Sensitive information protection method based on virtualization technology

A virtualization technology and sensitive information technology, applied in the direction of digital data protection, digital data authentication, etc., can solve the problems of denial of service, incomplete service, inability to realize rights management, etc., to avoid information protection failure and good versatility Effect

Inactive Publication Date: 2015-05-20
NANKAI UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Some applications will refuse to provide services or provide incomplete services when the required information cannot be obtained;
[0005] (2) When the program trying to obtain the user's sensitive information also obtains the super user privilege, the privilege management cannot be realized;
[0006] (3) Some equipment manufacturers also try to record sensitive information of users in the design of the operating system and underlying firmware, and the operation of these information extraction cannot be sensed by the monitoring program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information protection method based on virtualization technology
  • Sensitive information protection method based on virtualization technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0029] A sensitive information protection method based on virtualization technology is figure 1 The software layer architecture shown is implemented. The present invention adopts virtualization technology to design virtualized management software (virtual management layer), and the virtual management layer is between the hardware layer and the original software layer to realize seamless compatibility with the upper layer software, without modifying or modifying the upper layer software at all. Minor changes can realize the migration of all the original upper-layer software. The original software system after migration no longer directly exchanges information with the real hardware, but communicates with the virtual hardware interface simulated by the virtualization management layer, and the virtualization management layer realizes the informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a sensitive information protection method based on a virtualization technology. The sensitive information protection method is technically characterized by comprising the following steps: erecting virtualization management software between an original software layer and an original hardware layer of smart handheld equipment; when the original software attempts to acquire sensitive information of hardware, intercepting the access to the hardware by the virtualization management software, judging whether an authorized user accesses to the hardware or not by the virtualization management software; if the current access is a reasonable request of the authorized user, providing the sensitive information to the original software; and if the current access is not a request of the authorized user, embedding certain noise information in the sensitive information and providing the noise information to the original software. The sensitive information protection method breaks through the authority management of an original operation system, uses software, which is at a lower level than the operation system, for information management, thereby avoiding an information protection failure caused by insufficient permissions, effectively recognizing and controlling the access to the sensitive information by the operation system or system software; therefore, the sensitive information protection method can be widely used in various smart handheld equipment.

Description

technical field [0001] The invention belongs to the field of information technology, in particular to a sensitive information protection method based on virtualization technology. Background technique [0002] With the development of mobile Internet technology, various smart handheld devices such as smartphones and tablet computers are becoming more and more popular and are widely used in people's daily life with various applications, providing convenience for our life. The rich sensors on smart handheld devices, such as camera, voice, location, direction, etc., can provide software with a way to obtain the user's surrounding environment, so as to provide users with the most direct and effective services. However, for various purposes, various application programs and system software are trying to collect such information of users, which seriously interferes with the normal protection of user privacy information. Users' private information cannot be effectively protected, c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/62
Inventor 宫晓利邵朝阳张金
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products