Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

552results about How to "Avoid Privacy Leakage" patented technology

Block chain storage system

InactiveCN107122477APrevent data privacy breachesReach the consensus of the whole networkDigital data protectionTransmissionCloud computingBlockchain
The invention discloses a block chain storage system. The system comprises a plurality of data collection modules and block chain data storage nodes corresponding to the data collection modules, wherein the data collection modules send collected data into the block chain data storage nodes, and all the block chain data storage nodes are connected with a communication network through a wired interface, a wireless interface, an optical interface, a Bluetooth interface or other technical interfaces and can complete synchronization and data communication. The system also comprises a cloud computing center, wherein the cloud computing center can call the data in the block chain data storage nodes, and a user can check the data from the cloud computing center through terminal equipment. The block chain storage system is composed of N block chain data storage nodes, and all the block chain data storage nodes are connected with the communication network through the wired interface, the wireless interface, the optical interface, the Bluetooth interface or other technical interfaces and can complete synchronization and data communication between themselves.
Owner:CHENGDU ZHONGYUANXIN ELECTRONICS TECH

Rotatable lifting camera and display device

ActiveCN109958870AAvoid leaking privacyThe appearance of the product is simpleStands/trestlesCamera body detailsEngineeringMechanical engineering
The invention provides a rotatable lifting camera and a display device. The rotatable lifting camera comprises a camera module and a drive assembly, wherein the drive assembly comprises a drive piece,a transmission piece, an execution piece, a limiting piece and a locking piece; the camera module is arranged on the execution piece; a non-rotation sliding fit section and a rotatable fit section are formed between the execution piece and the limiting piece; when the execution piece and the limiting piece are located at the non-rotation sliding fit section, the drive piece can drive the execution piece to linearly move in a reciprocating way through the transmission piece; when the execution piece and the limiting piece are located at the rotatable fit section, the locking piece locks the relative rotation between the transmission piece and the execution piece, so that the drive piece drives the camera module to rotate; and the display device comprises the rotatable lifting camera. The invention provides the rotatable lifting camera capable of automatically lifting and rotating segmentally and realizing double actions through a single power source, and the display device with the camera capable of stretching out and drawing back relative to a display screen and rotating after stretching out.
Owner:ONEPLUS TECH SHENZHEN

Screen transfer display method and device

The invention discloses a screen transfer display method. The screen transfer display method comprises the following steps: detecting whether an area display trigger instruction is received or not in a screen transfer sharing display mode; acquiring a preset area parameter when detecting and receiving the area display trigger instruction; performing area display processing on a first screen according to the area parameter to form a first display area for displaying a shared picture and a second display area for displaying a non-shared picture; intercepting the shared picture of the first display area and outputting to the second screen to display. The invention also discloses a screen transfer display device. The screen transfer display method provided by the invention, on one hand, can prevent that viewers are not disturbed by other pictures while watching the picture (such as a film) displayed through the screen transfer sharing to improve the impression of the viewers, and on the other hand, can prevent communication contents, private documents, pictures or the like of a user from being exposed to all the viewers so as to avoid the user privacy leakage.
Owner:NUBIA TECHNOLOGY CO LTD

Encrypted object display method and device for application

The embodiment of the invention discloses an encrypted object display method and device for an application. The method includes the steps that when a terminal runs the third-party application, user fingerprint information input when a user performs touch operation on a preset fingerprint recognition area is acquired; whether the user fingerprint information is matched with preset verification fingerprint information or not is judged; if yes, an encrypted object of the third-party application is displayed within a display duration range corresponding to the touch operation. By means of the encrypted object display method and device, display of the encrypted object of the application can be controlled according to the user fingerprint information, so that leakage of user privacy is avoided.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Express delivery information privacy protection system based on blockchain, and protection method thereof

The invention discloses an express delivery information privacy protection system based on a blockchain, and a protection method thereof. The method records all operational motions of an express delivery enterprise for user data through a blockchain auditing platform, the operation compliance of the express delivery enterprise is enhanced, and the express delivery enterprise can be effectively prevented from illegally obtaining personal information. Meanwhile, a user can read a user data visitor record through an authorization record recorded in the blockchain, the access permission of the express delivery enterprise for the user data is revoked, and the sense of control of the user for personal data is enhanced. In addition, a ciphertext express waybill is used for replacing a plaintext express waybill, so that a possibility that the user data is leaked in each link of an express delivery business process can be lowered. An express delivery package logistics tracking scheme based on the blockchain can assist the user in checking the logistics situation of the express delivery package at any time in a blockchain system, and logistics information which can not be tampered on the blockchain can provide proof-providing information for disputes including delivery losing claims and the like.
Owner:NANJING UNIV OF POSTS & TELECOMM

Identity verification method and related equipment

Embodiments of the present invention disclose an identity verification method and related equipment. The method comprises the following steps: collecting facial image information of a target user in a preset area range by a preset camera; comparing the facial image information of the target user with the stored facial image information of legal users and detecting whether the facial image information of the target user is matched with the facial image information of the legal users; and sending a warning message containing the facial image information of the target user to an associated mobile terminal so as to remind a user of the mobile terminal to verify whether the identity of the target user is legal if it is detected that the facial image information of the target user is not matched with the facial image information of the legal users. By virtue of implementation of the embodiments of the present invention, the warning message can be sent to the associated mobile terminal in time to remind the user when the detected facial image information is not matched with the stored facial image information.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

User privacy protection method, equipment and system for location business

The invention discloses a user privacy protection method, equipment and a system for a location business, wherein the method comprises the following steps of: receiving a started location positioning request by a user browser end when an internet user visits a business website, and directly sending the location positioning request to privacy protection equipment of a wireless communication network side by the user browser end; verifying the location positioning request by the privacy protection equipment, after the location positioning request is passed, and returning a positioning result corresponding to the location positioning request to the user browser end; and returning positioning result location information requested by the internet user to the business website by the user browser end. In the invention, user privacy protection can be achieved when the internet user uses the location business, safety for user location privacy can be improved, and defects that the user location privacy is leaked and privacy protection for the internet user can not be achieved in the prior art can be solved.
Owner:LIAONING MOBILE COMM

Information input method and information input device of terminal and terminal

The invention provides an information input method and information input device of a terminal and the terminal. The terminal comprises a plurality of operating systems, and the information input method comprises the steps that when the fact that any application program in any operating system receives an information input request is detected, a designated operating system is selected from at least one other operating system in the operating systems except for the any operating system; the designated operating system is controlled to acquire information required by the information input request to be input; the designated operating system is controlled to send the acquired information to the any application program of the any operating system. According to the technical scheme, the problem that the information input into the terminal is captured by malicious software, viruses and the like is solved, the information safety of the terminal is effectively protected, the privacy safety of a user is improved, and user experience is enhanced.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Method for automatically adjusting call volume and communication terminal

The invention discloses a method for automatically adjusting call volume and a communication terminal. The method comprises the following steps: detecting whether the current environment is quiet environment or noisy environment in a calling process, and detecting the call behavior of a user; automatically adjusting the volume of the received call according detection results; automatically lowering the volume of the received call when the user speaks in a lower voice in the quiet environment so as to prevent the leakage of privacy or influence other people due to excessively-great volume; automatically enhancing the volume of the received call according to fitting strength of the terminal with ear in the noisy environment so as to enable the user to listen to the voice of other people clearly, thereby meeting call requirements of the user in different environments, improving the intelligent level of the terminal and improving the user experience.
Owner:NUBIA TECHNOLOGY CO LTD

Intelligent monitoring method, device and system based on WiFi

ActiveCN105894703APrevent bandits from invadingAvoid leakage of user privacyBurglar alarm electric actuationUser privacyReal-time computing
The invention relates to an intelligent monitoring method, device and system based on WiFi. The device comprises an intelligent WiFi AP (Access Point), which is used for detecting a WiFi signal intensity value in an early warning area, judging whether the WiFi signal intensity value is within a preset signal intensity range, judging whether the current early warning count exceeds an early warning count threshold after a set timing cycle, if so, sending and displaying prompt information, otherwise, not carrying out any processing. The method, the device and the system realize intelligent monitoring using the WiFi technology, thereby effectively avoiding user privacy divulgence and missing report defect; and intelligent monitoring can be realized by adding only one WiFi connector and sufficiently utilizing the existing household routing platform, so the method, the device and the system are low in cost, high in security and very suitable for large-area popularization.
Owner:湖南领佰科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products