Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

36results about How to "Easy to tamper with" patented technology

Safety network time synchronizing method and device

The invention relates to the field of network safety, in particular to a safety network time synchronizing method and device. The method comprises the following steps: key agreement: acquiring a session key and a message authentication code by a client side through a session key request and a message authentication code request, and establishing mutual trust between the client side and a server; and time synchronization: implementing safety time synchronization by time synchronizing data frame interaction. The client side transmits a client side key request data frame to a server side; after receiving the client side key request data frame, the server replies a server session key responding frame to the client side; after receiving the server session key responding frame, the client side examines frame formats and contents, and acquires a session key; the client side transmits a client side message authentication code request frame to the server; after receiving the client side message authentication code responding frame of the client side, the server computes a message authentication code according to a session key and message contents and replies a server message authentication code responding frame to the client side; and after receiving the server message authentication code responding frame, the client side examines the frame format and content, and acquires the message authentication code.
Owner:电信科学技术第五研究所有限公司

Embedded-type system for ensuring completeness of program and realization method thereof

The invention discloses an embedded-type system for ensuring the completeness of a program, which comprises an embedded-type microprocessor, a storage device, a program completeness detection unit and a safety control unit wherein: the program completeness detection unit is used for detecting content of an appointed area of the storage device before the running, utilizing a standard hash function to calculate the hashed value of the area in the appointed area, for encrypting the hashed value and for transmitting the hashed value to the safety control unit; and the safety control unit is used for storing a correct hashed value of the content in the appointed area of the storage device, for comparing the correct hashed value with a running time hashed value which is transmitted by the completeness detection unit, and for judging whether the appointed area is altered. The invention also discloses a realization method of the embedded-type system for ensuring the completeness of the program, which comprises a configuration process and a running time detection process. The embedded-type system solves the safety problem that the code in the conventional system is easy to be altered, has the advantages of universality, low cost, less running expenditure and the like, and is particularly suitable for ensuring the completeness of the most basic trusted root of the embedded-type system.
Owner:SOUTH CHINA UNIV OF TECH

Vehicle-mounted safety communication method, system and device based on safety cloud public key protection

The invention provides a vehicle-mounted security communication method, system and device based on security cloud public key protection. The intelligent networked automobile vehicle-mounted network communication comprises communication between a security cloud and a security TCU, communication between the security TCU and a security gateway, and communication between the security gateway and a security ECU, wherein the TCU is Telematics Control Unit; the security cloud and the security TCU communicate through a security wireless network communication technology, and bidirectional identity authenticity authentication is carried out between the security cloud and the TCU; and the security TCU and the security gateway are communicated by adopting a vehicle-mounted Ethernet security communication technology. The vehicle-mounted safety communication method, system and device based on the safety cloud public key protection have the beneficial effects that a whole set of safe, efficient and enforceable solution for network connection vehicle-mounted safety communication is provided, and the method comprises a public key data management and updating method based on the cloud safety protection; the invention discloses a challenge-response identity authentication method based on a public key cryptography technology, and a message encryption method based on a one-time session key.
Owner:CATARC TIANJIN AUTOMOTIVE ENG RES INST CO LTD

Valuable document information coding/decoding method and device, processing system and financial self-service equipment

The invention discloses a valuable document information coding method, which comprises the following steps: obtaining currency information, version information and denomination information of a valuable document; searching a pre-configured currency information association table according to the currency information and obtaining currency codes corresponding to the currency information; searching a pre-configured version information association table according to the version information and obtaining version codes corresponding to the version information; searching a pre-configured denomination information association table according to the denomination information, and obtaining denomination codes corresponding to the denomination information; and generating information codes of the valuable document according to the currency codes, the version codes and the denomination codes. The invention also provides a decoding method, a coding device, a decoding device, a processing system and financial self-service equipment. The method can realize coding of new-version and new-denomination valuable documents; and each code table is stored in hardware in the form of code data, so that the data cannot be modified by man and the risk of data tampering does not exist.
Owner:GRG BAKING EQUIP CO LTD

Embedded-type system for ensuring completeness of program and realization method thereof

The invention discloses an embedded-type system for ensuring the completeness of a program, which comprises an embedded-type microprocessor, a storage device, a program completeness detection unit and a safety control unit wherein: the program completeness detection unit is used for detecting content of an appointed area of the storage device before the running, utilizing a standard hash functionto calculate the hashed value of the area in the appointed area, for encrypting the hashed value and for transmitting the hashed value to the safety control unit; and the safety control unit is used for storing a correct hashed value of the content in the appointed area of the storage device, for comparing the correct hashed value with a running time hashed value which is transmitted by the completeness detection unit, and for judging whether the appointed area is altered. The invention also discloses a realization method of the embedded-type system for ensuring the completeness of the program, which comprises a configuration process and a running time detection process. The embedded-type system solves the safety problem that the code in the conventional system is easy to be altered, has the advantages of universality, low cost, less running expenditure and the like, and is particularly suitable for ensuring the completeness of the most basic trusted root of the embedded-type system.
Owner:SOUTH CHINA UNIV OF TECH

Single sign-on method and device, electronic equipment and storage medium

PendingCN114218550ASolve writing cookies (data stored on the user's local terminal)Work around the limitation of having to share the same client systemDigital data protectionDigital data authenticationTheoretical computer scienceEngineering
The invention provides a single sign-on method and device, electronic equipment and a storage medium, and belongs to the technical field of artificial intelligence recognition and classification. The method comprises the steps that a first user authentication request is received, and the first user authentication request comprises user authentication information of a first application system; a first token is generated according to the user authentication information of the first application system, and the first token comprises a first user number of the first application system; sending the first token to the first application system; receiving a second user authentication request, wherein the second user authentication request comprises the first token; acquiring a second user number of the first target jump system according to the first user number; the second user number is sent to the first target jump system, and the first target jump system completes login authentication according to the second user number. Therefore, the cross-domain single sign-on function can be realized, all application systems do not need to use the same user system, and meanwhile, the security and credibility of identity authentication can be effectively ensured.
Owner:CHINA CONSTRUCTION BANK

Data protection method and protection device based on block chain

The invention discloses a data protection method based on a block chain. The method comprises the following steps: S1, collecting multi-source heterogeneous data; s2, processing the collected multi-source heterogeneous data into a data stream with a specified format, and extracting a starting time, an ending time and a service type from the data stream to generate a data fingerprint; s3, assembling the obtained start time, end time, service type and data fingerprint into a message; and S4, storing the generated message on the block chain, wherein the original data is still stored in the local database and/or the local file. According to the invention, the multi-source heterogeneous data is converted into the message only containing the start time, the end time, the service type and the data fingerprint, and the message is stored on the block chain, so that the technical problem that in the prior art, the overhead of computing resources, storage resources and bandwidth resources of the block chain is too large due to the fact that all data needs to be recorded and chained one by one is solved; and the problems that the interactive data between the client and the security company is easy to delete and tamper, and the security and completeness of the data cannot be ensured can be solved.
Owner:中信建投证券股份有限公司

Anti-tampering and forgery method of paper secret-related carrier based on RFID key chain

The invention provides a paper secret-related carrier anti-tampering and forgery method based on RFID key chain, which comprises the following steps: step S2, generating a paper secret-related carrierkey chain; Includes S2.1, generating root key V0 of paper secret-related carrier key chain, generating parameters of V0 include: global information character string of paper secret-related carrier, recorded as G, The unique identification ID of RFID tag corresponding to the paper secret-related carrier is recorded as RID. A formula shown in the description is computed and generated by one-way HASH function F, where the symbol shown in the description is string join operator; S2.2, construction of key chain; A summary information string corresponding to a page in each page of that pap secret-related carrier is sequentially obtained, and the key string Vx generate on the previous page of the page is determined by using a one-way HASH function F. 1 and an inner page summary information string S of the page to generate a key Vx-1 of the page; Step S3, the key chain of the paper secret-related carrier is attached to the paper secret-related carrier. The invention realizes the safety protection of the paper secret-related carrier.
Owner:JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products