Patent classifications
G04F7/04
Methods, media, apparatuses and computing devices of user data authorization based on blockchain
A method of user data authorization based on blockchain includes: storing, by a first application client, encrypted user data of user data in a blockchain database through a blockchain node, generating authorization information in response to a request of acquiring the user data by a second application client, and notifying the second application client to obtain the authorization information such that the second application client obtains the user data based on the encrypted user data and the authorization information. The encrypted user data is stored in the blockchain database such that the encrypted user data cannot be tampered with and a leak of real user data is prevented. The second application client obtains the user data based on the authorization information and the encrypted user data.
Method and system for fast access to advanced visualization of medical scans using a dedicated web portal
A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized databases employs a transmitter for securely sending volume visualization dataset from a remote location to the centralized database, more than one central data storage medium containing the volume visualization dataset, and a plurality of servers in communication with the centralized databases to create virtual views based on client requests. A resource manager load balances the servers, a security device controls communications between the client device and server and the resource manager and central storage medium. Physically secured sites house the components. A web application accepts at the remote location user requests for a virtual view of the volume visualization dataset, transmits the request to the servers, receives the resulting virtual view from the servers, and displays the resulting virtual view to the remote user.
User control over WIFI network access
A wireless communication device controls access to a geographically-distributed Wireless Fidelity (WiFi) network. The wireless communication device graphically presents WiFi network data to receive user selections of multiple WiFi access systems, a network name, and a user password. The wireless communication device receives configuration data that associates broadcast identification signals for the WiFi access systems with the network name. The wireless communication device detects a broadcast identification signal for one of the WiFi access systems and responsively presents the network name and a password prompt to receive the user password. The wireless communication device transfers the network name and the user password to the WiFi access system, and in response, the wireless communication device exchanges user data over the WiFi access system.
Security for wireless broadcasts
Methods and systems are provided for concealing identifying data that may be used to identify a beacon or device in broadcasts unless an observer device is able to directly or indirectly, via an authorized resolver device, translate an encrypted broadcast into the identifiable information. The wireless security scheme disclosed herein also pertains to resolving the concealed data messages to obtain the identifiable information.
Circumferential magnetic device covers and methods of manufacture
A decorative magnetic cover is provided. The cover includes a plurality of octagonal and triangular openings, allowing the cover to securely attach to a rounded item without kinking or otherwise unsightly attachment. The cover includes a magnetic sheet having a magnetic face and nonmagnetic face, and a decorative element attached to the nonmagnetic face. The cover is manufactured by scoring the nonmagnetic face of the magnetic sheet and applying the decorative element to the nonmagnetic face. The resulting magnetic element is the cut to form the octagonal and triangular openings.