A method for improving information security, terminal equipment and network equipment

A technology of terminal equipment and network equipment, applied in the field of electronic information, can solve the problems of being easily maliciously used and damage the personal privacy of users, and achieve the effect of improving information security, preventing leakage and protecting personal privacy.

Active Publication Date: 2018-04-10
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the user's real identity information is leaked, it is easy to be maliciously used, thus compromising the user's personal privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for improving information security, terminal equipment and network equipment
  • A method for improving information security, terminal equipment and network equipment
  • A method for improving information security, terminal equipment and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] Embodiments of the present invention provide a method for improving information security, such as figure 1 shown, including:

[0041] 101. A terminal device acquires a key, an identification code of the terminal device, and identification information of one or more application programs in the terminal device.

[0042] Among them, the identification information of different application programs in the terminal device is different from each other, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention disclose a method, a terminal device, and a network device, for improving information security and relate to the field of electronic information technologies, which can prevent real identity information of a user from being disclosed, thereby protecting individual privacy of the user. The method of the present invention includes: acquiring, by a terminal device, a key, an identity of the terminal device, and identification information of one or more applications on the terminal device, where identification information of different applications on the terminal device is different from each other, and the identity of the terminal device includes: an international mobile equipment identity IMEI and / or an international mobile subscriber identity IMSI; generating, for identification information of one application by using a preset encryption algorithm according to the identity of the terminal device and the key, an encryption result corresponding to the application; and when the application runs on the terminal device, accessing a network by using the encryption result corresponding to the application. The present invention is applicable to protecting information security of a terminal device accessing a network.

Description

technical field [0001] The invention relates to the technical field of electronic information, in particular to a method for improving information security, terminal equipment and network equipment. Background technique [0002] With the development of network technology, the network services that can be provided by the network are becoming more and more abundant. At present, terminal devices can implement many network services through installed applications, such as currently commonly used third-party applications. When the terminal device accesses the server through the port or directly accesses the server on the network side, the terminal device's IMEI (International Mobile Equipment Identity, International Mobile Equipment Identity) or IMSI (International Mobile Subscriber Identity, International Mobile Subscriber Identity) and other identification codes are reported as the user's Identification, so that the terminal device can stably use the interface between each appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04W12/02H04W12/06H04L63/0407H04L63/0876H04W12/71H04W12/72G06F21/44H04L9/3236H04L9/3242H04L63/04H04L63/06H04L63/08H04L63/0823H04W12/04H04W12/08
Inventor 翟征德
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products