Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

116results about How to "Reduce the risk of privacy breaches" patented technology

Image privacy decision recommendation system and method under social network on the basis of privacy rule and perceptual Hash

The invention discloses an image privacy decision recommendation system and method under a social network on the basis of a privacy rule and perceptual Hash. The invention is characterized in that the system comprises a privacy object registration module, a privacy rule definition module and a privacy decision recommendation module, wherein the privacy object registration module provides a registration function of an object to be protected for a user; the privacy rule definition module defines a privacy security level for a to-be-protected objet of the user; and the privacy decision recommendation module identifies a to-be-uploaded object of the user, compares the to-be-uploaded object of the user with a protected object in a Hash fingerprint database and a privacy rule in a privacy rule base, and finally submits the privacy security level of the to-be-uploaded object to the privacy decision recommendation module of the user. The quick and convenient automatic calculation of the privacy level and decision recommendation can be realized, and the leakage risks of individuals and the families of the individual can be effectively lowered so as to greatly improve the protection safety of user individual image privacy.
Owner:HEFEI UNIV OF TECH

Anonymous area generation method and location privacy protection method

The invention discloses an anonymous area generation method and a location privacy protection method. The anonymous area generation method is used for generating an anonymous area based on a spatial K anonymous method; a multi-level access protection mechanism is adopted in the location privacy protection method; the location privacy protection method performs cache normalization; when a target user sends a LBS request, POI data is obtained according to the priority levels of a target user local, a neighbour user in a network and a LBS server; furthermore, when the POI data is obtained from the LBS server, generation of the anonymous area is carried out by adopting the anonymous area generation method; the LBS request is sent to the LBS server based on the anonymous area as the anonymous location of the user; and furthermore, the POI data returned by the LBS server is output. By means of the anonymous area generation method and the location privacy protection method disclosed by the invention, the location privacy of users is protected in combination with a cache method and the spatial K anonymous method; therefore, inquiry requests sent by users can be reduced to the most extent; furthermore, the privacy protection level of the users can be improved; and thus, the problems that the burden of the server and a channel is too heavy and the information repetition utilization rate is low can be well solved.
Owner:步步高电子商务有限责任公司

Training method and device of service prediction system

The embodiment of the invention provides a training method of a service prediction system. The service prediction system comprises a public model maintained by a server and a plurality of local models deployed in a plurality of user terminals. The method is executed by a server, and comprises the following steps: acquiring a plurality of common sample sets corresponding to a plurality of users, and training a common model by using the common sample sets; then, based on the trained public model, joint training including multiple rounds of iteration is carried out on the multiple local models, any round of iteration comprising the steps that for any first user, the public model is used for processing a public sample corresponding to the first user, a public prediction result is obtained, and the public prediction result is sent to a corresponding first terminal; then, receiving parameter update data of the first local model from the first terminal, which is determined based on the public prediction result and a local sample of the first terminal; and then, on the basis of a plurality of parameter update data received from the plurality of terminals, determining the parameters subjected to the joint update in the round, and providing the parameters to the plurality of terminals.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

User location personalized differential privacy protection method for location-based service

The invention discloses a user location personalized differential privacy protection method for location-based service. The method comprises the steps of 1, generating a disturbance location through utilization of an index mechanism; 2, obtaining a posterior probability of an opponent for a location of a user at time t according to a prior probability of the opponent for the location of the user at time t, index mechanism probability distribution and the generated disturbance location; 3, judging whether the posterior probability of the opponent for the location of the user at time t satisfiesa security requirement or not, sending the disturbance location and a query request to a service provider if the posterior probability of the opponent for the location of the user at time t satisfiesthe security requirement, and adding a confusion location if the posterior probability of the opponent for the location of the user at time t does not satisfy the security requirement; 4, adding theconfusion location, and sending a location set composed of the confusion location and the disturbance location to the service provider after the security requirement is satisfied; and 5, screening query results returned by the service provider. According to the method, the problem that user location privacy is leaked due to unreliability of the service provider can be solved, and moreover, a Bayesian attack can be effectively coped with, so security of the user location privacy in the location-based service can be improved.
Owner:ANHUI UNIVERSITY

Real-time video sensitive information protection system and method

The invention provides a real-time video sensitive information protection system and method. The real-time video sensitive information protection method comprises the following steps: S1, collecting a real-time video stream; S2, separating the video stream, separating the video stream by an equal interval, adopting a detection algorithm to extract a preset foreground stream in each segment of video stream, and hiding privacy and sensitive information in the foreground stream through a reversible algorithm, wherein the reversible algorithm refers to a public key generated in a corresponding time interval, the detection algorithm comprises target detection and template matching algorithms, the reversible algorithm comprises a scrambling algorithm and a password book translation algorithm, and a scrambling algorithm performs data encryption through image splitting, data expansion and image combination; S3, adopting an irreversible algorithm to erase sensitive information in the video stream so as to obtain a background stream, wherein the irreversible algorithm comprises a mosaic method, a color block covering method and a frosted glass effect; and S4, restoring the original video stream. The encryption degree of the video stream can be improved, encryption is reversible, and the protection degree of personal privacy is greatly improved.
Owner:北京朗达和顺科技有限公司

Secure database watermark construction method based on clustering weighted multi-dimensional bucket grouping

The invention provides a secure database watermark construction method based on clustering weighted multi-dimensional bucket grouping. The method is carried out by selecting a proper abstract domain, expressing a stable unit of a database by using an invariant generated by the abstract domain, grouping the database by using a multi-dimensional bucket grouping technology, and constructing a safe database watermark according to the grouped stable units and the extracted invariant attributes. The method particularly includes: selecting database stabilization units and attributes according to an abstract domain, carrying out a data clustering step; establishing a weighted multi-dimensional bucket group; and constructing a secure database watermark. According to the method, the weighted multi-dimensional bucket grouping is adopted, the data quality is improved, meanwhile, the privacy of sensitive attributes is protected, an attacker is difficult to obtain sensitive information, and then the robustness of watermarks is improved; therefore, the weights of the sensitive attributes calculated according to different scenes may be different, the usability of users is improved, the application scene of watermarks is expanded, original data are not modified, and it is ensured that the data are not distorted.
Owner:NANJING UNIV OF POSTS & TELECOMM

Order delivery method, device and system

The invention is suitable for the technical field of logistics management, and provides an order delivery method, device and system, the method is applied to an order delivery system composed of a delivery cabinet and a cloud service platform, the delivery cabinet comprises N storage cabinets, the cloud service platform is bound with multiple users, a target user purchases a target commodity through the cloud service platform. The method comprises the steps that after a deliveryman places commodities in K storage cabinets, the delivery cabinet obtains commodity information and position information of the K storage cabinets, and the commodity information comprises user identity codes; the commodity information and the position information of the K storage cabinets are uploaded to a cloud service platform, so that the cloud service platform generates K unlocking passwords and converts the unlocking passwords into two groups of secret keys, and the two groups of secret keys are fed back to the user and the delivery cabinet respectively; and when a goods taking event is detected, the identity of the target user is verified, and the storage cabinet for placing the target goods is opened when the verification is passed. According to the invention, the risk of user privacy leakage can be reduced, and the delivery efficiency is improved.
Owner:重庆华宜佳热能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products