Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

113results about How to "Avoid privacy" patented technology

Method and device for medical information sharing privacy protection based on blockchain technology

The invention discloses a method and device for medical information sharing privacy protection based on a blockchain technology. According to the method, in aspects of privacy protection based on a blockchain technology, medical data on-chain and off-chain storage and forced privacy protection safety multiparty calculation, illegal medical data obtaining, use and tampering are avoided, and medical information sharing, big data analysis and utilization and patient privacy protection are implemented. The device comprises a data storage module, a service module provided based on the blockchain technology and a call service module provided externally, wherein a three-layer data storage frame is adopted for the data storage module; and the service module provided based on the blockchain technology mainly comprises forced privacy protection safety multiparty calculation. The method and device for medical information sharing privacy protection based on the blockchain technology are mainly applied to the fields of method and device for medical information sharing privacy protection based on a blockchain technology and medical big data analysis and the like, and technical guarantee is also provided for patient privacy protection while medical information sharing is achieved based on the blockchain technology.
Owner:HANGZHOU DIANZI UNIV

Radio frequency identification (RFID) safety communication method established according to ultra-lightweight RFID bidirectional authentication protocol

InactiveCN102880891ATroubleshoot key synchronization issuesSolve the forward security problemCo-operative working arrangementsExclusive orNumber generator
The invention discloses a radio frequency identification (RFID) safety communication method established according to an ultra-lightweight RFID bidirectional authentication protocol. By adoption of the method, the security problems of a low-grade tag RFID system can be effectively solved. The method has the main characteristics of security, high efficiency, simplicity and practicability. A tag is only required to provide simple operation such as random number generator operation, exclusive-OR operation, modular operation (MOD) and displacement. Resources required by the simple operation are extremely limited, so the scheme is in complete accordance with an EPCglobal C1G2 tag specification, has the characteristics of low storage cost, low operation cost, low communication cost, novel and simple algorithm and the like, and is easy to implement. The method has the advantages that the problems about synchronization of the tag and a rear-end database key, forward security and security privacy (privacy leak, flow analysis and positioning tracking) can be effectively solved, and the common security problems of an RFID system about imitation attack, cloning attack, monitoring attack, replay attack and denial-of-service attack are solved. The method is quite applicable to solving the security problems of an EPCglobal C1G2 RFID tag.
Owner:SUN YAT SEN UNIV

Falling action detection method based on key skeleton point track analysis

ActiveCN110287825AAddress unacceptable privacy concernsAvoid privacyCharacter and pattern recognitionHuman bodyRelevant information
The invention provides a falling action detection method based on key skeleton point track analysis. The falling action detection method comprises the following steps of 1, firstly, collecting a plurality of groups of image sequences including the falling actions and a plurality of groups of image sequences including other actions except the falling actions; 2, extracting the key skeleton points, extracting the related information of the key skeleton points of the human body from the positive and negative samples, wherein the related information comprises the position information and the depth information of each skeleton point in the RGB image; 3, constructing a feature model, and generating a feature descriptor based on a key skeleton point track; and 4, constructing a classifier, classifying the track feature descriptors, and detecting a falling action. According to the present invention, the human skeleton position information is extracted by utilizing the OpenPose human skeleton detection algorithm based on the neural network, the most persuasive human skeleton points can be directly obtained, the method is not limited to the specific conditions and special environments, a user does not need to wear anything, the complex installation is not needed, and the cost is very low.
Owner:SHENYANG AEROSPACE UNIVERSITY

Privacy protection method for video recommendation system and video recommendation method

ActiveCN107257499APrivacy protectionMake up for problems that reduce the quality of referral servicesSelective content distributionPrivacy protectionDifferential privacy
The invention discloses a privacy protection method for a video recommendation system and a video recommendation method. In the privacy protection method, protection of personal privacy of a user is realized in a video recommendation process based on information anonymization and differential privacy. The method comprises the following steps that: each user requesting for video recommendation needs to generate a user information table, and meanwhile a user is randomly selected from a plurality of users to serve as a user agent; the user agent combines collected anonymized information tables of the users into a recommendation table; the user agent performs differential privacy processing on the recommendation table, and transmits the processed recommendation table to a server side; the server side performs video recommendation by a recommendation algorithm, and returns a recommendation result to the user agent; and lastly, the user agent transmits the recommendation result to the users. Through adoption of the method, the problem that the personal privacies of the users cannot be protected effectively in a conventional recommendation algorithm is solved on the premise of not changing a cloud recommendation algorithm, and meanwhile a high-quality video recommendation service is provided.
Owner:ANHUI UNIVERSITY

Privacy protection method and device for Wifi fingerprint positioning

The invention relates to a privacy protection method and device for Wifi fingerprint positioning. The privacy protection method for Wifi fingerprint positioning comprises the following steps that a server extracts all the Wifi fingerprints and fingerprint metadata; a client terminal collects Wifi signal intensity values in the peripheral environment and generates a public key and a private key according to the asymmetrical encryption algorithm, encryption is respectively conducted on the collected Wifi signal intensity values by the public key and a positioning request is sent to the server; the server calculates the fingerprint distance between all the Wifi fingerprints and each encrypted Wifi signal intensity value and transmits multiple sets of encrypted fingerprint distance data to the client terminal; the client terminal uses the private key to decrypt the multiple sets of the encrypted fingerprint distance data, and determines the current location of the client terminal according to the Wifi fingerprint corresponding to each decrypted fingerprint distance datum and the received fingerprint metadata. The privacy protection method and device for Wifi fingerprint positioning solves the privacy problem in an existing WiFi fingerprint positioning technology, and can protect the location privacy of a user and the data privacy of a service provider.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Online live broadcast method and device based on image cartoonization and electronic equipment

The invention belongs to the field of education, and provides an online live broadcast method and device based on image cartoonization, and electronic equipment, the method is used for identifying anoriginal image in a live broadcast video stream in real time and cartoonizing a face image in the original image, and the method further comprises the steps of collecting a real face data set and a cartoon face data set, establishing a training data set; based on the generative adversarial network, establishing an initial figure cartoon head portrait generation model, and performing alternate training by using the training data set; determining a loss function according to a constraint rule, and controlling the alternate training by using the loss function to obtain a final figure cartoon headportrait generation model; and obtaining a to-be-converted original image in the current live video stream, and converting a face image in the original image into a cartoon face image by using the final cartoon head portrait generation model. According to the invention, the consistency of images before and after the figure cartoon image is generated in multiple dimensions such as color, position,edge, texture, head portrait attribute and the like can be ensured.
Owner:作业帮教育科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products