Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

49results about How to "Address privacy concerns" patented technology

Method and system for biometric authentication and encryption

A biometric user authentication method, includes enrolling a user based on user's biometric samples to generate user's reference data; and authenticating the user based on a user's live biometric sample and the user's reference data; wherein enrolling a user includes acquiring the user's biometric samples; extracting an enrollment feature vector from each user's biometric sample; computing a biometric reference template vector as a mean vector based on the enrollment feature vectors; computing a variation vector based on the enrollment feature vectors and the mean vector; randomly generating an enrollment secret vector; computing an enrollment code vector based on the enrollment secret vector and the variation vector; computing a difference vector as a wrap-around difference between the enrollment code vector and the mean vector; computing an error correction vector based on the enrollment secret vector to enable error correction during the user authentication phase according to a given error tolerance level, wherein the error correction vector is not computed if the error tolerance level is equal to zero; and storing the variation vector, the difference vector, and the error correction vector as a part of the user's reference data to be used during the user authentication phase.
Owner:TELECOM ITALIA SPA

Method and system for biometric authentication and encryption

A biometric user authentication method, includes enrolling a user based on user's biometric samples to generate user's reference data; and authenticating the user based on a user's live biometric sample and the user's reference data; wherein enrolling a user includes acquiring the user's biometric samples; extracting an enrollment feature vector from each user's biometric sample; computing a biometric reference template vector as a mean vector based on the enrollment feature vectors; computing a variation vector based on the enrollment feature vectors and the mean vector; randomly generating an enrollment secret vector; computing an enrollment code vector based on the enrollment secret vector and the variation vector; computing a difference vector as a wrap-around difference between the enrollment code vector and the mean vector; computing an error correction vector based on the enrollment secret vector to enable error correction during the user authentication phase according to a given error tolerance level, wherein the error correction vector is not computed if the error tolerance level is equal to zero; and storing the variation vector, the difference vector, and the error correction vector as a part of the user's reference data to be used during the user authentication phase.
Owner:TELECOM ITALIA SPA

Method for registration and verification of Internet of Things identity based on blockchain

The invention belongs to the technical field of blockchains, and discloses a method for registration and verification of an Internet of Things identity based on a blockchain. The method comprises thefollowing steps: in an Internet of Things transaction, a sender reads and enters his identity information through a MAC, completes identity registration, and deposits identity information into an identity registration chain; the sender hashes the transaction information, generates a hash digest, records the hash digest as Y1, and encrypts the same with a private key to generate a digital signature; the sender initiates the transaction, and sends the signature, the hash digest Y1, and the corresponding public key to the whole network; nodes of the whole network verify the transaction information; and all nodes further determine whether the sender has been registered, and upload the transaction to the transaction chain if passing the two-factor verification. The method enables the identity of the transaction on the Internet of Things to be proved to be correct without revealing the identity of the trader through the blockchain technology, thereby avoiding the leakage of the trader's identity information during the transaction.
Owner:ZHEJIANG WANLI CONSTR ENG

Block chain technology-based fine-grained cloud storage access control method, system and device

The invention relates to the field of data security, and relates to a block chain technology-based fine-grained cloud storage access control method, system and device. The method comprises the following steps: constructing a cloud storage sharing model based on a block chain technology, registering a DO and a DU to an intelligent contract and generating a private key; the DO encrypting the data file with a symmetric key to obtain a data ciphertext, uploading the data ciphertext to the CSP, and the CSP returning a file storage address; the DO performing attribute-based encryption on the symmetric key and the file storage address according to the private key, the model public key and the access control policy tree, sending an attribute-based ciphertext to the block chain to form a block, and returning a block identifier; the DU sending a data request to the block chain, returning a corresponding attribute base ciphertext, and decrypting a file storage address and a symmetric key of the data file; and the DU sending a request to the CSP according to the decryption address, and decrypting the data file from the data ciphertext returned by the CSP by using the decrypted symmetric key. According to the invention, the security of key transmission and data transmission is ensured.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Federated learning classification tree construction method, model construction method and terminal equipment

The embodiment of the invention relates to a federated learning classification tree construction method, a model construction method and terminal equipment. The method comprises the steps of carryingout the classification of a user sample set according to a first classification feature and a first classification threshold, and obtaining at least two groups of user sample subsets; adding confuseduser samples into the first subset to obtain a second subset; calculating the sum of the first encryption gradient values corresponding to the second subset; after the primary encryption gradient value is subjected to secondary encryption, sending the primary encryption gradient value and the second subset to a second data provider together; receiving the sum of the second encryption gradient values; performing primary decryption on the sum of the second encryption gradient values, and feeding back the sum of the second encryption gradient values, the sum of the first encryption gradient values, the information of the first classification feature and the information of the first classification threshold to the second data provider; receiving information of the optimal classification feature and information of an optimal classification threshold corresponding to the optimal classification feature; and classifying the first subset according to the information of the optimal classification feature and the information of the optimal classification threshold corresponding to the optimal classification feature to form branch nodes of a federated learning classification tree, and constructing the federated learning classification tree.
Owner:JINGDONG TECH HLDG CO LTD

Community access control system, access control method and device, access control unit and medium

The invention provides a community access control system, an access control method and device and an access control unit. The community access control system comprises a monitoring server and at leastone access control unit, wherein the access control units are in network connection with the monitoring server, each access control unit comprises control equipment, a camera and an electric door lock, the camera and the electric door lock are electrically connected with the control equipment, the control equipment sends a video stream acquired by the camera to the monitoring server for storage in real time, if the control device detects a face verification request of a user, the control device requests a current video stream from a monitoring server and intercepts a face image from the current video stream, and then determines whether the intercepted face image is matched with a verification face image in a verification face image database stored in the control device or not; in responseto the determination of matching, an electric door lock electrically connected with the control equipment is controlled to be unlocked. The system is advantaged in that the face recognition part is specifically managed and controlled by the user on the premise of ensuring the community security, and privacy worry of the user is solved.
Owner:北京澎思科技有限公司

Notebook computer

The invention relates to the technical field of terminal equipment, and discloses a notebook computer which comprises a front frame, a camera and a camera shielding device located between the front frame and the camera. A light transmission part opposite to the camera is formed on the front frame so as to transmit light required by the camera, the camera shielding device comprises a shielding plate movably mounted on the front frame, and the shielding plate comprises a light shielding area used for shielding the light and a light transmission area used for transmitting the light; wherein the shielding plate is provided with a first station and a second station in a moving path, and when the shielding plate is located at the first station, a shading area of the shielding plate is opposite to the camera; when the shielding plate is located at the second station, the light-transmitting area of the shielding plate is opposite to the camera; and the handle is used for manually shifting the shielding plate to move, is connected with the shielding plate and is positioned on the outer side of the front frame. According to the notebook computer, the shielding plate can be manually adjusted to move to the station where the camera is shielded, the problem of privacy of the camera of the notebook computer is solved, and safety is high.
Owner:WUXI RUIQIN TECH CO LTD

Multi-party secure computing implementation method based on block chain technology

The invention discloses a multi-party security computing implementation method based on a blockchain technology. The method specifically comprises the following steps: step 1, compiling an intelligentcontract, wherein the intelligent contract comprises node information of each contract party, tasks of each contract party for executing the intelligent contract and task execution relationships among the tasks; step 2, publishing the intelligent contract: publishing the intelligent contract on the block chain; 3, determining an executable state: after the intelligent contract is authorized by related nodes of each contract party of the intelligent contract, determining the intelligent contract as the executable state; step 4, executing the intelligent contract, wherein different contract parties have own unique business accounts, log in node servers of nodes through node accounts of the nodes and execute tasks of the intelligent contract on the blockchain; and step 5, carrying out verification and recording of an execution result, wherein the nodes which do not participate in the intelligent contract carry out verification and state recording of the contract execution result. According to the invention, the problems of data security and privacy in the data cooperation process are solved.
Owner:DATANG NETWORK CO LTD

Multi-target tracking and respiration detection method and device based on millimeter wave radar

The invention discloses a multi-target tracking and breathing detection method and device based on a millimeter wave radar. The method comprises the following steps: acquiring distance, speed, angle and phase information from a sampled signal and completing detection of a target point; clustering the point clouds by using the provided improved fast DBSCAN algorithm; using a multi-target tracking algorithm to track the target and manage the trajectory; phase information corresponding to a plurality of targets is accurately obtained by using a target phase information extraction algorithm based on secondary clustering and statistical information provided by the invention; and on this basis, respiration information is extracted. According to the invention, a set of multi-target tracking and breathing detection system is designed and integrated on a set of device, and the system has the advantages of high real-time performance, high integration level, high engineering value and the like. Through the device, the number and the positions of the targets can be detected in real time on the end, the targets can be accurately tracked, and the breathing information of each target can be detected in the process.
Owner:ZHEJIANG UNIV

Fall-down alarm equipment and method

The application discloses fall-down alarm equipment and method, and relates to the technical field of the radar detection. The fall-down alarm equipment comprises an equipment controller, and a horizontal rotating motor is arranged on the equipment controller, a vertical rotating motor is fixedly arranged at a rotating end of the horizontal rotating motor, a laser sensor is arranged on the rotating end of the vertical rotating motor, and the laser sensor is electrically connected with the equipment controller; alarm equipment is further arranged on the equipment controller; and the alarm equipment is electrically connected with the equipment controller. The horizontal rotating motor, the vertical rotating motor and the laser sensor form a three-dimensional laser radar, thereby realizing the collection of three-dimensional point cloud data, and then the dynamic data point of the corresponding personnel is determined through the equipment controller; and a personnel state is judged according to the point variation quantity of the dynamic data point. if judging that the personnel falls down, the alarm equipment is controlled to give an alarm and notify other people that the personnelfalls down; and meanwhile, the boundedness that the alarm can be given only when the traditional wearable equipment or sensor is carried on the body and the phenomenon that video type alarm is easilyinvolved to the privacy are solved.
Owner:NANJING LINKSAINT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products