Apparatus identity processing method, device and apparatus based on privacy protection
A device identity and privacy protection technology, applied in the computer field, can solve the problems of increasing difficulty in collecting terminal device feature attributes, difficult to obtain, and decreased accuracy of device fingerprints
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043]Such asFigure 1A withFigure 1B As shown, the embodiment of this specification provides a method for processing device identity based on privacy protection. The execution subject of the method may be a terminal device, where the terminal device may be a computer device such as a laptop or a desktop computer, or a mobile phone or Mobile terminal devices such as tablets. The terminal device may be provided with a trusted execution environment, the trusted execution environment may be TEE (Trusted Execution Environment), the trusted execution environment may be implemented by a program written in a predetermined programming language (that is, it may be in the form of software Implementation) can also be implemented in the form of software and hardware, and the trusted execution environment can be a safe operating environment for data processing. The method may specifically include the following steps:
[0044]In step S102, it is detected whether the terminal device's device identity ...
Embodiment 2
[0061]Such asimage 3 As shown, the embodiment of this specification provides a method for processing device identity based on privacy protection. The execution subject of the method may be a terminal device, where the terminal device may be a computer device such as a laptop or a desktop computer, or a mobile phone or Mobile terminal devices such as tablets. The terminal device may be provided with a trusted execution environment, the trusted execution environment may be TEE (Trusted Execution Environment), the trusted execution environment may be implemented by a program written in a predetermined programming language (that is, it may be in the form of software Realization), can also be realized in the form of software and hardware, and the trusted execution environment can be a safe operation environment for data processing. The method may specifically include the following steps:
[0062]In step S302, it is detected whether the terminal device's device identity information is includ...
Embodiment 3
[0099]Such asFigure 4A withFigure 4B As shown, the embodiment of this specification provides a privacy protection-based device identity processing method. The execution subject of the method may be a server, and the server may be for a certain business (such as a transaction business or financial business, etc.) or A back-end server that provides access to a certain object, for example, the server can be a server for payment services, or a server for related services such as finance or instant messaging. The corresponding device identity processing system based on privacy protection can be asfigure 2 Shown. The method may specifically include the following steps:
[0100]In step S402, a request for creation of device identity information sent by the terminal device is received. The creation request is sent when the terminal device detects that the trusted execution environment of the terminal device does not contain the device identity information of the terminal device.
[0101]For the s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


