SG11201808484RA - Method and device for concealing user information contained in application - Google Patents

Method and device for concealing user information contained in application

Info

Publication number
SG11201808484RA
SG11201808484RA SG11201808484RA SG11201808484RA SG11201808484RA SG 11201808484R A SG11201808484R A SG 11201808484RA SG 11201808484R A SG11201808484R A SG 11201808484RA SG 11201808484R A SG11201808484R A SG 11201808484RA SG 11201808484R A SG11201808484R A SG 11201808484RA
Authority
SG
Singapore
Prior art keywords
application
user information
media file
attribute list
information contained
Prior art date
Application number
SG11201808484RA
Other languages
English (en)
Inventor
Chenchen Lv
Weigang Guan
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG11201808484RA publication Critical patent/SG11201808484RA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1075Editing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)
SG11201808484RA 2016-03-29 2017-03-20 Method and device for concealing user information contained in application SG11201808484RA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610188604.2A CN107239712A (zh) 2016-03-29 2016-03-29 基于应用程序的用户信息的隐藏方法及装置
PCT/CN2017/077279 WO2017167052A1 (zh) 2016-03-29 2017-03-20 基于应用程序的用户信息的隐藏方法及装置

Publications (1)

Publication Number Publication Date
SG11201808484RA true SG11201808484RA (en) 2018-10-30

Family

ID=59963482

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201808484RA SG11201808484RA (en) 2016-03-29 2017-03-20 Method and device for concealing user information contained in application

Country Status (9)

Country Link
US (1) US10671755B2 (enExample)
JP (1) JP6798669B2 (enExample)
KR (1) KR102231409B1 (enExample)
CN (1) CN107239712A (enExample)
MY (1) MY195202A (enExample)
PH (1) PH12018502094A1 (enExample)
SG (1) SG11201808484RA (enExample)
TW (1) TW201734877A (enExample)
WO (1) WO2017167052A1 (enExample)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199713B (zh) * 2020-12-03 2021-03-16 成都中科大旗软件股份有限公司 一种ios系统软件运行算法的混淆加密方法
CN113422757B (zh) * 2021-06-04 2023-04-07 广西电网有限责任公司 一种基于加密应用的文档管理系统

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5499358A (en) * 1993-12-10 1996-03-12 Novell, Inc. Method for storing a database in extended attributes of a file system
US6281893B1 (en) 1996-04-04 2001-08-28 Sun Microsystems, Inc. Method and apparatus for providing an object oriented approach to a device independent graphics control system
WO2001071960A1 (en) * 2000-03-18 2001-09-27 Digimarc Corporation Transmarking, watermark embedding functions as rendering commands, and feature-based watermarking of multimedia signals
US7124203B2 (en) * 2000-07-10 2006-10-17 Oracle International Corporation Selective cache flushing in identity and access management systems
JP2003202930A (ja) * 2002-01-09 2003-07-18 Toshiba Corp 実行権限管理システム
US20050021520A1 (en) * 2003-07-24 2005-01-27 Nokia Corporation Method for controlling access rights to data stored in a hand portable device and a hand portable device for providing access to stored data
JP2005182747A (ja) * 2003-11-27 2005-07-07 Ricoh Co Ltd 文書管理装置、システム、方法及びプログラム
CN1746864A (zh) * 2004-09-08 2006-03-15 上海乐金广电电子有限公司 可再记录光盘及其文件属性信息管理方法
CN1262087C (zh) * 2005-01-14 2006-06-28 南相浩 基于标识的密钥产生方法
JP4971660B2 (ja) * 2005-03-31 2012-07-11 キヤノン株式会社 画像処理装置、画像処理方法、コンピュータプログラム、記憶媒体
US20070204078A1 (en) * 2006-02-09 2007-08-30 Intertrust Technologies Corporation Digital rights management engine systems and methods
TW200731751A (en) 2006-02-09 2007-08-16 Mitac Int Corp Method for enciphering to conceal the data from specific source
US20080052641A1 (en) * 2006-06-26 2008-02-28 Sun River Systems, Inc. System and method for secure and private media management
CN101114256B (zh) * 2006-07-24 2010-05-12 神盾股份有限公司 实时数据保密方法
US8752181B2 (en) * 2006-11-09 2014-06-10 Touchnet Information Systems, Inc. System and method for providing identity theft security
US8832467B2 (en) * 2007-05-16 2014-09-09 Broadcom Corporation Digital rights management metafile, management protocol and applications thereof
JP2009211384A (ja) * 2008-03-04 2009-09-17 Ntt Docomo Inc 検索代理装置及び検索代理方法
KR101574988B1 (ko) * 2008-06-02 2015-12-08 (주)마크애니 데이터 은닉 기법을 이용한 콘텐츠 품질 제어 방법 및시스템
US8073840B2 (en) * 2008-06-17 2011-12-06 Attivio, Inc. Querying joined data within a search engine index
JP2010052998A (ja) 2008-08-29 2010-03-11 Ohara Inc 光学ガラスの製造方法
US8745610B2 (en) * 2008-11-06 2014-06-03 Nec Corporation Maintenance system, maintenance method and program for maintenance
JP2011048739A (ja) * 2009-08-28 2011-03-10 Ricoh Co Ltd 電子書類を処理する情報処理装置、方法、プログラムおよび記録媒体
US8880905B2 (en) * 2010-10-27 2014-11-04 Apple Inc. Methods for processing private metadata
US8639706B1 (en) * 2011-07-01 2014-01-28 Google Inc. Shared metadata for media files
JP6091144B2 (ja) * 2012-10-10 2017-03-08 キヤノン株式会社 画像処理装置及びその制御方法、並びにプログラム
EP2802118B1 (en) * 2012-12-07 2021-02-03 Duvon Corporation File sharing system and method
JP6015414B2 (ja) * 2012-12-18 2016-10-26 富士通株式会社 プログラム、情報処理方法、及び情報処理装置
US9179199B2 (en) * 2013-03-14 2015-11-03 Apple Inc. Media playback across multiple devices
US9886585B2 (en) * 2013-06-14 2018-02-06 Sap Se Multi-layer data security
US9760697B1 (en) * 2013-06-27 2017-09-12 Interacvault Inc. Secure interactive electronic vault with dynamic access controls
WO2015045048A1 (ja) 2013-09-26 2015-04-02 富士通株式会社 アプリデータ記憶領域生成方法,アプリデータ記憶領域生成装置,及びアプリデータ記憶領域生成プログラム
US20160055342A1 (en) * 2013-12-18 2016-02-25 Giuseppe Bivona Device and methods to control information outputting on computing device
US9100440B1 (en) * 2014-02-20 2015-08-04 Symantec Corporation Systems and methods for applying data loss prevention policies to closed-storage portable devices
CN105227524B (zh) * 2014-06-12 2018-10-12 阿里巴巴集团控股有限公司 一种信息保密方法及相关装置
CN104200171B (zh) * 2014-08-20 2017-07-11 中国科学技术大学先进技术研究院 一种基于信息隐藏的虚拟文件系统
CN104199909B (zh) * 2014-08-28 2018-01-30 上海爱数信息技术股份有限公司 VMware场景中恢复NTFS高级加密文件的方法
US9928373B2 (en) * 2015-03-31 2018-03-27 Symantec Corporation Technique for data loss prevention for a cloud sync application

Also Published As

Publication number Publication date
JP6798669B2 (ja) 2020-12-09
CN107239712A (zh) 2017-10-10
TW201734877A (zh) 2017-10-01
KR102231409B1 (ko) 2021-03-26
PH12018502094A1 (en) 2019-07-24
JP2019511064A (ja) 2019-04-18
US10671755B2 (en) 2020-06-02
WO2017167052A1 (zh) 2017-10-05
KR20190002487A (ko) 2019-01-08
US20190026235A1 (en) 2019-01-24
MY195202A (en) 2023-01-11

Similar Documents

Publication Publication Date Title
EP4236332A3 (en) Techniques and apparatus for editing video
GB2540073A (en) Data file discovery, visualization, and actioning
WO2014152936A3 (en) Query intent expression for search in an embedded application context
WO2012162415A3 (en) Content selection in a pen-based computing system
PH12017550112A1 (en) Techniques to manage bookmarks for media files
GB2529766A (en) Live AD processing engine service
MX2011011343A (es) Consistencia de coautoria de canal cruzado.
MX2017008687A (es) Gestión de bache de sonido para suministro de contenido.
WO2009158664A8 (en) Library description of the user interface for federated search results
MY187298A (en) Method, client and computer storage medium for processing information
MX346617B (es) Metodo, aparato y dispositivo electronico para establecer un directorio virtual.
SG11201808484RA (en) Method and device for concealing user information contained in application
WO2015123072A3 (en) In-place disk unformatting
TW201612894A (en) Synthesis method of audio files and synthesis system of audio files using same
CN204526470U (zh) 一种保密笔记本
CN105620137A (zh) 设置笔插管的镇纸
UA102524U (xx) Електронний носій інформації
TR201821142A2 (tr) El yazisini di̇ji̇tal bi̇çi̇me dönüştüren bi̇r ci̇haz
정우현 Native and nonnative strategies of encouragement in English interaction
RU2012113428A (ru) Способ обеспечения потребителей информацией
Napoli The Dreamer
CN203233468U (zh) 便于书记的电话
De Donatis et al. Beebook: light field mapping app
Morley Electronic landscapes: Between the virtual and the actual
Siu Ashikaga Rule and Cultural Brilliance in the Muromachi Period: A Look at Selected Ink Monochrome Paintings