Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

343results about How to "Protect privacy and security" patented technology

Method for setting permission password for mobile phone

The invention discloses method for setting a permission password for a mobile phone. The method comprises the steps as follows: 1, entering a permission password setting program; 2, setting the highest permission password; 3, judging whether a visitor password is set or not, if yes, Step 4 is executed, otherwise, setting of the permission password is finished; 4, executing the program of setting a visitor password; 5, judging whether visitor permission is user-defined or not, if yes, Step 6.1 is executed, otherwise, Step 6.2 is executed; 6.1, setting visitor permission; 6.2, defaulting the visitor permission set by the system; and 7, accomplishing setting of the permission password. When the permission password is used for unlocking, whether a password inputted by a user is the highest permission password or the visitor permission password can be judged, if the password is the highest permission password, all the functions, applications and documentations of the mobile phone are opened, and if the password is the visitor permission password, the functions, applications and documentations of the mobile phone are used in a limited way. The method can protect data privacy of a user through passwords with different permissions and restrict access, and has the advantages of simplicity and convenience in operation, and easiness in implementation.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Fingerprint recognition apparatus, fingerprint recognition method and terminal device for same

The present disclosure provides a fingerprint recognition apparatus, a fingerprint recognition method and a terminal device for the same. The fingerprint recognition apparatus comprises: a fingerprint acquisition module, used for acquiring fingerprint data of a detected finger after the detected finger is placed on a fingerprint detection region, wherein the fingerprint detection region is located above a plurality of pressure detection regions; a pressure acquisition module, used for acquiring a pressure value of each pressure detection region that is pressed by the detected finger; a fingerprint authentication module which is coupled to the fingerprint acquisition module and is used for verifying whether the acquired fingerprint data is matched with pre-stored fingerprint data; and a press authentication module which is coupled to the pressure acquisition module and is used for verifying whether the pressure value of each pressure detection region is matched with a preset pressure value interval. According to the fingerprint recognition apparatus, the fingerprint recognition method and the terminal device for the same, which are provided by the present disclosure, precision of fingerprint recognition can be improved, and privacy and property security of a user of an electrical device can be protected.
Owner:NANCHANG OUFEI BIOLOGICAL IDENTIFICATION TECH

Vehicle-mounted-network anonymous-communication system based on ring signature and method

The invention relates to the technical field of network security, and provides a vehicle-mounted-network anonymous-communication system based on ring signature. The system includes a third-party trustinstitution, road side units and vehicles. The invention also provides a method of using the above system for vehicle-mounted-network anonymous-communication. The third-party trust institution firstly publishes public parameters, then the vehicles and the road side units apply for registration to the third-party trust institution, the third-party trust institution issues pseudonyms and public andprivate keys for the vehicles, and issues public and private keys and initial pseudonym ring members for the road side units, and then states of the vehicles in a vehicle-mounted network are monitored; and initial accessing authentication is carried out with a road side unit RSU if a vehicle accesses the vehicle-mounted network for the first time, and switching accessing authentication is carriedout with a road side unit RSU' if the vehicle does out access the vehicle-mounted network for the first time, and two-way authentication is carried out under assistance of a road side unit if a vehicle Vi is ready to communicate with a vehicle Vj. The system and the method integrate pseudonym certificate and group signature technology, and can fully protect privacy safety of communicators on thepremise of ensuring authentication efficiency.
Owner:NORTHEASTERN UNIV

Facial feature cryptographic key generation-based internet identity authentication method

The invention discloses a facial featured cryptographic key generation-based internet identity authentication method, which relates to the technical fields of biological feature recognition and authentication and password application. The method comprises an identity registration stage and an identity authentication stage. In the identity registration stage, a stable cryptographic key is generated by utilizing a facial feature method based on random projection and statistical optimum, stored into a database and used for performing identity authentication on a user. In the identity authentication stage, the steps of feature extraction, feature random projection, cryptographic key generation and feature error correction are performed on a face image by adopting a method consistent with the method for generating the cryptographic key in the identity registration stage, and then a feature matching operation is performed to realize the identity authentication of the user. By the method, a face template is effectively protected from attacks in a face recognition process, good references and choices are provided for the generation, management and the like of the cryptographic key required by an identity authentication system in real life, and the problem of internal diversity in biological feature recognition is effectively solved; and the method is simple and easy.
Owner:BEIJING UNIV OF TECH

Mobile APP registration method and device and mobile APP registration login method and device

The embodiment of the invention provides a mobile APP registration method and device and a mobile APP registration login method and device, and is used for solving the problem that a mobile phone number repeatedly registers mobile APPs by aiming at a phenomenon that a mobile network operator issues numbers for the second time or multiple times. The mobile APP registration method comprises the following steps: receiving a mobile APP account registration request initiated by a user through a mobile phone number; generating a unique account identifier for the current-time mobile APP account registration of the mobile phone number when a judgment result shows that the mobile phone number does not initiate the mobile APP account registration for the first time; when a confirmation result shows that an account password set through the current-time mobile APP account registration of the mobile phone number is different from the account password previously set each time, causing the account password set by the current-time mobile APP account registration to pass; and establishing a binding relationship for the mobile phone account which succeeds in the current-time mobile APP account registration with the mobile phone number, and recording a corresponding relationship between the account identifier and the account password of the mobile phone account.
Owner:MICRO DREAM TECHTRONIC NETWORK TECH CHINACO

Medical data security sharing system and method based on IPFS and alliance chain

The invention relates to the technical field of alliance chain technology and electronic medical data security sharing, and discloses a medical data security sharing system and method based on IPFS and alliance chains, and the system comprises a data owner terminal which is used for encrypting original medical data through employing a symmetric secret key to obtain a medical data ciphertext, storing the medical data ciphertext in the IPFS, and transmitting the medical data ciphertext to a server; the ciphertext corresponding to the keyword and the ciphertext corresponding to the symmetric keyare uploaded to an alliance chain, and an excitation mechanism and a data access permission are set in the smart contract; and a data visitor terminal is used for obtaining the symmetric key corresponding to the target medical data and decrypting the target medical data based on the symmetric key corresponding to the target medical data and the hash address stored in the target medical data when the data access permission set in the smart contract is satisfied and the incentive cost shown by the incentive mechanism is paid. According to the invention, safe storage and sharing of medical data are realized, privacy security of patients is protected, and fine-grained access control of the patients to the medical data is realized.
Owner:ANHUI NORMAL UNIV

Fingerprint identification device, fingerprint identification method and terminal device

The invention provides a fingerprint identification device, a fingerprint identification method and a terminal device. The fingerprint identification device comprises: an oxyhemoglobin data acquisition module, for acquiring oxyhemoglobin saturation data of detected tissues; a temperature data acquisition module, for acquiring temperature data of the detected tissues; a fingerprint identification module, for acquiring fingerprint data of the detected tissues; a transmission module, which is coupled with the fingerprint identification module; and a processing module, which is coupled with the oxyhemoglobin data acquisition module, the temperature data acquisition module and the transmission module and is used to analyze the oxyhemoglobin saturation data and the temperature data, judge whether the oxyhemoglobin saturation data and the temperature data are within the preset range, and control the transmission module to transmit the fingerprint data of the detected tissues to a fingerprint database for fingerprint identification when both the oxyhemoglobin saturation data and the temperature data are within the preset range. The invention can prevent the potential safety hazards of the prior art of identify recognition with a fake body.
Owner:NANCHANG OUFEI BIOLOGICAL IDENTIFICATION TECH

Federated learning defense method based on block chain

The invention discloses a federated learning defense method based on a block chain. The method comprises the following steps: a participant establishing an intelligent contract with an authority; obtaining the model from the block chain by the participant in the book, carrying out local training, uploading the trained local model and the corresponding training time to the corresponding block node,and broadcasting the local model and the corresponding training time to the block chain; constructing a noise committee of a noise committee for each on-book participant, and adding noise to the local model of the corresponding on-book participant by using the noise committee to update the local model to obtain an updated model; constructing a verification committee for all in-book participants,verifying the prediction reliability and authenticity of each update model by using the verification committee according to the data set and the training time, and recording the update model passing the verification in a new block node; and the authority obtaining all the updated models passing the verification from the block nodes and aggregating the updated models to obtain an aggregated model,and broadcasting the aggregated model to the block chain for the next round of in-book participants to download local training.
Owner:ZHEJIANG UNIV OF TECH

Verifiable inter-domain routing verification method based on block chain

The invention discloses a verifiable inter-domain routing verification method based on a block chain. According to the technical scheme, the method comprises the following steps: constructing a verifiable inter-domain routing system based on a block chain, wherein the verifiable inter-domain routing system is composed of verifiable inter-domain routing and a routing behavior verification subsystem; the routing behavior verification subsystem is composed of a routing behavior verification terminal and a routing verification block chain system. A sender router R1, a routing behavior verificationterminal of an autonomous domain to which the R1 belongs and a routing verification block chain system construct routing evidences, verify proposal of the routing evidences, verify and endorse the proposal, judge whether an endorsement strategy is met or not, generate routing evidence transactions, perform consensus sorting on the transactions and update a routing verification block chain; and the receiver router T, the routing behavior verification terminal of the autonomous domain to which the router T belongs and the routing verification blockchain system construct a verification routing request message, and retrieve whether routing evidence corresponding to the routing request exists or not. According to the method, the problem that routing strategies are violated due to routing single-point attacks and routing multi-point collusion attacks can be verified.
Owner:GUANGZHOU UNIVERSITY

Multi-partite graph privacy protection method published based on multi-dimension sensitive data

The invention discloses a multi-partite graph privacy protection method published based on multi-dimension sensitive data. The multi-partite graph privacy protection method mainly comprises the steps of constructing original table data into two large parts of a multi-partite graph form and a privacy protection strategy based on the multi-partite graph. An ID is adopted as one type of nodes, a quasi-identity sign corresponding to the ID is expressed through a form of label, each sensitive property is shown through the adoption of one type of the nodes, and if one user has a certain sensitive property, one side must exit between two nodes so as to show the relevance. A clustering method is adopted to conduct grouping, users in the same group are regarded as one super node, the relevance degree between the sensitive properties and the users is shown through a side with weight, the weight of the side is the probability that the group of the users have the sensitive properties, the relevance degree among the properties is also shown through the side with weight, so that the purposes that the relevance among the properties is preserved, and multiple sensitive properties and correlated privacy security thereof are effectively protected are achieved.
Owner:GUANGXI NORMAL UNIV

Storage card locking method and system

The invention relates to the technical field of content protection of storage cards and discloses a storage card locking method and system. The method comprises the following steps: S1, a user accesses data on a storage card, an operating system uses a universal command to perform operation, a storage card controller intercepts the operation and performs verification, if unlocking conditions are met, the step S2 is implemented, otherwise, the state of the storage card is kept in a locking state; S2, the storage card controller is used for converting the state of the storage card to an unlocking state; S3, the storage card controller is used for judging whether the logic of the operating system against the current operation of the storage card meets the locking conditions, if so, the step S4 is implemented, otherwise, the state of the storage card is kept in the unlocking state; and S4, the storage card controller is used for setting the storage card in the locking state. According to the method disclosed by the invention, the leakage of important data of the storage card can be prevented, the safety is enhanced, and the privacy of the user is protected; and in addition, the universal command is used for verification, thus the operation of the system is facilitated and the compatibility is ensured.
Owner:兰宦泽 +2

Credible privacy intelligent service computing system and method based on block chain

The invention provides a credible privacy intelligent service computing system based on a block chain, which performs computing service, encryption service and credible right and interest service, andcomprises a user end, a model providing end and a cloud server end , the user side is a user of service computing and is provided with a data and public and private key generator, and the user end puts forward demand and request service and starts the whole service process after authority is obtained; the model providing end obtains the encrypted public key from the cloud server end, encrypts thetrained prediction model by using the public key, provides the encrypted prediction model to the cloud server end, provides a classification label at the same time, and obtains a rights and interestsdistribution result and corresponding cost after the calculation service is completed; and the cloud server end is used for providing computing resources and model services and completing the requestof the user end. The invention further provides a calculation method and a calculation model, a homomorphic encryption method is adopted, and the calculation model comprises a credible privacy service calculation sub-model, a prediction service privacy calculation sub-model and a prediction service rights and interests evaluation sub-model.
Owner:BEIJING WUZI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products