Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

36 results about "Internet privacy" patented technology

Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing.

Authentication system and method

InactiveUS20090193264A1Digital data authenticationCoded identity card or credit card actuationAuthentication systemStrong authentication
A strong authentication method and system using a Secure ICC component coupled with a Personal device, and relying on the existing cryptographic protocols and keys for managing the secure ICC to generate One-Time-Passwords when the necessary authentication keys or cryptographic protocols are not already present in the Secure ICC configuration for that purpose.
Owner:ACTIVIDENTITY

Secure Computer System and Method

InactiveUS20090165139A1Desired secure computing propertiesDigital data processing detailsAnalogue secracy/subscription systemsMagnetic disksInternet privacy
An apparatus is configured to perform secure processing of confidential information. The apparatus comprises a secure disk configured to store confidential information arranged inside a lockable container; a processor configured to process the confidential information arranged inside the lockable container; an insecure network arranged outside the lockable container; and means for connecting the processor only to the secure disk or alternatively to the insecure network at any one time, but not to both the secure disk and the insecure network at the same time.
Owner:MITSUBISHI ELECTRIC RES LAB INC

Register and login system and method for biological characteristic distributed identity authentication

A register and login system for biological characteristic distributed identity authentication comprises a server side connected with the Internet, a plurality of user terminals, an access control sub-system mounted on the server side, and register and login subsystems mounted on the user terminals and linked with server side data via the Internet; according to the register and login subsystems, collected user biological characteristics are saved in the user terminals in a scattered manner, and a user fulfils identity authentication on each user terminal. The register and login subsystems and the access control sub-system create a unique user identification correspondingly bound with a user biological characteristic; the user biological characteristic is stored in a user terminal and the server side respectively; user identification and requests are automatically uploaded to the server side; and various tasks are controlled to be executed or terminated according to results of identity authentication; the access control sub-system configures a user account according to a bound user identification, saves the user account in the server side, and controls accessing of a user terminal to the server side according to the result of user identification authentication. The register and login system is convenient and fast to operate, and high in privacy security and economic efficiency.
Owner:掌握科技无锡有限公司

Information encryption, decryption and control method and device and electronic equipment

InactiveCN112260832AImplement the encryption functionImplement the decryption functionKey distribution for secure communicationTelevision conference systemsStationInternet privacy
The invention discloses an information encryption, decryption and control method and device and electronic equipment. The method comprises the steps of: enabling an initiator to obtain a secret key IDwhich is sent by a server and used for identifying a communication service and a secret key corresponding to the secret key ID at a terminal; decrypting a session key for encrypting and decrypting the communication service according to the key; and encrypting the communication service according to the session key so as to realize an encryption function on the communication service; enabling the participant to obtain a secret key ID sent by the initiator at the terminal; obtaining a secret key corresponding to the secret key ID from a server according to the secret key ID; decrypting a group session key used for decrypting the communication service according to the key so as to realize a function of decrypting the communication service; and enabling the server to generate the same secret key at different secret key management service sites, so that the same secret key can be obtained when a plurality of nodes communicate at the same time, and each terminal can perform encryption communication service conveniently.
Owner:南京易科腾信息技术有限公司

Private data protection method and system in mobile internet

InactiveCN113271312ATransmissionInternet privacyData messages
The invention provides a privacy data protection method and system in a mobile internet, and the method comprises the steps: obtaining a to-be-protected privacy data information set and a plurality of privacy data protection strategies, and obtaining the distribution of target data types in which the types of the privacy data protection strategies have a mapping relation with the to-be-protected privacy data information set; then determining a corresponding strategy application rule according to a real-time privacy level attribute of a privacy data information set to be protected, and determining that each privacy data protection strategy is respectively matched with a target strategy application rule of each mobile internet scene according to the real-time privacy level attribute; and finally, according to each privacy data protection strategy, matching a strategy application rule of each mobile internet scene and matching a target strategy application rule of each mobile internet scene, and determining a corresponding protection strategy configuration table item. Therefore, privacy data protection is carried out on each privacy data in the privacy data information set according to the protection strategy configuration table item.
Owner:苏州远略知识产权运营有限公司

CSRF attack protection method and device

The present invention provides a CSRF attack protection method and device. The background server generates the token under the condition that the user request does not carry the token and writes the generated token into the browser cookie and the page request, and the token does not need to be stored in the background server, so that the pressure of the background server is reduced. When the user sends the user request again, the front-end preset script is triggered to run to write the token in the browser cookie and the page request into the user request, the background server realizes CSRF verification by judging whether the cookie in the user request is the same as the token in the parameter or not due to the fact that the browser cookie cannot be captured by a third party, the verification logic for binding the token with the user does not need to be added, and therefore, the CSRF attack problem can be simply and effectively solved.
Owner:HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD

Fund payment approval method and equipment based on enterprise cloud authentication and medium

The invention provides a fund payment examination and approval method based on enterprise cloud authentication. The method comprises the steps of forwarding an application for opening a cloud authentication request, receiving a first digital certificate component, forwarding the first digital certificate component, pushing an examination and approval message, forwarding a current cloud authentication digital certificate password, obtaining a second electronic signature, and obtaining a first electronic signature and verifying the electronic signature. According to the fund payment examination and approval method based on the enterprise cloud authentication, when the examination and approval party of the enterprise customer examines and approves the to-be-examined and approved transfer transaction information sent by the handler, a USB key does not need to be inserted, and the examination and approval can be carried out in a cloud authentication mode of directly inputting the current cloud authentication digital certificate password, so the problems that a USB key is not convenient to carry and the USB key is damaged and the like are solved, and the convenience of handling mobile finance is improved; in the aspect of safety, a scattered digital certificate storage scheme is adopted, a cloud authentication digital certificate password is used for access protection, and the safety is higher compared with file certificate storage.
Owner:GUANGDONG HUAXING BANK CO LTD

Private communication service in a public cloud environment

ActiveUS20220141195A1TransmissionPrivate communicationInternet privacy
A private communication set-up service enables scalable private connectivity between producers and consumers residing within a public cloud environment. A producer exposes metadata information about a new or updated resource within the public cloud environment using a tag. The system monitors the public cloud environment for tagged metadata about new resources and configures a producer-side service to a private link. Subsequently, the system exposes metadata information about the private link. The system monitors for tagged metadata about private links and configures the consumer-side private link endpoint to the private link. The producer and the consumer communicate using the configured private link.
Owner:SALESFORCE COM INC

Method, system and device for enhancing security of storage media and medium

The invention discloses a method, system and device for enhancing security of storage media and a medium, and relates to the field of data security; the method includes determining the number A of participating users, and wherein each participating user generates a corresponding key; deploying a multi-signature smart contract, obtaining a secure private key string corresponding to the private key of each participating user under the multi-signature smart contract, and signing each secure private key string to obtain a key set; sending the key set to a storage medium, and encrypting according to a multi-threshold encryption method to obtain encrypted data; according to the multi-signature smart contract, obtaining a decryption private key string corresponding to a private key of a decryption user, and signing each decryption private key string according to the multi-signature smart contract to obtain solution densification; sending the solution density to a storage medium to obtain decrypted data; and comparing the decrypted data with the encrypted data to judge whether decryption succeeds or not. According to the invention, the problem that the keys are difficult to manage due to too many keys in a large-scale network environment can be effectively solved.
Owner:湖北央中巨石信息技术有限公司

Method and system for solving potential safety hazards of rights and interests of DPOS consensus nodes

ActiveCN111586068AAvoid interestAvoid lostFinancePayment protocolsComputer networkInternet privacy
The invention relates to the technical field of DPOS consensus node rights and interests security, and provides a method and system for solving potential safety hazards of rights and interests of DPOSconsensus nodes, the method comprises the following steps: receiving a request for modifying a node address sent by an account address, the request comprising a newly deployed update node address; verifying the signature of the account address, searching out a node address mapped with the account address in a node mapping table according to the account address after the signature verification ispassed, and replacing the node address with the updated node address, wherein the node mapping table is a corresponding relation between the node address and the account address preset in DPOS consensus; and by the DPOS consensus, selecting an out-block node, and when the account address is selected by the DPOS consensus, outputting blocks through the replaced node address. The problems that the private key of the node participating in the consensus is easily stolen, and the security of the node participating in the consensus, the obtained pledge rights and interests and the security of the block rewards are all in an internal state or in a state of not fortifying related participants are solved.
Owner:上海简苏网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products