Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

175results about How to "Cannot be tampered with" patented technology

Identity authentication method based on block chain, authentication server and user terminal

The embodiment of the application discloses an identity authentication method based on a block chain, an authentication server and a user terminal, and belongs to the technical field of identity identification. The method comprises the steps of: according to an identity authentication request sent by the user terminal, acquiring an authentication factor of the user terminal; according to the authentication factor, creating a smart contract, wherein an operation result obtained after a preset operation is carried out on the authentication factor is pre-stored in the smart contract; broadcasting the smart contract into the block chain, and sending a smart contract block chain account address to the user terminal; and according to an execution result obtained after the user terminal executes the smart contract by utilizing the authentication factor, carrying out identity authentication, wherein when the execution result is matched with the operation result, success of identity authentication is confirmed, and when the execution result is not matched with the operation result, failure of identity authentication is confirmed. Therefore, the identity authentication method in the embodiment of the application has very high safety.
Owner:JIANGSU PAYEGIS TECH CO LTD

Security encryption authentication module for power distribution terminal communication and method thereof

The invention discloses a security encryption authentication module for power distribution terminal communication and a method thereof. The security encryption authentication module comprises a main control chip, a commercial code algorithm encryption chip, a communication interface and a storage unit; the main control chip is connected with the commercial code algorithm encryption chip, the communication interface and the storage unit and receives message information of a front-end processor of a distribution master station and a distribution terminal through safe interface software of the distribution terminal to overall manages the other modules, and the commercial code algorithm encryption chip encrypts or decrypts the message information received by the main control chip. The special encryption chip is adopted in the security encryption authentication module, response speed is increased, and dependence on a CPU and an internal storage is reduced. Besides, communication security is greatly improved by means of bidirectional authentication of verifying each other's identity between the security encryption authentication module and a distribution security interaction gateway.
Owner:STATE GRID CORP OF CHINA +4

Construction verification method and device capable of verifying security two-dimensional code offline

Embodiments of the invention provide a construction verification method and device capable of verifying a security two-dimensional code offline. The method comprises the following steps of inputting information that needs coding and type information, carrying out digital signature operation and encryption operation on the input information according to an information release type, constructing combination information, and encoding to generate a security two-dimensional code which can be verified off-line according to a two-dimensional code coding rule; inputting the information of the security two-dimensional code and identifying included combination information and type information, analyzing and decoding the combination information to obtain independent sub-information according to the type information of the two-dimensional code, and verifying digital certificate effectiveness information, a digital signature of the input information and an effective time limit of the input information; and if all verifications pass, showing that the offline verification of the security two-dimensional code is correct and the coding information source of the security two-dimensional code is credible, otherwise showing that the information release source of the security two-dimensional code is incredible. The method and the device have the beneficial effects that the security two-dimensional code cannot be tampered, counterfeited and denied, the public or private information can be released, and the integrity of the information of the security two-dimensional code and the authenticity of the source can be verified offline without a network connection.
Owner:王栋

Game data partition storage method based on block chain hash addressing and re-encryption

The invention relates to a game data partition storage method based on block chain hash addressing and re-encryption. The method comprises a data partition storage step and a data check step, whereinthe data partition storage step specifically comprises: partitioning block chain nodes into a full node, a consensus node, a storage node and a management node; performing hash operation on the node data to generate hash code; broadcasting the hash codes to nodes throughout the network; performing consensus verification by using hash values; generating a storage address table corresponding to thehash values; and respectively storing the data on the nodes according to the generated storage address table corresponding to the hash values. According to the game data partition storage method basedon block chain hash addressing and re-encryption, by performing fragmentation and partition storage on the data, the data have m pieces of redundancy, the stored data are fragmented, so that the dataprivacy is improved, and the nodes are classified, and different nodes are responsible for different functions, thereby reducing the resource waste, and the hierarchical node structure improves the scalability and the pluggability of the architecture.
Owner:广东微链科技有限公司

Electronic contract signing method based on the internet

ActiveCN105635169ASolve the problem of confirming the authenticity of meaning expressionCannot be tampered withOffice automationBuying/selling/leasing transactionsThird partyElectronic contracts
The invention discloses an electronic contract signing method based on the internet. After a user registers information, a signing request is initiated; a contract text is directly uploaded to a server for text deposition; the server targets to a notarization and deposition platform; the notarization and deposition platform sends the deposited text contract to a signing platform for signing; a contrast receiver is informed of the singing by the signing platform; after confirming the signing, the receiver skips to the notarization and deposition platform for verification; after the verification is successful, the receiver returns to the signing platform for signing; and filing is carried out. According to the method provided by the invention, the signing platform and the notarization and deposition platform are separated; because of the intervention of a notarization mechanism, the original two-party relationship is changed into a three-party relationship; the data exchange generated by the signing behavior of the user is no longer generated between the user and the signing platform and is deposited by the third party notarization and deposition platform in real time; the three parties cooperate mutually and restrict mutually; and the user rights and interests are ensured.
Owner:江苏慧世联网络科技有限公司

Accounting method and system for block chain network

The invention discloses an accounting method and system of a block chain network, wherein, the method comprises the following steps: a first mining node obtains a transaction broadcast message sent bya participating node, records a transaction record in a current bookkeeping cycle in a transaction pool, and generates a mining record of robbing the block bookkeeping right in the current bookkeeping cycle; the mining node obtains a transaction broadcast message sent by the participating node, and records the transaction record in the transaction pool; the first mining node generates a corresponding hash value according to the mining record, directionally sends the hash value to the timestamp server for timestamp marking according to the IP address of the timestamp server, and then signs theblock broadcast message with the private key of the first mining node and broadcasts the message to the block chain network. The remaining mining nodes verify according to the block broadcast messagesent by the first mining node, and send the block effective message of the first mining node to the block chain network through the back; the current billing cycle block of the first mining node is recorded in the block chain ledger of the first mining node. Thus, a low-cost, reliable and fair accounting rights contention method is provided.
Owner:全链通有限公司

Blockchain-based anonymous information transmission method and device, and readable storage medium

The invention discloses a blockchain-based anonymous information transmission method and device, and a readable storage medium. The method comprises the following steps: receiving, by a client, information distributed by a blockchain mechanism, a first public key list and a ring signature parameter required for generating a ring signature, and obtaining information to be transmitted correspondingto the information distributed by the mechanism according to the operation of a user of the client; performing ring signature on the information to be transmitted by using the ring signature parameter, other user pubic keys in the first public key list and a private key corresponding to the public key of the client to obtain an information signature; and sending the information to be transmitted and the information signature to the mechanism, so that the mechanism, receives the information to be transmitted and the information signature and uploads the information to be transmitted and the information signature to a blockchain after determining that the information signature is in an effective state. By adoption of the blockchain-based anonymous information transmission method and device disclosed by the invention, the anonymous information transmission is realized; and by writing the information to be transmitted and the corresponding information signature into the blockchain, the non-tampering of the information to be transmitted is achieved by the characteristics of the blockchain.
Owner:WEBANK (CHINA)

System and method for constructing trusted node network

The invention relates to a system for constructing a trusted node network. The system comprises a block chain management module, a node management module and a node identification module. Block chainmanagement module is responsible for the management of node member information on the block chain, that is, read, write, look up the node information of the block chain, as well as the read and writeprivileges management of the node block chain; the node management module is responsible for the joining and exiting of the node members on the block chain and the information management of the node network members. The node authentication module is responsible for authenticating the trustworthiness of other nodes on the block chain communicating with the node. The technical scheme is a decentralized trust system and peer-to-peer identity authentication mechanism based on block chain and public key technology, which is used to construct a trusted and controlled node network, and solve the security problems of single point failure, DoS attack, forgery and tampering in the centralized mechanism. There is no centralized trust and authority center in the technical scheme. What the new technical scheme establishes is a decentralized, distributed trust system and admittance mechanism maintained by the network node group.
Owner:JIANGSU FEIBO SOFTWARE TECH

Method for achieving data security communication by applying blockchain encryption technology

The invention discloses a method for achieving data security communication by applying a blockchain encryption technology, and relates to the technical field of data encryption. According to the invention, a secure communication system comprising a data layer, a data encryption layer, a data network layer, a data transmission layer and a data application layer is constructed; a block chain technology is integrated into data communication, safe transmission of data is realized, the transmitted data can be shared and cannot be tampered, the encryption performance of the data is improved, remote,online and real-time acquisition and application of the data can be achieved through systematic construction, and a user can achieve application, management and monitoring of database data without going to the site personally. According to the invention, the ant colony algorithm is adopted; according to the characteristics of data communication and the requirements of interaction equipment, the optimization search of the encryption algorithm is carried out among the plurality of encryption units, so that a user can quickly find out the optimal value of the target data suitable for applicationfrom the plurality of encryption algorithms, and the efficiency and the data management capability of the encryption unit application algorithm are greatly improved.
Owner:重庆知翔科技有限公司

Digital certificate use method and apparatus

InactiveCN105681340AMeet the requirements of the transactionCannot be tampered withTransmissionProtocol authorisationDigital signatureClient-side
The invention discloses a digital certificate use method and apparatus. The method includes the steps of: obtaining a verification code and generating a public and private key pair in a trading process; when a client side performs digital certificate signature on information needing to be signed in the trading process by using a private key, obtaining a client private key digital signature of the trading, and generating a digital certificate request including a public key; sending the digital certificate request including the public key, the verification code, and the client private key digital signature of the trading to a network side, wherein the digital certificate request includes trading information, and / or the public and private key pair is generated according to the trading information. After a client user passes the verification according to the verification code and the digital certificate request, the public key is used to perform legality verification on the digital signature according to the trading information at the network side. The trading information and the client private key digital signature of the trading are saved at the network side. By using the digital certificate use method and apparatus, the digital certificate is not dependent on the client side in the use process. Because the trading information is included, the digital certificate can be used as an effective electronicevidence.
Owner:吴晓军

Credit-increasing financing platform system and method based on block chain, and storage medium

The invention discloses a credit-increasing financing platform system and method based on a block chain, and a storage medium, the block chain platform obtains a target transaction bill correspondingto a target enterprise from transaction bills stored in a credit management platform, and when a node in the block chain completes a transaction, the transaction bill corresponding to the transactionis stored; obtaining a characteristic value of the target transaction bill in a preset dimension; obtaining a first credit score corresponding to the feature value through a big data collection, analysis and calculation credit platform, taking the sum of the first credit score, a second credit score corresponding to the blockchain platform and a third credit score guaranteed or mortgage by a thirdparty as a credit score, and determining a financing limit through the credit score; and sending the financing quota to a node corresponding to the target enterprise. According to the invention, thetransaction data is locked, cannot be tampered, traceable and credible through the blockchain technology, the financing limit is evaluated according to the real transaction data, the situation that the enterprise transaction data is false is avoided, and a more reliable credit-increasing financing platform is established.
Owner:SHENZHEN QIANHAI DIANJIN FACTORING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products