key information protection method and system based on an OpenID

A technology of key information and identity information, applied in the direction of digital data protection, etc., can solve the problems of identity information sensitivity, user privacy, life and property safety threats, etc., to ensure availability, reduce the risk of leakage and use, and prevent illegal trajectory information acquisition Effect

Active Publication Date: 2019-05-31
INST OF INFORMATION ENG CAS
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, most of the user's identity information is sensitive, once leaked or obtained ill

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • key information protection method and system based on an OpenID
  • key information protection method and system based on an OpenID
  • key information protection method and system based on an OpenID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.

[0045] Before enumerating the embodiments, the method for protecting key information based on OpenID provided by the present invention is further explained. The present invention refers to the definition of personal information in national standards such as "Personal Information Security Requirements" and "Guide to De-identification of Personal Information", and divides user information maintained by identity service providers into five categories: identifiers, quasi-identifiers, and real-name identity information , Sensitive information and other information. The present invention protects the first four types of information as key user information. According to the four types of key information, the records in the user information database are vertically divid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key information protection method and system based on an OpenID., relating to identity authentication technology, Password technology, DATA DESENSITIZATION TECHNIQUES, the user key information is vertically segmented into identifiers; Quasi-identifier, According to the method, the real-name identity information and the sensitive information are classified into four types,the function key is adopted for protection and decentralized storage, the track information is encrypted, anti-association cutting, encryption, noise adding and other desensitization processing can becarried out on different types of key data, the privacy of a user can be effectively protected, and the risk of leakage of a user information base is greatly reduced.

Description

Technical field [0001] The invention relates to identity authentication technology, cryptographic technology, and data desensitization technology, in particular to a user personal information protection system that flexibly uses multiple technologies such as segmentation, encryption, and k anonymity, and a method for reducing privacy risks of OpenID services. Background technique [0002] OpenID is a decentralized identity authentication protocol framework built on the widely used OAuth protocol. The identity authentication framework proposed in OpenID enables applications in the network (called relying parties) to be based on an identity service provider The authentication service (usually an authorization server) provided by the identity service provider performs an authentication process on the user to verify the identity of the end user, and obtains information about the identity of the end user from the identity service provider, so as to realize the end user Identify. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
Inventor 彭佳李敏高能
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products