Unlock instant, AI-driven research and patent intelligence for your innovation.

A server access method to protect user privacy through proxy access

A proxy service and access method technology, which is applied in the field of server access, can solve problems such as irreparable, personal sensitive information phone, address, ID card cannot be changed, user privacy information leakage, etc., to achieve the effect of avoiding leakage

Active Publication Date: 2022-02-08
BEIJING SHENGXIN NETWORK TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Sensitive personal information provided by users such as phone number, address, ID card, etc. cannot be changed after being leaked, and once leaked, it will be irreparable
[0004] Chinese Patent Authorization Publication No.: CN 105095788 A, which discloses a method, device and system for protecting private data. The invention discloses a method, device and system for protecting private data. Access to user information is obtained when the program is installed, resulting in the leakage of user privacy information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A server access method to protect user privacy through proxy access
  • A server access method to protect user privacy through proxy access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to illustrate the embodiments and technical solutions of the present invention more clearly, the technical solutions of the present invention will be described in more detail below in conjunction with the accompanying drawings and embodiments. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Example. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0045] Case 1: The user Client uses the Internet taxi service provided by the server Service through the proxy service Proxy;

[0046] The user Client uses the taxi service provided by the server Service through the proxy service Proxy; in the taxi service, "departure point longitude", "departure point dimension", "vehicle type", "destination longitude", "destination dimension", "boarding "Time"...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a server access method for protecting user privacy through proxy access. This method accesses the proxy service Proxy through the user Client. The proxy service Proxy obtains the account Account_A from the account pool Accounts, uses the account Account_A to access the server Service, provides the server Service with the information of the account Account_A and the information necessary for the user Client to access the service, and filters the user Client. Personal information to achieve the purpose of protecting the privacy of users.

Description

technical field [0001] The invention relates to the technical field of information services, in particular to a server access method for protecting user privacy through proxy access. Background technique [0002] In recent years, with the rapid development of information technology and the popularization of Internet applications, more and more organizations collect and use a large amount of personal information, which brings convenience to people's life, but also illegal collection, abuse and leakage of personal information And other issues, personal information security is facing serious threats. [0003] Entering the era of big data, when many organizations provide Internet services to users, they force users to provide unnecessary information and personal information, even personal sensitive information, including reading device type, reading contacts, reading call records and requesting The user fills in personal information and personal sensitive information, and if th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/56H04L9/40
CPCH04L63/0421H04L67/56
Inventor 杨更姚锐
Owner BEIJING SHENGXIN NETWORK TECH CO LTD