WO2014187168A1 - 一种基于Webkit浏览器的信息存储管理方法及装置 - Google Patents

一种基于Webkit浏览器的信息存储管理方法及装置 Download PDF

Info

Publication number
WO2014187168A1
WO2014187168A1 PCT/CN2014/071284 CN2014071284W WO2014187168A1 WO 2014187168 A1 WO2014187168 A1 WO 2014187168A1 CN 2014071284 W CN2014071284 W CN 2014071284W WO 2014187168 A1 WO2014187168 A1 WO 2014187168A1
Authority
WO
WIPO (PCT)
Prior art keywords
private
information
private information
random number
browsing mode
Prior art date
Application number
PCT/CN2014/071284
Other languages
English (en)
French (fr)
Inventor
张炽成
李香富
Original Assignee
福建联迪商用设备有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 福建联迪商用设备有限公司 filed Critical 福建联迪商用设备有限公司
Publication of WO2014187168A1 publication Critical patent/WO2014187168A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • the present invention relates to the field of computer applications, and in particular, to a method and device for managing information storage based on a Webkit browser.
  • PCI SSC Payment Card Industry Security Standards Committee
  • PCI SSC Payment Card Industry Security Standards Council
  • PCI certification the latest version is PCI3.0
  • PCI SSC is an American Express (American Express), Discovery Financial Service (Discover Financial) Services), JCB, MasterCard (MasterCard) Worldwide) and VISA International's five payment brands co-organized the establishment of a unified and professional information security standards committee in the fall of 2006.
  • PCI DSS Payment Card Industry Data Security Standard, the payment card industry data information security standard
  • PCI DSS Payment Card Industry Data Security Standard, the payment card industry data information security standard
  • PCI DSS applies to all entities involved in payment card processing, including merchants, processing agencies, purchasers, publishers and service providers, and all other entities that store, process or transmit cardholder data.
  • PCI DSS includes a set of basic requirements for protecting cardholder information and may add additional controls to further reduce risk.
  • PCI3.0 Payment) Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements Version 3.0, April 2010
  • PCI3.0 Payment) Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements Version 3.0, April 2010
  • IPP G-IP Protocols
  • IPSV IP Services
  • the financial payment terminal equipped with the Android system lacks a corresponding security mechanism in the storage and management of the personal privacy information of the browser to comply with the certification requirements of PCI3.0, which may result in leakage of the privacy information of the individual and account of the payment card user.
  • the following information is mainly used for the private information generated by the browser on the mobile device:
  • the patent CN102346831A "Handheld Device Privacy Encryption Protection Method for Android Operating System” encrypts the application of the Android system.
  • the password When the application is started, the password must be authenticated. The password can be authenticated before entering the application and obtaining the read and write permissions of the corresponding application.
  • the workflow of the Webkit browser that comes with the Android system is shown in Figure 1. It provides two browsing modes: normal browsing and private browsing. In either mode, browsing the generated private information such as cookies and user name passwords during browsing. It is stored in the database file of the local disk of the terminal in plain text. After browsing, ordinary browsing does not clear these database files; private browsing deletes the cookies stored in the local database file after browsing, instead of including the username and password. The database file is operated.
  • the "Handheld Device Privacy Encryption Protection Method for Android Operating System” mainly has the following disadvantages:
  • Vulnerability The encryption method only performs password authentication on the portal of the application carried by the Android system, and the database file itself storing the personal privacy information is not encrypted and saved, so the attacker obtains the highest Android system through the third-party application. After the root user's root authority is granted, the application to which the database file belongs can be bypassed, and the database file can be directly accessed by accessing the text file, and the user's personal privacy information can be extracted from the plaintext data. Therefore, it does not meet the PCI3.0 certification requirements.
  • Non-universal For the application of the financial payment terminal, it is necessary to provide the browsing service to different card users. Therefore, the browser application portal encryption prevents the card users other than the setting password from using the function, resulting in This browser feature is not universal.
  • the user name and password stored in the local database file are stored in plain text, whether it is normal browsing or private browsing. After the attacker obtains the permission of the root node root of the Android system through the third-party application, the user can directly access these files in the form of accessing the text file. Database file and extract user's personal privacy information from plaintext data. Therefore, it does not meet the PCI3.0 certification requirements.
  • the generated cookies are stored in the local database file in plain text.
  • the database file can be directly accessed by accessing the text file, and The private data carried in the user's cookie is extracted from the plaintext data.
  • the generated cookies are stored in the local database file in plain text. Only when the current private browsing page is closed, the browser deletes the cookie information generated by the private browsing in the database file. During the browsing process, the cookie information is still stored in the local disk in plain text, so the cookie is still vulnerable during the period when the browsed web page is opened. Therefore, it does not meet the PCI3.0 certification requirements.
  • An information storage management method based on the Webkit browser including: S1, starting a Webkit browser, determining that the browsing mode is normal browsing or private browsing, if the browsing mode is normal, the process proceeds to step S2, and if the browsing mode is private browsing, the steps are entered.
  • step S4 otherwise proceeds to step S3; S3, generating cookie privacy information in the local terminal, determining whether the current webpage has a password for saving the user name, and when determining that the current webpage has a password for saving the username, generating a username and password privacy information in the local terminal, and then
  • the 3DES algorithm is used to encrypt the cookie privacy information and the username and password privacy information, and the encrypted cookie privacy information and the username and password privacy information are written into the database file, and the process proceeds to step S7; S4, using the 3DES algorithm to decrypt the privacy information item corresponding to the current webpage URL.
  • step S7 the browser main thread requests the memory space from the system memory, and stores the database file corresponding to the private browsing mode in the requested memory space, and the database file corresponding to the private browsing mode is hashed.
  • the form is stored in the form of a management organization, and the process proceeds to step S6; S6, when the webpage is opened, it is determined whether the private information corresponding to the current webpage URL is searched in the database file corresponding to the private browsing mode, and if yes, the process proceeds to step S4; otherwise, the process proceeds to step S3; When the web page is closed, if the browsing mode is private browsing, the database files in the system memory are cleared.
  • the encrypting the cookie private information and the username and password private information by using the 3DES algorithm specifically includes: generating a random number; recording a random number in a disk random number file, establishing an index of the private information and the random number; and the system owning the fixed private key and The random number is iteratively processed to generate the original key; the original key is SHA256 and MD5 hash encryption algorithm to obtain the final key; the final key is used to perform 3DES encryption on the private information to generate the private information ciphertext; return the private information ciphertext and Index; write private information ciphertext and indexes to database files.
  • the method for decrypting the private information item corresponding to the current webpage URL by using the 3DES algorithm to obtain the private information includes: obtaining a random number index by the private information ciphertext query in the database file; and opening the random number file of the disk to obtain the random number according to the index;
  • the fixed key and the random number are used to iteratively process to generate the original key;
  • the original key is SHA256 and MD5 hash encryption algorithm to obtain the final key;
  • the final key is used to decrypt the private information ciphertext to generate private information; Return to the browser main thread.
  • Providing a Webkit browser-based information storage management device comprising: a browsing mode determining unit, configured to start a Webkit browser, and determine that the browsing mode is normal browsing or private browsing; and the first private information item query unit is configured to The browsing mode determining unit determines the normal browsing mode and when the webpage is opened, causes the browser main thread to open the database file corresponding to the normal browsing mode in the terminal disk and determines whether the current webpage URL is searched in the database file corresponding to the normal browsing mode.
  • a privacy information item a private browsing mode file management unit, configured to: when the browsing mode determining unit determines that the private browsing mode is, the browser main thread requests a memory space from the system memory, and stores the private browsing in the requested memory space.
  • the database file corresponding to the mode, the database file corresponding to the private browsing mode is stored in a management form in a hash table; the second privacy item information query unit is configured to determine whether to search in the database file corresponding to the private browsing mode when the webpage is opened.
  • Privacy corresponding to the current web page URL a privacy information generating unit, configured to: when the first and second privacy item query units do not search for a private information item corresponding to the current webpage URL, generate cookie privacy information at the local terminal, and determine whether the current webpage has Saving the username and password, and generating the username and password privacy information on the local terminal when determining that the current webpage has the username password saved;
  • the 3DES algorithm encryption unit is configured to encrypt the cookie privacy information and the username and password privacy information using the 3DES algorithm, and The encrypted cookie privacy information and the username and password privacy information are written into the database file;
  • the 3DES algorithm decryption unit is configured to use the 3DES algorithm when the first and second privacy item query units search for the private information item corresponding to the current webpage URL Decrypt the private information item corresponding to the current webpage URL to obtain the private information and return it to the main thread of the browser;
  • the clearing unit is used to clear the database file in the system memory when the webpage is closed and the browsing mode is private browsing.
  • the 3DES algorithm encryption unit includes: a random number generating unit, configured to generate a random number; an index establishing unit, configured to record a random number in a disk random number file, and establish an index of the private information and the random number; the first original key a generating unit, configured to iteratively process the system with a fixed private key and a random number to generate an original key; and a first final key generating unit, configured to perform a SHA256 and MD5 hash encryption algorithm on the original key to obtain a final key
  • the encryption unit is configured to generate the privacy information ciphertext by using the final key to perform 3DES encryption on the private information; the privacy information ciphertext writing unit is configured to return the privacy information ciphertext and the index and write the privacy information ciphertext and the index into the database. file.
  • the decryption unit of the 3DES algorithm includes: an index query unit, configured to obtain an index by a private information ciphertext query in a database file; a random number obtaining unit, configured to open a disk random number file to obtain a random number according to an index; a key generation unit, configured to iteratively process the system with a fixed private key and a random number to generate an original key; and a second final key generation unit, configured to perform a SHA256 and MD5 hash encryption algorithm on the original key to obtain a final a decryption unit, configured to perform 3DES decryption of the private information ciphertext by using the final key to generate private information; and a private information obtaining unit, configured to return the private information to the browser main thread.
  • the Webkit browser-based information storage management method and system of the invention based on the Android system Webkit browser architecture, design an Android Webkit browser personal privacy information storage and management solution, 3DES encryption of cardholder privacy information such as cookie privacy and user name and password generated during Webkit browser browsing, and different storage management according to browsing security level to ensure these
  • the privacy of information is not easy to break.
  • Encrypt and store the private information generated by the Webkit browser dynamically open the memory management to store the private information generated by the Webkit browser, and use the 3DES algorithm to encrypt and decrypt the browser privacy information to meet the PCI3.0 authentication for the browser to ensure the privacy of the card user.
  • Information security requirements based on the Android system Webkit browser architecture, design an Android Webkit browser personal privacy information storage and management solution, 3DES encryption of cardholder privacy information such as cookie privacy and user name and password generated during Webkit browser browsing, and different storage management according to browsing security level to ensure these
  • Encrypt and store the private information generated by the Webkit browser dynamically open the memory management to store the private information generated by the Web
  • FIG. 1 is a block diagram of an information storage management apparatus based on a Webkit browser according to an embodiment of the present invention
  • FIG. 2 is a block diagram of the 3DES algorithm encryption unit of Figure 1;
  • FIG. 3 is a block diagram of the decryption unit of the 3DES algorithm of Figure 1;
  • FIG. 4 is a flowchart of an information storage management method based on a Webkit browser according to an embodiment of the present invention
  • FIG. 5 is a specific implementation flowchart of encrypting cookie privacy information and user name password privacy information by using a 3DES algorithm
  • FIG. 6 is a specific implementation flowchart of decrypting a private information item corresponding to a current webpage URL using a 3DES algorithm to obtain private information.
  • Webkit browser-based information storage management device 100 browsing mode determining unit 11;
  • a first private information item query unit 12 a private browsing mode file management unit 13;
  • a second privacy item information inquiring unit 14 a privacy information generating unit 15;
  • 3DES algorithm encryption unit 16 3DES algorithm decryption unit 17; emptying unit 18.
  • FIG. 1 is a block diagram of an information storage management apparatus based on a Webkit browser according to an embodiment of the present invention.
  • the Webkit browser-based information storage management apparatus 100 includes a browsing mode determining unit 11, a first private information item query unit 12, a private browsing mode file management unit 13, a second privacy item information query unit 14, and a privacy information generating unit 15, The 3DES algorithm encryption unit 16, the 3DES algorithm decryption unit 17, and the clear unit 18.
  • the browsing mode determining unit 11 is configured to start a Webkit browser and determine that the browsing mode is normal browsing or private browsing.
  • the first private information item querying unit 12 is configured to enable the browser main thread to open a database file corresponding to the normal browsing mode in the terminal disk when the browsing mode determining unit 11 determines the normal browsing mode and when the webpage is opened, and determine Whether the private information corresponding to the current webpage URL is searched in the database file corresponding to the normal browsing mode.
  • the private browsing mode file management unit 13 is configured to enable the browser main thread to apply for a memory space from the system memory when the browsing mode determining unit 11 determines that the private browsing mode is determined, and store the private browsing mode in the requested memory space.
  • the database files corresponding to the private browsing mode are stored in a management table in a hash table format.
  • the second privacy item information querying unit 14 is configured to determine whether to search for a private information item corresponding to the current webpage URL in the database file corresponding to the private browsing mode when the webpage is opened.
  • the private information generating unit 15 is configured to generate cookie privacy information in the local terminal when the first privacy item query unit 12 and the second privacy item query unit 14 do not search for the private information item corresponding to the current web page URL, and It is determined whether the current webpage has a password for saving the username, and when it is determined that the current webpage has a password for saving the username, the username and password privacy information is generated in the local terminal.
  • the 3DES algorithm encryption unit 16 is configured to encrypt the cookie privacy information and the username and password privacy information by using the 3DES algorithm, and write the encrypted cookie privacy information and the username and password privacy information into the database file.
  • the 3DES algorithm decryption unit 17 is configured to use the 3DES algorithm to decrypt the private information corresponding to the current webpage URL when the first privacy item query unit 12 and the second privacy item query unit 14 search for the private information item corresponding to the current webpage URL.
  • the item gets the private information and returns it to the main thread of the browser.
  • the clearing unit 18 is configured to clear the database file in the system memory when the webpage is closed and the browsing mode is private browsing.
  • FIG. 2 is a block diagram of the 3DES algorithm encryption unit in FIG.
  • the 3DES algorithm encryption unit 16 includes a random number generation unit, an index establishment unit, a first original key generation unit, a first final key generation unit, an encryption unit, and a privacy information ciphertext writing unit.
  • the random number generating unit is configured to generate a random number.
  • the index establishing unit is configured to record a random number in a disk random number file, and establish an index of the private information and the random number.
  • the first original key generation unit is configured to iteratively process the system with a fixed private key and a random number to generate an original key.
  • the first final key generation unit is configured to perform a hash encryption algorithm of SHA256 and MD5 on the original key to obtain a final key.
  • the encryption unit is configured to generate privacy information ciphertext by performing 3DES encryption on the private information by using the final key.
  • the private information ciphertext writing unit is configured to return the private information ciphertext and the index and write the private information ciphertext and index into the database file.
  • FIG. 3 is a block diagram of the decryption unit of the 3DES algorithm in FIG.
  • the 3DES algorithm decryption unit 17 includes an index query unit, a random number acquisition unit, a second original key generation unit, a second final key generation unit, a decryption unit, and a privacy information acquisition unit.
  • the index query unit is configured to obtain an index from a private information ciphertext query in a database file.
  • the random number obtaining unit is configured to open a disk random number file to obtain a random number according to an index.
  • the second original key generating unit is configured to iteratively process the system with a fixed private key and a random number to generate an original key.
  • the second final key generation unit is configured to perform a hash encryption algorithm of SHA256 and MD5 on the original key to obtain a final key.
  • the decryption unit is configured to perform 3DES decryption of the private information ciphertext by using the final key to generate the private information.
  • the private information obtaining unit is configured to return private information to the browser main thread.
  • FIG. 4 is a flowchart of a method for managing information storage based on a Webkit browser according to an embodiment of the present invention, including:
  • step S1 starting the Webkit browser, determining that the browsing mode is normal browsing or private browsing, if it is the normal browsing mode, then proceeds to step S2, and if it is the private browsing mode, then proceeds to step S5;
  • step S2 when the webpage is opened, the main thread of the browser opens the database file corresponding to the normal browsing mode in the terminal disk, and determines whether the private information corresponding to the current webpage URL is searched in the database file corresponding to the normal browsing mode, and if yes, the process proceeds to step S4. Otherwise proceed to step S3;
  • step S3. Generate cookie privacy information on the local terminal, determine whether the current webpage has a password for saving the username, and when determining that the current webpage has a password for saving the username, generate a username and password privacy information on the local terminal, and then encrypt the cookie privacy information by using a 3DES algorithm. And the username and password privacy information, and the encrypted cookie privacy information and the username and password privacy information are written into the database file, and the process proceeds to step S7;
  • step S4 using the 3DES algorithm to decrypt the private information item corresponding to the current web page URL to obtain the private information is returned to the browser main thread, proceeds to step S7;
  • Step S5 the main thread of the browser applies for the memory space from the system memory, and stores the database file corresponding to the private browsing mode in the requested memory space, and the database file corresponding to the private browsing mode is stored in the management organization in the form of a hash table, and enters Step S6;
  • step S6 when opening the webpage, determine whether to search for the private information item corresponding to the current webpage URL in the database file corresponding to the private browsing mode, if yes, proceed to step S4, otherwise proceed to step S3;
  • FIG. 5 is a specific implementation flowchart for encrypting cookie privacy information and user name password privacy information by using the 3DES algorithm.
  • the encrypting the cookie private information and the username and password privacy information by using the 3DES algorithm specifically includes:
  • S102 Record a random number in a disk random number file, and establish an index of the private information and the random number.
  • S103 Iteratively process the system with a fixed private key and a random number to generate an original key
  • FIG. 6 is a specific implementation flowchart for decrypting a private information item corresponding to a current web page URL by using a 3DES algorithm to obtain private information.
  • Decrypting the private information item corresponding to the current webpage URL by using the 3DES algorithm to obtain the private information includes:
  • S203 Iteratively process the system with a fixed private key and a random number to generate an original key
  • S205 Perform 3DES decryption of the private information ciphertext by using the final key to generate private information and return it to the browser main thread.
  • the user privacy information stored in the disk database file of the present invention is encrypted by the 3DES algorithm, and the 3DES algorithm uses three 56-bit length passwords to encrypt the data three times. Limited to current computer computing capabilities, the 3DES algorithm is highly resistant to brute force attacks.
  • the browser process can extract the memory address of the entry that obtains the memory; even if the intruder obtains the memory address, due to privacy
  • the information is also encrypted in the memory by the 3DES algorithm, so it is also difficult to crack; at the same time, after the private browsing is finished, when the browser is closed, the browser will release the previously dynamically opened memory, that is, the user who deletes the browser record in the memory. Privacy information further enhances the security of browsing.
  • the key is obtained by a series of iterations and hash hashing processes performed by the system's own fixed private key and the instantaneously generated random number.
  • the random number is stored only on the local disk, and the query is performed by the pairing index of the ciphertext and the random number. Therefore, even if the attacker obtains the random number, if no interface obtains the fixed private key and does not understand the iterative and hash hash processing procedures, the key used for encryption cannot be obtained, thereby ensuring the privacy of the information. .
  • the random number is introduced as a source of key generation, the randomness of the key is guaranteed, which is more conducive to the security of encryption.
  • the Webkit browser-based information storage management method of the present invention encrypts and stores the private information generated by the Webkit browser, dynamically opens the memory management to store the private information generated by the Webkit browser, and encrypts and decrypts the browser privacy by using the 3DES algorithm.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种基于Webkit浏览器的信息存储管理方法,包括:判断浏览模式为普通浏览或私密浏览,若为私密浏览模式令浏览器主线程从系统内存中申请内存空间存放私密浏览模式对应的数据库文件;判断在私密浏览模式对应的数据库文件中是否搜索当前网页URL对应的隐私信息项;若没有搜索隐私信息项,则在本地终端生成Cookies隐私信息、用户名密码隐私信息,然后使用3DES算法加密Cookies隐私信息及用户名密码隐私信息;若搜索到隐私信息项,则使用3DES算法解密隐私信息项获取隐私信息返回给浏览器主线程;当关闭网页时清除系统内存中的数据库文件。本发明还公开了一种基于Webkit浏览器的信息存储管理装置。

Description

一种基于Webkit浏览器的信息存储管理方法及装置
技术领域
本发明涉及计算机应用领域,尤其涉及一种基于Webkit浏览器的信息存储管理方法及装置。
背景技术
国际上,支付卡行业数据安全标准委员会(Payment Card Industry Security Standards Council,PCI SSC)规定,金融支付类产品必须通过PCI认证(最新版本为PCI3.0)后,才可用于在线支付交易,以保证支付卡用户的在线交易安全。PCI SSC是由美国运通(American Express)、美国发现金融服务(Discover Financial Services)、JCB、万事达(MasterCard Worldwide)和VISA国际组织五家支付品牌在2006年秋共同筹办设立的统一且专业的信息安全标准委员会。
PCI DSS(Payment Card Industry Data Security Standard,支付卡行业数据信息安全标准)是该组织制定,力在使国际上采用一致的数据安全措施对金融支付终端进行限制,对于支付网关的安全方面提出标准的要求,其中包括安全管理、策略、过程、网络体系结构、软件设计的要求的列表等,全面保障金融支付交易安全。PCI DSS适用于所有涉及支付卡处理的实体,包括商户、处理机构、购买者、发行商和服务提供商及储存、处理或传输持卡人资料的所有其他实体。PCI DSS包括一组保护持卡人信息的基本要求,并可能增加额外的管控措施,以进一步降低风险。
PCI组织要求,从2005年10月起,新POS支付终端PIN输入设备必须通过产品安全认证;从2010年7月起,在网络中使用的全部支付终端PIN输入设备必须通过认证。目前最新的PCI认证版本为PCI3.0(Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements Version 3.0, April 2010),其标准中对于浏览器行为相关的部分G – IP Protocols (IPP)和IP Services (IPSV)中要求浏览器对所提供的IP服务的安全性给予保障。
搭载Android系统的金融支付终端在浏览器的个人隐私信息存储和管理方面缺乏相应的安全机制以符合PCI3.0的认证要求,有可能导致支付卡用户个人和账户的隐私信息的泄露。
对于目前金融支付终端搭载的Android系统自带的Webkit浏览器而言,在上网浏览过程中,会产生Cookies、用户名密码等个人隐私信息。PCI3.0认证要求对于提供IP服务的终端对于本地存储的用户隐私信息不易被攻破。
目前对于移动设备上浏览器产生的私密信息,主要有以下处理方案:
专利CN102346831A《Android操作系统的手持设备隐私加密保护方法》对Android系统的应用进行加密,启动应用时候必须通过密码认证,密码通过认证的方可进入应用程序,并且获取相应应用的读写权限。
Android系统自带的Webkit浏览器其工作流程如图1所示,其提供普通浏览和私密浏览两种浏览模式,无论哪种模式,浏览产生的Cookies、用户名密码等隐私信息,在浏览过程中以明文方式保存在终端本地磁盘的数据库文件中,当浏览结束后,普通浏览不对这些数据库文件进行清除操作;私密浏览在浏览结束后会删除本地数据库文件中保存的Cookies,而不对含用户名密码的数据库文件进行操作。
《Android操作系统的手持设备隐私加密保护方法》主要有以下缺点:
1) 易受攻击性:该加密方法仅仅对Android系统搭载的应用的入口进行密码身份验证,而对存储个人隐私信息的数据库文件本身并没有进行加密保存,故对于攻击者通过第三方应用获取Android系统最高权限根用户Root的权限后,可以绕过数据库文件所属的应用,以访问文本文件形式直接访问这些数据库文件,并从明文数据中提取用户个人隐私信息。故不满足PCI3.0认证要求。
2) 非通用性:对于金融支付终端的应用场合,需要提供浏览业务给不同的持卡用户使用,故对浏览器应用入口加密,阻止了除设置密码者以外的其他持卡用户使用该功能,造成了该浏览器功能的不可通用性。
Android系统自带的Webkit浏览器的个人隐私信息存储管理方法主要有以下缺点:
1)用户名密码易受攻击性:
无论采用普通浏览还是私密浏览,本地数据库文件保存的用户名密码均以明文方式存储,对于攻击者通过第三方应用获取Android系统最高权限根用户Root的权限后,可以以访问文本文件形式直接访问这些数据库文件,并从明文数据中提取用户个人隐私信息。故不满足PCI3.0认证要求。
2)Cookies文件易受攻击性:
在普通浏览时,产生的Cookies以明文方式存储入本地数据库文件,对于攻击者通过第三方应用获取Android系统最高权限和用户Root的权限后,可以以访问文本文件形式直接访问这些数据库文件,并从明文数据中提取用户Cookie中携带的个人隐私信息。
采用私密浏览时,产生的Cookies以明文方式存储入本地数据库文件,只有关闭当前私密浏览页面时,浏览器才会删除数据库文件中的私密浏览产生的Cookies信息。在浏览过程中,Cookies信息依然明文保存在本地磁盘中,故在浏览的网页打开的这一段时间内,Cookie依然存在易受攻击性。故不满足PCI3.0认证要求。
发明内容
为解决上述技术问题,本发明采用的一个技术方案是:
提供一种基于Webkit浏览器的信息存储管理方法,包括:S1、启动Webkit浏览器,判断浏览模式为普通浏览或私密浏览,若为普通浏览模式则进入步骤S2,若为私密浏览模式则进入步骤S5;S2、当打开网页时令浏览器主线程打开终端磁盘中普通浏览模式对应的数据库文件并判断在普通浏览模式对应的数据库文件中是否搜索到当前网页URL对应的隐私信息项,若是则进入步骤S4,否则进入步骤S3;S3、在本地终端生成Cookies隐私信息,判断当前网页是否有保存用户名密码,并当判定当前网页有保存用户名密码时,在本地终端生成用户名密码隐私信息,然后使用3DES算法加密Cookies隐私信息及用户名密码隐私信息,并将加密的Cookies隐私信息及用户名密码隐私信息写入数据库文件,进入步骤S7;S4、使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息返回给浏览器主线程,进入步骤S7;S5、令浏览器主线程从系统内存中申请内存空间,并在申请的内存空间中存放私密浏览模式对应的数据库文件,所述私密浏览模式对应的数据库文件以哈希表形式存放管理组织,进入步骤S6;S6、当打开网页时判断在私密浏览模式对应的数据库文件中是否搜索当前网页URL对应的隐私信息项,若是则进入步骤S4,否则进入步骤S3;S7、当关闭网页时,如果浏览模式是私密浏览,则清除系统内存中的数据库文件。
其中,所述使用3DES算法加密Cookies隐私信息及用户名密码隐私信息具体包括:生成随机数;记录随机数于磁盘随机数文件,建立隐私信息和随机数的索引;将系统自带固定私钥和随机数进行迭代处理生成原始密钥;对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;利用最终密钥对隐私信息进行3DES加密生成隐私信息密文;返回隐私信息密文和索引;将隐私信息密文和索引写入数据库文件。
其中,所述使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息具体包括:在数据库文件中由隐私信息密文查询获取随机数索引;打开磁盘随机数文件根据索引获取随机数;将系统自带固定私钥和随机数进行迭代处理生成原始密钥;对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;利用最终密钥对隐私信息密文进行3DES解密生成隐私信息;返回给浏览器主线程。
本发明采用的另一个技术方案是:
提供一种基于Webkit浏览器的信息存储管理装置,包括:浏览模式判定单元,用于启动Webkit浏览器,判断浏览模式为普通浏览或私密浏览;第一隐私信息项查询单元,用于当所述浏览模式判定单元判定为普通浏览模式并当打开网页时,令浏览器主线程打开终端磁盘中普通浏览模式对应的数据库文件并判断在普通浏览模式对应的数据库文件中是否搜索到当前网页URL对应的隐私信息项;私密浏览模式文件管理单元,用于当所述浏览模式判定单元判定为私密浏览模式时,令浏览器主线程从系统内存中申请内存空间,并在申请的内存空间中存放私密浏览模式对应的数据库文件,所述私密浏览模式对应的数据库文件以哈希表形式存放管理组织;第二隐私项信息查询单元,用于当打开网页时判断在私密浏览模式对应的数据库文件中是否搜索当前网页URL对应的隐私信息项;隐私信息生成单元,用于当所述第一、第二隐私项查询单元未有搜索到当前网页URL对应的隐私信息项时,在本地终端生成Cookies隐私信息,以及判断当前网页是否有保存用户名密码,并当判定当前网页有保存用户名密码时,在本地终端生成用户名密码隐私信息;3DES算法加密单元,用于使用3DES算法加密Cookies隐私信息及用户名密码隐私信息,并将加密的Cookies隐私信息及用户名密码隐私信息写入数据库文件;3DES算法解密单元,用于当所述第一、第二隐私项查询单元搜索到当前网页URL对应的隐私信息项时,使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息返回给浏览器主线程;清空单元,用于当关闭网页时,且浏览模式是私密浏览,则清除系统内存中的数据库文件。
其中,所述3DES算法加密单元包括:随机数生成单元,用于生成随机数;索引建立单元,用于记录随机数于磁盘随机数文件,建立隐私信息和随机数的索引;第一原始密钥生成单元,用于将系统自带固定私钥和随机数进行迭代处理生成原始密钥;第一最终密钥生成单元,用于对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;加密单元,用于利用最终密钥对隐私信息进行3DES加密生成隐私信息密文;隐私信息密文写入单元,用于返回隐私信息密文和索引并将隐私信息密文和索引写入数据库文件。
其中,所述3DES算法解密单元包括:索引查询单元,用于在数据库文件中由隐私信息密文查询获取索引;随机数获取单元,用于打开磁盘随机数文件根据索引获取随机数;第二原始密钥生成单元,用于将系统自带固定私钥和随机数进行迭代处理生成原始密钥;第二最终密钥生成单元,用于对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;解密单元,用于利用最终密钥对隐私信息密文进行3DES解密生成隐私信息;隐私信息获取单元,用于返回隐私信息给浏览器主线程。
本发明的基于Webkit浏览器的信息存储管理方法及系统,基于Android系统Webkit浏览器架构,设计一种Android Webkit浏览器个人隐私信息存储和管理方案,对采用Webkit浏览器浏览过程中产生的Cookies隐私和用户名密码等持卡人私密信息进行3DES加密,并根据浏览安全级别选择区别保存管理,以保证这些私密信息的不易攻破性。通过加密存储Webkit浏览器生成的隐私信息、动态开辟内存管理存放Webkit浏览器生成的隐私信息、使用3DES算法加解密浏览器隐私信息,以满足PCI3.0认证对浏览器关于保证持卡用户个人隐私信息安全的要求。
附图说明;
图1是本发明一实施方式中一种基于Webkit浏览器的信息存储管理装置的框图;
图2是图1中3DES算法加密单元的框图;
图3是图1中3DES算法解密单元的框图;
图4是本发明一实施方式中一种基于Webkit浏览器的信息存储管理方法流程图;
图5是使用3DES算法加密Cookies隐私信息及用户名密码隐私信息的具体实现流程图;
图6是使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息的具体实现流程图。
主要元件符号说明:
基于Webkit浏览器的信息存储管理装置100;浏览模式判定单元11;
第一隐私信息项查询单元12;私密浏览模式文件管理单元13;
第二隐私项信息查询单元14;隐私信息生成单元15;
3DES算法加密单元16;3DES算法解密单元17;清空单元18。
具体实施方式
为详细说明本发明的技术内容、构造特征、所实现目的及效果,以下结合实施方式并配合附图详予说明。
请一并参阅图1,是本发明一实施方式中一种基于Webkit浏览器的信息存储管理装置的框图。该基于Webkit浏览器的信息存储管理装置100包括浏览模式判定单元11、第一隐私信息项查询单元12、私密浏览模式文件管理单元13、第二隐私项信息查询单元14、隐私信息生成单元15、3DES算法加密单元16、3DES算法解密单元17以及清空单元18。
所述浏览模式判定单元11用于启动Webkit浏览器,判断浏览模式为普通浏览或私密浏览。
所述第一隐私信息项查询单元12用于当所述浏览模式判定单元11判定为普通浏览模式并当打开网页时,令浏览器主线程打开终端磁盘中普通浏览模式对应的数据库文件并判断在普通浏览模式对应的数据库文件中是否搜索到当前网页URL对应的隐私信息项。
所述私密浏览模式文件管理单元13用于当所述浏览模式判定单元11判定为私密浏览模式时,令浏览器主线程从系统内存中申请内存空间,并在申请的内存空间中存放私密浏览模式对应的数据库文件,所述私密浏览模式对应的数据库文件以哈希表形式存放管理组织。
所述第二隐私项信息查询单元14用于当打开网页时判断在私密浏览模式对应的数据库文件中是否搜索当前网页URL对应的隐私信息项。
所述隐私信息生成单元15用于当所述第一隐私项查询单元12、第二隐私项查询单元14未有搜索到当前网页URL对应的隐私信息项时,在本地终端生成Cookies隐私信息,以及判断当前网页是否有保存用户名密码,并当判定当前网页有保存用户名密码时,在本地终端生成用户名密码隐私信息。
所述3DES算法加密单元16用于使用3DES算法加密Cookies隐私信息及用户名密码隐私信息,并将加密的Cookies隐私信息及用户名密码隐私信息写入数据库文件。
所述3DES算法解密单元17用于当所述第一隐私项查询单元12、第二隐私项查询单元14搜索到当前网页URL对应的隐私信息项时,使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息返回给浏览器主线程。
所述清空单元18用于当关闭网页时,且浏览模式是私密浏览,则清除系统内存中的数据库文件。
请参阅图2,是图1中3DES算法加密单元的框图。所述3DES算法加密单元16包括随机数生成单元、索引建立单元、第一原始密钥生成单元、第一最终密钥生成单元、加密单元、隐私信息密文写入单元。
所述随机数生成单元用于生成随机数。
所述索引建立单元用于记录随机数于磁盘随机数文件,建立隐私信息和随机数的索引。
所述第一原始密钥生成单元用于将系统自带固定私钥和随机数进行迭代处理生成原始密钥。
所述第一最终密钥生成单元用于对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥。
所述加密单元用于利用最终密钥对隐私信息进行3DES加密生成隐私信息密文。
所述隐私信息密文写入单元用于返回隐私信息密文和索引并将隐私信息密文和索引写入数据库文件。
请参阅图3,是图1中3DES算法解密单元的框图。所述3DES算法解密单元17包括索引查询单元、随机数获取单元、第二原始密钥生成单元、第二最终密钥生成单元、解密单元以及隐私信息获取单元。
所述索引查询单元用于在数据库文件中由隐私信息密文查询获取索引。
所述随机数获取单元用于打开磁盘随机数文件根据索引获取随机数。
所述第二原始密钥生成单元用于将系统自带固定私钥和随机数进行迭代处理生成原始密钥。
所述第二最终密钥生成单元用于对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥。
所述解密单元用于利用最终密钥对隐私信息密文进行3DES解密生成隐私信息。
所述隐私信息获取单元用于返回隐私信息给浏览器主线程。
请参阅图4,是本发明一实施方式中一种基于Webkit浏览器的信息存储管理方法流程图,包括:
S1、启动Webkit浏览器,判断浏览模式为普通浏览或私密浏览,若为普通浏览模式则进入步骤S2,若为私密浏览模式则进入步骤S5;
S2、当打开网页时令浏览器主线程打开终端磁盘中普通浏览模式对应的数据库文件并判断在普通浏览模式对应的数据库文件中是否搜索到当前网页URL对应的隐私信息项,若是则进入步骤S4,否则进入步骤S3;
S3、在本地终端生成Cookies隐私信息,判断当前网页是否有保存用户名密码,并当判定当前网页有保存用户名密码时,在本地终端生成用户名密码隐私信息,然后使用3DES算法加密Cookies隐私信息及用户名密码隐私信息,并将加密的Cookies隐私信息及用户名密码隐私信息写入数据库文件,进入步骤S7;
S4、使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息返回给浏览器主线程,进入步骤S7;
S5、令浏览器主线程从系统内存中申请内存空间,并在申请的内存空间中存放私密浏览模式对应的数据库文件,所述私密浏览模式对应的数据库文件以哈希表形式存放管理组织,进入步骤S6;
S6、当打开网页时判断在私密浏览模式对应的数据库文件中是否搜索当前网页URL对应的隐私信息项,若是则进入步骤S4,否则进入步骤S3;
S7、当关闭网页时,如果浏览模式是私密浏览,则清除系统内存中的数据库文件。
请参阅图5,是使用3DES算法加密Cookies隐私信息及用户名密码隐私信息的具体实现流程图。其中,所述使用3DES算法加密Cookies隐私信息及用户名密码隐私信息具体包括:
S101、生成随机数;
S102、记录随机数于磁盘随机数文件,建立隐私信息和随机数的索引;
S103、将系统自带固定私钥和随机数进行迭代处理生成原始密钥;
S104、对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;
S105、利用最终密钥对隐私信息进行3DES加密生成隐私信息密文;
S106、返回隐私信息密文和索引;
S107、将隐私信息密文和索引写入数据库文件。
请参阅图6,是使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息的具体实现流程图。所述使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息具体包括:
S201、在数据库文件中由隐私信息密文查询获取随机数索引;
S202、打开磁盘随机数文件根据索引获取随机数;
S203、将系统自带固定私钥和随机数进行迭代处理生成原始密钥;
S204、对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;
S205、利用最终密钥对隐私信息密文进行3DES解密生成隐私信息并返回给浏览器主线程。
对于普通浏览模式而言,本发明存放在磁盘数据库文件的用户隐私信息通过3DES算法加密,3DES算法使用了3条56位长度的密码分别对数据进行了3次加密。限于目前计算机运算能力,3DES算法对于防范暴力破解有很强的抵抗力。
对于私密浏览模式而言,由于用户的隐私信息是存放在浏览器进程动态开辟的内存中,故只有浏览器进程可以提取获得该内存的入口的内存地址;即使入侵者获取该内存地址,由于隐私信息在内存中也是通过3DES算法加密过,故同样难以破解;同时,私密浏览结束后,关闭浏览器时,浏览器会释放之前动态开辟的内存,也就是会清除浏览器记录在内存中的用户隐私信息,故更进一步提升了浏览的安全性。
对于3DES算法的密钥管理方案,密钥由系统自带的固定私钥和即时生成的随机数进行一系列迭代和哈希散列处理后获得。仅在本地磁盘储存随机数,通过密文和随机数的配对索引来进行查询。故攻击者即使获取了该随机数,在没有接口获取固定私钥,且不了解迭代和哈希散列处理流程的情况下,无法获得加密所用的密钥,从而保证了隐私信息的不易攻破性。而且由于引入了随机数作为密钥生成的来源,故保证了密钥的随机性,更利于加密的安全。
综上所述,本发明的基于Webkit浏览器的信息存储管理方法,通过加密存储Webkit浏览器生成的隐私信息、动态开辟内存管理存放Webkit浏览器生成的隐私信息、使用3DES算法加解密浏览器隐私信息,满足PCI3.0认证对浏览器关于保证持卡用户个人隐私信息安全的要求。
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (1)

  1. 1、一种基于Webkit浏览器的信息存储管理方法,其特征在于,包括:
    S1、启动Webkit浏览器,判断浏览模式为普通浏览或私密浏览,若为普通浏览模式则进入步骤S2,若为私密浏览模式则进入步骤S5;
    S2、当打开网页时令浏览器主线程打开终端磁盘中普通浏览模式对应的数据库文件并判断在普通浏览模式对应的数据库文件中是否搜索到当前网页URL对应的隐私信息项,若是则进入步骤S4,否则进入步骤S3;
    S3、在本地终端生成Cookies隐私信息,判断当前网页是否有保存用户名密码,并当判定当前网页有保存用户名密码时,在本地终端生成用户名密码隐私信息,然后使用3DES算法加密Cookies隐私信息及用户名密码隐私信息,并将加密的Cookies隐私信息及用户名密码隐私信息写入数据库文件,进入步骤S7;
    S4、使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息返回给浏览器主线程,进入步骤S7;
    S5、令浏览器主线程从系统内存中申请内存空间,并在申请的内存空间中存放私密浏览模式对应的数据库文件,所述私密浏览模式对应的数据库文件以哈希表形式存放管理组织,进入步骤S6;
    S6、当打开网页时判断在私密浏览模式对应的数据库文件中是否搜索当前网页URL对应的隐私信息项,若是则进入步骤S4,否则进入步骤S3;
    S7、当关闭网页时,如果浏览模式是私密浏览,则清除系统内存空间中的数据库文件。
    2、根据权利要求1所述的一种基于Webkit浏览器的信息存储管理方法,其特征在于,所述使用3DES算法加密Cookies隐私信息及用户名密码隐私信息具体包括:
    生成随机数;
    记录随机数于磁盘随机数文件,建立隐私信息和随机数的索引;
    将系统自带固定私钥和随机数进行迭代处理生成原始密钥;
    对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;
    利用最终密钥对隐私信息进行3DES加密生成隐私信息密文;
    返回隐私信息密文和索引;
    将隐私信息密文和索引写入数据库文件。
    3、根据权利要求2所述的一种基于Webkit浏览器的信息存储管理方法,其特征在于,所述使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息具体包括:
    在数据库文件中由隐私信息密文查询获取随机数索引;
    打开磁盘随机数文件根据索引获取随机数;
    将系统自带固定私钥和随机数进行迭代处理生成原始密钥;
    对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;
    利用最终密钥对隐私信息密文进行3DES解密生成隐私信息;
    返回给浏览器主线程。
    4、一种基于Webkit浏览器的信息存储管理装置,其特征在于,包括:
    浏览模式判定单元,用于启动Webkit浏览器,判断浏览模式为普通浏览或私密浏览;
    第一隐私信息项查询单元,用于当所述浏览模式判定单元判定为普通浏览模式并当打开网页时,令浏览器主线程打开终端磁盘中普通浏览模式对应的数据库文件并判断在普通浏览模式对应的数据库文件中是否搜索到当前网页URL对应的隐私信息项;
    私密浏览模式文件管理单元,用于当所述浏览模式判定单元判定为私密浏览模式时,令浏览器主线程从系统内存中申请内存空间,并在申请的内存空间中存放私密浏览模式对应的数据库文件,所述私密浏览模式对应的数据库文件以哈希表形式存放管理组织;
    第二隐私项信息查询单元,用于当打开网页时判断在私密浏览模式对应的数据库文件中是否搜索当前网页URL对应的隐私信息项;
    隐私信息生成单元,用于当所述第一、第二隐私项查询单元未有搜索到当前网页URL对应的隐私信息项时,在本地终端生成Cookies隐私信息,以及判断当前网页是否有保存用户名密码,并当判定当前网页有保存用户名密码时,在本地终端生成用户名密码隐私信息;
    3DES算法加密单元,用于使用3DES算法加密Cookies隐私信息及用户名密码隐私信息,并将加密的Cookies隐私信息及用户名密码隐私信息写入数据库文件;
    3DES算法解密单元,用于当所述第一、第二隐私项查询单元搜索到当前网页URL对应的隐私信息项时,使用3DES算法解密当前网页URL对应的隐私信息项获取隐私信息返回给浏览器主线程;
    清空单元,用于当关闭网页时,且浏览模式是私密浏览,则清除系统内存空间中的数据库文件。
    5、根据权利要求4所述的一种基于Webkit浏览器的信息存储管理装置,其特征在于,所述3DES算法加密单元包括:
    随机数生成单元,用于生成随机数;
    索引建立单元,用于记录随机数于磁盘随机数文件,建立隐私信息和随机数的索引;
    第一原始密钥生成单元,用于将系统自带固定私钥和随机数进行迭代处理生成原始密钥;
    第一最终密钥生成单元,用于对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;
    加密单元,用于利用最终密钥对隐私信息进行3DES加密生成隐私信息密文;
    隐私信息密文写入单元,用于返回隐私信息密文和索引并将隐私信息密文和索引写入数据库文件。
    6、根据权利要求5所述的一种基于Webkit浏览器的信息存储管理装置,其特征在于,所述3DES算法解密单元包括:
    索引查询单元,用于在数据库文件中由隐私信息密文查询获取索引;
    随机数获取单元,用于打开磁盘随机数文件根据索引获取随机数;
    第二原始密钥生成单元,用于将系统自带固定私钥和随机数进行迭代处理生成原始密钥;
    第二最终密钥生成单元,用于对原始密钥进行SHA256和MD5的哈希加密算法获得最终密钥;
    解密单元,用于利用最终密钥对隐私信息密文进行3DES解密生成隐私信息;
    隐私信息获取单元,用于返回隐私信息给浏览器主线程。
PCT/CN2014/071284 2013-05-22 2014-01-23 一种基于Webkit浏览器的信息存储管理方法及装置 WO2014187168A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310192174.8 2013-05-22
CN2013101921748A CN103324671A (zh) 2013-05-22 2013-05-22 一种基于Webkit浏览器的信息存储管理方法及装置

Publications (1)

Publication Number Publication Date
WO2014187168A1 true WO2014187168A1 (zh) 2014-11-27

Family

ID=49193414

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/071284 WO2014187168A1 (zh) 2013-05-22 2014-01-23 一种基于Webkit浏览器的信息存储管理方法及装置

Country Status (2)

Country Link
CN (1) CN103324671A (zh)
WO (1) WO2014187168A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700001A (zh) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 应用程序的信息加密方法及装置
CN105049456A (zh) * 2015-08-28 2015-11-11 中国科学技术大学苏州研究院 一种基于网页链接请求的隐秘通信方法
CN109960945A (zh) * 2017-12-26 2019-07-02 中标软件有限公司 浏览器主动安全保护方法及系统
CN113468106A (zh) * 2021-07-15 2021-10-01 河南众诚信息科技股份有限公司 一种与平台无关的vr应用文件的存储和解析方法
CN113904810A (zh) * 2021-09-12 2022-01-07 西北工业大学 一种高效的隐私保护安全浏览方法
CN116992173A (zh) * 2023-09-28 2023-11-03 中孚信息股份有限公司 基于mv3的浏览器打开加密文件的方法及系统

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324671A (zh) * 2013-05-22 2013-09-25 福建联迪商用设备有限公司 一种基于Webkit浏览器的信息存储管理方法及装置
CN103473515B (zh) * 2013-09-27 2016-06-29 贝壳网际(北京)安全技术有限公司 浏览器隐私数据的管理方法、装置和客户端
CN103501222B (zh) * 2013-10-09 2016-08-17 贝壳网际(北京)安全技术有限公司 一种用户数据的保护方法及装置
CN104881616B (zh) * 2015-06-29 2018-09-25 北京金山安全软件有限公司 一种基于应用程序的隐私信息存储方法及装置
CN106372245A (zh) * 2016-09-20 2017-02-01 乐视控股(北京)有限公司 一种浏览器无痕处理方法及装置
CN107066298B (zh) * 2017-04-18 2020-03-10 北京元心科技有限公司 无痕运行应用程序的方法及装置
SG11202006183XA (en) * 2017-12-28 2020-07-29 Digital Arts Inc Information processing device, information processing method, program, and recording medium
CN110826083A (zh) * 2019-10-08 2020-02-21 云深互联(北京)科技有限公司 一种浏览器数据加密方法、装置、系统及存储介质
CN112039662A (zh) * 2020-08-26 2020-12-04 山谷网安科技股份有限公司 用于涉密单位Web应用网页中敏感数据的对称加密传输的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090000263A (ko) * 2007-02-09 2009-01-07 (주)드림와이즈 상호 인증 시스템
CN102681850A (zh) * 2012-05-07 2012-09-19 奇智软件(北京)有限公司 一种基于Webkit 内核提供网页浏览的方法及装置
CN103024003A (zh) * 2012-11-30 2013-04-03 北京奇虎科技有限公司 网页登录方法和装置
CN103324671A (zh) * 2013-05-22 2013-09-25 福建联迪商用设备有限公司 一种基于Webkit浏览器的信息存储管理方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8825747B2 (en) * 2010-05-07 2014-09-02 Google Inc. Managing multiple logins from a single browser
CN102075524B (zh) * 2010-12-28 2013-04-17 广东楚天龙智能卡有限公司 一种通过智能卡开展数字媒体互动业务的方法
CN102594813B (zh) * 2012-02-10 2016-03-30 北京奇虎科技有限公司 多账号登录方法及装置
CN102968584B (zh) * 2012-11-30 2016-09-28 北京奇虎科技有限公司 一种登录网页的方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090000263A (ko) * 2007-02-09 2009-01-07 (주)드림와이즈 상호 인증 시스템
CN102681850A (zh) * 2012-05-07 2012-09-19 奇智软件(北京)有限公司 一种基于Webkit 内核提供网页浏览的方法及装置
CN103024003A (zh) * 2012-11-30 2013-04-03 北京奇虎科技有限公司 网页登录方法和装置
CN103324671A (zh) * 2013-05-22 2013-09-25 福建联迪商用设备有限公司 一种基于Webkit浏览器的信息存储管理方法及装置

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700001A (zh) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 应用程序的信息加密方法及装置
CN104700001B (zh) * 2013-12-04 2020-01-10 腾讯科技(深圳)有限公司 应用程序的信息加密方法及装置
CN105049456A (zh) * 2015-08-28 2015-11-11 中国科学技术大学苏州研究院 一种基于网页链接请求的隐秘通信方法
CN105049456B (zh) * 2015-08-28 2018-04-10 中国科学技术大学苏州研究院 一种基于网页链接请求的隐秘通信方法
CN109960945A (zh) * 2017-12-26 2019-07-02 中标软件有限公司 浏览器主动安全保护方法及系统
CN109960945B (zh) * 2017-12-26 2023-03-21 中标软件有限公司 浏览器主动安全保护方法及系统
CN113468106A (zh) * 2021-07-15 2021-10-01 河南众诚信息科技股份有限公司 一种与平台无关的vr应用文件的存储和解析方法
CN113468106B (zh) * 2021-07-15 2024-05-17 河南众诚信息科技股份有限公司 一种与平台无关的vr应用文件的存储和解析方法
CN113904810A (zh) * 2021-09-12 2022-01-07 西北工业大学 一种高效的隐私保护安全浏览方法
CN116992173A (zh) * 2023-09-28 2023-11-03 中孚信息股份有限公司 基于mv3的浏览器打开加密文件的方法及系统
CN116992173B (zh) * 2023-09-28 2023-12-15 中孚信息股份有限公司 基于mv3的浏览器打开加密文件的方法及系统

Also Published As

Publication number Publication date
CN103324671A (zh) 2013-09-25

Similar Documents

Publication Publication Date Title
WO2014187168A1 (zh) 一种基于Webkit浏览器的信息存储管理方法及装置
WO2019227557A1 (zh) 密钥管理方法、设备、存储介质及装置
WO2014139344A1 (zh) 密钥下载方法、管理方法、下载管理方法及装置和系统
CN107113286B (zh) 跨设备的漫游内容擦除操作
WO2017022917A1 (ko) 블록체인을 기반으로 하는 공인인증서 발급시스템
US8918633B2 (en) Information processing device, information processing system, and program
WO2014139342A1 (zh) 密钥下载方法、管理方法、下载管理方法及装置和系统
WO2013086758A1 (zh) 以太网加密认证系统及加密认证方法
WO2013075613A1 (zh) 网络服务提供方法及装置
WO2022028289A1 (zh) 数据加密方法、数据解密方法、装置、终端和存储介质
WO2021075867A1 (ko) 블록체인 기반 시스템을 위한 키의 저장 및 복구 방법과 그 장치
WO2010087567A1 (en) Method for installing rights object for content in memory card
WO2018098881A1 (zh) 应用程序的访问处理方法及装置
WO2017071352A1 (zh) 密码的推送方法、推送系统及终端设备
WO2011126280A2 (ko) Drm을 이용한 광고 컨텐트 갱신 방법
WO2016206530A1 (zh) 一种高级安全的移动支付方法、装置及系统
WO2020022700A1 (ko) 디지털 키를 처리 및 인증하는 보안 요소 및 그 동작 방법
WO2020189993A1 (ko) 암호화폐 분실 방지 방법 및 시스템
WO2023163514A1 (ko) 컨트롤러 기반의 네트워크 접속을 제어하기 위한 시스템 및 그에 관한 방법
CN102986162A (zh) 基于TCM或TPM的license动态管理方法、装置及系统
JP2016192715A (ja) 暗号鍵管理システムおよび暗号鍵管理方法
WO2020066493A1 (ja) 情報処理システム、情報処理方法及び情報処理プログラム
WO2019125081A1 (ko) 블록체인을 이용한 일회성 접근 권한 부여 시스템
WO2023211121A1 (ko) 프록시에 기반하여 애플리케이션의 파일 송신 및 수신을 제어하기 위한 시스템 및 그에 관한 방법
WO2020111517A1 (en) Server and method for identifying integrity of application

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14800221

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14800221

Country of ref document: EP

Kind code of ref document: A1