Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

460results about How to "Improve privacy protection" patented technology

Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party

E-commerce which secures private and personal information of purchaser / users. E-commerce which may include delivery of a good ordered or purchased over a network (e.g., the Internet) to a purchaser / user, and / or arranging for electronic payment of the good is accomplished while securing private and personal information of purchaser / users, which may include the user's identity and address (and those of the user's computer), and financial information. E-commerce transactions include the purchasing or otherwise ordering of goods electronically by user, who may be a consumer or retail customer, and for delivery of goods to a shipping or electronic address designated by the user or to a physical or virtual depot for pick-up by the user, while providing complete anonymity of the user with respect to an electronic vendor, who may be a merchant or retailer. Proxy software is provided for user computers, one or more proxy computers, or both, for users to communicate with vendors anonymously over the network, provide for delivery of an ordered good and provide for electronic payment, while securing the user's private information. Delivery of a good includes shipping from a vendor to a depot using the depot name and address, and then either re-shipping from the depot to an address designated by the user which is withheld from the vendor, or held at the depot for anonymous pick-up. The proxy software provides for a proxy party to deal with a vendor and arrange payment from a bank or credit card company to the vendor based on an account that the proxy party has with the bank. The proxy party is not required where the purchaser / user is provided with a transaction identity by a third party bank, for example, which masks the true identity of the purchaser who, however, is known to the bank, as is his, her or its shipping address.
Owner:IPRIVACY

Federated learning information processing method and system, storage medium, program and terminal

The invention belongs to the technical field of wireless communication networks, and discloses a federated learning information processing method and system, a storage medium, a program, and a terminal. A parameter serve confirms a training task and an initial parameter and initialize a global model. The parameter server randomly selects part of participants to issue model parameters, encrypts themodel parameters and forwards the model parameters through the proxy server; the participants receive part of parameters of the model and cover the local model, and the model is optimized by using local data; the participant calculates a model gradient according to an optimization result, selects a part of the model gradient for uploading, adds noise to the uploading gradient to realize differential privacy, encrypts the uploading gradient and forwards the uploading gradient through the proxy server; the parameter server receives the gradients of all participants, and integrates and updates the global model; and the issuing-training-updating process of the model is repeated until an expected loss function is achieved. According to the invention, data privacy protection is realized; the communication overhead of a parameter server is reduced, and anonymity of participants is realized.
Owner:XIDIAN UNIV

Method and system for processing factoring information based on blockchain

The invention provides a method and a system for processing factoring information based on a blockchain. The method for processing the factoring information comprises the following steps: receiving afactoring request transmitted by a user; forming a corresponding factoring smart contract according to the factoring request; identifying user information related to the factoring smart contract on the blockchain; carrying out endorsement verification on the factoring smart contract by an endorsement verification node corresponding to the user information, on the blockchain; when the factoring smart contract passes the endorsement verification, changing ownership information corresponding to the factoring request by the factoring smart contract. The method and the system for processing the factoring information based on the blockchain, provided by the invention, provide fidelity and traceability of service data for all parties participating in factoring service by applying the characteristics of non-deletability, temper resistance, multi-maintenance, account book sharing and the like of blockchain data. Besides, the fulfillment of factoring service is finished by the factoring smart contract, service data cannot be tempered, and the difficulty of information mutual recognition of all the parties participating in the factoring service in the prior art is overcome.
Owner:CHINA CHAIN TECH CO LTD

Depository receipt application transaction system and method based on blockchain

ActiveCN107844976AThere is no problem of rapid data expansionGood privacy protectionPayment protocolsSpecial data processing applicationsPrivacy protectionReceipt
The invention discloses a depository receipt application transaction system based on blockchain, and relates to the technical field of blockchain. The system comprises a user blockchain platform, a main blockchain platform, and a processing module. The user blockchain platform comprises at least two user units and a supervision unit, and each user unit comprises an expenditure item subchain and anincome item subchain, wherein the expenditure item subchain is used for storing a depository receipt document generated by a user, and the income item subchain is used for storing the depository receipt document received by the user. The supervision unit is used for the backup of the depository receipt documents stored in all user units. The main blockchain platform comprises a first main chain and a second main chain, wherein the first main chain is used for storing the subchain state information of each user unit, and the second main chain is used for storing the address of each user unit.The processing module is used for comparing whether the Hash values of the subchains of the user units are the same as a Hash value stored in the first block chain at any time or not. According to theinvention, the processing performance of the system is not limited by the number of users, and a problem that data is rapidly expanded is solved. The system has a good privacy protection function, and can effectively prevent the document data from being tampered.
Owner:WUHAN TIANYU INFORMATION IND

Partitioned block chain network and method for realizing partition query by same

The invention discloses a partitioned block chain network. The block chain network consists of multiple nodes; according to visible permissions of the nodes to different transaction data, part or allof the nodes are divided in one or more partitions; the interior of the same partition is completely visible for the transaction data, and different partitions are invisible for the transaction data;according to the permissions of the nodes participating in a consensus process, all the nodes are classified: the nodes capable of participating in the consensus process of all the partitions are global consensus nodes, the nodes only capable of participating in the consensus process of the partitions where the nodes are located are partition consensus nodes, and the nodes incapable of participating in any consensus process are synchronous nodes; each node has a partition identifier; and each node stores transaction fingerprints of all historical transaction data. By partitioning and classifying the nodes in the block chain network, the query of the historical transaction data is limited in the same partition, so that the propagation range of the historical transaction data is greatly reduced and the data privacy protection effect is improved.
Owner:上海分布信息科技有限公司

Game data partition storage method based on block chain hash addressing and re-encryption

The invention relates to a game data partition storage method based on block chain hash addressing and re-encryption. The method comprises a data partition storage step and a data check step, whereinthe data partition storage step specifically comprises: partitioning block chain nodes into a full node, a consensus node, a storage node and a management node; performing hash operation on the node data to generate hash code; broadcasting the hash codes to nodes throughout the network; performing consensus verification by using hash values; generating a storage address table corresponding to thehash values; and respectively storing the data on the nodes according to the generated storage address table corresponding to the hash values. According to the game data partition storage method basedon block chain hash addressing and re-encryption, by performing fragmentation and partition storage on the data, the data have m pieces of redundancy, the stored data are fragmented, so that the dataprivacy is improved, and the nodes are classified, and different nodes are responsible for different functions, thereby reducing the resource waste, and the hierarchical node structure improves the scalability and the pluggability of the architecture.
Owner:广东微链科技有限公司

Fingerprint and password combined type verification method and device thereof

InactiveCN104091103AIncrease the difficulty of cracking verificationImprove privacy protectionDigital data authenticationPrivacy protectionConfidentiality
The invention discloses a fingerprint and password combined type verification method and a device thereof. The fingerprint and password combined type verification method and the device thereof are used in an electronic device with a touch screen, and the touch screen has the fingerprint recognition function and the touch recognition function at the same time. The method includes the following steps that an input keyboard which is provided with a plurality of virtual keys is displayed, and if an input password is the same as a pre-stored password and each fingerprint for operating the virtual keys is matched with a corresponding pre-stored user fingerprint, verification is successful. By means of the fingerprint and password combined type verification method and the device thereof, cracking verification difficulty is greatly increased, and privacy protection to the electronic device is improved; the practicability of the method is almost the same as the practicability in an existing mode, under the condition that user difficulty is not increased, the password cannot be cracked by others easily, and hence the confidentiality which is far higher than that of an existing verification mode is achieved.
Owner:NANCHANG OUFEI BIOLOGICAL IDENTIFICATION TECH +3

Intelligent storage cabinet

The invention discloses an intelligent storage cabinet, which comprises a cabinet body, wherein a man-machine interaction control unit and an access opening are formed in the cabinet body; a carrying and collecting plate is arranged on the access opening; a base, a support post, a plurality of horizontal support platforms, a plurality of storage boxes, a driving device, a support plate, an ascending and descending device, a push-pull device and a power distribution box are arranged in the cabinet body; an annular guide groove and a plurality of storage boxes are arranged on each horizontal support platform; the support plate is arranged on the ascending and descending device; an auxiliary guide groove is formed in the support plate; the push-pull device is arranged at the bottom of the support plate; the driving device is arranged on each horizontal support platform, and is used for driving the plurality of storage boxes to slide along the annular guide groove and the auxiliary guide groove; the man-machine interaction control unit, the driving device, the ascending and descending device and the push-pull device are electrically connected with the power distribution box; the driving device, the ascending and descending device and the push-pull device are connected with the man-machine interaction control unit. The intelligent storage cabinet has the advantages that the automatic finding can be realized; the storage boxes to be accessed can be automatically conveyed to the access opening position; the accessing is convenient and safe.
Owner:时长永

Privacy protection method during data aggregation of wireless sensor network

InactiveCN102833740ASmall number of public key digitsCalculation speedSecurity arrangementPlaintextWireless mesh network
The invention discloses a privacy protection method during data aggregation of a wireless sensor network. Privacy protection in a data addition aggregation process and a multiplication aggregation process is realized on the basis of an elliptical curve algorithm. The privacy protection method comprises the following steps of: determining, by a target node, an elliptical curve parameter and a private key k, calculating a public key K and broadcasting the elliptical curve parameter and the public key K; encrypting, by each source node, a plain text by an elliptical curve algorithm by using a random number, the elliptical curve parameter and the public key K and transmitting a cipher text message; performing, by a middle node, aggregation operation on the received cipher text message and transmitting an aggregation result to the target node; and decrypting, by the target node, the received aggregated cipher text data by using the private key k according to the elliptical curve algorithm to obtain aggregated plain text data. Compared with the prior art, an elliptical curve encryption technology adopted in the invention has the advantages of small public key digit, high calculation speed and the like, and two aggregation operation modes of addition aggregation and multiplication aggregation can be realized.
Owner:JIANGSU UNIV OF SCI & TECH +1

Searchable encryption method based on wildcard character in cloud storage safety

The invention relates to a searchable encryption method based on wildcard character in cloud storage safety. The method comprises the following steps that: setting a document to be uploaded; extracting a keyword set; encrypting the keyword set; selecting a random number as a document encryption key, and encrypting the document encryption key; encrypting the document to be uploaded to obtain a ciphertext, and sending the ciphertext to a cloud computing platform; input a query keyword set, generating a query trapdoor, carrying out signature, and sending the signature to the cloud computing platform; verifying a query signature by the cloud computing platform, and executing a search algorithm by the cloud computing platform; transmitting a keyword index and the query trapdoor into a keyword matching protocol to obtain an encryption matching result; carrying out decryption to obtain a search result; according to the search result, returning a corresponding ciphertext by the cloud computing platform; and recovering the document encryption key, and recovering the document. By use of the method, the keyword search of at most two wildcard characters can be supported, the wildcard character can appear on any position of the keyword, and a plurality of random characters can be represented.
Owner:FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products