Acquired data protection method and system based on sandbox

A technology for collecting data and sandbox, which is applied in the field of data collection protection method and system based on sandbox to achieve the effect of protecting user privacy

Inactive Publication Date: 2021-05-25
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that traditional methods cannot effectively prevent applications from maliciously collecting users’ private data, the present invention provides a sandbox-based method and system for collecting data, which can randomize user privacy data collection actions, thereby preventing applications from maliciously collecting data. Collect user's privacy data to achieve strong protection of terminal device data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Acquired data protection method and system based on sandbox
  • Acquired data protection method and system based on sandbox
  • Acquired data protection method and system based on sandbox

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0061]Based on the above embodiment, the difference from the above-described embodiment is, in the embodiment of the present invention, in step S102, further includes the following steps:

[0062]Through the sandbox, Java reflective technology and setting dynamic agent methods are used to generate new databases for the original storage database of the first acquisition data, including:

[0063]During the process of the application of the application inside the sandbox, the dynamic proxy object is obtained from the original storage database of the first acquisition data in the original storage database of the first acquisition data, and then through the dynamic proxy object The original storage database is transformed, and the transformed data is inserted into the original storage database to generate a new database; in the new database, use the fake data table to replace the original real data table, and re-create the true data table.

[0064]In actual applications, the contact data is used ...

Embodiment 3

[0066]Based on the above embodiments, different from the above-described embodiments in that the present invention, the dynamic proxy method of Java reflection technology and settings through the sandbox, as well as the new database, and generated by pre-set new databases The first virtual data of the first acquisition data includes:

[0067]Using the Java Reflection Technology and Dynamic Agent Method through the sandbox, you get the dynamic proxy object from the new database, by querying the fake data table in the new database, data corresponding to the first acquisition data, according to the data, according to the first The first virtual data of the data is collected.

[0068]It should be noted that since the embodiment of the present invention performs a database transformation when the contact is inserted, the contact phone number queried at this time is the pre-saved fake phone number that has been saved first, and it has completed the privacy of the contact data. Protection, becau...

Embodiment 4

[0070]On the basis of the above embodiment, the difference from the above-described embodiment is, in the embodiment, the present invention, the dynamic agent method of Java reflection technology and the setting dynamic proxy method, calling the virtual equipment information service to generate the first Second, the second virtual data of the data, including:

[0071]Java reflection techniques are used in the application inside the sandbox to enable the application to acquire the dynamic agent object to the set dynamic agent method when the second acquisition data of the terminal device is acquired.

[0072]By dynamic agent method, the virtual device information service set in the sandbox is used to generate the virtual device information service set in the sandbox, and the virtual information is returned to the dynamic agent method;

[0073]The application inside the sand box is obtained by obtaining the virtual information by the dynamic agent method, and the virtual information is convert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an acquired data protection method and system based on a sandbox. The method comprises the steps of installing a sandbox on the terminal equipment, installing an application program in the sandbox, and loading the application program installed in the sandbox and starting through the sandbox; when an application program acquires first acquisition data of terminal equipment, generating first virtual data about the first acquisition data through a sandbox by adopting a Java reflection technology and a set dynamic proxy method and through a preset new database, wherein the first collection data comprises at least one of contact data and call record data; when the application program acquires second acquisition data of the terminal equipment, calling the virtual equipment information service to generate second virtual data about the second acquisition data through the sandbox by adopting a Java reflection technology and a set dynamic proxy method, wherein the second acquisition data comprises at least one of position data and sensor data. According to the invention, the user privacy data acquisition action can be randomized.

Description

Technical field[0001]The present invention relates to the field of communication software, and more particularly to a method and system based on a sandbox.Background technique[0002]The malicious application of the mobile terminal will sneak user privacy data in the processing of normal business. For example, obtain the location information of the user, listen to the user's microphone data, read the user's contact information, call record. What's more, malicious applications will speculate on the user's action track information by reading the user's motion sensor information in the case of user shutting down GPS. The user refuses to apply the appropriate permissions, and the application will depend on the exit, and forced the user to install the permissions. These situations have caused serious damage to the user's personal privacy.[0003]Traditionally, methods for preventing malicious applications from collecting data are often based on "Black Box Analysis", "White Box Analysis" and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/455G06F9/445G06F21/57
CPCG06F9/44505G06F9/44526G06F9/45558G06F21/57G06F2009/45587
Inventor 李刚张嵩武宗品李莹李铭乐
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products