system, so as to facilitate subsequent implementation of encrypted storage and decrypted reading of application data; Consider compatibility and effectively improve encryption performance.
[0044] Based on the above description, it can be seen that the data management solution mentioned in the embodiment of the present invention can have the following advantages: the encrypted storage / decrypted reading of application data can be realized through the proxy I / O interface, which can effectively impr...
Embodiment approach
[0063] In this implementation manner, the terminal may perform data matching between the target application data and at least one application data indicated by the custom list. Among them, the data hit matching refers to: a matching method of detecting whether the target application data belongs to at least one application data; correspondingly, the specific implementation manner of performing data hit matching on the target application data and at least one application data indicated by the custom list may be: When the custom list includes the application whitelist, it can be determined whether the application whitelist includes the application identifier of the target application; if yes, then determine that the target application data matches at least one application data indicated by the custom list, and then determine that the data hit is successful; If it is not included, it is determined that the target application data does not match at least one application data indica...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



