Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

4510results about "Encryption apparatus with shift registers/memories" patented technology

Method, system and computer program for protecting user credentials against security attacks

A method, system and computer program is provided for protecting against one or more security attacks from third parties directed at obtaining user credentials on an unauthorized basis, as between a client computer associated with a user and a server computer is provided. The server computer defines a trusted Public Key Cryptography utility for use on the client computer. The Public Key Cryptography utility is operable to perform one or more cryptographic operations consisting of encrypting/decrypting data, authenticating data, and/or authenticating a sender, decrypting and/or verifying data. The user authenticates to the Public Key Cryptography utility, thereby invoking the accessing of user credentials associated with the user, as defined by the server computer. The Public Key Cryptography Utility facilitates the communication of the user credentials to the server computer, whether directly or indirectly via an authentication agent, the server computer thereby authenticating the user. In response, the server computer providing access to one or more system resources linked to the server computer to the user. The present invention also provides a series of methods enabling the server computer to authenticate the user by operation of the Public Key Cryptography utility and/or based on enrolment of the user and providing the Public Key Cryptography utility to the user.
Owner:ECHOWORX CORP

Disaster recovery cloud storage system construction method based on block chain technology

The invention discloses a disaster recovery cloud storage system construction method based on a block chain technology. The block chain technology is introduced in a cloud storage system construction process. The characteristics of decentration and de-trust of the block chain technology are used to realize the distribution autonomy of storage nodes in a cloud storage system and data exchange and data sharing between the storage nodes based on a consensus algorithm. Compared with the current mainstream centralized cloud service system, the method has the advantages that network nodes can establish many-to-many rather than one-to-many contact relationship, which can greatly improve the transmission efficiency of data; and in the processes of data storage, exchange, upload and download, data block packaging and anonymous exchange and an asymmetric encryption algorithm are used, which greatly guarantees the safety and reliability of the entire ecological chain of data cloud storage. Compared with the current mainstream centralized cloud service system, the method provided by the invention has the advantages that on the basis of improved data safety, the operation efficiency of the system is greatly improved, and the operating cost of a cloud storage service is reduced.
Owner:HANGZHOU YUNXIANG NETWORK TECH

Device networking authentication method based on blockchain

The invention discloses a device networking authentication method based on a blockchain for solving the single point failure problem existing in the current networking authentication method. The technical scheme is to deploy a blockchain network comprising a client, a submission node and a consensus node. By means of the non-tampering property of the blockchain, a device firstly registers on the blockchain before accessing the network, when the device A needs to access the network, the device sends a networking request of a device B that has accessed to the network, the device B compares the information of the device A in the networking request with the information of the device A stored in the blockchain to judge whether the identity of the device A is legal, a smart contract issues a token to the device A, a timestamp in the token ensures that the device A is valid within a certain period of time, and after the token expires, the device A needs to pass the identity authentication toaccess the network again. By adoption of the device networking authentication method disclosed by the invention, the single point failure problem existing in the traditional networking authenticationmethod can be avoided, the legality of the identity of the device is ensured, and the security of the network is improved.
Owner:NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products