Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

53results about How to "Avoid the risk of being stolen" patented technology

NFC payment method, device, system and mobile terminal

The invention discloses an NFC payment method. The method includes the steps that a first terminal receives input transaction data and NFC transaction instructions according to received outer instructions and outputs second information; a mobile terminal receives a radio frequency signal which is received from the first terminal and used for activating NFC payment; the mobile terminal is initialized according to initialization data from the first terminal, sends an initialization completion response to the first terminal and outputs first information; the mobile terminal collects biological characteristics of a user to obtain an image of the biological characteristics and carries out image process to extract first biological characteristic values; the mobile terminal compares the first biological characteristic values with second biological characteristic values included by pre-stored user information, and sends an authentication successful response to the first terminal when the first biological characteristic values are consistent with the second biological characteristic values; the first terminal interacts with a first server and the mobile terminal to complete NFC payment. According to the NFC payment method, the device, the mobile terminal and the system, safety can be improved.
Owner:TENDYRON CORP

Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

The invention discloses a security certificate method based on fingerprint, cryptographic technology and fragile digital watermark, comprising the following steps: a sender collects a fingerprint image, calculates summary information of the fingerprint image and inserts the summary information, a secret key and digital information which is digitally signed and encrypted into the fingerprint image as a watermark; the fingerprint of the sender is collected, the fingerprint image inserted with the watermark is sent to a receiver after the fingerprint of the sender is qualified; after receiving information, the receiver firstly detects and verifies whether the fingerprint image is inserted with the digital watermark and whether the digital watermark is right or not so as to indentify identity authenticity; digital watermark information is extracted from the received image; the summary information of the fingerprint image from which the watermark is extracted is calculated; and the summary information is compared with the summary information of the fingerprint image recorded in the watermark information to approve information authenticity. The invention can effectively overcome the defects that the existing digital signature security certificate can not approve the legal KEY holder and the fingerprint in the fingerprint certificate is easy to clone and embezzle.
Owner:SHENZHEN POKA ELECTRONICS EQUIP +1

Related method for encrypting and storing files in trusted execution environment based on encryption chip

The invention discloses a method for increasing the security of a file encryption key in a trusted execution environment based on an encryption chip. The method comprises: integrating an encryption chip on a terminal device; controlling the encryption chip by a terminal device manufacturer to generate an encryption chip secret key as a secret key composition factor; generating a file encryption key protection key, used for protecting the file encryption key used when the file is encrypted in TEE service, and preventing problems that in the TEE service process, a chip manufacturer can completely decrypt the ciphertext data into a plaintext when leaving backdoor in the key generation process or performing inverse operation on the encryption key, and the sensitive data has the risk of being stolen. The security of the file encryption key is improved, and the autonomy and controllability of the terminal device manufacturer in encryption service are also improved. The embodiment is an improvement on the basis of an original TEE file encryption technology. The controllability of file encrypted storage and key algorithm is more conveniently realized under the condition that the encryptionand decryption efficiency of the original technology is not changed, and the security risk of key leakage is avoided.
Owner:深圳市中易通安全芯科技有限公司

Sinking and floating type net cage

The invention relates to a sinking and floating type net cage. The sinking and floating type net cage comprises at least two floating pipes, multiple floating pipe connection pieces, multiple handrails, at least one set of net, at least one net base rack, at least one sinker, at least one wire collector, at least one anchor, multiple sets of chains or ropes and at least one pipe-in-pipe. The floating pipes are used as floating bodies of the sinking and floating type net cage and are enclosed into two circles. The floating pipe connection pieces are used for fixing the floating pipes together. The handrails are arranged on the floating pipe connection pieces in an inward manner. The at least one sinker is arranged under the net base racks. The wire collectors are arranged between the net base racks and the sinkers. The anchors are arranged at the bottom of the sea and are used for fixing the net cage so that the net cage will not move along with the water flows. The chains or the ropes are used for connecting the floating pipe connection pieces to the net base racks, connecting the net base racks to the wire collectors, connecting the wire collectors to the sinkers and connecting the sinkers to the anchors. The pipe-in-pipes are sealed and filled with gas and arranged in the floating pipes. Adjusting assemblies are arranged on the floating pipes and / or the wire collectors, and are used for adjusting the sinking and floating of the net cage.
Owner:崔文亮

Video encryption method based on hyper-chaos system

The invention provides a video encryption method based on hyper-chaos system, and relates to the technical field of the image processing and secret communication. The method comprises the encryption process and the decryption process; the encryption process comprises the following steps: enabling a chaos secret communication system to achieve a synchronization state, and driving the system to generate an encryption initial scrambling sequence and an encryption initial scrambling matrix, and then decomposing video plaintext data into a data packet, performing XOR operation on the data packet and the encryption initial scrambling matrix to obtain initial cipherext data, and performing line scrambling operation on the initial ciphertext data; and finally performing adding module diffusion operation on the scrambled data to obtain the final video ciphertext data; the decryption process of the video is the inverse process of the encryption process. Through the video encryption method basedby the hyper-chaos system provided by the invention, the key can be transmitted without using a specific channel, and the risk that the key is stolen in the transmission process is avoided; the disadvantage that the low-dimension chaos system is easy to be attacked can be effectively overcome, the security is higher, and the realization is easy.
Owner:NORTHEASTERN UNIV

Safe payment system and method based on finger vein recognition and blockchain technology

ActiveCN110992053ASolve the problem that the transaction cannot be completed normallyAvoid the risk of being stolenFinanceProtocol authorisationComputer hardwareFinger vein recognition
The invention discloses a safe payment system based on finger vein recognition and blockchain technology. The safe payment system comprises a finger vein recognition module and a regional chain payment module, the finger vein recognition module is used for performing finger vein image acquisition, preprocessing and feature extraction on a finger when a user is verified; the regional chain paymentmodule comprises a finger vein verification account and a finger vein recognition intelligent contract; the invention also discloses a safe payment method based on the finger vein recognition and blockchain technology. The method comprises the following steps: 1) constructing a blockchain payment network; 2) performing finger vein recognition payment operation; and 3) performing finger vein recognition recharging operation. According to the method, the problem that trade cannot be normally completed when a traditional mobile device is in abnormal states such as shutdown and no signal is provided is solved, the risk that a payment password of the mobile terminal is possibly stolen is avoided, and the use convenience of a user and the safety of a payment network are improved.
Owner:国科火炼(杭州)数字科技有限公司

Mobile security settlement network construction system and use method thereof

The invention relates to a mobile security settlement network construction system. The mobile security settlement network construction system consists of an embedded system comprising an intermediate key, namely, an X shield, a mobile X shield device, a client mobile device, a mobile private network, private network base station and controller, a data authentication center platform server and a receipt and payment settlement system operation platform server, and a mobile security settlement network is constructed. An X shield APP is installed in the client mobile device, bound with the client mobile device and associated with an APP of a receipt and payment settlement system; when a client performs receipt and payment settlement, the X shield APP is actively connected to the mobile private network of mobile security settlement, transmits private encrypted data and is intelligently connected with a back-end system server platform database; after an identity is confirmed to be correct through multiple comparison, a connection permission signal is released, so that the system can be securely connected with the private network, and secure system operation is ensured; and when the identity is abnormal through comparison, the system refuses a connection and gives an alarm signal to a client APP, so that the payment settlement is refused, and the private network connection is cut off.
Owner:SHANGHAI CHENGYE INTELLIGENT TECH CO LTD

Advertisement putting system for guaranteeing safety of advertisement putting process

The invention discloses an advertisement putting system capable of guaranteeing the safety of an advertisement putting process. A typical advertisement putting process in the advertisement putting system comprises the following steps that: 1) an advertiser uploads an advertisement to the system through the foreground of the advertisement putting system and designates terminal equipment of which the advertisement content is to be played; 2) the system administrator audits the advertisement content uploaded by the advertiser; 3) the system signs the audited advertisement by using a platform private key; 4) the system encrypts the platform public key, the advertisement signature and the advertisement URL by using the terminal public key; 5) the system pushes the encrypted content to terminalequipment to be played; 6) after receiving the push, the terminal decrypts the push by using the filled private key; 7) the terminal downloads the advertisement content to be played according to the advertisement URL; 8) the terminal performs signature verification on the advertisement; and 9) the terminal plays the advertisement passing the signature verification. Based on the system disclosed bythe invention, the security problems that an advertiser maliciously uploads bad advertisements, the operation security is audited, the advertisement content is tampered during network transmission, the advertisement content is tampered at the advertisement terminal and the like can be effectively solved.
Owner:SHENZHEN BAIYUN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products