Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1909results about How to "Guaranteed privacy" patented technology

Method and device for medical information sharing privacy protection based on blockchain technology

The invention discloses a method and device for medical information sharing privacy protection based on a blockchain technology. According to the method, in aspects of privacy protection based on a blockchain technology, medical data on-chain and off-chain storage and forced privacy protection safety multiparty calculation, illegal medical data obtaining, use and tampering are avoided, and medical information sharing, big data analysis and utilization and patient privacy protection are implemented. The device comprises a data storage module, a service module provided based on the blockchain technology and a call service module provided externally, wherein a three-layer data storage frame is adopted for the data storage module; and the service module provided based on the blockchain technology mainly comprises forced privacy protection safety multiparty calculation. The method and device for medical information sharing privacy protection based on the blockchain technology are mainly applied to the fields of method and device for medical information sharing privacy protection based on a blockchain technology and medical big data analysis and the like, and technical guarantee is also provided for patient privacy protection while medical information sharing is achieved based on the blockchain technology.
Owner:HANGZHOU DIANZI UNIV

Anonymous transfer method and system based on block chain, and storage medium

The invention discloses an anonymous transfer method based on a block chain. The method comprises the steps that a first node initiates a transfer transaction request to a second node, and receives public key information returned by the second node; the first node generates transaction information of a current transaction and sends the transaction information to the second node, wherein the transaction information comprises a new currency commitment generated based on the public key information, a transaction amount encrypted based on the public key information, and a zero knowledge proof; thesecond node verifies the transaction amount encrypted based on the public key information, and if the verification is passed, the transaction information is published in a block chain network, so that a miner node can perform verification and bookkeeping on the current transaction; and the miner node verifies proof contents in the zero knowledge proof, and if the verification is passed, the transaction is determined to be valid and the transaction information is recorded in the block chain. The invention furthermore discloses an anonymous transfer system based on the block chain and a computer readable storage medium. According to the method and the system, anonymous transfer is realized, so that the privacy of information of two transaction parties of block chain-based transfer is guaranteed.
Owner:WEBANK (CHINA)

ATM secure authentication and pre-alarming method based on face recognition

The invention discloses an ATM security certificate and a pre-warning method based on face recognition. The invention introduces face recognition and video detection into the applications of ATM and bank card business for the first time, which can obviously improve the security of ATM financial system, effectively reduce and overawe various ATM fraud and criminal activities. The complete system operation process in the method of the invention is: firstly, registering the face information of a holder at a service window which arranges an infrared face acquisition equipment or with the registration by the users themselves on ATM in bank, and saving the encrypted face information to a bank database and a bank card. Then, determining whether the ATM operator to be recognized is the holder of the bank card or not through verifying the user's identity by a face recognition engine; determining and recognizing whether existing behaviors that threaten ATM and the users though a behavior monitoring engine; and determining whether to trigger corresponding pre-warning mechanism or not according to the recognition result. The invention can extend to the applications of bank book business, public security monitoring and pursuing escaped criminals, etc.
Owner:哈尔滨维科智能系统有限公司

Model parameter training method and device based on federated learning, equipment and medium

The invention discloses a model parameter training method and device based on federal learning, equipment and a medium. The method comprises the following steps: when a first terminal receives encrypted second data sent by a second terminal, obtaining a corresponding loss encryption value and a first gradient encryption value; randomly generating a random vector with the same dimension as the first gradient encryption value, performing fuzzy on the first gradient encryption value based on the random vector, and sending the fuzzy first gradient encryption value and the loss encryption value toa second terminal; when the decrypted first gradient value and the loss value returned by the second terminal are received, detecting whether the model to be trained is in a convergence state or not according to the decrypted loss value; and if yes, obtaining a second gradient value according to the random vector and the decrypted first gradient value, and determining the sample parameter corresponding to the second gradient value as the model parameter. According to the method, model training can be carried out only by using data of two federated parties without a trusted third party, so thatapplication limitation is avoided.
Owner:WEBANK (CHINA)

Mobile phone near field communication system and method based on visible light

The invention provides a mobile phone near field communication system and method based on visible light. The mobile phone near field communication system and method based on the visible light are used for short distance wireless communication. According to the mobile phone near field communication system, a transmitting terminal is arranged on a mobile device provided with a light-emitting screen and a light sensor, and comprises an encoding module and a rate adaptive mechanism module; a receiving terminal is provided with an LED and comprises a light sensor array, a signal conditioning module, a decoding module and a feedback module. The encoding module encodes data into a brightness level sequence and sends the brightness level sequence out through light signals; the receiving terminal collects the light signals to conduct signal conditioning and decoding so as to obtain decoded data; the feedback module is used for feeding back a signal of data blocks which need retransmission and a signal of adjustment of brightness level numbers to the transmitting terminal; the transmitting terminal controls the retransmission of the data blocks and the adjustment of the brightness level numbers through the rate adaptive mechanism module. The mobile phone near field communication system and method based on the visible light are low in cost, easy to use, safer, free of addition of extra hardware, and capable of achieving the near field communication functions such as mobile payment, equipment matching and data exchange between mobile phones.
Owner:BEIHANG UNIV

Remote proving method in trusted computation environment

The invention provides a method for remote attestation in a trusted computing environment. The method is characterized in that secure session key is adopted for encrypting the metric value and the metric log of trusted platform to be verified, and signs for encryption result data. The method is based on a security chip TPM / TCM; the adopted remote attestation framework comprises three parts: an integrity measuring mechanism, a reporting mechanism and a validation mechanism, which are achieved by an integrity measuring agency, a report agency and a verification requestor, wherein, the measuring agency, the report agency and the verification requestor are installed in the trusted platform to be verified. The method ensures that the authenticity of the integrity measuring value and the measuring log and the privacy of the platform are kept; the replay attack, impersonation attack and man-in-the-middle attack are effectively prevented; the method is used for proving to the verification requestor that the running environment of the platform is credible, or used for self-test of the platform running environment; the method can be used for not only proving to the requestor that the platform running environment is credible, but also the self-test of the platform running environment; and the method is more suitable for a fair and open network environment.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Cloud computation treating system and method

The invention discloses a cloud computation treating system and a method. The system comprises a client end, a database, a logical cloud server and a data analyzing platform, wherein the client end is used for sending out a request to the data analyzing platform; the database is used for storing data; the logical cloud server is used for setting a plurality of logics and providing the specific logics to the data analyzing platform according to different conditions; and the data analyzing platform is connected with the client end, the database and the logical cloud server and is used for receiving the request which is sent out by the client end, obtaining the logics of the logical cloud server according to the parameter of the request, also carrying out operational treatment by the logics through combining the data in the database and returning a treating result to the client end. According to the cloud computation treating system and the method which are provided by the invention, the data safety of an enterprise is effectively protected; and meanwhile, cloud computation service is provided, and the predicament of SaaS confronted in China is solved. Meanwhile, the obstruction on a data excavation technology, which is caused by structurized data or incomplete and non-standard informatization to which a traditional data excavation company faces, is also solved.
Owner:陈刚 +1

Digital asset transaction method and device, medium and equipment

The embodiment of the invention discloses a digital asset transaction method. The method comprises the steps that when a digital asset transaction is performed, both transaction parties perform the transaction by the adoption of real account addresses to guarantee normal and orderly progress of the transaction; but when the transaction is published into a block chain network, virtual account addresses of the transaction parties are used as public addresses for publishing, wherein the virtual account addresses are irreversible and unique virtual addresses generated according to the real accountaddresses of the transaction parties and an irreversible algorithm to guarantee that bookkeeping nodes in the block chain network can recognize the authenticity of the transaction according to the virtual account addresses of the transaction parties. Therefore, it is guaranteed that the transaction is normally processed in the block chain network, meanwhile, it can be guaranteed that the real account addresses of the transaction parties in the transaction are not published, and the privacy of the transaction addresses in the transaction process is guaranteed. The embodiment of the invention furthermore discloses a digital asset transaction device, terminal equipment, computing equipment, a storage medium and other relevant products.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Medical information visualization method and device

The invention relates to a medical information visualization method and device. The method includes the steps of loading a human model through 3D drawing software, converting patient information stored in a medical information system to structured medical information, and finally loading the medical information onto the human model. The medical information visualization device receives an instruction of a user and selects a displayed organ, a subclinical organ and / or the corresponding medical information according to the instruction of the user so that integration expression and visualized display of various types of digital medical information of patients can be achieved. The medical information visualization device can be integrated with various types of medical application platform systems. According to the medical information visualization method and device, materials such as clinical medical data, images and medical examination reports of the patients can be fully utilized; because of the visualization function, the recognition degree of non-medical staff on the health conditions of the patients can be improved, the intellectualization and personalization of user interfaces can be improved, the usability of the medical information of the patients can be improved, and the value chain and use efficiency of the medical information can be prolonged.
Owner:SHANGHAI INST OF TECHNICAL PHYSICS - CHINESE ACAD OF SCI

Efficient cryptograph image retrieval method capable of supporting privacy protection under cloud environment

The invention belongs to the technical field of image retrieval and discloses an efficient cryptograph image retrieval method capable of supporting privacy protection under a cloud environment. The efficient cryptograph image retrieval method capable of supporting the privacy protection under the cloud environment comprises the steps that an image owner firstly extracts characteristic vectors of an image in a database and encrypts the image by an AES or RSA encryption manner; the owner establishes indexes using a hierarchical K-means algorithm based on the characteristic vectors and uses a safe mode Hash technology to encrypt the indexes; and the encrypted image and indexes are uploaded to a cloud server, and a retrieval operation is executed. According to the invention, the privacy protection of the cryptograph image retrieval can be achieved, and retrieval accuracy equivalent with public image retrieval can be reached. In addition, detailed safety analysis of the disclosed method is conducted, and experimental assessment of efficiency and accuracy is conducted in different datasets. Results indicate that the method disclosed by the invention can reach expected safety targets, and can increase retrieval efficiency on the premise of ensuring retrieval accuracy.
Owner:XIDIAN UNIV

Outsourcing encrypted data-orientated verifiable intersection operation method and system

The invention relates to an outsourcing encrypted data-orientated verifiable intersection operation method and system and belongs to the verifiable outsourcing computation field. The method is carried out among a third-party trusted entity, at least two client entities and an outsourcing server side; the client entities are holders of data sets and requesters of data set intersection operation; the third-party entity is mainly responsible for the initialization and distribution of common parameters; the two client entities are mainly responsible for generating keys, encrypting data sets, calculating authentication information, verifying results and proofs returned by the outsourcing server side and decrypting an ciphertext data set returned by the outsourcing server side; the outsourcing server side is mainly responsible for performing data set intersection operation; and a plaintext data set is not required to be obtained through decryption when the outsourcing server side performs intersection operation, and the outsourcing server performs operation on a ciphertext, and therefore, the privacy of user data can be ensured. The method and system have the advantages of low frequency of interaction among the entities, low communication cost and efficient correctness verification of operation results.
Owner:NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products