Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

32results about How to "Protect personal privacy information" patented technology

Flexible asymmetric group key negotiation method

The invention discloses a flexible asymmetric group key negotiation method. The method comprises the steps of carrying out parameter initialization by members participating in group key negotiation, thereby generating public/private key pairs; blinding group contribution key shares through the public/private key pairs, and broadcasting group key shares; after the rest members receive corresponding broadcasting key shares, carrying out combination calculation, thereby obtaining group keys; and verifying whether calculated group keys are correct or not by the group members, encrypting communication information through the group keys if the calculated group keys are correct, and exchanging group security information. According to the method, members in or out of a group can select any one subset object in the group for secret information exchange; an object not selected by an information sender cannot decrypt the shared information; the group members can negotiate an encryption key and a decryption key which are consistent; the group members can verify the correctness of the keys; anonymity of the members participating in group key negotiation can be realized; and the personal private information of the group members can be protected.
Owner:河南招源科技有限公司

Authentication method and system for mobile subscribers

The invention provides an authentication method and system for mobile subscribers, which can realize the password-free registration and login and have advantages of convenience in use, high safety and low cost. The authentication method for the mobile subscribers of a third-party application of an Andriod system or an iOS system comprises the following steps: completing access registration of a third-party application on a safety service platform apparatus; and registering a safety service card application apparatus so as to establish a user information database; and when a user logs in at a first time, transmitting, by the safety service platform proxy apparatus SDK, a mobile phone number of a user to the safety service platform apparatus to perform the authentication, if the mobile phone number of the user passes the authentication, generating, by the safety service platform apparatus, an exclusive OpenID, and returning, by the safety service platform apparatus, a user authentication result and the OpenID to the third-party application by virtue of the SDK; and when the user logs in at a second time, transmitting, by the SDK, the OpenID to the safety service platform apparatus to perform the authentication, and if the OpenId passes the authentication, returning, by the safety service platform apparatus, the user authentication result and the user mobile phone number to the third-party application by virtue of the SDK.
Owner:尹子栋

Block chain-based investigation payment platform

The invention discloses a block chain-based investigation payment platform. The platform comprises an investigation module, a user side module and a payment module, wherein the investigation module isused for storing investigation contents published by different investigation publishers and payment information corresponding to the different investigation contents; the investigation contents and the corresponding payment information are written into a block chain in an intelligent contract form; the user side module is connected with the block chain and is used for receiving data transmitted by the investigation module; the payment module is connected with the block chain and is used for generating payment costs according to the search contents and the corresponding payment information after users complete operations of the user side module, and transmitting the payment costs and corresponding virtual currencies to block chain accounts of the users through the block chain so as to complete the payment of investigation rewards; and the investigation module, the user side module and the payment module are connected through the block chain. According to the investigation payment platform provided by the invention, when the investigation participators obtain reliable investigation rewards, personal account information of the investigation participators are not leaked, so that the confidence, for participating investigation behaviors, of the investigation participators is strengthened.
Owner:武汉研众科技有限公司

Privacy information protected repayment method and system, equipment and storage medium

The invention discloses a privacy information protected repayment method and system, equipment and a storage medium in the technical field of block chains. The method comprises the following steps ofinitiating a repayment transaction, calculating payable interest and repayment income according to the repayment limit applied in the repayment transaction, freezing the sum of the payable interest and the repayment income in the creditor account, and judging whether freezing is successful or not; if the credit is frozen successfully, transferring the money of the frozen part of the credit to theaccount of the borrower; writing the repayment proof into the block chain; and if the freezing fails, acquiring privacy information ciphertext m1 and m2 of the creditor and the content of the loan transaction from the loan record and are used for reminding or rights protection. Privacy information of borrowers and lenders on an open block chain system is easy to leak. The identity information of the repayment person can be protected, the real identity information of the borrower can be obtained through decryption when the repayment is not carried out due to overdue conditions, and the real identity information and the corresponding borrowing information are used as evidence for later legal right protection.
Owner:HANGZHOU FUZAMEI TECH CO LTD

Intelligent network connection technology-based vehicle, people, road and object interaction system and use method

The invention discloses an intelligent network connection technology-based vehicle, people, road and object interaction system and a use method. The system comprises a plurality of vehicle platforms and a plurality of vehicles; the system further comprises platform terminals and vehicle-mounted modules; the platform terminals are connected with the vehicle-mounted modules through a V2X/DSRC/LTE-V/LTE-A communication mode; the platform terminals are used for initiating vehicle positioning and vehicle demand requesting information, and transmitting the information to the vehicle-mounted modules;a plurality of platform terminals are provided and are respectively arranged on the vehicle platforms; a plurality of vehicle-mounted modules are provided and are respectively arranged on the vehicles and are in signal connection with the platform terminals and other vehicle-mounted modules; and the vehicle-mounted modules are used for receiving information sent by the platform terminals and theother vehicle-mounted modules. With the intelligent network connection technology-based vehicle, people, road and object interaction system and the use method of the invention adopted, the service ofa cloud server is not required, the interconnection of all things can be realized, cost for building the cloud server can be omitted, and the independence of data and the protection of privacy are ensured.
Owner:上海固厚寿记贸易有限公司

Goods monitoring method and system

The invention provides a goods monitoring method and system. The system comprises a private goods server side and at least one private goods terminal. The server side is carried by a goods owner, and the server side comprises a goods owner identity information confirmation module and a wireless transceiver module with the adjustable transmitting efficiency. Each terminal is in physical connection with private goods and is provided with a wireless transceiver module, each terminal is subject to the only server side, the server side sends a connection request instruction to the terminal subject to the server side, the terminal sends a response as soon as receiving the instruction, the server side stores the response time of the terminal, if no response is obtained when the time difference between the last response time and the current response time exceeds the preset time, it is determined that the server side loses contact with the terminal, and a prompt message indicating that the terminal cannot be found is sent to the owner. According to the goods monitoring method and system, the safety of the personal private goods can be improved, the probability that the goods are lost or stolen is reduced, and personal privacy information in electronic equipment can be more effectively protected at the same time.
Owner:何川丰

Encryption model training method and device, image encryption method and device and encrypted face image recognition method and device

The embodiment of the invention provides an encryption model training method and device, an image encryption method and device and an encrypted face image recognition method and device. The encryption model training method comprises the steps: encrypting an original face image through a to-be-trained encryption model, and obtaining an encrypted face image; inputting the encrypted face image into a to-be-trained first face recognition model to obtain a first face prediction result; determining a first prediction loss by using the first face prediction result and a face labeling result corresponding to the original face image; inputting the original face image and the encrypted face image into a trained second face recognition model to obtain a first output result and a second output result corresponding to the original face image and the encrypted face image; determining a second prediction loss based on the first output result and the second output result; determining a total predicted loss based on a positive correlation with the first predicted loss and the second predicted loss; and training an encryption model and a first face recognition model by taking minimization of the total prediction loss as a target.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

Bridge type contact power supply lens shielding element and electronic equipment

The invention discloses a bridge type contact power supply lens shielding element and electronic equipment, and the bridge type contact power supply lens shielding element is arranged on a PCB of the electronic equipment and covers a camera of the electronic equipment. The bridge type contact power supply lens shielding element comprises a mounting base, a light shielding sheet, a driving assembly, a metal reinforcing plate and a contact conductive copper sheet, the driving assembly comprises a swing arm rotationally connected with the mounting base, the swing arm is connected with the light shielding sheet, and the swing arm rotates to drive the light shielding sheet to reciprocate between a first position and a second position; when the anti-dazzling screen is located at the first position, the anti-dazzling screen covers the side, away from the camera, of the view-finding hole, and when the anti-dazzling screen is located at the second position, the camera is exposed out of the view-finding hole. According to the invention, the anti-dazzling screen can move to the first position to shield the view-finding hole, so that a picture cannot be obtained even if the camera is turned on. Therefore, the camera is prevented from shooting or peeping the surrounding environment and even recording videos, and the personal privacy information and safety of the user are protected.
Owner:SHENZHEN FUNDER ELECTRONICS CO LTD

Authentication method and system for mobile users

The invention provides a mobile user-oriented identity verification method and system, which can realize password-free registration and login, and has the advantages of convenient use, high security, low cost and the like. Among them, the mobile user identity verification method applicable to third-party applications of the Andriod or iOS system includes: completing the access registration of the third-party application on the security service platform device; completing the registration of the security service card application device to establish a user information database . When the user logs in for the first time, the security service platform proxy device SDK sends the user's mobile phone number to the security service platform device for identity verification. If the verification is passed, the security service platform device generates a unique OpenID, and then the security service platform device returns to the user for verification via the SDK. Results and OpenID to third-party applications. When the user logs in for the second time, the SDK sends the OpenID to the security service platform device for identity verification. If the verification is passed, the security service platform device returns the user verification result and the user's mobile phone number to the third-party application through the SDK.
Owner:尹子栋

Patient document retrieval authorization control method and system

The invention discloses patient document retrieval authorization control method and system, belonging to the technical field of computer software. The method comprises the following steps of: firstly, classifying patient documents, setting access rights to the documents for medical personnel according to the roles of the medical personnel and issuing corresponding digital certificates to the medical personnel; then signing own documents by patients and meanwhile setting diagnosis activity participation roles and the access time of the medical personnel; and finally, determining the document retrieval rights of the medical personnel according to the roles, the diagnosis activity participation roles and the access time of the medical personnel by the system. The system comprises a medical personnel certificate registration mechanism, a patient certificate registration mechanism, a certificate authorization mechanism, a safety service interface, an access control module, a document retrieval client and a document base server. Compared with the prior art, the invention not only protects the individual privacy information of patients and the intellectual property of medical units, but also are convenient for the medical personnel to conveniently use the documents of the patients.
Owner:NEW FOUNDER HLDG DEV LLC +1

Channel risk control system based on video backtracking mode

The invention discloses a channel risk control system based on a video backtracking mode. The channel risk control system comprises a monitoring camera, a human-certificate all-in-one machine, a field edge server and a cloud server. The monitoring camera is used for recording a field monitoring video and transmitting a field monitoring video stream to the field edge server; the human-certificate all-in-one machine is used for carrying out identity authentication on the face information of the client and transmitting the authorized face of the client to the cloud server after the identity authentication is passed; the cloud server is used for managing algorithm configuration and risk judgment management, assembling a matching task according to customer face information, and issuing the matching task to the field edge server; and the field edge server is used for carrying out dynamic line analysis on a video stream transmitted by the monitoring camera, storing necessary videos, and carrying out video backtracking and authorized face matching on the captured videos according to a matching task issued by the cloud server. According to the system, the privacy security is compatible, and channel risk early warning is completed.
Owner:成都旺小宝科技有限公司

A Method for Resilient Asymmetric Group Key Agreement

ActiveCN106027241BConducive to the protection of personal privacy informationProtect personal privacy informationKey distribution for secure communicationBroadcastingSecurity information
The invention discloses a flexible asymmetric group key negotiation method. The method comprises the steps of carrying out parameter initialization by members participating in group key negotiation, thereby generating public / private key pairs; blinding group contribution key shares through the public / private key pairs, and broadcasting group key shares; after the rest members receive corresponding broadcasting key shares, carrying out combination calculation, thereby obtaining group keys; and verifying whether calculated group keys are correct or not by the group members, encrypting communication information through the group keys if the calculated group keys are correct, and exchanging group security information. According to the method, members in or out of a group can select any one subset object in the group for secret information exchange; an object not selected by an information sender cannot decrypt the shared information; the group members can negotiate an encryption key and a decryption key which are consistent; the group members can verify the correctness of the keys; anonymity of the members participating in group key negotiation can be realized; and the personal private information of the group members can be protected.
Owner:河南招源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products