CN104102358A - Privacy information protecting method and privacy information protecting device - Google Patents

Privacy information protecting method and privacy information protecting device Download PDF

Info

Publication number
CN104102358A
CN104102358A CN201410344802.4A CN201410344802A CN104102358A CN 104102358 A CN104102358 A CN 104102358A CN 201410344802 A CN201410344802 A CN 201410344802A CN 104102358 A CN104102358 A CN 104102358A
Authority
CN
China
Prior art keywords
privacy information
geographical location
location information
party
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410344802.4A
Other languages
Chinese (zh)
Inventor
丁祎
王浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410344802.4A priority Critical patent/CN104102358A/en
Publication of CN104102358A publication Critical patent/CN104102358A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a privacy information protecting method and a privacy information protecting device. The privacy information protecting method comprises the following steps of injecting a privacy information protecting program in a privacy information service process; and processing a privacy information acquisition request according to a preset privacy information protecting strategy after the privacy information protecting program recognizes the privacy information acquisition request sent out by a third-party application. By using the privacy information protecting method and the privacy information protecting device, user privacy information acquired by the third-party application can be stopped or the third-party application can be tricked, so that the safety of the user privacy information is effectively improved.

Description

The method of privacy information protection and privacy information protection device
Technical field
The present invention relates to intelligent terminal location technology, be specifically related to a kind of method and privacy information protection device of privacy information protection.
Background technology
Intelligent terminal refers to the equipment with multimedia function, can support audio frequency, video, data transmission, by adopting open operating system, can load corresponding application program and realize corresponding application function, for application program operation and content service provide platform, make a large amount of value-added services, for example, news, weather, traffic, commodity, application program download, the download of music picture etc. can realize based on this platform, comprise fixing intelligent terminal and mobile intelligent terminal equipment.
Day by day universal along with various intelligent terminals and wireless network, intelligent terminal can have multiple wireless connections and the positioning functions such as mobile network's connection, architecture, Wireless Fidelity (WiFi, Wireless Fidelity) WLAN (wireless local area network), GPS location simultaneously.Wherein, the service such as architecture, GPS location based on geographical location information service presents good market outlook and growth momentum as a kind of novel spatial Information Service pattern, and, current most intelligent terminal has all applied for obtaining the authority of geographical location information service, allow wireless network to obtain the positional information of intelligent terminal by specific location technology, offer user, communication system or third party's application, make third party apply the geographical location information that can obtain intelligent terminal by wireless network.Although, under some scenes, obtain the authority of geographical location information service by application, really can facilitate the intelligent terminal user use of (being called for short user), but, geographical location information is as user's an important privacy information, indicate the geographic position at the current place of user, because third party applies the geographical location information Service Privileges that also can apply for by user and obtain this user's geographical location information, and user can not confirm whether this third party's application can be used for rational purposes to the collection of user's geographical location information, thereby, may cause the leakage of the privacy informations such as user's geographical location information.
According to the presentation mode of geographical location information service, geographical location information service can be divided into be needed intelligent terminal to report the mode of geographical location information and reports the mode of geographical location information without intelligent terminal, especially the latter, receiving after request, the geographical location information of self is directly provided, because the active without intelligent terminal participates in, user cannot confirm its whether state in being positioned, unless user abandons any communication service, otherwise cannot hide the geographical location information of intelligent terminal and stop third party to apply the geographical location information that obtains user.For example, for WiFi network, can location Network Based approximate location if user is provided with in application message, or, based on the geographical location information service of GPS and network positions exact position, like this, third party's application is by applying for geographical location information Service Privileges and obtaining the authority of WiFi information, WiFi focus or the intelligent terminal service set identifier (SSID of WiFi focus around that just can connect by reading intelligent terminal, Service Set Identifier), BSSID (BSSID, Basic Service Set Identifier) and signal intensity, thereby can obtain the base station information that intelligent terminal connects, the base station information obtaining is directly transmitted through the network to location server by third party's application, location server is receiving after WIFI information, by the method for Query Database, determine the latitude and longitude information of WIFI, thereby third party is applied can obtain the roughly latitude and longitude information (geographical location information) of intelligent terminal, cause the leakage of user privacy information.Again for example, for mobile communications network, because no matter intelligent terminal is at holding state or in state of activation, all need at least and a mobile communications network, for example, contact is set up in base station, owing to can determining the dominant base of writing to each other with intelligent terminal, and the position of base station be fix and for known; Further, the coverage of base station (community) is also known, thereby third party applies base station and the cell information at the intelligent terminal place of locating by needs, just can determine the geographical location information of intelligent terminal.
Summary of the invention
In view of the above problems, the present invention has been proposed to a kind of method and privacy information protection device of the privacy information protection that overcomes the problems referred to above or address the above problem are at least in part provided.
According to one aspect of the present invention, the method for privacy information protection is provided, the method comprises:
In privacy information service processes, inject privacy information protection program;
Described privacy information protection program is applied the privacy information sending and is obtained after request recognizing third party, according to the privacy information protection strategy setting in advance, processes described privacy information and obtains request.
Preferably, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
From the geographical location information camouflage list setting in advance, choose the geographical location information of a camouflage, be encapsulated in privacy information and obtain in request response, be sent to third party's application.
Preferably, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
According to the geographical location information Camouflage Algorithm based on virtual route planning setting in advance, generate the geographical location information of a camouflage, and the geographical location information of the camouflage of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
Preferably, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
Analyze privacy information and obtain the third party's application message comprising in request, generate the corresponding geographical location information with the rational camouflage of space-time according to third party's application message of analyzing, and the geographical location information of the camouflage of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
Preferably, the privacy information service processes that described injection is included in third party's application operating system injects, or, in the privacy information service processes of intelligent terminal, inject.
Preferably, describedly in the privacy information service processes of third party's application operating system, inject and comprise:
Search the memory variable of the existing target program for privacy information processing in the privacy information service processes of third party's application operating system;
The memory variable of the described existing target program for privacy information processing is replaced with to the memory variable of the dynamic object program setting in advance.
Preferably, the described target program for privacy information processing is that third party applies the program that sends address location information acquisition request.
Preferably, the memory variable that the described memory variable by the described existing target program for privacy information processing replaces with the dynamic object program setting in advance comprises:
The memory variable code of privacy information protection program is write in dynamic link library, utilize the windows hook in operating system that the memory variable code mapping that writes the privacy information protection program in dynamic link library is arrived to long-range privacy information service processes.
Preferably, the memory variable that the described memory variable by the described existing target program for privacy information processing replaces with the dynamic object program setting in advance comprises:
The memory variable code of privacy information protection program is write in dynamic link library, utilize Remote create and dynamic load in operating system that the memory variable code mapping that writes the privacy information protection program in dynamic link library is arrived to long-range privacy information service processes.
Preferably, the memory variable that the described memory variable by the described existing target program for privacy information processing replaces with the dynamic object program setting in advance comprises:
Utilize system process monitor, the memory variable Code copying of privacy information protection program is arrived to long-range privacy information service processes, and utilize Remote create to carry out.
Preferably, describedly in the privacy information service processes of intelligent terminal, inject and comprise:
Search the function of the existing system positioning service program for privacy information processing in the privacy information service processes of intelligent terminal operating system;
The function of the described existing system positioning service program for privacy information processing is replaced with to the function of the system positioning service program setting in advance.
Preferably, described in privacy information service processes, inject privacy information protection program before, described method further comprises:
Obtain the root authority of third party's application operating system or intelligent terminal operating system.
Preferably, described privacy information protection program is applied the privacy information sending and is obtained after request recognizing third party, and described method further comprises:
Resolve privacy information and obtain request; obtain the intelligent terminal information comprising; the intelligent terminal corresponding to the intelligent terminal information of obtaining sends information; whether choose privacy information protection strategy with prompting user; and choose after the information of privacy information protection strategy receiving user; described in carrying out, according to the privacy information protection strategy setting in advance, process described privacy information and obtain the flow process of request.
Preferably, the described privacy information protection strategy according to setting in advance, process the request of obtaining of described privacy information and comprise:
From the camouflage privacy information list setting in advance, choose a camouflage privacy information, be encapsulated in privacy information and obtain in request response, be sent to third party's application.
Preferably, the described privacy information protection strategy according to setting in advance, process the request of obtaining of described privacy information and comprise:
According to the camouflage privacy information generating algorithm setting in advance, generate a camouflage privacy information, and the camouflage privacy information of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
Preferably, described camouflage privacy information generating algorithm is the generating algorithm based on virtual route planning.
Preferably, the described privacy information protection strategy according to setting in advance, process the request of obtaining of described privacy information and comprise:
Analyze privacy information and obtain the third party's application message comprising in request, generate the corresponding rational camouflage privacy information of space-time that has according to third party's application message of analyzing, and the camouflage privacy information of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
Preferably, described third party's application is sent privacy information by described privacy information service processes and is obtained request.
Preferably, obtain after request at the described privacy information of described processing, described method further comprises:
Send prompting message to intelligent terminal; And/or,
Described third party's application is carried out to security sweep; And/or,
Unload described third party's application; And/or,
For described third party's application arranges privacy access rights.
Preferably, a kind of method for protecting privacy having applied under geographical location information Service Privileges environment, carries out the method as described in claim 1 to 19 any one.
A kind of privacy information protection device is provided according to another aspect of the present invention, and this device comprises: injection module and recognition processing module, wherein,
Injection module, for injecting the privacy information protection program setting in advance at privacy information service processes;
Recognition processing module, obtains after request for applying to third party the privacy information sending in described privacy information protection procedure identification, according to the privacy information protection strategy setting in advance, processes described privacy information and obtains request.
Preferably, described injection module is for injecting in advance dynamic object program at the privacy information service processes of third party's application operating system, variable or the method for the service of calling system privacy information of the target program by Dynamic injection, variable or the method for the service of calling system privacy information of replacing the target program of third party's application operating system.
Preferably, described injection module is for the privacy information service processes injected system positioning service in advance program in intelligent terminal operating system, and the function of replacing in the positioning service of intelligent terminal operating system is function corresponding to system positioning service program injecting.
Preferably, described injection module comprises: first searches unit and the first replacement unit, wherein,
First searches unit, for searching the memory variable of the existing target program for privacy information processing of privacy information service processes of third party's application operating system;
The first replacement unit, for replacing with the memory variable of the described existing target program for privacy information processing the memory variable of the dynamic object program setting in advance.
Preferably, described injection module comprises: second searches unit and the second replacement unit, wherein,
Second searches unit, for searching the function of the existing system positioning service program for privacy information processing of privacy information service processes of intelligent terminal operating system;
The second replacement unit, for replacing with the function of the described existing system positioning service program for privacy information processing the function of the system positioning service program setting in advance.
Preferably, described recognition processing module comprises: recognition unit and processing unit, wherein,
Recognition unit, obtains after request push-notification-answer unit for applying to third party the privacy information sending in the privacy information protection procedure identification starting;
Processing unit, for reception notification, according to the privacy information protection strategy setting in advance, processes described privacy information and obtains request.
Preferably, described recognition processing module further comprises:
Resolution unit; for receiving the notice from recognition unit; resolve privacy information and obtain request; obtain the intelligent terminal information comprising; the intelligent terminal corresponding to the intelligent terminal information of obtaining sends information; whether choose privacy information protection strategy with prompting user, and choose after the information of privacy information protection strategy push-notification-answer unit receiving user.
Preferably, described device further comprises:
Authority acquiring module, for obtaining after the root authority of third party's application operating system or intelligent terminal operating system, notice injection module.
Preferably, described device further comprises:
Expansion module, for obtaining after request at the described privacy information of described processing, sends prompting message to intelligent terminal; And/or,
Described third party's application is carried out to security sweep; And/or,
Unload described third party's application; And/or,
For described third party's application arranges privacy access rights.
According to the method for privacy information protection of the present invention and privacy information protection device, can be by inject the geographical location information defence program setting in advance in third party's application or intelligent terminal, realize any one system process in control operation system, thereby apply and initiate geographical location information and obtain when request third party, the geographical location information defence program injecting in advance in third party's application operating system or intelligent terminal operating system is intercepted and captured this geographical location information and is obtained request, and according to the geographical location information protection strategy setting in advance, the geographical location information of camouflage is returned to third party's application.Solve thus the technical matters that user privacy information leaks, obtained and stoped and cheat third party and apply the geographical location information that obtains user, effectively promoted the beneficial effect of the security of user privacy information.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description of the drawings
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skill in the art.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 shows the method flow of embodiment of the present invention geographical location information protection; And,
Fig. 2 shows the geographical location information protective device structure of the embodiment of the present invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, but should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can be by the those skilled in the art that conveys to complete the scope of the present disclosure.
In prior art, user is applying for after geographical location information Service Privileges, if adopt the mode sharing geographical location information service that reports geographical location information without intelligent terminal, be that third party applies (or claiming that third party applies application program) in the time that needs obtain geographical location information, obtain request by initiating geographical location information to intelligent terminal, intelligent terminal obtains after request receiving geographical location information, obtain request in response to geographical location information, the geographical location information of self is encapsulated in to geographical location information to be obtained in request response, be back to third party's application, thereby make third party apply the geographical location information that can obtain intelligent terminal.Because user cannot confirm that whether it is in applied the state of location by third party, and cannot stop third party to apply to obtain the privacy informations such as user's geographical location information, what make that user's privacy information leaked has a big risk.
In practical application, different users, the authority that operating system is operated may be different.For intelligent terminal operating system (abbreviation system), user is divided into different bundle of permissions by operating system, and give corresponding operating right for each bundle of permissions, bundle of permissions can comprise: administrator right group, high authority user's group, domestic consumer's group, backup operation group, file copy group and anonymous bundle of permissions etc.Wherein, operating right corresponding to administrator right group is administrator right, and it is high authority that high authority user organizes corresponding operating right, and operating right corresponding to domestic consumer's group is common authority etc.
In the embodiment of the present invention, although consider different operating rights by user to the performance constraint of operating system in corresponding operating right, due to not separate between each operating right, all depend on same instruction and complete limiting operation.Thereby, can utilize the method lifting user's who promotes authority (Adjust Token Privilege) operating right, wherein, promote authority and refer to that programmer utilizes various Loopholes of OSs, break through the operating right rank that operating system is assigned, own current operating right is improved to one or more ranks, thereby make user obtain the authority that more multipair operating system operates, for example, by promoting the method for authority, can make user obtain the authorities such as deleting, increase, change to system file originally not had.The method of existing lifting authority is widely used to be comprised intelligent terminal brush machine, root authority and escapes from prison etc.
In the embodiment of the present invention, based on above-mentioned analysis and consideration, a kind of method of geographical location information protection is proposed, by utilizing the Loopholes of OS of intelligent terminal, utilize the method that promotes authority, obtain the higher level operation authority of operating system, obtaining after higher level operation authority, in third party's application or intelligent terminal, inject (inject) geographical location information defence program, can realize any one process in control operation system, thereby apply and initiate geographical location information and obtain when request third party, the geographical location information defence program injecting in advance in third party's application is intercepted and captured this geographical location information and is obtained request, make it not to be sent to intelligent terminal, and according to the geographical location information protection strategy setting in advance, the geographical location information of protection is returned to third party's application, or, the geographical location information request of obtaining of applying initiation third party arrives after intelligent terminal, this geographical location information of intercepting and capturing injecting in advance in intelligent terminal obtains request, and according to the geographical location information protection strategy setting in advance, the geographical location information of protection is returned to third party's application.Like this, protect by the geographical location information to user, in order to stop and to cheat third party and apply the geographical location information that obtains user, thereby the risk that reduction user's geographical location information is revealed promotes the security of user privacy information.
In the embodiment of the present invention, so that the intelligent terminal of Android (Android) system to be installed, privacy information is that geographical location information is that example is carried out exemplary illustration, but institute it should be noted that, this description is only exemplary, scope of the present invention is not limited to this, the method of the embodiment of the present invention is also applicable to other operating system is installed, for example, (SuSE) Linux OS, iOS operating system, the intelligent terminal of Window Phone operating system etc., privacy information can be also other information, for example, international mobile subscriber identity (IMSI, International Mobile Subscriber Identification Number) information, mobile phone message etc.
Fig. 1 shows the method flow of embodiment of the present invention geographical location information protection.Referring to Fig. 1, this flow process comprises:
Step 101, starts the geographical location information camouflage program of injecting in advance in geographical location information service processes;
In this step, as optional embodiment, geographical location information camouflage program is aforesaid geographical location information defence program.Can in geographical location information service (location-based service) process of third party's application operating system, inject in advance geographical location information defence program (privacy information protection program), it is Dynamic injection target program, variable or the method for the service of calling system geographical location information of the target program by Dynamic injection, for example memory variable or function are replaced variable or the method for the service of calling system geographical location information of the target program of third party's application operating system, thereby can reach the object of identification, accordingly, geographical location information service processes can be that follow-up third party applies process corresponding to program that sends address location information acquisition request.As another optional embodiment; also can in the geographical location information service processes of intelligent terminal operating system, inject in advance geographical location information defence program; it is injected system positioning service program; the function of replacing in the positioning service of intelligent terminal operating system is function corresponding to system positioning service program injecting; reach the object of identification; accordingly, geographical location information service processes can be process corresponding to program that follow-up intelligent terminal receiver address positional information is obtained request.
In the embodiment of the present invention, in the geographical location information service processes of third party's application operating system, inject in advance geographical location information defence program and comprise:
A11, searches the memory variable of the existing target program for geographical location information processing in the geographical location information service processes of third party's application operating system;
In this step, be that third party applies the program that sends address location information acquisition request for the target program of geographical location information processing.
A12, replaces with the memory variable of the described existing target program for geographical location information processing the memory variable of the dynamic object program setting in advance.
In the geographical location information service processes of intelligent terminal, injecting in advance geographical location information defence program comprises:
B11, searches the function of the existing system positioning service program for geographical location information processing in the geographical location information service processes of intelligent terminal operating system;
In this step, be that intelligent terminal receiver address positional information is obtained the program of request for the system positioning service program of geographical location information processing.
B12, replaces with the function of the described existing system positioning service program for geographical location information processing the function of the system positioning service program setting in advance.
In the embodiment of the present invention, geographical location information defence program comprises: dynamic object program and system positioning service program.As optional embodiment, steps A 12 and B12 can specifically comprise:
The memory variable code of geographical location information defence program or function are write to dynamic link library (DLL; Dynamic Link Library) in, utilize the windows hook in operating system that the memory variable code or the Function Mapping that write the geographical location information defence program in dynamic link library are arrived to long-range geographical location information service process.
As another optional embodiment, steps A 12 and B12 also can comprise:
The memory variable code of geographical location information defence program or function are write to dynamic link library (DLL; Dynamic Link Library) in, utilize Remote create (CreatRemoteThread) and dynamic load (LoadLibrary) in operating system that the memory variable code or the Function Mapping that write the geographical location information defence program in dynamic link library are arrived to long-range geographical location information service process.
As an optional embodiment again, steps A 12 and B12 can also comprise:
Utilize system process monitor (WriteProcessMemory); the memory variable code of geographical location information defence program or function are copied to long-range geographical location information service process, and utilize Remote create (CreatRemoteThread) to carry out.
In practical application, the form that the geographical location information of storing in geographical location information defence program can file is stored, and like this, can go to read by unified call function reading the memory-mapped of this file or this file.Like this, can replace by the function reading of the dynamic object program of injection the function reading of the target program of third party's application operating system; Or, replace the function in intelligent terminal operating system positioning service program by the function reading of the system positioning service program injected.In the embodiment of the present invention, specifically, can, by find geographical location information service processes in operating system, load geographical location information defence program in the position of geographical location information service processes.For example; can by Android system based on the application programming interface (API that provides of linux system; Application Programming Interface); open the dlopen method of a dynamic link library with designated mode; geographical location information defence program is loaded in geographical location information service processes, thereby the related function of replacing in geographical location information service process is function corresponding in geographical location information defence program.Wherein, the function that in the geographical location information defence program after replacement, corresponding function is realized is consistent with the function that the related function in geographical location information service processes is realized, and has appended geographical location information and obtained request recognition function.Like this, send geographical location information at geographical location information service processes and obtain after request, first call geographical location information defence program and process.
Institute it should be noted that; injection in the embodiment of the present invention is only exemplary; those of ordinary skill in the art can adopt other technology to complete geographical location information handling procedure is replaced with to geographical location information defence program, and the embodiment of the present invention exemplifies no longer one by one.
In the embodiment of the present invention, inject after geographical location information defence program in geographical location information service processes, geographical location information defence program can be replaced existing target program or system positioning service program in geographical location information service process.Like this, in subsequent applications, can identify third party by physical layer interface and apply the geographical location information sending and obtain request, and can not affect the normal use of other application program.
As optional embodiment, before starting the geographical location information defence program injecting in advance in geographical location information service processes, the method may further include:
Obtain root (Root) authority of third party's application operating system or intelligent terminal operating system.
In this step, by obtaining in advance the Root authority of third party's application operating system or intelligent terminal operating system, thereby can realize lifting authority.Wherein, Root is the super administrator's account in (SuSE) Linux OS and Unix operating system, if obtain Root authority, represents to have obtained the highest weight limit of third party's application operating system or intelligent terminal operating system.Like this, can carry out and the operation such as increase, delete, change, look into any file (comprising operating system file) in third party application or intelligent terminal, thereby realize the injection of geographical location information defence program.
Step 102, the described geographical location information camouflage program of startup is obtained after request intercepting the geographical location information that third party sends, and according to the geographical location information camouflage strategy setting in advance, responds described geographical location information and obtains request.
In this step, the described geographical location information defence program of startup is applied the geographical location information sending and is obtained after request recognizing third party, according to the geographical location information protection strategy setting in advance, processes described geographical location information and obtains request.
The geographical location information defence program Real-Time Monitoring third party who starts applies the geographical location information sending by privacy information service processes and obtains request.
Geographical location information defence program is applied the geographical location information sending and is obtained after request recognizing third party, and the method may further include:
Resolve geographical location information and obtain request; obtain the intelligent terminal information comprising; the intelligent terminal corresponding to the intelligent terminal information of obtaining sends information; whether choose geographical location information protection strategy with prompting user; and choose geographical location information and protect after tactful information receiving user; carry out the described geographical location information protection strategy according to setting in advance, respond described geographical location information and obtain the flow process of request.
As optional embodiment, geographical location information defence program identification third party applies the geographical location information the sending request of obtaining and comprises:
Applying initiation geographical location information third party obtains after request, the geographical location information defence program (dynamic object program) injecting in third party's application operating system is intercepted and captured this geographical location information and is obtained request, so that the request of obtaining of described geographical location information is not sent to intelligent terminal; Or,
Third party applies initiation geographical location information and obtains request, is sent to intelligent terminal, and the geographical location information defence program (system positioning service program) injecting in intelligent terminal operating system is intercepted and captured this geographical location information and obtained request.Particularly, third party's application adopts inter-process communication mechanisms with the locator data module of intelligent terminal operating system, for example, and the BINDER communication mechanism of Android system.Third party's application call BINDER communication mechanism interface function, obtain a handle (being memory variable or function) that points to the service of third party's application site, then, the geographical location information that sends striding course to location-based service by the handle obtaining obtains request, pass through inter-process communication mechanisms, location-based service receives geographical location information and obtains request, and pass through again inter-process communication mechanisms, obtain the geographical location information request of obtaining and point to the location-based service handle of the locator data module of intelligent terminal operating system, the location-based service handle of the locator data module of intelligent terminal operating system receives geographical location information and obtains request, process geographical location information and obtain request, and return to the data (geographical location information of camouflage) of request.Wherein, the locator data module of intelligent terminal operating system is an independently system process, and applying with third party is not same process.
In the embodiment of the present invention; because third party's application (application program) need to be obtained the handle (memory variable) that points to location-based service; in application program, inject geographical location information defence program by applying third party; replace handle (memory variable) that third party applies the sensing location-based service that application program the gets false handle (memory variable) for arranging in geographical location information defence program, thereby make false handle (memory variable) invoked time, carry out the logic of identifying.Or; by inject geographical location information defence program in intelligent terminal operating system; the handle for communication data between receiving process in the positioning service of intelligent terminal operating system (memory variable) is replaced with to the false handle (memory variable) that geographical location information defence program arranges; false handle (memory variable) the system positioning service of having precedence over is received from the geographical location information of third party's application and obtain request, false handle (memory variable) is carried out the logic of identification when called.
In the embodiment of the present invention, as optional embodiment, according to the geographical location information protection strategy setting in advance, respond the request of obtaining of described geographical location information and comprise:
From the camouflage geographical location information list setting in advance, choose a camouflage geographical location information, be encapsulated in geographical location information and obtain in request response, be sent to third party's application.
As optional embodiment, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
From the geographical location information camouflage list setting in advance, choose the geographical location information of a camouflage, be encapsulated in privacy information and obtain in request response, be sent to third party's application.
As another optional embodiment, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
According to the geographical location information Camouflage Algorithm based on virtual route planning setting in advance, generate the geographical location information of a camouflage, and the geographical location information of the camouflage of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
As an optional embodiment again, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
Analyze privacy information and obtain the third party's application message comprising in request, generate the corresponding geographical location information with the rational camouflage of space-time according to third party's application message of analyzing, and the geographical location information of the camouflage of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
In this step, in camouflage geographical location information list, both can all be formed by camouflage geographical location information, thereby hide the real geographical location information of user; Also can be formed by camouflage geographical location information and current actual geographic positional information, hide the real geographical location information of user by true and false geographical location information.For example, in camouflage geographical location information list, can comprise: Macao's Casino Lisboa, Hong Kong Causeway Bay's, palm island, Dubai, French Eiffel Tower, Notre Dame de Paris, France and Bali etc.For instance, by simulate the data of Hotel Lisboa, Macao in camouflage geographical location information list, like this, can effectively cheat third party's application, think that intelligent terminal is genuine just in Macao.The social software that even can cheat third party's application finds false local online friend.
In the time choosing geographical location information, can be from camouflage geographical location information list, to choose a geographical location information at random, can be also from camouflage geographical location information list, to choose a geographical location information according to equiprobable mode.Certainly, in practical application, can be also that camouflage geographical location information list is first shown to user, chosen by user, and the geographical location information that user is chosen is encapsulated in geographical location information and obtains in request response.
Further, for each geographical location information of choosing, can also, in conjunction with electronic chart, the geographical location information of choosing be labeled in electronic chart, and have the electronic chart of geographical location information to be encapsulated in geographical location information mark to obtain in request response.For example, for Macao's Casino Lisboa, can in electronic chart, provide Macao's Casino Lisboa concrete geographical location information, for instance, No. 37, the especially big road of the Lun Sitai of Macao in the corresponding electronic chart of Macao's Casino Lisboa, again for example, for Guincho a Galera Portugal dining room, the Jing Lu 2-4 Hotel Lisboa, peninsula Portugal of district of hall of Macao Special Administrative Region in corresponding electronic chart; For Aux Beaux Arts, the sun yat-sen main road Mei Gaomei hotel, the peninsula, district of hall of Macao Special Administrative Region in corresponding electronic chart; For Bank of China Tower, No. 323, district of hall of the Macao Special Administrative Region doctor Su Yalisi main road in corresponding electronic chart.Certainly,, in practical application, also can in electronic chart, show the specifying information around the geographical location information of choosing.
As an optional embodiment, geographical location information comprises: latitude information, longitude information and altitude information etc.As another optional embodiment, geographical location information also can comprise: service set identifier information, BSSID information, base station information and adjacent base station information etc., or geographical location information also can comprise: the latitude and longitude information of service set identifier information mapping etc.Wherein, base station can be mobile network's base radio station for mobile telephone, also can be WLAN (wireless local area network) (WLAN, Wireless Local Area Networks) wireless base station, base station information can comprise: intelligent terminal telecommunication network business name information, base station frequency band, BTS channel, base station authentication information, base station location coordinate, base station type, base station title, base station model, base station media access control layer (MAC, Medium Access Control) address, base station network information, base station location district coding (LAC, Location Area Code), base station cell mark (Cell ID) information etc.For example, in the time that intelligent terminal connects base radio station for mobile telephone, base station information is the relevant information such as base station LAC, base station Cell ID, when intelligent terminal connects WiFi base station, for example, the WiFi focus that intelligent terminal connects, or intelligent terminal around can detect WiFi focus time, base station information is the relevant information such as base station title, base station MAC address.
Institute it should be noted that, in the embodiment of the present invention, service set identifier information, BSSID information, base station information and adjacent base station information are all the camouflage information that intelligent terminal is corresponding, and fict information, but this camouflage information is actually existence, just not in the region at the current place of intelligent terminal.
In the embodiment of the present invention, the geographical location information in camouflage geographical location information list can be from the address date gathering on the spot on internet, the address date that also can gather from user oneself, and the address date gathering is used for to camouflage.
As another optional embodiment, according to the geographical location information protection strategy setting in advance, respond the request of obtaining of described geographical location information and comprise:
According to the camouflage geographical location information generating algorithm setting in advance, generate a geographical location information, and the geographical location information of generation is encapsulated in to geographical location information obtains in request response, be sent to third party's application.
In this step, camouflage geographical location information generating algorithm can be the generating algorithm based on virtual route planning.In the embodiment of the present invention, can plan to cover user's real trace by building virtual route, thus the real geographical location information of protection user.For example, generating algorithm based on virtual route planning can be set in advance one from Harbin through Beijing, the virtual route planning of Nanjing to Lhasa, in virtual route planning, multiple sequentially connected camouflage geographical location information are set, obtain after request recognizing geographical location information, according to the time sequencing of identification, the camouflage geographical location information by sequence notation in virtual route planning is encapsulated in geographical location information and obtains in request response, is sent to third party's application.Certainly, in practical application, can also obtain the mistiming between request according to the vehicles that set in advance and the front and back geographical location information of reception, calculate the geographic position based on current, in the geographic position of described vehicles correspondence after the operation of described mistiming, this corresponding geographical location information is encapsulated in to geographical location information and obtains in request response.For example, it is Beijing that last geographical location information obtains the geographical location information returning in request response, if the mistiming that the current and last geographical location information receiving obtains between request is 16 hours, the instrument of handing over setting in advance is train, train was through the operation of 16 hours, should reach the Changsha in virtual route planning, Changsha is encapsulated in to current geographic position information and obtain in request response.
As an optional embodiment again, according to the geographical location information protection strategy setting in advance, respond the request of obtaining of described geographical location information and comprise:
Analyze geographical location information and obtain the third party's application message comprising in request, generate the corresponding rational geographical location information of space-time that has according to third party's application message of analyzing, and the geographical location information of generation is encapsulated in to geographical location information obtains in request response, be sent to third party's application.
In this step, the object that third party application may be based on different, need to obtain different privacy informations to user.For example, if third party is applied as GT grand touring company, wish to obtain user's tourist destination relevant information, in the embodiment of the present invention, can be applied as after tourism associated companies analysis third party, generate geographical location information corresponding to camouflage tourism path.For instance, the tourism route in Beijing-Sanya-Macao is set, the geographical location information sequentially sending according to this third party's application receiving obtains request, sequentially returns to the geographical location information such as Beijing, Sanya, Macao, thereby forms virtual tourism route information.Wherein, virtual route can be user's Dynamic Selection or predetermined, irrelevant with true path, and user can start virtual route planning at any time.
In the embodiment of the present invention, the form that geographical location information obtains request response obtains and asks response format identical with existing geographical location information, among calling of geographical location information obtained in intercepting and capturing third party application, according to operating system established form, return to third party and apply rreturn value, this rreturn value is operating system set form, but the content of this rreturn value is the camouflage geographical location information that sets in advance but not true geographical location information, for example, the content that this rreturn value is set is the data such as the real MAC address of certain base station, strange land, thereby can cheat third party's application.
As optional embodiment, to obtain after request at the described privacy information of described processing, described method further comprises:
Send prompting message to intelligent terminal; And/or,
Described third party's application is carried out to security sweep; And/or,
Unload described third party's application; And/or,
For described third party's application arranges privacy access rights.
As optional embodiment, the method for the embodiment of the present invention can be applied at the method for protecting privacy of having applied under geographical location information Service Privileges environment.
Fig. 2 shows the geographical location information protective device structure of the embodiment of the present invention.Referring to Fig. 2, this device comprises: injection module, startup module and recognition processing module, wherein,
Injection module, for injecting the geographical location information defence program setting in advance at geographical location information service processes;
In the embodiment of the present invention, can in the geographical location information service processes of third party's application operating system, inject in advance dynamic object program, variable or the method for the service of calling system geographical location information of the target program by Dynamic injection, replace variable or the method for the service of calling system geographical location information of the target program of third party's application operating system, or, also can be in the geographical location information service processes of intelligent terminal operating system the program of injected system positioning service in advance, the function of replacing in the positioning service of intelligent terminal operating system is function corresponding to system positioning service program injecting.
As optional embodiment, injection module comprises: first searches unit and the first replacement unit (not shown), wherein,
First searches unit, for searching the memory variable of the existing target program for geographical location information processing of geographical location information service processes of third party's application operating system;
In the embodiment of the present invention, be that third party applies the program that sends address location information acquisition request for the target program of geographical location information processing.
The first replacement unit, for replacing with the memory variable of the described existing target program for geographical location information processing the memory variable of the dynamic object program setting in advance.
In the embodiment of the present invention, the idiographic flow that the first replacement unit is replaced is as follows:
The memory variable code of geographical location information defence program is write in dynamic link library, utilize the windows hook in operating system that the memory variable code mapping that writes the geographical location information defence program in dynamic link library is arrived to long-range geographical location information service process; Or,
The memory variable code of geographical location information defence program is write in dynamic link library, utilize Remote create and dynamic load in operating system that the memory variable code that writes the geographical location information defence program in dynamic link library is mapped to long-range geographical location information service process; Or,
Utilize system process monitor, the memory variable Code copying of geographical location information defence program is arrived to long-range geographical location information service process, and utilize Remote create to carry out.
As another optional embodiment, injection module comprises: second searches unit and the second replacement unit, wherein,
Second searches unit, for searching the function of the existing system positioning service program for geographical location information processing of geographical location information service processes of intelligent terminal operating system;
In the embodiment of the present invention, be that intelligent terminal receiver address positional information is obtained the program of request for the system positioning service program of geographical location information processing.
The second replacement unit, for replacing with the function of the described existing system positioning service program for geographical location information processing the function of the system positioning service program setting in advance.
In the embodiment of the present invention, the idiographic flow that the idiographic flow that the second replacement unit is replaced and the first replacement unit are replaced is similar, omits detailed description at this.
Start module, the geographical location information defence program injecting in advance for starting geographical location information service processes;
In the embodiment of the present invention, starting module is optional module.
Recognition processing module, apply the geographical location information sending and obtains after request for recognizing third party at the geographical location information defence program starting, tactful according to the geographical location information protection setting in advance, and processes described geographical location information and obtains request.
In the embodiment of the present invention, recognition processing module comprises: recognition unit and processing unit (not shown), wherein,
Recognition unit, applies the geographical location information sending and obtains after request, push-notification-answer unit for recognizing third party at the geographical location information defence program starting;
In the embodiment of the present invention, can be that the dynamic object program injected in third party's application operating system is intercepted and captured the geographical location information that third party applies initiation and obtained request; Also can be that the geographical location information request of obtaining that third party applies initiation reaches after intelligent terminal, intercept and capture this geographical location information by the system positioning service program of injecting in intelligent terminal operating system and obtain request.
Processing unit, for reception notification, according to the geographical location information protection strategy setting in advance, processes described geographical location information and obtains request.
In the embodiment of the present invention, processing unit can, from the camouflage geographical location information list setting in advance, be chosen a geographical location information, is encapsulated in geographical location information and obtains in request response, is sent to third party's application.Or, according to the camouflage geographical location information generating algorithm setting in advance, generate a camouflage geographical location information, and the camouflage geographical location information of generation is encapsulated in to geographical location information obtains in request response, be sent to third party's application.Wherein, camouflage geographical location information generating algorithm can be the generating algorithm based on virtual route planning, thereby can plan to cover user's real trace by building virtual route, in order to protect the real geographical location information of user.
As optional embodiment, geographical location information comprises: latitude information, longitude information and altitude information etc.
As optional embodiment, recognition processing module further comprises:
Resolution unit, for receiving the notice from recognition unit, resolve geographical location information and obtain request, obtain the intelligent terminal information comprising, the intelligent terminal corresponding to the intelligent terminal information of obtaining sends information, whether choose geographical location information camouflage strategy with prompting user, and choose geographical location information and pretend after tactful information, push-notification-answer unit receiving user.
As optional embodiment, this device may further include:
Authority acquiring module, for obtaining after the root authority of third party's application operating system or intelligent terminal operating system, notice injection module.
As optional embodiment, described device further comprises:
Expansion module (not shown), for obtaining after request at the described privacy information of described processing, sends prompting message to intelligent terminal; And/or,
Described third party's application is carried out to security sweep; And/or,
Unload described third party's application; And/or,
For described third party's application arranges privacy access rights.
In the embodiment of the present invention; unified processing is carried out in the geographical location information request of obtaining of third party being applied to initiation by geographical location information protective device; the geographical location information request of obtaining that makes third party apply initiation cannot reach the positioning service program (system positioning service program) of intelligent terminal; directly send to the geographical location information that geographical location information protective device obtains protection, and return to the geographical location information of protection to third party's application.Thereby, avoid the third parties such as business website or service provider (SP, Service Provider) to apply and obtained user's geographical location information, the risk that causes user's geographical location information to leak.
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the instructions that provided herein, a large amount of details are described.But, can understand, embodiments of the invention can be put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.But, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them in addition multiple submodules or subelement or sub-component.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature instead of further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module of moving on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize according to the some or all functions of the some or all parts in the geographical location information protective device of the embodiment of the present invention.The present invention can also be embodied as part or all equipment or the device program (for example, computer program and computer program) for carrying out method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website server, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described instead of limit the invention, and those skilled in the art can design alternative embodiment in the case of not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has multiple such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In the unit claim of having enumerated some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
The method that the invention discloses an A1. privacy information protection, comprising:
In privacy information service processes, inject privacy information protection program;
Described privacy information protection program is applied the privacy information sending and is obtained after request recognizing third party, according to the privacy information protection strategy setting in advance, processes described privacy information and obtains request.
A2. according to the method described in A1, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
From the geographical location information camouflage list setting in advance, choose the geographical location information of a camouflage, be encapsulated in privacy information and obtain in request response, be sent to third party's application.
A3. according to the method described in A1, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
According to the geographical location information Camouflage Algorithm based on virtual route planning setting in advance, generate the geographical location information of a camouflage, and the geographical location information of the camouflage of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
A4. according to the method described in A1, described camouflage privacy information comprises geographical location information, and the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and comprised:
Analyze privacy information and obtain the third party's application message comprising in request, generate the corresponding geographical location information with the rational camouflage of space-time according to third party's application message of analyzing, and the geographical location information of the camouflage of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
A5. according to the method described in A1, the privacy information service processes that described injection is included in third party's application operating system injects, or, in the privacy information service processes of intelligent terminal, inject.
A6. according to the method described in A5, describedly in the privacy information service processes of third party's application operating system, inject and comprise:
Search the memory variable of the existing target program for privacy information processing in the privacy information service processes of third party's application operating system;
The memory variable of the described existing target program for privacy information processing is replaced with to the memory variable of the dynamic object program setting in advance.
A7. according to the method described in A6, the described target program for privacy information processing is that third party applies the program that sends address location information acquisition request.
A8. according to the method described in A6, the memory variable that the described memory variable by the described existing target program for privacy information processing replaces with the dynamic object program setting in advance comprises:
The memory variable code of privacy information protection program is write in dynamic link library, utilize the windows hook in operating system that the memory variable code mapping that writes the privacy information protection program in dynamic link library is arrived to long-range privacy information service processes.
A9. according to the method described in A6, the memory variable that the described memory variable by the described existing target program for privacy information processing replaces with the dynamic object program setting in advance comprises:
The memory variable code of privacy information protection program is write in dynamic link library, utilize Remote create and dynamic load in operating system that the memory variable code mapping that writes the privacy information protection program in dynamic link library is arrived to long-range privacy information service processes.
A10. according to the method described in A6, the memory variable that the described memory variable by the described existing target program for privacy information processing replaces with the dynamic object program setting in advance comprises:
Utilize system process monitor, the memory variable Code copying of privacy information protection program is arrived to long-range privacy information service processes, and utilize Remote create to carry out.
A11. according to the method described in A5, describedly in the privacy information service processes of intelligent terminal, inject and comprise:
Search the function of the existing system positioning service program for privacy information processing in the privacy information service processes of intelligent terminal operating system;
The function of the described existing system positioning service program for privacy information processing is replaced with to the function of the system positioning service program setting in advance.
A12. according to the method described in A1, described in privacy information service processes, inject privacy information protection program before, described method further comprises:
Obtain the root authority of third party's application operating system or intelligent terminal operating system.
A13. according to the method described in A1, described privacy information protection program is applied the privacy information sending and is obtained after request recognizing third party, and described method further comprises:
Resolve privacy information and obtain request; obtain the intelligent terminal information comprising; the intelligent terminal corresponding to the intelligent terminal information of obtaining sends information; whether choose privacy information protection strategy with prompting user; and choose after the information of privacy information protection strategy receiving user; described in carrying out, according to the privacy information protection strategy setting in advance, process described privacy information and obtain the flow process of request.
A14. according to the method described in A1, the described privacy information protection strategy according to setting in advance, process the request of obtaining of described privacy information and comprise:
From the camouflage privacy information list setting in advance, choose a camouflage privacy information, be encapsulated in privacy information and obtain in request response, be sent to third party's application.
A15. according to the method described in A1, the described privacy information protection strategy according to setting in advance, process the request of obtaining of described privacy information and comprise:
According to the camouflage privacy information generating algorithm setting in advance, generate a camouflage privacy information, and the camouflage privacy information of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
A16. according to the method described in A15, described camouflage privacy information generating algorithm is the generating algorithm based on virtual route planning.
A17. according to the method described in A1, the described privacy information protection strategy according to setting in advance, process the request of obtaining of described privacy information and comprise:
Analyze privacy information and obtain the third party's application message comprising in request, generate the corresponding rational camouflage privacy information of space-time that has according to third party's application message of analyzing, and the camouflage privacy information of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
A18. according to the method described in A1, described third party's application is sent privacy information by described privacy information service processes and is obtained request.
A19. according to the method described in A1, obtain after request at the described privacy information of described processing, described method further comprises:
Send prompting message to intelligent terminal; And/or,
Described third party's application is carried out to security sweep; And/or,
Unload described third party's application; And/or,
For described third party's application arranges privacy access rights.
A20. at a method for protecting privacy of having applied under geographical location information Service Privileges environment, carry out the method as described in claim 1 to 19 any one.
A21. a privacy information protection device, this device comprises: injection module and recognition processing module, wherein,
Injection module, for injecting the privacy information protection program setting in advance at privacy information service processes;
Recognition processing module, obtains after request for applying to third party the privacy information sending in described privacy information protection procedure identification, according to the privacy information protection strategy setting in advance, processes described privacy information and obtains request.
A22. according to the device described in A21, described injection module is for injecting in advance dynamic object program at the privacy information service processes of third party's application operating system, variable or the method for the service of calling system privacy information of the target program by Dynamic injection, variable or the method for the service of calling system privacy information of replacing the target program of third party's application operating system.
A23. according to the device described in A21, described injection module is for the privacy information service processes injected system positioning service in advance program in intelligent terminal operating system, and the function of replacing in the positioning service of intelligent terminal operating system is function corresponding to system positioning service program injecting.
A24. according to the device described in A21, described injection module comprises: first searches unit and the first replacement unit, wherein,
First searches unit, for searching the memory variable of the existing target program for privacy information processing of privacy information service processes of third party's application operating system;
The first replacement unit, for replacing with the memory variable of the described existing target program for privacy information processing the memory variable of the dynamic object program setting in advance.
A25. according to the device described in A21, described injection module comprises: second searches unit and the second replacement unit, wherein,
Second searches unit, for searching the function of the existing system positioning service program for privacy information processing of privacy information service processes of intelligent terminal operating system;
The second replacement unit, for replacing with the function of the described existing system positioning service program for privacy information processing the function of the system positioning service program setting in advance.
A26. according to the device described in A21, described recognition processing module comprises: recognition unit and processing unit, wherein,
Recognition unit, obtains after request push-notification-answer unit for applying to third party the privacy information sending in the privacy information protection procedure identification starting;
Processing unit, for reception notification, according to the privacy information protection strategy setting in advance, processes described privacy information and obtains request.
A27. according to the device described in A26, described recognition processing module further comprises:
Resolution unit; for receiving the notice from recognition unit; resolve privacy information and obtain request; obtain the intelligent terminal information comprising; the intelligent terminal corresponding to the intelligent terminal information of obtaining sends information; whether choose privacy information protection strategy with prompting user, and choose after the information of privacy information protection strategy push-notification-answer unit receiving user.
A28. according to the device described in A21, described device further comprises:
Authority acquiring module, for obtaining after the root authority of third party's application operating system or intelligent terminal operating system, notice injection module.
A29. according to the device described in A21, described device further comprises:
Expansion module, for obtaining after request at the described privacy information of described processing, sends prompting message to intelligent terminal; And/or,
Described third party's application is carried out to security sweep; And/or,
Unload described third party's application; And/or,
For described third party's application arranges privacy access rights.

Claims (10)

1. a method for privacy information protection, comprising:
In privacy information service processes, inject privacy information protection program;
Described privacy information protection program is applied the privacy information sending and is obtained after request recognizing third party, according to the privacy information protection strategy setting in advance, processes described privacy information and obtains request.
2. the method for claim 1, described camouflage privacy information comprises geographical location information, the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and is comprised:
From the geographical location information camouflage list setting in advance, choose the geographical location information of a camouflage, be encapsulated in privacy information and obtain in request response, be sent to third party's application.
3. the method for claim 1, described camouflage privacy information comprises geographical location information, the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and is comprised:
According to the geographical location information Camouflage Algorithm based on virtual route planning setting in advance, generate the geographical location information of a camouflage, and the geographical location information of the camouflage of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
4. the method for claim 1, described camouflage privacy information comprises geographical location information, the described privacy information protection strategy according to setting in advance is processed the request of obtaining of described privacy information and is comprised:
Analyze privacy information and obtain the third party's application message comprising in request, generate the corresponding geographical location information with the rational camouflage of space-time according to third party's application message of analyzing, and the geographical location information of the camouflage of generation is encapsulated in to privacy information obtains in request response, be sent to third party's application.
5. the method for claim 1, the privacy information service processes that described injection is included in third party's application operating system injects, or, in the privacy information service processes of intelligent terminal, inject.
6. method as claimed in claim 5, describedly in the privacy information service processes of third party's application operating system, inject and comprise:
Search the memory variable of the existing target program for privacy information processing in the privacy information service processes of third party's application operating system;
The memory variable of the described existing target program for privacy information processing is replaced with to the memory variable of the dynamic object program setting in advance.
7. method as claimed in claim 6, the described target program for privacy information processing is that third party applies the program that sends address location information acquisition request.
8. method as claimed in claim 6, the memory variable that the described memory variable by the described existing target program for privacy information processing replaces with the dynamic object program setting in advance comprises:
The memory variable code of privacy information protection program is write in dynamic link library, utilize the windows hook in operating system that the memory variable code mapping that writes the privacy information protection program in dynamic link library is arrived to long-range privacy information service processes.
9. a privacy information protection device, this device comprises: injection module and recognition processing module, wherein,
Injection module, for injecting the privacy information protection program setting in advance at privacy information service processes;
Recognition processing module, obtains after request for applying to third party the privacy information sending in described privacy information protection procedure identification, according to the privacy information protection strategy setting in advance, processes described privacy information and obtains request.
10. device as claimed in claim 9, described injection module is for injecting in advance dynamic object program at the privacy information service processes of third party's application operating system, variable or the method for the service of calling system privacy information of the target program by Dynamic injection, variable or the method for the service of calling system privacy information of replacing the target program of third party's application operating system.
CN201410344802.4A 2014-07-18 2014-07-18 Privacy information protecting method and privacy information protecting device Pending CN104102358A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410344802.4A CN104102358A (en) 2014-07-18 2014-07-18 Privacy information protecting method and privacy information protecting device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410344802.4A CN104102358A (en) 2014-07-18 2014-07-18 Privacy information protecting method and privacy information protecting device

Publications (1)

Publication Number Publication Date
CN104102358A true CN104102358A (en) 2014-10-15

Family

ID=51670558

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410344802.4A Pending CN104102358A (en) 2014-07-18 2014-07-18 Privacy information protecting method and privacy information protecting device

Country Status (1)

Country Link
CN (1) CN104102358A (en)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104713547A (en) * 2015-03-16 2015-06-17 酷派软件技术(深圳)有限公司 Method and terminal for generating position information
CN104735617A (en) * 2015-03-06 2015-06-24 宇龙计算机通信科技(深圳)有限公司 Terminal and sharing method of position information of terminal
CN105184149A (en) * 2015-08-11 2015-12-23 广东欧珀移动通信有限公司 Method and system for preventing rogue program from frequently acquiring user position information
CN105338065A (en) * 2015-09-30 2016-02-17 北京奇虎科技有限公司 Terminal equipment position information protection method and device
CN105574436A (en) * 2015-12-23 2016-05-11 惠州Tcl移动通信有限公司 Personal information protection method and system based on mobile terminal and mobile terminal
CN105630854A (en) * 2015-01-28 2016-06-01 深圳酷派技术有限公司 Data search method, data search apparatus and terminal
CN105631326A (en) * 2014-11-05 2016-06-01 中兴通讯股份有限公司 Security protection method and device for sensitive information
CN105653979A (en) * 2015-12-29 2016-06-08 银江股份有限公司 Code injection based privacy information protection method
CN105792120A (en) * 2014-12-23 2016-07-20 小米科技有限责任公司 Path trace acquisition method and system
CN106022128A (en) * 2016-05-13 2016-10-12 北京奇虎科技有限公司 Method and device for detecting process access right and mobile terminal
WO2016179860A1 (en) * 2015-05-14 2016-11-17 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for protecting position information in multi-operating system terminal, and terminal
CN106210316A (en) * 2016-07-12 2016-12-07 深圳市中易通安全芯科技有限公司 A kind of anti-localization method of mobile terminal based on virtual address and system thereof
WO2016191917A1 (en) * 2015-05-29 2016-12-08 宇龙计算机通信科技(深圳)有限公司 Position camouflage method, apparatus and system
CN106331035A (en) * 2015-06-30 2017-01-11 北京壹人壹本信息科技有限公司 Tracking prevention method and terminal
CN106454813A (en) * 2016-11-17 2017-02-22 珠海市魅族科技有限公司 Wireless communication mode setting method and device
CN106686049A (en) * 2016-08-09 2017-05-17 腾讯科技(深圳)有限公司 Position virtualization method and position virtualization device
CN106897610A (en) * 2017-01-19 2017-06-27 北京奇虎科技有限公司 A kind of method and apparatus for positioning protection
CN106933979A (en) * 2017-02-16 2017-07-07 北京奇虎科技有限公司 A kind of position information processing method, device and mobile terminal
CN106940650A (en) * 2017-02-16 2017-07-11 北京奇虎科技有限公司 The data capture method and mobile terminal of a kind of mobile terminal
CN107040540A (en) * 2017-04-20 2017-08-11 北京奇虎科技有限公司 A kind of cloud private data display methods and device, server and mobile terminal
CN107292614A (en) * 2017-06-28 2017-10-24 广东欧珀移动通信有限公司 Pay class application management method, device and mobile terminal
CN107771408A (en) * 2016-06-17 2018-03-06 华为技术有限公司 Mobile terminal and its localization method
WO2018072436A1 (en) * 2016-10-21 2018-04-26 中兴通讯股份有限公司 Privilege management method, device and terminal
CN108476403A (en) * 2016-02-26 2018-08-31 慧与发展有限责任合伙企业 Equipment secret protection
CN109167782A (en) * 2018-08-31 2019-01-08 国鼎网络空间安全技术有限公司 Private data guard method and system based on intelligent mobile terminal
CN109688145A (en) * 2015-12-23 2019-04-26 北京奇虎科技有限公司 The guard method of privacy information and device
CN110267262A (en) * 2019-04-30 2019-09-20 北京邮电大学 Context aware method and device towards personal secrets
CN111142973A (en) * 2019-12-31 2020-05-12 联想(北京)有限公司 Information processing method, device, electronic equipment and medium
CN112565306A (en) * 2021-02-24 2021-03-26 江苏苏测检测认证有限公司 Third-party server identification method for app private data collection
CN113268185A (en) * 2021-05-31 2021-08-17 维沃移动通信(杭州)有限公司 Information providing method and device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102176709A (en) * 2010-12-13 2011-09-07 北京交通大学 Method and device with privacy protection function for data sharing and publishing
CN102523201A (en) * 2011-12-01 2012-06-27 华中科技大学 User privacy protection method under cloud security environment
CN102693388A (en) * 2012-06-07 2012-09-26 腾讯科技(深圳)有限公司 Data safety protection processing system, method and storage medium
CN102694860A (en) * 2012-05-25 2012-09-26 北京邦诺存储科技有限公司 Method, equipment and system for data processing of cloud storage
CN102831238A (en) * 2012-09-03 2012-12-19 湖南赛格导航技术研究有限公司 Method for showing historical track of vehicle running in test mode
US20140108518A1 (en) * 2007-06-12 2014-04-17 Facebook, Inc. Providing Personalized Platform Application Content
CN103761472A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program accessing method and device based on intelligent terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140108518A1 (en) * 2007-06-12 2014-04-17 Facebook, Inc. Providing Personalized Platform Application Content
CN102176709A (en) * 2010-12-13 2011-09-07 北京交通大学 Method and device with privacy protection function for data sharing and publishing
CN102523201A (en) * 2011-12-01 2012-06-27 华中科技大学 User privacy protection method under cloud security environment
CN102694860A (en) * 2012-05-25 2012-09-26 北京邦诺存储科技有限公司 Method, equipment and system for data processing of cloud storage
CN102693388A (en) * 2012-06-07 2012-09-26 腾讯科技(深圳)有限公司 Data safety protection processing system, method and storage medium
CN102831238A (en) * 2012-09-03 2012-12-19 湖南赛格导航技术研究有限公司 Method for showing historical track of vehicle running in test mode
CN103761472A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program accessing method and device based on intelligent terminal

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631326A (en) * 2014-11-05 2016-06-01 中兴通讯股份有限公司 Security protection method and device for sensitive information
CN105792120B (en) * 2014-12-23 2019-10-25 小米科技有限责任公司 The acquisition methods and system of path locus
CN105792120A (en) * 2014-12-23 2016-07-20 小米科技有限责任公司 Path trace acquisition method and system
CN105630854A (en) * 2015-01-28 2016-06-01 深圳酷派技术有限公司 Data search method, data search apparatus and terminal
CN105630854B (en) * 2015-01-28 2020-07-03 深圳酷派技术有限公司 Data searching method, data searching device and terminal
CN104735617A (en) * 2015-03-06 2015-06-24 宇龙计算机通信科技(深圳)有限公司 Terminal and sharing method of position information of terminal
CN104735617B (en) * 2015-03-06 2018-08-24 宇龙计算机通信科技(深圳)有限公司 The sharing method of terminal and its location information
CN104713547A (en) * 2015-03-16 2015-06-17 酷派软件技术(深圳)有限公司 Method and terminal for generating position information
WO2016179860A1 (en) * 2015-05-14 2016-11-17 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for protecting position information in multi-operating system terminal, and terminal
WO2016191917A1 (en) * 2015-05-29 2016-12-08 宇龙计算机通信科技(深圳)有限公司 Position camouflage method, apparatus and system
CN107211269A (en) * 2015-05-29 2017-09-26 宇龙计算机通信科技(深圳)有限公司 Position camouflage method, apparatus and system
CN106331035A (en) * 2015-06-30 2017-01-11 北京壹人壹本信息科技有限公司 Tracking prevention method and terminal
CN105184149A (en) * 2015-08-11 2015-12-23 广东欧珀移动通信有限公司 Method and system for preventing rogue program from frequently acquiring user position information
CN105184149B (en) * 2015-08-11 2018-07-06 广东欧珀移动通信有限公司 A kind of method and system for preventing rogue program from frequently obtaining customer position information
CN105338065A (en) * 2015-09-30 2016-02-17 北京奇虎科技有限公司 Terminal equipment position information protection method and device
CN109688145B (en) * 2015-12-23 2021-07-16 北京奇虎科技有限公司 Method and device for protecting privacy information
CN109688145A (en) * 2015-12-23 2019-04-26 北京奇虎科技有限公司 The guard method of privacy information and device
CN105574436A (en) * 2015-12-23 2016-05-11 惠州Tcl移动通信有限公司 Personal information protection method and system based on mobile terminal and mobile terminal
CN105653979A (en) * 2015-12-29 2016-06-08 银江股份有限公司 Code injection based privacy information protection method
CN108476403B (en) * 2016-02-26 2021-09-10 慧与发展有限责任合伙企业 Device privacy protection
CN108476403A (en) * 2016-02-26 2018-08-31 慧与发展有限责任合伙企业 Equipment secret protection
CN106022128A (en) * 2016-05-13 2016-10-12 北京奇虎科技有限公司 Method and device for detecting process access right and mobile terminal
CN106022128B (en) * 2016-05-13 2019-03-08 北京奇虎科技有限公司 Method, device and mobile terminal for detection procedure access authority
CN107771408A (en) * 2016-06-17 2018-03-06 华为技术有限公司 Mobile terminal and its localization method
CN107771408B (en) * 2016-06-17 2020-02-21 华为技术有限公司 Mobile terminal and positioning method thereof
CN106210316A (en) * 2016-07-12 2016-12-07 深圳市中易通安全芯科技有限公司 A kind of anti-localization method of mobile terminal based on virtual address and system thereof
CN106686049A (en) * 2016-08-09 2017-05-17 腾讯科技(深圳)有限公司 Position virtualization method and position virtualization device
CN106686049B (en) * 2016-08-09 2019-06-14 腾讯科技(深圳)有限公司 Position virtual method and position virtual bench
CN107979684A (en) * 2016-10-21 2018-05-01 中兴通讯股份有限公司 Right management method, device and terminal
WO2018072436A1 (en) * 2016-10-21 2018-04-26 中兴通讯股份有限公司 Privilege management method, device and terminal
CN106454813A (en) * 2016-11-17 2017-02-22 珠海市魅族科技有限公司 Wireless communication mode setting method and device
WO2018133654A1 (en) * 2017-01-19 2018-07-26 北京奇虎科技有限公司 Protected positioning method and device
CN106897610A (en) * 2017-01-19 2017-06-27 北京奇虎科技有限公司 A kind of method and apparatus for positioning protection
CN106940650A (en) * 2017-02-16 2017-07-11 北京奇虎科技有限公司 The data capture method and mobile terminal of a kind of mobile terminal
CN106933979A (en) * 2017-02-16 2017-07-07 北京奇虎科技有限公司 A kind of position information processing method, device and mobile terminal
CN107040540B (en) * 2017-04-20 2020-06-09 北京安云世纪科技有限公司 Cloud privacy data display method and device, server and mobile terminal
CN107040540A (en) * 2017-04-20 2017-08-11 北京奇虎科技有限公司 A kind of cloud private data display methods and device, server and mobile terminal
CN107292614A (en) * 2017-06-28 2017-10-24 广东欧珀移动通信有限公司 Pay class application management method, device and mobile terminal
CN109167782A (en) * 2018-08-31 2019-01-08 国鼎网络空间安全技术有限公司 Private data guard method and system based on intelligent mobile terminal
CN109167782B (en) * 2018-08-31 2021-10-19 国鼎网络空间安全技术有限公司 Privacy data protection method and system based on intelligent mobile terminal
CN110267262A (en) * 2019-04-30 2019-09-20 北京邮电大学 Context aware method and device towards personal secrets
CN111142973A (en) * 2019-12-31 2020-05-12 联想(北京)有限公司 Information processing method, device, electronic equipment and medium
CN112565306A (en) * 2021-02-24 2021-03-26 江苏苏测检测认证有限公司 Third-party server identification method for app private data collection
CN112565306B (en) * 2021-02-24 2021-05-14 江苏苏测检测认证有限公司 Third-party server identification method for app private data collection
CN113268185A (en) * 2021-05-31 2021-08-17 维沃移动通信(杭州)有限公司 Information providing method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN104102358A (en) Privacy information protecting method and privacy information protecting device
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
CN104376263B (en) The method and apparatus that application behavior intercepts
US20090082001A1 (en) Method and device for controlling the function of mobile communication equipment
CN109167782B (en) Privacy data protection method and system based on intelligent mobile terminal
EP2139194A2 (en) Tracking method
CN103677935A (en) Installation and control method, system and device for application programs
CN105550595A (en) Private data access method and system for intelligent communication equipment
CN103198255A (en) Method and system for monitoring and intercepting sensitive behaviour of Android software
CN103116722A (en) Processing method, processing device and processing system of notification board information
CN105162768A (en) Method and device for detecting phishing Wi-Fi hotspots
CN106411878B (en) Method, device and system for making access control strategy
CN103647785A (en) Security control method, device and system for mobile terminal
CN105045610A (en) Method and apparatus for starting application of intelligent device
CN103987022B (en) A kind of location information inquiry method, system and mobile terminal based on mobile terminal
CN105631326A (en) Security protection method and device for sensitive information
WO2018133654A1 (en) Protected positioning method and device
CN104486086B (en) Digital signature method and mobile terminal and server
CN103685266B (en) The guard method of business data and device
US20230139604A1 (en) Alerting mobile devices based on location and duration data
CN105554264A (en) function limiting method and system of mobile terminal
WO2022022054A1 (en) Network communication method and apparatus, computer device, and storage medium
CN107018491B (en) Method and device for processing position data
CN106685891A (en) Verification method and apparatus for accessing network
CN105263119A (en) Geographical position information-based mobile intelligent terminal communication encryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141015

RJ01 Rejection of invention patent application after publication