Method and system for preventing leakage of user privacy through device verification

A user privacy and device certificate technology, applied in the field of identity authentication, can solve problems such as illegal behavior tracking and user privacy leakage, and achieve the effect of solving user privacy leakage and avoiding device certificate leakage

Pending Publication Date: 2021-11-26
北京国民安盾科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and system for preventing device verification from leaking user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing leakage of user privacy through device verification
  • Method and system for preventing leakage of user privacy through device verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments shown in the accompanying drawings. It should be understood that these implementations are described only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way.

[0029] to combine figure 2 , an embodiment of the present invention provides a method for preventing device verification from leaking user privacy, including:

[0030] S1: The application layer of the user device calls the system layer interface and requests to obtain the device certificate.

[0031] S2: After receiving the request, the system layer invokes the security layer interface to request to obtain the device certificate.

[0032] User equipment includes application layer, system layer and security layer. Wherein, the application layer is installed with an application program. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for preventing leakage of user privacy through device verification. The method comprises the following steps that a system layer of a user device acquires a device certificate and the data signed by a first private key corresponding to the device certificate from a security layer; the data signed by the first private key and the device certificate are verified; after the verification passes, the system layer applies for an alternative certificate from a third-party device certificate server, uses the alternative certificate to replace the device certificate, uses a second private key corresponding to the alternative certificate to sign the data, and returns the signed data to an application layer of the user device; and the application layer of the user device transmits the data of the alternative certificate and the second private key signature to an application server so as to verify the data of the alternative certificate and the second private key signature. According to the method and the system, the problems of user privacy leakage, tracking and the like in the device verification process can be effectively solved.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a method and system for preventing device authentication from leaking user privacy. Background technique [0002] For current user-level devices (mobile phones, PCs, smart hardware, cars), in order to ensure the identity of the device when interacting with services, a certificate identifying the identity of the device is usually preset on the production line, and the issuer is the manufacturer. However, while ensuring the credibility of the device, there is also the risk of user information leakage. Since the device certificate has a unique attribute that identifies the identity of the device, it can be used to track users or associate the same user's operations on different Internet services, resulting in the leakage of user privacy information, which poses a major security risk. [0003] In view of this, the present invention is proposed. Contents of the inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/62G06F21/64
CPCG06F21/44G06F21/6245G06F21/64
Inventor 张超李俊胡永亮赵一方左勇勇
Owner 北京国民安盾科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products