CN111212420A - Method for disguising equipment information through VSA technology - Google Patents
Method for disguising equipment information through VSA technology Download PDFInfo
- Publication number
- CN111212420A CN111212420A CN201911414593.5A CN201911414593A CN111212420A CN 111212420 A CN111212420 A CN 111212420A CN 201911414593 A CN201911414593 A CN 201911414593A CN 111212420 A CN111212420 A CN 111212420A
- Authority
- CN
- China
- Prior art keywords
- application
- vsa
- mobile
- equipment
- device information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000005516 engineering process Methods 0.000 title claims abstract description 16
- 238000004891 communication Methods 0.000 claims description 4
- 230000001413 cellular effect Effects 0.000 claims 1
- 238000011161 development Methods 0.000 description 4
- 238000011217 control strategy Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/80—Arrangements enabling lawful interception [LI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a method for protecting user privacy and safety by disguising equipment information through a VSA (virtual switch architecture) technology, which comprises the following steps of: s1, installing the mobile application and starting the application to run; and S2, when the mobile application sends out the equipment information acquisition request, according to the fact that the mobile application is the VSA application, the VSA client intercepts the equipment information acquisition request and returns disguised equipment information to the mobile application. The invention provides a mode capable of intercepting and disguising fingerprint information of analog equipment, which prevents an application installed in the equipment from acquiring real equipment information of employees, further prevents risks from being brought to the safety of the employees and application data, and improves the safety of the equipment and the data.
Description
Technical Field
The invention belongs to the field of mobile service scenes, and particularly relates to a method for protecting privacy and safety of a user by disguising equipment information through a VSA (virtual switch architecture) technology.
Background
With the development of mobile technology, enterprises enter into a business mobilization process, and business development of the enterprises still needs to use a large amount of office applications or third-party business applications in the market besides utilizing business applications self-researched by the enterprises; however, the current mobile application market does not have related development behavior specifications, so that a large number of applications can randomly acquire device fingerprint information of devices, track the devices through the information and perform data collection and user tracking, and in addition to the threat to the data information of employees, the data information of enterprises can also be threatened.
Therefore, the prior art achieves its various purposes by acquiring a large amount of private data in user equipment or applications: marketing purpose, or provide relevant data to other enterprises, or have no specific purpose but obtain inertially, and further bring risks to the business of the enterprises.
Therefore, at present, there is an urgent need to protect the security of the device fingerprint information of the employee device, and provide another dimensional security guarantee for the mobile development of the enterprise.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method for protecting the privacy and the safety of a user by disguising equipment information through a VSA technology based on an analog base station, and the problems are effectively solved. The invention provides a method for simulating equipment fingerprints based on a VSA technology, which prevents an application from acquiring real information of the equipment and protects the privacy security of an enterprise.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method of disguising device information through VSA technology, comprising the steps of:
s1, installing the mobile application and starting the application to run;
and S2, when the mobile application sends out the equipment information acquisition request, according to the fact that the mobile application is the VSA application, the VSA client intercepts the equipment information acquisition request and returns disguised equipment information to the mobile application.
Further, the masquerading device information is real device information modified by the VSA client.
Further, the device information includes one or more of: user fingerprint information, IMEI, equipment model, system version.
Further, for the application with confirmed security, when the application sends a device information acquisition request, the mobile phone operating system returns the real device information to the application.
Further, the VSA client is a virtual runtime environment on the mobile device that takes over communications between the application mobile client and the mobile operating system.
Further, the mobile device is a mobile phone.
Further, the VSA client puts applications with the same security level and the same security requirement in a logical group, and performs a security access control policy on the group to form a virtual security domain.
Compared with the prior art, the method has the advantages that the fingerprint information of the analog equipment can be intercepted and disguised, the application installed in the equipment is prevented from acquiring the real equipment information of the staff, the risk brought to the safety of the staff and the application data is further prevented, and the safety of the equipment and the data is improved.
Drawings
FIG. 1 is a schematic diagram of the VSA technique of the present invention;
FIG. 2 is a flow chart of the method of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples, but the embodiments of the present invention are not limited thereto.
Example (b):
the vsa (virtual Security area) of the present invention is a virtual Security domain: a technique for implementing a virtual machine on a mobile device by taking over communication between a mobile application and an OS (Android, iOS, etc.). Through the virtualization technology, the VSA is hooked with the drive of the bottom layer of the operating system, so that any enterprise-level application can be safely operated in a virtual machine, and the safety and fine-grained control of the application are realized.
Specifically, as shown in fig. 1, the VSA of the present invention implements security by adding a "shell" file to an application, running the application in a "container," and monitoring and managing various operations of the application. The applications with the same security level and the same security requirement are placed in a logic group through the VSA technology, a security access control strategy is used for the group, a virtual security domain is formed, data security is controlled concisely and effectively, and the applications are protected to run safely on the mobile equipment.
As shown in fig. 2, the method for protecting privacy and security of a user by disguising device information through VSA technology according to this embodiment includes the following steps:
and S1, the staff installs VSA application B issued by the enterprise and starts the application to run. Meanwhile, the application A with the security confirmed by the enterprise can also be started and operated.
S2, application B starts to run and tries to acquire relevant information of the device: IMEI, equipment model, system version, etc., which is intercepted by the VSA client and returns disguised equipment information, preventing the application from acquiring the real content of the employee equipment.
The International Mobile Equipment Identity (IMEI), which is commonly called a Mobile phone serial number and a Mobile phone "serial number," is used to identify Mobile communication Equipment such as each independent Mobile phone in a Mobile phone network, and is equivalent to an Identity card of a Mobile phone. The serial number is 15-17 digits in total, the first 8 digits (TAC) are model approval numbers (6 digits in the early stage), and the codes are used for distinguishing brands and models of mobile phones. The next 2 bits (FAC) are the last assembly number (present only in earlier models) representing the final assembly code. The last 6 bits (SNR) are the string number, representing the production sequence number. The last 1 bit (SP), which is typically 0, is the check code, reserved. The international mobile equipment identification code is generally pasted on the back surface of the machine body and an outer package, and also exists in a mobile phone memory, and can be inquired by inputting #06 #.
At this time, for the application a whose security has been confirmed by the enterprise, when the application a sends a device information acquisition request, the mobile phone operating system may return the real device information.
The VSA client is a virtual runtime environment on a mobile device (e.g., cell phone) that takes over communication between the mobile client and the mobile OS (Android, iOS, etc.).
The disguised equipment information is VSA simulated equipment fingerprint information which is real user fingerprint information or information obtained by randomly modifying IMEI, equipment model and system version.
The invention provides a mode capable of intercepting and disguising fingerprint information of analog equipment, which prevents an application installed in the equipment from acquiring real equipment information of employees, further prevents risks from being brought to the safety of the employees and application data, and improves the safety of the equipment and the data.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications and equivalent variations of the above embodiments according to the technical spirit of the present invention are included in the scope of the present invention.
Claims (7)
1. A method of disguising device information through VSA technology, comprising the steps of:
s1, installing the mobile application and starting the application to run;
and S2, when the mobile application sends out the equipment information acquisition request, according to the fact that the mobile application is the VSA application, the VSA client intercepts the equipment information acquisition request and returns disguised equipment information to the mobile application.
2. The method of disguising device information via VSA technology as claimed in claim 1,
the disguised device information is real device information modified by the VSA client.
3. The method of disguising device information via VSA technology as claimed in claim 1,
the device information includes one or more of: user fingerprint information, IMEI, equipment model, system version.
4. The method of disguising device information via VSA technology as claimed in claim 1,
for the application with confirmed security, when the application sends out a device information acquisition request, the mobile phone operating system returns the real device information to the application.
5. The method of claim 1, wherein the VSA client is a virtual runtime environment on a mobile device that takes over communication between an application mobile client and a mobile operating system.
6. The method of disguising device information via VSA technology as claimed in claim 5, wherein the mobile device is a cellular phone.
7. The method of claim 1, wherein the VSA client places applications with the same security level and the same security requirement in a logical group, and applies the security access control policy to the group to form a virtual security domain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911414593.5A CN111212420A (en) | 2019-12-31 | 2019-12-31 | Method for disguising equipment information through VSA technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911414593.5A CN111212420A (en) | 2019-12-31 | 2019-12-31 | Method for disguising equipment information through VSA technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111212420A true CN111212420A (en) | 2020-05-29 |
Family
ID=70788489
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911414593.5A Pending CN111212420A (en) | 2019-12-31 | 2019-12-31 | Method for disguising equipment information through VSA technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111212420A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112015621A (en) * | 2020-08-20 | 2020-12-01 | 北京指掌易科技有限公司 | Content monitoring method, device, equipment and medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8353031B1 (en) * | 2006-09-25 | 2013-01-08 | Symantec Corporation | Virtual security appliance |
CN105631326A (en) * | 2014-11-05 | 2016-06-01 | 中兴通讯股份有限公司 | Security protection method and device for sensitive information |
CN107341406A (en) * | 2017-07-05 | 2017-11-10 | 北京奇安信科技有限公司 | A kind of method and terminal for protecting privacy of user data |
CN109167782A (en) * | 2018-08-31 | 2019-01-08 | 国鼎网络空间安全技术有限公司 | Private data guard method and system based on intelligent mobile terminal |
CN109218506A (en) * | 2017-07-01 | 2019-01-15 | 珠海格力电器股份有限公司 | A kind of method, device and mobile terminal for protecting privacy information |
CN109241731A (en) * | 2018-09-11 | 2019-01-18 | 厦门市美亚柏科信息股份有限公司 | A kind of method for protecting privacy based on virtual application, device and storage medium |
CN109800094A (en) * | 2018-12-28 | 2019-05-24 | 北京指掌易科技有限公司 | A method of realizing individually application and the communication of multiple common applications |
CN110149405A (en) * | 2019-05-24 | 2019-08-20 | 北京指掌易科技有限公司 | A kind of method of cloud control mobile terminal application |
-
2019
- 2019-12-31 CN CN201911414593.5A patent/CN111212420A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8353031B1 (en) * | 2006-09-25 | 2013-01-08 | Symantec Corporation | Virtual security appliance |
CN105631326A (en) * | 2014-11-05 | 2016-06-01 | 中兴通讯股份有限公司 | Security protection method and device for sensitive information |
CN109218506A (en) * | 2017-07-01 | 2019-01-15 | 珠海格力电器股份有限公司 | A kind of method, device and mobile terminal for protecting privacy information |
CN107341406A (en) * | 2017-07-05 | 2017-11-10 | 北京奇安信科技有限公司 | A kind of method and terminal for protecting privacy of user data |
CN109167782A (en) * | 2018-08-31 | 2019-01-08 | 国鼎网络空间安全技术有限公司 | Private data guard method and system based on intelligent mobile terminal |
CN109241731A (en) * | 2018-09-11 | 2019-01-18 | 厦门市美亚柏科信息股份有限公司 | A kind of method for protecting privacy based on virtual application, device and storage medium |
CN109800094A (en) * | 2018-12-28 | 2019-05-24 | 北京指掌易科技有限公司 | A method of realizing individually application and the communication of multiple common applications |
CN110149405A (en) * | 2019-05-24 | 2019-08-20 | 北京指掌易科技有限公司 | A kind of method of cloud control mobile terminal application |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112015621A (en) * | 2020-08-20 | 2020-12-01 | 北京指掌易科技有限公司 | Content monitoring method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108763921B (en) | A kind of method of application software and SDK control | |
CN103548320B (en) | The dangerous safety applied on device performs | |
CN102411684B (en) | Data protection method and device | |
CN105874464B (en) | System and method for introducing variation in subsystem output signal to prevent device-fingerprint from analyzing | |
KR101509043B1 (en) | Implementing method, system of universal card system and smart card | |
CN103403669A (en) | Securing and managing APPs on a device | |
CN105653979A (en) | Code injection based privacy information protection method | |
CN105022939B (en) | Information Authentication method and device | |
CN105678192A (en) | Smart card based secret key application method and application apparatus | |
CN107341406A (en) | A kind of method and terminal for protecting privacy of user data | |
US9734307B2 (en) | User terminal interworking with peripheral device and method for preventing leakage of information using the same | |
CN108334404A (en) | The operation method and device of application program | |
CN104598401B (en) | Domestic Platform ancillary equipment managing and control system and its management-control method | |
CN111212420A (en) | Method for disguising equipment information through VSA technology | |
CN107948973B (en) | Equipment fingerprint generation method applied to IOS (input/output system) for security risk control | |
CN106909861A (en) | A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system | |
CN103595573B (en) | Method and device for issuing strategy rules | |
CN108494749A (en) | Method, apparatus, equipment and the computer readable storage medium of IP address disabling | |
CN106911653A (en) | A kind of method for realizing mobile terminal remote control, device, mobile terminal and system | |
CN105447398A (en) | Data safety protection method and device | |
CN104348951B (en) | A kind of card AMS | |
US20220240082A1 (en) | Text message processing method and system, terminal device and storage medium | |
CN102737193A (en) | Equipment shielding method and device for data security prevention and control | |
CN104866761B (en) | A kind of high security Android intelligent terminal | |
CN104200175A (en) | Information protection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200529 |