Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A web user privacy protection system and method based on information flow tags

A technology for user privacy and system protection, applied in the field of Internet security, it can solve problems such as poor performance and compatibility, insufficient Web application prevention support, privacy leakage, etc., to improve prevention, ensure compatibility and integrity, and ensure security. Effect

Active Publication Date: 2019-11-22
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] On the one hand, the fine-grained method runs at the object level and effectively supports the prevention of Web applications that import third-party code libraries. However, due to the need for extensive modifications to the current JavaScript engine, its performance and compatibility are poor
On the other hand, because the coarse-grained method does not provide an effective mechanism for restricting dangerous declassification privileges, it may cause privacy leaks, and the defense support for Web applications that import third-party code libraries is not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A web user privacy protection system and method based on information flow tags
  • A web user privacy protection system and method based on information flow tags
  • A web user privacy protection system and method based on information flow tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0052] Such as figure 1 As shown, adopting the technical solution of the present invention to prevent browser extension application cloud notes from stealing user passwords includes the following steps:

[0053] In this example, the components are represented by rectangles, the communication operations are represented by arrows, the execution sequence of events is numbered sequentially, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Web user privacy protection system and method based on an information stream tag, and belongs to the field of Internet safety. The system comprises a tag adding module and a tag detection module, wherein a novel access control tag model applied to a Web environment is designed in the tag adding module for adding a tag to a message transmitted between a Web component and a Web component; when the Web component comprises a third-party code, a light-weight process is designed for isolating a third-party dangerous code; meanwhile, the tag is aimed to design a message transferring rule to track a user privacy information message so as to track the user privacy information message. The invention also realizes the Web user privacy protection method based on the information stream tag. The technical scheme disclosed by the invention is suitable for Web applications of which the safety level needs to be improved, wherein the Web applications have sensitive user information. The Web application can be free from a situation that the third-party code is damaged, and the privacy information of the user can be protected.

Description

technical field [0001] The invention belongs to the field of Internet security, and more specifically relates to a privacy protection system and method for Web users based on information flow tags. Background technique [0002] In order to provide users with rich services, including map navigation, online payment, etc., current web applications integrate a large number of third-party codes. But because these services often require access to users' private information, developers and users must fully trust them not to leak private information. Many recent studies have shown that these third-party codes can cause a series of serious hazards, such as tracking user browsing records, obtaining user form input data, stealing cookies and private data, and even hijacking session information to forge user requests. [0003] Today's browsers rely on Same Origin Policy (SOP), Cross-Origin Resource Sharing (CORS), Content Security Policy (CSP) and other security mechanisms to prevent t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F16/958G06F16/955H04L29/06H04L29/08
CPCG06F16/955G06F16/958G06F21/6245H04L63/10H04L63/20H04L67/02
Inventor 金海羌卫中郭佳祯邹德清
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products