Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

182results about How to "Improve privacy and security" patented technology

Binding, unbinding and binding updating method for third-party application account and mobile phone number

The invention discloses a binding method, an unbinding method and a binding updating method for a third-party application account and a mobile phone number. The binding method comprises the following steps that (1) a user transmits a mobile phone number to be bound to a mobile phone verification platform of a third-party application account management server; (2) the mobile phone verification platform of the third-party application account management server generates a random verification code, and transmits the random verification code to the user of the mobile phone number to be bound through a mobile operator network; (3) the user receives a verification short message, and transmits the verification code back to the mobile phone verification platform of the third-party application account management server; (4) a user database of the third-party application account management server records an association relationship between an account of the user and the mobile phone number; (5) the mobile phone verification platform of the third-party application account management server transmits a service name code and the mobile phone number to a mobile phone binding server of the mobile operator through a binding message, and associates the mobile phone number of the user and the bound third-party application service name code.
Owner:郑盈盈

System and Method for Making a Data Silo to Distribute Electronic Data

We have a method of making a Web Service and a website, which we call a Silo, that lets a sender upload a file (or directory) of arbitrary size, that she wants distributed electronically to one or more recipients. The uploading can be done via a standard web browser. The Silo associates a token with that file and gives that to the sender. The token is some random bit sequence. The sender can then send that token and the Silo's URL, to her recipients. Who can then use a browser to go to that Silo, present the token, and get the file. A simple usage for sender and recipient. It lets the sender compartmentalize access to various files, and avoids the limitations of using email or ftp to transfer the files. E-commerce can be enabled by having the Silo act as a recognized financial intermediary, and by the sender selling items. With a recipient paying the Silo, who acts as an escrow. The seller can also conduct public or private auctions, using the Silo to host them. We make a Reverse Anonymizer (RA), which is a computer on the Internet that lets two parties connect and interact electronically, where the initiating party does not know the network address of the other party. Optionally, the latter might not also know the address of the former. One or both of the two parties might be a computer program, or a human. The RA mediates messages between the parties. We describe how the RA differs significantly from a reverse proxy server or an Instant Messaging server. The RA can be used to enhance the privacy and security of Internet communications and data transfer.
Owner:SHANNON MARVIN +1

Hyperledger Fabric block chain private data storage and access system and method thereof

ActiveCN111191286AImprove personal privacy securityNot easy to degrade performanceFinanceDigital data protectionData querySmart contract
The invention discloses a Hyperledger Fabric block chain private data storage and access system and a method thereof. The system comprises a client module, an SDK module, an intelligent contract module and a database module, the client module calls a private data storage chain code function through the SDK module, the intelligent contract module judges whether an effective chain code set containsthe private data storage chain code function or not according to role information in a certificate of the client module, and if the effective chain code set contains the private data storage chain code function, the private attribute of the encrypted data and the non-private attribute are stored in a database together; the client module calls the private data query chain code function through theSDK module; and the intelligent contract module judges whether the effective chain code set contains a private data query chain code function or not according to role information in a certificate of the client module, if so, decrypts a query result of the database module and returns real data to the client module, and otherwise, directly returns ciphertext data to the client module. According to the method and the system, the personal privacy security in Hyperledger Fabric data storage can be effectively improved, and the method and the system have the advantages of confidentiality and security.
Owner:NANJING UNIV OF SCI & TECH

Method and system for supporting multi-mode identification network addressing to gradually go to IP, and storage medium

The present invention provides a method and system for supporting multi-mode identification network addressing to gradually go to IP, and a storage medium. The present invention proposes a set of newnetwork multi-mode identification generation management and routing addressing system that integrates blockchains. The multi-mode identification dynamic adaptation and intercommunication technology isused to break through all existing network performance and security bottlenecks based on the IP layer, and the distributed blockchain consensus algorithm is used to achieve the original wish of Internet co-management and co-governance. All network resources on the network are locked on the blockchain to ensure that network resources are authentic and not tampered; the high-performance and low-overhead distributed storage technology is used to achieve the security of multi-mode identification addressing and tamper-proof modification, and, at the same time, the introduction of user real-name registration and network login management strategies combined with biometric identity information and signature strategies for privacy protection are introduced to reduce system management costs and improve the privacy and security of access node information.
Owner:PEKING UNIV SHENZHEN GRADUATE SCHOOL +3

Safety payment system and method based on smart TV multi-screen interaction

The invention discloses a safety payment system and method based on smart TV multi-screen interaction. A business delegate method is introduced to relegate an identity authentication requirement at a smart TV terminal to a user smart terminal, which is higher in security and supports a plurality of physiological information authentications, to process through a multi-screen interaction concept, and a processing result is finally returned to the smart TV terminal. Through the adoption of the user smart terminal, a built-in or external physiological information authentication device and an identity authentication server are combined through an asymmetrical secret key mode to perform the negotiation authentication, thereby realizing the safety payment system at the smart TV terminal. Through the adoption of the method disclosed by the invention, a user can finish the identity authentication and the affair confirmation of the smart TV terminal by means of the convenient and safe physiological information authentication device at the smart terminal, and the traditional user name password identity authentication mode is substituted. The information security in the authentication process is greatly improved while the user experience is guaranteed.
Owner:INST OF INFORMATION ENG CAS

Two-tiered wireless sensor network range query method capable of verifying privacy protection

The invention discloses a two-tiered wireless sensor network range query method capable of verifying privacy protection. The two-tiered wireless sensor network range query method capable of verifying privacy protection includes the data collection protocol step and the query execution and verification protocol step. The data collection protocol step includes the procedures that sensor data are periodically collected by sensor nodes and subjected to bucket partitioning, data buckets are encrypted, verification code information of redundant buckets is worked out, corresponding data messages are constructed and uploaded to storage nodes, and the data messages are collected and then stored through the storage nodes. The query execution and verification protocol step includes the procedures that query instructions containing minimum tag sets corresponding to target zones are constructed by a base station and sent to the storage nodes, the storage nodes execute query processing and return corresponding query feedback messages, the base station decrypts the feedback messages and works out final query results, and finally query result consistency is verified. The protocol steps of the method are simple, privacy security of sensitive data can be guaranteed, and the query results can be verified; the in-network communication cost of the sensor nodes is low, and prolonging of the life cycle of a whole network is facilitated.
Owner:NANJING UNIV OF POSTS & TELECOMM

System for remotely acquiring mobile phone information

The invention relates to a system for remotely acquiring mobile phone information. The system is applied to a user's mobile phone and is capable of remotely acquiring missed calls, unread messages and contacts' phone numbers in the user' mobile phone by transmitting a verification code and an information code to the user's mobile phone through a master control phone. The system is characterized by comprising a verification module, a code analysis module, an executive module and an information recording module, wherein the verification module is used for verifying validity of identity of the master control phone, the code analysis module is used for analyzing the information code, the executive module is used for executing processing results from the verification module and the code analysis module, and the information recording module is used for recording and forwarding information of requested access, to the user's mobile phone. Even if the user's mobile phone is not carried, the missed calls, short messages and contacts' phone numbers can be acquired, so that life convenience is brought to people. Even if the verification code to the mobile phone is cracked by other people, the user can be informed of whether the mobile phone is remotely accessed for information or not through email boxes and can be informed of related information of the master control phone to take corresponding measures, so that privacy security in mobile phones can be improved to a certain degree.
Owner:LITE ON ELECTRONICS (GUANGZHOU) LTD +1

Privacy protection methods and privacy protection apparatuses in vehicle communication

The present invention provides a privacy protection method and a privacy protection apparatus in vehicle communication. The privacy protection method comprises the steps of acquiring a first secret key allocated by an operator, wherein after the operator allocates the first secret key, multiple pairs of (PMSI, KPMSI) are encrypted by using the first secret key and then are sent to an authentication management center; sending a request of signing a public key of a vehicle terminal to the operator, and receiving a signature result returned from the operator, wherein the operator uses a private key of the operator to sign the public key of the vehicle terminal; sending an identifier of the vehicle terminal, the public key of the vehicle terminal and a signature result to the authentication management center, and receiving at least one pair of (PMSI, KPMSI) that is encrypted by using the public key of the vehicle terminal and the first secret key and is sent by the authentication management center; and decrypting the received (PMSI, KPMSI) according to the first secret key and the private key of the vehicle terminal, and performing vehicle communication according to the decrypted (PMSI, KPMSI). Through adoption of the method and apparatus, the privacy security in vehicle communication is greatly improved.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Safety transaction method and system based on policy identity

The present invention provides a safety transaction method and system based on policy identity. The method comprises the steps that: a wireless data transmission device 10 accesses a safety server toobtain Token, transaction documents and police identity; a wireless data transmission device 20 performs encryption and broadcast of information of a transaction device; the wireless data transmissiondevice 10 performs scanning to obtain a data packet, decodes the Token to obtain a secret key Key1 and perform decoding verification of the broadcasted data packet through adoption of the Key1; afterverification is passed, the wireless data transmission device 10 performs encryption of data formed by the transaction documents, the police identity and the information of the transaction device byemploying the secret key Key1, modulate ciphertext to wireless orienteering data and send the wireless orienteering data to the wireless data transmission device 20; and the wireless data transmissiondevice 20 receives the wireless orienteering data, then calculate a secret key Key2 to perform decoding verification of the ciphertext, perform decoding verification of the transaction documents after the verification is passed, and performs transaction processing logic after the verification is passed. The safety transaction method and system based on policy identity achieves wireless both-way identity verification of the safety transaction data so as to avoid that the transaction documents are counterfeited and the fun is stolen and improve the safety.
Owner:咪付(广西)网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products