Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

38results about How to "To achieve the purpose of privacy protection" patented technology

Dynamic verification method of cloud storage data using lattice-based linearly homomorphic signatures

The invention discloses a dynamic verification method of cloud storage data using lattice-based linearly homomorphic signatures. The method comprises data integrity verification including: a public key and a private key of a linearly homomorphic signature algorithm on a lattice are generated, a file is divided into a plurality of data blocks, each data block is signed, the value of a root node is calculated on the basis of a Merkle hash tree, the value of the root node is signed, and the data blocks, signatures of the data blocks and a signature of the root node are sent to a cloud server; IDs of the public key and the file are provided for a third-party audit, which initiates a challenge to the cloud server to verify whether the data blocks changed or not; the cloud server provides corresponding proof for the challenge initiated by the third-party audit; and the third-party audit judges whether the data blocks are complete according to the proof provided by the cloud server and feeds a verification result to a user. The method can resist quantum attacks initiated by quantum computers in the future and support cloud dynamic operation verification while protecting user private information.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Privacy protection K-NN (Kth Nearest Neighbor) classification method based on vector homomorphic encryption

The invention relates to a privacy protection K-NN (Kth Nearest Neighbor) classification method based on vector homomorphic encryption, which comprises the steps of: A, receiving an inquiry vector set and a standard vector set; B, generating a matrix G by the inquiry vector set, and enabling the standard vector set to use a secret key S to generate a ciphertext group and a new secret key GS by vector homomorphic encryption; C, carrying out secret key conversion on the new secret key GS to form a converted secret key S' so as to obtain a converted matrix M and a converted ciphertext group at the moment; D, carrying out decryption on the converted ciphertext group by using the converted secret key S' so as to obtain a decrypted vector set; and E, according to components of decrypted vectors of k minimum values, attaching a classification tag to each corresponding inquiry vector. According to the privacy protection K-NN classification method disclosed by the invention, privacy data of a user can be excellent protected; and moreover, in a case that the privacy data is protected, the inquiry vectors of the user are efficiently and accurately classified by a K-NN algorithm, so that efficiency of judging a vector type is improved, and an application range of judgment on the vector type is enlarged.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Method for secret protection in group key initial allocation

A method for secret protection in group key initial allocation belongs to the field of information safety. The method is implemented in three stages which are a group key issuing stage, a group key verification stage and a third party certification stage respectively. In the group key issue stage, an issuer of a group key encrypts a group key message with a public key, performs directed signature on a group key message with a private key and the public key and transmits a message cipher text and the signature to an applicant joining in the group for the first time. In the group key verification stage, the applicant joining in the group for the first time decrypts the message cipher text with the private key and verifies the signature of the group key message with the public key and the private key. In the third party certification stage, the applicant joining in the group for the first time proves the validity of the signature of the group key message through a zero-knowledge proof mechanism to a third party without revealing any private information to the third party. Through the method, safety complexity is increased by the method of associating random number binding encryption with the signature, and a directed signature mechanism is introduced to ensure that only the applicant joining in the group for the first time can certificate the validity of the signature of the group key message.
Owner:BEIJING UNIV OF TECH

Big data security privacy protection method based on geometric deformation and storage medium

The invention relates to the field of big data processing, and discloses a big data security privacy protection method based on geometric deformation and a storage medium. The method comprises the following steps: establishing an attribute sensitive set: dividing attributes of data into four sets which represent four sensitive degrees; cleaning data: deleting incomplete data entries, and serializing discrete data to obtain to-be-divided data; dividing data: screening out data corresponding to all attributes in the same sensitive set, and classifying the data into different columns of the samematrix to form a homosensitive data set; carrying out geometric deformation: carrying out corresponding translation, scaling, rotation or similar transformation processing on the homosensitive data set, and recording transformation parameters so as to be used in subsequent inverse transformation processing; and obtaining a final data set, wherein the four data sets after transformation processingare one data set. A concise, efficient and graded data privacy protection method can be provided for release and transmission of mass data, and data restoration can be achieved through geometric deformation inverse transformation.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Image projection privacy protection method and image projection privacy protection device for mobile terminal

The invention provides an image projection privacy protection method and an image projection privacy protection device for a mobile terminal and an Android custom system server. The image projection privacy protection method for the mobile terminal includes: step 1, logging in the Android custom system server; step 2, uploading images in the mobile terminal to an executive image storage catalog, in the Android custom system server, of the mobile terminal; step 3, when projection is required, acquiring image thumbnails stored in the executive image storage catalog of the mobile terminal from the Android custom system server; step 4, sending projection requests to the Android custom system server according to the image thumbnails selected by a user so as to display images corresponding to the image thumbnails selected by the user onto a display terminal. The image projection privacy protection method and the image projection privacy protection device for the mobile terminal have the advantages that access control of different images allowing corresponding users to project is realized, and each user can select any of images which are permitted to be projected by the user, so that privacy protection is realized.
Owner:MEIBEIKE TECH CO LTD

Clinical integrated treatment device for digestive system department

A clinical integrated treatment device for the digestive system department effectively achieves the purpose of conducting multifunctional treatment on a patient and comprises a bearing frame, a fixed rotating shaft is arranged in the bearing frame, a seat plate is arranged on the upper side of the bearing frame, a power disc is arranged in the bearing frame, an operation box is arranged in the bearing frame, and rotating plates are arranged on the left side and the right side of the operation box. The rotating plates are connected with planetary gears, the fixed rotating shaft is connected with a fixed chain wheel, a connecting chain wheel is arranged on the upper side of the fixed chain wheel, a chain is arranged on the outer side of the fixed chain wheel, a gear ring is arranged in the bearing frame, and a first box cover is arranged on the upper side of the operation box. By means of the design, the function of shielding privacy during treatment of a patient is effectively added, the function of opening the anus of the patient is added, the purpose of automatically conducting medicated bath wiping on the patient is achieved, the purpose of protecting the patient during treatment is achieved, and the function of automatically applying medicine to the anus of the patient is added.
Owner:HENAN CANCER HOSPITAL

Pedestrian labeling, detecting and gender identifying method based on vertical overlook angle

The invention discloses a pedestrian labeling, detecting and gender identifying method based on a vertical overlook angle. The method comprises the following steps: acquiring a video and acquiring a vertical overlook angle image of a video frame based on the video; labeling the vertical overlook angle image based on a video labeling method to obtain a pedestrian rotation whole body frame; constructing a pedestrian track based on the pedestrian rotation whole-body frame, and performing gender attribute labeling on the pedestrian track to obtain a pedestrian rotation whole-body frame with a label; training a pre-constructed pedestrian detection network based on the pedestrian rotation whole body frame to obtain a pedestrian detection model; and training a pre-constructed pedestrian gender identifying network based on the pedestrian rotation whole-body frame with the label to obtain a pedestrian gender identifying model. According to the invention, identity characteristics of pedestrians are not involved under the condition of a vertical overlook angle, and pedestrian privacy can be well protected. The pedestrian marking, detecting and gender identifying method based on the vertical overlook angle can be widely applied to the field of pedestrian detection.
Owner:SUN YAT SEN UNIV

A dynamic verification method for cloud storage data using lattice-based linear homomorphic signatures

The invention discloses a dynamic verification method for cloud storage data using a lattice-based linear homomorphic signature, including data integrity verification: generating a public key and a private key of a linear homomorphic signature algorithm on a lattice; dividing a file into multiple Each data block is signed, and then the value of the root node is calculated based on the Merkle hash tree, and the value of the root node is signed, and the data block, the signature of the data block and the signature of the root node are sent to the cloud. server; provide the public key and the identifier of the file to the third-party audit, and the third-party audit initiates a challenge to the cloud server to verify whether the data block has changed; the cloud server provides corresponding proof according to the challenge initiated by the third-party audit; The proof provided by the server judges whether the data block is complete, and feedbacks the verification result to the user. The invention can resist quantum attacks initiated by quantum computers in the future, and supports cloud dynamic operation verification while ensuring user private information.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

User identity verification method and system, electronic equipment and storage medium

The invention provides a user identity verification method and system, electronic equipment and a storage medium, and can be applied to the field of computers, the field of big data or the field of finance. The method is applied to a privacy computing platform and receives target user information of a target user; respectively acquiring a first target encrypted biological characteristic fragment, a second target encrypted biological characteristic fragment and a third target encrypted biological characteristic fragment corresponding to the target user id from each security node; wherein each encrypted biological characteristic fragment is generated by utilizing the biological characteristic of the corresponding user and the user id; according to the first target encrypted biological characteristic fragment, the second target encrypted biological characteristic fragment, the third target encrypted biological characteristic fragment and the encrypted biological characteristics of the target user, calculating the verification similarity of the target user; if the verification similarity is greater than a preset similarity threshold, determining that the identity verification of the target user is passed; and if the verification similarity is not greater than a preset similarity threshold, determining that the identity verification of the target user is not passed.
Owner:BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products