Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

62results about How to "Achieve non-repudiation" patented technology

Undeniable secure data transmission method based on block chain

The invention discloses a non-deniable secure data transmission method based on a block chain. The method comprises the following steps that: (1) a receiver generates a temporary public and private key pair and sends a public key and a block chain account address thereof to a sender; (2) uploading initialization parameters to the intelligent contract in the sending direction; (3) the sending end pays the guarantee money to the intelligent contract; (4) receiving the deposit paid to the intelligent contract; (5) the sender sends the ciphertext and the digital signature of the ciphertext hash value to the receiver; (6) after the receiver obtains the ciphertext, a ciphertext hash value is disclosed to the intelligent contract; (7) the sending direction intelligent contract publicly uses the temporary public key to encrypt the ciphertext obtained by the secret key; and (8) the receiver obtains the ciphertext in the step (7) from the block chain, decrypts the original key by using the temporary private key and publishes the key hash value to the smart contract, and the smart contract returns the guarantee money of the two parties. The method and the device can be used for effectively realizing non-repudiation of a sender and a receiver on a transmission behavior in a secure data transmission process.
Owner:SICHUAN UNIV

Unmanned aerial vehicle safety certifiable information communication processing method based on cloud platform

The invention belongs to the technical field of unmanned aerial vehicle communication, and discloses an unmanned aerial vehicle safety certifiable information communication processing method and system setting based on a cloud platform. The method includes: setting a system; extracting a part of secret keys; generating a full key; generating a ciphertext through a signcryption algorithm when a message is sent; generating a plaintext through an unsigncryption algorithm by taking the receiver identity label and the parameters thereof as input; enabling the authorization mechanism to execute a corresponding algorithm so as to check and supervise the communication content of the unmanned aerial vehicle and the ground console; and enabling different nodes to aggregate a plurality of signatureson different messages into one signature for aggregation authentication, so as to reduce the authentication overhead. According to the invention, confidentiality, authentication, non-repudiation and unforgeability are realized; public key encryption and digital signature are combined, and confidentiality and identity authentication can be achieved at the same time. The authorization mechanism provides part of the key through the secure channel, and can check the access command and the location information. The control command and the position information cannot be forged under the condition ofno other part of private keys.
Owner:XIDIAN UNIV

Secure bidirectional heterogeneous digital signature method between PKI and IBC

ActiveCN111342973AManagement issues do not existImplement digital signatureUser identity/authority verificationInternet privacyDigital signature
The invention discloses a secure bidirectional heterogeneous digital signature method between a PKI and an IBC. System parameters are generated through a private key generation center, and the systemparameters are disclosed; the user in the public key infrastructure environment and the user based on the identity encryption environment generate a public key and a private key respectively; whereinthe user in the public key infrastructure environment is a signer, the user based on the identity encryption environment is a verifier, the signer generates a signature and sends the signature to theverifier, and the verifier verifies the signature, passes the verification and accepts the message, otherwise, refuses to accept the message; wherein the user based on identity encryption is a signer,the user in the public key infrastructure environment is a verifier, the signer generates a signature and sends the signature to the verifier, and the verifier verifies the signature, passes the verification and accepts the message, otherwise, refuses to accept the message. According to the invention, the safety, correctness, non-repudiation and unforgeability of communication between the publickey infrastructure and the user based on the identity encryption environment are protected, and the safety and privacy requirements are met.
Owner:SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES

Hash calculation method and signcryption method based on homomorphic chameleon Hash function

The invention discloses a Hash calculation method and a signcryption method based on a homomorphic chameleon Hash function. According to the provided homomorphic chameleon hash function, a chameleon hash value result adopts a logarithm form, a signcryption result based on the hash in the signcryption method is also a logarithm form, so that the homomorphic property is achieved, the homomorphic aggregation can be conducted in hash calculation, hash is more efficiently calculated, and the homomorphic chameleon hash function has both the homomorphic state and the key leakage prevention characteristics. The signcryption method is realized on the basis of the homomorphic chameleon hash function, the homomorphic aggregation signcryption ensures the homomorphism, the system public parameters generated by the system initialization are used together by the chameleon hash function and the signcryption, and two password schemes share one set of system parameters, so that multiple function effectscan be realized under one set of shared system parameters, and multiple functions are supported under the same framework. Secondly, the proxy key generation and proxy re-signature steps realize the proxy re-signature, and the non-repudiation is realized through a repudiation step.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Commodity authenticity detecting method and system based on two-dimension code

The invention discloses a commodity authenticity detecting method and system based a two-dimension code. The method comprises the steps that a third party service server is used for manufacturing the commodity two-dimension code for a commodity, and meanwhile the commodity two-dimension code is signed through a platform certificate corresponding to the third party service server; an NFC safety client side is used for scanning the commodity two-dimension code, and a signature value of the commodity two-dimension code is obtained; whether the signature value obtained by the NFC safety client side is matched with the two-dimension code signature value prestored in an image copyright authentication and management server or not is judged through the image copyright authentication and management server; if the signature value obtained by the NFC safety client side is matched with the two-dimension code signature value prestored in the image copyright authentication and management server, it is judged that the commodity is an authentic product. The legal right of commodity manufacturers is protected from a data source, data credibility and safety of data through the secret key technology, the NFC technology and the two-dimension code technology.
Owner:卓望数码技术(深圳)有限公司

Data encryption processing method for performing signature verification on application program interface

A data encryption processing method for performing signature verification on an application program interface comprises the following steps: before a client of an application program sends a request to a corresponding server interface, firstly obtaining an exclusive asymmetric key through a server, thereby ensuring the security of the server accessing the client; when a client initiates an interface request to a corresponding server interface, a generated symmetric key is matched with a hash algorithm to encrypt data of a request body and generate a signature body of the request body, the server forms a signature verification body by using received request body parameters through the same encryption algorithm, and the signature body is verified through the signature and signature verification process. The anti-repudiation of the data original issuing behavior and the anti-repudiation of the data receiving behavior are realized; according to the invention, the non-repudiation of data request and transmission is realized by carrying out the encryption processing of signature verification on the data receiving and transmitting voucher; the safe and orderly use of the application program interface is enhanced, and the credibility, the safety and the traceability of the original request interface of the application program are ensured.
Owner:北京友普信息技术有限公司

LED lighting lamp identification method, LED lamp, verification device and system

The invention discloses an LED lighting lamp identification method, a lamp, a verification device and a system. The method comprises the steps that S1, signature information of the LED lighting lamp is generated; S2, the signature information is modulated and transmitted in the mode of an optical signal via the LED lighting lamp; S3, the optical signal with the signature information is received, and the optical signal is converted into an electric signal; and S4, the electric signal is demodulated, the signature information is extracted and the signature information is identified or judged. The lamp comprises a control unit, an LED driver and an LED lamp. The verification device comprises a photoelectric conversion unit, a signal demodulation unit and a digital processing unit. The system comprises the LED lighting lamp and the verification device of the LED lighting lamp. Judgment of authenticity of the lamp is realized, and characteristics that optical signal transmission is not affected by electromagnetic interference and has no penetrability are utilized so that reliability and security of signature information transmission are realized. Besides, additional cost is not increased or only a small part of cost is increased. The LED lighting lamp identification method can be widely applied to various LED lighting lamp identification systems.
Owner:SHENZHEN JIUZHOU OPTOELECTRONICS TECH

Network identity authentication system and method

The invention relates to an identity authentication system and an authentication method. The identity authentication system comprises an authentication center CA module, an authentication module, a client side and a USB Key module, wherein the authentication center CA module is responsible for the functions of application, examination and approval, issuing, updating and revocation of a certificate; the authentication module respectively carries out the generation of a digital envelope and the authentication of a digital certificate to the client side and a server side; the client side mainly realizes the management of the system and the clients; and the USB Key module mainly provides a medium for storing the digital certificate and a user private key to the user. The invention adopts a digital envelope technology, and can meet the high-confidentiality requirement of data transmission; an authentication token is used for sending a request to the authentication server by the client sidefor authentication and realizing the security of the authentication process; and the client side and the authentication server respectively carry out the generation of the digital envelope and the digital certificate, thus being capable of realizing the mutual authentication between the client side and the authentication server.
Owner:ZHEJIANG NORMAL UNIVERSITY

IoT security and data privacy protection system based on blockchain

ActiveCN108306887BImplement a unified key distribution mechanismAchieve non-repudiationTransmissionData privacy protectionThe Internet
The invention discloses a block chain-based internet of things safety and data privacy protection system. The system comprises an internet of things safety engine corresponding to internet of things equipment, and a block chain network communicated with the internet of things safety engine. The establishment of an access session channel with the internet of things equipment of an accessed party isrealized through the block chain network by the application program or the internet of things equipment of an access initiator. Meanwhile, the paid acquisition of the data usage right and the node accounting are completed through the block chain network according to data stored by the internet of things safety engine and corresponding digital right requirements. The internet of things safety engine can automatically carry out the data encryption and decryption operation and the data transaction packaging operation. According to the invention, a block chain network-based internet of things equipment unified key distribution mechanism is realized, so that the authorized use of the internet of things equipment and the establishment of a trust mechanism are effectively realized. Meanwhile, based on the block chain network, the data privacy and the data rights are protected. Therefore, the privacy protection safety of the data of the internet of things equipment is greatly improved.
Owner:徐正伟 +2

Security protection system and method based on network multimedia equipment data transmission

The invention discloses a security protection system and method based on network multimedia equipment data transmission, which belongs to the technical field of network security, and comprises a service module, a driving module and a COS module, and is characterized in that the service module provides a function module for a user to use; the driving module is used for providing bottom-layer driving and providing support for the service module; the COS module is used for providing underlying algorithm implementation; according to the security protection system based on network multimedia equipment data transmission, a certificate-based identity authentication technology, a key security distribution and management technology and an ESP tunnel security transmission technology are adopted, thepassword functions of confidentiality, integrity, authenticity, non-repudiation and the like of the network message are realized, and the purposes of interception prevention, counterfeiting prevention, replacement prevention and intrusion attack prevention of the multimedia system of the multimedia data stream are achieved by combining a network protection technology, so that the multimedia datatransmission safety and the multimedia system use safety are ensured.
Owner:乾讯信息技术(无锡)有限公司

Credible identity recognition method and system based on block chain

The invention discloses a trusted identity recognition method and system based on a block chain. The method comprises the steps: collecting the identity and biological feature information of an applicant, and carrying out the real-name authentication; generating an asymmetric key pair from the real-name authentication information according to an asymmetric cryptography algorithm, wherein the asymmetric key pair comprises a private key and a public key; gathering the asymmetric cryptography algorithm, the public key and the real-name authentication information as a group of identity recognitiondata, respectively copying the group of to-be-uploaded data into multiple groups of identity recognition data, and configuring the same unique serial number for each group; uploading, in a dispersedmanner, the multiple groups of identity recognition data configured with the unique serial numberd to different nodes of the blockchain, and the private key and the unique serial number are sent to anapplicant for storage, so that credible recognition of the applicant is realized. The credible identity recognition method and system based on the block chain has the advantages of being higher in credibility and higher in safety.
Owner:ANHUI JIYUAN SOFTWARE CO LTD +1

Method and system for realizing cross-domain secure communication

ActiveCN109412815AImplement ephemeral key securityImplement cross-domain featuresKey distribution for secure communicationPublic key for secure communicationSecure communicationKey generation
The invention discloses a method and a system for realizing cross-domain secure communication, and belongs to the field of secure communication. The method for realizing the cross-domain secure communication is implemented according to the following steps: a system parameter generation phase: a KGC discloses its system parameter params0 and randomly selects a master key s0, and a PKG discloses itssystem parameter params1 and randomly selects a master key s1; a user key generation phase: a partial public key QA and a partial private key DA of a sender are calculated, the sender selects a random number xA, another partial public key PKA and another partial private key A are calculated, and public keys QB and DB of a receiver are generated; a signcryption phase: the sender performs signcryption on a plaintext m to form a signcryption message sigma, and sends the signcryption message sigma to the receiver; and a de-signcryption phase: the receiver obtains the plaintext m by using the signcryption message sigma and the private key DB of the receiver. By adoption of the method and the system for realizing the cross-domain secure communication disclosed by the invention, temporary key security and cross-domain functional characteristics are achieved.
Owner:NANCHANG UNIV

Smart grid electric power information safety monitoring system and method

The present invention discloses a smart grid electric power information safety monitoring system and a smart grid electric power information safety monitoring method. The smart grid electric power information safety monitoring system comprises an information acquisition module, an information processing module, a communication module and a safety monitoring module, and is characterized in that: the information acquisition module comprises a power generation equipment information acquisition module, a power transmission equipment information acquisition module, a distribution equipment information acquisition module and an electric equipment information acquisition module; the information processing module is used for storing and processing various electric power information in a smart grid; the safety monitoring module comprises a forward unit and a reverse unit; when the information acquisition module unidirectionally transmits the electric power information to the communication module, the forward unit is adopted, and when the communication module unidirectionally transmits the electric power information to the information acquisition module, the reverse unit is adopted. The smart grid electric power information safety monitoring system of the present invention achieves reliability, integrity, security and non-repudiation of transmission of the electric power information.
Owner:STATE GRID CORP OF CHINA +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products