Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43results about How to "Avoid being leaked" patented technology

Differential privacy protection method of medical data dissemination

The invention discloses a differential privacy protection method of medical data dissemination. A K-anonymous technology and a differential privacy technology are effectively combined to solve the problems that the statistical information of data can not guaranteed to be prevented from being leaked when the K-anonymous technology is solely used, a great quantity of noise is introduced while the differential privacy technology is solely used to only protect the statistical information, a data distortion degree becomes high to lower data utilizability; and therefore, on the premise that the medical data is guaranteed to be available, the risk of patient information leakage when the medical data is collected and disseminated can be effectively avoided so as to perform the efficacy of the medical data during statistics and mining.
Owner:GUANGXI NORMAL UNIV

Device for defending invasive attack

The invention discloses a device for defending invasive attack. The device comprises one or more sensors, one or more metal wires, a comparator and a controller, wherein the signal transmitting end of each sensor is used for transmitting a signal, and the signal receiving end of each sensor is used for detecting the integrity of the signal; the metal wires are covered above a protected circuit and used for connecting the signal transmitting ends and the signal receiving ends of the sensors together; the input end of the comparator is respectively connected with the signal transmitting ends and the signal receiving ends of the sensors and used for comparing the signals of the signal transmitting ends and the signal receiving ends, and the output end of the comparator is connected with the data input end of an alarm mark; and the controller is used for controlling the signal update of the signal transmitting ends of the sensors, controlling the comparator to periodically detect the connectivity of the metal wires and enabling the alarm mark to be valid when the connectivity of the metal wires is abnormal. Through the device, the internal signals of an integrated circuit (IC) chip can be effectively prevented from being detected by the invasive attack, the security of user data is protected, and the security strength of the IC chip is improved.
Owner:SHANGHAI HUAHONG INTEGRATED CIRCUIT

Data processing method, device and equipment and storage medium

The invention discloses a data processing method, device and equipment and a storage medium. The method comprises the following steps: a data processing platform receives an access request carrying anidentity identifier sent by a data user, wherein the access request is used for accessing data stored in the security isolation area, and data in the security isolation area cannot be copied; and themethod further includes determining whether the data user has the authority to access the corresponding data or not according to the identity identifier, if so, analyzing and processing the corresponding data in the security isolation area according to the access request to obtain a processing result, and returning the processing result to the data user. According to the platform provided by thescheme, the data provider uploads the data to the security isolation area which cannot be copied, and the data user can only use the data on the platform, so that the data is effectively prevented from being leaked, and the data security is improved.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

Medical health information platform using method for citizens

InactiveCN105069732APrevent data from being leakedAvoid being leakedData processing applicationsAuthorizationMedical health
The invention discloses a medical health information platform using method for citizens. The method comprises a person of interest health record management step and a personal health record or person of interest health record checking step. The step of person of interest health record management includes associating health records of persons of interest to obtain authorization of the persons of interest, and checking and managing health records of persons of interest, wherein the persons of interest comprise relatives or non-relative persons. A wearable equipment association step includes associating wearable equipment with a medical information platform, and inputting data detected by the wearable equipment into the medical information platform. According to the invention, on the basis of the conventional medical health information platform, convenience is provided by the citizens by the person of interest health record management step, the wearable equipment association step, and the personal health record or person of interest health record checking step.
Owner:CHENGDU GOLDISC UESTC MULTIMEDIA TECH

Electronic information intelligent storage system for industrial management

The invention discloses an electronic information intelligent storage system for industrial management. The electronic information intelligent storage system comprises a data receiving module, a datasource analysis module, a virus scanning module, a data processing module, a data classification module, a data storage module, a transfer storage module, a cloud storage module, a data retrieval module, an identity verification module and a login module. The data receiving module is in communication connection with the data source analysis module; the data source analysis module is in communication connection with the virus scanning module; wherein the external virus characteristic information acquisition module is in communication connection with the virus scanning module, the virus scanningmodule is in communication connection with the data processing module, the data processing module is in communication connection with the data classification module, and the data classification module is in communication connection with the data storage module; according to the invention, the security of the stored data can be better ensured, and meanwhile, the system can be more convenient to use and is more suitable for popularization and application.
Owner:深圳市熠华智能科技有限公司

Encryption method, device and equipment based on features of information and storage medium

The embodiment of the invention discloses an encryption method, device and equipment based on features of information and a storage medium, and the method comprises the steps: obtaining a target function for describing information, and the feature information of to-be-processed target information; dividing the target information according to the feature information of the target information to obtain at least two pieces of sub-information; obtaining coordinate information corresponding to each piece of sub-information in the at least two pieces of sub-information according to the target function; encrypting the coordinate information of each piece of sub-information in the at least two pieces of sub-information to obtain a ciphertext of the coordinate information corresponding to each piece of sub-information; and determining the ciphertext of the coordinate information corresponding to each piece of sub-information as the ciphertext of the target information, and storing the ciphertext of the target information in a blockchain network. By adopting the method, the security of the target information can be improved, the method is suitable for the field of smart medical treatment, and the construction of smart cities can be further promoted.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Voice interaction method, device, system and equipment for protecting privacy and storage medium

The invention provides a privacy-protecting voice interaction method, device, system and equipment and a storage medium. The method comprises the steps: acquiring, by a terminal, a voice signal input by a user; encrypting the voice signal to obtain an encrypted voice signal; sending the encrypted voice signal to a cloud server; analying, by the cloud server, the encrypted voice signal and generating the corresponding encrypted interaction data based on an analysis result; sending the encrypted interaction data to the terminal; decrpyting, by the terminal, the encrypted interaction data, and determining and executing a corresponding interaction operation. According to the voice interaction method, in the whole voice interaction process, the cloud server carries out analysis processing completely based on the encrypted information, the problem that personal information of the user is leaked is avoided, and the privacy of the user is effectively protected.
Owner:ZEBRED NETWORK TECH CO LTD

Finger vein encryption communication terminal for confidential file

The invention discloses a finger vein encryption communication terminal for a confidential file, and relates to finger vein application equipment and facilities. The terminal comprises a terminal body, a human face identifier, a display, a vein identifier and a loudspeaker, wherein the display, the vein identifier and the human face identifier are arranged on the front surface of the terminal body; the loudspeaker is arranged at the bottom of the terminal body; a human face identification apparatus, a control apparatus and a vein identification apparatus are arranged in the terminal body; the control apparatus is connected with the human face identification apparatus through a lead wire; the control apparatus is connected with the vein identification apparatus through a lead wire; the control apparatus is connected with the human face identifier through a lead wire; the control apparatus is connected with the vein identifier through a lead wire; and the control apparatus is connected with the loudspeaker through a lead wire. Double encryption is performed through the human face identification apparatus and the vein identification apparatus, so that an encrypted file of a user is securer and the contents of the encrypted file can be effectively prevented from being leaked.
Owner:同略科技有限公司

Code protection method, device and system and readable storage medium

The invention discloses a code protection method, device and system and a readable storage medium. According to the code protection method applied to the client side and the code protection method applied to the server side, even if an illegal person performs breakpoint debugging on the client side, only the target key, the calculation function and the code request function can be obtained, and the function code needing to be protected cannot be obtained. And after the client executes the calculation function and the code request function, a function code request is sent to the server, and a function code ciphertext, a key and a decryption function sent by the server are received after the verification of the verification key value is passed. Therefore, the client can automatically load the function code ciphertext and decrypt the function code ciphertext in combination with the secret key and the decryption function, and then the function code can be executed. Namely, according to themethod provided by the invention, the function code can be protected under the condition that the normal function business service provided for the client is not influenced, and leakage is avoided.
Owner:SUZHOU KEDA TECH

Encryption method and device based on shared root key, equipment and medium

The embodiment of the invention discloses an encryption method and device based on a shared root key, equipment and a medium, and relates to a block chain technology. The method comprises the steps: obtaining a target function used for describing information and a root key corresponding to target information to be processed, wherein the target information comprises at least two pieces of sub-information; generating a key of each piece of sub-information in the at least two pieces of sub-information according to the root key; obtaining coordinate information corresponding to each piece of sub-information in the at least two pieces of sub-information according to the target function; encrypting the coordinate information corresponding to each piece of sub-information in the at least two pieces of sub-information by adopting the key of each piece of sub-information to obtain a ciphertext of the coordinate information corresponding to each piece of sub-information; and determining the ciphertext of the coordinate information corresponding to each piece of sub-information as the ciphertext of the target information, and storing the ciphertext of the target information in a block chain network. By adopting the method, the security of information can be improved, the method is suitable for the field of smart medical treatment, and the construction of smart cities can be further promoted.
Owner:PING AN TECH (SHENZHEN) CO LTD

Authentication method, terminal and server

The invention discloses an authentication method, comprising the following steps: acquiring image data of a second terminal; when a radio access bearer is in a release state, by virtue of an Internetof Things protocol, allowing a signaling used for data transmission to send the image data to a server, wherein the image data is used for requesting the server to send a secret key corresponding to afirst terminal; and receiving the secret key sent by the server, and sending the secret key to the second terminal, wherein the secret key is used for authenticating the first terminal by the secondterminal. The invention also discloses a terminal and a server.
Owner:ZTE CORP

Livestock animal fence entry detection method based on gun-ball linkage and BIM

The invention discloses a livestock animal fence entry detection method based on gun-ball linkage and BIM. The method comprises the following steps: carrying out animal detection on an animal image ofa large-range free-ranging area acquired by a gunlock; carrying out coordinate regression to obtain animal key point coordinates; when the distance between the animal and the fence is smaller than aset threshold value, calling the gunlock; enabling the gunlock to collect a fence entrance image and process the fence entrance image to obtain a fence entrance animal thermodynamic diagram; superposing thermodynamic diagrams of animals at the entrance of the fence, and adjusting the pose of the dome camera after the track disappears; acquiring an animal image of an internal area of the fence, andprocessing to obtain an animal thermodynamic diagram in the fence; counting the number of peak points of animal thermodynamic diagram hot spots in the fence; and combining the WebGIS technology to visualize the livestock breeding area building information model. By means of the animal husbandry in-fence detection system and method, automatic animal husbandry in-fence detection is achieved, the animal husbandry in-fence detection efficiency and precision are improved, and the safety in the data processing and transmission process is improved.
Owner:各珍珍

An electronic information intelligent storage system for industrial management

The invention discloses an electronic information intelligent storage system for industrial management. The electronic information intelligent storage system comprises a data receiving module, a datasource analysis module, a virus scanning module, a data processing module, a data classification module, a data storage module, a transfer storage module, a cloud storage module, a data retrieval module, an identity verification module and a login module. The data receiving module is in communication connection with the data source analysis module; the data source analysis module is in communication connection with the virus scanning module; wherein the external virus characteristic information acquisition module is in communication connection with the virus scanning module, the virus scanningmodule is in communication connection with the data processing module, the data processing module is in communication connection with the data classification module, and the data classification module is in communication connection with the data storage module; according to the invention, the security of the stored data can be better ensured, and meanwhile, the system can be more convenient to use and is more suitable for popularization and application.
Owner:深圳市熠华智能科技有限公司

Information processing method and device, electronic equipment and storage medium

The invention relates to a block chain, and discloses an information processing method and device, electronic equipment and a storage medium, and the method comprises the steps: obtaining a first waybill and a second waybill; if a difference value between a first moment included in the first waybill and a second moment included in the second waybill is smaller than or equal to a preset time difference, comparing cargo information in the first waybill with corresponding information in the second waybill, the preset time difference being a ratio of a preset distance to a preset speed, wherein the first moment is the moment when the first node obtains the cargo, and the second moment is the moment when the second node obtains the cargo; and if the comparison is successful, displaying information that the comparison between the first waybill and the second waybill is successful on a display interface. According to the embodiment of the invention, the waybill comparison efficiency is improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Method and system for realizing login through borrowing account of others

ActiveCN105610798AFacilitate active lendingActive lending is convenientTransmissionPasswordDatabase
The invention discloses a method and a system for realizing login through borrowing an account of others. The method comprises the following steps that according to an account borrowing request of a borrowing party, a first APP on a borrowing party mobile terminal sends a temporary password input by the borrowing party to an account borrowing management server; the first APP on the borrowing party mobile terminal receives a first account authentication cache file corresponding to the temporary password from the account borrowing management server and stores the first account authentication cache file at a specified position on the borrowing party mobile terminal, wherein the first account authentication cache file contains first account authentication cache information needed for a loaning party to login to a second APP; according to the first account authentication cache file stored at the specified position, the second APP on the borrowing party mobile terminal logins to a server of the second APP by making use of the first account authentication cache information contained in the first account authenticationcache file, namely, the loaning party can enable others to login at a specified application website through the account of the loaning party without providing the account and the password on the specified application website.
Owner:BEIJING QIHOO TECH CO LTD

A method and system for logging in by borrowing someone else's account

ActiveCN105610798BFacilitate active lendingActive lending is convenientTransmissionPasswordComputer science
The invention discloses a method and system for logging in by borrowing another person's account. According to the account borrowing request of the borrower, the first APP on the mobile terminal of the borrower sends the temporary password input by the borrower to the account borrowing management server; the borrower moves The first APP on the terminal receives the first account authentication cache file corresponding to the temporary password returned by the account borrowing management server and stores the first account authentication cache file in a specified location on the borrower's mobile terminal, wherein the The first account authentication cache file contains the first account authentication cache information required by the borrowed party to log in to the second APP; according to the first account authentication cache file stored in the specified location, the second APP on the borrower's mobile terminal uses The first account authentication cache information contained in the first account authentication cache file logs in to the server of the second APP, that is, it is not necessary for the borrowed party to provide the account and password on the designated application website to allow others to pass through the borrowed party's account and password. The account is logged in on the designated application website.
Owner:BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products