Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for protecting user privacy

A user and privacy technology, applied in computer security devices, internal/peripheral computer component protection, instruments, etc., can solve problems such as user privacy threats

Active Publication Date: 2010-03-10
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF2 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Thus, this malware can pose a serious threat to the user's personal privacy and is hard to detect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting user privacy
  • Method and device for protecting user privacy
  • Method and device for protecting user privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] At present, the operation of the widely used computer operating system can be divided into user mode and kernel mode. In the user mode, processing requests from external user programs, etc., is equivalent to the third ring (Ring 3) in the computer three-ring protection model, which has the lowest authority level. In the kernel mode, execute system kernel component functions, and finally respond to external user program requests through the execution of system kernel functions, etc. This corresponds to the zeroth ring (Ring 0) in the computer's three-ring protection model, which has the highest authority level .

[0017] Through the analysis of the system, an embodiment of the present invention proposes: by hooking the system service description table (SSDT table), in the system kernel mode, intercepting the user program to open the streaming media device (such as a camera or a microphone) Actions to achieve controlled access to streaming media devices in the highest autho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for protecting the privacy of a computer system user. The method comprises the following steps: intercepting a request for a call of a kernel layer program a user program uses for transmitting a control command to the drive of predetermined equipment; identifying whether the call request requests performing an operation of streaming media equipment ornot according to a parameter in the call request; if so, determining whether the operation on the streaming media equipment is limited or not according to a predetermined rule; if so, limiting the operation according to the predetermined rule; and otherwise, allowing the user program to call the kernel layer program for transmitting the control command to the drive of the predetermined equipment.

Description

Technical field [0001] The present invention relates to a method and device for protecting user privacy, in particular to a method and device that can prevent a streaming media device connected to a user's computer system from being illegally activated. Background technique [0002] With the popularity of computers and the development of Internet technology, people increasingly rely on the Internet. [0003] At present, the Internet is not only the main source of pictures and text information, but also a way to communicate using sound or images. For example, in large multinational companies, Internet-based video conferences often solve problems efficiently and quickly. For another example, friends who are thousands of miles away can quickly get closer to each other through voice or video chat. Therefore, today's network terminal devices are generally equipped with external devices such as cameras and microphones for collecting video or audio so that users can communicate via the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/04G06F21/70
Inventor 边陆
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products