Unlock instant, AI-driven research and patent intelligence for your innovation.

Apparatus identity processing method, device and apparatus based on privacy protection

A device identity and privacy protection technology, applied in the computer field, can solve the problems of increasing difficulty in collecting terminal device feature attributes, difficult to obtain, and decreased accuracy of device fingerprints

Pending Publication Date: 2021-01-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as operating system manufacturers strengthen the protection of data privacy, it is difficult to obtain non-resettable device identifications (MAC address, IMEI, Device ID, etc.) more difficult
Since the execution of the device fingerprint generation and the device identification of the terminal device required to generate the device fingerprint is completed in the REE environment, it is easy to be attacked by hackers, by tampering with the device identification of the terminal device and modifying the IP address Or refresh the system parameters of the terminal device, etc., can continuously generate new device fingerprints on the same terminal device, resulting in a decrease in the accuracy of obtaining the device fingerprint of the terminal device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus identity processing method, device and apparatus based on privacy protection
  • Apparatus identity processing method, device and apparatus based on privacy protection
  • Apparatus identity processing method, device and apparatus based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043]Such asFigure 1A withFigure 1B As shown, the embodiment of this specification provides a method for processing device identity based on privacy protection. The execution subject of the method may be a terminal device, where the terminal device may be a computer device such as a laptop or a desktop computer, or a mobile phone or Mobile terminal devices such as tablets. The terminal device may be provided with a trusted execution environment, the trusted execution environment may be TEE (Trusted Execution Environment), the trusted execution environment may be implemented by a program written in a predetermined programming language (that is, it may be in the form of software Implementation) can also be implemented in the form of software and hardware, and the trusted execution environment can be a safe operating environment for data processing. The method may specifically include the following steps:

[0044]In step S102, it is detected whether the terminal device's device identity ...

Embodiment 2

[0061]Such asimage 3 As shown, the embodiment of this specification provides a method for processing device identity based on privacy protection. The execution subject of the method may be a terminal device, where the terminal device may be a computer device such as a laptop or a desktop computer, or a mobile phone or Mobile terminal devices such as tablets. The terminal device may be provided with a trusted execution environment, the trusted execution environment may be TEE (Trusted Execution Environment), the trusted execution environment may be implemented by a program written in a predetermined programming language (that is, it may be in the form of software Realization), can also be realized in the form of software and hardware, and the trusted execution environment can be a safe operation environment for data processing. The method may specifically include the following steps:

[0062]In step S302, it is detected whether the terminal device's device identity information is includ...

Embodiment 3

[0099]Such asFigure 4A withFigure 4B As shown, the embodiment of this specification provides a privacy protection-based device identity processing method. The execution subject of the method may be a server, and the server may be for a certain business (such as a transaction business or financial business, etc.) or A back-end server that provides access to a certain object, for example, the server can be a server for payment services, or a server for related services such as finance or instant messaging. The corresponding device identity processing system based on privacy protection can be asfigure 2 Shown. The method may specifically include the following steps:

[0100]In step S402, a request for creation of device identity information sent by the terminal device is received. The creation request is sent when the terminal device detects that the trusted execution environment of the terminal device does not contain the device identity information of the terminal device.

[0101]For the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an apparatus identity processing method, device and apparatus based on privacy protection, and is applied to a terminal apparatus provided with a trusted execution environment, and the method comprises the steps: detecting whether the trusted execution environment of the terminal apparatus comprises apparatus identity information of the terminal apparatusor not; if the trusted execution environment does not contain the apparatus identity information of the terminal apparatus, sending a creation request of the apparatus identity information of the terminal apparatus to a server, so that the server generates first verification information for the terminal apparatus based on the creation request; when first verification information, sent by the server, of the terminal apparatus is received, acquiring and sending verification information of the terminal apparatus to the server, so that the server verifies the verification information, and generating apparatus identity information for the terminal apparatus after verification is passed; and receiving the apparatus identity information sent by the server, and storing the apparatus identity information in the trusted execution environment.

Description

Technical field[0001]This specification relates to the field of computer technology, and in particular to a method, device and device for processing equipment identity based on privacy protection.Background technique[0002]With the rapid rise of the mobile Internet financial industry, the black industry chain parasitic on it has also reached the point of flooding. Under the lure of huge black production profits, corresponding fraud technologies have also developed rapidly. Some black production industries defraud enterprises of marketing expenses, products, and loans through advertising traffic fraud, false transactions, forged identities, and financial credit fraud.[0003]As the core basic component of the risk control system and various anti-cheating systems, device fingerprints play an important role in combating illegal production. Device fingerprints mainly generate a unique identifier for each terminal device by collecting the characteristic attributes of the terminal device and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/62G06F21/32
CPCG06F21/445G06F21/6245G06F21/32
Inventor 孙宜进辛知
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD