Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy leakage protection method based on data traceability

A technology for data traceability and privacy leakage. It is used in digital data protection, electronic digital data processing, and special data processing applications. It can solve the problems of complex threats and scattered terminals, and achieve the effect of protecting privacy.

Active Publication Date: 2020-01-17
NORTHWEST UNIV(CN)
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the Internet of Things faces more and more complex threats due to its constantly emerging new features, and the terminals are more scattered. The low-level terminal logs cannot form a complete explanation of the attack behavior in this environment, so we very much It is necessary to think about a suitable method to solve the security risks existing in the smart home environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy leakage protection method based on data traceability
  • Privacy leakage protection method based on data traceability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention is further described below in conjunction with accompanying drawing.

[0023] Such as figure 1 , 2 As shown, a privacy leakage protection method based on data traceability, taking the smart home platform as an example, includes the log fusion generated by the operation of smart home appliances (such as smart speakers, automatic curtains, smart lights, etc.) and the control command detection of the cloud center. It is characterized in that it conducts static taint analysis on the control instructions of the cloud center, uses data traceability technology to find the corresponding logical relationship at the code level for all events that occur in the user's room, and integrates the logs of scattered smart home appliances to obtain a complete centralized system. Logging system (a collection of causal chains of events); includes the following steps:

[0024] Step 1. Use static taint analysis technology to analyze all the control instructions about a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy leakage protection method based on data traceability. A smart home platform is taken as an example. The method comprises log fusion generated by operation of intelligent household appliances (such as an intelligent sound box, an automatic curtain and an intelligent electric lamp) and control instruction detection of a cloud center. The method is characterized by comprising: performing static stain analysis on the control instruction of the cloud center; searching a data leakage condition (such as a password manually input by a user) possibly generated at a code level; secondly, searching a corresponding logic relationship for all events occurring in a user room at a code level by using a data traceability technology; integrating the scattered intelligent household appliance logs according to the causal relationship of the event; obtaining a complete centralized log system (a causal chain set of event occurrence) under the platform, then using the log system for judging behaviors already occurring in a user room, determining whether the behaviors are normal behaviors or not, and therefore a user can be informed of the abnormal behaviors, and the user is assisted in effectively protecting the privacy safety of the user.

Description

technical field [0001] The invention belongs to the field of smart home security, relates to smart home equipment, and in particular to a security system for effectively protecting privacy data of smart home platform users based on a privacy leakage protection method based on data traceability. Background technique [0002] Smart home is one of the more popular Internet of Things platforms at present. As the Internet of Things and human life become closer and closer, more and more smart home devices (such as smart refrigerators, smart cameras, smart thermostats, etc.) enter the family. Although these smart devices provide people with great convenience, we cannot turn a blind eye to their potential safety hazards. The development of smart home products in my country is still in its infancy, and the technical level is relatively low. Moreover, most of the smart product manufacturers are start-up companies with relatively small funds and limited investment in solving security v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/18G06F9/30
CPCG06F21/6263G06F16/1815G06F9/30145Y02P90/02
Inventor 王海冯通任哲秦晨光张泽仑高岭郑杰
Owner NORTHWEST UNIV(CN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products