Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51 results about "Right to privacy" patented technology

The right to privacy is an element of various legal traditions to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy.

Verification code input method and device

The invention provides a verification code input method and device, and the method comprises the steps: reading a short message; judging whether the short message is matched with a target application which needs to receive a verification code or not when the short message contains the verification code; enabling the verification code in the short message to be filled in a system paste board when the short message is matched with the target application, and adding privacy authority, wherein the privacy authority is used for shielding other applications different from the target application; and enabling the verification code in the system paste board to be filled in a verification input frame of the target application. In conclusion, the method can automatically analyzes the verification code, matched with the target application which needs to receive the verification code, from the content of the short message, and fills the verification code into the corresponding verification input frame. A user does not need to specially search the verification code from the short message, so the method and device are relatively simple in operation. In addition, the method adds privacy authority to the content of the system paste board, thereby preventing the leakage of the privacy of the user.
Owner:XIAOMI INC

Method and system for realizing instant messaging among persons travelling together

The invention relates to a method for realizing instant messaging among persons travelling together. The method includes the steps: acquiring position information and timestamps of a user continuously through a mobile user terminal; acquiring adjacent contact persons of the user at every moment according to the position information of the user at multiple moments of the current time period; taking persons having common intersections of the adjacent contact persons at every moment as preselected persons travelling together of the user; matching user travelling-together tags, and acquiring the persons travelling together of the user; automatically building a chat channel for the persons travelling together to realize instant messaging of the user and all the persons travelling together. By the method, the persons travelling together can be automatically searched and added for the user, the instant messaging channel is built, and communication among the persons travelling together is facilitated greatly. Meanwhile, unless the user selects shared position information, the other users cannot know the position information of the user, so that instant messaging requirements of the user is met, and the right of privacy of the user is protected effectively.
Owner:蔡宏铭

GDPR compliance supervision method and system based on alliance chain

ActiveCN112073484AImprove efficiency in complying with GDPR complianceReduce complianceUser identity/authority verificationData streamEngineering
The invention provides a GDPR compliance supervision method and system based on an alliance chain, and the method comprises the steps: enabling a service provider and a supervision mechanism to carryout the real-name registration in the alliance chain, enabling the service provider to be registered as a service node, and carrying out the accounting node election and block generation according tothe credibility of the service node; the permission record of the data subject is encrypted and stored in the alliance block chain through the smart contract; the data subject is granted permission toaccess the alliance block chain, and when the data controller transmits personal information to the data processor, the agreement of the related data subject is needed, and the transaction also stores a data flow record through the smart contract; and during compliance investigation, submitting a traceability request to the alliance block chain by the supervision institution, and tracing to obtain a record by the alliance block chain service network according to the request. According to the method, the expansibility and the tamper resistance of the block chain are utilized so that the privacy right endowed by the user to drive the GDPR and the efficiency of a service provider to abide by the GDPR compliance can be effectively improved from the aspect of technical support, and the compliance and supervision cost is reduced.
Owner:WUHAN UNIV

Privacy processing method and device, computer readable storage medium and electronic medium

InactiveCN111885339ASolving the inability to make an effective statement on one's own privacy rightsSolve protection problemsGeometric image transformationBiometric pattern recognitionElectronic mediaRight to privacy
The invention provides a privacy processing method and device, a computer readable storage medium and an electronic medium, and the privacy processing method comprises the steps: obtaining first videoinformation or first image information sent by a first terminal, and determining content feature information according to the first video information or the first image information, wherein the content feature information is used for indicating features of content contained in the first video information or the first image information; and performing privacy processing on the first video information and / or the first image information according to the content feature information. Through the embodiment of the invention, the problem that the user cannot effectively declare or protect the own privacy rights in the related art can be solved, so that the effect of declaring or protecting the privacy according to the own requirements of the user can be achieved.
Owner:HAIER YOUJIA INTELLIGENT TECH BEIJING CO LTD

Blockchain-based digital asset processing method and device

The invention discloses a blockchain-based digital asset processing method and device. The method comprises the following steps: receiving private ciphertext for a digital asset circulated from a sending end to a receiving end through a blockchain, and a preset public key; and obtaining a sharing public key for sharing the private ciphertext based on the preset public key, so that when the private ciphertext and the sharing public key are broadcast in the blockchain, blockchain nodes on the blockchain can share the private ciphertext based on the sharing public key and reach a blind consensus on the shared private ciphertext, and after the consensus on the private ciphertext is reached, the private ciphertext can be decrypted by at least one of three parties, i.e., the sending end, the receiving end and a monitoring end, based on a preset private key to obtain plaintext of the digital asset. The method and device provided by the embodiment of the invention has the advantages that the privacy right of a user is protected; under the premise of privacy protection, the single general digital asset can be smoothly circulated within one blockchain or among multiple blockchains, and a total currency amount remains unchanged; and a monitoring party other than the transaction parties can monitor transaction information at any time.
Owner:中钞信用卡产业发展有限公司杭州区块链技术研究院 +1

Private authority detection method and device, electronic equipment and storage medium

The invention discloses a privacy authority detection method and device, electronic equipment and a storage medium, and relates to the technical field of data safety. The method comprises the steps of obtaining probability values corresponding to a plurality of privacy permissions contained in a privacy policy of a to-be-detected application program, obtaining privacy permissions of which the probability values are greater than a probability threshold value from the plurality of privacy permissions contained in the privacy policy, and taking the obtained privacy permissions as a first privacy permission set, the privacy authority called by the to-be-detected application program in the running process is obtained to serve as a second privacy authority set, and when the first privacy authority set does not completely comprise the second privacy authority set, prompt information is output and used for prompting that authority calling of the to-be-detected application program is out of range, privacy authority detection of the application program is achieved, and the privacy authority of the to-be-detected application program is detected. The accuracy of privacy authority detection is improved, and the duration of privacy authority detection is shortened.
Owner:HANGZHOU DOUKU SOFTWARE TECH CO LTD

Data publishing method and system

The invention relates to a data publishing method and system. The method comprises the steps that sensitive attribute weights of all set fields in original data provided by a data publisher are determined according to information entropy; determining an association attribute weight of each set field according to the conditional entropy and the information gain; determining a privacy weight of each set field according to the sensitive attribute weight and the associated attribute weight; performing non-negative numeralization processing on the data of the set field to obtain a privacy sensitive data matrix; obtaining a privacy sensitive data matrix with a privacy weight; performing norm calculation on the privacy sensitive data matrix with the privacy weight to determine a privacy risk leakage coefficient; judging whether the privacy risk leakage coefficient is within a set range or not; and if the privacy risk leakage coefficient is not within the set range, desensitizing the data corresponding to each set field in the original data, replacing the data corresponding to the set fields with the desensitized data, and recalculating the privacy risk leakage coefficient until the privacy risk leakage coefficient conforms to the set range. According to the invention, the risk of data privacy leakage is reduced.
Owner:GUIZHOU UNIV

System design and implementation method of homomorphic encryption in student mental health investigation

The invention discloses a system design and implementation method of homomorphic encryption in student mental health investigation, and belongs to the field of symmetric key cryptography and public key cryptography. According to the method, firstly, a user uses a key generator to generate an identity authentication code, then, the user logs in a system to fill in a survey report, then, the system ensures full homomorphic calculation of a cloud end by using a full homomorphic algorithm (somewhat algorithm) constructed by a pallier addition homomorphic structure and an RSA multiplication homomorphic structure, and finally, the user inquires and detects a ciphertext result through a ciphertext index, and exports and decrypts by using a private key to obtain the mental health assessment. The student trust psychological health evaluation system can be guided to obtain a real test effect. Therefore, the system can meet the privacy protection requirement of mental health evaluation in an online environment, and the privacy right of the user is better protected. The method not only can be applied to the mental health evaluation level, but also has a good application prospect in various online surveys such as occupational attainment evaluation and the like.
Owner:山东凌瑞市场调查有限公司

Method for evaluating personal information protection capability of application software in real-time running state

The invention provides a method for evaluating personal information protection capability of an APP in a real-time running state, according to application behaviors and influence factors of personal information security related to the application software (APP), a personal information security calculation strategy of the application software (APP) is generated, and according to different application behaviors and influence factors, each application permission is assigned; an APP static personal information protection capability score is calculated and taken as an initial value; then the influence of the important privacy authority obtained by the APP on the personal information protection capability of the APP is analyzed and calculated; and finally, the score of the personal information protection capability of the APP during real-time operation is calculated, guidance is provided for evaluating the personal information protection capability of the APP, a user to select and use the APP is guided, the user can be assisted to fully understand the influence of opening/closing of different permissions on the personal information protection capability of the APP, and therefore, the user can be guided to carefully open the APP permission or timely close the permission for use compensation.
Owner:中电数据服务有限公司

Privacy policy detection method and device, electronic equipment and readable storage medium

The embodiment of the invention provides a privacy policy detection method and device, electronic equipment and a readable storage medium. The electronic equipment obtains a first permission list used for indicating privacy permissions contained in a privacy policy of a to-be-detected application and a second permission list used for indicating the privacy permissions used in the actual running process of the to-be-detected application; when the second permission list is the subset of the first permission list, determining that the privacy policy of the to-be-tested application is qualified. By adopting the scheme, the privacy authority in the privacy policy is compared with the privacy authority actually involved in the use process of the to-be-tested application, so that whether the privacy policy of the to-be-tested application is compliant or not is determined under the condition that normal use of the to-be-tested application by a user is not influenced, the personal privacy of the user is effectively protected, and the security of the electronic equipment is improved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Watermark embedding method, watermark reading method and watermark system based on desensitized data

The invention discloses a watermark embedding method, watermark reading method and watermark system based on desensitized data. The watermark embedding method based on desensitized data comprises thesteps: sorting data, setting the sequence of data columns, and recording the sequence of rows and columns of the data; performing desensitization processing on the sensitive field of the data to obtain a desensitization field; encrypting and encoding the traceability information to obtain watermark information; and embedding watermark information into the desensitization field through a preset rule, the preset rule being that one or more bits in the desensitization field are changed into preset symbols to serve as carriers of the watermark information. According to the technical scheme, data can be traced back effectively, more data information cannot be lost when watermarks are added in the encryption method, the watermark removing cost is low, sensitive information can be effectively protected, leakers can be traced back, and privacy rights and interests of enterprises and individuals are protected.
Owner:NEWLAND DIGITAL TECH CO LTD

Cloud native task allocation system, method and device based on block chain

The invention discloses a cloud native task allocation system, method and device based on a block chain. The method comprises following steps: acquiring a task set within a preset time period, and acquiring an initial device set comprising at least one service device; performing iterative processing from the acquired first to-be-merged device set to the end of the last to-be-merged device set to obtain a target allocation scheme; and based on incomplete information of a plurality of service facilities of a multi-party service provider, according to the comprehensive resource utilization rate of all the devices in the device set, the income of the service provider and the deployment cost of all the devices, determining the device set, carrying out task allocation in the device set. Multiple optimization objectives of the user and the service provider are comprehensively considered, and a task allocation problem is abstracted into an incomplete information game problem, so privacy right information of all parties is protected, efficient allocation of user tasks is completed based on an alliance decentralization mode, effectiveness of all service providers is improved to the maximum extent, and overall effectiveness maximization is achieved.
Owner:PEKING UNIV SHENZHEN GRADUATE SCHOOL +4

Android application classification authorization method for quantitative judgment of suspicious behaviors

The invention discloses an android application classification authorization method for quantitative judgment of suspicious behaviors. According to the android application classification authorization method for quantitative judgment of suspicious behaviors, an existing android system authorization mechanism is improved from two aspects of assisting user authorization and refining authorization modes, wherein firstly, aiming at the situation that a large number of user privacy permissions are obtained by application programs and cross-border obtaining is very serious, from the aspects of safety and privacy, a suspicious behavior quantitative judgment scheme is provided, and when an application program is installed, a judgment result is presented to a user in a simple, concise and direct expression by checking an applied permission list and judging the security threat degree of the application program, so that the user is helped to make an authorization decision; and secondly, an existing coarse-grained authorization mode of full selection or non-full selection is improved, a classification authorization method is provided, for some privacy permissions, the user is allowed to flexibly authorize each permission, and meanwhile, the privacy information of the user is protected from being leaked while normal operation of the application program is ensured in a replacement mode.
Owner:刘秀萍

Application control method and device and electronic equipment

PendingCN111814135AAvoid violationsReduce the risk of leaking private informationDigital data protectionUser privacyEngineering
The invention discloses an application control method and device and electronic equipment, and belongs to the technical field of computers. The method comprises the steps of receiving a target requestsent by a target application, wherein the target request comprises first information used for indicating access to target private data; in response to the target request, skipping an operation of accessing the target private data, and generating target indication information, the target indication information being used for indicating that the target private data is successfully accessed; and sending the target indication information to the target application. According to the embodiment of the invention, the problem that in the prior art, an APP forcibly requires user authorization to obtainuser privacy information by denying service, so that the privacy right of a user is invaded, and the privacy information is leaked is solved.
Owner:VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products