Method and device for protecting user privacy

A user and privacy technology, applied in the protection of internal/peripheral computer components, platform integrity maintenance, etc., can solve problems such as user privacy threats

Active Publication Date: 2013-10-23
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Thus, this malware can pose a serious threat to the user's personal privacy and is hard to detect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting user privacy
  • Method and device for protecting user privacy
  • Method and device for protecting user privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] At present, the operation of computer operating systems widely used by people can be divided into two modes: user mode and kernel mode. In the user mode, requests from external user programs, etc. are processed, which is equivalent to the third ring (Ring3) in the computer three-ring protection model, which has the lowest authority level. In the kernel mode, the function of the system kernel component is executed, and finally responds to the request of the external user program through the execution of the system kernel function, etc., which corresponds to the zeroth ring (Ring0) in the computer three-ring protection model, which has the highest authority level.

[0017] By analyzing the system, it is proposed according to one embodiment of the present invention: by hooking (HOOK) the system service description table (SSDT table), intercepting the user program to open the stream media device (such as a camera or microphone) in the system kernel mode actions, enabling co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for protecting the privacy of a computer system user. The method comprises the following steps: intercepting a request for a call of a kernel layer program a user program uses for transmitting a control command to the drive of predetermined equipment; identifying whether the call request requests performing an operation of streaming media equipment ornot according to a parameter in the call request; if so, determining whether the operation on the streaming media equipment is limited or not according to a predetermined rule; if so, limiting the operation according to the predetermined rule; and otherwise, allowing the user program to call the kernel layer program for transmitting the control command to the drive of the predetermined equipment.

Description

technical field [0001] The present invention relates to a method and a device for protecting user privacy, in particular to a method and a device capable of preventing a streaming media device connected to a user's computer system from being illegally activated. Background technique [0002] With the popularization of computers and the development of Internet technology, people rely more and more on the Internet. [0003] At present, the Internet is not only the main source of pictures and text information, but also a way to communicate using sound or video. For example, in large multinational companies, problems are often solved quickly and efficiently through Internet-based video conferencing. For another example, friends who are thousands of miles away can quickly get closer to each other through voice or video chat. Therefore, today's network terminal devices are generally equipped with external devices such as cameras and microphones for collecting video or audio, so ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/70
Inventor 边陆
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products