CN111212420A - Method for disguising equipment information through VSA technology - Google Patents

Method for disguising equipment information through VSA technology Download PDF

Info

Publication number
CN111212420A
CN111212420A CN201911414593.5A CN201911414593A CN111212420A CN 111212420 A CN111212420 A CN 111212420A CN 201911414593 A CN201911414593 A CN 201911414593A CN 111212420 A CN111212420 A CN 111212420A
Authority
CN
China
Prior art keywords
application
vsa
mobile
equipment
device information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911414593.5A
Other languages
Chinese (zh)
Inventor
高小凤
王伟
桂艳峰
陈电波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Uusafe Co ltd
Original Assignee
Uusafe Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Uusafe Co ltd filed Critical Uusafe Co ltd
Priority to CN201911414593.5A priority Critical patent/CN111212420A/en
Publication of CN111212420A publication Critical patent/CN111212420A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method for protecting user privacy and safety by disguising equipment information through a VSA (virtual switch architecture) technology, which comprises the following steps of: s1, installing the mobile application and starting the application to run; and S2, when the mobile application sends out the equipment information acquisition request, according to the fact that the mobile application is the VSA application, the VSA client intercepts the equipment information acquisition request and returns disguised equipment information to the mobile application. The invention provides a mode capable of intercepting and disguising fingerprint information of analog equipment, which prevents an application installed in the equipment from acquiring real equipment information of employees, further prevents risks from being brought to the safety of the employees and application data, and improves the safety of the equipment and the data.

Description

Method for disguising equipment information through VSA technology
Technical Field
The invention belongs to the field of mobile service scenes, and particularly relates to a method for protecting privacy and safety of a user by disguising equipment information through a VSA (virtual switch architecture) technology.
Background
With the development of mobile technology, enterprises enter into a business mobilization process, and business development of the enterprises still needs to use a large amount of office applications or third-party business applications in the market besides utilizing business applications self-researched by the enterprises; however, the current mobile application market does not have related development behavior specifications, so that a large number of applications can randomly acquire device fingerprint information of devices, track the devices through the information and perform data collection and user tracking, and in addition to the threat to the data information of employees, the data information of enterprises can also be threatened.
Therefore, the prior art achieves its various purposes by acquiring a large amount of private data in user equipment or applications: marketing purpose, or provide relevant data to other enterprises, or have no specific purpose but obtain inertially, and further bring risks to the business of the enterprises.
Therefore, at present, there is an urgent need to protect the security of the device fingerprint information of the employee device, and provide another dimensional security guarantee for the mobile development of the enterprise.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method for protecting the privacy and the safety of a user by disguising equipment information through a VSA technology based on an analog base station, and the problems are effectively solved. The invention provides a method for simulating equipment fingerprints based on a VSA technology, which prevents an application from acquiring real information of the equipment and protects the privacy security of an enterprise.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method of disguising device information through VSA technology, comprising the steps of:
s1, installing the mobile application and starting the application to run;
and S2, when the mobile application sends out the equipment information acquisition request, according to the fact that the mobile application is the VSA application, the VSA client intercepts the equipment information acquisition request and returns disguised equipment information to the mobile application.
Further, the masquerading device information is real device information modified by the VSA client.
Further, the device information includes one or more of: user fingerprint information, IMEI, equipment model, system version.
Further, for the application with confirmed security, when the application sends a device information acquisition request, the mobile phone operating system returns the real device information to the application.
Further, the VSA client is a virtual runtime environment on the mobile device that takes over communications between the application mobile client and the mobile operating system.
Further, the mobile device is a mobile phone.
Further, the VSA client puts applications with the same security level and the same security requirement in a logical group, and performs a security access control policy on the group to form a virtual security domain.
Compared with the prior art, the method has the advantages that the fingerprint information of the analog equipment can be intercepted and disguised, the application installed in the equipment is prevented from acquiring the real equipment information of the staff, the risk brought to the safety of the staff and the application data is further prevented, and the safety of the equipment and the data is improved.
Drawings
FIG. 1 is a schematic diagram of the VSA technique of the present invention;
FIG. 2 is a flow chart of the method of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples, but the embodiments of the present invention are not limited thereto.
Example (b):
the vsa (virtual Security area) of the present invention is a virtual Security domain: a technique for implementing a virtual machine on a mobile device by taking over communication between a mobile application and an OS (Android, iOS, etc.). Through the virtualization technology, the VSA is hooked with the drive of the bottom layer of the operating system, so that any enterprise-level application can be safely operated in a virtual machine, and the safety and fine-grained control of the application are realized.
Specifically, as shown in fig. 1, the VSA of the present invention implements security by adding a "shell" file to an application, running the application in a "container," and monitoring and managing various operations of the application. The applications with the same security level and the same security requirement are placed in a logic group through the VSA technology, a security access control strategy is used for the group, a virtual security domain is formed, data security is controlled concisely and effectively, and the applications are protected to run safely on the mobile equipment.
As shown in fig. 2, the method for protecting privacy and security of a user by disguising device information through VSA technology according to this embodiment includes the following steps:
and S1, the staff installs VSA application B issued by the enterprise and starts the application to run. Meanwhile, the application A with the security confirmed by the enterprise can also be started and operated.
S2, application B starts to run and tries to acquire relevant information of the device: IMEI, equipment model, system version, etc., which is intercepted by the VSA client and returns disguised equipment information, preventing the application from acquiring the real content of the employee equipment.
The International Mobile Equipment Identity (IMEI), which is commonly called a Mobile phone serial number and a Mobile phone "serial number," is used to identify Mobile communication Equipment such as each independent Mobile phone in a Mobile phone network, and is equivalent to an Identity card of a Mobile phone. The serial number is 15-17 digits in total, the first 8 digits (TAC) are model approval numbers (6 digits in the early stage), and the codes are used for distinguishing brands and models of mobile phones. The next 2 bits (FAC) are the last assembly number (present only in earlier models) representing the final assembly code. The last 6 bits (SNR) are the string number, representing the production sequence number. The last 1 bit (SP), which is typically 0, is the check code, reserved. The international mobile equipment identification code is generally pasted on the back surface of the machine body and an outer package, and also exists in a mobile phone memory, and can be inquired by inputting #06 #.
At this time, for the application a whose security has been confirmed by the enterprise, when the application a sends a device information acquisition request, the mobile phone operating system may return the real device information.
The VSA client is a virtual runtime environment on a mobile device (e.g., cell phone) that takes over communication between the mobile client and the mobile OS (Android, iOS, etc.).
The disguised equipment information is VSA simulated equipment fingerprint information which is real user fingerprint information or information obtained by randomly modifying IMEI, equipment model and system version.
The invention provides a mode capable of intercepting and disguising fingerprint information of analog equipment, which prevents an application installed in the equipment from acquiring real equipment information of employees, further prevents risks from being brought to the safety of the employees and application data, and improves the safety of the equipment and the data.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications and equivalent variations of the above embodiments according to the technical spirit of the present invention are included in the scope of the present invention.

Claims (7)

1. A method of disguising device information through VSA technology, comprising the steps of:
s1, installing the mobile application and starting the application to run;
and S2, when the mobile application sends out the equipment information acquisition request, according to the fact that the mobile application is the VSA application, the VSA client intercepts the equipment information acquisition request and returns disguised equipment information to the mobile application.
2. The method of disguising device information via VSA technology as claimed in claim 1,
the disguised device information is real device information modified by the VSA client.
3. The method of disguising device information via VSA technology as claimed in claim 1,
the device information includes one or more of: user fingerprint information, IMEI, equipment model, system version.
4. The method of disguising device information via VSA technology as claimed in claim 1,
for the application with confirmed security, when the application sends out a device information acquisition request, the mobile phone operating system returns the real device information to the application.
5. The method of claim 1, wherein the VSA client is a virtual runtime environment on a mobile device that takes over communication between an application mobile client and a mobile operating system.
6. The method of disguising device information via VSA technology as claimed in claim 5, wherein the mobile device is a cellular phone.
7. The method of claim 1, wherein the VSA client places applications with the same security level and the same security requirement in a logical group, and applies the security access control policy to the group to form a virtual security domain.
CN201911414593.5A 2019-12-31 2019-12-31 Method for disguising equipment information through VSA technology Pending CN111212420A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911414593.5A CN111212420A (en) 2019-12-31 2019-12-31 Method for disguising equipment information through VSA technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911414593.5A CN111212420A (en) 2019-12-31 2019-12-31 Method for disguising equipment information through VSA technology

Publications (1)

Publication Number Publication Date
CN111212420A true CN111212420A (en) 2020-05-29

Family

ID=70788489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911414593.5A Pending CN111212420A (en) 2019-12-31 2019-12-31 Method for disguising equipment information through VSA technology

Country Status (1)

Country Link
CN (1) CN111212420A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112015621A (en) * 2020-08-20 2020-12-01 北京指掌易科技有限公司 Content monitoring method, device, equipment and medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8353031B1 (en) * 2006-09-25 2013-01-08 Symantec Corporation Virtual security appliance
CN105631326A (en) * 2014-11-05 2016-06-01 中兴通讯股份有限公司 Security protection method and device for sensitive information
CN107341406A (en) * 2017-07-05 2017-11-10 北京奇安信科技有限公司 A kind of method and terminal for protecting privacy of user data
CN109167782A (en) * 2018-08-31 2019-01-08 国鼎网络空间安全技术有限公司 Private data guard method and system based on intelligent mobile terminal
CN109218506A (en) * 2017-07-01 2019-01-15 珠海格力电器股份有限公司 A kind of method, device and mobile terminal for protecting privacy information
CN109241731A (en) * 2018-09-11 2019-01-18 厦门市美亚柏科信息股份有限公司 A kind of method for protecting privacy based on virtual application, device and storage medium
CN109800094A (en) * 2018-12-28 2019-05-24 北京指掌易科技有限公司 A method of realizing individually application and the communication of multiple common applications
CN110149405A (en) * 2019-05-24 2019-08-20 北京指掌易科技有限公司 A kind of method of cloud control mobile terminal application

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8353031B1 (en) * 2006-09-25 2013-01-08 Symantec Corporation Virtual security appliance
CN105631326A (en) * 2014-11-05 2016-06-01 中兴通讯股份有限公司 Security protection method and device for sensitive information
CN109218506A (en) * 2017-07-01 2019-01-15 珠海格力电器股份有限公司 A kind of method, device and mobile terminal for protecting privacy information
CN107341406A (en) * 2017-07-05 2017-11-10 北京奇安信科技有限公司 A kind of method and terminal for protecting privacy of user data
CN109167782A (en) * 2018-08-31 2019-01-08 国鼎网络空间安全技术有限公司 Private data guard method and system based on intelligent mobile terminal
CN109241731A (en) * 2018-09-11 2019-01-18 厦门市美亚柏科信息股份有限公司 A kind of method for protecting privacy based on virtual application, device and storage medium
CN109800094A (en) * 2018-12-28 2019-05-24 北京指掌易科技有限公司 A method of realizing individually application and the communication of multiple common applications
CN110149405A (en) * 2019-05-24 2019-08-20 北京指掌易科技有限公司 A kind of method of cloud control mobile terminal application

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112015621A (en) * 2020-08-20 2020-12-01 北京指掌易科技有限公司 Content monitoring method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN108763921B (en) A kind of method of application software and SDK control
CN103548320B (en) The dangerous safety applied on device performs
CN102411684B (en) Data protection method and device
CN105874464B (en) System and method for introducing variation in subsystem output signal to prevent device-fingerprint from analyzing
KR101509043B1 (en) Implementing method, system of universal card system and smart card
CN103403669A (en) Securing and managing APPs on a device
CN105653979A (en) Code injection based privacy information protection method
CN105022939B (en) Information Authentication method and device
CN105678192A (en) Smart card based secret key application method and application apparatus
CN107341406A (en) A kind of method and terminal for protecting privacy of user data
US9734307B2 (en) User terminal interworking with peripheral device and method for preventing leakage of information using the same
CN108334404A (en) The operation method and device of application program
CN104598401B (en) Domestic Platform ancillary equipment managing and control system and its management-control method
CN111212420A (en) Method for disguising equipment information through VSA technology
CN107948973B (en) Equipment fingerprint generation method applied to IOS (input/output system) for security risk control
CN106909861A (en) A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system
CN103595573B (en) Method and device for issuing strategy rules
CN108494749A (en) Method, apparatus, equipment and the computer readable storage medium of IP address disabling
CN106911653A (en) A kind of method for realizing mobile terminal remote control, device, mobile terminal and system
CN105447398A (en) Data safety protection method and device
CN104348951B (en) A kind of card AMS
US20220240082A1 (en) Text message processing method and system, terminal device and storage medium
CN102737193A (en) Equipment shielding method and device for data security prevention and control
CN104866761B (en) A kind of high security Android intelligent terminal
CN104200175A (en) Information protection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200529