Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

31results about How to "Protect Sensitive Information" patented technology

Multi-mechanism encryption method used in lattices for supporting strategy hiding

The invention discloses a multi-mechanism encryption method used in lattices for supporting strategy hiding. The multi-mechanism encryption method comprises steps that S1, during system initialization, a public parameter and a system main private key are generated; S2, a user applies for a cipher key for own attribute, and an attribute mechanism is used to generate a private key according to the public parameter, the system main private key, and the attribute set of the user; S3, an access structure is converted into a corresponding access tree to realize complete hiding of an access strategy;S4, a data owner is used to generate the ciphertext data according to the public parameter, a plain text, and the converted access tree, and the ciphertext data is uploaded to a cloud server for storage; S5, the user transmits an access request to the cloud server to acquire the ciphertext data stored in the cloud server; S6, the user uses the private key acquired from the attribute mechanism todecrypt the ciphertext data acquired from the cloud server, and the plaintext of the data owner is acquired, and related subsequent operations are carried out. The multi-mechanism encryption method isadvantageous in that the efficiency of the system is improved, and quantum attacks are prevented, and user privacy is effectively improved.
Owner:SHANGHAI MARITIME UNIVERSITY

Method for protecting SUPI through utilization of 5G-AKA

The invention relates to a method for protecting a subscription permanent identifier (SUPI) through utilization of 5G-AKA and belongs to the technical field of 5G communication. The method solves theproblem that in the prior art, various important sensitive information such as an identity, a location and business of a subscriber cannot be concealed well. The method comprises the following steps:a terminal initiates an authentication request, and a core network judges whether to replace identity information or not through a level and sensitive degree of the terminal; selecting an SUPI' as a new in-use identity of the terminal when it is determined that the identity information needs to be replaced; the encrypted SUPI' is sent to the terminal; and the terminal verifies authentication response, after the in-use identity of the terminal is replaced, the terminal initiates a secondary authentication request, and the authentication is carried out through utilization of the new in-use identity. According to the method, the network modification cost is low; the subscriber is not affected; the efficiency is high; the original network authentication security is maintained; and on the premise that a current core network protocol system is not changed, the subscriber sensitive information is protected through utilization of an authentication channel from the terminal subscriber to a mobile communication network.
Owner:XINGTANG TELECOMM TECH CO LTD +1

Group chat communication system and method thereof

The invention discloses a group chat communication system and a method thereof. The system comprises a first user module, a user name/nick name identity switch processing module, a nick name identity distribution module and second user modules, wherein the first user module is used for managing information on users, including group managers and other group members, who have been participated in a group chat through a client; the user name/nick name identity switch processing module is used for responding to a user name/nick name switching request initiated through the client and re-calculating identities of the users, participating in current group chat communication, by a preset algorithm in a server; the nick name identity distribution module is used for distributing identity information, which is calculated by using the user name/nick name identity switch processing module, to corresponding users existing in a current group chat session, so as to enable each user to correspondingly obtain a relatively unique identity, namely a nick name ID (Identity), in the current group chat; the second user modules are used for supporting the other group members to be in group chat communication with the first user module through the server. By adopting the system and the method, the users can protect personal information on the group members during the group chat and information generated during the group chat, and the security during information transmission is ensured.
Owner:BEIJING JINGYUE INTERACTIVE TECH

Data authority management method based on identifier analysis

The invention discloses a data authority management method based on identifier analysis, which comprises the following steps that: a login verification module acquires identity information of a visiting user, judges whether the visiting user is a registered user, and forwards a data query request sent by the user to a dynamic calculation module if the visiting user is the registered user; if not, forwarding the data query request to a data management module; the dynamic calculation module receives the data query request, gives a corresponding query permission level according to identity information of a visiting user, binds the query permission level with the data query request and then sends the data query request to the data management module; the data management module receives the data query request and judges whether the data query request is bound with an authority level or not, and if yes, non-public identification analysis data corresponding to the authority level is called and sent to the visiting user; and if not, calling the public identifier analysis data and sending the public identifier analysis data to the visiting user. According to the data authority management method based on identification analysis, the data sharing security under an identification analysis system is effectively guaranteed.
Owner:苏州协同创新智能制造科技有限公司

Image acquisition method and device considering privacy protection and data quality, and storage medium

The invention discloses an image acquisition method and device considering privacy protection and data quality, and a storage medium, and aims to solve the technical problem that the image privacy protection effect and the data quality are difficult to consider at the same time. The method comprises the following steps: acquiring a plurality of original images according to an image collection task; carrying out differential privacy protection and encoding on the original images to obtain noise-added images and hash codes of the noise-added images; carrying out iterative clustering on the hashcodes of all the noise-added images to form N clusters, and each cluster comprises the hash codes; performing hash code screening according to the Hamming distance between each hash code in a clusterand the centroid point of the cluster to obtain high-quality hash code; and extracting a high-quality image from all the noise-added images according to the high-quality hash code, and taking the high-quality image as a final image acquisition result. Image privacy protection and data quality can be well considered, and the images not prone to privacy leakage, high in availability, high in qualityand high in reliability is obtained.
Owner:NANJING UNIV OF POSTS & TELECOMM

Working site work recording method and system with privacy protection effect

The invention relates to a working site work recording method and system with a privacy protection effect, and the method comprises the steps: obtaining an initial image comprising a working scene, and extracting a hand region of a behavior object from the initial image of the working scene; taking the hand area as a reference, expanding the hand area according to a to-be-recorded action range, and increasing a preset distance along the outer edge of the hand area to serve as an identification range for working recording; and taking a part outside the identification range in the initial image as an unconcerned area, performing privacy processing on the unconcerned area, and storing the unconcerned area after privacy processing and an image area in the identification range as a work record. According to the method, the personal privacy problem, sensitive information and the like generated during traditional work recording are effectively solved, the most basic work record definition serves as a solution point, it is guaranteed that the activity condition of the hand of a behavior object can be shot in the maximum range, work records related to the hand activity are concerned and reserved, and privacy and sensitive information are effectively protected.
Owner:北京立为智图科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products