Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Personal information protection system and method

An information protection and information binding technology, applied in the field of information security, can solve the problem of illegally obtaining user network identity information, and achieve the effect of reducing operation steps

Pending Publication Date: 2021-08-31
GUANGDONG UNIV OF TECH
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hackers can illegally obtain a large amount of user network identity information by trying to log in with leaked identity information or common passwords. This is the so-called "credential stuffing" attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal information protection system and method
  • Personal information protection system and method
  • Personal information protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Users use the system of the present invention (extended based on the existing Easy Login system, which may also be referred to as the Easy Login System hereinafter, and the information binding and login modules are also expanded from the existing Easy Login App, which may also be referred to as Login below. Easy App) when registering an account on all websites or application servers and application devices, the user's personal information data, except for the account number and password generated by registration, will no longer be handed over to the website or application server for storage and processing, but will be kept In this system (the account password is encrypted and stored on the personal terminal of the system, that is, in the information binding and login module), the server of the website or application can request the user to authorize through the system when necessary, and then from Obtain the required information on the personal terminal of the system, or...

Embodiment 2

[0056] The following is an example of a specific application:

[0057] Step 1. The webpage of the third-party application website Wislab displays a button "Certify whether you are a student of Guanggong". After the user clicks, the server of the Wislab website constructs an authentication request and sends the authentication request to the Easy Login App.

[0058]Step 2. Log in to Easy App (information binding and login module) to display 3 options: "Authorization", "Rejection", and "Rejection and Complaint".

[0059] Step 3. If the user chooses "Authorization", send the authentication request to the student identity authentication server provided by the Academic Affairs Office of Guanggong University, obtain the authentication result, record it in the log, and stop. After receiving the authentication result from the third-party application website Wislab website, follow-up corresponding processing.

[0060] Step 4. If the user chooses "reject", the rejection result is fed bac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a personal information protection system and method. The system comprises an information binding and logging-in module, an obtaining module, a returning module, and a scheduling module; the information binding and logging-in module is used for interacting with a user, and obtaining input information including authorization of the user or binding information; the acquisition module is used for acquiring request information of an external application; the scheduling module is used for calling a corresponding authentication service to perform user identity authentication after obtaining user authorization according to the request information and the input information or the binding information of an external application; and the return module is used for transmitting a user identity authentication result to the external application. By adopting the technical scheme of the invention, the security and convenience of network identity authentication are improved, and meanwhile, the personal information is well protected, so that the information leakage risk caused by collection or repeated collection of the personal information of the user is avoided.

Description

technical field [0001] The present invention belongs to the technical field of information security, and in particular relates to a personal information protection system and method, more specifically, a method for personal information protection and cross-platform and cross-device application identity authentication in cooperation with all other third-party authentication services and device. Background technique [0002] Nowadays, a single user needs to face the scenario of registering online identities on multiple websites and managing multiple online identities at the same time. As a result, they may suffer from a series of serious network security threats such as password fatigue, phishing scams, credential stuffing attacks, and personal information leakage. threaten. [0003] For example, a user has registered network identities on multiple websites. In order to improve security, different user names and passwords need to be set for different network identities. For ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/46
CPCG06F21/31G06F21/46
Inventor 刘文印林胤王凯戚宗城凡帅
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products