CMS object-oriented artificial intelligence information secrecy system

An artificial intelligence, object-oriented technology, applied in the information field, can solve the problems of not subdividing confidential objects, not adopting automatic identification, etc.

Inactive Publication Date: 2016-10-12
丁贤根
View PDF21 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The technical problem to be solved by the present invention is to address the inherent problem of "one size fits all, one lock" in the above-mentioned prior art, no matter fr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CMS object-oriented artificial intelligence information secrecy system
  • CMS object-oriented artificial intelligence information secrecy system
  • CMS object-oriented artificial intelligence information secrecy system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0215] Specific embodiment 1, private cloud single-user version

[0216] overview

[0217] This embodiment is an exemplary example of the iPhone-oriented private cloud single-user of the present invention.

[0218] Figure 8 It is a structural diagram of the embodiment, which is composed of a smart phone 8.1, a CMS AIAPP software 8.2 installed on the smart phone and a private cloud storage 8.3. Among them, smartphone 8.1 is a smartphone with mainstream configurations before the filing date of the present invention, such as iPhone 6Plus, SANSUNG Galaxy S7 edg, Huawei P9 plus, Xiaomi Mi 5 Premium Edition, etc. It should be noted that these phones have front And the cameras on both sides of the back, in order to capture the signal that the visiting subject joins. The front camera refers to the camera on the same side as the display screen of the mobile phone, and the rear camera refers to the camera located on the back of the display screen of the mobile phone.

[0219] The f...

specific Embodiment 2

[0248] Specific embodiment two, augmented reality AR version

[0249] overview

[0250] This embodiment is an exemplary example of the present invention oriented to AR augmented virtual reality.

[0251] Figure 10 It is AR glasses, which are used as the host device of this embodiment to design this embodiment. Among them, it includes a front camera facing the front of the glasses, a pupil-capturing rear camera facing oneself, a retinal projection display, and a complete set of sensors and CPU processing information systems.

[0252] System Differentiation Description

[0253] Compared with Embodiment 1, the present embodiment will not repeat the similarities, and the differences are:

[0254] 1. Cancel the private cloud storage and change to the internal storage of the AR glasses.

[0255] 2. Cancel the flashback access and change the alarm prompt. Since the display of this embodiment adopts retinal projection, only the user can see it, so there is no need to worry ab...

specific Embodiment 3

[0258] Specific embodiment three, CMS WeChat special version

[0259] overview

[0260] This embodiment is an illustrative example of the future upgrade of the present invention for WeChat, which is referred to as CMS WeChat for short.

[0261] A smartphone is used as the host device in this embodiment. The camera on the back of the mobile phone is used to identify the access object, and the front camera is used to identify the owner.

[0262] System Differentiation Description

[0263] Compared with Embodiment 1, the present embodiment will not repeat the similarities, and the differences are:

[0264] 1. Cancel the private cloud storage and change it to the internal storage of the smartphone.

[0265] 2. The independently developed CMS AI APP is changed to integrated development with WeChat software, or is authorized by Tencent Technology, the owner of WeChat software.

[0266] 3. Various functions of the present invention are integrated into the chat interface and the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a CMS object-oriented artificial intelligence information secrecy system. A corresponding accurate secrecy relationship between information and an access object is established to eliminate defects of ''rigid uniformity and one lock'' of a conventional secrecy method. The system performs fuzzy recognition and automatic judgment in three aspects of the information, the access object and the secrecy relationship. Functions of automatic sensing, information acquisition, information recognition, object recognition, signal conditioning, characteristic extraction, fuzzy recognition function definition, membership degree definition, threshold definition, learning training, genetic correction, new person recognition learning, new information recognition, secrecy relationship editing, result processing and the like are set in AI access object recognition, AI information recognition and AI secrecy relationship recognition. The system is suitable for personal privacy protection, is especially suitable for application to VR/AR/MR (Virtual Reality/Augmented Reality/Mix reality) and mobile phones, and is suitable for security mobile storage and instant messaging products.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to the field of artificial intelligence and information security, especially the design method and system for access object, artificial intelligence, human privacy and information security management. Background technique [0002] Information security technology has been developed for many years. For state agencies, the military, and financial institutions, both the security technology and the security system are perfect and have been in use for a long time. The biggest feature of this kind of secrecy technology is "one size fits all, one lock", that is to say, all confidential information is "one size fits all" kept secret, and then "one lock" is used to put it in a safe, regardless of specifics. Information, regardless of access object. Any access object is either not able to access at all, or can access all confidential information after being authorized and opening...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/32G06F21/62
CPCG06F21/31G06F21/32G06F21/6209G06F21/6218
Inventor 丁贤根
Owner 丁贤根
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products