Method and system for preventing leakage of user privacy through device verification
A user privacy and device certificate technology, applied in the field of identity authentication, can solve problems such as illegal behavior tracking and user privacy leakage, and achieve the effect of solving user privacy leakage and avoiding device certificate leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments shown in the accompanying drawings. It should be understood that these implementations are described only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way.
[0029] to combine figure 2 , an embodiment of the present invention provides a method for preventing device verification from leaking user privacy, including:
[0030] S1: The application layer of the user device calls the system layer interface and requests to obtain the device certificate.
[0031] S2: After receiving the request, the system layer invokes the security layer interface to request to obtain the device certificate.
[0032] User equipment includes application layer, system layer and security layer. Wherein, the application layer is installed with an application program. ...
PUM

Abstract
Description
Claims
Application Information

- Generate Ideas
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com