Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for protecting private information input by users

A technology for private information and encrypted information, which is applied in the field of information security and can solve problems such as the inability to guarantee the security of private information

Active Publication Date: 2017-03-29
北京思特奇信息技术股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a method for protecting the private information input by the user in view of the deficiency that the prior art cannot guarantee the security of the private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for protecting private information input by users
  • A method and system for protecting private information input by users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0038] Such as figure 1 As shown, it is a method for protecting the private information input by the user according to the present invention, which specifically includes the following steps:

[0039] Step 1: the user interaction module receives multiple private information call instructions input by multiple users, and records all user IDs;

[0040] Step 2: The third-party application module sends the plurality of private information calling instructions and the corresponding user IDs to the intermediate module one by one;

[0041] Step 3: The intermediate module judges whether a user ID matches the authorization ID stored in the database, if yes, execute step 4; otherwise, return a warning message to the user inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system for protecting private information input by a user. The method comprises the following steps: 1, receiving a plurality of private information call instructions, and recording user IDs; 2, transmitting the private information call instructions and the corresponding user IDs to an intermediate module; 3, judging whether one user ID is matched with an authority ID or not, if so, carrying out a step 4; otherwise, carrying out a step 8; 4, transmitting the private information call instructions to a cloud service module, returning encrypted information and a random number, and transmitting a decryption password and the random number to a third party application module at the same time; 5, directly transmitting the encryption information and the random number to a user interaction module; 6, transmitting the random number to the third party application module to obtain a decryption password; 7, decrypting to obtain requested information; 8, judging whether a non-judged user ID exists or not, if so, carrying out the step 3, otherwise, ending. By adopting the method and the system, private information protection is realized.

Description

technical field [0001] The invention relates to a method and system for protecting private information input by users, belonging to the field of information security. Background technique [0002] Along with the vigorous development of mobile operating systems such as iOS, android, and windows phone, the number of users using smart phones has also increased significantly, and has shown a tendency to replace non-smart phones. [0003] A smart phone has an open operating system, and one of its characteristics is to support users to install and uninstall application software (hereinafter referred to as App for short). [0004] With the rapid popularization of 3G networks and the gradual promotion of a more powerful network in the future - 4G networks, cloud services are no longer far away from us and are entering our daily lives. So, how do these cloud services provide services? At present, the mainstream method is to provide an interface to the outside world. There are two ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62H04L29/08
CPCG06F21/6209
Inventor 吕麟
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products