Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

141results about How to "Guarantee privacy and security" patented technology

Remote Access System and Method for Enabling a User to Remotely Access Terminal Equipment from a Subscriber Terminal

A method for enabling a subscriber terminal to remotely access terminal equipment, the terminal equipment storing identification data of the subscriber terminal, and the subscriber terminal being subscribed to a communication network and to a remote access service, wherein the method includes: receiving a request for authentication from the terminal equipment, the request for authentication including identification data of the subscriber terminal; receiving a request for access to the terminal equipment from the subscriber terminal; authenticating the subscriber terminal based on information from the communications network; forwarding the request for authentication from the terminal equipment to the subscriber terminal upon authenticating the subscriber terminal, the subscriber terminal processing the request for authentication to authenticate the terminal equipment; receiving an authentication notification from the subscriber terminal; forwarding the authentication notification from the subscriber terminal to the terminal equipment, the terminal equipment processing the authentication notification to authenticate said subscriber terminal; receiving an authentication notification from the terminal equipment; and enabling the subscriber terminal to remotely access the terminal equipment upon receiving the authentication notification from the terminal equipment.
Owner:TELECOM ITALIA SPA

Starting lock for mobile terminal application program

The invention discloses a starting lock for a mobile terminal application program, and particularly relates to a starting lock of an application program. The starting lock for the mobile terminal application program comprises an operating system platform, the operating system platform is provided with an application program manager which manages at least one application program, and the application program manager comprises a locking module, a storage module and an unlocking module, wherein the storage module stores the locking information of the locking module and relevant starting request information. After the application program manager receives the starting request of an application program, the application program manager analyzes, identifies and judges the starting request, the unlocking module is started for the locked starting request, and the application program manager enables input unlocking information and locking information in the storage module to be matched and judged. According to the starting lock for the mobile terminal application program, the starting request information is extracted and stored during locking, the starting request information is detected, intercepted and captured in use, operation verification is conducted, and therefore individual privacy and information safety are further guaranteed in the using process of the application program.
Owner:宋易霄

Intelligent home system

The invention provides an intelligent home system. The system comprises an intelligent home network, the Internet and a dynamic domain name server. The intelligent home network comprises network equipment, a home server and a plurality of intelligent home terminals, wherein the network equipment is in communication connection with the Internet, the home server is in communication connection with the network equipment and is used for information interaction with the network equipment, receiving information sent by the intelligent home terminals and sending control signals to the intelligent home terminals so as to control the work of the intelligent home terminals, and the intelligent home terminals are in communication connection with the home server. The dynamic domain name server is in communication connection with the Internet and is used for receiving a dynamic IP (Internet Protocol) address sent by the network equipment through the Internet, binding the dynamic IP address to the fixed domain name of the intelligent home network, and carrying out domain name resolution. With the adoption of the intelligent home system provided by the invention, the functions, such as video surveillance, leisure and entertainment, intelligent control of household appliances and home environment monitoring, can be achieved, and the customized customization, assembly and association can be achieved; and the information security can be guaranteed because no external operation service platform exists.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Fingerprint module with encryption unit

The invention provides a fingerprint module with an encryption unit, which is characterized in that the fingerprint module is connected with a payment terminal or arranged on the payment terminal by a communication line; the fingerprint module is provided with a fingerprint acquisition unit which is at least used for acquiring fingerprint image data of a user; the fingerprint module is provided with a fingerprint processing unit which is at least used for extracting fingerprint characteristic data from the fingerprint image data of the user; and the fingerprint module is provided with the encryption unit which is at least used for encrypting the fingerprint characteristic data of the user and / or adding an MAC (message authentication code) to the fingerprint characteristic data. The fingerprint characteristic data of the user are sent out after secret keys and dynamic random numbers are used to encrypt the fingerprint characteristic data of the user and / or add the MAC to the fingerprint characteristic data of the user in the fingerprint module; and a fingerprint data validation party validates the validity of the MAC firstly and / or carries out fingerprint matching on the decrypted MAC, thus avoiding the possibility that a lawbreaker counterfeits a transaction request after recording fingerprint data of the user, improving the system safety, ensuring the privacy of the fingerprint data of the user and the capital safety, and being beneficial to promoting applications of a fingerprint identification technology in the payment field.
Owner:张龙其

Cross-domain identity authentication method based on edge computing network architecture

The invention discloses a cross-domain identity authentication method based on an edge computing network architecture, and mainly solves the technical problems that in the prior art, key management and distribution are difficult, and user privacy is difficult to protect. The method comprises the following steps: 1) an edge node local authentication server and a home authentication server calculaterespective public and private keys; 2) the home authentication server generates a private key constructed by the user by using the pseudo identity; 3) the user applies for cross-domain access to theedge node local authentication server; 4) the edge node local authentication server sends information to a home authentication server of the user to verify the identity of the user; 5) the home authentication server authenticates the user information and returns a session key; 6) the local authentication server of the edge node calculates the session key and returns the authentication information;7) the user confirms the information to generate the session key. According to the method, the bidirectional verification security of the edge node equipment and the user can be effectively improved,the problems that the identity privacy of the user is exposed and the session is tracked are solved, and the method can be used for modern Internet of Things equipment.
Owner:XIDIAN UNIV

Screen unlocking method and device

The invention discloses a screen unlocking method and device. The screen unlocking method comprises the steps of presetting and storing multiple types of unlocking conditions; displaying a screen unlocking interface; receiving an instruction for selecting one type of unlocking conditions, input by a user; performing screen unlocking, namely (a) displaying prompting information of the selected type of unlocking conditions, (b) receiving unlocking information input by the user, (c) judging whether the unlocking information input by the user is matched with unlocking information of preset unlocking conditions corresponding to the prompting information of the currently-displayed unlocking conditions or not, (d) judging whether the total number of matched unlocking conditions is consistent to the preset matching number or not if the unlocking information input by the user is matched with the unlocking information of the preset unlocking conditions, achieving screen unlocking if the total number of the matched unlocking conditions is consistent to the preset matching number, and repeatedly executing the steps (a), (b), (c) and (d) if the total number of the matched unlocking conditions is not consistent to the preset matching number. By means of the screen unlocking method, the requirements for user's memorizing facilitating, high safety, high unlocking success rate, selection on different unlocking conditions under different situations and the like of the unlocking information can be met simultaneously.
Owner:北京数字天域科技有限责任公司

Physiological information monitoring system and monitoring method

The invention discloses a physiological information monitoring system comprising a physiological information collector, a remote data terminal and a hospital monitoring center, wherein the physiological information collector is used for collecting a physiological signal, encrypting the collected physiological signal data and transmitting the physiological signal data to the remote data terminal, the remote data terminal is used for adding an identification code on the received physiological signal data and transmitting the physiological signal data to the hospital monitoring center, and the hospital monitoring center is used for decrypting, storing and analyzing the physiological signal data and sending a diagnostic report to the remote data terminal. The invention further provides a monitoring method. The physiological information monitoring system and the physiological information monitoring method disclosed by the invention are used for solving the problem of low privacy safety of subjects and low utilization rate of monitoring information, the collected physiological signal data are transmitted after being encrypted, thereby preventing the physiological information of the subjects from being leaked by illegal monitoring in the transmission process; and the hospital monitoring center analyzes the received data and provides the diagnostic report to provide illness condition caution to the subjects in time.
Owner:MIANYANG DEHUI AUTOMATION TECH CO LTD

Remote access system and method for enabling a user to remotely access terminal equipment from a subscriber terminal

A method for enabling a subscriber terminal to remotely access terminal equipment, the terminal equipment storing identification data of the subscriber terminal, and the subscriber terminal being subscribed to a communication network and to a remote access service, wherein the method includes: receiving a request for authentication from the terminal equipment, the request for authentication including identification data of the subscriber terminal; receiving a request for access to the terminal equipment from the subscriber terminal; authenticating the subscriber terminal based on information from the communications network; forwarding the request for authentication from the terminal equipment to the subscriber terminal upon authenticating the subscriber terminal, the subscriber terminal processing the request for authentication to authenticate the terminal equipment; receiving an authentication notification from the subscriber terminal; forwarding the authentication notification from the subscriber terminal to the terminal equipment, the terminal equipment processing the authentication notification to authenticate said subscriber terminal; receiving an authentication notification from the terminal equipment; and enabling the subscriber terminal to remotely access the terminal equipment upon receiving the authentication notification from the terminal equipment.
Owner:TELECOM ITALIA SPA

Federated learning method based on trusted execution environment

The invention belongs to the field of data security, and discloses a federated learning method based on a trusted execution environment, which comprises the following steps: generating a security areabased on the trusted execution environment; downloading the initialized model parameters from the cloud by a local user; loading the training algorithm, the training data set, the training data example number and the initialized model parameters returned by the cloud into a security area; obtaining a trained model parameter gradient and generating a digital signature, performing local user identity authentication through a group signature algorithm, and uploading the trained model parameter gradient, a model integration algorithm and the local user identity authentication to a cloud; and enabling the cloud to verify the local user identity authentication, obtain the uploaded model parameter gradient and model integration algorithm after successful verification, placing the model parametergradient and model integration algorithm in a cloud security area, integrating the model, and updating the model parameter gradient. According to the invention, the trusted execution environment is used to generate the security area, the user cannot bypass the training process to directly give the training result, and the training integrity and the user privacy protection are realized.
Owner:GUANGZHOU UNIVERSITY

TopN collaborative filtering recommendation method based on differential privacy

The invention discloses a TopN collaborative filtering recommendation method based on differential privacy and relates to the technical fields of differential privacy technologies and collaborative recommendation. According to the method, Laplace noise is reasonably added to original input data Rm*n firstly to obtain user grading records (shown in the description) after disturbance, and then cosine similarity is utilized to calculate the similarity between a target user and other users. On one hand, the records meet an epsilon-differential privacy protection model by adding the Laplace noise to original user grading records, it is ensured that the records have higher availability while the privacy security of issued data sets is guaranteed, and original grading data of users is effectively protected; on the other hand, improvement starts from a recommendation algorithm itself, the problem that an existing TopN recommendation model leaks the privacy of the users is solved, attackers are prevented from speculating their browsing histories according to a recommendation list of the target user so as to obtain personal preferences of the users, and accurate recommendation can be provided for the users while the privacy of the users is protected.
Owner:XUZHOU MEDICAL UNIV

Anonymous authentication method and system based on tamper-proof equipment in intelligent power grid

The invention belongs to the field of power data security transmission in an intelligent power grid environment, and particularly relates to an anonymous authentication method and an anonymous authentication system based on tamper-proof equipment in a intelligent power grid. The anonymous authentication method comprises the steps that: an operation center of the intelligent power grid generates system public parameters according to safety parameters and distributes the system public parameters to intelligent electric meters and residential district gateways; the intelligent electric meter collects real-time electric power data, encrypts the electric power data by adopting an addition homomorphic encryption algorithm, signs the electric power data by using a private key of the intelligent electric meter, and sends a signed electric power data ciphertext to the residential district gateway; the residential district gateway authenticates the ciphertext after receiving the ciphertext, performs privacy protection aggregation on the ciphertext if the authentication succeeds, and sends an aggregated ciphertext signature to the operation center; and the operation center verifies the validity of a timestamp and a signature of the operation center, if the verification is valid, the aggregated ciphertext is decrypted by adopting the private key, and a plaintext message of the power data is obtained. According to the anonymous authentication method and the anonymous authentication system, the safety of the intelligent power grid system is greatly improved.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Deepfake traceability system based on big data federated learning architecture

The invention discloses a deepfake traceability system based on a big data federated learning architecture. The system comprises: an application layer, an interface layer, a logic layer, a network layer, and a storage layer which are connected in sequence; the application layer is used for providing a deepfake traceability service for a user and obtaining user login and uploading data; the interface layer is used for providing interface service and realizing communication between a server side and a web side; the logic layer is used for dividing system functions and designing an algorithm to construct a model to realize system function logics; the network layer is used for carrying out parameter exchange and encrypting gradient information in a modeling process; the storage layer is used for receiving transmitted parameter information and encrypted information and storing the parameter information and the encrypted information in a local database and a blockchain network. According to the system, an overall architecture of federated anti-counterfeiting traceability chains is provided, a federated anti-counterfeiting mechanism, an abnormal traceability mechanism and a risk prediction mechanism are established, Web security threats can be prevented, and the problems of data poisoning and single-point failure for federated learning can be effectively solved.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Multi-energy multilateral distributed transaction method based on blockchain technology

ActiveCN111178632AFair and just transactionEfficient transactionMarket predictionsFinanceConfidentialityTransaction data
The invention discloses a multi-energy multilateral distributed transaction method based on a blockchain technology. The method comprises the following steps: price information is initialized; all market main bodies participating in the transaction determine respective transaction strategies according to the known information, and publish the information to the energy block chain network; each benefit subject games contract price and contract energy; nash equilibrium of the game is achieved through a distributed algorithm, and under the condition of equilibrium price and demand, benefits of all benefit subjects are maximized; the supplier and the demander reach a consensus, sign an intelligent contract, record transaction information in the blockchain and publish the transaction information in the network; the transaction is executed; and value transfer and ending the transaction are completed. According to the method, multilateral transaction and energy transmission between a plurality of comprehensive energy service providers and a plurality of load aggregators in a region are realized, the problem of coordination and complementation of multiple energies is solved, fair, efficient, flexible and safe energy transaction of multi-party subjects is satisfied, and the confidentiality and reliability of transaction data are ensured.
Owner:SOUTHEAST UNIV

Vehicle terminal service migration method and system

The invention provides a vehicle terminal service migration method and system, and the method comprises the steps of obtaining the driving data of a plurality of historical vehicles passing through a first road intersection in a first preset time period, and predicting the driving behavior of a current vehicle at the first road intersection based on the obtained driving data; determining a to-be-driven road section of the current vehicle according to the predicted driving behavior, and taking an edge server covering the to-be-driven road section as an alternative server for service migration; obtaining first access behavior data of the terminal equipment, performing similarity comparison on the first access behavior data and second access behavior data of historical terminal equipment corresponding to each alternative server, clustering the alternative servers based on a comparison result, and taking the alternative server belonging to the same cluster as the current edge server as a target server; enabling the current edge server to store the service model data to a hash table, and enabling the target server to obtain a corresponding service model from the hash table; and enabling the current edge server to migrate the task data to the target server.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Graph data publishing privacy protection cluster anonymity method and system

The invention discloses a graph data publishing privacy protection cluster anonymity method and system. With each user in a graph data group as one node, the user attributes and user-to-user relationships for each node are obtained; based on the same, the attribute similarity and structure similarity between each node and its neighboring nodes are calculated, and then the nodes in the group are subjected to attribute cluster division and structure cluster division in turn according to the calculation results to obtain multiple clusters; and the nodes in each cluster are treated anonymously according to the clusters obtained from the division. The invention applies cluster analysis technology to privacy protection of graph data release; firstly, the structure similarity and attribute similarity between nodes are calculated, graph attribute cluster division and graph structure cluster division performed in turn, and finally each cluster is processed anonymously, which can protect the attribute information and structure information of users at the same time and prevent all attacks with connecting edges and attribute values as background knowledge, so as to protect the privacy and security of social network graph data publishing.
Owner:ZHEJIANG JIESHANG ARTIFICIAL INTELLIGENCE RES & DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products