Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

86results about How to "Achieve tamper resistance" patented technology

Method and system for identity verification of digital certificate based on TEE (Trusted Execution Environment)

ActiveCN105429760AEnsure true willEnsure that the identity verification process can reflect the true willUser identity/authority verificationPasswordPersonal identity verification
The invention discloses a method for identity verification of a digital certificate based on a TEE (Trusted Execution Environment). The method comprises pre-configuration of a digital certificate system through a terminal, a digital certificate signature process and a digital certificate signature verification process. The method is characterized in that the terminal is provided with the TEE; the digital certificate signature process is carried out on the terminal and is used for utilizing a private key of the digital certificate to sign for a user request; the digital certificate signature verification process is used for authenticating identity of a requested user, and the authentication method comprises verification of validity and effectiveness of the digital certificate and integrity and correctness of the signature, wherein the digital certificate signature process is carried out under the TEE; the sensitive information, such as a user key, identity information, biological characteristic information and password information, is stored through a secure storage module, so that the problems that the signature process is carried out in REE and the sensitive information of the user is stored under the REE environment to cause privacy disclosure and stolen hidden danger of property in the prior art are avoided.
Owner:神州融安数字科技(北京)有限公司

Blockchain data access authority control method based on proxy re-encryption

ActiveCN111191288AImplement authorized accessReduce the certification processDigital data protectionCiphertextInternet privacy
The invention discloses a blockchain data access authority control method based on proxy re-encryption, and aims at the authorization sharing access type. The method comprises the steps: encrypting plaintext information through employing a symmetric secret key to generate a content ciphertext, and encrypting the symmetric secret key through employing an own public key to generate a secret key ciphertext; uploading the content ciphertext and the key ciphertext to a block chain; obtaining a public key of the authorized node on the block chain according to an access authorization application initiated by the authorization node, and generating an authorization key according to the own private key and the public key of the authorized node; uploading the authorization key to the block chain, wherein the authorization key is used for the block chain to perform proxy re-encryption calculation in combination with the key ciphertext to generate a proxy re-encryption key; and the proxy re-encryption key is used for the authorized node to analyze by using the own private key to obtain a symmetric key, and the symmetric key is used for the authorized node to decrypt the content ciphertext to obtain the plaintext information. According to the method, the data of different security levels is classified so that fine-grained permission access control of the data level is realized on the block chain.
Owner:CETHIK GRP

Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)

The invention provides an encryption control method and a device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI). The encryption control method and the device capable of achieving tamper-proofing and repudiation-proofing by means of the PKI are used for enabling data being transmitted to be encrypted by a sending end, wherein the data being transmitted includes initial encryption data and clear data. The encryption control method capable of achieving tamper-proofing and repudiation-proofing by means of the PKI comprises the following steps: (1) conducting a first encryption algorithm on the clear data, and enabling an algorithm result to be a first median; (2) conducting a second encryption algorithm on the initial encryption data and the first median, and enabling an algorithm result to be an encrypted value, and the encrypted value is sent to a corresponding receiving end by the sending end. The invention further provides an encryption control device capable of achieving tamper-proofing and repudiation-proofing by means of the PKI and a corresponding financial transaction processing system. According to the encryption control method and the device capable of achieving tamper-proofing and repudiation-proofing by means of the PKI, encryption processing is conducted on clear data and encryption data (initial encryption data) in a message to achieve encryption for a transaction message. Therefore, encryption scheme which is simple and easy to carry out can be utilized to achieve the purpose of tamper-proofing and repudiation-proofing for transaction data.
Owner:银视通信息科技有限公司

Radio frequency tag data coding method and radio frequency tag data coding system for vehicle identification

The invention discloses a radio frequency tag data coding system and a radio frequency tag data coding method for vehicle identification. The system comprises a computer, an encryption/decryption and verification code calculation device, an RFID reading-writing device and an RFID tag. The computer divides an EPC region of the RFID tag into a data part and a verification code part and codes a license plate number; the encryption/decryption and verification code calculation device encrypts the coded license plate number data and calculates the verification code of the license plate number data; the computer concatenates the license plate number data and the verification code; the RFID reading-writing device writes the concatenation data into the EPC region; the encryption/decryption and verification code calculation device carries out decryption to obtain decryption data and calculates the verification code; and the computer compares the decrypted verification code with the verification code part of the EPC region and judges whether data in the EPC region is tampered. The defect that data encryption and verification code calculation cannot be carried out due to the fact that the license plate number is stored in the EPC region of the RFID tag in the prior art is overcome.
Owner:BEIJING INST OF COMP TECH & APPL

CAD signature certification system used for construction drawing examination and CAD signature certification method used for construction drawing examination

The invention discloses a CAD signature certification system used for construction drawing examination. An examination system host is connected with the input end of a CA signature server through the Internet, an Internet router and a firewall. The output end of the CA signature server is connected with the CAD signature application server and a PDF signature application server. The invention further discloses a CAD signature certification method used for construction drawing examination. The method comprises the steps of 1 logging in the CAD signature certification system through a login password; 2 waiting for a CA certificate authority to issue a CA certificate; 3 ensuring that a CAD drawing is marked with a signature identifier; 4 confirming each professional CAD drawing; 5 calling the key and signature of the CA signature server to carry out electronic signature on the drawing; 6 verifying the CA signed CAD drawing through drawing experts; 7 carrying out CA qualified signature again according to screening; and 8 downloading the drawing by a design organization. The validity of the CA qualified signature is verified through a signature plug-in.
Owner:泰州市抗震办公室 +1

Database tamper-proofing method and system applied to data security products

A database tamper-proofing method applied to data security products is provided. The method comprises: designing a logic operation for a database table. The logic operation comprises logical addition, logical deletion, and logical modification. The logic addition is newly adding a valid data record; the logical deletion is newly adding a deletion record for representing that object data has been deleted; and the logical modification firstly executes logic deletion for recording that the object data has been deleted, and executes logic addition for recording modified object data and identifications of the object data. According to the technical scheme of the present invention, since only write permissions to the database table of ordinary users are retained, and each database table contains a data structure for implementing conversion from the bottom addition to the logic operation, so that only-addition operations are used to stimulate the addition, deletion and modification operations on the bottom of the datable table; and the hash value is recorded in the only-addition operation process to be taken as fingerprint verification to ensure the authenticity of the audit history, so that not only all operations of the database access layer are retained, but also tamperresistance in the whole process of the history of all the database objects is realized.
Owner:四川盛世天成信息技术有限公司

Intelligent education system and method based on virtual reality and big data

The invention belongs to the technical field of wisdom education, and discloses a wisdom education system and method based on virtual reality and big data, and the method comprises the steps: collecting education data through video collection equipment, and enabling data processing equipment to process the collected education data; transmitting the education data through the communication device,and encrypting the transmission information through the encryption program; big data resources are concentrated through the cloud server to optimize the education data; constructing an education target three-dimensional model through a modeling program; rendering the education target three-dimensional model through a rendering program; carrying out simulation output on the three-dimensional modelthrough a display, and optimizing problems existing in the three-dimensional model through an optimization program; and displaying the education virtual scene through VR equipment. According to the invention, the accuracy of resource collection can be improved through the big data optimization module; and the storage module effectively realizes tamper-proofing of the education information and improves the reliability of the education information.
Owner:DALIAN JIAOTONG UNIVERSITY

Food label unique code publishing and circulation traceability method based on block chain main and auxiliary chain technology

PendingCN110335051ASmall amount of calculationLighten the burden on hardwareCommerceBlockchainTimestamp
The invention discloses a food label unique code publishing and circulation traceability method based on a block chain main and auxiliary chain technology. The commodity label unique code informationblock chain technology based on public and private key pairing verification is adopted. Main chain and auxiliary chain information counterfeiting prevention, tampering prevention and replay preventionare achieved, food label unique code network propagation and independent chaining and rapid tracing of single piece of food information can be achieved, and a user comprises a third-party mechanism,manufacturers at all levels, a dealer and a consumer which are connected with the Internet. Server databases of the third-party mechanism, manufacturers and dealers at all levels store food label information block chain account books in server databases, new legal verification data issued by other parties is received in real time, local account books are updated in time, new data blocks are hookedaccording to food transfer conditions, and new block chain data are issued; and a consumer obtains the latest timestamp block chain from a plurality of enterprise servers during code scanning, and calculates and obtains the food traceability information chain by comparing the latest timestamp block chain.
Owner:烟台市同翔网络科技有限责任公司

Commodity authenticity detecting method and system based on two-dimension code

The invention discloses a commodity authenticity detecting method and system based a two-dimension code. The method comprises the steps that a third party service server is used for manufacturing the commodity two-dimension code for a commodity, and meanwhile the commodity two-dimension code is signed through a platform certificate corresponding to the third party service server; an NFC safety client side is used for scanning the commodity two-dimension code, and a signature value of the commodity two-dimension code is obtained; whether the signature value obtained by the NFC safety client side is matched with the two-dimension code signature value prestored in an image copyright authentication and management server or not is judged through the image copyright authentication and management server; if the signature value obtained by the NFC safety client side is matched with the two-dimension code signature value prestored in the image copyright authentication and management server, it is judged that the commodity is an authentic product. The legal right of commodity manufacturers is protected from a data source, data credibility and safety of data through the secret key technology, the NFC technology and the two-dimension code technology.
Owner:卓望数码技术(深圳)有限公司

Two-dimensional code generation method, two-dimensional code decoding method, devices, transaction system and storage medium

InactiveCN108268921ASafety of tradementSolve the problem of being easily exploited by illegal copyingPayment protocolsRecord carriers used with machinesComputer hardwarePersonal identification number
The embodiment of the invention discloses a two-dimensional code generation method, a two-dimensional code decoding method, a two-dimensional code generation device, a two-dimensional code decoding device, a transaction system and a storage medium. The two-dimensional code generation method includes the following steps that: the content information of a two-dimensional code to be generated and a personal identification code are determined; and a transaction two-dimensional code is generated on the basis of the content information and the personal identification code, so that a transaction device can perform code two-dimensional code decoding on the basis of the personal identification code. With the above technical schemes of the invention adopted, a manual link is added into a two-dimensional code transaction process, and therefore, the anti-counterfeiting, anti-copying and anti-tampering of the two-dimensional code can be realized, the problem that a two-dimensional code is easily copied and utilized illegally in a two-dimensional code-based transaction process can be solved, the illegal use of a generated two-dimensional code is effectively avoided, and two-dimensional code-based transactions can be safer.
Owner:SHANGHAI PEOPLENET SECURITY TECH

A tax monitor system and monitoring method

InactiveCN109146656AReduce tax violationsReduce economic lossFinanceMonitoring systemDatabase
The invention discloses a tax monitoring system and a monitoring method. The system includes a system host, an alarm, a power module, a control input module, a kernel layer, a networking module, a taxdeclaration module and a block chain storage module, the memory includes a basic information storage unit, a tax Data Unit and a Tax Monitoring Procedure Unit for the current period, the system hostruns the tax monitor, reads the basic information from the basic information storage unit to perform calculations, obtains the tax data of the current period and stores them in the tax data unit of the current period and activating the alarm to send out the tax declaration warning signal, the manager operation control input module confirms or modifies the tax data to be reported in the current period. After confirmation, the system mainframe controls the operation of the tax declaration module, starts the tax declaration operation, and stores the tax declaration information in the block chainstorage module after the tax declaration is completed. The tax monitoring system or the tax monitoring method of the invention is simple in operation and high in efficiency, can reduce or reduce the behavior of the enterprise violating the tax law, and can reduce the economic loss and the bad influence caused by the tax problems of the enterprise.
Owner:东莞市恒邦企业服务有限公司

Internet-of-Things data storage method based on blockchain and Internet-of-Things system

The invention discloses an Interne-of-Things data storage method based on a blockchain and an Interne-of-Things system. The Internet of Things at least comprises two main nodes in communication connection with each other, and each main node manages a plurality of sets of node equipment in communication connection with the main nodes. The Interne-of-Things data storage method based on the blockchain comprises the steps of: collecting data, by means of an arbitrary main node, of the plurality of sets of node equipment managed by the main node; performing unified data expression operation on thedata of the plurality of sets of node equipment to obtain a plurality of pieces of to-be-stored data; and based on a preset consensus algorithm, synchronizing the plurality of pieces of to-be-stored data to each main node and node equipment. According to the Internet-of-Things data storage method based on the blockchain and the Internet-of-Things system of the invention, the blockchain is adoptedto realize sharing and synchronization of the Interne-of-Things equipment data. Due to the fact that the blockchain has tamper resistance, the Interne-of-Things data written into the blockchain cannotbe maliciously forged or modified, and distributed storage, tamper resistance or loss of the Interne-of-Things data are achieved.
Owner:上海和数软件有限公司

Food label unique code publishing and circulation tracing method based on blockchain main and auxiliary chain technology

The invention discloses a food label unique code publishing and circulation tracing method based on a blockchain main and auxiliary chain technology. The method comprises the steps: employing the commodity label unique code information blockchain technology based on public and private key pairing verification; enabling a front-stage production enterprise and a rear-stage production enterprise or asales enterprise for producing a certain piece of food in a circulation chain to link unique code information blocks of food labels into a secondary chain through a private key and public key pairedverification method, and adding the auxiliary chain and the timestamp into the main chain as block information, so the counterfeiting prevention, tampering prevention and replay prevention of the mainchain and the auxiliary chain information are realized, and network propagation of the unique code of the food label and independent chaining and rapid tracing of single food information can be realized, wherein users comprise a third-party mechanism, manufacturers at all levels, dealers and consumers which are connected with the Internet respectively; the server databases of the third-party mechanism, manufacturers and dealers at all levels are used for storing food label information blockchain account books, receiving new legal verification data issued by other parties in real time, updating local account books in time, hooking new data blocks according to food transfer conditions, and issuing new blockchain data; and enabling a consumer to obtain the latest timestamp blockchain from aplurality of enterprise servers during code scanning, and performing calculation to obtain the food traceability information chain by comparing the latest timestamp blockchain.
Owner:綦昱钧
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products