Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

112results about How to "Protect private data" patented technology

Privacy protection method based on location service in scene of Internet of Things (IOT)

Provided is a privacy protection method based on location service in a scene of the Internet of Things (IOT). The privacy protection method based on the location service in the scene of the IOT comprises two privacy protection schemes according to the characteristics on the basis of the location service and the privacy protection level, namely an absolute privacy query scheme for a quite high security level and a query privacy scheme for a quite low security level. Through analysis of application scenes, the secure multi-party computation technology is integrated into IOT location privacy protection, by utilization of technologies such as adding random numbers, using dot product properties, and carrying out homomorphic encryption and oblivious transfer protocols, a dot which is nearest to a query input location in a database to be queried is calculated and found out, different levels of protection measures are taken according to the different application scenes, and therefore the effect that the privacy of query input, query results and contents of the database to be queried is protected is achieved in the absolute privacy protection scheme, and the privacy of the query input and the query results is protected in the query privacy protection scheme.
Owner:NANJING UNIV OF POSTS & TELECOMM

Touch screen unlocking method and system as well as communication terminal

The invention discloses a touch screen unlocking method and system as well as a communication terminal; and the touch screen unlocking method comprises the following steps: starting an unlocking interface; inputting at least one password information through the unlocking interface; receiving input password information; when the input password information is matched with a preset unlocking password, unlocking a touch screen and entering a preset application interface; and otherwise, receiving the input password information again. Compared with the prior art, the touch screen unlocking method disclosed by the invention has the advantages as follows: the touch screen is unlocked to enter the preset application interface as long as the password information input by a user through the touch screen is matched with the preset unlocking password on a terminal, so that the traditional direct sliding or down-pulling unlocking is substituted; therefore, the safety of data on the terminal is enhanced; according to the invention, as an unlocking plate, which is touched to rotate, is adopted in the password information inputting method, the unlocking interest is enhanced, so that user-friendly experience value of the user is increased; and moreover, information corresponding to character bits on the unlocking plate is dynamically changed, so that the input concealment is enhanced to guarantee the safety of the data on the terminal.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Regression model training method and system without trusted third party in longitudinal federated learning

The embodiment of the invention provides a regression model training method and system without a trusted third party in longitudinal federated learning. A data provider sends a first inner product to a model initiator; the model initiator calculates an inner product sum of the first inner product and the second inner product, calculates a predicted value by adopting a preset function, calculates a residual error between the predicted value and a real label value, performs semi-homomorphic encryption on the residual error, and sends the semi-homomorphic encryption residual error and a semi-homomorphic encryption public key to the data provider; the data provider calculates a first gradient for the first characteristic parameter and adds a random mask under semi-homomorphic encryption; the model initiator decrypts the encrypted mask gradient according to the semi-homomorphic encrypted private key, and sends the mask gradient to the data provider; and the data provider removes the random mask in the mask gradient to obtain a first gradient, and updates the first feature parameter. The training of the regression model in the longitudinal federated learning is completed on the premise of not depending on a third-party mechanism and protecting the privacy data of the two parties.
Owner:深圳市洞见智慧科技有限公司

Community O2O-based data analysis system and implementation method thereof

The invention relates to a community O2O-based data analysis system and an implementation method thereof. According to the data analysis system, with a hierarchical hybrid cloud computing system adopted as a based, community O2O cloud adopted as private storage resources, public cloud adopted as computing resources, local data requiring analysis are placed in public cloud, after data analysis is completed in the public cloud, results are stored in the O2O private cloud through a local serialization interface. A core process of data analysis and processing includes the following steps that: a community O2O-based hierarchical hybrid cloud computing system is built; a community O2O data serialization interface is built according to data analysis requirements; data collection scripts are deployed; a community O2O-based data analysis system platform is built; and a data analysis platform is deployed. With the community O2O-based data analysis system and the implementation method thereof of the invention adopted, community O2O private data can be protected; virtual storage resources, virtual computing resources and networks can be provided for community O2O platforms; and therefore, merchants can quickly join a community O2O integrity business district.
Owner:GUANGDONG KEHAI TECH DEV CO LTD

Privacy information protection method based on K-means clustering

The invention discloses a privacy information protection method based on K-means clustering, and the method comprises the steps: carrying out the data encryption of a plurality of clients CUi, obtaining an encrypted ciphertext, and uploading the encrypted ciphertext to a cloud server; the client CUi, the cloud server CSP and the auxiliary cloud server ACSP performing data interaction calculation to obtain a re-encryption key; the cloud server receiving the encrypted ciphertext, re-encrypting the encrypted ciphertext to obtain a re-encrypted ciphertext of the same public key, and converting there-encrypted ciphertext into a Pillier encrypted ciphertext; the cloud server side obtaining the encrypted ciphertext of the Paillier and then calculating clustering; and the cloud server firstly converting the ciphertext of the clustering result into the ciphertext re-encrypted by the bidirectional addition homomorphic agent, then converting the ciphertext into the ciphertext under the public key of the client, and finally returning the ciphertext of the clustering result to the client for decryption. According to the method, the ciphertext of different public keys is clustered, the clustering result under the same public key is converted into the clustering result under different public keys to be returned to the client, and meanwhile, the private data of the client and the privacy of the clustering center are protected.
Owner:JINAN UNIVERSITY

Personal data safety sharing system and method for mobile phone

The invention discloses a personal data safety sharing system and a method for a mobile phone. The system comprises a mobile phone provided with a request service component and a core network service server provided with authentication switchover component, wherein the request service component of the mobile phone comprises a monitoring module, a server module, a client module and a display module, and the authentication switchover component of the service server comprises a monitoring module, an authentication module, a call transfer module, and a public key database interactive with the monitoring module and the authentication module. A working method of the system is characterized in that the system divides an authority of contact list data of a user into two kinds, namely a sharable authority and a restricted sharing authority, according to the safety authority set by the user, and makes corresponding different operations according to the different authorities. The mobile phone serves as a server to response sharing requests of other contacts on contact list information, the safety authority is set for personal information, and certain personal privacy information is encrypted by a key technology, so that personal privacy cannot be leaked in a transmission process of the personal privacy information.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Data storage and query method and device, computer system and readable storage medium

PendingCN109886026ACircumstances Affecting Comprehensive Assessment ResultsImprove creditDigital data protectionTamper resistanceComputerized system
The invention discloses a data storage and query method and device, a computer system and a readable storage medium. By utilizing a block chain database, the block chain database is provided with a plurality of proof nodes, and the method comprises the following steps of receiving a proof file, encrypting the proof file, and storing the proof file; receiving the query application and the client authentication information, and outputting a query authority according to the query application and the client authentication information; and receiving a query instruction and outputting the proof fileaccording to the query instruction. According to the invention, nodes except the block chain database are prevented from tampering the proof file; the comprehensive evaluation result of the company is influenced by counterfeiting and counterfeiting, and meanwhile, the situation that a certain proof node in the block chain database tampers proof files responsible for other proof nodes is also avoided, so that the credit of the comprehensive evaluation result of the company is improved. The method adapts to the requirement of the related party for the proof file of the client, protects the private data, and eliminates the risk of commercial secret leakage.
Owner:PING AN TECH (SHENZHEN) CO LTD

WiFi sharing method and server based on block chain

The invention provides a WiFi sharing method and a server based on a block chain. The method comprises the following steps: acquiring WiFi connection request information sent by a WiFi using terminal;obtaining WiFi connection request information sent by a WiFi using terminal; obtaining WiFi connection request information from the WiFi using terminal. According to the WiFi connection request information, sending resource information and signature information of WiFi to be connected to the WiFi using terminal, so that the WiFi using terminal establishes a connection with the WiFi sharing terminal according to the resource information of the WiFi to be connected and the signature information, thereby using the WiFi to be connected generated by the WiFi sharing terminal. The invention provides a block chain-based WiFi sharing method and a server, By designing a decentralized form of WiFi sharing platform based on block chain, which improves the security of WiFi sharing network, Compatiblewith public WiFi and private WiFi, WiFi providers are authenticated and WiFi users are billed to make WiFi providers profitable, WiFi resources that motivate WiFi sharing and provide convenience to users are realized, user WiFi information is protected and user privacy data is protected.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Collaborative filtering recommendation method based on trustful privacy maintenance in personalized search

The invention relates to a collaborative filtering recommendation method based on trustful privacy maintenance in personalized search and belongs to the field of computer networks. According to the basic idea, firstly, the trust degree Tcf of a target user to the execution behavior of a collaborative filtering recommendation system is established by means of automatic trust negotiation between the target user and the collaborative filtering recommendation system; the target user judges the degree of disclosure of personal information according to the trust degree Tcf, the collaborative filtering recommendation system collects the personal information provided by the target user and conducts clustering on users to obtain an initial user set with the interest similar to that of the target user; finally, the target user selects a similar user with the trust degree not lower than the Tcf from the user set and makes the similar user as a recommended object. The collaborative filtering recommendation method based on trustful privacy maintenance can overcome the defect that an existing collaborative filtering recommendation method is short of privacy protection in the search and modeling process of personal information, control over the degree of disclosure of the personal information by the target user is achieved, and comprehensive protection is provided for privacy data of the users.
Owner:XIAN UNIV OF POSTS & TELECOMM

Protection method and device of mobile payment information and mobile payment system

The invention provides a protection method and a protection device of mobile payment information and a mobile payment system. The protection method of the mobile payment information includes that a card issuer server dynamically updates replacement code information corresponding to information of all payment accounts, stored in the card issuer server; the card issuer server updates a mapping relation between the payment account information stored in the card issuer server and the replacement code information according to the replacement code information after being updated after the card issuer server updates the replacement code information corresponding to the information of all the payment accounts, stored in the card issuer server, at every turn; the card issuer server sends the replacement code information after being updated and the corresponding payment account information to a mobile terminal after the card issuer server updates the replacement code information corresponding to the information of all the payment accounts, stored in the card issuer server, at every turn, and thereby enables the mobile terminal to perform mobile payment according to the replacement code information after being updated. The protection method and the protection device of the mobile payment information and the mobile payment system can prevent the mobile payment information from leaking, and protect intimate data of a user.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Technical document processing method, digital watermark server and processing system

The invention discloses a technical document processing method, a digital watermark server and a processing system. A technical document downloading request is obtained, a corresponding original technical document is obtained according to a unique identifier of the technical document, a corresponding digital signature is generated according to related information of a downloading user, and a corresponding digital watermark is generated based on the digital signature. A target technical document is obtained by embedding a digital watermark into an original technical document, and preset related information of the original technical document and the digital watermark are stored in a block chain system in a corresponding relation mode while the target technical document is sent to a downloading request end for downloading. Because the digital watermark contains the related information of the downloading user, the private data of the downloading user can be effectively protected by storing the digital watermark into the block chain system, when a leaked technical document is found, the digital watermark can be extracted from the technical document to obtain the information of the downloading user, and a leaked person is positioned, so that traceability of the secrete divulger is realized.
Owner:合肥零碳技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products