Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35results about How to "Address security flaws" patented technology

Distributed storage system and file sharing method thereof

ActiveCN102821096AEliminate potential safety hazardsOvercoming the problem of excessive sharing overheadTransmissionClient-sidePOSIX
The invention discloses a distributed storage system and a file sharing method thereof, belonging to the technical field of computer memory and information security; the distributed storage system solves the problems that the existing secure storage system has complicated key management and the encrypt file has too large cost for sharing. The distributed storage system comprises a client, a server, a security manager and a key server and is established on the operation system for supporting the POSIX interface; the client is connected with the security manager and the key server respectively through the local area network. The distributed storage system sets the special key server management key, and the security manager only manages the file key number, so that the security defect and large file re-encryption cost caused by directly or indirectly exposing the file key to the share use are avoided, and the security and whole performance of the system are improved; the distributed storage system and the file sharing method effectively solve the problems that the key management is complicated, and the encrypt file has too large sharing load, and the distributed storage system is suitable for constructing the security storage system with large scale and high performance.
Owner:HUAZHONG UNIV OF SCI & TECH

Encryption system and method for resisting re-encryption key leakage and capable of cancelling attributes

ActiveCN106059768ALeak resistanceOvercoming property revocation flawsKey distribution for secure communicationPublic key for secure communicationCiphertextDisk encryption
The present invention provides an encryption system and method for resisting re-encryption key leakage and capable of cancelling attributes. The method comprises: 1, setting the parameters of an encryption system; 2, generating the main private key and the public key of the encryption system; 3, generating a user private key; 4, building a re-encryption key tree; 5, generating a cryptograph file; 6, cancelling attributes; 7, performing re-encryption agency; 8, accessing the cryptograph file; 9, determining whether the update position of the cryptograph file is 1 or not; 10, decrypting an un-updating cryptograph file; 11, updating the private key; 12, decrypting the update cryptograph file; and 13, quitting the encryption system. Through adoption of a dual-agency re-encryption server model, the encryption system and method for resisting re-encryption key leakage and capable of cancelling attributes can resist the leakage of the re-encryption key. When the attributes are cancelled, an attribute user group is employed to construct the re-encryption key tree so as to effectively, timely and accurately cancel the indirect attributes. When the encryption is performed, the secret is dispersed to resist the conspiracy attack.
Owner:XIDIAN UNIV

Voting method based on group signatures in block chain

PendingCN110009354ASmall amount of calculationResist impersonation attacksUser identity/authority verificationPayment protocolsBlockchainElliptic curve discrete logarithm
The invention discloses a voting method based on a group signature in a block chain, which can be applied to the fields of credit assessment, identity verification and the like. The method comprises the following steps: S01, selecting a trusted center; s02, carrying out registration; s03, carrying out share signature; s04, synthesizing a group signature; s05, performing signature verification; s06, backing up the signature information; s07, opening a signature; s08: canceling the signature. According to the invention, through cooperation of the user and the trusted center, the share signatureis generated and synthesized into the group signature. In order to protect the user identity information, blind processing is carried out on the user signature information. In order to solve the problem that a system is unavailable due to the fact that a trusted center is attacked, the user signature information of the trusted center is backed up; the credible center is allowed to be dynamically adjusted, the threshold group signature scheme makes up for anonymous vulnerabilities in the realization of the original block chain design, the difficulty is equivalent to the elliptic curve discretelogarithm, the false name attack can be effectively resisted, the calculation amount of the algorithm is lower, and the algorithm can be effectively adapted to the block chain application scene.
Owner:ZHENGZHOU NORMAL UNIV

Communication system and communication method of chaos safety information internet transmission

InactiveCN101162995AEnhanced Security IndependenceEnhance information theft prevention capabilitiesKey distribution for secure communicationUser identity/authority verificationTelephone lineInformation transfer
The invention discloses a communication system and a communication method for the Internet transmission of chaotic security information. An independent server, receiving and transmitting terminals and built-in bidirectional key transmission modules are mutually connected together to form the system. In the method, a transmitter encrypts image text information via chaotic security, which is then uploaded to the independent server, the encrypted key is independently sent to a receiver via a public telephone line channel, and the receiver downloads the chaotically encrypted image text information and utilizes the received encrypted key to decrypt the image text information. The image text information transmission between the receiving and transmitting terminals of the invention utilizes the point-to-multipoint communication method performed by Internet media, so the image text information transmission does not pass a third party normally using the Email transmission method, thus greatly enhancing the security and independence of information transmission on the Internet. The independent server applies multiple security measures aiming at the ftp protocol, thus enhancing the theft-proof capability of information. The transmission of chaotically encrypted keys in an independent telephone channel ensures the anti-attack capability of the image text information.
Owner:SOUTH CHINA UNIV OF TECH

Control method for enhancing using security of cryptographic machine by adopting dual-factor mandatory certification technology

The invention discloses a control method for enhancing the using security of a cryptographic machine by adopting a dual-factor mandatory certification technology, and relates to the technical field of information security and cryptology. The control method comprises the following steps that: (1) a manager sets a running security strategy of the cryptographic machine; (2) the manager starts the cryptographic machine; (3) after being started, the cryptographic machine enters a function authority management state; (4) if the cryptographic machine is used at the first time, the cryptographic machine enters a personalized flow of the dual-factor mandatory certification technology; and (5) if the cryptographic machine is not used at the first time, the cryptographic machine enters a security service starting flow of the dual-factor mandatory certification technology. The method has the advantages that during actual application, the security risk caused by a reason that a non-authorized user operates the cryptographic machine is completely avoided, so that the overall application security of the cryptographic machine is improved; and furthermore, the authority of the manager is separated, so that problem that safety defect is brought to system management is avoided, and the management security of the cryptographic machine is improved.
Owner:中电科网络安全科技股份有限公司

Rerandomizable identifier encryption and decryption method

The invention discloses a rerandomizable identifier encryption and decryption method, and aims to solve the security defect of an existing rerandomizable identifier encryption and decryption method. According to the invention, the technical scheme is that the method comprises the steps: constructing an encryption and decryption system composed of an initialization module, a key extraction module,an encryption module, a decryption module and a re-random module; enabling the key generation center to operate the initialization module, generating a public parameter and a main private key, and disclosing the public parameter; enabling the key generation center to operate a key extraction module, and generating a private key for the receiver by adopting the identifier id of the receiver; enabling a sender to operate the encryption module, generating a ciphertext C by adopting the identifier id of the receiver, and sending the ciphertext C to the public server; enabling a public server to operate a re-randomization module to re-randomize the C, and sending the new ciphertext C' to a receiver; and enabling a receiver to operate the decryption module to decrypt the C'. According to the invention, the replayable selective ciphertext attack based on the identifier can be resisted, and the operation of the rerandom module does not need the identifier of a receiver, so the distribution ofthe identifier is avoided.
Owner:NAT UNIV OF DEFENSE TECH

Communication system and communication method of chaos safety information internet transmission

The invention discloses a communication system and a communication method for the Internet transmission of chaotic security information. An independent server, receiving and transmitting terminals and built-in bidirectional key transmission modules are mutually connected together to form the system. In the method, a transmitter encrypts image text information via chaotic security, which is then uploaded to the independent server, the encrypted key is independently sent to a receiver via a public telephone line channel, and the receiver downloads the chaotically encrypted image text information and utilizes the received encrypted key to decrypt the image text information. The image text information transmission between the receiving and transmitting terminals of the invention utilizes the point-to-multipoint communication method performed by Internet media, so the image text information transmission does not pass a third party normally using the Email transmission method, thus greatly enhancing the security and independence of information transmission on the Internet. The independent server applies multiple security measures aiming at the ftp protocol, thus enhancing the theft-proof capability of information. The transmission of chaotically encrypted keys in an independent telephone channel ensures the anti-attack capability of the image text information.
Owner:SOUTH CHINA UNIV OF TECH

Attribute reversible encryption system and method resistant to re-encryption key disclosure

ActiveCN106059768BLeak resistanceOvercoming property revocation flawsKey distribution for secure communicationPublic key for secure communicationCiphertextKey leakage
The present invention provides an encryption system and method for resisting re-encryption key leakage and capable of cancelling attributes. The method comprises: 1, setting the parameters of an encryption system; 2, generating the main private key and the public key of the encryption system; 3, generating a user private key; 4, building a re-encryption key tree; 5, generating a cryptograph file; 6, cancelling attributes; 7, performing re-encryption agency; 8, accessing the cryptograph file; 9, determining whether the update position of the cryptograph file is 1 or not; 10, decrypting an un-updating cryptograph file; 11, updating the private key; 12, decrypting the update cryptograph file; and 13, quitting the encryption system. Through adoption of a dual-agency re-encryption server model, the encryption system and method for resisting re-encryption key leakage and capable of cancelling attributes can resist the leakage of the re-encryption key. When the attributes are cancelled, an attribute user group is employed to construct the re-encryption key tree so as to effectively, timely and accurately cancel the indirect attributes. When the encryption is performed, the secret is dispersed to resist the conspiracy attack.
Owner:XIDIAN UNIV

Control method for enhancing using security of cryptographic machine by adopting dual-factor mandatory certification technology

The invention discloses a control method for enhancing the using security of a cryptographic machine by adopting a dual-factor mandatory certification technology, and relates to the technical field of information security and cryptology. The control method comprises the following steps that: (1) a manager sets a running security strategy of the cryptographic machine; (2) the manager starts the cryptographic machine; (3) after being started, the cryptographic machine enters a function authority management state; (4) if the cryptographic machine is used at the first time, the cryptographic machine enters a personalized flow of the dual-factor mandatory certification technology; and (5) if the cryptographic machine is not used at the first time, the cryptographic machine enters a security service starting flow of the dual-factor mandatory certification technology. The method has the advantages that during actual application, the security risk caused by a reason that a non-authorized user operates the cryptographic machine is completely avoided, so that the overall application security of the cryptographic machine is improved; and furthermore, the authority of the manager is separated, so that problem that safety defect is brought to system management is avoided, and the management security of the cryptographic machine is improved.
Owner:中电科网络安全科技股份有限公司

A distributed storage system and its file sharing method

ActiveCN102821096BEliminate potential safety hazardsOvercoming the problem of excessive sharing overheadTransmissionOperational systemClient-side
The invention discloses a distributed storage system and a file sharing method thereof, belonging to the technical field of computer memory and information security; the distributed storage system solves the problems that the existing secure storage system has complicated key management and the encrypt file has too large cost for sharing. The distributed storage system comprises a client, a server, a security manager and a key server and is established on the operation system for supporting the POSIX interface; the client is connected with the security manager and the key server respectively through the local area network. The distributed storage system sets the special key server management key, and the security manager only manages the file key number, so that the security defect and large file re-encryption cost caused by directly or indirectly exposing the file key to the share use are avoided, and the security and whole performance of the system are improved; the distributed storage system and the file sharing method effectively solve the problems that the key management is complicated, and the encrypt file has too large sharing load, and the distributed storage system is suitable for constructing the security storage system with large scale and high performance.
Owner:HUAZHONG UNIV OF SCI & TECH

A pressure relief method for coal mine rock burst prevention and control of hydraulic cracking and cut-off roof

The invention provides a hydraulic cracking cut-off roof pressure relief method for prevention and control of rock burst in coal mines, and relates to the technical field of prevention and control of rock burst in coal mines. The method of the present invention comprises the following steps: step 1, determine the location of the target fault top rock layer and the thickness of the fault top; step 2, determine the construction parameters of the hydraulic splitting hole; step 3, the construction layout of the hydraulic splitting; step 4, the target fracture of the hydraulic splitting Top rock layer; step 5, cracking effect detection. The method for preventing and controlling hydraulic cracking in coal mine rock burst according to the present invention is applied to rock burst mines. The pressure relief of broken roof is safe and efficient, the construction operation is convenient, the expander can be used repeatedly, and the cost is greatly reduced; the goal of the roof is realized. Precise pre-cracking of the required fault top rock strata and fully connected caving under the action of overlying rock movement and mine pressure can reduce the damage of dynamic loads and avoid the safety defects and construction defects of explosive blasting top cutting. High application and promotion value.
Owner:CHINA UNIV OF MINING & TECH

Lithium ion polymer electrolyte film and manufacturing method of lithium ion cell comprising the film

The invention relates to a lithium ion polymer electrolyte membrane and a preparation method of a lithium ion battery containing the electrolyte membrane. In the present invention, a polymer matrix with high amorphous phase is prepared by free radical copolymerization with PEO macromonomer, ethylenic small monomer, and azobisisobutyronitrile, and the matrix is ​​compounded with lithium salt and fast ion conductor nanopowder Finally, the lithium ion polymer electrolyte membrane is made by casting method, the electrolyte membrane has good mechanical properties, stable chemical properties, and high electrical conductivity; then lithium iron phosphate is used as the positive electrode material, and the electrolyte membrane is used as the separator to make the lithium ion polymer electrolyte membrane. Battery; the battery has good electrochemical performance, large capacity, long cycle life, safe and reliable charging and discharging process. The production process in the invention is simple, the yield is high, and the cost is low. The prepared positive and negative plates have uniform texture and uniform product performance, and are convenient to be combined into a battery pack to work.
Owner:ZHENGZHOU UNIV +1

Hydraulic fracturing roof-cutting pressure relief method for coal mine rock burst prevention and control

The invention provides a hydraulic fracturing roof-cutting pressure relief method for coal mine rock burst prevention and control, and relates to the technical field of coal mine rock burst prevention and control. The method comprises the following steps that 1, the position and the roof-cutting thickness of a target roof-cutting rock stratum are determined; 2, hydraulic fracturing hole construction parameters are determined; 3, hydraulic fracturing construction arrangement is conducted; 4, hydraulic fracturing is conducted on the target roof-cutting rock stratum; and 5, the fracturing effect is detected. The hydraulic fracturing roof-cutting pressure relief method for coal mine rock burst prevention and control is applied to a rock burst mine, roof-cutting pressure relief is safe and efficient, construction operation is convenient and fast, an expansion device and the like can be repeatedly used, and the cost is greatly reduced; and accurate pre-fracturing of the roof-cutting rock stratum needed by a roof target is achieved, full communication and caving are achieved under the action of overlying strata movement mine pressure, the dynamic load damage effect is reduced, the safety defects and the construction defects of explosive blasting roof cutting are avoided, and extremely high application and popularization value is achieved in coal mine rock burst prevention and control engineering practice.
Owner:CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products