CN109451043B - Server access method for protecting user privacy through proxy access - Google Patents

Server access method for protecting user privacy through proxy access Download PDF

Info

Publication number
CN109451043B
CN109451043B CN201811513193.5A CN201811513193A CN109451043B CN 109451043 B CN109451043 B CN 109451043B CN 201811513193 A CN201811513193 A CN 201811513193A CN 109451043 B CN109451043 B CN 109451043B
Authority
CN
China
Prior art keywords
proxy
information
service
account
personal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811513193.5A
Other languages
Chinese (zh)
Other versions
CN109451043A (en
Inventor
杨更
姚锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING SHENGXIN NETWORK TECHNOLOGY Co.,Ltd.
Original Assignee
Beijing Shengxin Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shengxin Network Technology Co ltd filed Critical Beijing Shengxin Network Technology Co ltd
Priority to CN201811513193.5A priority Critical patent/CN109451043B/en
Publication of CN109451043A publication Critical patent/CN109451043A/en
Application granted granted Critical
Publication of CN109451043B publication Critical patent/CN109451043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer

Abstract

The invention discloses a server access method for protecting user privacy through proxy access. The method comprises the steps that a Proxy Service Proxy is accessed by a user Client, the Proxy Service Proxy acquires an Account Account _ A from an Account pool Account, the Account Account _ A is used for accessing a server Service, information of the Account Account _ A and necessary information of the access Service of the user Client are provided for the server Service, and personal information of the user Client is filtered, so that the purpose of protecting personal privacy of a user is achieved.

Description

Server access method for protecting user privacy through proxy access
Technical Field
The invention relates to the technical field of information service, in particular to a server access method for protecting user privacy through proxy access.
Background
In recent years, with the rapid development of information technology and the popularization of internet application, more and more organizations collect and use a large amount of personal information, bring convenience to the life of people, and simultaneously have the problems of illegal collection, abuse, leakage and the like of the personal information, so that the personal information security faces serious threats.
When entering the big data era, when a plurality of organizations provide internet services for users, the users are forced to provide unnecessary information and personal information, even personal sensitive information, including reading the device types through clients, reading contacts, reading call records and requiring the users to fill in the personal information and the personal sensitive information, and if the users do not provide the information, the services cannot be used. The goal is often to increase enterprise revenue with more user data, a process that often violates user privacy. By acquiring unnecessary user information, the service provider can discriminate the price of the user and charge the user a higher service fee than other users for the same service; product promotion can be carried out by utilizing the user contact persons; the user information can be resold to obtain economic benefits. Personal sensitive information provided by a user, such as a telephone, an address, an identity card and the like, cannot be changed after leakage, and once leakage occurs, the personal sensitive information cannot be compensated.
Chinese patent grant publication No.: the invention discloses a method, a device and a system for protecting private data, relates to the technical field of communication, and mainly aims to solve the problem that the private information of a user is leaked due to the fact that the access right of the user information is acquired when an application program is installed. The main technical scheme of the invention comprises the following steps: acquiring pseudo privacy data of the first application program from the server based on the preset attribute information, wherein the pseudo privacy data is initialization data of the first application program; modifying a storage path of real privacy data corresponding to the first application program, and storing the pseudo privacy data under an original storage path of the real privacy data; configuring the access authority of a second application program to the first application program; the pseudo-privacy data is sent to the second application when the second application accesses the first application. The invention may not solve the problem of the server requiring the user to fill in personal sensitive information.
Disclosure of Invention
The invention discloses a server access method for protecting user privacy through proxy access, aiming at protecting user personal information, particularly personal sensitive information, from being acquired by a server.
To achieve the above object, the present invention provides a server access method for protecting user privacy through Proxy access, characterized in that a user Client uses a Service provided by a server Service through a Proxy Service Proxy:
the user Client registers on the Proxy service Proxy;
the Proxy Service Proxy registers Accounts of a plurality of servers Service and collects the Accounts into an account pool Accounts;
when the Client initiates a Service request of the server to the Proxy Service Proxy, the Proxy Service Proxy initiates the Service request to the server Service by using the Account Account _ A selected from the Account pool Account.
Preferably, the Proxy service Proxy maintains a service request information table, a personal information list and a personal sensitive information list:
the service request information table can record an information list collected by the server to the user side when a certain service is used, and which information is necessary for the service;
the personal information list records whether the information content in the service request information table is personal information;
personal information is electronically or otherwise recorded, and can identify various information of the identity of a specific natural person or the activity condition of the specific natural person alone or in combination with other information; the personal information comprises name, birth date, identification card number, personal biological identification information, address, communication contact mode, communication record and content, account number and password, property information, credit investigation information, track, accommodation information, health physiological information, transaction information and the like;
the personal sensitive information list can record whether the information content in the service request information table is personal sensitive information or not;
personal sensitive information is personal information which can possibly harm personal and property safety, easily cause personal reputation, physical and mental health damage or discriminative treatment and the like once illegal provision or abuse is disclosed; the personal sensitive information comprises identification card numbers, personal biological identification information, bank account numbers, communication records, content property information, credit investigation information, track, accommodation information, health and physiological information, transaction information, personal information of children under 14 years old (including) and the like.
Preferably, in the process of accessing the server Service, the Proxy Service Proxy can adopt different processing modes for different types of information collected by the server:
if the information belongs to the information necessary for the service, the Proxy service Proxy acquires the information from the user Client;
if the information does not belong to the information necessary for the service, the Proxy service Proxy can not acquire the user Client;
if the information belongs to personal sensitive information, the Proxy service Proxy uses the data of the Account Account _ A to replace the data of the user Client;
if the information belongs to personal information, the Proxy service Proxy can suggest that the user Client uses the data of the Account Account _ A to replace the data of the user Client;
if the information does not belong to the personal sensitive information and the personal information, the Proxy Service Proxy transfers the data of the Client to the server Service;
according to the processing mode, the information processing mode of the Proxy service Proxy is divided into four types:
protection: for the information necessary for using the service and belonging to the personal sensitive information or the data of the personal information, the data of Account _ A is used for replacing the data of the Client of the user;
rejection: for the information which is not necessary for using the service and belongs to the personal sensitive information or the data of the personal information, the submission of Account _ A is directly used;
transferring: aiming at information necessary for using the service and not belonging to personal sensitive information or data of the personal information, the user is willing to transmit the actual information of the user Client to the server;
and (3) random: the data is generated by the Proxy service Proxy itself for information not necessary for using the service.
Preferably, the Proxy service Proxy can select a suitable Account _ B from the Account pool Accounts according to the requirements of the user Client, so as to protect the benefits of the user Client.
Preferably, the Client uses the Service provided by the server Service through the Proxy Service Proxy, and the server access is realized through the following steps:
step 1, a user Client initiates a Proxy access Request _ Proxy to a Proxy service Proxy;
step 2, the Proxy service Proxy inquires a service request information table, checks an information list collected by the server to the user side, and checks whether the information is personal information or personal sensitive information; selecting an Account Account _ A from an Account pool Account; after the query is completed, returning a Proxy access reply _ Proxy to the user Client, wherein the content comprises an Account Account _ A, an information list required by using the service, and whether each item of information is necessary or not, and whether the information is personal information or personal sensitive information;
step 3, the user Client determines which information needs to use the information of Account _ A and which information uses the information of the user Client according to the information of the Proxy access reply Response _ Proxy in the step 2 and whether the data belongs to personal information and personal sensitive information, and forms a service Request _ Client by using the information needing to be protected and transmitted as parameters, and sends the service Request _ Client to the Proxy service Proxy;
step 4, after the Proxy Service Proxy receives the Service Request _ Client, a binding relationship is established between the information Info _ protected to be protected in the Request _ Client and the corresponding protection information Info _ protecting of the Account Account _ A, the information to be transmitted in the Request _ Client, the data of the Account _ A and the data generated by the Proxy Service Proxy are used as parameters to initiate a Service Request _ Proxy to the server Service, and the Service Request _ Proxy does not contain the personal sensitive information of the user Client;
step 5, the server Service returns a Service Response _ Proxy to the Proxy Service Proxy according to the Service Request _ Proxy, and the Proxy Service Proxy generates a Response _ Client according to the parameters in the Response _ Proxy and the binding relationship in the step 4 and returns the Response _ Client to the user Client;
step 6, repeating the steps 3, 4 and 5 according to the service continuous condition;
and 7, the user Client sends a Request _ end for stopping Proxy Service to the Proxy Service Proxy, and the Proxy Service Proxy stops Proxy access of the user Client to the server Service through the Account Account _ A when receiving the Request _ end.
Preferably, after the step 7, a step 8 is further performed, in which the user Client sends a restart Proxy service Request _ restart to the Proxy service Proxy, and continues to use the Account _ a to the Proxy service Request, and then performs the steps 3, 4, 5, 6, and 7, and continues the terminated Proxy access.
Preferably, when the Proxy access needs to provide the telephone number, the Proxy Service Proxy binds the telephone in the Account Account _ A with the telephone of the user Client for call transfer and short message transfer, and provides the server Service with the telephone number in the Account Account _ A; the telephone number in the server Service calling Account Account _ A is transferred to the telephone of the user Client, and the telephone number sent by the server Service to the Account Account _ A is transferred to the user Client.
Preferably, when payment is needed in the Proxy access process, the Proxy service Proxy can protect the privacy information of the user Client in a Proxy payment mode; after obtaining the amount of money to be paid to the server Service, the Proxy Service Proxy initiates collection of money to the Client of the user, and pays the corresponding amount of money to the server Service through the Account Account _ A after obtaining the payment.
Compared with the prior art, the invention has the beneficial effects that:
by using the account pool and the proxy access mode, personal information, particularly personal privacy information of the user Client is protected, misuse of the user information and information leakage events are avoided, and the user can know and control the data to be sent to the server; the server Service can only obtain the information necessary for the Service, and can not obtain the additional personal privacy information of the Client, even if the server Service fails to cause information leakage, the personal information of the Client can not be leaked; the method can enable the user to take the initiative in the personal information protection, and even if the server still asks for the personal sensitive information, the user can also actively manage the information content submitted to the server, thereby avoiding the leakage of the personal information and the personal sensitive information.
By using an account pool and a proxy access mode, the invention can achieve the data separation effect, the foreground anonymity and the background real name effect; the user Client registers on the Proxy Service Proxy, the Proxy Service Proxy only masters the personal information of the user Client, the server Service does not master the personal information of the user Client and only masters the specific information of the Service used by the user Client, and the Proxy Service Proxy and the server Service cannot provide a complete behavior track of the user Client; in normal use, the user Client is anonymous to the server Service, but the supervising authority can indirectly find the user Client through the Proxy Service Proxy.
Fig. 1 is a schematic diagram illustrating a server access implementation process for protecting user privacy through proxy access according to an embodiment of the present invention.
Fig. 2 shows different information processing methods in the embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the embodiments and technical solutions of the present invention, the technical solutions of the present invention will be described in more detail with reference to the accompanying drawings and embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without inventive step, are within the scope of the present invention.
Case 1: the user Client uses the Internet taxi taking Service provided by the server Service through the Proxy Service Proxy;
the user Client uses the taxi taking Service provided by the server Service through the Proxy Service Proxy; in the taxi taking service, "departure point longitude", "departure point latitude", "vehicle type", "destination longitude", "destination latitude", "boarding time", and "telephone" are information required for the taxi taking service, and "telephone", "identification card", and "gender" belong to personal sensitive information.
Before using the service, the following needs to be done:
the user Client registers on the Proxy service Proxy;
the Proxy Service Proxy registers Accounts of a plurality of servers Service and collects the Accounts into an account pool Accounts.
The account of the server Service registered by the Proxy Service Proxy may be from the account of the server Service registered by other clients.
As shown in fig. 1, the user Client uses the Service provided by the server Service through the Proxy Service Proxy, and the server access is realized through the following steps:
step 101, a user Client initiates a Proxy access Request _ Proxy to a Proxy service Proxy.
102, the Proxy service Proxy queries a service request information table, checks an information list collected by the server to the user terminal, and checks whether the information is personal information or personal sensitive information; selecting an Account Account _ A from an Account pool Account; after the query is completed, returning a Proxy access reply Response _ Proxy to the user Client, wherein the content comprises the Account Account _ A, an information list required by using the service, and whether each item of information is necessary, personal information or personal sensitive information.
The Proxy service Proxy can inquire the service request information table, and retrieve the information which the server can request in the taxi taking service, wherein the information comprises departure point longitude, departure point latitude, vehicle type, destination longitude, destination latitude, getting-on time, telephone and the like, and whether the information is needed by the service, belongs to personal information or not, and belongs to personal sensitive information or not.
As shown in fig. 2, the Proxy service Proxy will take different measures depending on whether the information is service-necessary and whether it is personal sensitive:
if the information belongs to the information necessary for the service, the Proxy service Proxy acquires the information from the user Client;
if the information does not belong to the information necessary for the service, the Proxy service Proxy can not acquire the user Client;
if the information belongs to personal sensitive information, the Proxy service Proxy uses the data of the Account Account _ A to replace the data of the user Client;
if the information belongs to personal information, the Proxy service Proxy can suggest that the user Client uses the data of the Account Account _ A to replace the data of the user Client;
if the information does not belong to the personal sensitive information and the personal information, the Proxy Service Proxy transfers the data of the user Client to the server Service.
According to the processing mode, the information processing mode of the Proxy service Proxy is divided into four types:
protection: for the information necessary for using the service and belonging to the personal sensitive information or the data of the personal information, the data of Account _ A is used for replacing the data of the Client of the user;
rejection: for the information which is not necessary for using the service and belongs to the personal sensitive information or the data of the personal information, the submission of Account _ A is directly used;
transferring: aiming at information necessary for using the service and not belonging to personal sensitive information or data of the personal information, the user is willing to transmit the actual information of the user Client to the server;
and (3) random: the data is generated by the Proxy service Proxy itself for information not necessary for using the service.
The personal information list records whether the information content in the service request information table is personal information.
Personal information is electronically or otherwise recorded, and can identify various information of the identity of a specific natural person or the activity condition of the specific natural person alone or in combination with other information; the personal information comprises name, birth date, identification card number, personal biological identification information, address, communication contact way, communication record and content, account number and password, property information, credit investigation information, track, accommodation information, health physiological information, transaction information and the like.
The personal sensitive information list records whether the information content in the service solicitation information table is personal sensitive information.
Personal sensitive information is personal information which can possibly harm personal and property safety, easily cause personal reputation, physical and mental health damage or discriminative treatment and the like once illegal provision or abuse is disclosed; the personal sensitive information comprises identification card numbers, personal biological identification information, bank account numbers, communication records, content property information, credit investigation information, track, accommodation information, health and physiological information, transaction information, personal information of children under 14 years old (including) and the like.
Wherein, Proxy service Proxy will retrieve the free Account Account _ A from Account pool Account.
After the query is completed, the Proxy service Proxy returns a Proxy access reply _ Proxy to the user Client, wherein the content comprises an Account Account _ A, an information list required by using the service, and whether each item of information is necessary, personal information or personal sensitive information.
Preferably, the Proxy service Proxy screens the account from the account pool Accounts according to the request of the user Client, and provides a proper account for the user Client to prevent the user Client from encountering price discrimination or introducing other disputes; if the account with the mobile phone model of 'android phone' is provided to avoid the problem that more travel fees are collected by the apple phone user, and the account with the gender of 'male' is selected to avoid the problem that the user is disturbed by the gender in the late night.
Step 103, the user Client determines which information needs to use the information of Account _ a and which information uses the information of the user Client according to whether the data belongs to personal information and personal sensitive information according to the information of Proxy access reply Response _ Proxy in step 2, and forms a service Request _ Client by using the information needing to be protected and transmitted as a parameter, and sends the service Request _ Client to the Proxy service Proxy.
The user Client initiates a Request _ Client to the Proxy service Proxy, wherein the Request _ Client comprises information Info _ recessary needing to be transmitted and information Info _ protectd needing to be protected, the information Info _ recessary needing to be transmitted comprises 'departure point longitude', 'departure point latitude', 'vehicle type', 'destination longitude', 'destination latitude', 'getting-on time' and the like, and the information Info _ protectd needing to be protected comprises 'telephone' Tel _ Client in the user Client.
Step 104, after receiving the Service Request _ Client, the Proxy Service Proxy establishes a binding relationship between the information Info _ protected to be protected in the Request _ Client and the corresponding protection information Info _ protecting of the Account _ a, and initiates a Service Request _ Proxy to the server Service by using the information to be transmitted in the Request _ Client, the information of the Account _ a and the information generated by the Proxy Service Proxy as parameters, wherein the Service Request _ Proxy does not contain the personal sensitive information of the user Client.
The Proxy Service Proxy establishes a binding relationship between the "telephone" Tel _ Proxy in the Account _ a and the "telephone" Tel _ Client in the information Info _ protected that the user Client needs to protect in step 103, so that the server Service is switched to the "telephone" Tel _ Client of the user Client when calling the "telephone" Tel _ Proxy in the Account _ a, and the server Service forwards the information to the "telephone" Tel _ Proxy in the Account _ a.
The Proxy Service Proxy initiates a Service Request _ Proxy to the server Service by taking the information Info _ news needed to be transmitted provided by the user Client, the protection information Info _ protection provided by the Account _ a, the information refused to be provided and obtained from the Account _ a and the random information generated by the Proxy Service Proxy as parameters.
And 105, the server Service returns a Service Response _ Proxy to the Proxy Service Proxy according to the Service Request _ Proxy, and the Proxy Service Proxy generates a Response _ Client according to the parameters in the Response _ Proxy and the binding relationship in the step 4 and returns the Response _ Client to the user Client.
And step 106, repeating the steps 3, 4 and 5 according to the service condition.
Wherein, according to different service conditions, the service can be completed instantly within milliseconds, and can also be continued for hours or even days; in the taxi taking service, the service starts from the inquiry of taxi taking information by the user and continues until the taxi taking action is cancelled by the user or the payment is finished by the user, so that the taxi taking service is finished.
When the Client pays the Service, a proxy payment mode is adopted; the Proxy Service Proxy forwards the 'amount of money needed to be paid' provided by the server Service to the user Client, the user Client pays the Proxy Service Proxy and pays the corresponding amount, and after the Proxy Service Proxy confirms that the user Client finishes payment, the Proxy Service Proxy pays the corresponding amount to the server Service through the Account Account _ A to finish Proxy payment.
Step 107, the user Client sends a Request _ end for stopping Proxy Service to the Proxy Service Proxy, and the Proxy Service Proxy receives the Request _ end and stops the Proxy access of the user Client to the server Service through the Account _ a.
Wherein, the Proxy Service Proxy receives the Request _ end and interrupts the Proxy access of the Account Account _ A to the server Service; the conversion of the Request _ Client of the user Client into the Request _ Proxy is stopped; and stopping the switching relation between the Tel _ Proxy and the Tel _ Client, and stopping the Proxy payment of the user Client to the server Service.
Step 108, after completing Proxy, the user Client sends a Request _ restart to the Proxy service Proxy, and requests the Proxy service to continue using the Account _ a.
After the user Client finishes taxi taking, the Client finds that the package is missed, and can apply for continuing using the proxy service to perform subsequent functions.
After completing Proxy, the user Client sends a Request _ restart of Proxy service to the Proxy service Proxy, and protects the Account Account _ A information used and the reason of service restart.
Wherein, the restart request needs proxy service confirmation, after the confirmation, the operations of steps 103, 104, 105, 106 and 107 can be repeated.
It should be noted that the above-mentioned embodiments are only examples of the present invention, and not intended to limit the scope of the present invention, and all equivalent structural and equivalent process changes made by using the contents of the present specification and the drawings, such as mutual combination of technical features between various embodiments, or direct or indirect application to other related technical fields, are also included in the scope of the present invention.

Claims (7)

1. A server access method for protecting user privacy by Proxy access, wherein a user Client uses a Service provided by a server Service through a Proxy Service Proxy: the user Client registers on the Proxy service Proxy;
the Proxy Service Proxy registers Accounts of a plurality of servers Service and collects the Accounts into an account pool Accounts;
when a user Client initiates a server Service request to a Proxy Service Proxy, the Proxy Service Proxy initiates a Service request to the server Service by using an Account Account _ A selected from an Account pool Account;
the account of the server Service registered by the Proxy Service Proxy can be from the account of the server Service registered by other clients;
the Proxy service Proxy searches the idle Account Account _ A from the Account pool Account;
the Proxy service Proxy can screen Accounts from the account pool Accounts according to the request of the user Client and provide proper Accounts for the user Client so as to prevent the user Client from encountering price discrimination or introducing other disputes;
in the process of accessing the server Service, for the information collected by the server, the Proxy Service Proxy can adopt different processing modes for different types: if the information belongs to the information necessary for the service, the Proxy service Proxy acquires the information from the user Client;
if the information does not belong to the information necessary for the service, the Proxy service Proxy can not acquire the user Client;
if the information belongs to personal sensitive information, the Proxy service Proxy uses the data of the Account Account _ A to replace the data of the user Client;
if the information belongs to personal information, the Proxy service Proxy can suggest that the user Client uses the data of the Account Account _ A to replace the data of the user Client;
if the information does not belong to the personal sensitive information and the personal information, the Proxy Service Proxy transfers the data of the Client to the server Service;
according to the processing mode, the information processing mode of the Proxy service Proxy is divided into four types:
protection: for the information necessary for using the service and belonging to the personal sensitive information or the data of the personal information, the data of Account _ A is used for replacing the data of the Client of the user;
rejection: for the information which is not necessary for using the service and belongs to the personal sensitive information or the data of the personal information, the submission of Account _ A is directly used;
transferring: aiming at information necessary for using the service and not belonging to personal sensitive information or data of the personal information, the user is willing to transmit the actual information of the user Client to the server;
and (3) random: the data is generated by the Proxy service Proxy itself for information not necessary for using the service.
2. The method of claim 1, wherein the Proxy service Proxy maintains a service solicitation information table, a personal information list, a personal sensitive information list: the service request information table can record an information list collected by the server to the user side when a certain service is used, and which information is necessary for the service;
the personal information list records whether the information content in the service request information table is personal information;
the personal information personalinformation is electronically or otherwise recorded, and can identify various information of the identity of a specific natural person or the activity condition of the specific natural person alone or in combination with other information; the personal information comprises name, birth date, identification card number, personal biological identification information, address, communication contact mode, communication record and content, account number and password, property information, credit investigation information, track, accommodation information, health physiological information and transaction information;
the personal sensitive information list can record whether the information content in the service request information table is personal sensitive information or not;
personal sensitive information personalsensiveinformation is personal information which may harm personal and property safety and easily cause personal reputation, physical and mental health damage or discriminative treatment once illegal provision or abuse is disclosed;
the personal sensitive information comprises identification card numbers, personal biological identification information, bank account numbers, communication records, content property information, credit investigation information, track, accommodation information, health and physiological information, transaction information and personal information of children under 14 years old.
3. The server access method for protecting user privacy through Proxy access as claimed in claim 1, wherein the Proxy service Proxy can select the appropriate Account _ B from the Account pool Accounts according to the user Client's requirement to protect the benefit of the user Client.
4. The server access method for protecting user privacy through Proxy access according to claim 1, wherein the user Client uses the Service provided by the server Service through the Proxy Service Proxy, and the server access is realized through the following steps: step 1, a user Client initiates a Proxy access Request _ Proxy to a Proxy service Proxy;
step 2, the Proxy service Proxy inquires a service request information table, checks an information list collected by the server to the user side, and checks whether the information is personal information or personal sensitive information; selecting an Account Account _ A from an Account pool Account; after the query is completed, returning a Proxy access reply _ Proxy to the user Client, wherein the content comprises an Account Account _ A, an information list required by using the service, and whether each item of information is necessary or not, and whether the information is personal information or personal sensitive information;
step 3, the user Client determines which information needs to use the information of Account _ A and which information uses the information of the user Client according to the information of the Proxy access reply Response _ Proxy in the step 2 and whether the data belongs to personal information and personal sensitive information, and forms a service Request _ Client by using the information needing to be protected and transmitted as parameters, and sends the service Request _ Client to the Proxy service Proxy;
step 4, after the Proxy Service Proxy receives the Service Request _ Client, a binding relationship is established between the information Info _ protected to be protected in the Request _ Client and the corresponding protection information Info _ protecting of the Account Account _ A, the information to be transmitted in the Request _ Client, the data of the Account _ A and the data generated by the Proxy Service Proxy are used as parameters to initiate a Service Request _ Proxy to the server Service, and the Service Request _ Proxy does not contain the personal sensitive information of the user Client;
step 5, the server Service returns a Service Response _ Proxy to the Proxy Service Proxy according to the Service Request _ Proxy, and the Proxy Service Proxy generates a Response _ Client according to the parameters in the Response _ Proxy and the binding relationship in the step 4 and returns the Response _ Client to the user Client;
step 6, repeating the steps 3, 4 and 5 according to the service continuous condition;
and 7, the user Client sends a Request _ end for stopping Proxy Service to the Proxy Service Proxy, and the Proxy Service Proxy stops Proxy access of the user Client to the server Service through the Account Account _ A when receiving the Request _ end.
5. The server access method for protecting user privacy through Proxy access as claimed in claim 4, wherein after step 7, there is step 8, the user Client sends a restart Proxy service Request _ restart to the Proxy service Proxy, and requests the Proxy service to continue using the Account _ a, and steps 3, 4, 5, 6, and 7 are performed to continue the terminated Proxy access.
6. The server access method for protecting user privacy through Proxy access according to claim 1, wherein when a telephone number needs to be provided in the Proxy access, the Proxy Service Proxy transfers the telephone in Account _ a and the telephone binding call and short message of the user Client, and provides the telephone number in Account _ a to the server Service; the telephone number in the server Service calling Account Account _ A is transferred to the telephone of the user Client, and the telephone number sent by the server Service to the Account Account _ A is transferred to the user Client.
7. The server access method for protecting the user privacy through the Proxy access as claimed in claim 1, wherein the Proxy service Proxy protects the privacy information of the user Client through a Proxy payment mode when the Proxy access process requires payment; after obtaining the amount of money to be paid to the server Service, the Proxy Service Proxy initiates collection of money to the Client of the user, and pays the corresponding amount of money to the server Service through the Account Account _ A after obtaining the payment.
CN201811513193.5A 2018-12-12 2018-12-12 Server access method for protecting user privacy through proxy access Active CN109451043B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811513193.5A CN109451043B (en) 2018-12-12 2018-12-12 Server access method for protecting user privacy through proxy access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811513193.5A CN109451043B (en) 2018-12-12 2018-12-12 Server access method for protecting user privacy through proxy access

Publications (2)

Publication Number Publication Date
CN109451043A CN109451043A (en) 2019-03-08
CN109451043B true CN109451043B (en) 2022-02-08

Family

ID=65558016

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811513193.5A Active CN109451043B (en) 2018-12-12 2018-12-12 Server access method for protecting user privacy through proxy access

Country Status (1)

Country Link
CN (1) CN109451043B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865558A (en) * 2019-05-19 2020-10-30 北京骑胜科技有限公司 Service data processing method and device, electronic equipment and storage medium
CN113111328B (en) * 2021-04-30 2022-10-25 Tcl通讯(宁波)有限公司 User identity authentication method, system, terminal and computer readable storage medium
CN113822673B (en) * 2021-11-25 2022-09-13 北京溪塔科技有限公司 Transaction quotation obtaining method and device based on ring signature

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001065380A1 (en) * 2000-02-29 2001-09-07 Iprivacy Llc Anonymous and private browsing of web-sites through private portals
CN105376216A (en) * 2015-10-12 2016-03-02 华为技术有限公司 Remote access method, agent server and client end
CN106202331A (en) * 2016-07-01 2016-12-07 中国传媒大学 The commending system of secret protection and operational method based on this commending system by different level
CN107172001A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 Control method, key proxy server and the web proxy server of web proxy server
CN108259461A (en) * 2017-11-28 2018-07-06 中国科学院信息工程研究所 A kind of method and system that credible anonymous access is realized in distributed network
EP3358490A1 (en) * 2017-02-03 2018-08-08 Alcatel Lucent Method for protecting privacy in data queries
CN108632401A (en) * 2018-03-14 2018-10-09 中国互联网络信息中心 Reduce the anonymous querying method and system of privacy compromise on DNS recursion servers
CN108805661A (en) * 2018-05-24 2018-11-13 拉扎斯网络科技(上海)有限公司 Multi-party number method for secret protection, device, equipment and computer storage media

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6986036B2 (en) * 2002-03-20 2006-01-10 Microsoft Corporation System and method for protecting privacy and anonymity of parties of network communications
US8464311B2 (en) * 2004-10-28 2013-06-11 International Business Machines Corporation Method and system for implementing privacy notice, consent, and preference with a privacy proxy
US20140244510A1 (en) * 2007-05-23 2014-08-28 Raymond de Beasley Privacy protection system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001065380A1 (en) * 2000-02-29 2001-09-07 Iprivacy Llc Anonymous and private browsing of web-sites through private portals
CN105376216A (en) * 2015-10-12 2016-03-02 华为技术有限公司 Remote access method, agent server and client end
CN107172001A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 Control method, key proxy server and the web proxy server of web proxy server
CN106202331A (en) * 2016-07-01 2016-12-07 中国传媒大学 The commending system of secret protection and operational method based on this commending system by different level
EP3358490A1 (en) * 2017-02-03 2018-08-08 Alcatel Lucent Method for protecting privacy in data queries
CN108259461A (en) * 2017-11-28 2018-07-06 中国科学院信息工程研究所 A kind of method and system that credible anonymous access is realized in distributed network
CN108632401A (en) * 2018-03-14 2018-10-09 中国互联网络信息中心 Reduce the anonymous querying method and system of privacy compromise on DNS recursion servers
CN108805661A (en) * 2018-05-24 2018-11-13 拉扎斯网络科技(上海)有限公司 Multi-party number method for secret protection, device, equipment and computer storage media

Also Published As

Publication number Publication date
CN109451043A (en) 2019-03-08

Similar Documents

Publication Publication Date Title
CN109451043B (en) Server access method for protecting user privacy through proxy access
US5999596A (en) Method and system for controlling authorization of credit card transactions
US8208612B2 (en) System and method for facilitating account-based transactions
TWI227986B (en) Device independent authentication system and method
JP2006511995A (en) Automatic connection type terminal or user authentication in communication network
US20050108107A1 (en) Systems and methods of providing marketing campaign management services
CN109784031B (en) Account identity verification processing method and device
US7181197B2 (en) Preventing unauthorized switching of mobile telecommunications service providers
CN110557366B (en) Identity authentication system and method based on cross-network transmission and CTID (computer telephony integration) network card authentication
CN110225035A (en) The binding of third party's account and login method, server, terminal and device
KR20170041799A (en) Secure mobile contact system (smcs)
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
US20020035479A1 (en) Access contract changing method for automatically changing an access contract between a prepaid contract and a postpaid contract
CN104408613A (en) Method and system for optimally processing distributed violation information
US20110110507A1 (en) System And Method For Communication Account Management
CN112118237A (en) Resource access management method
US20150066766A1 (en) Secure Generation of a User Account in a Service Server
JP2001237989A (en) Charging acting system to owner of information display type portable telephone
JP2009070020A (en) Online service provision system, personal terminal, management server, online service providing method and program
JP2017058731A (en) Method and system for preventing unauthorized transaction
KR20120116051A (en) The service opening method for mobile terminal with usim
US20070095899A1 (en) Global identification authentication system
US8249630B1 (en) Messaging session enhancement with user data
JP2002324219A (en) Card authentication system
WO2011026695A1 (en) Centralized authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210616

Address after: 100176 505-4c, 5th floor, building 6, yard 10, KEGU 1st Street, Beijing Economic and Technological Development Zone, Daxing District, Beijing

Applicant after: BEIJING SHENGXIN NETWORK TECHNOLOGY Co.,Ltd.

Address before: 100029 426-3, 4th floor, building 6 (North), No.1 Shuangqing Road, Haidian District, Beijing

Applicant before: SHANGJIA NETWORK TECHNOLOGY (BEIJING) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant