Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

38 results about "Data anonymity" patented technology

Anonymity. Anonymity in psychological research means that the data collected from participants is confidential and cannot be traced to any particular individual. This is typically done by assigning numbers to research participants and not asking for specific identifying information like name or address.

Privacy-safe targeted advertising method and system

A method and system for sophisticated consumer deep profile building provided as a service in a certifiably clean, i.e., privacy-safe, manner to advertisers, ad networks, publishers, aggregators and service providers. In an embodiment, an entity provides a tracking and targeting service that acts as a container for sensitive consumer information. The entity preferably implements a stringent policy of transparency and disclosure, deploys sophisticated security and data anonymization technologies, and it offers a simple, centralized consumer service for privacy disclosure, review and deletion of collected profile information, opt-in, opt-out, and the like. In exchange, advertisers, ad networks, publishers, aggregators and service providers (including, without limitation, mobile operators, multiple service providers (MSPs), Internet service providers (ISPs), and the like), receive privacy-safe targeting services without ever having to touch sensitive information.
Owner:SIMEONOV SIMEON S

User data anonymous sharing method based on league chain encryption

The invention discloses a user data anonymous sharing method based on league chain encryption. The method comprises the steps as follows: each founding member mechanism builds a respectively corresponding network data collection node and accesses a league chain network, to form an initial chain; a common member mechanism builds the network data collection node after passing through verification, and sequentially accesses the initial chain to build a league chain; the network data collection node acquires a pseudonym identity and symmetric keys corresponding to the pseudonym identity; after acquiring data, the network data collection node sends an uploading request to a network data storage node; the final encrypted data is decrypted via the private key pair of the network data storage nodeto acquire pseudonym encryption data; the network data storage node stores a corresponding relationship between the pseudonym encryption data and the pseudonym identity into a local database; and thenetwork data storage node compresses the data stored within set time into a block, and adds the block into the league chain. Through building the league chain, the permissions of the common member mechanisms are effectively controlled, and the privacy of each member mechanism is ensured.
Owner:深圳崀途科技有限公司

Triangulation for k-anonymity in location trajectory data

An apparatus for providing anonymity in geographic data for probe devices in a geographic region for a location-based service includes at least a database and a triangulation calculator. The database is configured to store trajectory data based on sequences of sensor measurements of the probe devices. The triangulation calculator is configured to calculate triangles from the trajectory data. Each of the triangles is defined by vertices. The triangulation calculator is configured to calculate a similarity score for the vertices based on trajectory data associated with adjacent vertices. At least one vertex is modified in response to the similarity score.
Owner:HERE GLOBAL BV

Block chain technology-based secure Internet of Vehicles social network construction method

The invention discloses a block chain technology-based secure Internet of Vehicles social network construction method. The whole network comprises a main controller, a road side unit and a local controller (vehicle-mounted miner) three-level architecture, the characteristics of programmability, virtualization and zoning of the network are enhanced by using a software definition means, but the vulnerability of a network single-point fault can be caused. According to the invention, with the assistance of the blockchain technology, transaction authentication is realized and data anonymity is realized in a completely distributed manner by a trust degree algorithm-based system consensus mechanism design and a reliable miner selection method, so that the security of the system is ensured.
Owner:HANGZHOU YUNXIANG NETWORK TECH

Personalized medical image management system

The invention discloses a personalized medical image management system. The system comprises a data receiving module, a data storage module, a data anonymity module, an authority control module, a keyimage storage module, and a key image viewing module; the data receiving module is used for receiving a DICOM image file corresponding to primary image examination and associating the DICOM image file with an item to which the DICOM image file belongs; the data storage module is used for importing and storing the DICOM image file; the data anonymity module is used for anonymously processing the patient name, the patient number, the gender, the birth date and the hospital name in the DICOM image file; the authority control module is used for an administrator to set a specific film reader of the item, specific authority of each film reader, a specific quality inspector and specific authority of the specific quality inspector; the key image storage module is used for storing key image information formed after the DICOM format image is marked, measured and processed by the film reader, and the key image information comprises a key image, marking time and a marker; and the key image viewing module is used for viewing the stored key image information by the film reader and the quality inspector according to the corresponding authority.
Owner:杭州英放生物科技有限公司

Data processing method and device for realizing privacy protection

The embodiment of the invention provides a data processing method for realizing privacy protection, and the method comprises the steps: obtaining to-be-processed sensor data, a corresponding identitytype label and a service label, wherein the service label corresponds to a service prediction task for a user; then, inputting the sensor data into a data anonymity model to obtain anonymity data; furthermore, on one hand, inputting the anonymous data into a pre-trained user identity recognition model to obtain an identity prediction result, wherein the identity prediction result is used for determining identity prediction loss in combination with an identity category label; on the other hand, inputting the anonymous data into a pre-trained service prediction model to obtain a service prediction result, wherein the service prediction result is used for determining service prediction loss in combination with the service label; then, training the data anonymity model by utilizing the comprehensive loss; wherein the comprehensive loss is negatively correlated with the identity prediction loss and positively correlated with the service prediction loss; wherein the trained data anonymity model is used for carrying out anonymity processing on the target sensor data.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

Privacy protection method for data integration of DaaS application

PendingCN110866277APrevent leakageBalanced Value Domain Balanced DistributionDigital data protectionData setPrivacy protection
The invention discloses a privacy protection method for data integration of a DaaS application, and the method comprises the following steps: 1, carrying out the multi-round cooperation among tenantsunder the condition that the anonymity of data is met, and each round employing an attribute plus a fine data set with the maximum information gain; 2, setting reputation levels of the cloud service providers, and dividing the cloud service providers according to the reputation levels; 3, for the cloud service providers with the reputation levels lower than the preset reputation level, using a privacy protection mechanism based on segmentation, hiding the incidence relation between data, ensuring value domain equilibrium distribution of attributes in a grouping equalization mode, and preventing the cloud service providers from leaking data privacy of tenants; and for the cloud service providers higher than the preset reputation level, verifying correctness and integrity of data returned bythe cloud service providers by adopting a classification index tree data structure. According to the method, through a classification index tree data structure, the cloud tenants have the capabilityof verifying the correctness and integrity of a result set returned by the cloud service provider.
Owner:INST OF ELECTRONICS & INFORMATION ENG OF UESTC IN GUANGDONG +1

Anonymous method based on sensitive hierarchical information entropy

PendingCN114580010ASolve the problem of low data availabilityIncrease information entropyDigital data protectionData setData availability
The invention relates to the technical field of data anonymity, in particular to an anonymity method based on sensitive hierarchical information entropy, which comprises the following steps: acquiring a published data set; establishing an anonymous model based on the published data set; establishing an information loss measurement standard model based on the information entropy of the published data set; traversing the published data set based on the information loss measurement standard model to obtain a maximum tuple with the maximum privacy security index, and adding the maximum tuple into a corresponding equivalent group in the anonymous model; and replacing the value of the maximum tuple with the quasi-identification attribute center of the equivalent group to obtain an anonymous data set, and processing the published data set by introducing an information loss measurement standard model established by the information entropy and an anonymous model to obtain the anonymous data with the highest information entropy, namely the highest data availability. The problem that an existing anonymous method is low in data availability after data anonymization is solved.
Owner:GUILIN UNIVERSITY OF TECHNOLOGY

Data storage apparatus and method for anonymously perceiving deduplication

A data storage device includes a memory and a controller, where the controller receives an indication of data to be anonymized. The controller also parses a data element to be stored and generates a copy of one or more data portions to be anonymized. The controller also deletes one or more data portions to be anonymized to generate modified data elements to be stored. The controller also generates a copy of the modified data element to be stored with deduplication. Accordingly, the data storage device takes into account data anonymity (i.e., anonymity-aware deduplication) during deduplication, thereby enabling efficient deduplication even in the presence of anonymous data.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products