CN107341406A - A kind of method and terminal for protecting privacy of user data - Google Patents

A kind of method and terminal for protecting privacy of user data Download PDF

Info

Publication number
CN107341406A
CN107341406A CN201710543629.4A CN201710543629A CN107341406A CN 107341406 A CN107341406 A CN 107341406A CN 201710543629 A CN201710543629 A CN 201710543629A CN 107341406 A CN107341406 A CN 107341406A
Authority
CN
China
Prior art keywords
solicited message
message type
virtual
information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710543629.4A
Other languages
Chinese (zh)
Inventor
王务志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qianxin Technology Co Ltd
Original Assignee
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qianxin Technology Co Ltd filed Critical Beijing Qianxin Technology Co Ltd
Priority to CN201710543629.4A priority Critical patent/CN107341406A/en
Publication of CN107341406A publication Critical patent/CN107341406A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides a kind of method and terminal for protecting privacy of user data, and methods described includes:During application program is run, if getting the information acquisition request that the application program is sent, the solicited message type in request is obtained according to described information, generates virtual information corresponding with the solicited message type;Access rights according to the virtual information opening to the application program, so that the application program can not get privacy of user data.The terminal performs the above method.The method and terminal of protection privacy of user data provided in an embodiment of the present invention, enable to user normal use APP, real user profile will not be leaked to APP again, so as to be effectively guaranteed the safety of individual subscriber privacy.

Description

A kind of method and terminal for protecting privacy of user data
Technical field
The present embodiments relate to data security arts, and in particular to a kind of method for protecting privacy of user data and end End.
Background technology
The operating system of existing user terminal (can be mobile phone), by taking Android as an example, due to App developer (business) no Android development specifications is followed, in the App that user uses is issued to, requires to use inessential authority by force, otherwise user is not Can normal use App;Existing App selfdisciplines are not rigorous enough, go beyond one's commission and read other App data, arouse miscellaneous equipment from the background; After existing android system may be connected to Windows, using system data is obtained after debugging mode completely, very strong wind be present Danger, above-mentioned APP bring potential safety hazard to the privacy problem of terminal user, at present still without effective solution party Method.
Therefore, how can either normal use APP, real user profile will not be leaked to APP again, so as to ensure to use The safety of family individual privacy, turning into solve the problems, such as.
The content of the invention
The problem of existing for prior art, the embodiment of the present invention provide a kind of method for protecting privacy of user data and end End.
In a first aspect, the embodiment of the present invention provides a kind of method for protecting privacy of user data, methods described includes:
During application program is run, if getting the information acquisition request that the application program is sent, basis Described information obtains the solicited message type in request, generates virtual information corresponding with the solicited message type;
Access rights according to the virtual information opening to the application program, so that the application program can not obtain To privacy of user data.
Second aspect, the embodiment of the present invention provide a kind of terminal for protecting privacy of user data, and the terminal includes:
Generation unit, during being run in application program, obtained if getting the information that the application program is sent Request is taken, then the solicited message type in request is obtained according to described information, is generated corresponding with the solicited message type empty Intend information;
Open cell, for the access rights according to the virtual information opening to the application program, so that described should Privacy of user data can not be got with program.
The third aspect, the embodiment of the present invention provide the terminal of another protection privacy of user data, including:Processor, deposit Reservoir and bus, wherein,
The processor and the memory complete mutual communication by the bus;
The memory storage has and by the programmed instruction of the computing device, the processor described program can be called to refer to Order is able to carry out following method:
During application program is run, if getting the information acquisition request that the application program is sent, basis Described information obtains the solicited message type in request, generates virtual information corresponding with the solicited message type;
Access rights according to the virtual information opening to the application program, so that the application program can not obtain To privacy of user data.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium storing program for executing, including:
The non-transient computer readable storage medium storing program for executing stores computer instruction, and the computer instruction makes the computer Perform following method:
During application program is run, if getting the information acquisition request that the application program is sent, basis Described information obtains the solicited message type in request, generates virtual information corresponding with the solicited message type;
Access rights according to the virtual information opening to the application program, so that the application program can not obtain To privacy of user data.
The method and terminal of protection privacy of user data provided in an embodiment of the present invention, enable to user's normal use APP, real user profile will not be leaked to APP again, so as to be effectively guaranteed the safety of individual subscriber privacy.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs Some bright embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can be with root Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the method flow schematic diagram that the embodiment of the present invention protects privacy of user data;
Fig. 2 is the sectional drawing for the method log-in interface that the embodiment of the present invention protects privacy of user data;
Fig. 3 is that the embodiment of the present invention protects the method for privacy of user data to create the sectional drawing of dedicated network tunnel interfaces;
Fig. 4 is that the embodiment of the present invention protects the method for privacy of user data to add the sectional drawing at the unlocking pattern interface;
Fig. 5 is that the embodiment of the present invention protects the method for privacy of user data to add the sectional drawing at unlocking pin interface;
Fig. 6 is that the embodiment of the present invention protects the method for privacy of user data to add the sectional drawing at fingerprint interface;
Fig. 7 is that the embodiment of the present invention protects the method prompting of privacy of user data to log in successful synchronization business data interface Sectional drawing;
Fig. 8 is that the embodiment of the present invention protects the method for privacy of user data to open protection or closes application program circle of protection The sectional drawing in face;
Fig. 9 is the terminal structure schematic diagram that the embodiment of the present invention protects privacy of user data;
Figure 10 is end entity structural representation provided in an embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 is the method flow schematic diagram that the embodiment of the present invention protects privacy of user data, as shown in figure 1, the present invention is real The method for applying a kind of protection privacy of user data of example offer, comprises the following steps:
S1:During application program is run, if getting the information acquisition request that the application program is sent, root The solicited message type in request is obtained according to described information, generates virtual information corresponding with the solicited message type.
Specifically, terminal is during application program is run, if getting the acquisition of information that the application program is sent Request, then the solicited message type in request is obtained according to described information, generated corresponding with the solicited message type virtual Information.APP (application program) is application abbreviation, abbreviation APP.It should be noted that:The user for running the APP is whole Hold (can be mobile phone) to need to develop jointly operating system with cell phone manufacturer, and be built-in with special encryption chip, in user terminal The preset special encryption chip, cryptographic services interface when dispatching from the factory.Terminal built-in has the target APP (Aegis) for performing this method, Bottom authority, hardware encryption module are asked, mobile phone is not replaced by root, the Boot starting modules of system, operating system It is official's operating system component, and was not changed by third party.During using the APP, the APP will obtain the partial information of user Afterwards, can open to the APP access rights, so that user normally accesses.Information acquisition request can be understood as what is obtained The request of User Part information, because the type of partial information is varied, each type of solicited message is all corresponding with accordingly Virtual information.The mode of generation virtual information can be realized by way of virtual machine.Solicited message type can include Seven types, wherein, the first solicited message can include obtaining user's short message, multimedia message, telephony recording, message registration, address list Solicited message, but be not especially limited, then generate virtually APP (virtual first APP) corresponding with the solicited message, this is virtual The information content corresponding with the solicited message is written with APP, by taking message registration as an example, is illustrated as follows:User is whole The nearest real message registration in end is 1 day 9 October in 2016:00 dials to A and has carried out the call of 5 minutes, in order to Allow user's normal use APP, and be not desired to provide real message registration for the APP, therefore, generate virtual call note Record virtual APP (virtual first APP) and to virtual call record in write generate at random virtual call record (can be 2 days 9 October in 2016:00 dials to B and has carried out the call of 10 minutes), and be sent to the APP, it is that the APP is received and It is not real message registration, but the APP and can not discerns whether it is real message registration, has just opened to the APP's Access rights so that user can normally access the APP.
Wherein, the second solicited message can include network ip address, MAC Address (hardware identification address), but not make specific Limit, then generate corresponding with the solicited message virtual network IP address and/or virtual mac address (virtual network address information Virtual network IP address, virtual mac address can be included).For network ip address:At random IP address is fictionalized virtually to be led to News, real IP will be encrypted after being connected by VPN and used, will not be compromised;For MAC Address:By changing user end at random The MAC Address (hardware identification address) at end, reach the purpose of protection real user terminal.
Wherein, the 3rd solicited message can include unit type, EIC equipment identification code (IMEI), NFC device, bluetooth equipment, But it is not especially limited, then generation and unit type, EIC equipment identification code (IMEI), NFC device, bluetooth equipment are corresponding empty respectively Intend terminal device model, virtual unit identification code International Mobile Equipment Identity code IMEI number, virtual unit near-field communication technology (NFC) physical identification code and bluetooth physical identification code.
Wherein, the 4th solicited message can include GPS location information, and life is realized by the position coordinates of virtual user terminal Into random GPS location data, used for the APP, prevent from exposing actual position.
Wherein, the 5th solicited message can include clipbook, random to generate clipbook number by virtual clipboard content According to for APP uses.
Wherein, the 6th solicited message can include User Identity, can include the cell-phone number of user, by fictionalizing Cell-phone number, used for the APP, prevent from exposing real handset number.
Wherein, the 7th solicited message can include document information, fictionalize a region (the first virtual region) to store The file generated during the APP uses, and the actual area that a region stores with document is isolated.
7th solicited message can include video information, audio-frequency information and image information, for video information, fictionalize one Individual region (the second virtual region), so that the APP calls this region uploaded videos;Similarly, for audio-frequency information and image information, Repeat no more.
S2:Access rights according to the virtual information opening to the application program, so that the application program can not Get privacy of user data.
Specifically, access rights of the terminal according to the virtual information opening to the application program, so that the application Program can not get privacy of user data.The virtual information that the APP is received not is real information, but the APP is simultaneously It can not discern whether it is real information, just open the access rights to the APP so that user can normally access the APP.
The method of protection privacy of user data provided in an embodiment of the present invention, enables to user normal use APP, and not Real user profile can be leaked to APP, so as to be effectively guaranteed the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the first solicited message type;Accordingly, it is described The solicited message type in request is then obtained according to described information, generates virtual information corresponding with the solicited message type, Including:
According to the first solicited message type, generation virtual first application corresponding with the first solicited message type Program, wherein, the information content corresponding with the first solicited message type is carried in virtual first application program.
Specifically, terminal is corresponding with the first solicited message type according to the first solicited message type, generation Virtual first application program, wherein, carried in virtual first application program corresponding with the first solicited message type The information content.Above-described embodiment is can refer to, is repeated no more.
The method of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the first solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the second solicited message type;Accordingly, it is described The solicited message type in request is then obtained according to described information, generates virtual information corresponding with the solicited message type, Including:
It is random to generate virtual network corresponding with the second solicited message type according to the second solicited message type Address information.
Specifically, terminal is according to the second solicited message type, random generation and the second solicited message type pair The virtual network address information answered.Above-described embodiment is can refer to, is repeated no more.
The method of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the second solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the 3rd solicited message type;Accordingly, it is described The solicited message type in request is then obtained according to described information, generates virtual information corresponding with the solicited message type, Including:
According to the 3rd solicited message type, virtual terminal equipment corresponding with the 3rd solicited message type is generated Mark, wherein, the virtual terminal device identification includes virtual terminal unit type, virtual unit identification code international mobile device Identity code, virtual unit near-field communication technology physical identification code and bluetooth physical identification code.
Specifically, terminal is corresponding with the 3rd solicited message type according to the 3rd solicited message type, generation Virtual terminal device identification, wherein, the virtual terminal device identification includes virtual terminal unit type, virtual unit identification code International Mobile Equipment Identity code, virtual unit near-field communication technology physical identification code and bluetooth physical identification code.It can refer to above-mentioned Embodiment, repeat no more.
The method of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 3rd solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the 4th solicited message type;Accordingly, it is described The solicited message type in request is then obtained according to described information, generates virtual information corresponding with the solicited message type, Including:
It is random to generate virtual terminal corresponding with the 4th solicited message type according to the 4th solicited message type The position coordinates of equipment.
Specifically, terminal is according to the 4th solicited message type, random generation and the 4th solicited message type pair The position coordinates for the virtual terminal equipment answered.Above-described embodiment is can refer to, is repeated no more.
The method of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 4th solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the 5th solicited message type;Accordingly, it is described The solicited message type in request is then obtained according to described information, generates virtual information corresponding with the solicited message type, Including:
According to the 5th solicited message type, random generation is corresponding with the 5th solicited message type virtually to clip and paste Plate content.
Specifically, terminal is according to the 5th solicited message type, random generation and the 5th solicited message type pair The virtual clipboard content answered.Above-described embodiment is can refer to, is repeated no more.
The method of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 5th solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the 6th solicited message type;Accordingly, it is described The solicited message type in request is then obtained according to described information, generates virtual information corresponding with the solicited message type, Including:
It is random to generate Virtual User corresponding with the 6th solicited message type according to the 6th solicited message type Identity.
Specifically, terminal is according to the 6th solicited message type, random generation and the 6th solicited message type pair The Virtual User identity answered.Above-described embodiment is can refer to, is repeated no more.
The method of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 6th solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the 7th solicited message type;Accordingly, it is described The solicited message type in request is then obtained according to described information, generates virtual information corresponding with the solicited message type, Including:
According to the 7th solicited message type, the first virtual region is generated, first virtual region is used to store institute Caused document data in application program operation is stated, wherein, the actual area phase that first virtual region stores with document Isolation.
Specifically, terminal generates the first virtual region, first virtual region according to the 7th solicited message type For storing caused document data in the application program operation, wherein, first virtual region and document storage Actual area is isolated.Above-described embodiment is can refer to, is repeated no more.
Or,
According to the 7th solicited message type, the second virtual region is generated, second virtual region is used to provide institute State the multimedia messages that are called in application program operation, wherein, the multimedia messages include video information, audio-frequency information and Image information.
Terminal generates the second virtual region, second virtual region is used to carry according to the 7th solicited message type The multimedia messages called in being run for the application program, wherein, the multimedia messages include video information, audio is believed Breath and image information.Above-described embodiment is can refer to, is repeated no more.
The method of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 7th solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, before APP operations, methods described also includes:
If receive specified user logs in confirmation, special VPN passage is created for the specified user, with Carried out data transmission by the VPN passage.
If specifically, terminal receive specified user log in confirmation, create special VPN for the specified user Network channel, to be carried out data transmission by the VPN passage.Specified user can according to the user company position Etc. being specified, but it is not specifically limited.Fig. 2 is cutting for the method log-in interface that the embodiment of the present invention protects privacy of user data Figure;Fig. 3 is that the embodiment of the present invention protects the method for privacy of user data to create the sectional drawing of dedicated network tunnel interfaces;Such as Fig. 2-figure Shown in 3, realize and carried out data transmission by VPN passage, ensure that the safety of data transfer.
If continuing to the identification information of the specified user, the specified user couple is directed to by what is be pre-configured with The application program of authority and/or job information is answered to load on the user terminal of the specified user, to complete the synchronization of data.
Specifically, if terminal continues to the identification information of the specified user, institute is directed to by what is be pre-configured with State the application program of specified user's corresponding authority and/or job information loads on the user terminal of the specified user, to complete The synchronization of data.Identification information can be realized by the unlocking pattern, unlocking pin, addition fingerprint.It is illustrated below: User's Xiao Wang's registration ministries and commissions are specified, ministries and commissions have assigned a phone number to Xiao Wang.Xiao Wang takes phone number, downloads this production Product (Aegis), after logging in using the number, after setting basic fingerprint, pattern, PIN PUKs, that is, start to download ministries and commissions pipe All App that reason person sets in server end, unit address list, document information, mail configuration, system security protection, each App Setting of authority etc..So that the data of the user terminal of Xiao Wang and the data syn-chronization at ministries and commissions' management server end.Fig. 4 is The sectional drawing at the method addition the unlocking pattern interface of protection privacy of user data of the embodiment of the present invention;Fig. 5 protects for the embodiment of the present invention Protect the sectional drawing at the method addition unlocking pin interface of privacy of user data;Fig. 6 is that the embodiment of the present invention protects privacy of user data Method addition fingerprint interface sectional drawing;Fig. 7 is that the embodiment of the present invention protects the method prompting of privacy of user data to log in success The sectional drawing at synchronous business data interface, as Figure 4-Figure 7, realize the synchronizing process for completing data.
The method of protection privacy of user data provided in an embodiment of the present invention, is carried out data transmission by VPN passage, It more efficiently ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the application program be pre-configured with including:
The wireless network for allowing connection to specify.
Specifically, terminal allows wireless network (wifi) network that connection is specified.It can be referred to manually by keeper or user Determine wifi titles, wifi equipment MAC Address, reach the not clear wifi of limitation connection, so as to reach the purpose of protection data safety.
And/or
Forbid carrying out screenshotss, preserve operation.
Specifically, terminal forbids carrying out screenshotss, preserves operation.Can be by prohibitting the use of physical button, virtual key to enter The operation of row screenshotss, operation is preserved to realize.
The method of protection privacy of user data provided in an embodiment of the present invention, by being pre-configured with specified user's corresponding authority Application program, effectively further ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, methods described also includes:
The application program for specified user's corresponding authority being pre-configured with is carried out to open protection or closing Protection.
Specifically, the application program for specified user's corresponding authority being pre-configured with described in terminal-pair is opened Protection is closed in protection.Fig. 8 is that the method for protection privacy of user data of the embodiment of the present invention opens protection or closes answering for protection With the sectional drawing of program interface;Above-mentioned unlatching protection can be realized in user terminal, management end server or close the action of protection.
The method of protection privacy of user data provided in an embodiment of the present invention, passes through the application to specifying user's corresponding authority Program carries out opening protection or closes protection, can set to independent and flexible the safeguard protection of individual subscriber privacy.
Fig. 9 is the terminal structure schematic diagram that the embodiment of the present invention protects privacy of user data, as shown in figure 9, the present invention is real Apply example and provide a kind of terminal for protecting privacy of user data, including generation unit 1 and open cell 2, wherein:
Generation unit 1 is used for during application program is run, and is obtained if getting the information that the application program is sent Request is taken, then the solicited message type in request is obtained according to described information, is generated corresponding with the solicited message type empty Intend information;Open cell 2 is used for the access rights according to the virtual information opening to the application program, so that the application Program can not get privacy of user data.
Specifically, generation unit 1 is used for during application program is run, if getting what the application program was sent Information acquisition request, then the solicited message type in request, generation and the solicited message type pair are obtained according to described information The virtual information of generation is sent to open cell 2 by the virtual information answered, generation unit 1;Open cell 2 is used for according to the void Intend access rights of the information opening to the application program, so that the application program can not get privacy of user data.
The terminal of protection privacy of user data provided in an embodiment of the present invention, enables to user normal use APP, and not Real user profile can be leaked to APP, so as to be effectively guaranteed the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the first solicited message type;Accordingly, it is described Generation unit 1 is specifically used for:
According to the first solicited message type, generation virtual first application corresponding with the first solicited message type Program, wherein, the information content corresponding with the first solicited message type is carried in virtual first application program.
Specifically, the generation unit 1 is specifically used for:According to the first solicited message type, generation and described first Virtual first application program corresponding to solicited message type, wherein, carried in virtual first application program and described The information content corresponding to one solicited message type.
The terminal of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the first solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the second solicited message type;Accordingly, it is described Generation unit 1 is specifically used for:
It is random to generate virtual network corresponding with the second solicited message type according to the second solicited message type Address information.
Specifically, the generation unit 1 is specifically used for:
It is random to generate virtual network corresponding with the second solicited message type according to the second solicited message type Address information.
The terminal of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the second solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the 3rd solicited message type;Accordingly, it is described Generation unit 1 is specifically used for:
According to the 3rd solicited message type, virtual terminal equipment corresponding with the 3rd solicited message type is generated Mark, wherein, the virtual terminal device identification includes virtual terminal unit type, virtual unit identification code international mobile device Identity code, virtual unit near-field communication technology physical identification code and bluetooth physical identification code.
Specifically, the generation unit 1 is specifically used for:
According to the 3rd solicited message type, virtual terminal equipment corresponding with the 3rd solicited message type is generated Mark, wherein, the virtual terminal device identification includes virtual terminal unit type, virtual unit identification code international mobile device Identity code, virtual unit near-field communication technology physical identification code and bluetooth physical identification code.
The terminal of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 3rd solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the 4th solicited message type;Accordingly, it is described Generation unit 1 is specifically used for:
It is random to generate virtual terminal corresponding with the 4th solicited message type according to the 4th solicited message type The position coordinates of equipment.
Specifically, the generation unit 1 is specifically used for:
It is random to generate virtual terminal corresponding with the 4th solicited message type according to the 4th solicited message type The position coordinates of equipment.
The terminal of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 4th solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the solicited message type includes the 5th solicited message type;Accordingly, it is described Generation unit 1 is specifically used for:
According to the 5th solicited message type, random generation is corresponding with the 5th solicited message type virtually to clip and paste Plate content.
Specifically, the generation unit 1 is specifically used for:
According to the 5th solicited message type, random generation is corresponding with the 5th solicited message type virtually to clip and paste Plate content.
The terminal of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 5th solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy
On the basis of above-described embodiment, the solicited message type includes the 6th solicited message type;Accordingly, it is described Generation unit 1 is specifically used for:
It is random to generate Virtual User corresponding with the 6th solicited message type according to the 6th solicited message type Identity.
Specifically, the generation unit 1 is specifically used for:
It is random to generate Virtual User corresponding with the 6th solicited message type according to the 6th solicited message type Identity.
The terminal of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 6th solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy
On the basis of above-described embodiment, the solicited message type includes the 7th solicited message type;Accordingly, it is described Generation unit 1 is specifically used for:
According to the 7th solicited message type, the first virtual region is generated, first virtual region is used to store institute Caused document data in application program operation is stated, wherein, the actual area phase that first virtual region stores with document Isolation.
Or,
According to the 7th solicited message type, the second virtual region is generated, second virtual region is used to provide institute State the multimedia messages that are called in application program operation, wherein, the multimedia messages include video information, audio-frequency information and Image information.
Specifically, the generation unit 1 is specifically used for, according to the 7th solicited message type, generating the first virtual area Domain, first virtual region are used to store caused document data in the application program operation, wherein, described first is empty Intend the actual area that region stores with document to be isolated.
Or,
According to the 7th solicited message type, the second virtual region is generated, second virtual region is used to provide institute State the multimedia messages that are called in application program operation, wherein, the multimedia messages include video information, audio-frequency information and Image information.
The terminal of protection privacy of user data provided in an embodiment of the present invention, passes through generation and the 7th solicited message type pair The virtual information answered, user normal use APP is enabled to, real user profile will not be leaked to APP again, so as to effectively Ground ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, before application program operation, the terminal is additionally operable to:
If receive specified user logs in confirmation, create special VPN for the specified user and lead to Road, to be carried out data transmission by the VPN passage
If continuing to the identification information of the specified user, the specified user couple is directed to by what is be pre-configured with The application program of authority and/or job information is answered to load on the user terminal of the specified user, to complete the synchronization of data.
If specifically, terminal receive specified user log in confirmation, create special void for the specified user Intend dedicated network passage, to carry out data transmission by the VPN passage;If continue to the specified use The identification information at family, the application program and/or job information for specified user's corresponding authority that will be pre-configured with The user terminal of the specified user is loaded on, to complete the synchronization of data.
The terminal of protection privacy of user data provided in an embodiment of the present invention, is carried out data transmission by VPN passage, It more efficiently ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the terminal is additionally operable to:
The wireless network for allowing connection to specify;
And/or
Forbid carrying out screenshotss, preserve operation.
Specifically, the terminal is additionally operable to:
The wireless network for allowing connection to specify;
And/or
Forbid carrying out screenshotss, preserve operation.
The terminal of protection privacy of user data provided in an embodiment of the present invention, by being pre-configured with specified user's corresponding authority Application program, effectively further ensure that the safety of individual subscriber privacy.
On the basis of above-described embodiment, the terminal is additionally operable to:
The application program for specified user's corresponding authority being pre-configured with is carried out to open protection or closing Protection.
Specifically, the terminal is additionally operable to:
The application program for specified user's corresponding authority being pre-configured with is carried out to open protection or closing Protection.
The terminal of protection privacy of user data provided in an embodiment of the present invention, passes through the application to specifying user's corresponding authority Program carries out opening protection or closes protection, can set to independent and flexible the safeguard protection of individual subscriber privacy.
The terminal of protection privacy of user data provided in an embodiment of the present invention specifically can be used for performing above-mentioned each method reality The handling process of example is applied, its function will not be repeated here, and be referred to the detailed description of above method embodiment.
Figure 10 is end entity structural representation provided in an embodiment of the present invention, and as shown in Figure 10, the terminal includes:Place Manage device (processor) 1001, memory (memory) 1002 and bus 1003;
Wherein, the processor 1001, memory 1002 complete mutual communication by bus 1003;
The processor 1001 is used to call the programmed instruction in the memory 1002, is implemented with performing above-mentioned each method The method that example is provided, such as including:During application program is run, if getting the information that the application program is sent Request is obtained, then the solicited message type in request is obtained according to described information, generation is corresponding with the solicited message type Virtual information;Access rights according to the virtual information opening to the application program, so that the application program can not obtain Get privacy of user data.
The present embodiment discloses a kind of computer program product, and the computer program product includes being stored in non-transient calculating Computer program on machine readable storage medium storing program for executing, the computer program include programmed instruction, when described program instruction is calculated When machine performs, computer is able to carry out the method that above-mentioned each method embodiment is provided, such as including:In application program operation During, if getting the information acquisition request that the application program is sent, the request in request is obtained according to described information Information type, generate virtual information corresponding with the solicited message type;According to the virtual information opening to the application The access rights of program, so that the application program can not get privacy of user data.
The present embodiment provides a kind of non-transient computer readable storage medium storing program for executing, the non-transient computer readable storage medium storing program for executing Computer instruction is stored, the computer instruction makes the computer perform the method that above-mentioned each method embodiment is provided, example Such as include:During application program is run, if the information acquisition request that the application program is sent is got, according to institute The solicited message type in information acquisition request is stated, generates virtual information corresponding with the solicited message type;According to described Virtual information opening is to the access rights of the application program, so that the application program can not get privacy of user data.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or light Disk etc. is various can be with the medium of store program codes.
The embodiments such as terminal described above are only schematical, wherein the unit illustrated as separating component It can be or may not be physically separate, can be as the part that unit is shown or may not be physics list Member, you can with positioned at a place, or can also be distributed on multiple NEs.It can be selected according to the actual needs In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Make to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation Method described in some parts of example or embodiment.
Finally it should be noted that:Various embodiments above is rather than right only illustrating the technical scheme of embodiments of the invention It is limited;Although embodiments of the invention are described in detail with reference to foregoing embodiments, the ordinary skill of this area Personnel should be understood:It can still modify to the technical scheme described in foregoing embodiments, or to which part Or all technical characteristic carries out equivalent substitution;And these modifications or replacement, do not make the essence disengaging of appropriate technical solution The scope of each embodiment technical scheme of embodiments of the invention.

Claims (22)

  1. A kind of 1. method for protecting privacy of user data, it is characterised in that including:
    During application program is run, if the information acquisition request that the application program is sent is got, according to Solicited message type in information acquisition request, generate virtual information corresponding with the solicited message type;
    Access rights according to the virtual information opening to the application program, so that the application program can not get use Family private data.
  2. 2. according to the method for claim 1, it is characterised in that the solicited message type includes the first solicited message class Type;Accordingly, it is described that the solicited message type in request, generation and the solicited message type pair are then obtained according to described information The virtual information answered, including:
    According to the first solicited message type, journey is applied in generation corresponding with the first solicited message type virtual first Sequence, wherein, the information content corresponding with the first solicited message type is carried in virtual first application program.
  3. 3. according to the method for claim 1, it is characterised in that the solicited message type includes the second solicited message class Type;Accordingly, it is described that the solicited message type in request, generation and the solicited message type pair are then obtained according to described information The virtual information answered, including:
    It is random to generate virtual network address corresponding with the second solicited message type according to the second solicited message type Information.
  4. 4. according to the method for claim 1, it is characterised in that the solicited message type includes the 3rd solicited message class Type;Accordingly, it is described that the solicited message type in request, generation and the solicited message type pair are then obtained according to described information The virtual information answered, including:
    According to the 3rd solicited message type, virtual terminal equipment mark corresponding with the 3rd solicited message type is generated Know, wherein, the virtual terminal device identification includes virtual terminal unit type, virtual unit identification code international mobile device body Part code, virtual unit near-field communication technology physical identification code and bluetooth physical identification code.
  5. 5. according to the method for claim 1, it is characterised in that the solicited message type includes the 4th solicited message class Type;Accordingly, it is described that the solicited message type in request, generation and the solicited message type pair are then obtained according to described information The virtual information answered, including:
    It is random to generate virtual terminal equipment corresponding with the 4th solicited message type according to the 4th solicited message type Position coordinates.
  6. 6. according to the method for claim 1, it is characterised in that the solicited message type includes the 5th solicited message class Type;Accordingly, it is described that the solicited message type in request, generation and the solicited message type pair are then obtained according to described information The virtual information answered, including:
    It is random to generate in virtual clipboard corresponding with the 5th solicited message type according to the 5th solicited message type Hold.
  7. 7. according to the method for claim 1, it is characterised in that the solicited message type includes the 6th solicited message class Type;Accordingly, it is described that the solicited message type in request, generation and the solicited message type pair are then obtained according to described information The virtual information answered, including:
    It is random to generate Virtual User identity corresponding with the 6th solicited message type according to the 6th solicited message type Mark.
  8. 8. according to the method for claim 1, it is characterised in that the solicited message type includes the 7th solicited message class Type;Accordingly, it is described that the solicited message type in request, generation and the solicited message type pair are then obtained according to described information The virtual information answered, including:
    According to the 7th solicited message type, the first virtual region is generated, first virtual region is used to store described answer Caused document data in being run with program, wherein, the actual area that first virtual region stores with document is isolated;
    Or,
    According to the 7th solicited message type, the second virtual region is generated, second virtual region is used to provide described answer The multimedia messages called in being run with program, wherein, the multimedia messages include video information, audio-frequency information and image Information.
  9. 9. method according to any one of claims 1 to 8, it is characterised in that before application program operation, the side Method also includes:
    If receive specified user logs in confirmation, special VPN passage is created for the specified user, To be carried out data transmission by the VPN passage;
    If continuing to the identification information of the specified user, it will be pre-configured with and weighed for the specified user is corresponding The application program and/or job information of limit load on the user terminal of the specified user, to complete the synchronization of data.
  10. 10. according to the method for claim 9, it is characterised in that the application program be pre-configured with including:
    The wireless network for allowing connection to specify;
    And/or
    Forbid carrying out screenshotss, preserve operation.
  11. 11. according to the method for claim 10, it is characterised in that methods described also includes:
    The application program for specified user's corresponding authority being pre-configured with is carried out opening protection or closes protection.
  12. A kind of 12. terminal for protecting privacy of user data, it is characterised in that including:
    Generation unit, during being run in application program, asked if getting the acquisition of information that the application program is sent Ask, then the solicited message type in request is obtained according to described information, generation is corresponding with the solicited message type virtually to be believed Breath;
    Open cell, for the access rights according to the virtual information opening to the application program, so that described apply journey Sequence can not get privacy of user data.
  13. 13. terminal according to claim 12, it is characterised in that the solicited message type includes the first solicited message class Type;Accordingly, the generation unit is specifically used for:
    According to the first solicited message type, journey is applied in generation corresponding with the first solicited message type virtual first Sequence, wherein, the information content corresponding with the first solicited message type is carried in virtual first application program.
  14. 14. terminal according to claim 12, it is characterised in that the solicited message type includes the second solicited message class Type;Accordingly, the generation unit is specifically used for:
    It is random to generate virtual network address corresponding with the second solicited message type according to the second solicited message type Information.
  15. 15. terminal according to claim 12, it is characterised in that the solicited message type includes the 3rd solicited message class Type;Accordingly, the generation unit is specifically used for:
    According to the 3rd solicited message type, virtual terminal equipment mark corresponding with the 3rd solicited message type is generated Know, wherein, the virtual terminal device identification includes virtual terminal unit type, virtual unit identification code international mobile device body Part code, virtual unit near-field communication technology physical identification code and bluetooth physical identification code.
  16. 16. terminal according to claim 12, it is characterised in that the solicited message type includes the 4th solicited message class Type;Accordingly, the generation unit is specifically used for:
    It is random to generate virtual terminal equipment corresponding with the 4th solicited message type according to the 4th solicited message type Position coordinates.
  17. 17. terminal according to claim 12, it is characterised in that the solicited message type includes the 5th solicited message class Type;Accordingly, the generation unit is specifically used for:
    It is random to generate in virtual clipboard corresponding with the 5th solicited message type according to the 5th solicited message type Hold.
  18. 18. terminal according to claim 12, it is characterised in that the solicited message type includes the 6th solicited message class Type;Accordingly, the generation unit is specifically used for:
    It is random to generate Virtual User identity corresponding with the 6th solicited message type according to the 6th solicited message type Mark.
  19. 19. terminal according to claim 12, it is characterised in that the solicited message type includes the 7th solicited message class Type;Accordingly, the generation unit is specifically used for:
    According to the 7th solicited message type, the first virtual region is generated, first virtual region is used to store described answer Caused document data in being run with program, wherein, the actual area that first virtual region stores with document is isolated;
    Or,
    According to the 7th solicited message type, the second virtual region is generated, second virtual region is used to provide described answer The multimedia messages called in being run with program, wherein, the multimedia messages include video information, audio-frequency information and image Information.
  20. 20. according to any described terminal of claim 12 to 19, it is characterised in that before application program operation, institute Terminal is stated to be additionally operable to:
    If receive specified user logs in confirmation, special VPN passage is created for the specified user, To be carried out data transmission by the VPN passage;
    If continuing to the identification information of the specified user, it will be pre-configured with and weighed for the specified user is corresponding The application program and/or job information of limit load on the user terminal of the specified user, to complete the synchronization of data.
  21. 21. terminal according to claim 20, it is characterised in that the terminal is additionally operable to:
    The wireless network for allowing connection to specify;
    And/or
    Forbid carrying out screenshotss, preserve operation.
  22. 22. terminal according to claim 21, it is characterised in that the terminal is additionally operable to:
    The application program for specified user's corresponding authority being pre-configured with is carried out opening protection or closes protection.
CN201710543629.4A 2017-07-05 2017-07-05 A kind of method and terminal for protecting privacy of user data Pending CN107341406A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710543629.4A CN107341406A (en) 2017-07-05 2017-07-05 A kind of method and terminal for protecting privacy of user data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710543629.4A CN107341406A (en) 2017-07-05 2017-07-05 A kind of method and terminal for protecting privacy of user data

Publications (1)

Publication Number Publication Date
CN107341406A true CN107341406A (en) 2017-11-10

Family

ID=60218910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710543629.4A Pending CN107341406A (en) 2017-07-05 2017-07-05 A kind of method and terminal for protecting privacy of user data

Country Status (1)

Country Link
CN (1) CN107341406A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619221A (en) * 2019-08-09 2019-12-27 深圳市轱辘汽车维修技术有限公司 Virtual authorization method, device, terminal equipment and storage medium
CN110766489A (en) * 2018-07-25 2020-02-07 北京三星通信技术研究有限公司 Method for requesting content and providing content and corresponding device
CN111125771A (en) * 2019-12-31 2020-05-08 联想(北京)有限公司 Method and device for protecting equipment privacy, electronic equipment and storage medium
CN111212420A (en) * 2019-12-31 2020-05-29 北京指掌易科技有限公司 Method for disguising equipment information through VSA technology
CN113435173A (en) * 2021-05-28 2021-09-24 荣耀终端有限公司 Text generation method, related device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004192645A (en) * 2003-12-08 2004-07-08 Ishii Mieko Privacy protection method, privacy protection identifier transmitter, privacy protection system and program
CN105095788A (en) * 2015-06-30 2015-11-25 北京奇虎科技有限公司 Method, device and system for private data protection
CN106557669A (en) * 2015-09-30 2017-04-05 北京奇虎科技有限公司 A kind of authority control method and device of application program installation process

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004192645A (en) * 2003-12-08 2004-07-08 Ishii Mieko Privacy protection method, privacy protection identifier transmitter, privacy protection system and program
CN105095788A (en) * 2015-06-30 2015-11-25 北京奇虎科技有限公司 Method, device and system for private data protection
CN106557669A (en) * 2015-09-30 2017-04-05 北京奇虎科技有限公司 A kind of authority control method and device of application program installation process

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110766489A (en) * 2018-07-25 2020-02-07 北京三星通信技术研究有限公司 Method for requesting content and providing content and corresponding device
CN110766489B (en) * 2018-07-25 2024-04-19 北京三星通信技术研究有限公司 Method for requesting content and providing content and corresponding device
CN110619221A (en) * 2019-08-09 2019-12-27 深圳市轱辘汽车维修技术有限公司 Virtual authorization method, device, terminal equipment and storage medium
CN110619221B (en) * 2019-08-09 2023-10-31 深圳市轱辘车联数据技术有限公司 Virtual authorization method, device, terminal equipment and storage medium
CN111125771A (en) * 2019-12-31 2020-05-08 联想(北京)有限公司 Method and device for protecting equipment privacy, electronic equipment and storage medium
CN111212420A (en) * 2019-12-31 2020-05-29 北京指掌易科技有限公司 Method for disguising equipment information through VSA technology
CN113435173A (en) * 2021-05-28 2021-09-24 荣耀终端有限公司 Text generation method, related device and system
CN113435173B (en) * 2021-05-28 2023-03-10 荣耀终端有限公司 Text generation method, related device and system

Similar Documents

Publication Publication Date Title
CN107341406A (en) A kind of method and terminal for protecting privacy of user data
CN105264832B (en) Method and apparatus for self-organizing network
CN103795798B (en) Mobile phone checking-in method
EP2689598B1 (en) Interrogating an authentication device
CN103455349B (en) Application program accesses the method and apparatus of smart card
CN110537356A (en) Security update to telecommunication terminal configuration
CN104838630A (en) Policy-based application management
CN108028749B (en) For virtualizing device, method and the system of the universal integrated circuit chip of Reprogrammable
CN104252374B (en) The program management-control method and device changed based on framework
CN103403669A (en) Securing and managing APPs on a device
CN102955904A (en) Method and system for preventing secret divulgation of mobile communication equipment
CN101453394A (en) Method, system and equipment for access control
CN108243404A (en) Ratification method, device and the equipment of phone number binding state
CN106550090A (en) Long-range control method, device and mobile terminal
CN107484152A (en) The management method and device of terminal applies
CN105813072A (en) Terminal authentication method, system and cloud server
US9734307B2 (en) User terminal interworking with peripheral device and method for preventing leakage of information using the same
CN107566112A (en) Dynamic encryption and decryption method and server
CN110876144A (en) Mobile application method, device and system of identity certificate
CN103475491B (en) A kind of remote maintenance system logged in without cryptosecurity and implementation method
CN103763370B (en) A kind of method, system and device for changing mobile terminal workspace screen-lock password
CN108810835A (en) Correlating method, device, terminal and the storage medium of No.1 multiple terminals
CN106909861A (en) A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system
CN109841273A (en) A kind of one-stop integration method and device of medical diagnosis software
CN108494749A (en) Method, apparatus, equipment and the computer readable storage medium of IP address disabling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171110