Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

87results about How to "Guaranteed data privacy" patented technology

Federated learning method and device based on block chain

The invention discloses a federated learning method and device based on a block chain. The method comprises the steps: determining the block chain; enabling the coordinator node to create a federatedlearning task according to the model original data sent by each participant node; receiving training data obtained by local training of the participant nodes; sending the to-be-updated parameters to other participant nodes according to the training data, so as to enable the other participant nodes to update own model parameters according to the to-be-updated parameters; and after model training iscompleted, issuing reward resources according to training data provided by each participant node in the training process, and writing rewards into the block chain. Compared with a traditional mode, the mutual trust problem of all parties is effectively solved; all parties participating in federated learning negotiate together to generate a coordinator node, so that the transparency of the processis improved; federated learning whole-process data is recorded in a block chain, so that the traceability of data operation is ensured; all parties are encouraged to actively participate through rewarding resources, and the enthusiasm of participants is improved.
Owner:INSPUR ARTIFICIAL INTELLIGENCE RES INST CO LTD SHANDONG CHINA

Vehicle-road communication test system and test method on 5G technology

The invention discloses a vehicle-road communication test system based on the 5G technology. A network element function is realized by adopting a virtualization and software mode; the network transmission rate can be obviously improved; concurrent network messages of dense network terminals in the Internet of Vehicles environment are ensured. the requirement of complex and huge Internet of Vehicles application on ultra-low time delay is met; the system cloud server adopts a virtualization technology. the number of servers is reduced; in a security aspect, multiple network slices are divided, asecurity isolation and height self-control special logic network is provided; network security is greatly improved, the information security of the Internet of Vehicles application and the data privacy of the user are ensured; the edge cloud server sinks a part of services to a network edge; the Internet of Vehicles application service processing speed based on roadside equipment can be remarkably increased, lower transmission delay is provided, the test platform can be used for verifying the actual effectiveness of the 5G technology applied to the Internet of Vehicles application, and support is provided for 5G-based Internet of Vehicles equipment layout and network design in a real scene.
Owner:CHANGAN UNIV

Security data storage and computing method based on Internet of Things fog computing-edge computing

The invention belongs to the technical field of data storage and computing, and discloses a security data storage and computing method based on Internet of Things fog computing-edge computing. Localized Epsilon differential privacy is achieved through the data collection module, data encryption is achieved at fog nodes, and the safety of local area data is protected; the data storage module is used for storing encrypted data and protecting the privacy of the data on the fog server; the data access module is used for realizing data security decryption and protecting data information security sharing; the distribution module uploads own distribution task to the scheduler, so that the privacy of the computing terminal can be effectively protected; meanwhile, the computing tasks are decomposedthrough the task processing module, and parallel computing is conducted on the multiple decomposed computing subtasks. According to the invention, while the processing speed of the computing task isimproved, the data security and data privacy of the whole system are ensured.
Owner:XIDIAN UNIV +1

Private data intersection acquisition method and device, electronic equipment and storage medium

The invention relates to a private data intersection acquisition method and device, electronic equipment and a storage medium, and the method comprises the steps: an initiator and a plurality of participants determine a safety length and a mapping function, and the participants determine a mask; an initiator performs privacy intersection calculation with each participant according to the security length and the mapping function, each participant randomly generates a respective participant random vector, and the initiator obtains a plurality of pieces of first verification information; the plurality of participants obtains a plurality of pieces of second verification information according to the participant random vectors and the masks; and the initiator determines a private data intersection according to the first verification information and the second verification information. The problems of privacy leakage of participants and relatively low data security caused by formation of a multi-party intersection based on pairwise comparison in related technologies are solved, the efficiency and security of a privacy data intersection calculation process are improved, and the data privacy of a user is ensured.
Owner:HANGZHOU QULIAN TECH CO LTD

Joint training method and device for service model

The embodiment of the invention provides a joint training method and device for a service model, and the method and device enable the nonlinear complex operation to be distributed to a third party forprocessing in multi-party safety calculation, and greatly reduce the complexity of the joint training of a plurality of service parties for a nonlinear model. Meanwhile, each service party holding the feature data or the label data of the training sample generates a preset number of random numbers in an agreed random number generation mode, the sample data of the training samples in one-to-one correspondence in sequence is obtained, the consistency of the data is kept, and since the third party does not participate in the random number generation process, other service parties effectively guarantee data privacy for the third party. And other service parties interact with each other through a secret sharing method, so that data privacy is ensured among the service parties. In conclusion, according to the method, on the basis of privacy protection, the operation complexity of a nonlinear model jointly trained by a plurality of service parties is greatly reduced.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

Privacy protection method and device for Wifi fingerprint positioning

The invention relates to a privacy protection method and device for Wifi fingerprint positioning. The privacy protection method for Wifi fingerprint positioning comprises the following steps that a server extracts all the Wifi fingerprints and fingerprint metadata; a client terminal collects Wifi signal intensity values in the peripheral environment and generates a public key and a private key according to the asymmetrical encryption algorithm, encryption is respectively conducted on the collected Wifi signal intensity values by the public key and a positioning request is sent to the server; the server calculates the fingerprint distance between all the Wifi fingerprints and each encrypted Wifi signal intensity value and transmits multiple sets of encrypted fingerprint distance data to the client terminal; the client terminal uses the private key to decrypt the multiple sets of the encrypted fingerprint distance data, and determines the current location of the client terminal according to the Wifi fingerprint corresponding to each decrypted fingerprint distance datum and the received fingerprint metadata. The privacy protection method and device for Wifi fingerprint positioning solves the privacy problem in an existing WiFi fingerprint positioning technology, and can protect the location privacy of a user and the data privacy of a service provider.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Secure transaction execution method based on smart contract

The invention discloses a secure transaction execution method based on a smart contract. The method comprises the following steps: deploying a blockchain node service; receiving the original transaction voucher information for uplink storage; enabling each transaction processing node to sign a smart contract and deploy the smart contract to the blockchain; recording the encrypted transaction voucher information on a transaction data alliance chain based on the smart contract; judging whether a contract is deployed on a blockchain for a current smart contract, analyzing transaction parameters corresponding to the smart contract, checking the identity compliance, security and authority of the transaction parameters of the smart contract, packaging the smart contract, and enabling an execution end to call the smart contract and execute the smart contract; sending the effective consensus information to other transaction processing nodes, determining that the smart contract is effective, and performing uplink evidence storage. According to the invention, the information security is ensured, the requirements of the bank for transaction checking and account checking and clearing are met, the processing efficiency of each link in the transaction process is improved, the default risk caused by human factors is reduced, and the cost reduction and benefit increase of an industrial chain are promoted.
Owner:中企链信(北京)科技有限公司

Internet of Things system based on Internet of Things encryption gateway

The invention provides an Internet of Things system based on an Internet of Things encryption gateway. The Internet of Things system comprises an intelligent terminal device used for sending to-be-transmitted data to the Internet of Things encryption gateway; the Internet of Things encryption gateway is used for judging whether a protocol supported by the intelligent terminal equipment is an unsafe protocol, if the protocol is the unsafe protocol, refusing to accept data sent by the intelligent terminal equipment, and if the protocol is the safe protocol, analyzing the data sent by the intelligent terminal equipment by using the protocol supported by the intelligent terminal equipment to obtain to-be-transmitted data, sending the to-be-transmitted data to the Internet, or encrypting and signing the to-be-transmitted data, generating processed data, and sending the processed data to the Internet. The Internet is used for transmitting data to be transmitted or processed data; the security platform is used for receiving the to-be-transmitted data or performing signature verification operation on the processed data, performing decryption operation on the processed data to obtain the to-be-transmitted data after the signature verification is passed, and sending the to-be-transmitted data to the service platform; and the service platform is used for processing to-be-transmitted data.
Owner:BEIJING GAS GRP

Safety Top-k query method facing to double-layered sensing network and device

The invention relates to the technical field of security defense of a double-layered sensing network. The safety Top-k query method facing to the double-layered sensing network includes steps that a data item generated in the same time slot of a sensor node is pretreated; a main pipe node searches Top-k data item ciphertext in accordance with the query request from the stored data item according to a ciphertext value of the data item weight, and uses these data item ciphertexts along with a part of security detection information as the Top-k query result; a Sink node finds out a sharing symmetric key according to the key in the query result, decodes the ciphertext in the query result, and detects the data item authenticity and integrity in the query result. The safety Top-k query device facing to the double-layered sensing network comprises a pretreatment module, a query module and a query result inspection module. The safety Top-k query method and the device can ensure the data privacy of the Top-k query and detect the Top-k query result which is not possessed of the data integrity by high probability.
Owner:XINYANG NORMAL UNIVERSITY

Distributed differential privacy aggregation method

The invention belongs to the technical field of data collection of distributed privacy protection, and particularly relates to a distributed differential privacy aggregation method. The method comprises the following steps: distributed implementation is performed on a centralized differential privacy algorithm in a mode of adding noise at a user side on the basis that the centralized differential privacy algorithm obeys the additive property of the distribution; in the process that a user sends data and aggregates the data, by using a secure multi-party computing method, the user sends data randomized through a differential privacy algorithm to all aggregators in a secret sharing mode, and then all the aggregators interact to obtain a final randomized aggregation result. According to the accurate and efficient distributed differential privacy aggregation method provided by the invention, a differential privacy algorithm is realized in a distributed manner, so that the collection accuracy of distributed privacy protection data is improved, and under the trust hypothesis that a data collection party is not trusted, the security of intermediate data of a user is ensured through secure multi-party calculation, and the security data aggregation efficiency is improved.
Owner:NANKAI UNIV

Inference attack resistant distributed multi-task learning privacy protection method and system

According to an inference attack resistant distributed multi-task learning privacy protection method and system, model training is carried out through various task nodes based on local data, and jointmodel training is realized through a knowledge sharing mode. According to the method, a privacy protection model training mechanism based on homomorphic cryptography is provided, so that task nodes realize multi-task learning model training on the premise of ensuring the privacy of training data, the model training efficiency is independent of a sample data volume, and the machine learning modeltraining efficiency is improved. A model publishing method based on differential privacy is designed, and an identity inference attack initiated can be resisted when a model user accesses a machine learning model . The system comprises a key generation center, a central server, a task node and a model user. According to the method, the data privacy of the task nodes in the model training process and after the release of the model can be ensured, and large-scale application of multi-task machine learning is promoted.
Owner:XIDIAN UNIV +1

Container instance creation method and device based on multi-tenant management cluster

The invention provides a container instance creation method and device based on a multi-tenant management cluster. The method and the device are applied to management of a Kubernetes cluster. The management Kubernetes cluster comprises a management cluster control assembly and a plurality of management cluster nodes. Wherein each management cluster node deploys a tenant Kubernetes cluster corresponding to the management cluster node in advance, each tenant Kubernetes cluster comprises a tenant cluster control assembly and a virtual node, and when the target tenant cluster control assembly receives a container instance creation request, the container instance creation request is scheduled to the virtual node; and the virtual node sends the container instance creation request to the management cluster control component, so that the management cluster control component creates a corresponding container instance according to the container instance creation request. According to the invention, the isolation of multiple tenants can be realized under the condition of not influencing the service logic of the tenants, and the tenants do not need to care about the server information, so thatthe tenants can manage the tenant cluster conveniently.
Owner:UCLOUD TECH CO LTD

Data sharing method based on decentralized identity and proxy re-encryption

The invention discloses a data sharing method based on decentralized identity and proxy re-encryption. The method comprises the following steps: a data owner randomly generates a secret key A, encrypts original data R by using the secret key A to obtain encrypted data D, and pushes the encrypted data D to a data storage center for storage; then, the data owner encrypts the secret key A by using the own DID public key, generates an encrypted ciphertext C1, generates claim-1, and stores the claim-1; the data user sends a data use request to the data owner, the data owner authorizes the data user, and claim-2 authorization information is generated; the data user requests data specified by the corresponding claim from the access controller, and after it is confirmed that the data user has the access permission to the data, the data user obtains the original data R through decryption. According to the method, the absolute control right of the user on the data is strictly protected while the data is shared, and the data privacy of the user is ensured to the greatest extent.
Owner:奥科塞尔控股公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products