Privacy protection method and privacy protection device

A privacy protection and privacy technology, applied in the field of information security, can solve problems such as harassment, but cannot completely solve user harassment, and achieve the effect of avoiding harassment

Active Publication Date: 2015-10-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] If the first mobile phone number is obtained by a bad person, the bad person can still harass the user by phone within the validity period. The above method can only realize the privacy protection of the second mobile phone number, but cannot completely solve the problem that the user is harassed by malicious calls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and privacy protection device
  • Privacy protection method and privacy protection device
  • Privacy protection method and privacy protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0058] Glossary:

[0059] Communication application: an application for providing at least one communication service such as voice communication, text voice communication, video voice communication, and picture communication.

[0060]Target account: The account registered in the communication application, which has the function of generating a private account for an ordinary user account. When the communication application is WeChat produced by China’s Tencent, the target account can be a public account. The public account is an application account applied for by the operator of the public account on the server of the communication platform, and is usually used to provide a certain service. Official account operators are institutions ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a privacy protection method and a privacy protection device, and belongs to the information safety field. The method comprises the steps of receiving a private account generation request; generating a private account according to the private account generation request; receiving a communication request of a service party account of requiring to communicate with the private account; detecting whether the identity type of the service party account accords with a use scene; if the identity type of the service party account accords with the use scene, forwarding the communication request to the private account. According to the present invention, by generating the private account of a user, when the communication request of the service party account is received, and if the identity of the service party account accords with the use scene preset by the user, the communication request is forwarded to the private account, and the communication requests which are sent by the service party account and do not accord with the use scene preset by the user are filtered, thereby solving the problem that users are harassed by the malicious calls and that can not be completely solved by the prior art, and realizing the effect of preventing the users from being harassed by the malicious calls that do not accord with the use scene.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a privacy protection method and device. Background technique [0002] When users use services such as online shopping and looking for intermediaries on the Internet, they often need to input their mobile phone number into the contact method column provided by the Internet, so that the service provider can contact the user through the mobile phone number entered by the user. However, because user information on the Internet is easy to leak, the user's mobile phone number is easy to be obtained by unscrupulous people, causing the user to be harassed by malicious calls. [0003] In the prior art, some Internet companies assign the temporary use right of the first mobile phone number existing in the Internet company to users through APP (Application, application program). That is to say, the user has the right to use the first mobile phone number within the valid period, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/0876
Inventor 刘宽张东蕊陈荣李德春田伟崔鹏飞侯鑫
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products