Check patentability & draft patents in minutes with Patsnap Eureka AI!

Application data encryption method and device, terminal and storage medium

A technology of application data and encryption method, which is applied in the Internet field, can solve problems such as application data leakage, and achieve the effect of ensuring privacy security, improving security, and complete encryption range

Active Publication Date: 2020-11-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the risk of leakage of these application data, how to improve the security of these application data has become a research hotspot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application data encryption method and device, terminal and storage medium
  • Application data encryption method and device, terminal and storage medium
  • Application data encryption method and device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0042] Embodiment 1: According to the instruction of the interface processing logic, the kernel I / O interface can be improved to generate the proxy I / O interface. Specifically, the terminal under this embodiment can intercept the kernel I / O interface through the Hook technology, and improve the program code in the kernel I / O interface to generate a proxy I / O interface, so that the proxy I / O interface can be used in the future. The O interface proxies the kernel I / O interface. Among them, the Hook technology can also be called the hook function; it refers to capturing the function call message through a specific program before the system function (ie program code) in the I / O interface is called, thereby obtaining the function control right in advance, processing Techniques for manipulating (changing) the execution behavior and message passing of the system's functions (that is, program code). That is to say, this embodiment can implement the interception agent on the underlyin...

Embodiment approach 2

[0043] Embodiment 2: According to the instructions of the interface processing logic, the operating system of the counterfeit terminal can be implemented as a simplified version of the virtual system, and the underlying I / O interface of the virtual system can be customized according to the kernel I / O interface in the operating system Retrofit to generate a proxy I / O interface. That is to say, in this embodiment, the proxy I / O interface can be generated by forging the entire operating system, so as to facilitate subsequent implementation of encrypted storage and decrypted reading of application data; Consider compatibility and effectively improve encryption performance.

[0044] Based on the above description, it can be seen that the data management solution mentioned in the embodiment of the present invention can have the following advantages: the encrypted storage / decrypted reading of application data can be realized through the proxy I / O interface, which can effectively impr...

Embodiment approach

[0063] In this implementation manner, the terminal may perform data matching between the target application data and at least one application data indicated by the custom list. Among them, the data hit matching refers to: a matching method of detecting whether the target application data belongs to at least one application data; correspondingly, the specific implementation manner of performing data hit matching on the target application data and at least one application data indicated by the custom list may be: When the custom list includes the application whitelist, it can be determined whether the application whitelist includes the application identifier of the target application; if yes, then determine that the target application data matches at least one application data indicated by the custom list, and then determine that the data hit is successful; If it is not included, it is determined that the target application data does not match at least one application data indica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an application data encryption method and device, a terminal and a storage medium based on a cloud technology. The method comprises the following steps: running a target application in a target environment configured by a terminal; in response to a storage instruction for target application data of the target application, obtaining an encrypted input interface corresponding to the target application data, wherein the encrypted input interface is generated according to interface processing logic configured by a target environment and a kernel input interface related to target application data; calling an encryption input interface to perform kernel byte-level encryption processing on each byte of data in the target application data to obtain a ciphertext corresponding to each byte of data; calling an encryption input interface to arrange the ciphertext corresponding to each byte data in sequence so as to form encrypted target application data; and storing the encrypted target application data in the local space of the terminal. In this way, leakage of the target application data can be effectively prevented, the safety of the target application data is improved, and therefore the privacy safety of a user is guaranteed.

Description

technical field [0001] The present application relates to the field of Internet technology, specifically to the field of computer technology, and in particular to an application data encryption method, an application data encryption device, a terminal, and a computer storage medium. Background technique [0002] Currently, various applications (applications, APPs), such as social networking applications, browser applications, multimedia playback applications, and the like, are generally installed in terminal devices. During the operation of any application in the terminal, a series of application data is usually generated; for example, the social data received by the social application during operation, and the user account data for logging into the social application; Webpage data loaded during operation; another example is multimedia data generated during operation of a multimedia playback application, and so on. Due to the risk of leakage of these application data, how t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218
Inventor 林龙润
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More