Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

94results about How to "Protect data security" patented technology

Intelligent household appliance remote control method based on PKI system

ActiveCN106130982AProtect data securitySimplify the encryption and decryption processTransmissionSmart appliancePersonalization
The invention discloses an intelligent household appliance remote control method based on a PKI system, which relates to the field of remote control of intelligent household appliances. The method comprises the steps that: firstly, a to-be-controlled intelligent household appliance is subjected to personalized setting; the intelligent household appliance decrypts ciphertext data sent by a control terminal and further accesses a wireless local area network; under coordination of a cloud server, and by taking a device certificate as a root of trust, a binding relation between the control terminal and the intelligent household appliance is established; and finally, the intelligent household appliance is controlled through the control terminal. In the intelligent household appliance remote control method based on the PKI system, functions, such as network identity recognition, network communication secrecy keeping, communication data tampering prevention and communication subject non-repudiation, are realized through a PKI key system technology, the data used in a communication process are all transmitted in a ciphertext mode, security of the data is guaranteed by strength of an encryption algorithm used, thus, problems, such as tampering of the communication data and information leakage, are avoided, and various security risks in the existing intelligent household appliance remote control method are solved.
Owner:北京万协通信息技术有限公司

Medical data security sharing system and method based on IPFS and alliance chain

The invention relates to the technical field of alliance chain technology and electronic medical data security sharing, and discloses a medical data security sharing system and method based on IPFS and alliance chains, and the system comprises a data owner terminal which is used for encrypting original medical data through employing a symmetric secret key to obtain a medical data ciphertext, storing the medical data ciphertext in the IPFS, and transmitting the medical data ciphertext to a server; the ciphertext corresponding to the keyword and the ciphertext corresponding to the symmetric keyare uploaded to an alliance chain, and an excitation mechanism and a data access permission are set in the smart contract; and a data visitor terminal is used for obtaining the symmetric key corresponding to the target medical data and decrypting the target medical data based on the symmetric key corresponding to the target medical data and the hash address stored in the target medical data when the data access permission set in the smart contract is satisfied and the incentive cost shown by the incentive mechanism is paid. According to the invention, safe storage and sharing of medical data are realized, privacy security of patients is protected, and fine-grained access control of the patients to the medical data is realized.
Owner:ANHUI NORMAL UNIV

Storage card locking method and system

The invention relates to the technical field of content protection of storage cards and discloses a storage card locking method and system. The method comprises the following steps: S1, a user accesses data on a storage card, an operating system uses a universal command to perform operation, a storage card controller intercepts the operation and performs verification, if unlocking conditions are met, the step S2 is implemented, otherwise, the state of the storage card is kept in a locking state; S2, the storage card controller is used for converting the state of the storage card to an unlocking state; S3, the storage card controller is used for judging whether the logic of the operating system against the current operation of the storage card meets the locking conditions, if so, the step S4 is implemented, otherwise, the state of the storage card is kept in the unlocking state; and S4, the storage card controller is used for setting the storage card in the locking state. According to the method disclosed by the invention, the leakage of important data of the storage card can be prevented, the safety is enhanced, and the privacy of the user is protected; and in addition, the universal command is used for verification, thus the operation of the system is facilitated and the compatibility is ensured.
Owner:兰宦泽 +2

Data processing method and device, computer equipment and storage medium

The invention provides a data processing method and device, computer equipment and a storage medium, and the method comprises the steps: sending the identity information of a first user side to a keygeneration system, receiving a user private key returned by the key generation system, wherein the key generation system generates the user private key according to the identity information and a system main private key; obtaining a preset system number, signing each natural number which is smaller than the preset system number according to an SM9 signature algorithm and a user private key, and sending the obtained signatures to a second user side; receiving a commitment value sent by a second user side, the commitment value being generated by the second user side according to the target object; receiving a blind value returned by the second user side, the blind value being generated by the second user side according to the plurality of signatures and the target object, and the system mainpublic key being generated by the key generation system; and verifying the target object according to the commitment value and the blind value. According to the scheme, high certificate management expenditure is avoided, and the cost is effectively reduced.
Owner:JUZIX TECH SHENZHEN CO LTD +1

Intelligent resource allocation method in mobile blockchain

The invention belongs to the technical field of industrial Internet of Things, and discloses an intelligent resource allocation method in a mobile blockchain. Specifically, the method comprises the steps: establishing a mobile blockchain framework for protecting privacy and data security of mobile equipment in a transaction process of the mobile equipment through a blockchain and a mobile edge computing technology, wherein the mobile blockchain framework comprises three modules, namely a mobile blockchain module, a task unloading module and a decision making module; modeling the utility of equipment in the system, and establishing a small base station bandwidth and computing power resource joint allocation model; decomposing the joint allocation model into two sub-models, namely a bandwidth allocation sub-model and a computing power allocation sub-model; and designing a deep reinforcement learning and particle swarm optimization combined method to solve the bandwidth allocation sub-model and the computing power allocation sub-model. The invention provides the mobile blockchain framework for protecting privacy and data security of mobile equipment, and provides a new solution for the problem of joint allocation of bandwidth and computing power resources.
Owner:DALIAN UNIV OF TECH

Model training system based on separation degree index

The invention relates to a model training system based on a separation degree index. The model training system comprises a model training unit, a model pruning and compressing unit and an output unit.The model training unit comprises the following modules of: a, data cleaning module for original variable cleaning; b, a feature selection module for screening candidate feature sets compressed by amodel; c, a model training module for model training and optimization. The model pruning and compressing unit comprises the following modules of: d, a data sample grouping module for data sample grouping; e, a feature correlation discrimination module used for calculating correlation coefficients of features and target variables and grouping and sorting samples; f, a feature optimal breakpoint selection module for selecting the optimal breakpoints of the features; g, a feature separation degree index calculation module which constructs feature separation degree indexes and outputs a feature with the best effect. The output unit comprises the following modules of: h, an optimal feature selection module for optimal feature selection; and i, an output module used for outputting a single-pointrule list. According to the method, the established model can be trained under the condition that the data of one party is not transmitted out, so that the data security and customer privacy of two parties are effectively protected.
Owner:SICHUAN XW BANK CO LTD

Application method for budget management software

InactiveCN104268696AAvoid modification and data theftProtect data securityComputer security arrangementsResourcesThree levelSoftware
The invention relates to an application method for budget management software. The application method comprises the steps that (1) a software login program is started to enter a login interface, and login permissions are selected for login to enter the program, wherein the login permissions comprise the budgeter permissions, the budget dedicated permissions and the reading permissions; (2) after login is successful, a main page is entered, wherein the main page is divided into a static menu bar and a dynamic menu bar; (3) according to different execution tasks, a static menu is opened to enter a second-level menu, and according to different execution tasks, the static menu bar is opened to enter the second-level menu to further select execution tasks of a dynamic menu, wherein the static menu contains budge reporting, payment budgets, query printing and statements; (4) furthermore, according to different execution tasks, the second-level menu is opened to enter a three-level menu, wherein the three-level menu contains a budget application at the year beginning, a monthly budget application, a monthly budget payment, a viewing option and a printing option; (5) according to an option system of task execution, budget data are automatically budgeted and summarized.
Owner:国网河南禹州市供电公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products