Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

327results about How to "Guaranteed privacy and security" patented technology

Electronic game system, method of managing and regulating said system

PCT No. PCT/RU95/00241 Sec. 371 Date Jan. 27, 1998 Sec. 102(e) Date Jan. 27, 1998 PCT Filed Nov. 10, 1995 PCT Pub. No. WO97/05557 PCT Pub. Date Feb. 13, 1997An electronic gaming system is disclosed that includes a central computer station, a plurality of peripheral computer stations, and a data exchange network for coupling the peripheral computer stations to the central computer station. The central computer station includes an administrative subsystem, a player's registration subsystem, a game accounts managing subsystem, an information tabulating, storing and searching subsystem, a game recording subsystem, a scoring subsystem, a wagering and betting subsystem, an executive gaming subsystem, an electronic payment subsystem, an information protection subsystem, a secure communications subsystem, and a game selection subsystem. Each of the peripheral computer stations include a subsystem for admitting and registering players with the central computer station and a gaming interface subsystem. To ensure security of the electronic gaming system, a player seeking to enter the system transmits an encoded message from their peripheral computer station to the central computer station that includes a set of key attributes associated with the player. The central computer station decodes and compares the transmitted set of key attributes with individual information previously stored in the information protection subsystem in order to identify each player during registration based upon the set of key attributes transmitted by each player. The system may automatically control money transactions with each player's bank accounts based upon the player's scoring and wagers in each selected game.
Owner:LYDIA VLADIMIROVNA NESTERENKO

Embedded device, control method therefor, program for implementing the control method, and storage medium storing the program

InactiveUS20060059462A1Easily and flexibly expandableSecuring privacy and securityWeb data retrievalNatural language data processingImaging processingWeb browser
An embedded device incorporating a Web browser, which enables a server to provide a dynamic content adapted and linked to a function specific to the embedded device and a status of the same, as an easily and flexibly expandable service in response to access from the embedded browser, and enables securing privacy and security of information on a client. In an image processing apparatus (110) implementing the embedded device, a Web browser module (211) loads Web content data containing at least document data which is described in a markup language and has a script or information for reference to a script embedded therein, and performs presentation based on the loaded Web content data. A controller unit (111) controls information and operation of the image processing apparatus. A script interpreter (805) incorporated in the Web browser module interprets the document data contained in the loaded Web content data and processes the script or the information for reference to a script embedded in the document data. A control API module (218) provides an interface via which the script interpreter gains access, based on the processing of the script, to a DOM managed in the Web browser module. Further, the control API module provides an interface via which the script interpreter gains access, based on the processing of the script, to the information and operation of the embedded device, controlled by the controller unit.
Owner:CANON KK

User privacy protection method in personalized information retrieval

The invention discloses a user privacy protection method in personalized information retrieval. The user privacy protection method in personalized information retrieval is a user interest model anonymization method based on difference privacy and aims to remove contradiction between user privacy protection and improvement of personalized information retrieval performance. The user privacy protection method in personalized information retrieval aims to conduct anonymization after identifiers of a user interest model are concealed, and namely after the identifiers (including the ID, the name, the ID number, the SSN and the like of a user) are eliminated, related technologies of the difference privacy are mainly used for anonymizing standard identifiers of the user interest model. Namely, generalization is conducted on the standard identifiers of the user, Laplace noise is added so as to enable difference privacy protection requirements to be met, the inquiry precision of a statistical database is maximized, and the probability of identification of an entity and attributes is minimized. The user privacy protection method in personalized information retrieval can be widely applied to service systems, such as a personalized retrieval service system and a personalized recommendation service system. The invention belongs to the technical field of information and computers.
Owner:BEIJING INFORMATION SCI & TECH UNIV

Method and device for multi-party joint training of graph neural network

The embodiment of the invention provides a method and device for multi-party joint training of a graph neural network. The multiple parties comprise a plurality of data owners and a server; the graphneural network comprises a graph embedding sub-network and a classification sub-network. And each data owner maintains a part of the graph embedding sub-network, and the server maintains the classification sub-network. Any data owner calculates a primary embedding vector of a sample in a graph embedding sub-network maintained by the data holder through multi-party security calculation MPC, and performs multi-level neighbor aggregation on nodes according to a local graph structure to obtain a high-order embedding vector of the nodes, and sends the high-order embedding vector to a server. And the server synthesizes the high-order embedded vectors from the data owners by using the classification sub-network, and performs classification prediction according to the high-order embedded vectors to determine the loss. And the loss gradient is transmitted back to the graph embedding sub-network in the data holder from the classification sub-network in the server, so that the joint training of the whole graph neural network is realized. According to the embodiment of the invention, the data privacy of each party is protected.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

Mobile equipment voiceprint registration and authentication method and system

The invention discloses a mobile equipment voiceprint registration and authentication method and system. The voiceprint registration method comprises the following steps: processing voices to framing treatment, spectral analysis and auditory perception filtering to obtain voiceprint characteristic data; mapping the voiceprint characteristic data to a quantified data storage list to obtain compressed voiceprint characteristic data; acquiring a corresponding a model statistic quantity according to the compressed voiceprint characteristic data; establishing a voiceprint model according to the voiceprint statistic quantity, and marking and storing to complete voiceprint registration. In the voiceprint registration stage, the voiceprint model is registered according to the model statistic quantity. In the authentication stage, the model statistic quantity is compared with a stored voiceprint model. The method provided by the invention can reduce the calculation amount of the voiceprint model, reduce the storage space of voiceprint characteristics, and resolve the requirement of the mobile equipment for real-time performance of an algorithm, and can improve the use experience and ensure user privacy security without networking for registration and authentication or uploading the user's voiceprint data to a server.
Owner:SHANGHAI GUOKE ELECTRONICS

Privacy protection method based on location service in scene of Internet of Things (IOT)

Provided is a privacy protection method based on location service in a scene of the Internet of Things (IOT). The privacy protection method based on the location service in the scene of the IOT comprises two privacy protection schemes according to the characteristics on the basis of the location service and the privacy protection level, namely an absolute privacy query scheme for a quite high security level and a query privacy scheme for a quite low security level. Through analysis of application scenes, the secure multi-party computation technology is integrated into IOT location privacy protection, by utilization of technologies such as adding random numbers, using dot product properties, and carrying out homomorphic encryption and oblivious transfer protocols, a dot which is nearest to a query input location in a database to be queried is calculated and found out, different levels of protection measures are taken according to the different application scenes, and therefore the effect that the privacy of query input, query results and contents of the database to be queried is protected is achieved in the absolute privacy protection scheme, and the privacy of the query input and the query results is protected in the query privacy protection scheme.
Owner:NANJING UNIV OF POSTS & TELECOMM

Touch screen terminal based unlocking method and apparatus and touch screen terminal

The invention discloses a touch screen terminal based unlocking method. The method comprises the steps of displaying an unlocking interface in a touch screen terminal, wherein the unlocking interface comprises at least one touch region; according to the operation of a user for the touch region of the unlocking interface, obtaining unlocking information and extracting fingerprint information detected in a specified touch region; judging whether the unlocking information is consistent with preset unlocking information or not and whether the fingerprint information detected in the specified touch region is consistent with fingerprint information preset for the specified touch region or not; and if the unlocking information is consistent with the preset unlocking information and the fingerprint information detected in the specified touch region is consistent with the fingerprint information preset for the specified touch region, unlocking a target object. Correspondingly, the invention furthermore discloses a touch screen terminal based unlocking apparatus and the touch screen terminal. With the adoption of the method and the touch screen terminal, the information security level can be improved, thereby ensuring user privacy to be secure.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Differential privacy data publishing method and system based on dependency removal

The invention discloses a differential privacy data publishing method and system based on dependency removal. Each data owner independently sections an own original data set and obtains a differential value data set, the first two items of the differential value data set are subjected to summation and noise adding, then, the obtained value is uploaded to a cloud service provider after the obtained value is subjected to homomorphic encryption, and the cloud service provider carries out homomorphic decryption operation; each data owner transforms the differential value data set item to obtain a transformation coefficient, and stable noise consisting of white noise which is mutually independent and complies with Gaussian distribution is added; the data owner carries out inverse wavelet transform to obtain a scrambled data set, and the data set is uploaded to the cloud service provider; and the cloud service provider utilizes Wiener filtering to carry out filtering, and the cloud service provider carries out inverse transformation on a refined data set and publishes the refined data set to the data item of a third-party data user when the data user requests the data set. The differential privacy data publishing method and system effectively reduces the data calculation amount and interaction amount and improves a resource use ratio and data availability.
Owner:WUHAN UNIV

Remote hospital monitoring system and method

InactiveCN108852282AReal-time acquisition of physiological dataAvoid the need for one-by-one roundsData processing applicationsDiagnostic recording/measuringReal time analysisMonitoring system
The invention discloses a remote hospital monitoring system and method. The system comprises a collecting end, a mobile end, a patient registration end, a nurse monitoring end, a central server, a doctor diagnosis end and a hospital management end; the patient registration end obtains personal information of a patient and writes the information into the central server; the collection end collectsphysiological data of the patient and uploads the data to the nurse monitoring end through the mobile end; the nurse monitoring end performs real-time analysis and intelligent monitoring on the physiological data and uploads the data to the central server; the doctor diagnosis end requests real-time or history data from the central server, performs comprehensive diagnosis, generates a diagnostic report and uploads the report to the central server; the hospital management end manages personal information and permission of medical personnel. By taking a server as the center, working end and dataflow are arranged reasonably, effective transmission, storage and management of the data are kept; on the one hand, a nurse remotely and centrally monitors the patient, and the workload of ward roundis relieved; on the other hand, a doctor remotely obtains the patient data conveniently, and the diagnostic process is assisted.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV +1

Multi-user multi-parameter wireless detection, diagnosis, service and monitoring system

The invention relates to a multi-user multi-parameter wireless detection, diagnosis, service and monitoring system which comprises a detection terminal and a medical establishment central processing terminal connected to the detection terminal through a network, wherein the detection terminal comprises a patient information reading module, a measuring module and a first transmission module. The first transmission module transmits patient physiological data measured by the measurement module to the medical establishment central processing terminal through the network. The medical establishment central processing terminal comprises a central analysis and diagnosis database and a second transmission module, and the second transmission module transmits data between the first transmission module and the central analysis and diagnosis database. The detection terminal further comprises an output module which is at least used for outputting inspection reports. According to the multi-user multi-parameter wireless detection, diagnosis, service and monitoring system, data transmission between the detection terminal and the medical establishment central processing terminal is utilized to achieve remote medical service, so people can more conveniently enjoy the medical service, and time and places for the medical service are more flexible.
Owner:MAYHAP IND SUZHOU

Multi-user searchable encryption method and encryption system in Internet of Vehicles environment

The invention belongs to the technical field of wireless communication networks. The invention discloses a multi-user searchable encryption method and encryption system in an Internet of Vehicles environment, and the method comprises the steps: a trusted authorization mechanism transfers a calculation burden on a cloud server to an edge server of each edge node, and a data end generates a query trap door through a private key, and transmits the query trap door to the edge server on the edge node; after receiving the request, the edge server matches a corresponding vector according to an indexand a trap door sent by the data end and sends the vector to the cloud server, and the cloud server obtains a matched file label and ciphertext data according to the vector and the hash table, searches for a signature of a keyword and returns the signature to the data end; and after verifying that the signature is correct by using the signature public key, the data end decrypts the ciphertext databy using the attribute key to obtain a data plaintext. Data privacy protection is achieved in the Internet of Vehicles environment with high requirements for communication time delay and calculationoverhead, and fine-grained control over the access permission of multiple users is achieved.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products