Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

13 results about "Privacy protection" patented technology

Device and method for protecting privacy

InactiveCN103501407AEffective occlusionImprove the effect of personal privacy protectionTelevision system detailsColor television detailsTransmittancePrivacy protection
The invention provides a device and method for protecting privacy, and relates to the field of intelligent equipment. The device comprises a recognizing unit and a privacy protecting unit. The recognizing unit is used for judging whether people or cameras or shooting behaviors exist in the surroundings. The privacy protecting unit is used for reducing the light transmittance when people or the cameras or the shooting behaviors exist in the surroundings. According to the device and method for protecting the privacy, whether people or the cameras or the shooting behaviors exist in the surroundings or not is judged and whether privacy violating risks exist in the surroundings or not is judged, when the judging result shows that people or the cameras or the shooting behaviors exist in the surroundings, the privacy protecting unit is triggered to reduce the light transmittance, and a person to be protected is effectively sheltered so that the whole or part of the body of the person to be protected can be prevented from being seen or shot, and the effect of protecting the individual privacy of the person to be protected is improved.
Owner:BEIJING ZHIGU RUI TUO TECH

Track privacy protection algorithm based on angle division and position semantics

The invention provides a track privacy protection algorithm based on angle division and position semantics. The track privacy protection algorithm comprises the steps of 1, conducting initializing to generate a grid map model and randomly distributing all position types for the grid map model; 2, inputting information by a user; 3, processing the information input by the user; 4, providing a query request by the user and inputting a position coordinate of a current moment; 5, conducting angle division according to the position coordinate to generate many false position Sudoku areas; 6, selecting an appropriate false position according to current position semantics; 7, making the false positions generated at all the moments connected to generate a false track. According to the track privacy protection algorithm based on the angle division and position semantics, the position semantics and the track privacy protection algorithm are combined, the degree of popularization of positions, the sensitivity and the degree of privacy are utilized to quantify position semantic information, mathematical modeling is conducted on the position semantic information, the position semantic information is accurately described through a model, and privacy protection of a real track of the user can be achieved.
Owner:上海东华大学科技园企业管理有限公司

Method for realizing privacy protection in block chain, node and storage medium

ActiveCN110033266ADigital data protectionPayment protocolsBlockchainPrivacy protection
One or more embodiments of the present specification provide a method for realizing privacy protection in a block chain, a node and a storage medium, the method comprising: a first block chain node executes a transaction received from a client to obtain plaintext receipt data; and when determining that the transaction is a private transaction, the first block chain node encrypts the plaintext receipt data into ciphertext receipt data by using a key, and then stores the ciphertext receipt data.
Owner:ADVANCED NEW TECH CO LTD

Block chain assisted privacy protection image retrieval method

PendingCN114579787ASolve the problem of integrity verificationImprove efficiencyStill image data indexingDigital data protectionCiphertextPrivacy protection
The invention discloses a blockchain-assisted privacy protection image retrieval method, which comprises the following steps: firstly, an image owner extracts image features by using a CNN model, then encrypts an image and the features by using an SM4 algorithm and a secure kNN algorithm, and uploads a ciphertext image to a cloud server; then, the image owner calculates the hash of the ciphertext image and generates a Merkle hash tree, then an index table of encryption features is constructed by using an LSH algorithm, and the index table and the Merkle tree are uploaded to an alliance chain; and finally, the user uploads the encryption feature of the query image to the alliance chain, retrieves the IDs of the first k images similar to the image, and returns the k IDs to the cloud, the cloud sends the corresponding image to the user, and the user decrypts the image to obtain a plaintext image. The advanced block chain technology and the cryptography technology are adopted, the accuracy of the retrieval result can be guaranteed, and the integrity of the image data stored in the cloud can be verified; meanwhile, the image retrieval problem in the multi-cloud environment is solved, and the efficiency of the retrieval scheme is improved.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Privacy protection method and system for fingerprint authentication

PendingCN114880700ADigital data protectionDigital data authenticationPrivacy protectionSingular matrix
The invention provides a privacy protection method and system for fingerprint authentication, and the method comprises the steps: decomposing fingerprint data through employing singular matrix decomposition of low-rank matrix approximation, obtaining a low-rank singular value matrix, and approximately representing a fingerprint matrix; calculating an optimal rank by using an exponential mechanism; then, through truncated singular value matrix decomposition, obtaining a low-rank expression under an optimal rank of the fingerprint matrix; adding Laplace noise to each singular value of the singular value matrix to obtain a disturbance singular value matrix; performing post refinement on the disturbance singular value by using constraint reasoning, and rearranging a singular value sequence to obtain a post-processed singular value matrix; and finally, reconstructing a disturbance fingerprint according to the post-processed singular value matrix. Compared with a similar existing method, the fingerprint privacy protection method has the advantages that fingerprint privacy protection is achieved with minimum information disturbance, irreversibility, non-linkability and accurate identity authentication of fingerprints can be guaranteed more efficiently, and the method has high practicability.
Owner:HUAZHONG NORMAL UNIV

Computer privacy protection device for assisting software development

InactiveCN112487512AProtection securitySimple structureInternal/peripheral component protectionSoftware engineeringPrivacy protection
The invention relates to the technical field of basic software development, and discloses a computer privacy protection device for assisting software development, which comprises a shell, the shell isslidably connected with a restart button, the right side of the restart button is provided with a power supply button, and the bottom of the power supply button is fixedly connected with a trigger rod; a limiting groove is formed in the surface of the trigger rod, a matching groove is formed in the bottom of the trigger rod, a horizontal rod is arranged on the lower side of the power button, anda clamping groove is formed in the surface of the horizontal rod. According to the computer privacy protection device for assisting software development, through cooperative use of the restart button,the power button, the touch button, the camouflage pressing plate, the touch rod and the like, when other people start a computer by using a normal method, a display of the computer cannot normally display, so that other people cannot operate the computer, therefore, the effect of protecting the safety of data in the computer is achieved.
Owner:HANGZHOU XUZHAN ROBOT TECH CO LTD

Privacy protection-based alliance learning system and method for realizing whole genome association analysis

PendingCN113517027ARealize privacy protectionPrevent leakageBiostatisticsDigital data protectionWhole Genome Association AnalysisOriginal data
The invention discloses a privacy protection-based alliance learning system and method for realizing whole genome association analysis, and the system comprises a global server which is connected with an original data terminal and an authorization terminal, wherein the global server comprises a data preprocessing module, a main program module, and a request handle module. The main program module comprises an alliance type principal component analysis module and an alliance type generalized linear model; the method comprises the following steps: 1, authorizing a researcher, creating an alliance type whole-genome correlation analysis research instance, and submitting the alliance type whole-genome correlation analysis research instance to a global server; 2, enabling each data owner and the global server to cooperatively execute data preprocessing to obtain preprocessed data; 3, through the preprocessed data, enabling the global server to execute an alliance type principal component analysis method and then execute an alliance type generalized linear model to generate an analysis result report; 4, enabling the global server to send the final result report to the authorized researchers.
Owner:杭州锘崴信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products