Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

4727results about How to "Improve confidentiality" patented technology

Dynamically generated web surveys for use with census activities, and assocated methods

Certain example embodiments disclosed herein relate to online survey systems and / or methods. In certain example embodiments, the questions to be asked are substantially insulated from an application that asks the questions. This abstraction may be accomplished in certain example embodiments by dynamically generating a computer-accessible (e.g., web-based) survey from one or more definition files. For example, a survey may be defined via a response definition file and a user interface definition file, thereby enabling the definition files to be read and the survey to be presented with the appropriate questions, validations, and transformations being specified by the response definition file, and with the look and feel being specified by the user interface definition file. Answers to questions may be persisted for a respondent in a storage location remote from the respondent. Such online surveys systems and / or methods may be suitable for census-related activities.
Owner:LOCKHEED MARTIN CORP

Information security management and control method under cloud manufacturing environment

The invention discloses an information security management and control method under a cloud manufacturing environment. On the basis of a network security protocol, a password technology and a public key infrastructure (PKI), comprehensive security guarantee is supplied to information interaction among cloud internal networks, between one cloud and another cloud, and between a user and each cloud by using implementation technologies and methods, such as a virtual private network (VPN) based on multiple layers of protocols, a digital envelope and a password algorithm; Intranet, Extranet and Internet of a cloud manufacturing system are covered; comprehensive management and control technical information files are stored and transmitted to each used loop; a session key (SK) which is randomly produced by using a key production protocol is used for symmetrically encrypting the technical information files; and a receiver public key obtained according to a PKI digital certificate asymmetrically encrypts the SK to form the digital envelope for protecting the technical information files and the SK. The information security management and control method has the characteristics of being high in confidentiality, high inefficiency, flexible in arrangement and the like and can be widely applied to the cloud manufacturing system and other network manufacturing systems.
Owner:CHONGQING UNIV

Electronic document safe sharing system and method thereof

The invention discloses an electronic document safe sharing system which can realize safe storage and fully sharing of secret document. The electronic document safe sharing system comprises a document encrypting module and a document decrypting module; wherein the document encrypting module utilizes a session key to symmetrically encrypt electronic document data, receiver identification (public key) is utilized to asymmetrically encrypt the session key, and finally the encrypted symmetric key and encrypted electronic document data are packed into a digital envelop; and the document decrypting module utilizes an own private key to decrypt the digital envelop. The electronic document safe sharing method of the invention takes CPK combined public key or CPK compound public key technology as the basis, flexible digital signature and secret key exchange capacity thereof are utilized, and a confidential document management system which is from a server to a client, contains information storage and transmission to each use link and is integrated with document data encryption, access control, authorization management, dynamic key exchange and process audit trail into a whole is constructed.
Owner:BEIJING E HENXEN AUTHENTICATION TECH +1

Standing order database search system and method for internet and internet application

An internet and / or intranet based database search system and method for conducting searches of highly confidential records such as individual patient medical records and to automate the process of securing required approvals to make such records available to a properly authorized and authenticated requesting party. The system's central premise is that the patient has a fundamental right to the confidentiality of their personal medical records and should control that right through specific, informed consent each time that a party requests to receive them. It reinforces the widely held conception of privacy in general as well as of the sanctity of the doctor / patient relationship by granting the doctor the right, subject to the patient's express permission, to initiate a search request. At the same time, it provides an expedited and cost-efficient means for transfer of such records as demanded by many healthcare reform proposals and gives the repositories where these records are held the right to stipulate the specific terms and conditions that must be fulfilled before they will release documents entrusted to their care, thereby substantially reducing the risk of litigation alleging breaches of patient confidentiality. And it carries out all of these legitimate interests in a way that is fast, simple to use and easy to audit. The system optionally includes a billing mechanism to pay for any added cost associated with providing this additional protection; and in its preferred embodiment, is applicable to both digital as well as non-digital records.
Owner:PRIVATE ACCESS +1

Methods of anti-spam marketing through personalized referrals and rewards

ActiveUS7774229B1Protect privacy and confidentialityConfidenceDiscounts/incentivesAdvertisementsDigital dataPersonalization
A marketing method comprising a Provider offering a potential reward to a first party in exchange for promotional assistance of forwarding a first e-mail message to a second party comprising a personalized referral for the marketable entity, a first set of data comprising a first serial number and a first URL link. A first Web site corresponding to the first URL link is created which provides information on the referenced marketable entity and an offer to transact. The first set of data in the first e-mail message is correlated to a first set of database data within a digital database controlled by the Provider. The first e-mail message is forwarded from the Provider to the first party. The first e-mail message is forwarded from the first party directly to the second party without giving any identifying information about the second party to the Provider.
Owner:STRIPE INC

Electronic information retention method/system, electronic information split retention method/system, electronic information split restoration processing method/system, and programs for the same

The invention aims to provide an electronic information split restoration processing method/system capable of processing massive electronic information at high speed while preventing leakage of the electronic information with reliability, and without causing deterioration in immediacy, centrally controlling electronic information to be processed by information processing units that are distributed geographically in a wide area, and connected via network. When electronic information is to be retained, a reversible split process and a reversible conversion process are applied to the electronic information (step S8), to thereby generate a plurality of split files (step S10), and store the split files together with dummy files (step S12). Split restoration information is generated (step S14) to be stored by relating processing information concerning the split and conversion process together with file names of the split files and information on storage destinations thereof, to data name of the original electronic information. When electronic information is to be read, split files are collected on the basis of the split restoration information (step S20) and the electronic information is restored by reversely applying the split and conversion process (step S22).
Owner:SB SYST CORP

Automated transaction machine digital signature system and method

An automated transaction machine such as an ATM (10) is provided. The ATM is operative to digitally sign electronic documents (42). The ATM may be in operative connection with a storage server (32). The storage server is operative responsive to the ATM to maintain electronic documents (42) in a data store (34) in association with the user's digital safe deposit account (40) and / or a financial account (48) such as checking, savings, debit, or credit account. The storage server is further operative to store a private key (44) of a user in association with the user's digital safe deposit account and / or financial account. The ATM is operative to cause electronic documents to be signed using the private key associated with the user. The ATM is further operative to output the electronic document on a display device (18) of the ATM where the user may view and edit the electronic document.
Owner:DIEBOLD NIXDORF

Cross-physical isolation data transparent transmission system and method between intranet and extranet

The invention relates to a cross-physical isolation data transparent transmission system between an intranet and an extranet. The system comprises a first enterprise service bus and a second enterprise service bus which are respectively arranged on the two sides of physical isolation, wherein a first safety data transmission adapter and a second safety data transmission adapter are respectively deployed on the first and second enterprise service buses, the physical isolation is arranged between gateways of the intranet and the extranet for performing network safety area isolation, the first and second enterprise service buses are used for respectively providing calling interfaces and simultaneously communicating with the physical isolation, and the first and second safety data transmission adapters are respectively responsible for safety certification and calibration of integrity and effectiveness of data of the intranet and the extranet. The invention further relates to a cross-physical isolation data transparent transmission method of the system. Improvement of data transmission can be performed under a physical isolation environment through the system and the method, the difficulty in transformation and the workload of the service system can be simplified, and the safety in data transmission can be further enhanced through the safety data transmission adapters.
Owner:MAOMING POWER SUPPLY BUREAU GUANGDONG POWER GRID CORP

Smart home remote security access control implementation method based on smart cloud television gateway

The invention relates to a smart home remote security access control implementation method based on a smart cloud television gateway. A smart home external network refers to a network environment which is also known as a smart home outer network and is formed by the way that a smart cloud television is used as a user smart home gateway, and in the household ADSL environment, the smart cloud television is in interaction with public network environment equipment (such as a mobile intelligent terminal and a smart home cloud synchronization server of the user). The smart cloud television has already obtained a terminal certificate based on a PKI digital certificate system and can provide a secure storage area for secure reading and writing, and the smart cloud television is also called the smart cloud television gateway. A portable UKey refers to the equipment which is provided with an equipment mutual communication module and a secure calculation module (like a secure chip). The smart home cloud synchronization server can regularly record the mapping binding relation between the smart cloud television gateway and the IP of a public network which is accessed by the smart cloud television gateway and synchronize the identification of controllable home equipment of the smart cloud television gateway. The smart home remote security access control implementation method based on the smart cloud television gateway has the advantages of being high in security, high in confidentiality and good in universality and user experience performance.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Device and method for proceeding encryption and identification of network bank data

ActiveCN1556449AGuarantee the security of transactionsRealize self-service downloadDigital data processing detailsSpecial data processing applicationsInternal memoryDigital signature
The invention discloses a method of encrypting and certificating network bank data by using a USB KEY, and its characteristics: it includes the steps: a), according to the user information, generating a digital certificate corresponding to the use; b), storing the digital certificate in a USB to be allocated to the user; c), when the user makes a login with the network bank for processing data, it confirms the user ID or digital signature by the USB KEY. It also discloses an implementing device of encrypting and certificating network bank data by using the USB KEY and because every USB KEY has an only serial number and the private key can not leave the internal memory, and it can not make network transaction until the user ID is confirmed, it has high secrecy and safety.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Electronic transaction systems and methods therfeor

InactiveUS20070089168A1Facilitates nonrepudiationImprove identityComplete banking machinesFinanceAuthorizationDigital data
The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the transaction request. When the transaction request is approved by the user, the PEAD receives second digital data representing the electronic service authorization token. A remote agent server may provide a bridge between the electronic transaction system and the PEAD. In another embodiment, the private key is stored on the portable device, encrypted. The decryption key is stored outside of the device, at a trusted 3rd party location. When the user attempts to make a signature the software sends a request for the decryption key, along with the user's password or pass phrase keyed in at the keyboard of the PDA, smart phone, or cell phone, to a server belonging to the trusted 3rd party.
Owner:SERVSTOR TECHNOLOGIES LLC +1

Method for realizing user identity digitalization based on block chain

The invention discloses a method for realizing user identity digitalization based on a block chain. The method comprises the following steps: S1, monitoring a state of an API registration port; S2, inputting identity information; S3, performing identity information authentication, i.e., checking user identities through a police real name authentication system and bankcard binding mode according to information input by users in a registrant name input window, a registrant identity card number input window and a bank card number input window; S4, registering a platform account, and distributing block chain identities to the users; S5, setting a payment password; and S6, performing platform transaction. The method is a digital transaction method under the support of a block chain technology. According to the invention, under the technical support of a third-party service platform, the block chain identities can be provided for the users, it is ensured that the users can carry out digital economic transaction under the block chain technology, the security and the confidentiality are quite high, the transaction content cannot be tampered, traceability can also be performed in case of a transaction problem, and the transaction reliability is improved.
Owner:北京金股链科技有限公司

Method for synchronously reproducing multimedia multi-information and application thereof

InactiveCN104869342AAvoid non-real-time problems that cannot reproduce playback at the same timeOptimize storage methodTelevision system detailsColor television detailsComputer hardwareEngineering
A method for synchronously reproducing multimedia multi-information is to combine a plurality of relevant documents and a plurality of information flows, which have associated information relation via a multi-information modulation unit, and to synchronously reproduce with a player which can be used for synchronously reproducing multi-information. The step of synchronously recording multi-information of the method is to insert non-audio and video information in audio flow, video flow or file before condensing or after condensing with the multi-information modulation unit, that is to say to embed needed video frame or audio frame in an additional information block carried with the non-audio and video information and / or creating or inserting an additional information frame carried with the non-audio and video information among the needed video frame and the needed audio frame. The method can be used for simultaneously storing a multimedia multi-information file in same file in real time and ensure highly synchronization when inquiring and playing back.
Owner:LIUZHOU GUITONG TECH

Image printing apparatus and display device and job processing method therefor

There is provided an image printing apparatus which can ensure confidentiality by including an identification section which identifies whether or not a user who requests a job is present in a predetermined range from the image printing apparatus, a queue which stores the job and manages an execution of the job in stored order, a job registration section which registers the job at the end of the queue, and a job management section which suspends the start of execution of the job registered in the queue when the identification section does not recognize the presence of the user who requests the job, and permits the start of execution of the job registered in the queue when the identification section recognizes the presence of the user who manages the job. A display device and a job processing method are also provided.
Owner:KONICA MINOLTA BUSINESS TECH INC

Photographing apparatus and communication establishing method and program

In a photographing apparatus, an encoding part creates a code image from authentication information of the photographing apparatus. A photographing part takes a photograph of a connection code image displayed on a display part of another apparatus. A decoding part decodes the connection code image contained in the photograph taken by the photographing part to decode encoded connection information containing communication setup information, which has been encoded according to the authentication information of the photographing apparatus. A restoration part restores the communication setup information from the encoded connection information by using the authentication information of the photographing apparatus. A radio communication part communicates with the another apparatus by using the communication setup information restored by the restoration part.
Owner:RICOH KK

Method and system for using phone to generate authentication pattern to perform POS payment as well as mobile phone

InactiveCN101299286AEliminate the inconvenience of carrying a cardImprove confidentialityCash registersPoint-of-sale network systemsGraphicsBank account
A method using the mobile phone generated authentication pattern to execute POS payment, writes one or a plurality of bank account information in the mobile phone chip, so that the mobile phone is associated with the corresponding bank account. The POS payment includes: recording the amount paid in the POS terminal; selecting the corresponding bank account on the mobile phone, executing verification arithmetic to the mobile phone chip and accidentally producing a set of enciphered data and generating authentication pattern on the mobile phone display screen to display; recording the authentication pattern in the POS terminal by the pattern recording apparatus; combining and ciphering the authentication pattern and the available information as the payment solicited message to transmit to the bank system; the bank system executing information verification, account process; and feeding back the process result onto the POS. The method can replace the card brushing, avoids the inconvenience of users for carrying a plurality of cards; the method can conveniently and safely use by slightly modifying the terminal reading data mode of the prior POS payment system terminals. At the same time, the present inventions provides a system and mobile phone for implementing the payment method.
Owner:胡红雨 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products