会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 9. 发明申请
    • SECURE THRESHOLD DECRYPTION PROTOCOL COMPUTATION
    • 安全门限解密协议计算
    • WO2007069146A3
    • 2007-10-11
    • PCT/IB2006054646
    • 2006-12-07
    • KONINKL PHILIPS ELECTRONICS NVTUYLS PIM TSCHOENMAKERS BERRY
    • TUYLS PIM TSCHOENMAKERS BERRY
    • H04L9/30
    • H04L9/0869G06F7/588H04L9/008H04L9/3231H04L2209/24H04L2209/46H04L2209/805
    • The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the invention relates to a system for converting an encrypted data set into an encryption of individual bits representing the data set. A basic idea of the present invention is to provide a protocol in which it is possible to divide an encryption of a data set in the form of e.g. a biometric feature, such as a number x, where x e {0, 1, ..., n-1 }, into an encryption of respective bits x 0 , x 1 , ..., x t-1 forming the number x, where t is the number of bits of the number n-1, without leaking any information about x or its bits x 0 , x 1 , ..., x t-1 Hence, the present invention enables splitting of the encryption [[x]] into the respective encrypted bits [[x 0 ]], [[x 1 ]], ..., [[x t-1 ]] forming the encrypted number x=?I=1 n x i 2 i .
    • 本发明涉及一种将加密的数据集转换成对代表数据集的各个位进行加密的方法。 此外,本发明涉及一种用于将加密的数据集转换成代表数据集的各个位的加密的系统。 本发明的基本思想是提供一种协议,在该协议中可以将例如数据集的形式的数据集的加密划分成多个部分。 将诸如x的生物特征,其中xe {0,1,...,n-1}分解成相应比特x 0 ,x 1 ,...,x t-1 形成数字x,其中t是数字n-1的位数,而不泄露关于x或其位x 0的任何信息 因此,本发明使得能够将加密[[x]]分割成各自的加密比特 [[x 0 ]],[[x 1 ]],...,[[x t-1 ]] 数字x =?I = 1 x i 2 i
    • 10. 发明申请
    • SYSTEM FOR PROCESSING DATA AND METHOD THEREOF
    • 数据处理系统及其方法
    • WO2005015462A9
    • 2005-04-07
    • PCT/IB2004051399
    • 2004-08-05
    • KONINKL PHILIPS ELECTRONICS NVVERHAEGH WILHELMUS F JVAN DUIJNHOVEN AUKJE E MKORST JOHANNES H MTUYLS PIM T
    • VERHAEGH WILHELMUS F JVAN DUIJNHOVEN AUKJE E MKORST JOHANNES H MTUYLS PIM T
    • G06Q30/00G06F17/60
    • G06Q30/02G06F21/6245H04L9/008H04L9/085
    • The invention relates to a method of processing data, the method comprising steps of enabling to (210) encrypt first data for a first source, and encrypt second data for a second source, (220) provide the encrypted first and second data to a server that is precluded from decrypting the encrypted first and second data, and from revealing identities of the first and second sources to each other, (230) perform a computation on the encrypted first and second data to obtain a similarity value between the first and second data so that the first and second data is anonymous to the second and first sources respectively, the similarity value. providing an indication of a similarity between the first and second data. The method may further comprise a step (240) of using the similarity value to obtain a recommendation of a content item for the first or second source. The first or second data may comprises a user profile or user ratings of content items. One of the applications of the method may be in collaborative filtering systems.
    • 本发明涉及一种处理数据的方法,所述方法包括以下步骤:(210)为第一源加密第一数据,并为第二源加密第二数据,(220)将加密的第一和第二数据提供给服务器 (230)对加密的第一和第二数据执行计算以获得第一和第二数据之间的相似性值 使得第一和第二数据分别对第二和第一源匿名,即相似度值。 提供第一和第二数据之间的相似性的指示。 该方法可以进一步包括使用相似度值来获得第一或第二来源的内容项目的推荐的步骤(240)。 第一或第二数据可以包括用户简档或内容项目的用户评级。 该方法的应用之一可以在协同过滤系统中。