CN102223626A - Information steganography and security protection method based on wireless base station information - Google Patents

Information steganography and security protection method based on wireless base station information Download PDF

Info

Publication number
CN102223626A
CN102223626A CN2011101585860A CN201110158586A CN102223626A CN 102223626 A CN102223626 A CN 102223626A CN 2011101585860 A CN2011101585860 A CN 2011101585860A CN 201110158586 A CN201110158586 A CN 201110158586A CN 102223626 A CN102223626 A CN 102223626A
Authority
CN
China
Prior art keywords
information
base station
program
disguising
portable terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101585860A
Other languages
Chinese (zh)
Inventor
李明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2011101585860A priority Critical patent/CN102223626A/en
Publication of CN102223626A publication Critical patent/CN102223626A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to information security protection of a mobile terminal, in particular to a information steganography and security protection method for data in the mobile terminal according to the wireless base station information. In the invention, the wireless base station information connected with the current position of the mobile terminal is periodically acquired by information steganography program installed on the portable mobile terminal from the mobile terminal; and the information steganography program carries out comparison judgment on the received wireless base station information and wireless base station information preset in the steganography program as well as carries out steganography operation on designated data information in the mobile terminal according to preset conditions in the program.

Description

A kind of information disguising method for security protection based on wireless base station information
Technical field:
The present invention relates to the information safety protection of portable terminal, particularly a kind of method of the data in the portable terminal being carried out information disguising and safeguard protection according to wireless base station information.
Background technology:
Universal day by day along with various portable mobile equipments and wireless network, use the widest cell phone to be example with present people, novel mobile phone all has multiple wireless connections and positioning functions such as mobile network's connection, location, base station, wifi WLAN (wireless local area network), GPS location simultaneously, personal data safety and privacy information in the mobile portable equipment also are subjected to increasing challenge, as the computing capability of portable computer and the increasing rapidly of information storage of notebook class, mobile phone and computer are lost the stored private information in back also will face the risk of being utilized by the people simultaneously.
Because popularizing of portable terminal device; wish in diverse location and environment, to realize safeguard protection under the more susceptible condition of people to different information; such as when using mobile phone; go out or can carry out safeguard protection to individual private information automatically when arriving specific address, and get back to the locality such as conducting interviews to private information in the family or during assigned address and need not input authorization informations such as password.Perhaps in varying environment, realize protection automatically to different information.
A kind of method that connects wifi network and beacon information change mobile phone scene mode based on mobile phone has been described in patent application 201010285317.6; patent 200720196449.5 has been described a kind of method that changes device profile based on the GPS locating information that mobile device obtained; patent 200710074145.6 has been described a kind of method that changes mobile phone scene mode based on cellular base station information; but these patents all are only to have realized according to the conversion of wireless base station information to mobile phone reminding manner; and all do not relate to for the safeguard protection of most important data message in mobile phone and the portable mobile equipment; and the realization of these methods just relies on software to finish; only need the refitting system or simply unload this class method just can remove setting; how can allow people's individual privacy according to the difference of external environment and automatically to customizing messages safeguard protection in addition; and can not remove safeguard protection to data by simple uninstall or system, be a letter problem to be solved.
Summary of the invention:
In view of this; main purpose of the present invention be to provide a kind of according to mobile device environment of living in difference and the method for automatically specific data information in the mobile device being carried out information security and information disguising protection, thereby data and the individual privacy of better protection user in portable terminal.
For achieving the above object, technical scheme of the present invention is achieved in that
The invention provides a kind of information disguising method, comprise wireless base station and the portable terminal that is attached thereto, be installed in the information disguising program on the portable terminal, implementation step is: the wireless base station information that is connected from the current present position of portable terminal collection portable terminal of information disguising property program loop, the information disguising program is judged the wireless base station information of being received again, according to pre-conditioned in the program specific data information in the portable terminal is carried out the information disguising operation.In the such scheme, the judgment mode of information disguising program is that the current base station information that connects that will collect from portable terminal compares with contrast wireless base station information default in the program, according to both information similarities and differences, the camouflage program is carried out the operation of the default information disguising to particular data, input authentication information releasing information disguising.
The default contrast of program described in such scheme wireless base station information is by manually input corresponding base station conditional information, program preset the base station information database, use the mode of the base station information of current connection base station to import in the setting interface of camouflage program; The base station information that described portable terminal is collected comprises base station frequency band, BTS channel, base station authentication information, base station location coordinate, base station type, base station title, base station model, mac address, base station, base station network information, base station LAC, base station CellID information.
Camouflage program described in the such scheme can also be preset the information of the different radio base station of one or more wireless networks of the same type in program; compare judgement with the current wireless base station information of gathering; thereby when being implemented in the coverage that is in the different radio base station, realize different guard methods to data.
Camouflage program described in the such scheme can also be gathered the relevant information of one or more current dissimilar wireless base stations that connect simultaneously, and the wireless base station information default with program compares.
When the information disguising program described in the such scheme can not obtain wireless base station information by portable terminal, the camouflage program was carried out preassigned information disguising operation according to pre-conditioned to the particular data in the portable terminal.
Information disguising program described in the such scheme can also use the locating module in the portable terminal to judge with the default geo-localisation information in the program according to the geo-localisation information that the wireless base station information calculations draws, when entering or leaving predetermined in camouflage program geographic area orientation range, the particular data in the portable terminal is carried out preassigned information disguising operation according to program is pre-conditioned.
Wireless base station described in the such scheme, comprise mobile network wireless base station based on PHS, GSM, GPRS, EDGE, WCDMA, LTE, CDMA, CDMA2000, TD-SCDMA, TD-LTE, LTE, Wimax technology, based on location, the base station of GPS, the Big Dipper, GALILEO, GLONAS global position system, based on the WLAN base station of WIFI/WAPI network, based on the wireless base station of BLUETOOTH, the little networking technology of RFID; Described portable terminal comprises the cell phone terminal based on mobile network's technology, has notebook computer, panel computer, palmtop PC, mp3, the portable digital equipment of mp4 class of mobile network or Wireless LAN module; The locating module that locating module in the portable terminal comprises the locating module that uses GPS, the Big Dipper, Glaly satellite positioning tech, locate based on connects mobile network base station information, the locating module of locating based on WIFI, WAPI wireless local area network technology.
The mode of the information disguising described in the such scheme comprise to data carry out that encrypting and decrypting, data hidden recover, data are replaced, file chaining is redirected, designated program is hidden in file name modifications, file attribute modifications, hard disk encryption and decryption, shielding, add eliminate digital watermarking, file replacement, authentication, for, file upload download to given server, program reads writing information from the specified network server and operates; Described particular data comprises data file, file, executable file, audio-video document, the pim data in the portable terminal.
Camouflage program described in the such scheme can be embedded in mobile phone or the computer operating system as service operation; Move as the independent information safety protection program; As moving in the middleware embedding application software; Embed hardware microprocessor chip load and execution; The firmware that embeds portable equipment moves as firmware program; Embed data storage device as the data security protecting program running; Embed or as the safeguard protection plug-in component operation of web browser, network social intercourse chat communication class software; Embed office editor class, the operation of bank finance financing class application software.
Description of drawings:
Fig. 1 is the schematic flow sheet that carries out information disguising based on single base station information provided by the invention
Fig. 2 is the schematic flow sheet that carries out information disguising based on different base station information of the same type provided by the invention.
Fig. 3 is the schematic flow sheet that carries out information disguising based on the base station information of dissimilar base stations provided by the invention.
Fig. 4 carries out the information disguising operation for the geographical location information that goes out based on locating module in the portable terminal and the wireless base station information calculations of being received provided by the invention to data schematic flow sheet.
Embodiment:
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is carried out clear, complete description, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on embodiments of the invention, this area ordinary person belongs to the scope of protection of the invention not making all other embodiment that obtained under the creative work prerequisite.
As shown in Figure 1, be the schematic flow sheet that carries out information disguising based on single base station information provided by the invention;
Step 101: the mobile terminal period connection wireless base station that the user uses, the base station that is connected can be mobile network's mobile phone wireless base station, also can be the wlan wireless base station of WLAN (wireless local area network).
Step 102: the camouflage program that is installed on the portable terminal has judged whether wireless base station signal, if base station signal is arranged, then changes step over to, if 104 do not have base station signal, changes step 103 over to.
Step 103: after the camouflage program was judged no base station signal, program kept default action to specific data.Perhaps according to pre-conditioned when judging no signal, the program preset requirement is encrypted specific data, the program of then pretending will be carried out encryption automatically to specific data when no signal.
Step 104: the camouflage program obtains the relevant base station information of the wireless base station that connected from the wireless module of portable terminal, during such as connection mobile phone wireless base station, the camouflage program obtains the LAC of cellular base station, relevant informations such as CellID, when connecting the wifi base station, obtain relevant informations such as base station title, mac address.
Step 105: the camouflage program takes the base station information that connects the information of same program internal preset of current base war from the institute that portable terminal obtains to compare, and whether judgement information between the two unanimity.
Step 106: if the result of contrast judges the corresponding to words of both information, so in the setting of camouflage program more preassigned data such as some file in the terminal, PIM personal data if before be in encrypted state, the camouflage program will be imported authentication information automatically and such as preset password etc. ciphered data will be decrypted processing.If information before had been in unencrypted state, program will be carried out information disguising processing such as enciphering hiding replacement automatically according to deliberate action to specific data.If comparative information is not consistent, then specific data is automatically performed the data camouflage or removes the operation that data are pretended according to program is default.
It wherein is example with the notebook computer, the notebook computer that requirement is equipped with the camouflage program is decrypted with convenient office company's confidential information after entering the WLAN (wireless local area network) scope of company automatically, automatically the confidential information in the computer is encrypted to prevent information leakage when leaving company.After pretending the wifi wireless module unlatching of program control notebook so and obtaining institute's current connection wifi wireless base station information, compare with wifi base station information in the default company of camouflage program, if comparing result unanimity, the camouflage program judges that notebook is in company's scope, and the camouflage program will be inputed password automatically specified message is deciphered.If program can not be received wireless messages (wifi does not open) or judge that the base station information that institute's wifi information that obtains follows program to preset is inconsistent, the camouflage program judges that notebook is not in company's scope, will carry out predetermined registration operation such as automatically company data and other information being encrypted.
Realize the technical characterstic of the data security protecting of portable terminal is according to the comparison of base station information; communicating terminal obtains under the prerequisite of particular geographic location such as GPS or base station geographic position locating information not needing to call special geographical position locating module, and the base station oneself state information and the program similarities and differences of presetting base station information of base station just can be finished data security protecting work when the zones of different by connection.
As shown in Figure 2, be the schematic flow sheet that carries out information disguising based on different base station information of the same type provided by the invention;
Step 201: the mobile terminal period connection wireless base station that the user uses, the base station that is connected can be mobile network's mobile phone wireless base station, also can be the wlan wireless base station of WLAN (wireless local area network).
Step 202: the camouflage program that is installed on the portable terminal has judged whether wireless base station signal, if base station signal is arranged, then changes step 204 over to, if there is not base station signal, changes step 203. over to
Step 203: after the camouflage program was judged no base station signal, program kept default action to specific data.Perhaps according to pre-conditioned when judging no signal, the program preset requirement is encrypted specific data, the program of then pretending will be carried out encryption automatically to specific data when no signal.
Step 204: the camouflage program obtains the relevant base station information of the wireless base station that connected from the wireless module of portable terminal, during such as connection mobile phone wireless base station, the camouflage program obtains the LAC of cellular base station, relevant informations such as CellID, when connecting the wifi base station, obtain relevant informations such as base station title, mac address.
Step 205: the current a plurality of base station informations preset in the information of same program of base station that connect that the camouflage program will obtain compare, the different base station information of the default two or more base stations of the same type of program, in the camouflage program, preset mobile phone in advance at two different base stations that the different location connected such as user mobile phone, can be denoted as the base station information of base station A and base station B respectively, program is with the base station information contrast respectively at base station A and base station B of the current base station information that obtained so, if current base station information is consistent with the base station information of base station A, then change step 206 over to, if current base station information is consistent with the base station information of base station A, then change step 207 over to, if it is all inequality not obtain base station information and program base station A and the base station information of base station B in default, then change step 208 over to.
Step 206: current base station information conforms to the base station information of base station A, and program will be carried out the data camouflage or remove the operation that data are pretended data designated.
Step 207: current base station information conforms to the base station information of base station B, and program will be carried out the data camouflage or remove the operation that data are pretended other data designated.
Step 208: when current base station information did not all conform to the information of base station A or B, then program continued to keep default action or according to predetermined registration operation specific data is carried out the data camouflage or removes data camouflage operation.
It still is example with the notebook, the notebook computer that requirement is equipped with the camouflage program is decrypted with convenient office company's confidential information when the WLAN (wireless local area network) scope that enters company is base station A coverage automatically, automatically the individual privacy data are encrypted simultaneously, when leaving company, automatically the confidential information in the computer is encrypted to prevent information leakage.When being base station B coverage, home-ranges automatically personal data are decrypted entering.The program of pretending so is after the wifi wireless module of control notebook is opened and obtained institute's current connection wifi wireless base station information, compare with default base station A of camouflage program and the base station information of base station B, if comparing result is consistent with base station A, the camouflage program judges that notebook is in company's scope, the camouflage program will be inputed password automatically the company data of appointment will be decrypted, simultaneously with the individual privacy data encryption.If comparing result is consistent with base station B, the camouflage program judges that notebook is in the home-ranges, the camouflage program will be inputed the individual privacy data that password will before encrypt automatically and be decrypted, if program can not be received wireless messages (wifi does not open) or judge that base station A and base station B information that institute's wifi information that obtains follows program to preset are all inconsistent, the camouflage program judges that notebook is not in company and home-ranges, will automatically perform predetermined registration operation such as company data and individual privacy data are encrypted simultaneously.
As shown in Figure 3, be the schematic flow sheet that carries out information disguising based on the base station information of dissimilar base stations provided by the invention;
Step 301: the mobile terminal period connection wireless base station that the user uses, the base station that is connected can be mobile network's mobile phone wireless base station, also can be the wlan wireless base station of WLAN (wireless local area network).
Step 302: the camouflage program that is installed on the portable terminal has judged whether wireless base station signal, if base station signal is arranged, then changes step 304 over to, if there is not base station signal, changes step 203. over to
Step 303: after the camouflage program was judged no base station signal, program kept default action to specific data.Perhaps according to pre-conditioned when judging no signal, the program preset requirement is encrypted specific data, the program of then pretending will be carried out encryption automatically to specific data when no signal.
Step 304: the camouflage program is judged according to the base station type of the current wireless base station of opening that wireless module connected, as the current mobile base station that is to use mobile communication module to connect, change step 305 over to, as the wifi base station that is to use the wifi module to connect, change step 307 over to.
Step 305: the camouflage program obtain connect the relevant base station information of mobile communication base station, change step 306 over to.
Step 306: the camouflage program compares the mobile base station information of storing in advance in the mobile base station information of same program that is obtained, and changes step 309 over to.
Step 307: the camouflage program obtain connect the relevant base station information of WLAN (wireless local area network), change step 308 over to.
Step 308: the camouflage program compares the WLAN base station information of storing in advance in the WLAN base station information of same program that is obtained, and changes step 309 over to.
Step 309: the camouflage program is carried out predetermined registration operation or is kept acquiescence specific data according to comparing result.
With the smart mobile phone is example, has opened the mobile base station on the smart mobile phone simultaneously and has connected when being connected with WLAN (wireless local area network) two kinds of base station informations that wireless mode connected of camouflage property program loop detection of the interior installation of smart mobile phone.Such as cellie's family and company when being in the mobile base station coverage; the user need realize the spoofing protection to different information respectively in two kinds of varying environments of family and company; as when entering family, hiding the information such as mobile phone short message of designated contact automatically; when leaving family, recover automatically; automatically the company's confidential data to appointment is removed spoofing protection when entering company, when leaving company data designated is carried out automatic spoofing protection.This moment, company and the family owing to the user was in the base station scope, but WLAN (wireless local area network) has been installed respectively in user's company and the family, the program of then pretending is except the base station information of surveying the mobile base station, the base station information of while detection wireless lan base station, can also survey the wifi base station information that is connected in the time of in entering the mobile base station signal cover, and and compare according to wifi base station information default in the program, judge the user according to wifi base station information and mobile base station information and be in company or the family.Judge that as program the wifi base station information of receiving is consistent with the information of the family wifi base station of presetting, program thinks that then mobile device has entered the scope of family, will be automatically to more preassigned PIM information and personal data carry out data encryption, hide, data replace operations such as camouflage, predetermined contact person's incoming call and short message carry out data hidden and replace during for example will being in, and the contact information that automatically reply mobile phone short message, will be scheduled to the contact person uploads to operations such as appointed website storage.Do not receive the wifi of family base station information but receive mobile base station information and with program in information contrast in mobile base station when judging the home location scope that still is in the mobile base station and is covered, according to preestablishing these data are selected to decipher automatically or attonity, the wifi base station information of receiving in the camouflage program and mobile base station information is not when the default wifi of family base station information all conforms to mobile base station information, and program is removed the data camouflage to part pim information and simultaneously the personal data of appointment carried out data camouflage operation according to setting.Program is being received the wifi base station information and when consistent with default company's wifi base station information; then program automatically terminates data to the company data of appointment in the smart mobile phone and pretends easy to operate end user data are operated, and can realize different pieces of information is carried out different data spoofing protections with mobile base station information according to the wifi base station of smart mobile phone simultaneously thus.
As shown in Figure 4: for the geographical location information that goes out based on locating module in the portable terminal and the wireless base station information calculations of being received provided by the invention carries out the schematic flow sheet that information disguising is operated to data;
Step 401: portable terminal is opened the geographical position positioning function in the terminal, as use the GPS locating module in the terminal to obtain latitude and longitude information, according to connection the geographical location information that provides of mobile base station carry out the location, base station, the geographical location information that provides according to the wifi base station that is connected obtains geographical location information.
Step 402: portable terminal is judged which kind of localization method of use according to the wireless module of being opened, and as using location, wifi base station, changes step 403 over to, uses the location, mobile base station, changes step 404 over to, and use GPS location changes step 404 over to.Terminal can be opened one or more locate modes simultaneously.
Step 403: portable terminal is under the situation of opening the wifi module, and the camouflage program is obtained the geographical location information that the wifi base station provides according to connection wifi base station.
Step 404: portable terminal is under the situation of opening the location, mobile base station, and the camouflage program is obtained portable terminal current geographic position information of living in according to connection mobile base station use base station locate mode.
Step 405: under the situation of the GPS locating module of portable terminal in opening terminal, the camouflage program is obtained portable terminal institute current geographic position information mutually according to the latitude and longitude information that the GPS locating module provided.
Step 406: the camouflage program is according to comparing with geographical location information default in the program from geographical location information that terminal obtains, program can be delimited position range according to predefined geographical location information, and the geographical location information that is obtained in the terminal all can be thought in this position range and conforms to.
Step 407: when current base station information did not all conform to the information of base station A or B, then program continued to keep default action or according to predetermined registration operation specific data is carried out the data camouflage or removes data camouflage operation.
With the smart mobile phone that has wifi and GPS locating module is example, when mobile phone is opened GPS locating module and wifi and functionality mobile communication, the camouflage program will be according to the default preferential geographical position locating information of selecting use GPS locating module to provide of program, if the GPS module is closed in the time of maybe can't inquiring mobile phone place longitude and latitude geographical location information, the camouflage program can also use connect the geographical location information that the wifi base station provides, if the wifi module be not connected to the wifi base station or when connecting the wifi base station and can not provide geographical location information or wifi module to close, the geographical location information that the camouflage program can also use mobile base station that mobile phone connects to use the base station location technology to obtain is judged.After the camouflage program obtains the current geographical location information of living in of mobile phone, the position range of formulating with latitude and longitude information default in the program or geographical location information-compare such as the region of having an area of within how many rice in default latitude and longitude information present position, if the current geographical position of living in of mobile phone is positioned at the default geographical position of program scope, then mobile phone will carry out the information disguising processing according to the execution of program predetermined registration operation to data designated, when if the current geographical position of living in of mobile phone is positioned at outside the scope of the default geographical position of program, then mobile phone will be to preassigned data execution releasing information disguising processing or according to the execution of program predetermined registration operation.
When meeting camouflage program pre-conditioned, the camouflage program can be carried out the data camouflage to data designated automatically and be removed the operation of data camouflage.To the camouflage mode of data comprise to data carry out that encrypting and decrypting, data hidden recover, data are replaced, file chaining is redirected, file name is revised, file attribute is revised, shielding hide carry out designated program, add eliminate digital watermarking, file replacement, authentication, upload for sound, file download to given server, program reads operations such as writing information from the specified network server; Described particular data comprises data file, file, executable file, audio-video document, the pim data in the portable terminal.
The camouflage program can be used as firmware program and is embedded in the firmware in the portable mobile termianl, direct loading procedure and the wireless connections situation of portable terminal surveyed when starting terminal, before or after the os starting of terminal, specific data carried out data camouflage operation such as enciphering hiding according to program is pre-conditioned, and be loaded in the operating system background program and move, camouflage program or behind the os starting of terminal, be loaded into running background in the system automatically, even equipment is lost, other people can not obtain enciphered data by unloading camouflage program.
The camouflage program can be used as the program in machine code burning of independent safety chip and goes in the chip; portable terminal adds the safety chip that has the camouflage program when hardware designs can provide location-based data security protecting scheme for the data security of portable terminal; such as when developing trendy smart mobile phone, adding this safety chip; then chip is just carried out when mobile phone power-on at once; judge the wireless connections situation of mobile phone and carry out the data security spoofing protection of different modes according to pre-conditioned different pieces of information to appointment; even mobile phone is lost back refitting system even is upgraded firmware and also can will not pretend program unloading, thereby continues to provide protection to data in mobile phone.
The camouflage program can also embed in the control chip of Various types of data memory such as hard disk, portable hard drive, flash disk, various sorts of memory cards; during data in portable terminal reads memory; be embedded into operation in the operating system that camouflage Automatic Program in the memory is loaded into portable terminal and judge the wireless connections situation of portable terminal, the specific data in the memory is carried out encryption and decryption and data spoofing protection operation according to pre-conditioned.The user can pretend the predetermined registration operation of program by the setting interface setting of camouflage program, such as if program judge this mobile device not open wireless Connection Service or institute to connect the base station information that wireless base station and program preset inconsistent, then Automatic Program is preset the data in the memory and is encrypted or hiding the processing, program can also be revised the data message of USB flash disk simultaneously, residual capacity after making its shown data capacity and hiding the shielding customizing messages is consistent, carry out information disguising, obtained by other people to prevent sensitive information.
The camouflage program can also embed in the fail-safe software as the middleware of the network security software increases location-based safety protection function for it.Entering operation such as the spoofing protection of automatically data being carried out encryption and decryption when leaving specific environment.
The camouflage program can also increase location-based information safety protection function for it as the middleware of Internet chat bitcom; when opening chat software; software survey at first automatically connect portable terminal wifi base station or wireless base station or call the GPS locating module and position, and determine self environment of living in the default information comparison back of software.Judge that such as program mobile terminal device this moment is in the family of program setting during scope, program will be hidden according to the information screen of some designated contact in the default bitcom of will chatting automatically, to replace operations such as processing when designated contact is used chat software and its communication automatically to its information, and chat message is uploaded to specific website rather than stays local disk.Program is recovered chat communication and chat message to designated contact when base station information is judged the scope that portable terminal is away from home according to connection automatically.
The camouflage program is when embedding office, financial class software as middleware application, when opening, office software at first judges self present position according to the wireless connections situation of portable terminal, as judging in company's environment, then automatically the office documents of having encrypted being decrypted makes things convenient for the end user to handle official business, judgement is carried out the office documents of company and is hidden or cryptographic operation prevents that other people from passing through office and financial class software acquisition confidential information when non-company's environment.
More than the information disguising method for security protection based on wireless base station information provided by the present invention is described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to mentality of designing of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as use restriction of the present invention.

Claims (10)

1. the information disguising method for security protection (hereinafter to be referred as information disguising method) based on wireless base station information is characterized in that, comprises wireless base station and the portable terminal that is attached thereto, and is installed in the information disguising program on the portable terminal, and performing step is:
(1) information disguising property program loop gathers the current wireless base station information that connects of portable terminal from portable terminal.
(2) the information disguising program is judged the wireless base station information that collects from portable terminal, according to pre-conditioned in the program specific data information in the portable terminal is carried out information disguising safeguard protection operation (hereinafter to be referred as the information disguising operation).
2. information disguising method, it is characterized in that, the judgment mode of the information disguising program described in claim 1 is that the current base station information that connects that will collect from portable terminal compares with contrast wireless base station information default in the program, according to both information similarities and differences, the camouflage program is carried out the operation that the default information disguising to specific data, input authentication information are removed information disguising, and the camouflage program need not to obtain that the portable terminal more specific location information can be according to the program presupposed information relatively finishes judgement.
3. information disguising method, it is characterized in that, the default contrast of program described in claim 2 wireless base station information is by manually input corresponding base station conditional information, service routine preset the base station information database, use the mode of the base station information of current connection base station to import in the setting interface of program; The base station information that described portable terminal is collected comprises base station frequency band, BTS channel, base station authentication information, base station location coordinate, base station type, base station title, base station model, mac address, base station, base station network information, base station LAC, base station CellID information.
4. information disguising method, it is characterized in that, program described in claim 2 is preset base station information, and the information of camouflage program different radio base station of default one or more wireless networks of the same type in program compares judgement with the current wireless base station information of gathering.
5. information disguising method, it is characterized in that, as the default base station information of the program in the claim 2, the camouflage program is gathered the relevant information of one or more current dissimilar wireless base stations that connect simultaneously, and the wireless base station information default with program compares.
6. an information disguising method is characterized in that, when the information disguising program can not obtain wireless base station information by portable terminal, the camouflage program was carried out preassigned information disguising operation according to pre-conditioned to the particular data in the portable terminal.
7. information disguising method, it is characterized in that, wireless base station information described in claim 2 relatively, the information disguising program can also use the locating module in the portable terminal to judge with the default geo-localisation information in the program according to the geo-localisation information that the wireless base station information calculations draws, when entering or leaving predetermined in camouflage program geographic area orientation range, the particular data in the portable terminal is carried out preassigned information disguising operation according to program is pre-conditioned.
8. information disguising method, it is characterized in that, wireless base station described in claim 1, comprise mobile network wireless base station based on PHS, GSM, GPRS, EDGE, WCDMA, LTE, CDMA, CDMA2000, TD-SCDMA, TD-LTE, LTE, Wimax technology, location, base station based on GPS, the Big Dipper, GALILEO, GLONAS global position system, based on the WLAN base station of WIFI/WAPI network, based on the wireless base station of BLUETOOTH, the little networking technology of RFID; Described portable terminal comprises the cell phone terminal based on mobile network's technology, has notebook computer, panel computer, palmtop PC, mp3, the portable digital equipment of mp4 class of mobile network or Wireless LAN module; Locating module in the portable terminal comprises the locating module that uses GPS, the Big Dipper, Galileo satellite positioning tech, based on the locating module of connection mobile network base station information location, based on the locating module of WIFI, WAPI wireless local area network technology location.
9. information disguising method, it is characterized in that, information disguising described in claim 1, the mode of information disguising comprise to data carry out that encrypting and decrypting, data hidden recover, data are replaced, file chaining is redirected, file name modifications, file attribute modifications, hard disk encryption and decryption, shielding hide carry out designated program, add eliminate digital watermarking, file replacement, authentication, upload for sound, file download to given server, lock open the particular data port, program reads operations such as writing information from the specified network server; Described particular data comprises data file, file, executable file, audio-video document, the pim data in the portable terminal.
10. an information disguising method is characterized in that, the camouflage program can be embedded in mobile phone or the computer operating system as service operation; The camouflage program is moved as the independent information safety protection program in mobile phone or the computer operating system; The camouflage program embeds in the application software as middleware and moves; The camouflage program embeds hardware microprocessor chip load and execution; The firmware that the camouflage program embeds portable equipment moves as firmware program; The camouflage program embeds the control chip of memory as the data security protecting program running; The camouflage program embeds or as the safeguard protection plug-in component operation of web browser, network social intercourse chat communication class software; The camouflage program embeds office editor class, the operation of bank finance financing class application software.
CN2011101585860A 2011-06-14 2011-06-14 Information steganography and security protection method based on wireless base station information Pending CN102223626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101585860A CN102223626A (en) 2011-06-14 2011-06-14 Information steganography and security protection method based on wireless base station information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101585860A CN102223626A (en) 2011-06-14 2011-06-14 Information steganography and security protection method based on wireless base station information

Publications (1)

Publication Number Publication Date
CN102223626A true CN102223626A (en) 2011-10-19

Family

ID=44780025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101585860A Pending CN102223626A (en) 2011-06-14 2011-06-14 Information steganography and security protection method based on wireless base station information

Country Status (1)

Country Link
CN (1) CN102223626A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103107887A (en) * 2013-01-22 2013-05-15 东莞宇龙通信科技有限公司 Method and device for controlling files based on position information
CN103209388A (en) * 2013-04-12 2013-07-17 浙江大学 Method and system for hybrid positioning on basis of multi-mode signals
CN103561384A (en) * 2013-11-07 2014-02-05 中国科学院软件研究所 Data protection method based on geographical location information of mobile intelligent terminal
CN104581663A (en) * 2015-01-15 2015-04-29 深圳市金立通信设备有限公司 Text message processing method
CN104618586A (en) * 2015-01-15 2015-05-13 深圳市金立通信设备有限公司 Terminal
CN105373742A (en) * 2015-10-23 2016-03-02 广东欧珀移动通信有限公司 Method and device for automatically deleting information in mobile terminal
WO2016054892A1 (en) * 2014-10-11 2016-04-14 中兴通讯股份有限公司 Method and device for user information protection
CN106685516A (en) * 2017-02-06 2017-05-17 北京军盛科技发展有限公司 Data transmission system based on the space-based communication
CN108124256A (en) * 2017-12-25 2018-06-05 东软集团股份有限公司 File reference method and apparatus, program product and storage medium
CN108337208A (en) * 2017-01-19 2018-07-27 中国电信股份有限公司 Data guard method, alternative based on cloud storage and cloud storage system
CN110555313A (en) * 2018-05-14 2019-12-10 北京大学 position hiding method based on Android system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070168294A1 (en) * 2003-12-25 2007-07-19 Mitsubishi Electric Corporation Digital content use right management system
CN101296478A (en) * 2007-04-24 2008-10-29 深圳市维信联合科技有限公司 Method and system for switching situation based on base station binding
CN201167392Y (en) * 2007-12-26 2008-12-17 康佳集团股份有限公司 Mobile equipment capable of automatically setting scene mode
CN101382981A (en) * 2008-09-23 2009-03-11 宇龙计算机通信科技(深圳)有限公司 File encrypting and decrypting method and apparatus and mobile terminal
CN101819618A (en) * 2010-03-19 2010-09-01 杨筑平 File encryption method
CN101959321A (en) * 2010-09-17 2011-01-26 惠州Tcl移动通信有限公司 Scene mode switching method based on mobile phone WIFI and mobile phone

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070168294A1 (en) * 2003-12-25 2007-07-19 Mitsubishi Electric Corporation Digital content use right management system
CN101296478A (en) * 2007-04-24 2008-10-29 深圳市维信联合科技有限公司 Method and system for switching situation based on base station binding
CN201167392Y (en) * 2007-12-26 2008-12-17 康佳集团股份有限公司 Mobile equipment capable of automatically setting scene mode
CN101382981A (en) * 2008-09-23 2009-03-11 宇龙计算机通信科技(深圳)有限公司 File encrypting and decrypting method and apparatus and mobile terminal
CN101819618A (en) * 2010-03-19 2010-09-01 杨筑平 File encryption method
CN101959321A (en) * 2010-09-17 2011-01-26 惠州Tcl移动通信有限公司 Scene mode switching method based on mobile phone WIFI and mobile phone

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103107887A (en) * 2013-01-22 2013-05-15 东莞宇龙通信科技有限公司 Method and device for controlling files based on position information
CN103107887B (en) * 2013-01-22 2016-09-21 东莞宇龙通信科技有限公司 A kind of method and apparatus that based on positional information, file is carried out operation control
CN103209388A (en) * 2013-04-12 2013-07-17 浙江大学 Method and system for hybrid positioning on basis of multi-mode signals
CN103561384A (en) * 2013-11-07 2014-02-05 中国科学院软件研究所 Data protection method based on geographical location information of mobile intelligent terminal
WO2016054892A1 (en) * 2014-10-11 2016-04-14 中兴通讯股份有限公司 Method and device for user information protection
CN105574417A (en) * 2014-10-11 2016-05-11 中兴通讯股份有限公司 User information protection method and device
CN104581663A (en) * 2015-01-15 2015-04-29 深圳市金立通信设备有限公司 Text message processing method
CN104618586A (en) * 2015-01-15 2015-05-13 深圳市金立通信设备有限公司 Terminal
CN105373742A (en) * 2015-10-23 2016-03-02 广东欧珀移动通信有限公司 Method and device for automatically deleting information in mobile terminal
CN105373742B (en) * 2015-10-23 2018-09-04 广东欧珀移动通信有限公司 A kind of method and device of mobile terminal to automatically deleting information
CN108337208A (en) * 2017-01-19 2018-07-27 中国电信股份有限公司 Data guard method, alternative based on cloud storage and cloud storage system
CN108337208B (en) * 2017-01-19 2020-11-24 中国电信股份有限公司 Data protection method and replacement device based on cloud storage and cloud storage system
CN106685516A (en) * 2017-02-06 2017-05-17 北京军盛科技发展有限公司 Data transmission system based on the space-based communication
CN108124256A (en) * 2017-12-25 2018-06-05 东软集团股份有限公司 File reference method and apparatus, program product and storage medium
CN110555313A (en) * 2018-05-14 2019-12-10 北京大学 position hiding method based on Android system

Similar Documents

Publication Publication Date Title
CN102223626A (en) Information steganography and security protection method based on wireless base station information
US10075844B2 (en) Enpoint security appliance/sensor platform
US9386096B2 (en) Server and method, non-transitory computer readable storage medium, and mobile client terminal and method
US9007174B2 (en) Service identification authentication
US8995668B2 (en) Privacy management for tracked devices
CN100458810C (en) Method and system of protecting bluetooth apparatus
CN103561384A (en) Data protection method based on geographical location information of mobile intelligent terminal
CN102917348A (en) Intelligent multi-user mobile phone and logging method thereof
CN101854581A (en) Method for setting security level of mobile terminal on basis of position information and mobile terminal
CN102084370A (en) System for mitigating the unauthorized use of a device
CN104700010A (en) Personal information protection method and protection device
CN107729759B (en) APP operation authority control method, storage device and mobile terminal
US20180317054A1 (en) Systems, methods, and devices for verifying a user identity and/or enabling/disabling an action, using a current and/or previous user location
CN110462620A (en) Sensitive data is decomposed to be stored in different application environment
CN105263119A (en) Geographical position information-based mobile intelligent terminal communication encryption method
CN105282155B (en) Authority control method, device and system for interaction between terminals
CN101754209A (en) Method for protecting contents of mobile phone
US9503900B2 (en) Method and system of protecting files
CN202014304U (en) Mobile phone privacy protection system based on code authentication
WO2020214367A1 (en) Secure verification of an individual using wireless broadcasts
US20150045053A1 (en) Privacy-hardened geolocation system
CN113853779A (en) Method, device and system for guaranteeing terminal safety
KR102348095B1 (en) Real-time monitoring system for preventing malicious code penetration and a counterfeit access of user mobile terminal and method thereof
CN103297911B (en) Mobile terminal
CN110555313A (en) position hiding method based on Android system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20111019