Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sandbox-based inherent data protection method and system

A data protection and sandbox technology, applied in digital data processing, platform integrity maintenance, program control design, etc., can solve problems such as high cost and inability to actually solve the problem of acquiring and tracking and identifying user identity of inherent data of terminal equipment. , to achieve the effect of data security and reliability, ensuring data isolation

Inactive Publication Date: 2021-05-25
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cost of these two methods is too high to actually solve the problem of obtaining the inherent data of the terminal device and tracking and identifying the user's identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sandbox-based inherent data protection method and system
  • Sandbox-based inherent data protection method and system
  • Sandbox-based inherent data protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Such as figure 1 As shown, the present invention proposes a sandbox-based inherent data protection method, comprising the following steps:

[0055] S101: Install a sandbox on the terminal device, install an application program inside the sandbox, and start the application program installed inside the sandbox by loading the sandbox;

[0056] Specifically, as a third-party application, the sandbox must be installed on the terminal device before it can run. As a security sandbox, the sandbox has its own closed private space and must have applications running in the sandbox, so running in The applications in the sandbox must be installed inside the sandbox, so as to ensure that the content belonging to the application only exists inside the sandbox and will not be accessed by applications outside the sandbox, and the data inside and outside the sandbox are isolated , making sandbox data safe and reliable.

[0057] S102: When the application program inside the sandbox obta...

Embodiment 2

[0063] On the basis of the above-mentioned embodiment, the difference from the above-mentioned embodiment is that in the embodiment of the present invention, the sandbox uses the Java reflection technology and the set dynamic proxy method to call the virtual device information service to generate information about the first The first virtual data of the inherent data specifically includes:

[0064] Java reflection technology is adopted in the application program inside the sandbox, so that the application program is transferred to the dynamic proxy method provided when obtaining the first intrinsic data of the terminal device;

[0065] calling a virtual device information service set in the sandbox by using an inter-process communication mechanism through a dynamic proxy method to generate first virtual data about the first inherent data, and returning the first virtual data to the dynamic proxy method;

[0066] An application program inside the sandbox obtains the first virtu...

Embodiment 3

[0070] On the basis of the above-mentioned embodiments, the difference from the above-mentioned embodiments is that in the embodiments of the present invention, the first information about the second inherent data is generated by loading the system information class through the sandbox and using the Java reflection technology. 2. Virtual data, specifically including:

[0071] During the process startup process of the application program inside the sandbox, the system information class of the terminal device is loaded through the sandbox, and then the static member variables of the second inherent data of the system information class are replaced and protected by using Java reflection technology Second dummy data is generated with respect to the second intrinsic data.

[0072] Specifically, when the method of the present invention is not used, that is, under normal circumstances, a third-party application program running on a terminal device directly calls the static member var...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a sandbox-based inherent data protection method and system. The method comprises the steps of installing a sandbox on the terminal equipment, installing an application program in the sandbox, and loading the application program installed in the sandbox and starting through the sandbox; when an application program acquires first inherent data of the terminal equipment, calling a virtual equipment information service to generate first virtual data about the first inherent data by using a Java reflex technology and a set dynamic proxy method through a sandbox, wherein the first inherent data comprises at least one of a mobile phone number, an IMEI, an IMSI and an MAC address; when the application program obtains second inherent data of the terminal equipment, loading a system information class of the terminal equipment through the sandbox and using a Java reflection technology to generate second virtual data related to the second inherent data, wherein the second inherent data comprises at least one of the terminal equipment model and the terminal operating system version. According to the invention, the inherent data of the terminal equipment can be powerfully protected, and the security of user privacy is improved.

Description

technical field [0001] The invention relates to the technical field of communication software, in particular to a sandbox-based inherent data protection method and system. Background technique [0002] The application program of the mobile terminal device is based on commercial purposes, and is keen to obtain the inherent data in the mobile device where the application is located, as a unique identifier to mark the unique identity of the device. This type of inherent data refers to the data on the mobile terminal device that does not change over time, such as the device model, IMEI, and MAC address of the communication terminal; the mobile phone number and IMSI of the SIM card; the operating system version of the terminal ROM, etc. These inherent data are like "device fingerprints" and cannot be easily modified. [0003] Even if a privacy-conscious user registers a new account in the app, the app can still identify the device based on the inherent data, know that the "new I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F9/445G06F21/57
CPCG06F9/44505G06F9/44526G06F9/45558G06F21/57G06F2009/45587
Inventor 李刚张嵩武宗品魏康威武耀威
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products