-
公开(公告)号:US11687534B2
公开(公告)日:2023-06-27
申请号:US17350549
申请日:2021-06-17
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Zhiwei Shang , Zhijun Mo
IPC: G06F16/2455 , G06F21/62
CPC classification number: G06F16/2455 , G06F21/6245
Abstract: The disclosed systems and methods are directed to detecting sensitive data on a computing device. This includes matching predetermined keywords in input data, to determine data in vicinities of matched keywords in the input data in which sensitive data is likely to be found, and matching predefined patterns associated with sensitive data to the data in vicinities of matched keywords to detect sensitive data. Matching the predetermined keywords occurs prior to matching the predefined patterns, and the data in vicinities of matched keywords is substantially shorter than the input data.
-
2.
公开(公告)号:US11861923B2
公开(公告)日:2024-01-02
申请号:US17566817
申请日:2021-12-31
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Zhiwei Shang , Tongyu Ge , Zhijun Mo
IPC: G06V30/19 , H04N1/44 , G06V30/12 , G06V30/164
CPC classification number: G06V30/19093 , G06V30/12 , G06V30/164 , H04N1/448
Abstract: The present disclosure describes a method, an apparatus, and a non-transitory computer-readable medium for detecting sensitive text information such as privacy-related text information from a signal and modifying the signal by removing the detected sensitive text information therefrom. The apparatus receives the signal such as an image, a video clip, or an audio clip, and recognizes a text string therefrom. The apparatus then detects, from the text string, a substring based on a similarity between the substring and a regular expression, and modifies the signal by removing information related to the detected substring from the signal.
-
公开(公告)号:US10922441B2
公开(公告)日:2021-02-16
申请号:US15971498
申请日:2018-05-04
Applicant: Huawei Technologies Co., Ltd.
Inventor: Zhijun Mo , Jianfei Ye
Abstract: A computing device includes: a trusted execution environment with access to a memory storing a deletable root key, the memory inaccessible by a second execution environment; and at least one processor operable in the trusted execution environment, wherein when operating in the trusted execution environment, the at least one processor is configured for: based on requests from the second execution environment, performing a root key operation on an encryption key utilized by the second execution environment to secure data the second execution environment; and deleting the root key upon detection of a security event.
-
4.
公开(公告)号:US20230327864A1
公开(公告)日:2023-10-12
申请号:US17718576
申请日:2022-04-12
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Dongxu Ma , Mikhail Kazaev , Zhijun Mo
CPC classification number: H04L9/0866 , H04L9/085 , H04L9/3263
Abstract: There is described methods and devices for generating and utilizing a physical unclonable function (PUF) key. A hardware source is read to obtain a hardware output of a unique identifier of the hardware source. One of a plurality of hardware PUF methods is selected, each of the plurality of hardware PUF methods adapted to a respective hardware source type. The PUF key is generated from the hardware output using the selected hardware PUF method.
-
公开(公告)号:US11451375B2
公开(公告)日:2022-09-20
申请号:US17038998
申请日:2020-09-30
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Priya Soundararajan , Zhijun Mo , Zhiwei Shang
Abstract: The disclosed systems, and methods are directed to a method for Privacy Preserving Inference (PPI) comprising receiving a first set of matrix information from a client device, generating kc−1 matrices by operating a first CSPRNG associated with the server with kc−1 seeds, computing inferences from the set of kc matrices, generating a matrix Ss, generating ks−1 random matrices, computing a matrix Yks in accordance with the inference matrix Y, the matrix Ss and the ks−1 random matrices, transmitting a second set of matrix information to the client device, the second set of matrix information includes ks−1 seeds corresponding to the ks−1 random matrices and the matrix Yks, receiving a matrix U from the client device, and computing an inference value y from the matrix U.
-
-
-
-