Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

32results about How to "Avoid the risk of being leaked" patented technology

Payment authentication method and payment authentication system

The invention discloses a payment authentication method and a payment authentication system. The method comprises the steps of generating a payment authentication first request and transmitting the payment authentication first request to an application server by a client; generating a payment authentication second request by the application server according to an analysis result, order information and an application identification of the payment authentication first request and transmitting the payment authentication second request to an authentication server by the application server; generating a payment authentication second request response according to the payment authentication second request and transmitting the payment authentication second request response to the application server by the authentication server; generating a payment authentication first request response according to the analysis result of the payment authentication second request response and transmitting the payment authentication first request response to the client by the application server; generating a to-be-signed request according to the analysis result of the payment authentication first request response and transmitting the to-be-signed request to authentication equipment by the client; generating a signature verification request and transmitting the signature verification request to the authentication server by the authentication equipment; transmitting the verification result of a signature value in the signature verification request to the application server by the authentication server; and performing a payment allowing operation or a payment refusing operation on the application server according to the verification result.
Owner:FEITIAN TECHNOLOGIES

Website security vulnerability detection method and device, medium and electronic equipment

The invention relates to a website security vulnerability detection method and device, a medium and electronic equipment, and the method comprises the steps: responding to a vulnerability detection starting instruction, obtaining interaction data of a website currently accessed by a user based on a browser plug-in; determining a to-be-tested request according to the interaction data, wherein the to-be-tested request is a request initiated in a website access process of the user; determining a detection rule corresponding to the to-be-tested request; and performing security vulnerability detection according to the detection rule and the to-be-tested request. Therefore, the security of the user information data can be improved; the manual workload required for obtaining the request list canbe reduced; the security vulnerability detection method can be applied to a scene of business updating iteration, the application range of the security vulnerability detection method is widened, and the method can be applied to a browser plug-in, so that the security vulnerability detection method can be operated under the condition that a browser is installed, other detection software does not need to be installed, and cross-operating system platform detection can be supported.
Owner:BEIJING BYTEDANCE NETWORK TECH CO LTD

Decentralized multi-digital signature/electronic signature method

The invention relates to the technical field of network security, in particular to a decentralized multi-digital signature/electronic signature method, which comprises the following steps of: acquiring a PDF file and a signature picture to be signed of any version, a digital certificate and a corresponding certificate password by a client; obtaining an abstract data template of the new signature information; calculating a corresponding byte range and carrying out abstract calculation to obtain an object number where a new signature is located; calculating the certificate to obtain a digital certificate; calculating and combining new signature data according to the object number in the cross table; packaging the latest signature data and writing the packaged signature data into a result ofthe PDF signature field; according to the method, cross-version and cross-platform compatibility of multiple signatures can be realized, offline signature of the to-be-signed data at the local terminal is ensured, and the risk that the to-be-signed data is leaked in transmission and the risk that the digital identity is illegally used and stolen are avoided. Therefore, the development process is more convenient, the electronic signature cannot be tampered, and the data privacy is fully guaranteed.
Owner:上海黔易数据科技有限公司

A systematic software-defined data center network security method

ActiveCN106453406BGuaranteed confidentialityPrevent interception and tamperingTransmissionConfidentialityData center
The invention discloses a systematic software-defined data center network security method which comprises: integration of a secret key management center and SDN (Software-Defined Networking) controllers; fusion of a secret key distribution process and an integration process between the SDN controllers and SDN switches; two-layer encryption between different layers of SDN switches; SDN south bound interface channel encryption between the SDN switches and the SDN controllers; encryption between the SDN controllers; and encryption between the SDN controllers and a management terminal. Compared with the prior art, the systematic software-defined data center network security method disclosed by the invention is related to a plurality of levels and a plurality of links, and can meet systematic software-defined data center network security requirements of protecting confidentiality of interactive data between the management terminal and the SDN controllers, protecting confidentiality of interactive data between the SDN controllers, protecting confidentiality of network databases maintained inside the SDN controllers, protecting confidentiality of channels between the SDN controllers and the SDN switches, protecting confidentiality of data interaction between virtual machines and protecting confidentiality of migration channels of the virtual machines.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products