Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

88results about How to "Protection from being leaked" patented technology

Symmetric group key negotiation method based on block chain

The invention provides a symmetric group key negotiation method based on a block chain. The symmetric group key negotiation method comprises the following steps that a key generation center and terminal members in a group information exchange network domain generate respective public/private key pairs; information composed of the IP addresses and the public key pairs is mutually broadcasted amongthe terminal members, and the information is ranked based on the sizes of the IP addresses to obtain a sequence pair set of all the members of the group; the first node in the sequence pair set packages the message composed of the group key parameters to a block and transmits the message to the next node, and the steps are sequentially circulated to the last node; the last node calculates a groupkey of the last node, packages a message composed of group key parameters into a block and broadcasts the message to other nodes; the other nodes calculate respective group keys; group key correctnessverification is performed. The personal privacy is protected by adopting a block chain technology, so that the group key calculation and communication are more balanced, the traceability is high, andthe group key negotiation of the mobile ad hoc network is more flexible, efficient and practical.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Federated learning toilet vehicle attack defense method based on block chain

The invention discloses a federated learning toilet vehicle attack defense method based on a block chain, and the method comprises the steps: building an intelligent contract between a task publishing mechanism and a client in the block chain according to a calculation capability proof, and achieving the first screening and filtering of a toilet vehicle attack client based on the intelligent contract; enabling the task issuing mechanism to perform secondary screening and filtering of the toilet vehicle attack client according to the distribution state of the updated model parameters of the client relative to the loss value of the WGANGP model; according to the hardware information of the client training model, realizing the third screening and filtering of the toilet vehicle attack client; and aggregating the update models of the remaining clients after three times of screening to obtain a global model, wherein the global model is broadcasted to the block chain for next federation learning training. According to the method, the toilet car attacking client is prevented from participating in aggregation to obtain the aggregation model, defense of federated learning toilet car attacks is achieved, and then privacy of the client and leakage of a global model are protected.
Owner:HANGZHOU QULIAN TECH CO LTD

Hydrogen gas cylinder fixing device with protection function

The invention discloses a hydrogen gas cylinder fixing device with a protection function. The hydrogen gas cylinder fixing device comprises a fixed base, wherein the upper end of the fixed base is fixedly connected with a first damping spring; the upper end of the first damping spring is fixedly connected with a damping base; a limiting slot is formed in the upper end of the damping base; the upper end of the damping base is fixedly connected with a back board; the right side of the front surface of the back board is hinged with a second fixed frame through a hinged part; and the side end of the first fixed frame is fixedly connected with a fixed block. The first damping spring and a second damping spring are arranged, and a hydrogen gas cylinder is placed at the upper end of a limiting slot of the damping base. When a hydrogen gas cylinder bears outside collision to bump, the first damping spring and the second damping spring can effectively release most of external force, so that hydrogen gas in a hydrogen gas cylinder is protected from leaking, and threat, on personal safety, of explosion as a result of hydrogen gas leakage is avoided. The hydrogen gas cylinder fixing device isreasonable in design, is simple in structure, and is suitable for being popularized and widely applied.
Owner:杭州蓝捷氢能科技有限公司

Supply chain transaction privacy protection system and method based on block chain and related equipment

The invention discloses a supply chain transaction privacy protection system based on a block chain, and the system comprises core enterprise node equipment which is used for encrypting payable committed by a core enterprise to a first-level supplier to obtain a confidential transaction, and uploading signed transaction data to a supply chain platform based on the block chain; first-level suppliernode equipment used for performing range certification on split transactions in confidential transactions based on a supervisible Bulletproof algorithm, and sending an obfuscation request to the obfuscation service provider node equipment; obfuscation service provider node equipment which is used for obfuscating the split transaction into other transactions equivalent to the split transaction based on a supervisible proving obfuscation algorithm; a supply chain platform based on the block chain used for storing the received transaction data; and supervision mechanism node equipment used for tracking confusion of the transaction data. The invention further provides a supply chain transaction privacy protection method based on the block chain and related equipment. According to the invention, transaction privacy can be protected from being leaked, and transaction supervision is realized at the same time.
Owner:SHENZHEN THUNDER NETWORK TECH +1

User anti-harassment system and method based on intelligent network

The present invention discloses a user anti-harassment system and method based on an intelligent network. The system comprises an order monitoring module, a number update module and a number association module. The order monitoring module is configured to obtain order relevant information and send the order relevant information to the number update module. The number update module is configured to determine the order state, send number relevant instructions or relevant releasing instruction to the number association module and send the relevant information of numbers to be operated to the number association module. The number association module is configured to associate with both-side contact numbers of the order and store the contact numbers in a number associated data table, or is configured to release the association of the both-side contact numbers of the order and delete the numbers from the number associated data table. A calling party calls online platform codes and delivers the online platform codes to an intelligent network for processing. The intelligent network is configured to search a number associated data table corresponding to the online platform codes in the number association module, and build or does not build a calling connection according to whether there is a calling number in the number associated data table or not.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Supply chain transaction privacy protection system and method based on block chain and related equipment

The invention discloses a supply chain transaction privacy protection system based on a block chain, and the system comprises: core enterprise node equipment which is used for encrypting payable committed by a core enterprise to a first-level supplier to obtain a confidential transaction, carrying out the signature of the confidential transaction, and uploading the signed transaction data to a supply chain platform based on the block chain; a first-level supplier node equipment which is used for receiving the confidential transaction, decrypting the confidential transaction, outputting the decrypted confidential transaction to a first-level supplier, and sending an obfuscation request for a split transaction in the confidential transaction to the obfuscation service provider node equipment; an obfuscation service provider node device which is used for obfuscating the split transaction into other transactions equivalent to the split transaction; and a supply chain platform based on theblock chain which is used for storing the received transaction data. The invention further provides a supply chain transaction privacy protection method based on the block chain and related equipment.According to the invention, transaction privacy can be protected from being leaked, and anonymity of the transaction is realized, so that anyone cannot track a receiver of the transaction.
Owner:SHENZHEN THUNDER NETWORK TECH +1

Real-time location sharing method for shared car and mobile terminal

The present invention relates to a real-time location sharing method for a shared automobile and a mobile terminal. A web server receives and responds to multi-party request information, and performsinformation interaction with a map location server and a MySQL server. A mobile terminal sends an HTTP request message to the map location server by using a network interface module. The map locationserver uses a GPS positioning system to locate in real time and accurately locate the mobile terminal and the shared car, and then encrypts a location latitude and longitude by using an encryption module. A location sharing module invokes a request encapsulation function of the network interface module, uses the encrypted location latitude and longitude as a multi-party request parameter, generates a client multi-party request message, and sends the client multi-party request message to the web server. The map location server uses the encrypted client location latitude and longitude as a multi-party request parameter, and generates a client multi-party request message. A user receives a multi-party response sent back by the server by using the network interface module, and parses the response message to obtain multi-party result information. In this way, presentation of real-time locations of multi-party friends is implemented.
Owner:安徽小明出行科技有限公司

Medical autocorrelation time series data differential privacy release method

The invention provides a medical autocorrelation time series data differential privacy release method. The method comprises the following steps: firstly, constructing personal medical time series data; dividing the personal medical time series data into a plurality of disjoint and equal-length personal medical time series data sub-sequences through a set sliding window; calculating a normalized autocorrelation function of the sub-sequence according to the sub-sequence, and calculating the periodic sensitivity of the sub-sequence according to a query function; and generating Laplace noise sequences corresponding to the sub-sequences, splicing all the noise sequences to obtain Laplace noise sequences corresponding to the sub-sequences, and adding the Laplace noise sequences to the original time series data to obtain a final to-be-released result. According to the method, the privacy of the user is protected from being leaked to a greater extent, and recently-arrived medical time series data can be processed. According to the invention, on the premise of ensuring that the relevancy of the released data is the same as that of the original data, the security of medical time series dataprivacy protection and the time series data processing efficiency can be effectively improved.
Owner:WUHAN UNIV

Webpage real-time synchronization method and system

The invention provides a webpage real-time synchronization method and system. The method comprises the following steps: after monitoring a webpage operation in a first webpage, converting the webpageoperation into webpage operation instruction data and sending the webpage operation instruction data as first synchronous data when the running environment of the second webpage is judged to meet thenecessary conditions for executing the webpage operation, otherwise, carrying out differentiation analysis on the webpage data after the webpage operation is executed and the latest synchronous reference webpage data by the first webpage to obtain differentiated webpage data, and sending the differentiated webpage data as the first synchronous data; enabling the second webpage to receive the firstsynchronous data and judge the type of the first synchronous data, and when the judgment result is webpage operation instruction data, restoring the webpage operation instruction data to a webpage operation instruction to be executed; when the judgment result is the differentiated webpage data, analyzing the differentiated webpage data and updating the second webpage data based on the differentiated part, so the second webpage data is consistent with the webpage data of the first webpage for displaying the part. The method is suitable for static and dynamic webpages at the same time.
Owner:QINGDAO HOPE BIRD TECH CO LTD

Method and system for JPEG image decompression under ciphertext based on homomorphic encryption

The invention discloses a method and a system for JPEG image decompression under ciphertext based on homomorphic encryption, belonging to the technical field of multimedia information protection. Themethod comprises the following steps: encrypting a JPEG image through a homomorphic encryption method, thereby protecting privacy information in the image; obtaining a ciphertext code stream through asingle instruction multiple data encryption method; in a Huffman decoding process, eliminating branch operations in entropy coding through a static iterative method, obtaining one DCT coefficient byperforming iterative operation once, and decoding out all the DCT coefficients through performing iterative operation for many times; matching each code word through a code matching table to decode out the DCT coefficient, and finally converting floating-point arithmetic into integer arithmetic through integer inverse DCT in HEVC, thereby obtaining a decoded pixel value. With the method and the system provided by the invention, decompression of cloud JPEG images under a homomorphic domain can be realized, the homomorphically encrypted pixel value can be obtained for follow-up coherent processing of the homomorphic domain, and image privacy information is protected.
Owner:HUAZHONG UNIV OF SCI & TECH

Protection of confidential resource data

The invention relates to protection of confidential resource data. The protection is achieved by building a local trusted signature database on mobile equipment. When resource-limited equipment (such as a mobile phone) joins an enterprise network, the agent in the equipment generates a digital signature for each file in the equipment and transmits the signatures to an enterprise controller; the controller compares the digital signatures of the files with a globe digital signature database, the filter of the controller filters sensitive digital signatures and feeds the sensitive digital signatures back to the equipment agent, and the agent receives digital signature information and solidifies the same to the database of the agent; the agent analyzes each to-be-transmitted file according to the local digital signature database and DLP rules; transmission of one file is stopped if the signature of the file is found in the local database; if a new file is created, the agent generates a digital signature of the file and transmits the signature to the controller for checking, and if the signature is sensitive, the signature is saved in the local digital signature database; if the DLP controller updates, the equipment retransmits the digital signatures for comparison.
Owner:RES INST OF SUN YAT SEN UNIV & SHENZHEN

Phenolic molding compound feeding device

The invention relates to a phenolic molding compound feeding device. The device comprises a support, wherein a supporting plate is arranged on the support, a motor is arranged on the supporting plate,the motor is connected with chain wheels through a belt, connecting rods are welded to the left side and the right side of the upper portion of the support, the chain wheels sleeve the two ends of the connecting rods, and the peripheries of the chain wheels are meshed with a chain conveying belt; and the chain conveying belt is composed of a front chain, a fixed rod and a rear chain; the fixed rod is provided with a bearing plate, the bearing plate is connected with the fixed rod through a connecting seat, a light-emitting device is embedded in the bearing plate, a feeding part is arranged above the chain conveying belt, a light sensing alarm is arranged in the feeding part, a discharging port and a photoelectric sensor are arranged at the lower portion of the feeding part, an electromagnetic valve is arranged on the discharging port, the electromagnetic valve is electrically connected with the photoelectric sensor and a time relay, a die is arranged on the right side of the chain conveying belt, and a feeding port is formed in the upper portion of the die. The device has the advantages of being automatic in production, practical and reasonable, and high in applicability.
Owner:YUZHOU YUANDA PLASTIC ELECTRICAL APPLIANCE

Personalized voice/software icon button matching combined control for communication equipment such as mobile phone

The invention relates to personalized voice/software icon button matching combined control for communication equipment such as a mobile phone. The personalized voice/software icon button matching combined control comprises setting of a personal user voice/software icon button matching combination for the communication equipment such as the mobile phone, authentication of personal user identity authentication and the voice/software icon button matching combination setting by an operator or a website, and introduction of a voice/software icon button matching combined control ('voice spell') technology to electronic cartoon games. A user transmits a personalized voice physical signal ('voice spell') and the software icon button matching combination for the communication equipment such as the mobile phone to the operator and a website remote server, and the personalized voice physical signal and the software icon button matching combination are returned to a solid-state storage of the communication equipment such as the mobile phone to be stored and used after authentication. The user can make an alarm safely and reliably in an emergency state or perform locking and unlocking when the communication equipment such as the mobile phone is in a standby state or a working state according to a priority level through the set 'voice spell'. Meanwhile, high-level electronic cartoon games operated and controlled by the voice spell such as 'Journey to the West' can be developed in a mobile way. The personalized voice/software icon button matching combined control is suitable for civil use, police use, military use and the electronic cartoon games.
Owner:康子纯
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products