Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

119results about How to "Protect user privacy" patented technology

System and method for correlating user data from a content provider and user data from an advertising provider that is stored on autonomous systems

An autonomous correlation system correlates user data from a content provider and advertising view data from an advertising provider, wherein the user data is present on one autonomous system and the advertising view data is present on another autonomous system distinct from the one autonomous system, the systems being autonomous in that each is normally secured against unconstrained access by another. The autonomous correlation system comprises logic to accept a first message from a user, wherein the first message contains an indication of an object being presented to the user, the object being at least one of a content page and an advertisement, a first user identifier associated with the user by a presenter of the object; a reference database for storing an association between the first user identifier and the user; logic to accept a second message from the user, wherein the second message contains an indication of an object being presented to the user, the object being at least one of a content page and an advertisement, a second user identifier associated with the user by a presenter of the object; wherein the reference database stores an association between the second user identifier and the user.
Owner:PINTEREST

Intelligent smoke sensor with audio-video verification

A method and system architecture for automation and alarm systems is provided. An intelligent fire detection sensor is provided that provides input data to a gateway device for processing and facilitates two-way communication with users and a third-party monitoring service. The system architecture is hierarchically organized, allowing devices to process system data differently at different levels of the hierarchy. Processing of at least some of the sensor data is overseen by the gateway device, which may determine, based on the processing, to activate one or more secondary sensors at the fire detector (such as an optical camera). The gateway device and fire detection sensor may interact cooperatively to process voice commands and / or gesture data, and to recognize false alarms.
Owner:JOHNSON CONTROLS TYCO IP HLDG LLP

Container isolation enhancement system based on ARM TrustZone

The invention provides a container isolation enhancement system based on an ARM TrustZone. The system comprise a container management client side which runs at a client side; an untrusted operation system, an untrusted container management module and a trusted execution environment which run in the ordinary world of a server side; and a page table management module, a register protection module, asystem call hijacking module, a file system safety enhancement module, an execution flow synchronous service safety enhancement module, an interprocess communication service safety enhancement module, a trusted container mirror image downloading module and a safety container starting module which run in the safety world of the server side. According to the container isolation enhancement system based on the ARM TrustZone, an existing application program safely runs on a malicious operation system which is completely controlled by an attacker so that different applications of different users in the container can perform safe communication and synchronous control flow; and the users do not need to make any modification on an existing mirror image.
Owner:SHANGHAI JIAO TONG UNIV

Image input system

This invention provides an image input system capable of setting an arbitrary imaging inhibited area. This system displays a map showing the positions of cameras arranged in an office and the directions in which these cameras can be aimed, or displays the view angles of the cameras. An operator designates an imaging inhibited area on the map. In accordance with the designated imaging inhibited area, a limiting direction is calculated for each camera, and each camera is so controlled as not to point in that direction. Even when cameras are fixed, the system controls display so that an imaging inhibited area is not displayed.
Owner:CANON KK

Secret data management device and secret data management method as well as mobile terminal

The invention discloses a secret data management device and a secret data management method as well as a mobile terminal. The secret data management device comprises a storage card, a data interaction protocol module and a secret mode management module, wherein the storage card comprises a secret storage region for storing secret data and an ordinary storage region for storing ordinary data; the secret mode management module is used for displaying a secret mode inlet interface and judging whether codes input into the secret mode inlet interface are matched with the preset secret codes or not, if the input codes are matched with the preset secret codes, the secret mode management module enters a secret mode, and the secret data of the secret storage region is displayed; and the data interaction protocol module comprises a specific data interaction protocol unit and a standard data interaction protocol unit, the specific data interaction protocol unit is used for processing the secret data of the secret storage region in the secret mode, and the standard data interaction protocol unit is used for processing the ordinary data of the ordinary storage region in an ordinary mode.
Owner:NUBIA TECHNOLOGY CO LTD

Account number permission control method and device

The embodiment of the invention discloses an account number permission control method and device. The account number permission control method comprises the steps of determining a privilege account number accessed to a current local area network and obtaining the permission level of the privilege account number and an authentication password; sending a privilege account number identification and the corresponding authentication password to a server to perform verification, and returning a temporary token marked with expiry date through the server if the verification is passed; receiving the temporary token returned by the server and then saving the temporary token in a local memory, and broadcasting the permission level of the privilege account number and the temporary token at regular intervals, so that the temporary token is utilized to request the server to temporarily improve the permission level of the temporary token to the permission level of the privilege account number if the permission level of the currently logined account number is lower than that of the privilege account number after a user terminal receives a broadcasting message. By means of the account number permission control method and device, the privacy of a user is protected, and safety and convenience are improved.
Owner:BEIJING QIYI CENTURY SCI & TECH CO LTD

Application access control method and device

The embodiment of the invention provides an application access control method and an application access control device. The method comprises the steps of when a system service receives an application access request of any application, calling a pre-registered private service in a system service list; when the application where the private service is located is the non-private application, controlling an access interface, used for accessing the application, in the system service to shield the private application, wherein the private application is the application, requested by a user to be hidden according to a hiding request of the user, determined by the private service; and feeding the non-private application not including the private application back to the application according to the application access request. According to the method provided by the embodiment of the invention, the non-private application cannot access the private application in any case, thus the user privacy is effectively protected, and the security is improved.
Owner:BEIJING ANYUNSHIJI TECH CO LTD

Method and system for located tracking and warning of mobile terminal group

This invention is a position tracking alarm method of mobile terminal groups. A concept group is built and the parameters are given. Several mobile targets are invited to join in the group. Tracking monitoring service is started to inquire the background information and current position of the tracked target. Then result is got after computing according to the local position information and alarm toggle condition to judge whether to alarm. Emergency processing mechanism is started when alarm toggle condition is sufficient. If it doesní»t meet the alarm condition, then next tracking or finishing service is processed after a certain time. Multimedia and text mode are used to transmit information and emergency mechanism between members in the group. Software of position tracking alarm system of mobile terminal groups includes core business software package of position tracking alarm system, multimedia data base and mobile terminal adaptive software package. Hardware includes application server, wireless network, position server, database server and mobile terminal. Business software package is set in application server to get position information to compute from position server through application server, and send multimedia transfer instruction and text information through application server. Position server gets position information of the mobile terminal through wireless core network, and then sends the information to tracking alarm system.
Owner:吴坚

Projection processing method and apparatus, and terminal

The invention discloses a projection processing method. The method comprises the following steps: detecting a projection instruction of projecting a screen of a terminal to a display device for display; judging whether a running application of the terminal comprises a preset refusal projection content according to the projection instruction; and when the judgment result is yes, projecting the screen of the terminal to the display device for display after filtering the running application belonging to the preset refusal projection content in the terminal. The invention further discloses a projection processing apparatus and a terminal. The problem of user privacy leakage after the screen of the terminal is projected to the display device for display in the prior art is solved, and the user privacy contents are projected to the display device after being filtered so as to effectively improve the user privacy and enhance the user experience.
Owner:NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products