Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

166results about How to "Avoid Information Leakage" patented technology

Mobile phone two-dimensional code safe use method based on information hiding

The invention discloses a mobile phone two-dimensional code safe use method based on information hiding. With the development of information technology and Internet technology, people pay more attention to the convenient and environmental-friendly two-dimensional code technology, and the use of the two-dimensional code is wider and wider. However, a traditional mobile phone two-dimensional code is lack of a necessary security mechanism, people can use a two-dimensional code as long as the people have the two-dimensional code, and the security of the private information of the user is invaded. The method is based on the information hiding technology, the cryptography theory and bar code technology are utilized, through a method of embedding user secret information in encoding and carrying out extraction, operation and comparison in decoding, the safe use problem of the mobile phone two-dimensional code is solved, the leakage and stealing of the information are prevented, and the integrity and confidentiality of the information are ensured. The method is simple and practical, with the gradual popularization of the Internet technology at the present age, and method plays an important role for the security of the information.
Owner:上海翰星电子科技有限公司

Method for detecting unauthorized access vulnerability of power mobile application

The invention discloses a method for detecting an unauthorized access vulnerability of a power mobile application. The method comprises the steps of obtaining and storing all the user types of the mobile application and the user number corresponding to each user type; constructing http requests aiming at the same operation of different users in the same user type, modifying the http request of one user, sending the modified request to a server-side and analyzing an execution result to detect parallel unauthorized access vulnerabilities; constructing http requests of different users in different user types, modifying the http requests which can be executed by users in certain user types, but cannot be executed by users in other types, sending the modified requests to the server-side, and analyzing the execution results to detect the unauthorized access vulnerabilities; and comprehensively detecting the discovered vulnerabilities and finishing the unauthorized access vulnerability detection. The method for detecting the unauthorized access vulnerability of the power mobile application is used for performing safety assessment on the mobile application in an integrated testing stage and provides support for reducing the safety risk of the mobile application and improving the safety of the mobile application.
Owner:STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +1

Hardware cryptographic engine and encryption method

A hardware cryptographic engine may include a plurality of ciphertext engines. A first ciphertext engine may receive a second intermediate ciphertext output from a second ciphertext engine, generate a first intermediate ciphertext, and use the first intermediate ciphertext to generate and output a first final ciphertext. The second ciphertext engine may output the second intermediate ciphertext, and use the second intermediate ciphertext to generate and output a second final ciphertext. A comparison unit may generate and output a control signal having a logic state depending on whether the first final ciphertext is the same as the second final ciphertext. An encryption data output unit may respond to the logic state of the output control signal, and output a final ciphertext when the first final ciphertext is the same as the second final ciphertext. A ciphertext engine may include plurality of round blocks, one of which may receive an odd number of intermediate ciphertext inputs, inclusive of an intermediate ciphertext from another ciphertext engine, to generate the respective intermediate ciphertext. A round block may include an encryption unit, a first logic operator, and a second logic operator that receives an intermediate ciphertext generated by the encryption unit and the intermediate ciphertext generated by the first logic operator.
Owner:SAMSUNG ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products