Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

125results about How to "Address privacy breaches" patented technology

Position privacy protection method based on dynamic pseudonyms

The invention discloses a position privacy protection method based on dynamic pseudonyms. The position privacy protection method mainly overcomes the defect that the position privacy protection degree in an existing position pseudonym method based on position services is too low. The position privacy protection method comprises the steps that a communication system composed of users, a credible mechanism and a service provider is built; the system is initialized through the credible mechanism; the users sign in the credible mechanism on line to obtain public and private keys; the credible mechanism updates the pseudonyms and pseudonym certificates of the users regularly; the users use the dynamic pseudonyms to request position services from the service provider; the service provider provides service data for legal users and requests the credible mechanism to revoke malicious users; the legal users obtain the position service data. According to the position privacy protection method, identity anonymity is achieved by using the dynamic pseudonyms, the relation between identity information and spatiotemporal information is cut off, and therefore it is difficult for the service provider to speculate position information of the specific users by means of side information, position privacy of the users is protected effectively, and the position privacy protection method can be used for position privacy protection based on the position services in social networking services.
Owner:XIDIAN UNIV

Data sharing method, computer equipment applying same and readable storage medium

The invention discloses a data sharing method, computer equipment applying the same and a readable storage medium, and belongs to the technical field of data information security. According to the method, a blockchain technology and a federated learning technology are combined, a data security sharing model based on the blockchain and federated learning is constructed, and a data sharing basic process is designed; a working node selection algorithm based on a block chain and node working quality is designed by taking reliable federated learning as a target; a consensus method of a block chainis modified, an excitation mechanism consensus algorithm based on model training quality is designed, and the purposes of encouraging excellent work nodes to work, simplifying the consensus process and reducing the consensus cost are achieved. The differential privacy algorithm suitable for federated learning is selected by taking balance data security and model practicability as targets. According to the invention, the problem of privacy leakage in a data sharing process can be solved; the blockchain technology is combined into data sharing, so that the security and credibility of data are guaranteed; meanwhile, the efficiency of federated learning tasks is improved.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +1

Federated learning privacy protection method based on homomorphic encryption in Internet of Vehicles

ActiveCN112583575AFully homomorphic encryptionNo need to exposeKey distribution for secure communicationEnsemble learningAlgorithmAttack
The invention provides a federated learning privacy protection method based on homomorphic encryption in the Internet of Vehicles, which introduces federated learning based on homomorphic encryption into the Internet of Vehicles, improves a Paillier algorithm with addition homomorphic lines and an RSA algorithm with multiplication homomorphism, combines an AES algorithm and a step size confusion mode, and adopts a hierarchical encryption technology at the same time. According to the method, the addition homomorphism is completed at the edge end, and the multiplication homomorphism is completedat the cloud end to improve the encryption efficiency, so that federated learning malicious attacks are effectively prevented, and the delay caused by encryption is effectively reduced. The method can be applied to privacy protection in the Internet of Vehicles to introduce federated learning into the IoV so as to solve the problem of user privacy leakage. In order to further enhance the data safety, efficient homomorphic encryption is introduced into federated learning; moreover, a Paillier algorithm with addition homogeneity and an RSA algorithm with multiplication homogeneity are improved,and a federated learning architecture with full homomorphic encryption is constructed in combination with an AES algorithm and a step length confusion mode.
Owner:HUAQIAO UNIVERSITY +1

Encryption domain H.264/AVC video reversible data hiding method

The invention discloses an encryption domain H.264/AVC video reversible data hiding method. Under the premise that the encryption domain H.264/AVC video reversible data hiding method is compatible with an H.264/AVC video compressed encoding standard, code words of prediction modes, Exp-Golomb code words of motion vector difference and sign bits of residual error coefficients are selected to be encrypted, computation complexity is low, the application demands of real-time videos are met, and encryption safety is high. Meanwhile, influences of encryption on the code rate of code streams of H.264/AVC videos are quite small, and the problem of data expansion in the video encryption process is solved. A data hiding person can embed private information in the H.264/AVC videos of an encryption domain directly, and thus the problems of video content safety and privacy disclosure can be solved effectively. The hidden data can be extracted effectively from the encryption domain and can also be extracted effectively from a decryption domain, namely, data extraction and data decryption are separated completely, and practicality is high. In addition, the encryption domain H.264/AVC video reversible data hiding method is completely revisable, and original videos can be restored without damage after the hidden information is decrypted and extracted.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping

The invention discloses an encrypted domain H.264 / AVC video data hiding method based on CABAC binary string mapping. The encrypted domain H.264 / AVC video data hiding method based on the CABAC binary string mapping includes H.264 / AVC video encryption, encrypted domain H.264 / AVC video data hiding and hidden data extracting, to be specific, using syntax elements of a bypass coding mode in a CABAC to carry out equal-length binary string substitution to encrypt a video, hiding data through a CABAC binary string mapping method for an absolute value of a motion vector difference, wherein both the encryption and data hiding do not change the code rate of a H.264 / AVC video streaming. Both the encryption and the data hiding are finished under CABAC entropy coding and are completely compatible with the CABAC entropy coding, and the encrypted video streaming with hidden data can be decoded through a standard H.264 / AVC video decoder; a person who hides the data can directly embed secrete information in the H.264 / AVC video, even if the person who hides the data does not know the original video content, the person can effectively guarantee the video content safety and avoid the privacy disclosure problem; and in addition, the encrypted domain H.264 / AVC video data hiding method based on the CABAC binary string mapping can effectively extract the hidden data from the encrypted domain and decryption domain.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Method for hiding H. 264/AVC video data of encrypted domain

The invention discloses a method for hiding H. 264/AVC video data of an encrypted domain. The method comprises the process of encrypting H. 264/AVC videos, the process of hiding the H. 264/AVC video data of the encrypted domain, and the process of extracting hidden data. In the encryption process, code words of an Intra_4*4 prediction mode, code words of an Intra_16*16 prediction mode, code words with the non-zero motion vector difference and code words with a residual coefficient are encrypted. In the process of hiding the video data, a code word mapping method is adopted. The method has the advantages that video encryption and data hiding are conducted directly in an H. 264/AVC code stream domain, the videos do not need to be decoded or partially decoded, and application demands of real-time videos are met. The operation of equal-length code word replacement is conducted in the encryption and data hiding processes, code rate of an H. 264/AVC video stream is not increased, and accordingly the problem of data expansion in the encryption and data hiding processes is solved. Meanwhile, the encrypted video stream with the hidden data is completely compatible with an H. 264/AVC standard and can be decoded by a standard H. 264/AVC video decoder. The data extraction and decoding are conducted in a completely separated mode, and the practicability is higher.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Processing method and apparatus of encrypted call, terminal, and KMC

The invention provides a processing method and apparatus of an encrypted call, a terminal, and a KMC. The problems that in the conventional encryption call technology, malicious usage of the telephone of an owner cannot be prevented, and the voice of the owner is imitated for an encrypted call so that the privacy of the owner is leaked are solved. The method includes steps: acquiring biological feature information used for identifying the identity of a user and encrypting the biological feature information when a first terminal detects an encrypted call request initiated by the user, and obtaining encrypted biological feature information; sending a first key negotiation signaling carrying the encrypted biological feature information to the key management center (KMC); receiving a first negotiation success response message returned by the KMC after successful comparison of the decrypted encryption biological feature information and prestored biological feature information corresponding to the first terminal, wherein the first negotiation success response message carries a session key distributed for the session between the first terminal and a second terminal by the KMC; and performing an encrypted call according to the session key carried in the first negotiation success response message.
Owner:ZTE CORP

Dual encryption type reversible data hiding method of encryption domain image

The invention discloses a dual encryption type reversible data hiding method of an encryption domain image. The method comprises three parts, namely, image encryption, reversible data hiding of the encryption domain image, secrete data extraction and original image lossless restoration; a double encryption mechanism is adopted in the image encryption part to enhance the security; secret information can be directly embedded in the encrypted images, even if the data hider knows nothing about the original image contents, the image content security and privacy leakage problems can still be effectively solved, no complex protocol is needed between the image encipherer and the secret information embedding person, and the encryption and data embedding generate no expansion of image data; the practicability is high, if only a data hiding key is present, the hidden secret information can be directly extracted from a ciphertext domain image; if only an encryption key is present, an approximate original image can be obtained by direct decryption; and if the data hiding key and the encryption key are present, it can be guaranteed that the original image can be restored without distortion afterthe hidden secret information is extracted.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Encryption domain H.264/AVC (Advanced Video Coding) video data hiding method compatible with CABAC (Context-based Adaptive Binary Arithmetic Coding)

ActiveCN104038767ASolve the problem of data expansionFix security issuesDigital video signal modificationData expansionHidden data
The invention discloses an encryption domain H.264/AVC (Advanced Video Coding) video data hiding method compatible with CABAC (Context-based Adaptive Binary Arithmetic Coding). The method comprises the three parts of H.264/AVC video encryption, H.264/AVC video data hiding of an encryption domain and extraction of hidden data, equal-length binary string substitution operation is performed by selecting syntax elements in a bypass coding mode in CABAC to realize video encryption, data hiding is performed by adopting a CABAC binary string mapping method for quantifying the absolute value of a residual coefficient, and the code rate of H.264/AVC video stream is not changed by encryption or data hiding, thereby solving the problem of data expansion in video encryption and data hiding. Both encryption and data hiding are completed under CABAC entropy coding, and are completely compatible with CABAC entropy coding. A data hider can embed hidden information directly into encrypted H.264/AVC videos, and the problems of video content security and privacy disclosure can be solved effectively even the data hider does not know original video contents. Moreover, by adopting the method, hidden data can be extracted effectively on an encryption domain and can be extracted effectively on a decryption domain.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Ciphertext domain high-capacity image reversible data hiding method

The invention discloses a ciphertext domain high-capacity image reversible data hiding method, including prediction error detection, image encryption, ciphertext domain image reversible data hiding, secret information extraction and original image non-destructive recovery, wherein in the first part, all pixel points in a grayscale image are first divided into two categories that are sampling pixelpoints and non-sampling pixel points, and then all non-sampling pixel points are marked as prediction errors and accurate predictions respectively; in the second part, the marked grayscale image is encrypted by using a binary pseudo-random sequence generated by an encryption key; in the third part, the secret information is encrypted by using a binary pseudo-random sequence generated by a data hiding key, and then the encrypted secret information is used to embed data into each non-sampling pixel point that is marked as the accurate prediction in a ciphertext domain image; and in the fourth part, only the secret information is extracted, or only the original grayscale image is recovered, or the secret information is extracted first and then the original grayscale image is recovered. The method has the advantages that information can be embedded in the ciphertext domain image, and the embedding capacity is high.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Method with privacy protection function for validating creditability of public terminal

The invention relates to a method with a privacy protection function for validating the creditability of a public terminal, which can validate the creditability of the public terminal and can protect the privacy of the public terminal. A dependable computing module and a near-field wireless communication module (NFC) are arranged in a key service computing device, a common user holds a mobile terminal with the NFC communication module, before a public computer is used for carrying out a business transaction, the user holding the mobile terminal is close to the computer and sends a validating request through an NFC channel, the dependable computing module in the computer carries out Hash operation on several key content information in a system, then carries out signing on Hash values by directly using an anonymous attestation protocol, and sends signature data to the mobile terminal of the user through the NFC channel, the mobile terminal of the user carries out validation on signatures, and validation results are displayed through a screen of the mobile terminal. Through the method, a user extremely intuitively judges whether a computer for carrying out transactions is credible, thereby determining subsequent transaction actions; and because a direct anonymous authentication technology is adopted, the identity privacy of an authentication computer also can be protected.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

System and method for securely deleting file from user space on mobile terminal flash medium

The invention discloses a system and method for securely deleting a file from a user space on a mobile terminal flash medium. The system comprises the user space and a kernel space, wherein the user space comprises an application program, a user space file system module, an encryption and decryption module, a key management module and a garbage recovery module; and the kernel space comprises a virtual file system module, a kernel driving module and a basic file system. According to the method, an application program operation file function is transmitted to a virtual file system module; a virtual file system function is routed to a user space file system; the user space file system encrypts and decrypts an operation file; the encryption and decryption module calls a key management module to obtain a key; and a basic file system method is called for completing the file operation of the application program on the user space file system. The file is securely deleted in a file key deleting way; ciphertexts of the file key and file ciphertexts in the user space file system are thoroughly deleted from the flash medium in a garbage recovery way, so that the goal of securely detecting the file from the mobile terminal flash medium is realized.
Owner:XIDIAN UNIV

Full separable encryption domain image reversible data hiding method

The invention discloses a full separable encryption domain image reversible data hiding method. According to the full separable encryption domain image reversible data hiding method, in an image encryption part, firstly, an image is partitioned into image blocks; and then after a pixel value of each pixel point in each image block is added with one element in a random sequence for encryption, an absolute value of 256 is calculated so as to implement encryption. In the encryption mode, a difference value of a pixel value of each non-center pixel point in each image block and a pixel value of a center pixel point can be kept consistent before and after encryption; not only can data hiding be guaranteed to be carried out in an encrypted image, but also full separation of data extraction and image decryption is ensured; secret data can be effectively extracted in a encryption domain or a decryption domain; meanwhile, an original image can be guaranteed to be recovered in a distortionless manner after secret information is extracted; in the encryption domain image reversible data hiding part, the secret information is embedded in a combining manner, and the combined embedded secret information with a high occurrence frequency has a great bit number, so that data embedding capacity is effectively improved.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Dredging and blocking combined privacy protection method and system

The invention discloses a dredging and blocking combined privacy protection method and system. The method comprises steps as follows: 1) an application is scanned, all permissions of the application are listed, and whether the installed application is involved with a sensitive permission is judged; 2) as for the application involved with the sensitive permission, a user is reminded to use a cheat function strategy or a jump function strategy; the cheat function strategy specifically comprises steps as follows: the sensitive permission involved by an application program is hooked, a cheating function is implanted in the hooked function, and when the sensitive permission of application access is monitored, a false value is returned for the application; the jump function strategy specifically comprises steps as follows: a permission involved with a malicious application is extracted, and calling of the malicious application permission is bypassed by modifying an entry address of a permission function; 3) according to the strategy selected by a user, when the sensitive permission applies data, the false value is returned to the sensitive permission or permission calling is directly jumped. The security problems of privacy disclosure, permission abuse and the like of an existing application of a mobile phone can be effectively solved.
Owner:CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products