Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

150 results about "Information confidentiality" patented technology

Confidentiality is the protection of personal information. Confidentiality means keeping a client’s information between you and the client, and not telling others including co-workers, friends, family, etc.

Government affair data exchange method and device based on block chain

The embodiment of the invention provides a government affair data exchange method and device based on a block chain, and the method comprises the steps: carrying out the input operation of the business data of each government department according to a preset uplink data model; the input service data is audited based on a consensus mechanism, if the audit is passed, the service data is uploaded tothe block chain, and all nodes on the block chain are notified, so that the nodes can access the service data; and according to the government affair data exchange requests sent by the nodes and the data access authorities of the nodes, service data on the block chains related to the government affair data exchange requests are exchanged. According to the embodiment of the invention, the block chain technology is applied to the government affair data exchange scene, the problems of information confirmation, information confidentiality and information tamper-proofing existing in cross-domain data circulation and sharing are solved, cross-domain sharing of government affair data, multi-department communication, power-assisted supervision and collaborative promotion of execution departments are promoted, and the data fusion appeal of smart government affairs is met.
Owner:BEIJING MATARNET TECH

Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal

The invention discloses a mobile terminal as well as a method and a device for controlling switching of operation systems of the mobile terminal and belongs to the technical field of mobile terminals. The method comprises the following steps: when receiving an instruction of switching a first operation system to a preset second operation system, switching the first operation system to the second operation system; when detecting an instruction of switching to thse second operation system, judging whether the mobile terminal in positioned in a preset region; if yes, ensuring not to respond to the instruction of switching the second operation system; otherwise, executing the instruction of switching to the second operation system. By adopting the method, when the mobile terminal enters into a preset region which is required to keep confidential, controlling to switch the mobile terminal into the preset operation system, wherein the operation system is a safe operation system, applications or functions, such as photographing and sound recording, which possibly cause information leakage, are restricted, the operation system can not be switched from the preset operation system to another operation system in the preset region, united safety management for the mobile terminal is realized and the information confidentiality is ensured.
Owner:NUBIA TECHNOLOGY CO LTD

Classified passive optical network based on synchronization of chaos

The invention discloses a classified passive optical network based on synchronization of chaos, and belongs to the technical field of classified optical communication. N pairs of semiconductor lasers with the same operating wavelength are adopted at two ends of an OLT and two ends of an optical network unit to serve as a chaotic carrier wave generator. Uplink information and downlink information are respectively loaded to n chaotic carrier waves with different wavelengths through an optical modulator to achieve information chaotic encryption, up-load and down-load are carried out through optical fibers after combination by adopting a wavelength-division multiplexing technology, and at last information decryption is achieved by adopting a chaotic carrier wave with the same wavelength. An all-optical chaotic signal is used as a carrier wave and combined with the wavelength-division multiplexing technology to carry out classified transmission on uplink information and downlink information, information security of the passive optical network is improved from a physical layer, the classified passive optical network based on synchronization of the chaos is suitable for a communication service with high requirements in information confidentiality, and reference significance is provided to improve safety of the passive optical network.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

QR two-dimensional code binary image partition-based key varying chaotic encryption method

InactiveCN103414549AAdd auxiliary keyImplement chaotic encryptionRecord carriers used with machinesSecuring communicationComputer hardwareTransfer procedure
The invention relates to a QR two-dimensional code binary image partition-based key-varying chaotic encryption method. The method comprises the following steps that: 1), a traditional logistic chaotic mapping encryption algorithm is improved in a manner that an auxiliary key is added such that a new initial value x0 can be formed; 2), an original QR-code binary image is partitioned, and the total number of sub-region images of which the pixel is 1 is calculated, and therefore, the initial values of random keys of sub-blocks are formed; and 3), the auxiliary key and the random key are combined with partition encryption technology, such that QR code binary image partition-based key-varying chaotic encryption and decryption algorithms can be realized. With the QR two-dimensional code binary image partition-based key-varying chaotic encryption method adopted, random variation of keys can be realized; key space and key paths can be expanded; the reliability and security of encryption can be enhanced; a requirement for QR code information confidentiality in storage and transmission can be satisfied; and at the same time, an encryption effect, encryption speed and cracking difficulty are further improved. The QR two-dimensional code binary image partition-based key-varying chaotic encryption method of the invention is advantageous in convenience, practicability, safety and reliability.
Owner:GUANGDONG UNIV OF TECH

Distributed data security application method and system and electronic device

The invention discloses a distributed data security application method and system and an electronic device. The method comprises the following steps: a management node of the distributed data securityapplication system carrying out data security application according to a distributed computing request of a data application demander; sending a sub-computing request to at least one computing node of the distributed data security application system, feeding back a calculation result returned by the calculation node to the data application demander; wherein the sub-calculation request is used forrequesting a calculation node to call target data of a target sub-model and a data ownership party for calculation, the target sub-model is obtained by splitting an overall calculation model corresponding to the distributed calculation request, and the target data is data required for calculation of the target sub-model stored in the calculation node; and the computing node responding to the sub-computing request, calling the target sub-model and the target data to compute to obtain a computing result, and returning the computing result to the management node. According to the method, data security and information confidentiality in the computing nodes can be strictly and effectively guaranteed.
Owner:英联(厦门)金融技术服务股份有限公司

Authority control system and method of logistics information

The invention provides an authority control system and method of logistics information, and relates to a logistics system and an information encryption method, in particular to an express system and an information encryption method. The system comprises a fast freight, a bar code identification device and software, wherein the fast freight is provided with encryption bar code identification; after the bar code identification device collects a bar code, the software decodes information of the bar code, and the software only displays or uses part of the information of the bar code. The bar code comprises one or more of addresser information, addressee information, sending time, a serial number and an ID number. The software can be used after login through authentication. The software sets authority according to login identification, decodes all the information in background, and displays or uses part of the information according to the authority. The authority control method of the logistics information mainly comprises the steps that 1, the encrypted bar code is generated by the software and adheres to the fast freight or goods before sending; 2, authentication is needed when the software is logged in; 3, part of the information is displayed or used according to the authority.
Owner:章玺

Logistics information receipt using bar codes

The invention provides a logistics information receipt using bar codes, and relates to logistics information receipts, in particular to courier receipts. The bar codes are printed on the logistics information receipt. One bar code is generated according to the information of a recipient, namely the bar code is generated according to a delivery address, a contact number and contact information of the recipient. The other bar code is generated according to a shipping address, a contact number and contact information of a sender. The bar codes are one-dimensional codes or two-dimensional codes, wherein numbers are arranged below the bar codes, and the number of the bar codes is more than one. The reverse side of the logistics information receipt is provided with adhesive stickers. The bar codes are generated by specific software. One bar code is generated according to the information including the contact number, the delivery address and the contact person of the recipient. The other bar code is generated according to the information including the shipping address, the contact number and the contact person of the sender. The logistics information receipt is provided with a signature column. The logistics information receipt using the bar codes has the advantages that specified coded information can be printed quickly through a printer to generate information needed by logistics; a machine can be used for rapid identification in a sorting process; the identification rate is high, and identification errors are reduced; the personal information confidentiality of the logistics information receipt is high; paper is saved, and paper size can be reduced substantially.
Owner:章玺

Internet of Vehicles data secure transmission technology based on improved SSL/TLS protocol

The invention discloses an Internet of Vehicles data secure transmission technology based on an improved SSL / TLS protocol, and belongs to the field of Internet of Vehicles. Due to the fact that a wireless communication mode is adopted between nodes of the Internet of Vehicles, man-in-the-middle attacks exist in the data transmission process, and information confidentiality and integrity are reduced. Aiming at the requirements of the Internet of Vehicles communication on safety and real-time performance, the invention designs a data safety transmission technology based on an improved SSL / TLS (Secure Sockets Layer / Transport Layer Security) protocol. The technology comprises two stages: in a key negotiation stage, the security of a key is ensured through asymmetric encryption, and in a data encryption transmission stage, the encryption and decryption time of communication data is reduced through symmetric encryption. And then, aiming at the problem that the SSL / TLS protocol is unsafe andtimely delayed in key negotiation due to a single-point fault of a certificate authority and low asymmetric encryption speed, the SSL / TLS protocol is improved by utilizing a block chain and cookie technology. Compared with the prior art, the improved SSL / TLS protocol disclosed by the invention is greatly improved in the aspects of security and efficiency of key negotiation.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Information secret keeping method applicable to point-to-point instant messaging

The invention discloses an information secret keeping method applicable to point-to-point instant messaging. The method comprises the steps that an information sender and an information receiver establish point-to-point connection and then mutually exchange and store opposite public keys; the information sender encrypts information needing to be transmitted through adoption of a symmetric key generated by the information sender, thereby obtaining ciphertext information A; the information sender encrypts the symmetric key through adoption of the stored opposite public key, thereby obtaining the ciphertext information C; the information sender arranges and packages the ciphertext information A and the ciphertext information C to obtain an encryption data stream and sends the encryption data stream to the information receiver; and the information receiver decrypts the encryption data stream through adoption a private key of the information receiver and reads the information needing to be transmitted. The point-to-point transmission information can be encrypted in an asymmetric encryption and symmetric encryption combined mode, the security of a communication process can be ensured, and moreover, the complexity of encryption and decryption operation is simplified.
Owner:河南芯盾网安科技发展有限公司

Operation statistics and operation document backup method of trusted program based on cloud storage

The invention discloses an operation statistics and operation document backup method of a trusted program based on cloud storage. The method comprises the steps of establishing cloud servers for each enterprise and institution, setting program data storage modules in each server, and storing and backing up collected application programs uploaded by terminals, wherein the application programs called by the terminals can be normally used through the program data comparison at the cloud servers; and carrying out the backup operation of the documents operated by the trusted program according to a keyword database, protecting the backup of the documents to be backed up and automatically discarding unnecessary or unrelated data. According to the operation statistics and operation document backup method, the trusted processes of clients are artificially or automatically collected, and the trusted processes are measured by MD5 (message digest 5) values and uploaded to the cloud servers together to be stored, recorded and distributed, and then, each client monitors and judges whether the application programs currently used by a user are trusted programs in real time, monitors the operation documents of the trusted program in real time and automatically uploads the documents to be backed up to the cloud servers so as to back up the documents. According to the operation statistics and operation document backup method of the trusted program based on the cloud storage, the information confidentiality requirements of enterprises and institutions can be met, the information leakiness accident caused by the program problem can be prevented effectively, the data backup complexity of the user is reduced, and the data backup efficiency is improved, and the checkability, backup and availability of core documents can be improved.
Owner:JIANGNAN UNIV

Automatic information leakage monitoring method and system based on internet big data

The invention discloses an automatic information leakage monitoring method and system based on internet big data; the system comprises a secrecy analysis server, a secrecy checking operation module and a terminal user program, wherein the secrecy analysis server is arranged on an information exchange channel; the secrecy checking operation module and the terminal user program are registered on thesecrecy analysis server; the secrecy analysis server is installed on the information exchange channel, and a secrecy checking unit is used for registering the secrecy checking operation module to thesecrecy analysis server; when the terminal user program sends an information exchange request to the information exchange channel, the information exchange channel transmits the information exchangerequest to the secrecy analysis server through a network; the secrecy analysis server performs semantic analysis and extracts semantic features and keywords in the semantic analysis, and transmits thedata to the secrecy checking operation module or a secrecy checking operation host conforming to a transmission condition to carry out a secrecy checking operation and obtain a conclusion that the check passes and does not pass; and complex and changeable information secrecy real-time monitoring requirements of all kinds of online information channels, various enterprises, enterprise units and national institutions are met.
Owner:NANJING NANYOU INST OF INFORMATION TECHNOVATION CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products