Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

330results about How to "Realize privacy protection" patented technology

Two-way privacy protective system and method for inquiring medical diagnostic service

The invention discloses a two-way privacy protective system and method for inquiring a medical diagnostic service, used for mainly solving the problem that privacy protection of inquiry information of medical users and data resources of service providers are not related in the prior art. The system comprises a medical diagnostic server and a medical user terminal; the medical diagnostic server completes system initialization, provides login and distributes a secrete key to the medical user terminal, stores data of a nonlinear SVM model built by using the existing medical database, provides a privacy protective medical diagnostic service for the medical user terminal, and sends an inquiry response result to the user terminal; and the medical user terminal sends a service inquiry request to the medical diagnostic server and performs decryption and polynomial aggregation operation of the inquiry response result returned by the medical diagnostic server, such that a pre-diagnosis result is obtained. According to the invention, privacy protection of the inquiry information of the medical users and the data of the nonlinear SVM model can be realized; and the system and the method can be used for providing an online disease prediction service for the medical users.
Owner:XIDIAN UNIV

Urban real-time traffic system and method capable of realizing privacy protection based on block chains

The invention relates to two systems which are an urban real-time traffic system capable of realizing privacy protection based on block chains of a public chain and an urban real-time traffic system capable of realizing vehicle monitoring based on block chains of a private chain. The urban real-time traffic system capable of realizing privacy protection based on the block chains of the public chain comprises a system center module, urban vehicles and a recorder module. The urban real-time traffic system capable of realizing vehicle monitoring based on the block chains of the private chain is additionally provided with a center which is responsible for managing identifiers of the vehicles. According to the invention, the block chain is adopted as a core technology, a record book of the block chain is utilized to store and record driving records of each automobile in a distributed manner, each automobile is recorded by adopting a mode of the automobile identifier in the record book, each identifier generates a random character string by adopting an encryption algorithm and varies in a timed manner, and privacy protection for an automobile owner or vehicle monitoring is realized according to the confidentiality of the identifiers. The recorder draws real-time traffic conditions according to data of the record book.
Owner:CHENGDU UNIV OF INFORMATION TECH

On-line fingerprint authentication system and method based on bidirectional privacy protection

The invention discloses an on-line fingerprint authentication system and method based on bidirectional privacy protection. With the system and method, a problem that bidirectional privacy protection of fingerprint data of the user and fingerprint template data is not involved in the prior art can be solved. The system is composed of a trusted center (1), a fingerprint authentication server (2), and a user terminal (3). The trusted center (1) completes system initialization, provides registration and secret key distribution for a user terminal and the fingerprint authentication server, collects a user fingerprint as an authentication template, and gives authorization of the template to a legal fingerprint authentication server in a ciphertext mode; the fingerprint authentication server (2) provides an on-line encryption fingerprint authentication service with privacy protection and returns an authentication result to the user terminal; and the user terminal (3) sends an encrypted fingerprint authentication request to the fingerprint authentication server and decrypts the reply of the fingerprint authentication server to obtain an authentication result. According to the invention, bidirectional privacy protection of the user fingerprint data and the fingerprint template data is realized and a secure on-line fingerprint authentication service is provided.
Owner:陕西嵩远明瑞信息技术有限公司

Cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers

The invention discloses a cloud storage oriented ciphertext full-text search method and system based on full homomorphic ciphers. The method comprises that a data owner uploads document IDs, encrypted document ciphertexts and an encrypted document inverse index table to a cloud server; hash operation is carried out to the document terms on the inverse index table; TF (Term frequency) and IDF (Inverse document frequency) values are encrypted by a full homomorphic technique on integers; a public key certificate is issued to a data user; the data user carries out hash operation to to-be queried keywords and uploads to a cloud service provider; the cloud service provider compares and searches the hash operation values of the to-be queried keywords and the hash operation values of the document terms on the inverse index table; and the cloud service provider carries out full homomorphic multiplication and add operations. According to the method and the system of the invention, the calculation is carried out in a ciphertext state; in the calculation process, any information related to the documents will not be leaked to the cloud service provider and other attackers; the data privacy of the data owner and the query data privacy of the data user are protected; and moreover, the controllability of the data right of use is realized.
Owner:SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES

Distributed hash table network-based anonymous communication method

ActiveCN104168265AAchieve the purpose of normal operationRealization of anonymous communicationTransmissionSecure transmissionUser privacy
The invention relates to a distributed hash table (DHT) network-based anonymous communication method. With regard to three kinds of basic operations, including the resource publishing operation, the resource searching operation, and the resource transmission operation, of the traditional DHT network, a certain anonymous mechanism and security mechanism are introduced, thereby solving an anonymous communication problem in the DHT network. An anonymous mapping path is constructed at the resource publishing stage and a mapping node is determined, so that an anonymous base is provided for the resource publishing operation; a probabilistic forwarding strategy is used at the resource searching stage, so that the resource searching operation has the anonymous property; and at the resource loading and transmission stage, the mapping node is used as a relay node to carry out data transmission and combination with the session key encryption data is used, thereby guaranteeing the anonymous transmission and secure transmission of data. On the basis of combination of the three parts, sender anonymity, receiver anonymity, and communication relation anonymity are realized, thereby achieving objectives of user privacy protection and secure and stable operation of the whole DHT network.
Owner:NANJING UNIV OF POSTS & TELECOMM

Multi-authority ciphertext-policy attribute-based encryption method

The invention discloses a multi-authority ciphertext-policy attribute-based encryption method. The method includes following steps: step 1, performing system initialization and establishing a plurality of authorities; step 2, before each starting of a mobile terminal device, executing pre-encryption treatment, and generating an intermediate ciphertext; step 3, in a process of uploading the intermediate ciphertext to a cloud storage server, encrypting the intermediate ciphertext by employing an access policy defined by a linear secret sharing mechanism, and outsourcing the intermediate ciphertext to the cloud storage server; and step 4, generating a private key for an encryption file according to global identifiers of users and an attribute set of the users by each authority. According to the method, aiming at the mobile cloud storage environment, on the premise of guaranteeing the data security, a lot of pairing operations are pre-processed in advance by employing the encryption pre-processing technology so that the calculation cost of online encryption is minimum; and by employing the secret key transformation technology and decryption outsourcing, a lot of pairing operations are outsourced to the cloud storage server so that the decryption calculation cost of the mobile terminal is reduced.
Owner:ANHUI UNIVERSITY

User data anonymous sharing method based on league chain encryption

The invention discloses a user data anonymous sharing method based on league chain encryption. The method comprises the steps as follows: each founding member mechanism builds a respectively corresponding network data collection node and accesses a league chain network, to form an initial chain; a common member mechanism builds the network data collection node after passing through verification, and sequentially accesses the initial chain to build a league chain; the network data collection node acquires a pseudonym identity and symmetric keys corresponding to the pseudonym identity; after acquiring data, the network data collection node sends an uploading request to a network data storage node; the final encrypted data is decrypted via the private key pair of the network data storage nodeto acquire pseudonym encryption data; the network data storage node stores a corresponding relationship between the pseudonym encryption data and the pseudonym identity into a local database; and thenetwork data storage node compresses the data stored within set time into a block, and adds the block into the league chain. Through building the league chain, the permissions of the common member mechanisms are effectively controlled, and the privacy of each member mechanism is ensured.
Owner:深圳崀途科技有限公司

Warrantable privacy protection space crowdsourcing task distribution system and method

The invention discloses a warrantable privacy protection space crowdsourcing task distribution system and method, and the system comprises an SC server, an encryption service provider, a space task requester, and workers. The encryption service provider generates a secret key, and employs a Paillier password and ElGamal password system. The space task requester creates a space task, and returns the position of the task to the SC server. The SC server encrypts the position of the task, and each worker calculates the distance between the position of the task and the position of the worker. The speed of each worker is encrypted and transmitted to the SC server, and each worker calculates the travel time of his own, and encrypts the travel time and transmits the encrypted travel time to the SC server. The SC server calculates the winning workers through the encryption service provider, and the encryption service provider enables the winning worker set comprising a plurality of winning workers to be encrypted and returned to the SC server. The SC server encrypts the position of the task, and broadcasts the encrypted position of the task to all workers, and the winning workers arrive at the specified position to execute the task. According to the invention, the system achieves the double-side privacy protection in the space crowdsourcing, greatly reduces the calculation, and can guarantee that the task is accepted at high probability.
Owner:SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products