Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection method based on incarnations

A privacy protection and avatar technology, applied in the field of Internet communication, can solve problems such as user security risks and user privacy leakage, and achieve the effect of avoiding damage and protecting private information.

Active Publication Date: 2013-03-06
TSINGHUA UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some applications and Internet services require users to provide some personal data, or the application obtains the user's personal data by itself. In this way, it may cause the application to obtain some unnecessary user privacy information, thereby causing unnecessary user The leakage of privacy brings security risks to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method based on incarnations
  • Privacy protection method based on incarnations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0019] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy protection method based on incarnations, comprising the following steps of: establishing at least one incarnation on an Internet terminal and configuring privacy information for each incarnation; selecting one of the incarnations to provide necessary privacy information for an Internet application according to the privacy protection demand of a user during the useof the Internet application, and exchanging different incarnations according to the demand by the Internet terminal; isolating different incarnations in the Internet terminal to ensure that the different incarnations have different state data; and judging whether the different incarnations are related according to the different state data and the privacy information of corresponding incarnations,and making relative processing. With the method, unnecessary privacy information leakage can be avoided. Meanwhile, through selecting different incarnations according to the application demands, the user can further protect the privacy information which has to be provided.

Description

technical field [0001] The invention relates to the technical field of Internet communication, in particular to an avatar-based privacy protection method. Background technique [0002] Internet services and applications in mobile smart devices usually need to obtain users' personal data in order to provide users with personalized services. However, some applications and Internet services require users to provide some personal data, or the application obtains the user's personal data by itself. In this way, it may cause the application to obtain some unnecessary user privacy information, thereby causing unnecessary user The disclosure of privacy brings security risks to users. [0003] Therefore, in order to better protect the user's own interests, the user also hopes to control his own private information according to different application scenarios for those private information that must be provided in order to obtain corresponding services. For example, at work, the priv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/60
Inventor 闫家年郑纬民陈文光
Owner TSINGHUA UNIV