Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

219 results about "Pseudonymization" patented technology

Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced by one or more artificial identifiers, or pseudonyms.

System for verification of pseudonymous credentials for digital identities with managed access to personal data on trust networks

The invention advantageously provides a system for the verification a user's identity and qualifications and authentication of credentials associated with a user's digital identity on a trust network (where service providers involved in a transaction may be independent parties operating with limited trust), in which a pseudonymized transaction record may be created for that digital identity and stored in a shared ledger; identifying information for a user may be retained in a custodial escrow account for that user; and transactions may be re-correlated with identifying information for authorized third parties under established “due process” rules that are appropriate for the applicable jurisdiction(s).
Owner:INFONETWORKS LLC

Position privacy protection method based on dynamic pseudonyms

The invention discloses a position privacy protection method based on dynamic pseudonyms. The position privacy protection method mainly overcomes the defect that the position privacy protection degree in an existing position pseudonym method based on position services is too low. The position privacy protection method comprises the steps that a communication system composed of users, a credible mechanism and a service provider is built; the system is initialized through the credible mechanism; the users sign in the credible mechanism on line to obtain public and private keys; the credible mechanism updates the pseudonyms and pseudonym certificates of the users regularly; the users use the dynamic pseudonyms to request position services from the service provider; the service provider provides service data for legal users and requests the credible mechanism to revoke malicious users; the legal users obtain the position service data. According to the position privacy protection method, identity anonymity is achieved by using the dynamic pseudonyms, the relation between identity information and spatiotemporal information is cut off, and therefore it is difficult for the service provider to speculate position information of the specific users by means of side information, position privacy of the users is protected effectively, and the position privacy protection method can be used for position privacy protection based on the position services in social networking services.
Owner:XIDIAN UNIV

Mobile user identification code IMSI protection method based on pseudonym

ActiveCN101959183ASeamlessly compatibleInvariant communication protocolSecurity arrangementNetwork data managementCommunications securityAuthentication
The invention discloses an IMSI protection method based on pseudonym, belonging to the field of communication safety. The method comprises: in an initial network accessing stage for a user, the user sends IMSI to HLR for authentication; after authentication, a pseudonym is generated for the user and is recorded into a database; then, according to the user pseudonym, HLR generates an authentication vector and authenticates the user by VLR; finally HLR sends a user pseudonym field in the user pseudonym to the user; and the user reconstructs and records the user pseudonym. In a secondary networkaccessing stage for the user, the user sends the user pseudonym to the HLR for authentication; if a database does not have the user pseudonym, authentication is reported to fail, otherwise, HLR generates a new user pseudonym and updates the database; then, the user is authenticated like initial network accessing; finally, HLR sends the user pseudonym field in the user pseudonym which is newly generated to the user; and the user reconstructs and records the user pseudonym. The method greatly improves the safety of IMSI, and the system is convenient to update.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Method, system and device for protecting privacy of customer terminal

The invention discloses a method for protecting user terminal comprising following step: network side successfully accesses to network at user terminal and assigns a false name to the user terminal; the network side receives the user terminal using the false name as information for marking user identity. The invention also discloses a method for protecting user terminal privacy comprising following steps: when the user terminal successfully access at user terminal, the user terminal receives temporary identity mark sent by network side and retention period of the identity mark; the user terminal receives request for reporting permanent identity mark sent by the network side; the user terminal judges if reporting response to permanent identity mark. The invention also discloses a system and device for protecting privacy of user terminal. The invention can effectively avoids attacker to take advantage of identity request information for acquiring permanent identity mark of user terminal, thereby protects privacy of user terminal.
Owner:HUAWEI TECH CO LTD

Efficient condition privacy protection and security authentication method in internet of vehicles

The invention discloses an efficient condition privacy protection and security authentication method in an internet of vehicles. The efficient condition privacy protection and security authentication method comprises the following steps of: system initialization, generation of pseudonym identities and signature private keys of vehicles, signing and authentication of a message and tracing of real identities of the vehicles. The vehicles carry out cooperative communication with surrounding vehicles and roadside units deployed at both sides of a road by on-board units assembled on the vehicles, driving security of the vehicles can be effectively improved, and vehicle users can more conveniently and rapidly acquire related traffic services. The efficient condition privacy protection and security authentication method disclosed by the invention not only can meet security requirements in the internet of vehicles, but also optimizes the computing process of signature generation and verification in the communication. The efficient condition privacy protection and security authentication method is greatly improved on the aspect of efficiency of computing cost, communication cost and the like, and is more applicable to communication and application in the internet of vehicles.
Owner:ANHUI UNIVERSITY

Method for protecting position privacy by mobile terminals

The invention discloses a method for protecting position privacy by mobile terminals. According to the method, the mobile terminals are used for forecasting moving tracks of terminal owners in a period and refining and amending the moving tracks according to a local map. For the terminal owners which are close to each other, each mobile terminal takes a position where the owner of the mobile terminal exists as a start point, and positions forecast by the other owners are taken as terminal points. A map navigation service is utilized to generate a fake route, the fake route is mixed with a true route, and the fake route and the true route are combined to generate complete two branch route pictures. Each terminal owner performs fake name replacement at end points of the complete two branch pictures, the owners can be mutually indistinguishable, and therefore privacy protection is achieved. According to the method for protecting the position privacy by the terminal mobile, the position privacy of the mobile users is protected, meanwhile, reduction of precision in issuing position information is not needed, and therefore the functionality for accessing the LBS service by mobile users based on the position information is ensured.
Owner:NANJING UNIV

Method and system for protecting location service privacy based on grid density

ActiveCN104618896AReduce risk of leakageAchieve controllable and adjustable privacy protectionLocation information based serviceSecurity arrangementGrid densityPrivacy protection
The invention discloses method and system for protecting location service privacy based on grid density. The method comprises the steps of receiving a location query request of a user through a privacy protection server; creating and maintaining a user state table and a block information table based on a grid density model through the privacy protection server; finding out k adjacent cell covering the user as a location fuzzy area by the grid-based minimum inclusion region; assigning a pseudonym to the query request of the user; exchanging the pseudonyms of adjacent high-risk users according to the trajectory privacy measurement; transmitting the query request to a location service supplier server; filtering and returning the obtained query result to the query user.
Owner:SHANGHAI JIAO TONG UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products