Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

297results about How to "Protect private information" patented technology

Mobile phone telephone and message anti-disturbance and private communication method and system

InactiveCN101184264AImprove filtering effectOptimize the effect of anti-harassmentRadio/inductive link selection arrangementsSubstation equipmentPrivate communicationSocial statistics
The invention relates to a processing method and the system of anti-harassment of mobile phone calls and messages and private communication, which is as follow: when grouping the contacts in the mobile phone address list according to different classes, a private group of private communicating contacts is added, and different scene modes of the user are set; when receiving a mobile phone call or a message (text message, multimedia message), depending on the grouping sort of the contact of the incoming call or the message or the multimedia message, and the current scene of the user, together with the behavior characteristics of the harassing call and the spam message with the database information of the public harassing message issued by the authoritative institution or obtained from social statistics, the corresponding process to the call, the message and the multimedia message of the mobile phone is executed to reduce harassment; meanwhile the communication records of incoming, dialed calls and message, multimedia message with the contacts in the private grouping are encrypted and preserved to protect the personal privacy of the user. The invention has the advantages of adopting the operating steps of uniform process, and resolving synthetically the harassment of calls, messages and multimedia messages for the mobile phone and the private protection.
Owner:BEIJING NETQIN TECH

Confidential express method and system thereof

The invention discloses a confidential express method. The method comprises the following steps: establishing an express information processing center; encrypting and saving the address information and receiving password of a recipient and generating a key code through a server; sending the key code to an initiator through the recipient; sending the key code, the goods information and the initiator identification to the server through the initiator for encrypting, saving and generating a bill number; sending the goods together with the bill number; reading the bill number and checking the goods information by an undertaking worker; transporting the goods to a sorting place to enter the transfer stage after checking; reading out the bill number by a sorting worker; sorting the goods according to a targeted city; transferring to the next station until arriving at the delivery station of the targeted city; reading the bill number by an express delivery worker to obtain the receiving address and contact mode; delivering the goods to the recipient; sending the receiving password to the server to verify to obtain the goods by the recipient. With the adoption of the confidential express method, the information of the recipient and the initiator can be effectively prevented from leaking; in addition, a complete system of signing after receiving is provided. The invention also discloses a confidential express system.
Owner:EAST CHINA NORMAL UNIV

Vehicle fog data light-weight anonymous access authentication method based on blockchain assistance

The present invention provides a vehicle fog data light-weight anonymous access authentication method based on blockchain assistance, and relates to the technical field of network communication safetyof urban traffic operation management. The method comprises the steps of: arranging one witness node (WP) in a management range of each service manager (SM), initializing system parameters through antrusted center AD, and registering the SM and a OBU (On Board Unit); allowing the SM to authenticate the validity of the OBU, storing the authentication information, broadcasting an authentication result to the WP, and providing fog service to the OBU according to the authentication result by a roadside facility unit RSU; and writing the authentication result into a public account by the WP to complete OBU consensus. The vehicle fog data light-weight anonymous access authentication method based on blockchain assistance can protect the user privacy information while ensuring the identity authenticity of a vehicle user accessing the fog service so as to achieve the vehicle anonymous authentication and allow users to select the time and the frequency of replacement of the pseudonym by themselves; the non-interactive autonomous cross-domain authentication is achieved, and the communication delay is effectively reduced; and moreover, the authentication information management is simplified,and the risk that a single database is tampered is effectively avoided.
Owner:BEIJING JIAOTONG UNIV

IOV (Internet of Vehicles) anonymous authentication system with controllable link, and IOV anonymous authentication method

The invention discloses an IOV (Internet of Vehicles) anonymous authentication system with a controllable link, and an IOV anonymous authentication method, and relates to the IO field. The system includes a system initialization module which is used for completing the initialization work of an IOV system and a TA (trusted authority); a registration module which is used for completing the registration of an OBU (onboard unit) and an RSU (roadside unit) to the TA; an OBU joining module which is used for obtaining a group certificate from the RSU when the OBU enters the communication range of a new RSU; a signature module which is used for completing the signature of a vehicle about a message; an authentication module which is used for completing the signature information authentication afterthe OBU receives the signature information; a link module which is used by an SP (service provider) to determine whether the two signature messages are linkable or not; an identity tracking module which is used for completing the process that the TA exposes the real identity of a signer of a valid signature message. The construction of the system uses a more lightweight elliptic curve operation to make the authentication process more efficient.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Whisper speech feature extraction method and system

The invention discloses a whisper feature extraction method which is characterized by comprising the following steps of (1) whisper speech auditory spectrum feature representation; (2) feature dimension reduction and robust performance analysis; the feature dimension reduction and robust performance analysis include three contents: (a) the low-dimensional topological structure features are extracted from the high-dimensional auditory spectrum; (b) topological structure feature time sequence analysis is performed; and (c) topological structure feature stability analysis is performed; and (3) acoustic model optimization is performed; the training mechanism of performing passive learning and then active learning is adopted in acoustic model optimization so as to enhance the adaptive performance of the model. According to the whisper speech feature extraction method, dimension reduction is performed on the auditory perception spectrum features to obtain the topological structure features, and the distinguishability of the whisper speech features is strengthened by strengthening the time sequence weight of the features. The distance between the feature vectors of different meanings is maximized through two target functions, and the distance between the feature vectors of the same meaning is also minimized so as to enhance the robustness of the features.
Owner:SUZHOU UNIV

Mobile phone antitheft method

ActiveCN102694920AUnable to obtain authorizationProtect private informationSubstation equipmentPasswordUser input
The invention relates to a mobile phone antitheft method. The mobile phone antitheft method includes: 1101) starting mobile phone antitheft; 1102) judging whether an SIM (subscriber identity module) card is inserted into a mobile phone or not, entering next step if yes, and otherwise, exiting; 1103) judging whether the mobile phone antitheft is started for the first time or not, setting an antitheft password, storing an SIM card number and entering a step 1105) if yes, and otherwise, entering next step; 1104) entering next step if a user input password and an SIM card are consistent with the stored antitheft password and the SIM card number respectively, and otherwise, exiting; and 1105) recording a starting sign. The mobile phone antitheft method further includes: 1201) detecting and judging whether an antitheft function is started or not, entering next step if yes, and otherwise, exiting after the mobile phone is normally turned on; 1202) judging whether the SIM card is inserted into the mobile phone or not, entering next step if yes, and otherwise, turning off the mobile phone or exiting after use is prohibited; and 1203) judging whether the SIM card is consistent with the stored SIM card number, turning on the mobile phone normally if yes, and otherwise, turning off the mobile phone or prohibiting use.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Non-bilinear mapping certificateless signature-based vehicle self-assembly network authentication method

The invention relates to a non-bilinear mapping certificateless signature-based vehicle self-assembly network authentication method, belonging to the field of data security. The method is based on a scheme of protecting privacy of a user and improving the efficiency of message signature authentication, and can protect privacy information of the user in a message passing authentication process; ifthe transmitted message is illegal, a TRA(tracing authority) uses a tracking secret key to track the real identity of a vehicle; in a process of message verification, bilinear mapping is not used, andmessage batch transmission and batch authentication are also supported, so that the method is suitable for rapid transmission and authentication operations of the message in a vehicle networking environment with higher mobility. The method provided by the invention can protect the privacy information of the user in the message passing authentication process; furthermore, if the transmitted message is illegal, the tracking authoritative center TRA can track the real identity of the vehicle by means of the private key; in the process of message verification, the mechanism does not use the bilinear mapping and also supports the message batch transmission and batch authentication, so that the method is suitable for rapid transmission and authentication of the message in the vehicle networkingenvironment with higher mobility.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method and platform for demonstrating multi-dimensional multi-industry information of two-dimensional codes

The invention belongs to the technical field of two-dimensional codes, and provides a method for demonstrating multi-dimensional multi-industry information of two-dimensional codes. The method includes steps of acquiring information and dividing permission of the information; configuring normal information demonstration pages and special information demonstration pages; acquiring code account information of code scanning parties with special permission, issuing special permission identification to the code scanning parties with the special permission and issuing normal permission identification to other code scanning parties; acquiring code scanning requests with permission identification; recognizing the permission identification and transmitting the corresponding information demonstration pages to the code scanning parties. The permission of the information includes normal permission and the special permission. The normal information demonstration pages correspond to the normal permission, the special information demonstration pages correspond to the special permission, and each normal information demonstration page and the corresponding special information demonstration page arelinked with the same corresponding two-dimensional code. The invention further provides a platform for demonstrating the multi-dimensional multi-industry information of the two-dimensional codes. Themethod and the platform have the advantages that the method and the platform are smart in conception, and the technical problems of single information of existing two-dimensional codes, leakage of privacy information of enterprises, individuals and the like and inconvenience in use in the prior art can be solved by the aid of the method and the platform.
Owner:高江涛
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products