Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

224 results about "Information privacy" patented technology

Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, legal and political issues surrounding them. It is also known as data privacy or data protection.

Abstractions and automation for enhanced sharing and collaboration

The present invention provides methods for using abstractions of people, including dynamic and static groups of people, to enhance the efficiency of the specification and automation of policies for sharing information between users with a “need-to-know.” An instance of the present invention can also provide these users information based on a “time-to-know.” By providing access to information based on group affiliation and properties of the content of the information, the present invention maintains optimal information privacy while minimizing encumbrances to sharing data with appropriate users and even at appropriate times. The present invention can be integrated with other communication technologies to facilitate access to information in a time appropriate manner. Other instances of the present invention employ automated and semi-automated, mixed-initiative techniques, to make information-sharing decisions. Additional instances of the present invention include the employment of machine-learning techniques to facilitate construction of access policies from the actions or profile of a single user or a community of users, including the construction of automated sharing agents that work in an automated or mixed-initiative manner to respond to real-time requests for information.
Owner:MICROSOFT TECH LICENSING LLC

Two-dimensional barcode-based logistics industry personal information privacy protection system and method

InactiveCN103401676ATroubleshoot access rights assignmentsPrevent leakageLogisticsSecuring communicationProtection systemInformation privacy
The invention discloses a two-dimensional barcode-based logistics industry personal information privacy protection system. The system comprises a key distribution and management system, a database, a first PC (Personal Computer) side logistic management system, a first two-dimensional barcode generation and reading module, a first two-dimensional barcode reading module, a first mobile phone delivery terminal, a first mobile phone number hiding module, a third PC side logistic management system, a third two-dimensional barcode generation and reading module, a third two-dimensional barcode reading module, a third mobile phone delivery terminal and a third mobile phone number hiding module, wherein the first PC side logistic management system is positioned at a letter sending site; and the third PC side logistic management system is positioned at a receiving site. According to the two-dimensional barcode-based logistic personal information privacy protection scheme design, the two-dimensional barcode technology and an encryption technology are applied to the logistics industry to try to solve the problem of personal information leakage. The functions such as two-dimensional barcode generation and reading, sensitive information encryption protection, and key distribution and management are realized, and the problem of privacy information leakage is solved better.
Owner:NAVAL UNIV OF ENG PLA

Information privacy and identity authentication method and digital signature program

The invention provides an information privacy and identity authentication method and a digital signature program, which relate to the technical filed of computer software, network communication and information safety and are particularly used for the information privacy of instant messaging, electronic mails and file information. A symmetrical cryptographic algorithm and an unsymmetrical cryptographic algorithm are combined, and a key ciphertext and an information ciphertext form a complex ciphertext. The effect of text confidentiality and sharing is reached through the integration of effects of multiple keys, and the effect of text confidentiality interlocking is realized through the effect of the combination of multiple keys. The signature is used for challenging the response mechanism, more than two cipher devices are compatible, the effect of automatic identification distinction and / or self-customization by users can be realized, and the identity authentication is more flexible and complete. A convenient and practical data signature program is also designed, and the convenient and practical data signature program assists a target program for use and runs independently for realizing the instant signature and the instant verification on window text information.
Owner:杨筑平

Express delivery information privacy protection system based on blockchain, and protection method thereof

The invention discloses an express delivery information privacy protection system based on a blockchain, and a protection method thereof. The method records all operational motions of an express delivery enterprise for user data through a blockchain auditing platform, the operation compliance of the express delivery enterprise is enhanced, and the express delivery enterprise can be effectively prevented from illegally obtaining personal information. Meanwhile, a user can read a user data visitor record through an authorization record recorded in the blockchain, the access permission of the express delivery enterprise for the user data is revoked, and the sense of control of the user for personal data is enhanced. In addition, a ciphertext express waybill is used for replacing a plaintext express waybill, so that a possibility that the user data is leaked in each link of an express delivery business process can be lowered. An express delivery package logistics tracking scheme based on the blockchain can assist the user in checking the logistics situation of the express delivery package at any time in a blockchain system, and logistics information which can not be tampered on the blockchain can provide proof-providing information for disputes including delivery losing claims and the like.
Owner:NANJING UNIV OF POSTS & TELECOMM

Abstractions and automation for enhanced sharing and collaboration

The present invention provides methods for using abstractions of people, including dynamic and static groups of people, to enhance the efficiency of the specification and automation of policies for sharing information between users with a “need-to-know.” An instance of the present invention can also provide these users information based on a “time-to-know.” By providing access to information based on group affiliation and properties of the content of the information, the present invention maintains optimal information privacy while minimizing encumbrances to sharing data with appropriate users and even at appropriate times. The present invention can be integrated with other communication technologies to facilitate access to information in a time appropriate manner. Other instances of the present invention employ automated and semi-automated, mixed-initiative techniques, to make information-sharing decisions. Additional instances of the present invention include the employment of machine-learning techniques to facilitate construction of access policies from the actions or profile of a single user or a community of users, including the construction of automated sharing agents that work in an automated or mixed-initiative manner to respond to real-time requests for information.
Owner:MICROSOFT TECH LICENSING LLC

Internet of Vehicles node data security communication method based on block chain

The invention relates to an Internet of Vehicles node data security communication method based on a block chain, and the method comprises the steps: dividing a whole network into honeycomb regions with the same size, designing an Internet of Vehicles alliance chain and an inter-region public chain in units of regions, guaranteeing the data traceability, and improving the data consensus efficiency;in the vehicle data communication process, mutual trust between nodes is guaranteed through vehicle identity authentication, data is divided into common data and emergency data according to differenturgency of the data, the common data are communicated in areas, the emergency data is communicated among multiple areas, different data classifications adopt different block structures, and the dataconsensus efficiency is improved; and meanwhile, the motion condition of the Internet of Vehicles node is also considered, and an improved practical Byzantine fault-tolerant consensus method is adopted to realize data security communication of the Internet of Vehicles node, so that the data security risk caused by centralized data storage can be resisted. The consensus speed is high, data securityand information privacy can be protected, the data storage space is reduced, and the communication efficiency is high.
Owner:ZHEJIANG SHUREN COLLEGE ZHEJIANG SHUREN UNIV

Embedded upgrading file transmission method

The invention relates to an embedded upgrading file transmission method. The embedded upgrading file transmission method includes steps of 1) generating upgrading file information and encryption keys by an upgrading server and transmitting decryption keys to a third-part network management server; 2) connecting the third-part network management server with an upgrading client side, and transmitting client-side upgrading file information, upgrading server address and the decryption keys to the upgrading client side; 3) transmitting upgrading request to the upgrading server through the upgrading client side, and connecting the upgrading client side with the upgrading server according to the upgrading server address, acquiring differential files on the upgrading server according to the client side upgrading file information, decrypting to acquire verifying values according to the decryption keys, and transmitting the files to complete upgrading after verifying is succeeded. The embedded upgrading file transmission method overcomes the defect that an existing embedded upgrading file transmission is low in safety and easy to be attacked and lacks of prevention of file information disclosure and the like and has the advantages of high transmission efficiency and transmission safety coefficient, information privacy and complete identity authentication mechanism and the like.
Owner:PEKING UNIV

Personal context information privacy protection policy automatic generating method

The invention discloses an automatic generation method of a personal context information privacy protection strategy, which includes the steps as follows: (1) a service mode and a privacy role are analyzed and compared so as to determine the type, number and the like of the service mode; (2) a mobile agent is set as a representative in a pervasive environment for users and a system agent in the pervasive environment is set for being responsible for processing a request for personal context information of the users. Through the coordination of the mobile agent and the system agent, context information in an interactive environment is obtained; (3) various sensors in the pervasive environment can be used for obtaining the context in the interaction process of the users and a context-ware application system, namely, historical data of interaction between the users and the context-ware application system. And then the data are stored in an interactive context database; (4) a rough set algorithm is used for completing the automatic extraction of the privacy protection strategy; and (5) a privacy role analysis engine is used for automatically allocating an appropriate privacy role for the context-ware application system, namely for setting an operation mode for the context-ware application system.
Owner:XI AN JIAOTONG UNIV

Blind signature based privacy preservation method for admissible block chains

The invention discloses a permission block chain privacy protection method based on blind signature. For transaction content, the transaction information m is encrypted blindly by Hash function, and then the transaction is signed by the address private key of both parties to ensure that the transaction information can only be viewed by both parties, and then only the unique DAID of digital assets,the blind signature of the transaction and the endorsement public key of the endorsing node are recorded on the block chain; the transaction information m is encrypted blindly by Hash function, and then the transaction is signed by both parties' address private keys. For the identity information of the transaction user, the information written into the block chain has only the blind signature andthe third-party public key address which provides the blind signature, and the ID of the digital asset. The latter two have nothing to do with the transaction information and the user information, and the blind signature is unforgeable and unextractable, so the privacy of the identity information of the user can be protected. The invention can not only protect the identity information privacy ofboth sides of the transaction, but also protect the information of the transaction during the transaction of the licensing block chain.
Owner:GUANGXI NORMAL UNIV

Distributed comprehensive energy demand response collaborative optimization method for intelligent building group

The invention discloses a distributed comprehensive energy demand response collaborative optimization method for an intelligent building group. The distributed comprehensive energy demand response collaborative optimization method comprises the following steps: establishing a plurality of single-building multi-energy flow energy systems based on an energy hub concept in an energy internet; interconnecting a plurality of single-building multi-energy-flow energy systems through a power transmission line, a heating pipeline and a natural gas pipeline to form a multi-building multi-energy-flow energy interconnection system; establishing a mathematical model of the multi-building multi-energy flow energy interconnection system, wherein the mathematical model comprises a building energy consumption objective function and a building energy consumption constraint condition; and carrying out optimization solution on the mathematical model by utilizing an alternating direction multiplier algorithm to obtain an intelligent building optimal energy utilization strategy. The distributed comprehensive energy demand response collaborative optimization method can effectively reduce the electrical load of a power utilization peak, optimize the energy consumption structure of a user, delay the plan of power supply and distribution equipment upgrading and capacity expansion, reduce the economic pressure of an energy supplier due to relatively high investment cost, promote information privacy protection and local decision autonomy, and greatly improve the overall scheduling decision response speed.
Owner:HXXN ELECTRICITY

Method for generating and check-controlling network identity indentification code in network electronic identification card

The present invention relates to a method for generating and check-controlling a network identity identification code in a network electronic identity. The method comprises: a server performing initialization and performing generation and distribution of random numbers; receiving and auditing a request to generate the network identity identification code from a client; if the auditing is passed, performing encryption coding and generating a network identity identification code, and then sending the network identity identification code to a network electronic identification card through the client; the network electronic identification card performing the check processing of a network identity identification code, and feeding back a result to the server; the server storing the network identity identification code into a database, and informing the user. By means of the method for generating and check-controlling a network identity identification code in a network electronic identification card, the purposes of network identity management and privacy protection are both achieved, thereby effectively protecting the network application security and identity information privacy of citizens. The method is convenient and quick in use, has stable and reliable working performance, and has a wide application range, thereby laying a strong foundation for establishment of unified network identity management and service ecosystem.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Automatic screening and propelling method and system with high matching degree for managing user and confidential information

The invention provides an automatic screening and propelling method and system with a high matching degree for managing a user and confidential information. The method comprises the following steps: a step A: self-defining and screening out a target option to be screened according to a screening model of the target option; a step B, establishing a first scoring mechanism of the screening model for scoring the target option to be screened; a step C: capturing the information associated with the target option from a first database according to the scored result, and showing the scored information from high to low in sequence according to the scores; and a step D: propelling the user information to the selected target option according to the self-defined propelling mechanism. According to the automatic screening and propelling method and system provided by the invention, the conational screening tool is improved; the user-defining and quantifying function is additionally added; self-defining treatment to a plurality of objects on the basis of protecting information privacy is carried out; and all operation processes and data are stored in the central database of the system. The automatic screening and propelling method and system are suitable for high-precision matching of market development, company merger and acquisition, investment banking and commercial procurement, and even a plurality of fields such as personal employment and education, marriage dating and the like.
Owner:GEBO INFORMATION TECH SUZHOU

Method, device and system for calculating service path

The embodiment of the invention discloses a method for calculating a service path, which comprises the following steps: a source path computation element (PCE) corresponding to a service source node sends path request messages to adjacent PCEs after receiving path request messages; each PCE receiving the path request messages judges whether the service destination node belongs to an autonomous system or not; or else, after the individual PCE information is sequentially added to the path request messages, the path request messages are continuously sent to the next or a plurality of adjacent PCEs until the destination PCE is determined; the destination PCE acquires a PCE sequence according to the individual PCE information and the received path request messages, and then, a response message carrying the PCE sequence is sent to the opposite direction according to the PCE sequence until the source PCE receives the response message; and then, the service path is calculated according to the PCE sequence. The embodiment of the invention also discloses a device and a system for achieving calculation of the service path. The effects of information privacy and optimal utilization of network resources are achieved by using the method, the device and the system.
Owner:HUAWEI TECH CO LTD

Internet of Things equipment authentication method based on block chain

The embodiment of the invention discloses an Internet of Things equipment authentication method based on a block chain. The method comprises the following specific steps: establishing a hybrid model of fog computing, a cloud server and the block chain for performing data processing on heterogeneous data generated by Internet of Things equipment connected to the Internet of Things; processing heterogeneous data generated by the Internet of Things equipment through fog calculation to form authentication data; sending a data entity of the authentication data to the cloud server through fog computing for data storage, sending an index and a Hash value of the authentication data to a blockchain for uplink, then carrying out whole-network publishing on the Internet of Things, and meanwhile, enabling the Internet of Things equipment to record a public and private key pair for identifying the identity of the Internet of Things equipment on a chain of the blockchain; enabling other Internet ofThings devices connected to the Internet of Things to perform signature verification on the Internet of Things device providing the public and private key pair in the blockchain to obtain the ownership of access and use of data, thereby realizing cooperation among multiple manufacturers and interconnection and intercommunication under the condition of device information privacy protection.
Owner:GUANGDONG POWER GRID CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products