Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

33results about How to "Privacy is not leaked" patented technology

Security authentication method, master electronic device and slave electronic device

The invention discloses a security authentication method, a master electronic device and a slave electronic device. The master electronic device comprises a master control chip and a security chip, and is in communication connection with the slave electronic device. The security authentication method comprises the following steps: the security chip receives a request generation instruction sent by the master control chip; the security chip generates a security authentication request comprising a group of random numbers; the security chip sends the security authentication request to the master control chip, so that the master control chip sends the security authentication request to the slave electronic device; when the security chip receives a first encryption result sent by the master control chip, the security chip judges whether the slave electronic device is an authenticated slave electronic device according to the first encryption result, the security authentication request and a built-in key in the security chip; and if so, the security chip sends an authentication pass instruction to the master control chip, so that the master control chip provides services for the slave electronic device. The scheme can avoid the influence of the use of the slave electronic device to the service life and the secure use of the master electronic device, and protect the user privacy from being leaked.
Owner:BEIJING HUADA INFOSEC TECH

Comprehensive medical system capable of performing diagnosis monitoring in similarity matching manner and matching method of comprehensive medical system

The invention relates to a comprehensive medical system capable of performing diagnosis monitoring through a similarity matching manner. The comprehensive medical system comprises a client, a workstation, a cloud server, an image collecting device and a physiological parameter sensor, wherein a patient user uploads essential information of the patient user through the client to the cloud server; adecision user uploads case general information, main symptoms and physical signs of the patient user, result of laboratory test, pathological information, the fundamental judgment of the illness state of the patient user, treatment means, postoperative symptoms, nursing suggestions and strategies to the cloud server through the workstation; a diagnosis and treatment case database is stored in thecloud server, and the cloud server is used for integrating all kinds of uploaded information to form cases; and the decision user performs retrieve on the diagnosis and treatment case database through the workstation, and finds out the most similar case in the diagnosis and treatment case database according to similarity matching.
Owner:SUZHOU HENSUN INFORMATION TECH CO LTD

Inquiry information acquisition and analysis system and method

PendingCN112133385APromote medical awarenessSimplify the consultation processMathematical modelsHealth-index calculationMedical recordMedical knowledge
The invention provides an inquiry information collection and analysis system and method. The system comprises a patient terminal, a storage and analysis terminal, and a medical care terminal, the patient terminal is provided with a questionnaire, and the questionnaire is sent to the storage and analysis terminal after an inquiry patient fills in the questionnaire. The storage analysis terminal generates patient medical records by using the questionnaire information and feeds back the patient medical records to the patient terminal and the medical care terminal, and the medical care terminal receives the patient medical records of the storage analysis terminal and assists in completing patient inquiry. Structured data deposited at the storage and analysis end can be used as scientific research materials, analysis is conducted through artificial intelligence and other methods, and new medical knowledge is explored. Information is collected in a questionnaire survey mode, machine learningand artificial intelligence are introduced into processing of a corresponding database of a patient, a corresponding analysis model and algorithm are constructed, various indexes and conditions of the patient in the database are comprehensively processed through different dimensions, so materials are quickly collected, information is stored, medical records are generated, results are analyzed, new knowledge is explored, and various risks are prompted.
Owner:黄军彩

Efficient communication information processing method

The invention belongs to the technical field of communication, and discloses an efficient communication information processing method. A communication channel is activated through a communication information receiving end, and meanwhile, communication information can be subjected to classified sifting; identity information of the communication information receiving end is obtained and utilized toconduct identity authentication on the communication information receiving end, then the communication information is encrypted and sent to the communication information receiving end so that only thecommunication information which is subjected to identity authentication can obtain the communication information; besides, the communication information is not easily obtained by any third party, theobtained communication information is encrypted, the privacy of the communication information can be well protected, and the safety is improved. In the meanwhile, by means of the efficient communication information processing method, transmission of messages among different tasks is achieved through the combination of a transponder and a queue, the mode of messages in the queue is changed throughcontrol over attributes of the transmission queue, and the using range of the communication method can further be expanded.
Owner:HUBEI NORMAL UNIV

Method and system for identifying illegal access equipment in wireless local area network

The invention provides a method for identifying illegal access equipment in a wireless local area network. The method comprises the following steps: accessing a local WiFi wireless local area network; equipment in the wireless local area network is detected, equipment characteristics are obtained, and a first equipment fingerprint is calculated; monitoring a request / response message of local area network external equipment in the wireless local area network, extracting equipment characteristics, and calculating a second equipment fingerprint; comparing the calculated first / second device fingerprint with the device fingerprint in the white list feature library, and if the device fingerprint corresponding to the device is not in the white list feature library, judging whether the device is a known device; if the device is a known device, obtaining manually labeled device basic information, and updating the white list feature library, if the device is an unknown device, comparing the unknown device with the device fingerprint in the blacklist feature library, and if the device fingerprint corresponding to the unknown device is in the blacklist feature library, giving out alarm information; otherwise, manual judgment is carried out.
Owner:杭州优云科技有限公司

Network structure learning method based on differential privacy

The invention provides a network structure learning method based on differential privacy, and belongs to the field of machine learning. The method comprises the steps: taking to-be-learned network data as an input; normalizing the network data to form a normalized data matrix XX; determining privacy parameters epsilon and delta delta of the differential privacy algorithm; determining a standard deviation beta beta of Gaussian distribution in a Gaussian noise mechanism; generating a symmetric noise matrix NN; and generating a disturbed sample covariance matrix, and solving a network structure based on the disturbed sample covariance matrix. According to the method, the differential privacy is satisfied through the network structure learned in each step, that is, the method has a privacy protection capability, and the privacy of individuals in the data cannot be leaked. While privacy is protected, a network structure learning result also has relatively high availability, and a real potential network structure of data can be reflected; the differential privacy solving problem of a classic Graphical lasso model in an undirected graph model is solved, and it is guaranteed that the privacy of individuals in data is not leaked in the network structure learning process.
Owner:陕西数盾慧安数据科技有限公司

System and method for quickly decrypting and identifying information of protected contact through biological feature verification mode

InactiveCN106060096AEasy to operateAvoid the dilemma of not being able to identify sensitive contactsTransmissionSecurity arrangementInformation systemMemory module
The invention discloses a system and a method for quickly decrypting and identifying information of a protected contact through a biological feature verification mode. The system comprises a biological feature receiving module, a display module, a memory module, a communication module and a processing module. The biological feature receiving module is used for acquiring biological feature information; the display module is used for displaying an encrypted incoming call interface; the memory module is used for storing contact data and biological feature data; the communication module is used for acquiring an incoming call material; the processing module is used for receiving the incoming call material according to the communication module, displaying the encrypted incoming call interface at the display module and acquiring the biological feature information through the biological feature receiving module; and wherein, when the processing module judges that the biological feature information acquired through the biological feature receiving module meets a user set value, the processing module displays the decrypted incoming call material according to the biological feature data.
Owner:SHENZHEN TINNO WIRELESS TECH

Operating room nursing worker management method and system and storage medium

PendingCN112614574AFill in the information gapPrivacy is not leakedCo-operative working arrangementsDigital data protectionInformatizationOperating room management
The invention relates to the technical field of hospital nursing worker management, in particular to an operating room nursing worker management method and system and a storage medium. The method includes steps of: receiving task data issued by an operating room management terminal and creating an identification code containing the task data; sending confirmation information to the functional department management terminal; if confirmation information of the functional department management terminal is received, task information and the identification code are sent to a nursing worker mobile terminal; if the confirmation information of the functional department management terminal is not received or the return information of the functional department management terminal is received, not sending the task information; after receiving the receiving task information of the nursing worker mobile terminal, counting the task execution time of the nursing worker mobile terminal and task nodes; and after task completion information of the nursing worker mobile terminal is received, storing data information executed by the task of the nursing worker mobile terminal. The informatization blank of operating room nursing staff business is filled up, and a business closed loop among an operating room, a functional department and nursing staff is formed.
Owner:江苏达实久信数字医疗科技有限公司

Calling method for license plate recognition, computer device and readable storage medium

The invention provides a license plate recognition calling method, a computer device and a readable storage medium. The license plate recognition calling method comprises the steps of obtaining license plate number information, current user information and current position information; corresponding vehicle user information is obtained through matching according to the license plate number information; obtaining vehicle user position information of a vehicle user; comparing whether the distance between the current position information and the vehicle user position information is within a preset distance range; and if so, calling the vehicle user. According to the scheme, the license plate number image is obtained through photographing, the license plate number can also be obtained through scanning, manual input or voice input, then the vehicle user information is obtained through matching in the system, then the current position information of the calling end user is compared with the vehicle user position information, if the current position information is not within the preset range, calling is forbidden, crank calls are avoided, and the user experience is improved. And calling the vehicle user in a preset range. The automatic calling process greatly improves the communication efficiency, so that the two parties can effectively communicate to solve the problem as soon as possible.
Owner:李毓思
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products