Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

63results about How to "Solve the problem of privacy protection" patented technology

Mobile phone telephone and message anti-disturbance and private communication method and system

InactiveCN101184264AImprove filtering effectOptimize the effect of anti-harassmentRadio/inductive link selection arrangementsSubstation equipmentPrivate communicationSocial statistics
The invention relates to a processing method and the system of anti-harassment of mobile phone calls and messages and private communication, which is as follow: when grouping the contacts in the mobile phone address list according to different classes, a private group of private communicating contacts is added, and different scene modes of the user are set; when receiving a mobile phone call or a message (text message, multimedia message), depending on the grouping sort of the contact of the incoming call or the message or the multimedia message, and the current scene of the user, together with the behavior characteristics of the harassing call and the spam message with the database information of the public harassing message issued by the authoritative institution or obtained from social statistics, the corresponding process to the call, the message and the multimedia message of the mobile phone is executed to reduce harassment; meanwhile the communication records of incoming, dialed calls and message, multimedia message with the contacts in the private grouping are encrypted and preserved to protect the personal privacy of the user. The invention has the advantages of adopting the operating steps of uniform process, and resolving synthetically the harassment of calls, messages and multimedia messages for the mobile phone and the private protection.
Owner:BEIJING NETQIN TECH

Recommendation system with hierarchical privacy protection function and operation method on basis of recommendation system

The invention discloses a recommendation system with a hierarchical privacy protection function and an operation method on the basis of the recommendation system. The recommendation system comprises a client/browser, a database of the client/browser, a proxy server, a database of the proxy server, a plurality of recommendation servers and databases of the recommendation servers. Interfaces for exchanging data with the servers can be provided by the client/browser and the database of the client/browser, personal information and service requests which are inputted by users can be received, the personal information can be stored in the database of the client/browser, the service requests can be transmitted to the proxy server, and recommendation results fed by the recommendation servers can be displayed for the users; the service requests of the users can be received by the proxy server and the database of the proxy server, the proxy server and the database of the proxy server can respond to the service requests, the recommendation results of the recommendation servers can be received, and recommendation can be carried out for the users according to the recommendation results; project resources in the recommendation system can be stored and managed by the recommendation servers and the databases of the recommendation servers, and recommendation which meets the service requests of the users can be collaboratively generated according to score information of the users. The recommendation system and the operation method have the advantage that privacy of the users can be protected when the recommendation system is used in application scenes such as recommendation, query and small data cold start.
Owner:COMMUNICATION UNIVERSITY OF CHINA

Differential privacy protection method for online social network based on stratified random graph

The invention discloses a differential privacy protection method for an online social network based on a stratified random graph. The differential privacy protection method comprises the following steps: inputting a network; constructing a tree structure of the network based on a stratified random graph model; sampling in the network through a Markov chain Monte Carlo method according to a preset privacy budget so as to obtain a sampled tree; taking the root node of the sampled tree as an initial current node; calculating an associated probability value of the current node according to the preset privacy budget; finding out a set of node pairs by taking the current node as the nearest father node in the network, and setting an edge among the set of node pairs according to the associated probability value; judging whether traversal of the sampled tree is completed or not, and if not, continuously traversing the next node in the sampled tree; and otherwise, outputting a purified network composed of edges arranged among all the sets of nodes and nodes thereof. According to the invention, the privacy protection problem of sensitive structural data information in the social network can be solved; differential privacy protection requirements can be satisfied; and simultaneously, the good data availability is kept.
Owner:NAT UNIV OF DEFENSE TECH

Mimetic mail server information processing device and mail service processing method, device and mail system

ActiveCN108833417AMeet security needsSolve the problem of building homogeneityData switching networksResource poolInformation processing
The invention relates to a mimetic mail server information processing device and a mail service processing method, device and a mail system. The information processing device comprises a resource poolcomposed of a user transfer proxy component and a server mailbox component, multiple parallel heterogeneous mail service chains composed of various components randomly selected from the resource pool, and a dynamic feedback control module, wherein the user transfer proxy component includes a number of heterogeneous user transfer proxy executors, and the server mailbox component includes a numberof server mailbox executors; and the dynamic feedback control module is used to monitor the operation of each executor and perform dynamic scheduling on various components. According to the scheme ofthe invention, the diversified executors are created, multiple processing results are subjected to mimetic decision output, the security performance of the mail system services can be improved, the initiative, variability and randomness of the mail system defense capability can be improved, the problem of privacy protection can be effectively solved, a more secure mail server solution can be provided, and the important guiding significance can be provided for the mail system security technologies.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Mixed randomization privacy protection method of social network data dissemination

The invention discloses a mixed randomization privacy protection method of social network data dissemination. The mixed randomization privacy protection method includes the steps that top points V of an undirected graph G(V,E) for expressing social network data are divided into a set Vk and a set Vr according to degree numbers with k-anonymity as a condition, wherein the set Vk comprises the points with the degree numbers meeting the k-anonymity condition, and the set Vr comprises the points with the degree numbers not meeting the k-anonymity condition; the points in the set Vk are not processed; randomization protection processing is carried out on the points in the set Vr. According to the mixed randomization privacy protection method, an existing k-anonymity method and an existing randomization method are combined, the number of users of the social network is not changed, influences on the nature and the quality of data provided for third parties are small, the processing process is simple, and the processing speed is high; after processing is carried out, the social network data of each person can be in one of the two following protection states: the degree natures are not changed, and the social network data of the person are located in other at least k persons same as the person in degree nature, or the degree natures are changed; relocation attacks with structure background knowledge can be prevented through the protection, and the demands of the users of the social network for the privacy safety are met.
Owner:北京睿航至臻科技有限公司

Shared energy storage control method and system for distributed renewable energy producers and disasters

PendingCN111899054AImplement deprecationReduce deprecationMarket predictionsForecastingPower usageLoad following power plant
The invention discloses a shared energy storage control method and system for distributed renewable energy producers and disasters, and belongs to the field of energy consumption. The method comprisesthe following steps: minimization of the total energy cost of all prosumers, energy storage parties and operators participating in shared energy storage is taken as an objective function, wherein theenergy transaction cost in the power market takes downlink and uplink energy of an interface between an operator and a power system as decision-making quantity; the dispatchable load of the prosumergenerates benefits through power utilization, and actually control flexible load energy consumption in each prosumer control time period and energy consumption indirectly put forward to the energy storage party through an operator can serve as decision-making quantities; the energy storage loss cost of the energy storage parties takes the charging and discharging speed of each energy storage partyin the control time period and energy consumption proposed by a prosumer and indirectly received by an operator as decision variables, and constraint conditions are constructed for each decision variable to construct an energy system shared energy storage optimization control model; and the shared energy storage optimization control model of the energy system is solved by adopting distributed optimization to obtain a control scheme for multi-energy storage sharing by the prosumer.
Owner:HUAZHONG UNIV OF SCI & TECH +1

Steel quality guarantee book privacy protection and sharing method and system based on block chain

The invention relates to a steel quality guarantee book privacy protection and sharing method and system based on a block chain. The method comprises the steps that a block chain platform is constructed, and a steel production institution and a steel sales institution are accessed to the block chain platform based on unique identity authentication information; the block chain platform receives thesteel resource information, the quality guarantee information and the quality guarantee document description information which are signed and uploaded by the steel production institution, and storesthe encrypted quality guarantee document into a distributed document storage module; the block chain platform feeds back corresponding quality guarantee information when receiving a query request of the steel sales institution; and after receiving purchase confirmation information of the steel sales institution, the blockchain platform calls a corresponding encrypted quality guarantee document from the distributed file storage module in response to a download request and feeds back the encrypted quality guarantee document, and the encrypted quality guarantee document is downloaded by a purchased user after being decrypted. Compared with the prior art, the method has the advantages of high information security and the like.
Owner:欧冶云商股份有限公司

Privacy protection method and privacy protection device

The present invention discloses a privacy protection method and a privacy protection device, and belongs to the information safety field. The method comprises the steps of receiving a private account generation request; generating a private account according to the private account generation request; receiving a communication request of a service party account of requiring to communicate with the private account; detecting whether the identity type of the service party account accords with a use scene; if the identity type of the service party account accords with the use scene, forwarding the communication request to the private account. According to the present invention, by generating the private account of a user, when the communication request of the service party account is received, and if the identity of the service party account accords with the use scene preset by the user, the communication request is forwarded to the private account, and the communication requests which are sent by the service party account and do not accord with the use scene preset by the user are filtered, thereby solving the problem that users are harassed by the malicious calls and that can not be completely solved by the prior art, and realizing the effect of preventing the users from being harassed by the malicious calls that do not accord with the use scene.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Business video telephone set with hidden camera

The invention discloses a business video telephone set with a hidden camera. The business video telephone set is characterized by comprising a handle, a liquid crystal screen component, a light guide pillar, a telephone set front cover, a loudspeaker, a microphone component, a key component, a base, a telephone set bottom cover and a master control circuit board component. The business video telephone set has the advantages that: buckles of a metal sliding way are tightly buckled with a camera shell by the camera shell, the metal sliding way, a camera pressing plate and a rear liquid crystal screen cover, the sliding way and the camera shell are embedded into a liquid crystal screen shell, and a stirring buckle on the back of the camera shell is stirred to unplug the camera out or press the camera into the camera shell for hiding, so privacy protection is ensured, and the overall attractive appearance of the telephone set may not be damaged; a high-resolution 800*4,807-inch 260,000-color digital liquid crystal screen makes more lifelike images and pictures and finer characters, and brings convenience to the input of a Chinese address book; address book content transmission between the telephone sets and between the telephone set and a server, three-way conferences, group conferences and video communication with a 3G mobile phone are supported; and convenience is brought to GK server management.
Owner:NANJING NANFANG TELECOMM

Device end voice reminding method and system and household appliance

The invention relates to a device end voice reminding method and system and a household appliance. The method comprises the following steps: detecting a to-be-reminded item; before the time of the to-be-reminded item arrives, judging whether a non-family member exists in a target environment or not; and when it is judged that the non-family members exist in the target environment, turning off a voice broadcast function of a to-be-reminded item of an equipment end, and performing non-voice reminding on the to-be-reminded item through a user end bound with the equipment end. According to the technical scheme, the to-be-reminded item is detected, whether the non-family members exist in the target environment or not is judged before the time of the to-be-reminded item is up, and when it is judged that the non-family members exist in the target environment, the to-be-reminded item voice broadcast function of the equipment end is shut down, non-voice reminding is performed on the to-be-reminded item through the user side bound with the equipment side, so that voice reminding or non-voice reminding is performed on the to-be-reminded item according to the user scene, the privacy protection problem when non-family members exist is solved, and the user experience is improved.
Owner:GREE ELECTRIC APPLIANCES INC

Renewable energy source-oriented multi-energy microgrid shared energy storage control method and system

PendingCN114123260AImplement deprecationReduce deprecationForecastingSingle network parallel feeding arrangementsNew energyMicro grid
The invention discloses a renewable energy source-oriented multi-energy microgrid shared energy storage control method and system, and belongs to the field of new energy consumption. Comprising the following steps: minimizing the total energy cost of all multi-energy microgrids and hybrid energy storage systems participating in shared energy storage as a target function; the energy flow between the micro-grid and the hybrid energy storage system is used as a decision variable; the method comprises the following steps: by taking electric quantity and natural gas quantity purchased from the outside of a micro-grid and energy flow in a single micro-grid as decision variables, and taking energy storage loss cost of a hybrid energy storage system, charging and discharging speed of the hybrid energy storage system and thermoelectric conversion of the hybrid energy storage system as decision variables, constructing constraint conditions for each decision variable; a hybrid energy storage system shared energy storage optimization control model is constructed; and solving the shared energy storage optimization control model of the hybrid energy storage system by adopting distributed optimization to obtain a control scheme that a plurality of micro-grids share a single hybrid energy storage system.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products