CN109451043B - Server access method for protecting user privacy through proxy access - Google Patents
Server access method for protecting user privacy through proxy access Download PDFInfo
- Publication number
- CN109451043B CN109451043B CN201811513193.5A CN201811513193A CN109451043B CN 109451043 B CN109451043 B CN 109451043B CN 201811513193 A CN201811513193 A CN 201811513193A CN 109451043 B CN109451043 B CN 109451043B
- Authority
- CN
- China
- Prior art keywords
- proxy
- information
- service
- account
- personal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
Abstract
The invention discloses a server access method for protecting user privacy through proxy access. The method comprises the steps that a Proxy Service Proxy is accessed by a user Client, the Proxy Service Proxy acquires an Account Account _ A from an Account pool Account, the Account Account _ A is used for accessing a server Service, information of the Account Account _ A and necessary information of the access Service of the user Client are provided for the server Service, and personal information of the user Client is filtered, so that the purpose of protecting personal privacy of a user is achieved.
Description
Technical Field
The invention relates to the technical field of information service, in particular to a server access method for protecting user privacy through proxy access.
Background
In recent years, with the rapid development of information technology and the popularization of internet application, more and more organizations collect and use a large amount of personal information, bring convenience to the life of people, and simultaneously have the problems of illegal collection, abuse, leakage and the like of the personal information, so that the personal information security faces serious threats.
When entering the big data era, when a plurality of organizations provide internet services for users, the users are forced to provide unnecessary information and personal information, even personal sensitive information, including reading the device types through clients, reading contacts, reading call records and requiring the users to fill in the personal information and the personal sensitive information, and if the users do not provide the information, the services cannot be used. The goal is often to increase enterprise revenue with more user data, a process that often violates user privacy. By acquiring unnecessary user information, the service provider can discriminate the price of the user and charge the user a higher service fee than other users for the same service; product promotion can be carried out by utilizing the user contact persons; the user information can be resold to obtain economic benefits. Personal sensitive information provided by a user, such as a telephone, an address, an identity card and the like, cannot be changed after leakage, and once leakage occurs, the personal sensitive information cannot be compensated.
Chinese patent grant publication No.: the invention discloses a method, a device and a system for protecting private data, relates to the technical field of communication, and mainly aims to solve the problem that the private information of a user is leaked due to the fact that the access right of the user information is acquired when an application program is installed. The main technical scheme of the invention comprises the following steps: acquiring pseudo privacy data of the first application program from the server based on the preset attribute information, wherein the pseudo privacy data is initialization data of the first application program; modifying a storage path of real privacy data corresponding to the first application program, and storing the pseudo privacy data under an original storage path of the real privacy data; configuring the access authority of a second application program to the first application program; the pseudo-privacy data is sent to the second application when the second application accesses the first application. The invention may not solve the problem of the server requiring the user to fill in personal sensitive information.
Disclosure of Invention
The invention discloses a server access method for protecting user privacy through proxy access, aiming at protecting user personal information, particularly personal sensitive information, from being acquired by a server.
To achieve the above object, the present invention provides a server access method for protecting user privacy through Proxy access, characterized in that a user Client uses a Service provided by a server Service through a Proxy Service Proxy:
the user Client registers on the Proxy service Proxy;
the Proxy Service Proxy registers Accounts of a plurality of servers Service and collects the Accounts into an account pool Accounts;
when the Client initiates a Service request of the server to the Proxy Service Proxy, the Proxy Service Proxy initiates the Service request to the server Service by using the Account Account _ A selected from the Account pool Account.
Preferably, the Proxy service Proxy maintains a service request information table, a personal information list and a personal sensitive information list:
the service request information table can record an information list collected by the server to the user side when a certain service is used, and which information is necessary for the service;
the personal information list records whether the information content in the service request information table is personal information;
personal information is electronically or otherwise recorded, and can identify various information of the identity of a specific natural person or the activity condition of the specific natural person alone or in combination with other information; the personal information comprises name, birth date, identification card number, personal biological identification information, address, communication contact mode, communication record and content, account number and password, property information, credit investigation information, track, accommodation information, health physiological information, transaction information and the like;
the personal sensitive information list can record whether the information content in the service request information table is personal sensitive information or not;
personal sensitive information is personal information which can possibly harm personal and property safety, easily cause personal reputation, physical and mental health damage or discriminative treatment and the like once illegal provision or abuse is disclosed; the personal sensitive information comprises identification card numbers, personal biological identification information, bank account numbers, communication records, content property information, credit investigation information, track, accommodation information, health and physiological information, transaction information, personal information of children under 14 years old (including) and the like.
Preferably, in the process of accessing the server Service, the Proxy Service Proxy can adopt different processing modes for different types of information collected by the server:
if the information belongs to the information necessary for the service, the Proxy service Proxy acquires the information from the user Client;
if the information does not belong to the information necessary for the service, the Proxy service Proxy can not acquire the user Client;
if the information belongs to personal sensitive information, the Proxy service Proxy uses the data of the Account Account _ A to replace the data of the user Client;
if the information belongs to personal information, the Proxy service Proxy can suggest that the user Client uses the data of the Account Account _ A to replace the data of the user Client;
if the information does not belong to the personal sensitive information and the personal information, the Proxy Service Proxy transfers the data of the Client to the server Service;
according to the processing mode, the information processing mode of the Proxy service Proxy is divided into four types:
protection: for the information necessary for using the service and belonging to the personal sensitive information or the data of the personal information, the data of Account _ A is used for replacing the data of the Client of the user;
rejection: for the information which is not necessary for using the service and belongs to the personal sensitive information or the data of the personal information, the submission of Account _ A is directly used;
transferring: aiming at information necessary for using the service and not belonging to personal sensitive information or data of the personal information, the user is willing to transmit the actual information of the user Client to the server;
and (3) random: the data is generated by the Proxy service Proxy itself for information not necessary for using the service.
Preferably, the Proxy service Proxy can select a suitable Account _ B from the Account pool Accounts according to the requirements of the user Client, so as to protect the benefits of the user Client.
Preferably, the Client uses the Service provided by the server Service through the Proxy Service Proxy, and the server access is realized through the following steps:
step 1, a user Client initiates a Proxy access Request _ Proxy to a Proxy service Proxy;
step 2, the Proxy service Proxy inquires a service request information table, checks an information list collected by the server to the user side, and checks whether the information is personal information or personal sensitive information; selecting an Account Account _ A from an Account pool Account; after the query is completed, returning a Proxy access reply _ Proxy to the user Client, wherein the content comprises an Account Account _ A, an information list required by using the service, and whether each item of information is necessary or not, and whether the information is personal information or personal sensitive information;
step 3, the user Client determines which information needs to use the information of Account _ A and which information uses the information of the user Client according to the information of the Proxy access reply Response _ Proxy in the step 2 and whether the data belongs to personal information and personal sensitive information, and forms a service Request _ Client by using the information needing to be protected and transmitted as parameters, and sends the service Request _ Client to the Proxy service Proxy;
step 4, after the Proxy Service Proxy receives the Service Request _ Client, a binding relationship is established between the information Info _ protected to be protected in the Request _ Client and the corresponding protection information Info _ protecting of the Account Account _ A, the information to be transmitted in the Request _ Client, the data of the Account _ A and the data generated by the Proxy Service Proxy are used as parameters to initiate a Service Request _ Proxy to the server Service, and the Service Request _ Proxy does not contain the personal sensitive information of the user Client;
step 5, the server Service returns a Service Response _ Proxy to the Proxy Service Proxy according to the Service Request _ Proxy, and the Proxy Service Proxy generates a Response _ Client according to the parameters in the Response _ Proxy and the binding relationship in the step 4 and returns the Response _ Client to the user Client;
step 6, repeating the steps 3, 4 and 5 according to the service continuous condition;
and 7, the user Client sends a Request _ end for stopping Proxy Service to the Proxy Service Proxy, and the Proxy Service Proxy stops Proxy access of the user Client to the server Service through the Account Account _ A when receiving the Request _ end.
Preferably, after the step 7, a step 8 is further performed, in which the user Client sends a restart Proxy service Request _ restart to the Proxy service Proxy, and continues to use the Account _ a to the Proxy service Request, and then performs the steps 3, 4, 5, 6, and 7, and continues the terminated Proxy access.
Preferably, when the Proxy access needs to provide the telephone number, the Proxy Service Proxy binds the telephone in the Account Account _ A with the telephone of the user Client for call transfer and short message transfer, and provides the server Service with the telephone number in the Account Account _ A; the telephone number in the server Service calling Account Account _ A is transferred to the telephone of the user Client, and the telephone number sent by the server Service to the Account Account _ A is transferred to the user Client.
Preferably, when payment is needed in the Proxy access process, the Proxy service Proxy can protect the privacy information of the user Client in a Proxy payment mode; after obtaining the amount of money to be paid to the server Service, the Proxy Service Proxy initiates collection of money to the Client of the user, and pays the corresponding amount of money to the server Service through the Account Account _ A after obtaining the payment.
Compared with the prior art, the invention has the beneficial effects that:
by using the account pool and the proxy access mode, personal information, particularly personal privacy information of the user Client is protected, misuse of the user information and information leakage events are avoided, and the user can know and control the data to be sent to the server; the server Service can only obtain the information necessary for the Service, and can not obtain the additional personal privacy information of the Client, even if the server Service fails to cause information leakage, the personal information of the Client can not be leaked; the method can enable the user to take the initiative in the personal information protection, and even if the server still asks for the personal sensitive information, the user can also actively manage the information content submitted to the server, thereby avoiding the leakage of the personal information and the personal sensitive information.
By using an account pool and a proxy access mode, the invention can achieve the data separation effect, the foreground anonymity and the background real name effect; the user Client registers on the Proxy Service Proxy, the Proxy Service Proxy only masters the personal information of the user Client, the server Service does not master the personal information of the user Client and only masters the specific information of the Service used by the user Client, and the Proxy Service Proxy and the server Service cannot provide a complete behavior track of the user Client; in normal use, the user Client is anonymous to the server Service, but the supervising authority can indirectly find the user Client through the Proxy Service Proxy.
Fig. 1 is a schematic diagram illustrating a server access implementation process for protecting user privacy through proxy access according to an embodiment of the present invention.
Fig. 2 shows different information processing methods in the embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the embodiments and technical solutions of the present invention, the technical solutions of the present invention will be described in more detail with reference to the accompanying drawings and embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without inventive step, are within the scope of the present invention.
Case 1: the user Client uses the Internet taxi taking Service provided by the server Service through the Proxy Service Proxy;
the user Client uses the taxi taking Service provided by the server Service through the Proxy Service Proxy; in the taxi taking service, "departure point longitude", "departure point latitude", "vehicle type", "destination longitude", "destination latitude", "boarding time", and "telephone" are information required for the taxi taking service, and "telephone", "identification card", and "gender" belong to personal sensitive information.
Before using the service, the following needs to be done:
the user Client registers on the Proxy service Proxy;
the Proxy Service Proxy registers Accounts of a plurality of servers Service and collects the Accounts into an account pool Accounts.
The account of the server Service registered by the Proxy Service Proxy may be from the account of the server Service registered by other clients.
As shown in fig. 1, the user Client uses the Service provided by the server Service through the Proxy Service Proxy, and the server access is realized through the following steps:
102, the Proxy service Proxy queries a service request information table, checks an information list collected by the server to the user terminal, and checks whether the information is personal information or personal sensitive information; selecting an Account Account _ A from an Account pool Account; after the query is completed, returning a Proxy access reply Response _ Proxy to the user Client, wherein the content comprises the Account Account _ A, an information list required by using the service, and whether each item of information is necessary, personal information or personal sensitive information.
The Proxy service Proxy can inquire the service request information table, and retrieve the information which the server can request in the taxi taking service, wherein the information comprises departure point longitude, departure point latitude, vehicle type, destination longitude, destination latitude, getting-on time, telephone and the like, and whether the information is needed by the service, belongs to personal information or not, and belongs to personal sensitive information or not.
As shown in fig. 2, the Proxy service Proxy will take different measures depending on whether the information is service-necessary and whether it is personal sensitive:
if the information belongs to the information necessary for the service, the Proxy service Proxy acquires the information from the user Client;
if the information does not belong to the information necessary for the service, the Proxy service Proxy can not acquire the user Client;
if the information belongs to personal sensitive information, the Proxy service Proxy uses the data of the Account Account _ A to replace the data of the user Client;
if the information belongs to personal information, the Proxy service Proxy can suggest that the user Client uses the data of the Account Account _ A to replace the data of the user Client;
if the information does not belong to the personal sensitive information and the personal information, the Proxy Service Proxy transfers the data of the user Client to the server Service.
According to the processing mode, the information processing mode of the Proxy service Proxy is divided into four types:
protection: for the information necessary for using the service and belonging to the personal sensitive information or the data of the personal information, the data of Account _ A is used for replacing the data of the Client of the user;
rejection: for the information which is not necessary for using the service and belongs to the personal sensitive information or the data of the personal information, the submission of Account _ A is directly used;
transferring: aiming at information necessary for using the service and not belonging to personal sensitive information or data of the personal information, the user is willing to transmit the actual information of the user Client to the server;
and (3) random: the data is generated by the Proxy service Proxy itself for information not necessary for using the service.
The personal information list records whether the information content in the service request information table is personal information.
Personal information is electronically or otherwise recorded, and can identify various information of the identity of a specific natural person or the activity condition of the specific natural person alone or in combination with other information; the personal information comprises name, birth date, identification card number, personal biological identification information, address, communication contact way, communication record and content, account number and password, property information, credit investigation information, track, accommodation information, health physiological information, transaction information and the like.
The personal sensitive information list records whether the information content in the service solicitation information table is personal sensitive information.
Personal sensitive information is personal information which can possibly harm personal and property safety, easily cause personal reputation, physical and mental health damage or discriminative treatment and the like once illegal provision or abuse is disclosed; the personal sensitive information comprises identification card numbers, personal biological identification information, bank account numbers, communication records, content property information, credit investigation information, track, accommodation information, health and physiological information, transaction information, personal information of children under 14 years old (including) and the like.
Wherein, Proxy service Proxy will retrieve the free Account Account _ A from Account pool Account.
After the query is completed, the Proxy service Proxy returns a Proxy access reply _ Proxy to the user Client, wherein the content comprises an Account Account _ A, an information list required by using the service, and whether each item of information is necessary, personal information or personal sensitive information.
Preferably, the Proxy service Proxy screens the account from the account pool Accounts according to the request of the user Client, and provides a proper account for the user Client to prevent the user Client from encountering price discrimination or introducing other disputes; if the account with the mobile phone model of 'android phone' is provided to avoid the problem that more travel fees are collected by the apple phone user, and the account with the gender of 'male' is selected to avoid the problem that the user is disturbed by the gender in the late night.
The user Client initiates a Request _ Client to the Proxy service Proxy, wherein the Request _ Client comprises information Info _ recessary needing to be transmitted and information Info _ protectd needing to be protected, the information Info _ recessary needing to be transmitted comprises 'departure point longitude', 'departure point latitude', 'vehicle type', 'destination longitude', 'destination latitude', 'getting-on time' and the like, and the information Info _ protectd needing to be protected comprises 'telephone' Tel _ Client in the user Client.
The Proxy Service Proxy establishes a binding relationship between the "telephone" Tel _ Proxy in the Account _ a and the "telephone" Tel _ Client in the information Info _ protected that the user Client needs to protect in step 103, so that the server Service is switched to the "telephone" Tel _ Client of the user Client when calling the "telephone" Tel _ Proxy in the Account _ a, and the server Service forwards the information to the "telephone" Tel _ Proxy in the Account _ a.
The Proxy Service Proxy initiates a Service Request _ Proxy to the server Service by taking the information Info _ news needed to be transmitted provided by the user Client, the protection information Info _ protection provided by the Account _ a, the information refused to be provided and obtained from the Account _ a and the random information generated by the Proxy Service Proxy as parameters.
And 105, the server Service returns a Service Response _ Proxy to the Proxy Service Proxy according to the Service Request _ Proxy, and the Proxy Service Proxy generates a Response _ Client according to the parameters in the Response _ Proxy and the binding relationship in the step 4 and returns the Response _ Client to the user Client.
And step 106, repeating the steps 3, 4 and 5 according to the service condition.
Wherein, according to different service conditions, the service can be completed instantly within milliseconds, and can also be continued for hours or even days; in the taxi taking service, the service starts from the inquiry of taxi taking information by the user and continues until the taxi taking action is cancelled by the user or the payment is finished by the user, so that the taxi taking service is finished.
When the Client pays the Service, a proxy payment mode is adopted; the Proxy Service Proxy forwards the 'amount of money needed to be paid' provided by the server Service to the user Client, the user Client pays the Proxy Service Proxy and pays the corresponding amount, and after the Proxy Service Proxy confirms that the user Client finishes payment, the Proxy Service Proxy pays the corresponding amount to the server Service through the Account Account _ A to finish Proxy payment.
Wherein, the Proxy Service Proxy receives the Request _ end and interrupts the Proxy access of the Account Account _ A to the server Service; the conversion of the Request _ Client of the user Client into the Request _ Proxy is stopped; and stopping the switching relation between the Tel _ Proxy and the Tel _ Client, and stopping the Proxy payment of the user Client to the server Service.
After the user Client finishes taxi taking, the Client finds that the package is missed, and can apply for continuing using the proxy service to perform subsequent functions.
After completing Proxy, the user Client sends a Request _ restart of Proxy service to the Proxy service Proxy, and protects the Account Account _ A information used and the reason of service restart.
Wherein, the restart request needs proxy service confirmation, after the confirmation, the operations of steps 103, 104, 105, 106 and 107 can be repeated.
It should be noted that the above-mentioned embodiments are only examples of the present invention, and not intended to limit the scope of the present invention, and all equivalent structural and equivalent process changes made by using the contents of the present specification and the drawings, such as mutual combination of technical features between various embodiments, or direct or indirect application to other related technical fields, are also included in the scope of the present invention.
Claims (7)
1. A server access method for protecting user privacy by Proxy access, wherein a user Client uses a Service provided by a server Service through a Proxy Service Proxy: the user Client registers on the Proxy service Proxy;
the Proxy Service Proxy registers Accounts of a plurality of servers Service and collects the Accounts into an account pool Accounts;
when a user Client initiates a server Service request to a Proxy Service Proxy, the Proxy Service Proxy initiates a Service request to the server Service by using an Account Account _ A selected from an Account pool Account;
the account of the server Service registered by the Proxy Service Proxy can be from the account of the server Service registered by other clients;
the Proxy service Proxy searches the idle Account Account _ A from the Account pool Account;
the Proxy service Proxy can screen Accounts from the account pool Accounts according to the request of the user Client and provide proper Accounts for the user Client so as to prevent the user Client from encountering price discrimination or introducing other disputes;
in the process of accessing the server Service, for the information collected by the server, the Proxy Service Proxy can adopt different processing modes for different types: if the information belongs to the information necessary for the service, the Proxy service Proxy acquires the information from the user Client;
if the information does not belong to the information necessary for the service, the Proxy service Proxy can not acquire the user Client;
if the information belongs to personal sensitive information, the Proxy service Proxy uses the data of the Account Account _ A to replace the data of the user Client;
if the information belongs to personal information, the Proxy service Proxy can suggest that the user Client uses the data of the Account Account _ A to replace the data of the user Client;
if the information does not belong to the personal sensitive information and the personal information, the Proxy Service Proxy transfers the data of the Client to the server Service;
according to the processing mode, the information processing mode of the Proxy service Proxy is divided into four types:
protection: for the information necessary for using the service and belonging to the personal sensitive information or the data of the personal information, the data of Account _ A is used for replacing the data of the Client of the user;
rejection: for the information which is not necessary for using the service and belongs to the personal sensitive information or the data of the personal information, the submission of Account _ A is directly used;
transferring: aiming at information necessary for using the service and not belonging to personal sensitive information or data of the personal information, the user is willing to transmit the actual information of the user Client to the server;
and (3) random: the data is generated by the Proxy service Proxy itself for information not necessary for using the service.
2. The method of claim 1, wherein the Proxy service Proxy maintains a service solicitation information table, a personal information list, a personal sensitive information list: the service request information table can record an information list collected by the server to the user side when a certain service is used, and which information is necessary for the service;
the personal information list records whether the information content in the service request information table is personal information;
the personal information personalinformation is electronically or otherwise recorded, and can identify various information of the identity of a specific natural person or the activity condition of the specific natural person alone or in combination with other information; the personal information comprises name, birth date, identification card number, personal biological identification information, address, communication contact mode, communication record and content, account number and password, property information, credit investigation information, track, accommodation information, health physiological information and transaction information;
the personal sensitive information list can record whether the information content in the service request information table is personal sensitive information or not;
personal sensitive information personalsensiveinformation is personal information which may harm personal and property safety and easily cause personal reputation, physical and mental health damage or discriminative treatment once illegal provision or abuse is disclosed;
the personal sensitive information comprises identification card numbers, personal biological identification information, bank account numbers, communication records, content property information, credit investigation information, track, accommodation information, health and physiological information, transaction information and personal information of children under 14 years old.
3. The server access method for protecting user privacy through Proxy access as claimed in claim 1, wherein the Proxy service Proxy can select the appropriate Account _ B from the Account pool Accounts according to the user Client's requirement to protect the benefit of the user Client.
4. The server access method for protecting user privacy through Proxy access according to claim 1, wherein the user Client uses the Service provided by the server Service through the Proxy Service Proxy, and the server access is realized through the following steps: step 1, a user Client initiates a Proxy access Request _ Proxy to a Proxy service Proxy;
step 2, the Proxy service Proxy inquires a service request information table, checks an information list collected by the server to the user side, and checks whether the information is personal information or personal sensitive information; selecting an Account Account _ A from an Account pool Account; after the query is completed, returning a Proxy access reply _ Proxy to the user Client, wherein the content comprises an Account Account _ A, an information list required by using the service, and whether each item of information is necessary or not, and whether the information is personal information or personal sensitive information;
step 3, the user Client determines which information needs to use the information of Account _ A and which information uses the information of the user Client according to the information of the Proxy access reply Response _ Proxy in the step 2 and whether the data belongs to personal information and personal sensitive information, and forms a service Request _ Client by using the information needing to be protected and transmitted as parameters, and sends the service Request _ Client to the Proxy service Proxy;
step 4, after the Proxy Service Proxy receives the Service Request _ Client, a binding relationship is established between the information Info _ protected to be protected in the Request _ Client and the corresponding protection information Info _ protecting of the Account Account _ A, the information to be transmitted in the Request _ Client, the data of the Account _ A and the data generated by the Proxy Service Proxy are used as parameters to initiate a Service Request _ Proxy to the server Service, and the Service Request _ Proxy does not contain the personal sensitive information of the user Client;
step 5, the server Service returns a Service Response _ Proxy to the Proxy Service Proxy according to the Service Request _ Proxy, and the Proxy Service Proxy generates a Response _ Client according to the parameters in the Response _ Proxy and the binding relationship in the step 4 and returns the Response _ Client to the user Client;
step 6, repeating the steps 3, 4 and 5 according to the service continuous condition;
and 7, the user Client sends a Request _ end for stopping Proxy Service to the Proxy Service Proxy, and the Proxy Service Proxy stops Proxy access of the user Client to the server Service through the Account Account _ A when receiving the Request _ end.
5. The server access method for protecting user privacy through Proxy access as claimed in claim 4, wherein after step 7, there is step 8, the user Client sends a restart Proxy service Request _ restart to the Proxy service Proxy, and requests the Proxy service to continue using the Account _ a, and steps 3, 4, 5, 6, and 7 are performed to continue the terminated Proxy access.
6. The server access method for protecting user privacy through Proxy access according to claim 1, wherein when a telephone number needs to be provided in the Proxy access, the Proxy Service Proxy transfers the telephone in Account _ a and the telephone binding call and short message of the user Client, and provides the telephone number in Account _ a to the server Service; the telephone number in the server Service calling Account Account _ A is transferred to the telephone of the user Client, and the telephone number sent by the server Service to the Account Account _ A is transferred to the user Client.
7. The server access method for protecting the user privacy through the Proxy access as claimed in claim 1, wherein the Proxy service Proxy protects the privacy information of the user Client through a Proxy payment mode when the Proxy access process requires payment; after obtaining the amount of money to be paid to the server Service, the Proxy Service Proxy initiates collection of money to the Client of the user, and pays the corresponding amount of money to the server Service through the Account Account _ A after obtaining the payment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811513193.5A CN109451043B (en) | 2018-12-12 | 2018-12-12 | Server access method for protecting user privacy through proxy access |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811513193.5A CN109451043B (en) | 2018-12-12 | 2018-12-12 | Server access method for protecting user privacy through proxy access |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109451043A CN109451043A (en) | 2019-03-08 |
CN109451043B true CN109451043B (en) | 2022-02-08 |
Family
ID=65558016
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811513193.5A Active CN109451043B (en) | 2018-12-12 | 2018-12-12 | Server access method for protecting user privacy through proxy access |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109451043B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865558A (en) * | 2019-05-19 | 2020-10-30 | 北京骑胜科技有限公司 | Service data processing method and device, electronic equipment and storage medium |
CN113111328B (en) * | 2021-04-30 | 2022-10-25 | Tcl通讯(宁波)有限公司 | User identity authentication method, system, terminal and computer readable storage medium |
CN113822673B (en) * | 2021-11-25 | 2022-09-13 | 北京溪塔科技有限公司 | Transaction quotation obtaining method and device based on ring signature |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001065380A1 (en) * | 2000-02-29 | 2001-09-07 | Iprivacy Llc | Anonymous and private browsing of web-sites through private portals |
CN105376216A (en) * | 2015-10-12 | 2016-03-02 | 华为技术有限公司 | Remote access method, agent server and client end |
CN106202331A (en) * | 2016-07-01 | 2016-12-07 | 中国传媒大学 | The commending system of secret protection and operational method based on this commending system by different level |
CN107172001A (en) * | 2016-03-07 | 2017-09-15 | 阿里巴巴集团控股有限公司 | Control method, key proxy server and the web proxy server of web proxy server |
CN108259461A (en) * | 2017-11-28 | 2018-07-06 | 中国科学院信息工程研究所 | A kind of method and system that credible anonymous access is realized in distributed network |
EP3358490A1 (en) * | 2017-02-03 | 2018-08-08 | Alcatel Lucent | Method for protecting privacy in data queries |
CN108632401A (en) * | 2018-03-14 | 2018-10-09 | 中国互联网络信息中心 | Reduce the anonymous querying method and system of privacy compromise on DNS recursion servers |
CN108805661A (en) * | 2018-05-24 | 2018-11-13 | 拉扎斯网络科技(上海)有限公司 | Multi-party number method for secret protection, device, equipment and computer storage media |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6986036B2 (en) * | 2002-03-20 | 2006-01-10 | Microsoft Corporation | System and method for protecting privacy and anonymity of parties of network communications |
US8464311B2 (en) * | 2004-10-28 | 2013-06-11 | International Business Machines Corporation | Method and system for implementing privacy notice, consent, and preference with a privacy proxy |
US20140244510A1 (en) * | 2007-05-23 | 2014-08-28 | Raymond de Beasley | Privacy protection system and method |
-
2018
- 2018-12-12 CN CN201811513193.5A patent/CN109451043B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001065380A1 (en) * | 2000-02-29 | 2001-09-07 | Iprivacy Llc | Anonymous and private browsing of web-sites through private portals |
CN105376216A (en) * | 2015-10-12 | 2016-03-02 | 华为技术有限公司 | Remote access method, agent server and client end |
CN107172001A (en) * | 2016-03-07 | 2017-09-15 | 阿里巴巴集团控股有限公司 | Control method, key proxy server and the web proxy server of web proxy server |
CN106202331A (en) * | 2016-07-01 | 2016-12-07 | 中国传媒大学 | The commending system of secret protection and operational method based on this commending system by different level |
EP3358490A1 (en) * | 2017-02-03 | 2018-08-08 | Alcatel Lucent | Method for protecting privacy in data queries |
CN108259461A (en) * | 2017-11-28 | 2018-07-06 | 中国科学院信息工程研究所 | A kind of method and system that credible anonymous access is realized in distributed network |
CN108632401A (en) * | 2018-03-14 | 2018-10-09 | 中国互联网络信息中心 | Reduce the anonymous querying method and system of privacy compromise on DNS recursion servers |
CN108805661A (en) * | 2018-05-24 | 2018-11-13 | 拉扎斯网络科技(上海)有限公司 | Multi-party number method for secret protection, device, equipment and computer storage media |
Also Published As
Publication number | Publication date |
---|---|
CN109451043A (en) | 2019-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109451043B (en) | Server access method for protecting user privacy through proxy access | |
US5999596A (en) | Method and system for controlling authorization of credit card transactions | |
US8208612B2 (en) | System and method for facilitating account-based transactions | |
TWI227986B (en) | Device independent authentication system and method | |
JP2006511995A (en) | Automatic connection type terminal or user authentication in communication network | |
US20050108107A1 (en) | Systems and methods of providing marketing campaign management services | |
CN109784031B (en) | Account identity verification processing method and device | |
US7181197B2 (en) | Preventing unauthorized switching of mobile telecommunications service providers | |
CN110557366B (en) | Identity authentication system and method based on cross-network transmission and CTID (computer telephony integration) network card authentication | |
CN110225035A (en) | The binding of third party's account and login method, server, terminal and device | |
KR20170041799A (en) | Secure mobile contact system (smcs) | |
CN111797418B (en) | Online service control method and device, service terminal, server and storage medium | |
US20020035479A1 (en) | Access contract changing method for automatically changing an access contract between a prepaid contract and a postpaid contract | |
CN104408613A (en) | Method and system for optimally processing distributed violation information | |
US20110110507A1 (en) | System And Method For Communication Account Management | |
CN112118237A (en) | Resource access management method | |
US20150066766A1 (en) | Secure Generation of a User Account in a Service Server | |
JP2001237989A (en) | Charging acting system to owner of information display type portable telephone | |
JP2009070020A (en) | Online service provision system, personal terminal, management server, online service providing method and program | |
JP2017058731A (en) | Method and system for preventing unauthorized transaction | |
KR20120116051A (en) | The service opening method for mobile terminal with usim | |
US20070095899A1 (en) | Global identification authentication system | |
US8249630B1 (en) | Messaging session enhancement with user data | |
JP2002324219A (en) | Card authentication system | |
WO2011026695A1 (en) | Centralized authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210616 Address after: 100176 505-4c, 5th floor, building 6, yard 10, KEGU 1st Street, Beijing Economic and Technological Development Zone, Daxing District, Beijing Applicant after: BEIJING SHENGXIN NETWORK TECHNOLOGY Co.,Ltd. Address before: 100029 426-3, 4th floor, building 6 (North), No.1 Shuangqing Road, Haidian District, Beijing Applicant before: SHANGJIA NETWORK TECHNOLOGY (BEIJING) Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |