Data theft prevention method and related product

    公开(公告)号:US12164605B2

    公开(公告)日:2024-12-10

    申请号:US17698619

    申请日:2022-03-18

    Abstract: In a data theft prevention method, a data processing apparatus obtains target data, inputs the target data into a recognition model for recognition processing to obtain a first label, where the first label is a label to which the target data belongs. The recognition processing includes: performing, by the recognition model, feature extraction on the target data to obtain a first feature vector; and obtaining, by the recognition model, the first label through prediction based on the first feature vector; and outputs a target label when determining that a second feature vector exists. The second feature vector is a feature vector whose distance from the first feature vector is less than a first threshold. A second label obtained through prediction by using the recognition model is different from the first label and the target label is a label obtained by performing perturbation processing on the first label.

    Identity authentication method and system, server, and terminal

    公开(公告)号:US11165767B2

    公开(公告)日:2021-11-02

    申请号:US16588400

    申请日:2019-09-30

    Abstract: An identity authentication method is described. The method includes, when receiving a group joining request that is sent by a first terminal and that is used for joining a trusted group, generating, by a server, a first certificate for the first terminal based on a first version number, and sending them to the first terminal. The method further includes, when determining that a second terminal is removed from the trusted group, updating the first version number to a second version number; and separately generating, by the server based on the second version number, a corresponding second certificate for a terminal not removed from the trusted group; and separately sending the corresponding second certificate and the second version number to the terminal not removed from the trusted group. In this way, during authentication, a terminal may compare a version number of the other party to perform identity authentication, thereby improving authentication efficiency.

Patent Agency Ranking