Data security protection method and device, medium and electronic equipment

A data security and security technology, applied in the fields of media and electronic equipment, devices, and data security protection methods, can solve problems such as hidden dangers of enterprise confidential information leakage, and achieve the effects of improving data security, eliminating leakage, and reducing development costs.

Inactive Publication Date: 2021-12-24
北京指掌易科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes the image data will be retained in the third-party application, leaving a hidden danger of corporate confidential information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and device, medium and electronic equipment
  • Data security protection method and device, medium and electronic equipment
  • Data security protection method and device, medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 It is a flow chart of a data security protection method provided in Embodiment 1 of the present application. This embodiment is applicable to the situation of using the office application to take pictures during the process of using the office application to work. The method can be executed by the data security protection device provided in the embodiment of the present application, the device can be realized by software and / or hardware, and can be integrated into the electronic device running the system.

[0024] Such as figure 1 As shown, the data security protection method includes:

[0025] S110. If the interceptor component in the target application package intercepts the camera call instruction generated by the original application program, modify the camera call instruction.

[0026] After the target application package is installed on the terminal device, the target application package is started. Specifically, the bootstrap component is started first...

Embodiment 2

[0043] figure 2 It is a flow chart of another data security protection method provided in Embodiment 2 of the present application. This embodiment is further optimized on the basis of the foregoing embodiments. Specifically, the modification of the camera call instruction includes: modifying the camera component call address preset in the camera call instruction to the security call address corresponding to the security camera component; The data storage path preset in the instruction is modified to the security storage path corresponding to the security camera component.

[0044] Such as figure 2 As shown, the data security protection method includes:

[0045] S210. If the interceptor component in the target application package intercepts the camera call command generated by the original application program, modify the camera component call address preset in the camera call command to the security call corresponding to the security camera component address.

[0046] Am...

Embodiment 3

[0052] image 3 It is a flow chart of another data security protection method provided in Embodiment 3 of the present application. This embodiment is further optimized on the basis of the foregoing embodiments. The specific optimization is that, according to the modification result of the camera call instruction, call the security camera component in the target application package to capture image data, and feed the image data back to the original application program, including: according to the security call address, Calling the secure camera component to take image data; encrypting the image data through the secure camera component, and storing the encrypted image data in the secure storage path; generating a data read link according to the secure storage path , and feed back the data read link to the original application program.

[0053] Such as image 3 As shown, the data security protection method includes:

[0054] S310. If the interceptor component in the target ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data security protection method and device, a medium and electronic equipment. The method comprises the following steps: if an interceptor component in a target application program package intercepts a camera calling instruction generated by an original application program, modifying the camera calling instruction; wherein the original application program and the interceptor component are initialized through a guider component in a target application program package; and calling a security camera component in a target application package to shoot image data according to a modification result of the camera calling instruction, and feeding back the image data to the original application. By executing the technical scheme provided by the invention, the hidden danger of leakage of confidential information of an enterprise can be eliminated, the data security is improved, and meanwhile, the development cost is reduced.

Description

technical field [0001] The embodiments of the present application relate to the technical field of computer applications, and in particular to a data security protection method, device, medium, and electronic equipment. Background technique [0002] The rapid development of Internet technology and the popularization of smart phones have changed the way enterprises work, allowing enterprises to get rid of their dependence on offline fixed offices, allowing enterprises and employees to realize cross-regional mobile office, reducing high office costs and improving work efficiency. [0003] While mobile office brings many benefits, it also poses a threat to the data security of corporate confidential information. In the process of working with office applications, it is often necessary to use image data. Under normal circumstances, image data often needs to be jumped from the enterprise application to the outside, and obtained through a third-party application. As a result, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/57G06F21/52H04N5/232
CPCG06F21/60G06F21/57G06F21/52H04N23/617
Inventor 赵洪巍王伟
Owner 北京指掌易科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products