Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

59results about How to "Achieve legitimacy" patented technology

Construction method of division protocol based on cryptology in distributed computation

The invention discloses a construction method of a division protocol based on cryptology in distributed computation, belonging to the field of information safety. The formation method is characterized in that (1) each member who participates in the computation dependently selects a random number and sends the shared value of the random number to all parties for local hybrid operation so as to obtain a public random shared value; (2) each member randomizes the sharing of an input secret value b by using the public random shared value and reconstructs the randomizing value of the secret value btogether; (3) each member inspects whether a randomizing result of the secret value b is inverse or not, if so, the member solves an inverse element of the randomizing value of the secret value b andthen de-randomizes the inverse element to obtain the inverse sharing of the secret value b by utilizing the public random shared value; (4) each member utilizes the obtained inverse sharing of the secret value b and a sharing executive multiplication protocol of a secret value a to obtain the sharing of the a/b; and (5) each member reconstructs a real computing result by mutually exchanging the obtained sharing of the a/b. The invention has the characteristics of high efficiency, fault tolerance and safety.
Owner:PEKING UNIV

Door lock communication verifying method and device, a terminal and a computer readable storage medium

The invention belongs to the technical field of door lock information security and particularly relates to a door lock communication verifying method and device, a terminal and a computer readable storage medium. The verifying method includes the following steps: a device end sends a connection request carrying first authentication data to a server end, the device end receives second authentication data sent by the server end according to the connection request, first signature data is generated and sent to the server end, the server end confirms the legality of the device end according to thefirst authentication data and the second authentication data, the device end sends third authentication data to the server end, the device end receives the second signature data which is generated bythe server end after the third authentication data is signed by the server end to confirm the legality of the server, two-way security encryption authentication is established between the device endand the server end of a door lock, only when the two-way security encryption authentication between the device end and the server end is successful can communication between the device end and the server end be established, and network data security of the door lock can be effectively guaranteed.
Owner:深圳中泰智丰物联网科技有限公司

Electronic license plate, inspection gateway and information monitoring system

InactiveCN103778586ACheck legalityMonitoring implementationData processing applicationsSensing record carriersEngineeringInformation monitoring
The invention discloses an electronic license plate, an inspection gateway and an information monitoring system. The electronic license plate comprises a memorizer, a receiving port, an awakening circuit, a sending port, a first power supply circuit and a second power supply circuit, wherein the memorizer stores information to be monitored, the distance between the receiving port and the inspection gateway is set within the setting range, the receiving port receives the awakening broadcast transmitted by the inspection gateway and transmits the broadcast to the awakening circuit, and the first power supply circuit is connected with the receiving port and the awakening circuit and provides power for the receiving port and the awakening circuit. After receiving the awakening broadcast, the awakening circuit is communicated with the second power supply circuit and transmits the information to be monitored to the sending port. After the second power supply circuit conducts power supply, the sending port transmits the received information to be monitored to the inspection gateway. According to the electronic license plate, the inspection gateway and the information monitoring system, when the distance between the inspection gateway and the electronic license plate is within the set range, the electronic license plate can receive the awakening broadcast and transmits the information to be monitored, otherwise, the electronic license plate enters in the dormant state, the consumption of the electric quantity is reduced, and the service life is prolonged.
Owner:ZHEJIANG TENDENCY TECH

Container application authentication method and system, computing device and readable storage medium

The invention discloses a container application authentication method, which is suitable for being executed in a container application authentication system. The container application authentication system comprises an authentication server and a container application system, the container application system comprises a plurality of container application clients, a container application server and an authentication client, and the method comprises the following steps: starting the container application clients, generating a first authentication message at the container application client; authenticating the first authentication message through the container application server; if the first authentication message passes the authentication, determining that the container application client is successfully started; the authentication client obtaining the activation sequence code input by the user and authenticating the activation sequence code through the authentication server; if the activation sequence code passes the authentication, the authentication server sending authorization information to the authentication client; and the authentication client activating the container application client according to the authorization information. The invention also discloses a corresponding system, a computing device and a readable storage medium.
Owner:武汉深之度科技有限公司

Construction method of division protocol based on cryptology in distributed computation

The invention discloses a construction method of a division protocol based on cryptology in distributed computation, belonging to the field of information safety. The formation method is characterized in that (1) each member who participates in the computation dependently selects a random number and sends the shared value of the random number to all parties for local hybrid operation so as to obtain a public random shared value; (2) each member randomizes the sharing of an input secret value b by using the public random shared value and reconstructs the randomizing value of the secret value btogether; (3) each member inspects whether a randomizing result of the secret value b is inverse or not, if so, the member solves an inverse element of the randomizing value of the secret value b andthen de-randomizes the inverse element to obtain the inverse sharing of the secret value b by utilizing the public random shared value; (4) each member utilizes the obtained inverse sharing of the secret value b and a sharing executive multiplication protocol of a secret value a to obtain the sharing of the a / b; and (5) each member reconstructs a real computing result by mutually exchanging the obtained sharing of the a / b. The invention has the characteristics of high efficiency, fault tolerance and safety.
Owner:PEKING UNIV

Electronic evidence storage and collection system and method based on block chain

The invention discloses an electronic evidence storage and collection system and method based on a block chain. The system comprises an evidence storage module and an evidence collection module. The evidence storage module comprises a first user login module, an identity verification module, an evidence uploading module, an on-chain storage module and an off-chain storage module; the evidence obtaining module comprises a second user login module, an authority authentication module, an automatic evidence obtaining module and a screen recording evidence obtaining module. Various evidences are uploaded through the evidence storage module, and the main body part of the file is stored in the distributed file system under the chain through the on-chain storage module and the off-chain storage module, so that the block chain storage pressure is relieved, and the storage efficiency of the system is improved. According to the method, evidence obtaining operation is performed through the evidence obtaining module, illegal users are filtered through the authority authentication module, automatic downloading and storage of evidences are realized through automatic evidence obtaining and screen recording evidence obtaining, screen recording recording is performed on the whole evidence obtaining process, and the whole recording process is uploaded to the block chain, so that legality and security of the whole electronic evidence obtaining process are realized.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products