Method and system for preventing leakage of user privacy through device verification
A user privacy and device certificate technology, applied in the field of identity authentication, can solve problems such as illegal behavior tracking and user privacy leakage, and achieve the effect of solving user privacy leakage and avoiding device certificate leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments shown in the accompanying drawings. It should be understood that these implementations are described only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way.
[0029] to combine figure 2 , an embodiment of the present invention provides a method for preventing device verification from leaking user privacy, including:
[0030] S1: The application layer of the user device calls the system layer interface and requests to obtain the device certificate.
[0031] S2: After receiving the request, the system layer invokes the security layer interface to request to obtain the device certificate.
[0032] User equipment includes application layer, system layer and security layer. Wherein, the application layer is installed with an application program. ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap