• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Technological Means and Response Mechanisms for Personal Information Theft

    2021-01-07 11:44HePeiyuTengXiaoshuoMiaoHua
    科技與法律 2021年6期
    關(guān)鍵詞:網(wǎng)絡(luò)安全技術(shù)信息安全

    He Peiyu Teng Xiaoshuo Miao Hua

    Abstract: While internet technology has brought great convenience to modern life, it also provides opportunities for criminals. Through information theft methods such as hacking, malware, social attacks, privilege misuse and new technology theft, criminals collect and steal personal information of high value. These illegal acts seriously harm personal information security and lead to various social problems. At present, the problems of the deficiency of personal information protection legal system, unclear definition of related technical concepts, as well as difficulties of investigating criminal responsibility for thieves have caused adverse effects for establishing personal information protection framework in China. This paper analyses the technical means of personal information theft and builds a personal information protection framework. It deems that by refining current laws and regulations, formulating special personal information protection laws, and clearing law supervision and accountability mechanisms for individuals, the risk of personal information theft can be reduced.

    Key words: information security; network safety technology; autonomous information protection framework; personal information theft response system; personal information protection law

    CLC:D 923? ? ? ? DC:A? ? ? ? ? ? ? ? ? ? ? Article ID:2096?9783(2021)06?0138?11

    1 Introduction

    Rapid development of internet technology has brought human beings into the information era. As the cornerstone of this era, information and its value have been realized and excavated by the world. Mastering information assets and making intelligent decisions have become the key to an enterprise's out performance. Some active and influential companies have massive information, such as transaction information, credit information, user behavior information and social information. Companies' behavior covers information collection, information storage, information analysis, information visualization and information security. Companies may have a powerful interactive information mining platform to build the underlying structure of information circulation, collection and sharing to meet different information mining and analysis needs. For instance, giant companies like Amazon and Google have amassed vast amounts of information, which offers them a striking advantage over their competitors by selling advertisements to targeting groups and providing personalized services.

    The correct use of big data can bring great convenience to people, but it can also bring technical challenges to information security. Proliferating personal information theft, including social engineering attacks, trojans and spyware, is the driving force of the unprecedented boom of the black network industry chain. The collection and use of personal information in the online society makes it possible for the private space of natural persons to be involuntarily disclosed. The current personal information security network is showing a repeated cycle of "frequent problems ?? regulatory crackdowns ?? security stable period ?? problems recurring again". The trends of diversification of theft methods, complexity of technology, diversification of behaviors and total information loss have brought a growing destructive threat to personal information safety. For example, with the maturity of artificial intelligence applications, face recognition technology is widely used in various fields of life, which has caused the public to worry about the current situation of personal biological information collection. Due to the coexistence of positive and negative externalities of personal information, it is difficult to accurately measure the overflow results and make correct regulatory choices. Therefore, it is necessary to review the security situation of personal information in the big data era and construct personal information safety mechanisms from aspects of technology, regulation and legislation as well.

    The problems between law and technology have become increasingly prominent since the rapid development of technologies. Difficult cases concerning technology position in judiciary have also appeared repeatedly. The law adjusts itself based on different aspects of technological value, reconstructs itself in the collision of technological value and legal value, and solves the problem of imputation principle and regulation construction caused by technology.

    The relationship between law and technology is essentially a collision between two kinds of value. The functional value of technology is determined by its objective attributes, and the social value generated by technology is determined by social regulations. But the concept of technology's social value is too broad, which can be interpreted completely different based on different methodology. Nevertheless, law's respondent to technology's social value is different from the conflicting social evaluation, because the law has its own value setting and logic[1].

    In recent years, in response to the requirements of the era, China's personal information protection legal system is improving constantly. The Civil Code of the People's Republic of China, the Cyber Security Law of the People's Republic of China, and the Data Security Law of the People's Republic of China have not only completed the construction of the basic system, but also established the basic principles and general rules for the protection of personal information. The Personal Information Protection Law of the People's Republic of China (Draft) systematically integrates past practice experience and achieves a breakthrough system supply, marking that China has entered a new stage of comprehensive protection of personal information. The legal system's designs and arrangements have contributed Chinese wisdom and solutions to the world's personal information protection process. Based on the above?mentioned series of legal systems, we can re?examine the security situation of personal information in the era of big data, and build a personal information security protection mechanism from the aspects of technology, legislation, and supervision.

    2 Security Situation Analysis of Personal Information Theft in Big Data Era

    The technology revolution has radically increased the volume and the processing speed of information. As processing technology can release the potential value of big data, the demand for personal information continues to increase. Current information protection is far from perfect, making some companies or individuals vulnerable to illegal information collection or even information theft.

    2.1 The Statistic Analysis of Personal Information Theft in Big Data Era

    According to Risk Based Security Company, which is "a global leader in vulnerability intelligence, breach information and risk ratings"[2], the overall trend of information breaches is rising. The company aggregated publicly available information about data breaches throughout the world, and its Year End Data Breach Report from 2012 to 2020[3] shows that though the number of breaches have some fluctuations, it has been increased constantly year by year (see Fig2.1).

    In 2020, it seems that the number of breaches has decreased (3932 millions) compares to 2019 (7098 millions), however, this trend does not mean fewer breaches are happening. Multiple factors are affecting the number of violations, such as reduced media coverage, no longer targeting personally identifiable information and slow reporting, which together led to a 48% decrease in the number of reported violations.

    The actual number of records lost exposed in information breach may also be underestimated in the last few years. From 2012 to 2020, the rocket growth of lost records' number means that the world is becoming much tougher for information security (see Fig2.2). In 2020, 37186 million records were lost, which was more than twice the amount of records in 2019. This may be due to the enact and application of various information protection regulations with breach notification requirements worldwide, including the European Union's General Information Protection Regulation (GDPR), New York's Cybersecurity Requirements for Financial Services Companies and Australia's Notifiable Information Breach (NDB) Scheme, etc.

    According to Verizon's report, the threat factors which is most likely to cause information breaches in year 2020 are individuals outside the victim organization, accounting for 77% of reported information breaches. In terms of insider threats, 69% of violations can be attributed to employee errors, mistakes or negligence. Of the 82 incidents attributed to malicious insiders, approximately 44% involved the theft of personal information for identity theft or other fraudulent activities. 13.5% of incidents included theft of intellectual property, from proprietary codes to secret designs and formulas[2].

    2.2 Types of Personal Information Theft in the Big Data Era

    The progress of microelectronics technology, computer technology and communication technology has liberated people from material production. Instead, human beings now have more time and energy to engage in science, art, education and other undertakings, and enjoy the economic and cultural benefits brought by technology progress[5]. However, the ensuing negative effects are becoming harder to ignore, computer crimes and viruses, theft of databases and trade secrets, as well as the infringement of privacy rights are occurring frequently, upgrades of traditional theft methods and up?to?date theft technology have posed an alarming threat to personal information protection.

    Technology is a powerful tool, but how to use it and whether it can bring happiness or disasters to mankind is entirely up to us. High?tech has penetrated into all areas of social production and life, greatly promoting the modernization of social production, and comprehensively improving people's quality of life. However, technology itself is innocent, but technological behavior has an inherent duality. If there is a lack of awareness of its potential hazards timely prevention and guidance, these high?tech developments will also bring a series of serious social problems and undermine social stability[4].

    To effectively against cyber security attacks, it is essential to know who is behind the breaches and what are the tactics of adversaries. According to Verizon's 2021 Information Breach Report[3], malicious outsiders are responsible for the biggest percentage of information breach incidents, followed by internal actors. These thefts mainly happened online and can be roughly divided into eight categories, which are social engineering, basic web application attacks, miscellaneous errors, system intrusion, privilege misuse, lost and stolen assets, denial of services and everything else.

    ·System Intrusion: System intrusion capture uses malicious software and/or hackers to achieve their goals in complex attacks, including the deployment of ransomware. Hacking technology theft refers to the act of directly attacking company systems containing large amounts of information to obtain users' personal information. Due to the limitation of security design, security vulnerabilities, such as misconfiguration of various system services or applications are inevitable, and they are easy to be exploited by hackers. Continuous large?scale attacks can also obtain a large amount of personal information in a short period of time.

    ·Privilege Misuse: Accidental behavior directly endangers the security attributes of information assets. This does not include lost equipment, which is classified as theft. The hardest type of information breach to detect, involves mishandling information or installing unapproved software or hardware, either maliciously or accidentally, for access control or account abuse. A direct result of privilege misuse is the loss of sensitive information or shutdown of the critical systems or applications. In practice, the public, healthcare, and finance industries are the primary targets among the various victims of these breaches.

    ·Lost and Stolen Assets: Any loss of information assets, whether due to misplacement or malicious intent. Phishing is the activity of a thief tricking users to input relevant personal information by cloning bank websites and famous e?commerce websites, based on the victims' lack of awareness of these websites. Malware theft means that malicious software, mainly Trojans, spyware and ransomware, secretly collect users' personal information. While hacking, accounted for the biggest percentage of information breach incidents, malware theft is also the major cause of information breach incidents. In many cases, impostors often create invented scenarios to steal personal information or influence the behavior of targeted victims.

    ·Denial of Service Attacks: Designed to compromise the availability of networks and systems, including network and application layer attacks. Many companies tend to put customers' personal information in the public cloud and the information is easy to be stolen due to the poor defense system and little control on it[6]. Besides, increasingly wearable devices can achieve real?time information collection and constant surveillance. Without users' consent, some intelligent equipment may collect personal health information, personal identified information or personal medical information directly into companies' information base for commercial use. This will pose a heavy threat to personal information safety[7]. It must be pointed out that except for the above listed situations, there are also four patterns of breaches which should be paid more attention.

    ·Social Engineering: A person's psychological compromise, which changes their behavior to take action or violate confidentiality regulations.

    ·Basic Web Application Attacks: After the initial web application is attacked, it perform a simple web application attack with a few steps/additional operations.

    ·Miscellaneous Errors: Incidents where unintentional actions directly compromised a security attribute of an information asset. This does not include lost devices, which is grouped with theft instead.

    ·Everything Else: It covers all events that cannot be included into the above types.

    The misuse, abuse, and unethical use of personal information can bring potential or actual social harm to society, cause various social disputes as well. Certain individuals use their technical expertise to improperly gain profits, threatening the public's information safety and personal property. The harm caused by personal information theft must be regulated by corresponding laws, and legal remedies should be given to victims. As for research and development of information achievements, if their application can harm human society and cause irreversible consequences, corresponding legislation should be used to prescribe the scope and nature of the application. Using the normative function of law to suppress the negative impact of information theft behavior on human society, thus to predict and prevent crimes has become the consensus of all countries in the world today[4].

    3 Construct a Technical Response System for Personal Information Theft

    As personal information continues to be severely threatened, a response system constructed by technology should be established to deal with security issues in the era of big data[8]. Although global spending on information security is increasing and new information protection regulations have been introduced, obviously, there is a gap between defense mechanisms and security effectiveness. Personal information security defense has certain deficiencies in terms of technical support, legal protection and supervision.

    The technology to prevent personal information theft is becoming more and more complex. Traditional security solutions focus on network peripheral technologies such as network firewalls, which are not enough in today's big data environment, as personal information is usually distributed outside the organizational boundaries. Since the flow and sharing of information is critical to business success, it ignores the fact that protecting information, instead of boundaries, will be a problem and must be a top priority.

    Although encryption is a basic and reliable technology to protect information[9], such security measures are rarely used (no more than 4.2%) in security breaches reported since 2014. Encryption technology provides varying degrees of access to information stored in heterogeneous environments, and at the same time realizes the effective use of personal information.

    In recent years, a large number of new technologies have emerged for protecting personal information such as consent/information subject rights management[10?11], anonymity[12?13], information minimization[14] and information tracking[15], etc. However, few of them have been put into practice or been widely adopted. There are two reasons for this worrying situation: On the one hand, current economic and regulatory environment hardly motivates companies to adopt new protection technologies. On the other hand, the income of some commercial companies is heavily depending on illegally collecting and processing users' personal information without their affirmative consent. Therefore, these companies have little incentive to deploy such technologies. The availability and trust of these new technologies also pose an obstacle to taking this critical step.

    3.1 Introduction of the Autonomy Based Information Protection Framework

    Based on the analysis of use cases and reported security incidents, a high?level technical framework has been proposed to protect personal information. The framework below is also deemed as an evolution of prior work described by Whitley and Jordi, and Josep[11?12] (see Fig3.1).

    In this data protection framework, the user's data is propagated with the user's privacy preferences. Combined with the security policies of the entity, the generated security rules can be enforced in the organization within the trust domain by the security mechanism inherent in the framework. In contrast to prior works[10?11], this framework does not heavily rely on the Trust Authority (TA), instead it offers an offline management scheme. The organization in the trust domain is autonomous, which means that the entity can decide how to deal with user's data and what data should be released for specific purpose.

    The Trust Authority (TA) sits at the heart of the trust domain acting as administrator and Certificate Authority (CA). The TA performs the compliance check for all organizations in the domain. If all compliance checks are satisfied and all requirements are fulfilled, the TA releases the certificates to the qualified organization. Otherwise, the TA will suspend the certificates of organizations which violate the domain security specification or result in data breaches.

    After necessary and successful identity authentication, the customer negotiates with the security entity about the privacy of the user data. When the agreement has been reached, the customer delivers his encrypted and signed data under the protection of the public key of the entity which is obtained from the organization's certificate.

    In formula 3.1, the data and the user's preferences are concatenated to form the delivering message (MSG).

    In formula 3.2, the user signs the hash of the MSG using his private key and concatenates the signature with delivering message(MSG). Subsequently, the concatenated message is encrypted with a symmetric key K, and the symmetric key K is encrypted with the organization's public key extracted from the organization's certificate. Along with the user's certificate, all of the foregoing messages are sent to the organization, as shown in the formula 3.3:

    Only with the paired private key (PRorg) corresponding to valid certificate, the organization can decrypt E(PUorg, K) to get the symmetric key K and subsequently decrypt the MSG_ENC in 3.2 using the key K. After getting the message and signature (MSG||Sig[PRuser,H(MSG)]), the entity can verify the signature using the user's public key extracted from the user's certificate. Obviously, the valid certificate of the organization issued by the TA is the real key point to access the trust domain, with which the TA can fulfill his management responsibilities and ensure the security mechanism of the data protection framework is working properly.

    While an organization (e.g. organization B) requests the data within the scope of another (e.g. organization A) in the trust domain, organization A will retrieve the security rules and initiate the similar process mentioned above. Besides the retrieved security rules, organization A could append additional rules with the data according to his security regulation. As illustrated in formula 3.4, organization A may generate a watermarked message by encoding the digital signature S into the delivering message MSG_DELIVER.

    For example, every audio file downloaded in Apple's iTunes contains the encoded signature consisting of the real name and apple ID of the user. Thus, the watermarked message could be used to identify and track the source of leaked data.

    If the receiving parties (e.g. organization E and F) are not in the trust domain, the request must be strictly assessed and censored according to security policies. The released data should be sanitized and contains no privacy or confidential information. For instance, some sensitive details can be omitted or encrypted and only content consistent with security requirement can be disclosed. The external data flow monitor intercepts and tracks the data flowing through the border of the trust domain. Under the supervision of the external data flow monitor, the risk of information propagation was evaluated and security policies of the trust domain was checked. If appropriate, the external data flow monitor could act as an entrance of audit service.

    3.2 Trusted Architecture of an Autonomous Organization

    For the autonomous organization in the trust domain, we propose a flexible and component?based architecture to provide a certain degree of trust required by the Trust Authority (TA). The trusted architecture can be customized and deployed consistently with the business processes of the organizations. The components in the architecture can be deployed in the cloud environment or implemented in an overall stand?alone infrastructure.

    The system implemented with these components provides privacy?aware and fine grained access control. Each data in the system is explicitly bound with the data owner and rules which are enforced by different keys generated by the key manager. The security data bus guarantees the security policies by layering and abstraction mechanisms which also enable comprehensive and easier logging and auditing. And the log service records the concerned events and supports the risk assessment/management component to perceive and supervise the situation of the system.

    The overall set of functionalities and components of the architecture are illustrated in Fig3.2.

    An autonomous organization in a trust domain should include but not limited to the following components:

    ·Portal & HMI (Human Machine Interface): Besides identity authentication, this component provides human machine interface and interacts/negotiates with the user to reach an agreement about privacy. The interface provides privacy choices and explains the privacy practices involved. After the choices are made, the user's privacy preference (preference in formula 3.1) is generated and the user can send the encrypted and signed data MSG_DELIVER in formula 3.3 with the help of the web plugin. After decrypting and verifying the MSG_DELIVER, this component sends MSG in formula 3.1 to the Policy Manager & Data Classifier component.

    ·Policy Manager & Data Classifier: Combined with the system security policies of the organization, this component transforms the user's privacy preference into machine?readable rules which can be automatically put into effect. This component also classifies the user data into predefined categories according to the generated security rules.

    ·Encryption Key Manager: To provide necessary granularity of data access, a related encryption key manager is a prerequisite. Based on the user's security rules, the encryption key manager interacts with the policy manager and releases keys for different purposes, which provides the user with flexible and fine?grained control over access and usage of his data.

    ·Data Registry Manager & Data Registry: In order to enforce the security policies of the system, the data registry manager keeps track of the owner of the data, the associated rules/keys and the location the data stored. The data registry manager stores or updates this meta information in the data registry whenever the user data is created or updated.

    ·Security Data Bus: The introduction of the security data bus in the system architecture embodies the design philosophy of layering and abstraction. The data within the organization can only be accessed through the security data bus in the general layer. When access requests for data are made to the security data bus, it will retrieve all relevant information in the data registry through the data registry manager. Equipped with all necessary information, the security data bus retrieves and decrypts compliance data from the business data repository.

    ·Log Service: This component intercepts the flows of data within the system and logs what happens in the organization. Furthermore, it acts as the underlying and fundamental service for the risk assessment/management and compliance checks of the TA.

    ·Risk Assessment & Management: Based on the log service, predefined security policies and known threats, this component performs analysis to help administrators identify security incidents and potential risks. It is the crucial service to fix the gap between security policies and mechanisms.

    4 Technical and Legal Responses to Personal Information Theft in Big Data Era

    Through the above?mentioned analysis of personal information theft situation worldwide and security prevention mechanism design, it is easy to find that in order to improve personal information protection level in the era of big data, the improvement of relevant legislation, the improvement of supervision mechanism, and the strengthening of technical protection are all in need[15]. The effective way to deal with the potential risks brought by science and technology is to actively avoid and respond to these risks. For the supervision of personal information theft activities, information privacy control strategies such as information privacy standardization and corporate licensing can be adopted, and strict restraint, prohibition and punishment mechanisms for information research, development, transformation, application and promotion processes can also be established to achieve full control of personal information theft risks. Information protection law aims at using civil, administrative, and criminal means comprehensively, which can both promote information technology progress and ensure that technology works for the benefit of mankind.

    4.1 Upgrade and Develop Personal Information Security Technologies

    Data encryption technology and data anonymity technology are not the final solution to user's privacy, but will be an important link in the final solution, providing technical support to protect the user's data privacy rights. A comprehensive and systematic solution of personal information to user data privacy can effectively prevent all privacy risks that users may face during the storage, transmission, and utilization process.

    The new anonymization technology must be able to effectively process large?scale and multiple types of data in a short time, which requires different encryption methods for different types of data, such as k?anonymity technology for image data. For text data, that is easy to be recognized and replaced, ontology and dictionary technology are required. The encryption technology allows all access objects to perform a keyword search on encrypted data, which is also applicable for complex searches. As far as encryption technology is concerned, it is necessary to improve the processing capability and data access capability of unstructured data, such as increasing the development of public key searchable encryption, which allows all access objects to encrypt keyword search.

    The inherent shortcomings of anonymization technology and encryption technology are difficult to overcome in a short time, so new technical means are needed to achieve full protection of personal information privacy. In recent years, some new technical solutions have been used gradually. For example, the automated security policy enforcement mechanisms can achieve privacy and security requirements for personal information. Trusted computing under this solution uses tamper?proof hardware storage. A machine?readable strategy is adopted and the data is encrypted twice. The outer encryption layer can only be decrypted by trusted hardware, and the inner encryption layer can only be decrypted by software that meets the policy requirements.

    In addition, data provenance technology can prove the source, authenticity, and quality of personal information, which can analyze the leaks of user privacy. The function of data origin technology is to build a mechanism that facilitates the data subject to track the data processing process, even if the personal information has been converted and circulated many times, it can be tracked accurately. In addition, by establishing a time?series profile of behaviors, data controllers can use it to strictly monitor employees who may illegally steal user data and prevent insider threats.

    4.2 Implement Personal Information Protection Law from Civil Law Perspective

    Nowadays, the scope of personal information rights has become much wider, not only beyond the scope of traditional civil rights, but also breaking through the boundary of public and private law[16]. Personal information protection has some unique characters such as cross legal departments, multiple features, as well as integration of public law and private law[17]. According to the pattern of personal information operation, a comprehensive rights protection mechanism must be designed, by connecting different law departments, sanction for infringements, and finally build a complete personal information rights protection system. The Personal Information Protection Law should determine the specific types of personal information protection by enumerating methods, thereby limiting the specific protection scope of personal information and clarifying the specifics of personal information rights.

    As a new type of right, personal information right has rich connotations. Personal Information Protection Law of the People's Republic of China (2021) stipulates that natural people have personal information rights. The processing of personal information include collection, retention, use, handling, transmission, provision, disclosure, erasure, etc. of personal information. Processing of personal information shall abide by the principles of legality, good faith, necessity and integrity. It shall not be conducted by means that are fraudulent, misleading, or coercive, etc.

    Once personal information cannot be guaranteed, the individual basis of modern society will be severely violated. For example, the cross?border transmission and use of personal information such as genetic information, political preferences, etc., has exceeded the traditional business scope, and may potentially affect the social stability or even national security of the personal information transferred country. In essence, personal information right not only includes spiritual and material rights, but also civil liberties.

    In the civil field, the principles of collecting and processing personal information should be extended to the entire civil field. The basic requirements for personal information protection are indispensable, and an individual's right of personal information should be a legal right. For example, people who have disputes about personal information should have the right to view the information. When someone's personal information is improperly processed, he can opt out and request for compensation.

    In order to ensure the security of citizens' basic information rights, the administrative supervision and accountability mechanisms for individuals should be clarified. To achieve the integration of power and responsibility, it is also necessary to increase social participation. There are two main models of personal information protection laws in developed countries. One is the loose model of European countries, the other is a centralized model. These two models both have their advantages and disadvantages. The loose model has an expanding group, but it may harm modern administration. For the centralized model, its work efficiency is higher, but it faces the risk of confusion due to the lack of supervision atmosphere and determination[18]. Taking into account the various situations of personal information protection, it is recommended to establish a new type of administrative supervision system that focuses on the State Internet Information Office and the Ministry of Industry and Information Technology, and supplements other regulatory agencies. In this way, the distribution of administrative resources will be more reasonable, and the benefits of the personal information model will be better protected. This can also avoid conflicts of power and games of shirking responsibility.

    4.3 Implement Personal Information Protection Law from Criminal Law Perspective

    Well protection of personal information can effectively prevent and reduce cybercrimes. Article 253 of the Chinese Criminal Law establishes personal information infringement crime, which not only effectively protects personal information, but also responses to the demands of the information technology era. In the description of personal information infringement, it also pointed out that such crimes violated the Personal Information Protection Law, the Cyber Security Law and other related personal information protection laws and regulations of China.

    From the perspective of criminal law, it is necessary to clarify the boundaries of personal information infringement. The criminal law is the last resort for personal information protection, and the protection of personal information by the criminal law depends on the further in?depth study of the laws of other departments. Without a legal source, obtaining a large amount of personal information constitutes a criminal offence. Personal information behaviors can be divided into three steps: information collection, information transmission, and information utilization. In order to avoid the vacancies in criminal laws and regulations and achieve comprehensive protection of personal information, the government can regulate the possible violations of personal information during different process.

    In China, the frequency of crimes related to personal information is increasing. The current decentralized laws and regulations can no longer meet people's growing personal information protection needs, and relevant laws should be improved to fully protect the security of personal information. For further legislation, it is necessary to distinguish natural persons and legal person subjects in personal information theft crimes, to classify the status of staff members in the personal information theft crimes, and to expand the subject of natural persons' crimes. The criminal subject should also include staff of non?authority agencies, finance, telecommunications and other legal persons.

    4.4 Summary and Suggestions

    In practice, the following factors should be considered when handling personal information security cases:

    ·Ensure the legality of consent rules for personal information collection as well as the limited willingness to use personal information. The consent rules should ensure the legality of personal information collection, and the limited willingness to use it is to ensure the legality of the use of personal information.

    ·Clarify the security obligations of personal information controllers in case of information theft or leakage. Regarding the security obligations of personal information controllers, the purpose is to prevent data leakage or theft.

    ·Specify the scope of personal information and clarify the content of personal information rights. The scope of personal information and personal information rights should be clarified.

    ·Improve personal information protection remedial measures, provide victims with available remedial measures and introduce punitive damages. The personal information protection law should list some typical personal information, limit the scope of personal information protection, and clarify the content of personal information rights. Improve personal information protection remedial measures.

    ·Consider various factors while making judgments, such as the amount of personal data, subjective maliciousness of information controller, source of information, compensation for damages, etc. The personal information protection law should provide victims with available remedial measures and even introduce punitive damages.

    In summary, personal information right has the characteristics of both moral and material rights[19]. The legal reform of personal information regulation must be adjusted and improved in terms of structural plasticity, system compatibility, mechanism flexibility, and timing flexibility, so as to effectively prevent technological risks on the basis of ensuring innovation. In response to the demands of people's information rights protection in this era, it is necessary to expand the horizons to the constitutional level, absorb overseas experience, protect personal information with constitutional rights[20], strengthen the construction of social liability ethics[21], and build a more scientific and complete legal system for personal information protection.

    References:

    [1] Zheng Yushuang. Solving the Problem of Technological Neutrality?Jurisprudence Rethinking the Relationship between Law and Technology[J]. Journal of East China University of Political Science and Law. Issue, 2018(1): 91?92.

    [2] Risk Based Security. 2021. Homepage[DB/OL]. [2012?10?20]. <https://www.riskbasedsecurity.com/>.

    [3] Risk Based Security. 2020 Year End Report Data Breach QuickView[DB/OL]. [2021?06?22]. https://pages.riskbasedsecurity.com/en/en/2020?yearend?data?breach?quickview?report.

    [4] Verizon. 2020 Data Breach Investigations Report[DB/OL]. [2021?06?22]. https://enterprise.verizon.com/resources/?page=1.

    [5] Fu Zitang. On the Regulatory Function of Law to Scientific and Technological Behavior in the Era of Knowledge Economy[J]. Studies in Law and Business. Issue, 2000(1): 5.

    [6] SEN, J. Security and Privacy Issues in Cloud Computing[J]. International Journal of Grid & Distributed Computing, 2013, 06(55): 238?252.

    [7] Gao Yutong. Wearable Devices and Personal Information Security[J]. Security Science and Technology, 2015(3): 69?71.

    [8] Diao Shenxian and Qing qin. International Experiences and Reference of Personal Information's Administrative Protection[J]. Chong Qing Philosophy & Social Science, 2011(5): 68?74.

    [9] Lv Xin and Han Xiaolu. Technological Architecture Research of Big Data Security and Privacy Protection[J]. Information Security Research, 2016(3): 244?250.

    [10] Siani Pearson and Marco Casassa Mont. Sticky Policies: An Approach for Managing Privacy Across Multiple Parties[J]. Computer, 2011, 09(44): 60?68.

    [11] Edgar A.Whitley. Informational Privacy, Consent and the "control" of Personal Data[J]. Information Security Technical Report, 2009, 14(3): 154?159.

    [12] Joria?Comas, J. and Dimingo?Ferrer, J. Big Data Privacy: Challenges to Privacy Principles and Models[J]. Data Science & Engineering, 2016(1): 21?28.

    [13] Wang Pinshui and Wang Jiandong. Overview of Anonymized Privacy Protection Technology Research[J]. Small and Micro Computer System, 2011(2): 248?252.

    [14] Andreas Pfitzmann and Marit Hansen. A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity,? and Identity Management[DB/OL]. [2021?04?05].? ?https://dud.inf.tudresden.de/literatur/Anon_Terminology_v0.34.pdf.

    [15] William Enck et al. TaintDroid: An Information?Flow Tracking System for Realtime Privacy Monitoring on Smartphones[J]. A?CM Transactions on Computer Systems, 2014,06(32): 1?29.

    [16] Zhou Hanhua. Legal Positioning of Personal Information Protection[J]. Studies in Law? and Business, 2021(3), 44?56.

    [17] Ouyang Benqi. Redefining the Legal Interests in Criminalization of the Infringement of Citizens' Personal Information: A Shift from Private Law Rights to Public Law Rights[J]. Journal of Comparative Law, 2021(3), 55?68.

    [18] Song Huiyu. Legal Control of Administrative Supervision[J]. Changhai Journal, 2012(3): 86?90.

    [19] Liu Yanhong. The Legal Interests of the Crime of Infringing Citizens' Personal Information: Confirmation of Personal Legal Interests and New Rights[J]. Criminal Science, 2019(5)19?33.

    [20] Wang Xixin, Guo Chun. The Constitutional Basis of the Personal Information Protection Legal System[J].Tsinghua University Law Journal, 2021(3), 6?24.

    [21] Ma Zhiguo, Zhao Shiqiao. The Characteristics and Systematic Optimization of Scientific and Technological Legal Liability[J]. Science Technology and Law, 2021(1): 96?110.

    防止個(gè)人信息竊取的技術(shù)手段與應(yīng)對(duì)機(jī)制

    何培育 滕小碩 苗華

    (1.重慶理工大學(xué) 重慶知識(shí)產(chǎn)權(quán)學(xué)院,重慶400054;2.廣東外語(yǔ)外貿(mào)大學(xué)南國(guó)商學(xué)院 經(jīng)濟(jì)學(xué)院,廣州510545;3.重慶理工大學(xué) 計(jì)算機(jī)科學(xué)與工程學(xué)院,重慶 400054)

    摘? ? 要:互聯(lián)網(wǎng)技術(shù)在給現(xiàn)代生活帶來(lái)極大便利的同時(shí),也為犯罪分子提供了可乘之機(jī)。犯罪分子通過(guò)黑客、惡意軟件、社會(huì)攻擊、特權(quán)濫用和新技術(shù)竊取等信息竊取手段,收集和竊取高價(jià)值的個(gè)人信息,嚴(yán)重危害個(gè)人信息安全,引發(fā)各種社會(huì)問(wèn)題。目前,個(gè)人信息保護(hù)法律體系的不完善,相關(guān)技術(shù)概念的界定不明確,盜賊刑事責(zé)任追究難度大等問(wèn)題都對(duì)我國(guó)建立個(gè)人信息保護(hù)機(jī)制造成了不利影響。因此,文章分析了個(gè)人信息被竊取的技術(shù)手段,構(gòu)建了個(gè)人信息保護(hù)框架,認(rèn)為通過(guò)完善現(xiàn)行法律法規(guī),制定個(gè)人信息保護(hù)專項(xiàng)法律,明確法律監(jiān)督和問(wèn)責(zé)機(jī)制,可以降低個(gè)人信息被盜用的風(fēng)險(xiǎn)。

    關(guān)鍵詞:信息安全; 網(wǎng)絡(luò)安全技術(shù);自主信息保護(hù)框架;個(gè)人信息盜竊響應(yīng)系統(tǒng);個(gè)人信息保護(hù)法

    猜你喜歡
    網(wǎng)絡(luò)安全技術(shù)信息安全
    信息安全不止單純的技術(shù)問(wèn)題
    基于模糊綜合評(píng)價(jià)法的信息安全風(fēng)險(xiǎn)評(píng)估模型
    基于模糊綜合評(píng)價(jià)法的信息安全風(fēng)險(xiǎn)評(píng)估模型
    基于應(yīng)用型人才培養(yǎng)的網(wǎng)絡(luò)安全技術(shù)實(shí)驗(yàn)課程教學(xué)改革
    網(wǎng)絡(luò)安全技術(shù)與公安網(wǎng)絡(luò)系統(tǒng)安全研究
    蜜罐技術(shù)在網(wǎng)絡(luò)安全領(lǐng)域中的應(yīng)用
    《網(wǎng)絡(luò)安全技術(shù)》實(shí)驗(yàn)教學(xué)改革初探
    2014第十五屆中國(guó)信息安全大會(huì)獎(jiǎng)項(xiàng)
    信息安全管理
    午夜福利乱码中文字幕| 亚洲精品久久午夜乱码| 麻豆乱淫一区二区| 欧美黑人精品巨大| 国产伦人伦偷精品视频| 一区二区av电影网| 高清不卡的av网站| 亚洲伊人色综图| 男女床上黄色一级片免费看| 黄片无遮挡物在线观看| 久久综合国产亚洲精品| 999精品在线视频| 美女中出高潮动态图| 大陆偷拍与自拍| 久久这里只有精品19| 丁香六月欧美| 韩国精品一区二区三区| 免费高清在线观看日韩| 精品一区二区免费观看| 一级毛片我不卡| 亚洲专区中文字幕在线 | 菩萨蛮人人尽说江南好唐韦庄| 国产人伦9x9x在线观看| 亚洲成人一二三区av| 亚洲,欧美精品.| av网站免费在线观看视频| 成年女人毛片免费观看观看9 | 精品少妇一区二区三区视频日本电影 | 日本黄色日本黄色录像| 午夜老司机福利片| 亚洲精品av麻豆狂野| 飞空精品影院首页| 日韩熟女老妇一区二区性免费视频| 美女主播在线视频| 中文字幕av电影在线播放| 在线观看www视频免费| 国产成人午夜福利电影在线观看| 亚洲激情五月婷婷啪啪| av一本久久久久| 国产99久久九九免费精品| 亚洲综合精品二区| 一级a爱视频在线免费观看| 国产精品久久久久久精品古装| 女人被躁到高潮嗷嗷叫费观| 日日啪夜夜爽| 亚洲精品久久成人aⅴ小说| 精品少妇黑人巨大在线播放| 国产熟女欧美一区二区| 一区二区三区精品91| 国产麻豆69| 男女高潮啪啪啪动态图| 99久久综合免费| 欧美精品亚洲一区二区| 欧美日韩亚洲高清精品| 国产一区有黄有色的免费视频| 亚洲第一青青草原| 国产av码专区亚洲av| 只有这里有精品99| 中文精品一卡2卡3卡4更新| 最近手机中文字幕大全| 婷婷成人精品国产| 亚洲国产看品久久| 欧美xxⅹ黑人| 日韩av免费高清视频| 2021少妇久久久久久久久久久| 十八禁高潮呻吟视频| av有码第一页| 精品一区二区三区四区五区乱码 | 高清av免费在线| 亚洲四区av| 在线观看一区二区三区激情| 亚洲欧美一区二区三区黑人| 制服人妻中文乱码| 飞空精品影院首页| 你懂的网址亚洲精品在线观看| 一本—道久久a久久精品蜜桃钙片| 人妻人人澡人人爽人人| 一区福利在线观看| 一区二区三区精品91| 黄片播放在线免费| 国产欧美日韩一区二区三区在线| 狠狠婷婷综合久久久久久88av| 成人国产av品久久久| 精品少妇黑人巨大在线播放| av片东京热男人的天堂| 久热爱精品视频在线9| 另类亚洲欧美激情| 只有这里有精品99| 色播在线永久视频| 国产色婷婷99| 一级片免费观看大全| 国产精品三级大全| 最近2019中文字幕mv第一页| a级片在线免费高清观看视频| 18在线观看网站| 天堂8中文在线网| 欧美 日韩 精品 国产| 国产在线视频一区二区| 桃花免费在线播放| 国产黄色视频一区二区在线观看| 国产欧美亚洲国产| 少妇的丰满在线观看| 不卡av一区二区三区| 国产色婷婷99| 黄频高清免费视频| av免费观看日本| 亚洲人成77777在线视频| 免费在线观看完整版高清| videosex国产| 亚洲美女黄色视频免费看| av网站在线播放免费| 天堂8中文在线网| 国产精品久久久久久精品电影小说| 18禁动态无遮挡网站| 免费在线观看完整版高清| 大陆偷拍与自拍| 亚洲精品久久久久久婷婷小说| 久久性视频一级片| 一区在线观看完整版| 色婷婷av一区二区三区视频| xxx大片免费视频| 色视频在线一区二区三区| 人妻人人澡人人爽人人| 侵犯人妻中文字幕一二三四区| 丝瓜视频免费看黄片| 精品一品国产午夜福利视频| 亚洲成色77777| 亚洲精品aⅴ在线观看| 欧美人与性动交α欧美精品济南到| 性少妇av在线| 国产成人免费观看mmmm| √禁漫天堂资源中文www| 国语对白做爰xxxⅹ性视频网站| 亚洲av综合色区一区| 国产精品香港三级国产av潘金莲 | 国产精品国产三级国产专区5o| 精品亚洲乱码少妇综合久久| 免费看不卡的av| 欧美日韩综合久久久久久| 成人黄色视频免费在线看| 久久久精品94久久精品| av不卡在线播放| 三上悠亚av全集在线观看| 黄片小视频在线播放| 亚洲一码二码三码区别大吗| 免费不卡黄色视频| 丁香六月欧美| 丝袜喷水一区| 电影成人av| 国产精品女同一区二区软件| 在线观看人妻少妇| 欧美亚洲 丝袜 人妻 在线| 久久99热这里只频精品6学生| 国产深夜福利视频在线观看| 亚洲激情五月婷婷啪啪| netflix在线观看网站| 国产又爽黄色视频| 亚洲天堂av无毛| 午夜日韩欧美国产| 久久狼人影院| 国产成人精品在线电影| 99国产精品免费福利视频| 少妇人妻精品综合一区二区| 亚洲少妇的诱惑av| 午夜福利乱码中文字幕| 成年美女黄网站色视频大全免费| 99热国产这里只有精品6| 黑人欧美特级aaaaaa片| 老司机在亚洲福利影院| 精品亚洲成国产av| 精品酒店卫生间| 超色免费av| 国产精品三级大全| 美女国产高潮福利片在线看| tube8黄色片| 亚洲成人av在线免费| 日韩伦理黄色片| 亚洲色图综合在线观看| 美女视频免费永久观看网站| 高清视频免费观看一区二区| 欧美日韩综合久久久久久| 国产亚洲午夜精品一区二区久久| 黑人巨大精品欧美一区二区蜜桃| 视频在线观看一区二区三区| 日韩欧美精品免费久久| 日本黄色日本黄色录像| 黑人猛操日本美女一级片| 欧美成人精品欧美一级黄| 叶爱在线成人免费视频播放| 久久精品久久精品一区二区三区| 精品国产一区二区三区四区第35| 久久久精品国产亚洲av高清涩受| 热re99久久国产66热| 男女午夜视频在线观看| 两性夫妻黄色片| 一区二区三区乱码不卡18| 国产av一区二区精品久久| 99精品久久久久人妻精品| 卡戴珊不雅视频在线播放| 美女午夜性视频免费| 成人手机av| 又黄又粗又硬又大视频| 亚洲成人国产一区在线观看 | 国产麻豆69| 国产精品久久久久久精品电影小说| 老汉色av国产亚洲站长工具| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲国产欧美日韩在线播放| 中文字幕人妻丝袜制服| 国产99久久九九免费精品| 欧美精品高潮呻吟av久久| 国产精品无大码| 日韩免费高清中文字幕av| 亚洲视频免费观看视频| 亚洲一卡2卡3卡4卡5卡精品中文| 丝袜脚勾引网站| 九草在线视频观看| 成人影院久久| 国产xxxxx性猛交| 别揉我奶头~嗯~啊~动态视频 | 一本久久精品| 精品人妻熟女毛片av久久网站| 亚洲精品乱久久久久久| 婷婷成人精品国产| 久久久亚洲精品成人影院| 午夜福利视频精品| 亚洲在久久综合| 精品久久蜜臀av无| 伊人久久大香线蕉亚洲五| 美女大奶头黄色视频| 亚洲婷婷狠狠爱综合网| 亚洲国产日韩一区二区| 一级毛片电影观看| 少妇精品久久久久久久| 免费在线观看黄色视频的| 欧美日韩av久久| 成人亚洲精品一区在线观看| 久久久久久久久免费视频了| 一区福利在线观看| av又黄又爽大尺度在线免费看| 999精品在线视频| 纵有疾风起免费观看全集完整版| 欧美日韩国产mv在线观看视频| 久久天堂一区二区三区四区| 免费久久久久久久精品成人欧美视频| tube8黄色片| 观看av在线不卡| 国产精品嫩草影院av在线观看| 欧美激情极品国产一区二区三区| 亚洲av电影在线观看一区二区三区| 精品亚洲成国产av| 精品久久久久久电影网| 欧美成人精品欧美一级黄| 一级片免费观看大全| 一区二区三区乱码不卡18| 精品人妻熟女毛片av久久网站| 亚洲国产中文字幕在线视频| 波多野结衣av一区二区av| 欧美日韩福利视频一区二区| 免费黄色在线免费观看| 电影成人av| 美国免费a级毛片| 高清视频免费观看一区二区| 国产人伦9x9x在线观看| 两个人免费观看高清视频| 七月丁香在线播放| 婷婷成人精品国产| 在线观看免费日韩欧美大片| 热99国产精品久久久久久7| 色94色欧美一区二区| 搡老乐熟女国产| 天天躁狠狠躁夜夜躁狠狠躁| 日韩制服骚丝袜av| 男人舔女人的私密视频| 最黄视频免费看| 免费黄色在线免费观看| 亚洲七黄色美女视频| 一二三四中文在线观看免费高清| 人人妻人人爽人人添夜夜欢视频| 免费av中文字幕在线| 国产日韩欧美亚洲二区| 国产欧美日韩综合在线一区二区| 天堂俺去俺来也www色官网| 亚洲成国产人片在线观看| 最近的中文字幕免费完整| 在线天堂最新版资源| 国产成人免费无遮挡视频| 1024香蕉在线观看| 中文字幕最新亚洲高清| 亚洲视频免费观看视频| 亚洲精品国产色婷婷电影| 国产xxxxx性猛交| 菩萨蛮人人尽说江南好唐韦庄| 国产亚洲一区二区精品| 亚洲一区二区三区欧美精品| av国产久精品久网站免费入址| 国产亚洲av片在线观看秒播厂| 波多野结衣一区麻豆| 丰满少妇做爰视频| a级片在线免费高清观看视频| xxx大片免费视频| 97在线人人人人妻| av片东京热男人的天堂| 熟妇人妻不卡中文字幕| 视频区图区小说| 亚洲精品国产区一区二| 又大又爽又粗| 国产精品一区二区精品视频观看| 亚洲国产欧美一区二区综合| 国产黄色视频一区二区在线观看| 日韩av不卡免费在线播放| 女性被躁到高潮视频| 精品国产露脸久久av麻豆| 日韩av免费高清视频| 免费黄色在线免费观看| 高清视频免费观看一区二区| 美女主播在线视频| 一二三四中文在线观看免费高清| 国产日韩欧美亚洲二区| 男女下面插进去视频免费观看| 久久人人爽av亚洲精品天堂| 亚洲伊人色综图| 最近最新中文字幕大全免费视频 | netflix在线观看网站| 考比视频在线观看| 国产国语露脸激情在线看| 欧美人与性动交α欧美软件| 亚洲欧美成人精品一区二区| 精品一区二区三区四区五区乱码 | 精品卡一卡二卡四卡免费| 久久狼人影院| 美女主播在线视频| 成年人午夜在线观看视频| 亚洲,欧美,日韩| 桃花免费在线播放| 热re99久久精品国产66热6| 亚洲欧美一区二区三区黑人| xxxhd国产人妻xxx| 亚洲国产毛片av蜜桃av| 女人精品久久久久毛片| 精品亚洲成a人片在线观看| 婷婷色综合大香蕉| 亚洲精品国产区一区二| 欧美精品一区二区免费开放| 美女视频免费永久观看网站| 在线观看免费午夜福利视频| 亚洲精品国产区一区二| 最黄视频免费看| 国产成人欧美| 国产熟女午夜一区二区三区| 亚洲欧美激情在线| 精品酒店卫生间| 国精品久久久久久国模美| 老汉色av国产亚洲站长工具| 啦啦啦视频在线资源免费观看| 男女床上黄色一级片免费看| 国产99久久九九免费精品| 亚洲精品美女久久久久99蜜臀 | 超碰97精品在线观看| 久久精品亚洲av国产电影网| 精品国产超薄肉色丝袜足j| 大香蕉久久成人网| 激情视频va一区二区三区| 又大又爽又粗| 国产乱来视频区| 超色免费av| 建设人人有责人人尽责人人享有的| 亚洲一区二区三区欧美精品| 丰满饥渴人妻一区二区三| 国产黄频视频在线观看| 免费看av在线观看网站| 日本色播在线视频| 久久久久久人人人人人| 又大又黄又爽视频免费| 熟妇人妻不卡中文字幕| 亚洲免费av在线视频| 无遮挡黄片免费观看| 成人国产av品久久久| 一级毛片 在线播放| 国产在线一区二区三区精| 日韩一卡2卡3卡4卡2021年| www.自偷自拍.com| e午夜精品久久久久久久| 乱人伦中国视频| 色婷婷av一区二区三区视频| 巨乳人妻的诱惑在线观看| 国产亚洲欧美精品永久| 人妻 亚洲 视频| 国产视频首页在线观看| 精品少妇黑人巨大在线播放| 91精品伊人久久大香线蕉| 欧美最新免费一区二区三区| av不卡在线播放| 男女下面插进去视频免费观看| 下体分泌物呈黄色| 亚洲精品日韩在线中文字幕| 日韩中文字幕欧美一区二区 | 国产av国产精品国产| 在线天堂中文资源库| 91精品国产国语对白视频| 国产高清不卡午夜福利| 国产精品熟女久久久久浪| 交换朋友夫妻互换小说| 最近的中文字幕免费完整| 超色免费av| 老汉色∧v一级毛片| 日本午夜av视频| 欧美日韩亚洲高清精品| 国产精品一国产av| 黄色 视频免费看| 日本一区二区免费在线视频| 亚洲av在线观看美女高潮| 精品久久久久久电影网| 国产免费又黄又爽又色| 国产人伦9x9x在线观看| 日韩,欧美,国产一区二区三区| 天美传媒精品一区二区| 九草在线视频观看| 午夜福利影视在线免费观看| 精品福利永久在线观看| 在线观看www视频免费| 午夜av观看不卡| 熟妇人妻不卡中文字幕| 成年女人毛片免费观看观看9 | 国产欧美亚洲国产| 一级毛片我不卡| 国产福利在线免费观看视频| 日韩一区二区三区影片| 免费在线观看黄色视频的| 高清在线视频一区二区三区| 亚洲精品国产一区二区精华液| 免费看不卡的av| 日韩成人av中文字幕在线观看| 国产精品.久久久| 亚洲婷婷狠狠爱综合网| 国产成人精品久久二区二区91 | 高清黄色对白视频在线免费看| 水蜜桃什么品种好| 波多野结衣一区麻豆| 亚洲图色成人| 大码成人一级视频| 亚洲欧美成人精品一区二区| 91精品国产国语对白视频| 精品国产露脸久久av麻豆| 美女国产高潮福利片在线看| 成人手机av| 成年av动漫网址| 亚洲成国产人片在线观看| 久久精品aⅴ一区二区三区四区| 国产人伦9x9x在线观看| 美女高潮到喷水免费观看| 青春草国产在线视频| 蜜桃在线观看..| 日本猛色少妇xxxxx猛交久久| 国产乱人偷精品视频| 国产熟女午夜一区二区三区| 777久久人妻少妇嫩草av网站| 国产熟女欧美一区二区| av卡一久久| 在线天堂中文资源库| 欧美日韩视频高清一区二区三区二| 国产精品久久久人人做人人爽| 2018国产大陆天天弄谢| tube8黄色片| 十分钟在线观看高清视频www| 老熟女久久久| 视频区图区小说| 亚洲欧美色中文字幕在线| 男女国产视频网站| 国产在线视频一区二区| 国产精品久久久久成人av| 欧美精品人与动牲交sv欧美| 热re99久久精品国产66热6| 国产精品秋霞免费鲁丝片| 美女午夜性视频免费| 成人漫画全彩无遮挡| 黄色一级大片看看| 色婷婷久久久亚洲欧美| 18在线观看网站| 成年av动漫网址| 亚洲综合色网址| 亚洲国产精品999| 国产免费视频播放在线视频| 男女之事视频高清在线观看 | 老司机靠b影院| 日日撸夜夜添| 两个人免费观看高清视频| 成人黄色视频免费在线看| 国产在线一区二区三区精| 美女扒开内裤让男人捅视频| 不卡视频在线观看欧美| 午夜福利影视在线免费观看| 日韩av在线免费看完整版不卡| 中文字幕亚洲精品专区| 狂野欧美激情性xxxx| 亚洲成人国产一区在线观看 | 新久久久久国产一级毛片| 多毛熟女@视频| 亚洲精品美女久久久久99蜜臀 | 久久国产精品男人的天堂亚洲| 国产视频首页在线观看| 美女高潮到喷水免费观看| 五月天丁香电影| 欧美日韩成人在线一区二区| 十八禁高潮呻吟视频| 男女高潮啪啪啪动态图| 人人妻人人澡人人爽人人夜夜| 欧美日韩av久久| 欧美人与性动交α欧美精品济南到| 极品少妇高潮喷水抽搐| www.熟女人妻精品国产| 亚洲中文av在线| 男人爽女人下面视频在线观看| 欧美日韩视频精品一区| 丝袜喷水一区| 精品一区二区三区av网在线观看 | 综合色丁香网| 亚洲第一区二区三区不卡| 国产乱来视频区| 国产国语露脸激情在线看| 久久精品熟女亚洲av麻豆精品| 人人澡人人妻人| 亚洲成人av在线免费| 亚洲五月色婷婷综合| 亚洲国产av影院在线观看| 日韩精品免费视频一区二区三区| 亚洲精品av麻豆狂野| 永久免费av网站大全| 国产精品久久久久久精品古装| 各种免费的搞黄视频| 欧美黑人欧美精品刺激| 亚洲四区av| 波多野结衣一区麻豆| 国产xxxxx性猛交| 免费观看性生交大片5| 国产福利在线免费观看视频| 中文字幕亚洲精品专区| 免费久久久久久久精品成人欧美视频| 黄色一级大片看看| 国产精品一区二区精品视频观看| 亚洲美女视频黄频| 久久天堂一区二区三区四区| 一区二区三区乱码不卡18| 大香蕉久久成人网| 国产成人系列免费观看| 天堂8中文在线网| 亚洲欧美精品自产自拍| 国产精品蜜桃在线观看| 午夜激情久久久久久久| 女人久久www免费人成看片| av女优亚洲男人天堂| 久久久久精品久久久久真实原创| 考比视频在线观看| 欧美日韩国产mv在线观看视频| 亚洲精品久久久久久婷婷小说| 精品亚洲成a人片在线观看| 精品第一国产精品| 欧美激情高清一区二区三区 | 一本—道久久a久久精品蜜桃钙片| kizo精华| 亚洲欧美清纯卡通| av免费观看日本| 一区福利在线观看| 大片免费播放器 马上看| 国产精品国产三级专区第一集| 免费黄频网站在线观看国产| 精品少妇久久久久久888优播| 男女下面插进去视频免费观看| 狠狠精品人妻久久久久久综合| 午夜久久久在线观看| 国产成人精品在线电影| 国产精品国产三级国产专区5o| 亚洲精品乱久久久久久| 亚洲国产日韩一区二区| 九色亚洲精品在线播放| 国产成人免费观看mmmm| 亚洲精品美女久久久久99蜜臀 | 国产又色又爽无遮挡免| 婷婷色综合www| 亚洲一卡2卡3卡4卡5卡精品中文| 两个人免费观看高清视频| 亚洲国产最新在线播放| 大香蕉久久成人网| 男人添女人高潮全过程视频| 精品少妇内射三级| 91国产中文字幕| 日韩 欧美 亚洲 中文字幕| 午夜福利视频精品| 亚洲人成电影观看| 巨乳人妻的诱惑在线观看| 卡戴珊不雅视频在线播放| 汤姆久久久久久久影院中文字幕| 涩涩av久久男人的天堂| 久久99热这里只频精品6学生| 天天躁夜夜躁狠狠久久av| 国产野战对白在线观看| 天堂8中文在线网| 精品福利永久在线观看| 极品少妇高潮喷水抽搐| 久久99热这里只频精品6学生| 久久久亚洲精品成人影院| 午夜福利视频在线观看免费| 日韩成人av中文字幕在线观看| 国产精品 国内视频| 亚洲成人免费av在线播放| 天美传媒精品一区二区| 日韩人妻精品一区2区三区| 在线观看人妻少妇| 高清不卡的av网站| 欧美日韩成人在线一区二区| 亚洲国产看品久久| 日韩欧美精品免费久久| 别揉我奶头~嗯~啊~动态视频 | 精品视频人人做人人爽| 丰满少妇做爰视频|