Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

60results about How to "Enable secure sharing" patented technology

Method for safely sharing mobile cloud storage light-level data

The invention discloses a method for safely sharing mobile cloud storage light-level data. The method comprises the steps that an attribute set is registered in a credible third party by a data owner, the attribute set is assigned to a user by the data owner, the user is authorized by the credible third party through an attribute code mechanism according to the attribute set of the user, so that an attribute key is generated, when the data owner uses a mobile side to share a file, the file is firstly encrypted through a symmetric cryptography mechanism, a symmetric key is encrypted through a proxy encryption server by the utilization of an attribute key mechanism, a file ciphertext and a key ciphertext are sent to a cloud side, after the file ciphertext and the key ciphertext are read from the cloud side by the user, the attribute code mechanism is used by a proxy decryption server to decrypt the file, an authority limit alteration statement is sent to the credible third party and the cloud side by the data owner, and judgments are made by the credible third party and the cloud side, so that authority limits of the user are increased or deleted. According to the method for safely sharing the mobile cloud storage light-level data, the data can be safely shared on the mobile side on the conditions that electric quantity and computing power are limited.
Owner:HUAZHONG UNIV OF SCI & TECH

Quantum secret communication network system based on quantum key distribution technology, and application thereof

The invention discloses a quantum secret communication network system based on quantum key distribution technology, and an application thereof. The quantum secret communication network system physically comprises an access node, a switching node and a relay node, the nodes are respectively connected by using classic channels and quantum channels, wherein the classic channel for quantum key distribution performs communication in a non-IP mode; and the network system is logically divided into a quantum key distribution layer, a relay link layer, a network transmission layer, a service provisionlayer and a user application layer from bottom to top. The quantum secret communication network system disclosed by the invention overcomes the single point failure problem caused by a centralized routing server in the existing network; and the quantum secret communication network system disclosed by the invention communicates the classic channel for quantum key distribution in the non-IP mode, thereby effectively avoiding the network attacks for the TCP/IP technology, and the communication protection based on a quantum key is used as a basic function to further enhance the transmission security of the classic channel.
Owner:中共中央办公厅电子科技学院 +1

Manufacturing industry cross-domain heterogeneous data identity construction and tracing method based on block chain

The invention provides a manufacturing industry cross-domain heterogeneous data identity construction and tracing method based on a block chain. The method comprises the steps that firstly, a data tracing proxy is preset in the multi-data processing stage of an intelligent manufacturing industry supply chain collaborative cross-domain system, and data interaction with the block chain system is achieved through the proxy; a data tracing proxy extracts data internal fingerprints which can be shared and are written into a database of each enterprise, a lightweight elliptic curve feature extraction algorithm is designed by combining external association attribute features of the data, internal and external cause joint features are further extracted and signed, and a data credible security label combining internal and external factors is constructed. Secondly, an intelligent contract is called, in the multi-data processing stage of the supply chain cooperative cross-domain system, a recordis generated and stored in a data mapping logic chain in a block chain, a multi-party consensus mechanism based on the block chain and a tamper-proof characteristic are combined with the automation capability of an intelligent contract in the block chain, and multi-scale and multi-data processing stage data identity chain tracing is realized.
Owner:INST OF INFORMATION ENG CAS

Realization method and system for community-based educational resource sharing service interface

The embodiment of the invention discloses a realization method and system for a community-based educational resource sharing service interface. The method comprises the steps that general users log in a cloud server and then carry out uploading operation, thereby uploading educational resources to the cloud server; the cloud server classifies the educational resources and websites uploaded by the users and stores the classified educational resources to the cloud server; when a user accesses a community website, the community website sends a resource obtaining request to the cloud server; and the cloud server authenticates the resource obtaining request, judges whether the user has access and downloading authority for obtaining the educational resources or not, if the access request is authenticated successfully, the educational resources are obtained successfully, and the requested educational resources are issued to the community website. According to the embodiment of the invention, the resources are uniformly stored through cloud computing, the community resources are shared securely, the educational resources are shared, the repeated resources are reduced, the space is saved, and moreover, the storage and sharing security of the educational resources is improved.
Owner:SUN YAT SEN UNIV

Attribute-based anti-collusion attack proxy re-encryption method

The invention provides an attribute-based anti-collusion attack proxy re-encryption method, which relates to the technical field of data encryption, and comprises a system parameter setting module forinputting a security parameter 1<n> and generating a system public parameter params and a main private key MSK; a private key generation module for inputting params and MSK into an attribute list L to generate a private key SK<L> and a corresponding public key PK<L>; an encryption module for inputting params, L, PK<L>, an access structure (W, rho) and a message M, wherein the algorithm returns ciphertext; a re-key generation module for inputting params, attribute lists L1, l2 and the secret key of the attribute list L1, wherein the algorithm returns the re-encryption secret key shown in the description; a re-encryption module for inputting the params, a new access structure (W', rho') and the ciphertext corresponding to the attribute list L1, wherein the algorithm returns the ciphertext corresponding to the re-encrypted L2; and a decryption module for inputting the params, the ciphertext C<L> and the private key SK<L>, wherein the algorithm returns a message M or a terminator T upsidedown. The proxy re-encryption method has the characteristics of quantum attack resistance, unidirectionality, reusability and collusion attack resistance.
Owner:HUAIBEI NORMAL UNIVERSITY

Device authentication method, device access method and device

The embodiment of the invention provides an equipment authentication method and device and an equipment access method and device. The equipment authentication method comprises the steps that an equipment authentication information synchronization request is sent to a server; receiving equipment authentication information returned by the server; receiving an identity authentication request sent bya user, the identity authentication request comprising user authentication information, the user authentication information being information generated by receiving user information returned by the server after the user sends a user information request to the server; and authenticating the user by adopting the equipment authentication information and the user authentication information. Accordingto the embodiment of the invention, the method comprises the steps: carrying out the processing, the equipment synchronizes the equipment authentication information; the user is authenticated by adopting the equipment authentication information and the user authentication information, and the equipment accepts the access of the local area network user after the authentication succeeds, so that theproblem of safety holes caused by not performing identity authentication on the local area network user can be avoided, and the identity authentication of the equipment to the user and the safety sharing of the Internet of Things equipment are realized.
Owner:ALIBABA GRP HLDG LTD

Data security sharing method, storage medium and computing equipment

The invention discloses a data security sharing method, a storage medium and computing equipment. The method comprises the following steps: firstly, determining a plurality of user sets and learning targets and training conditions of participating mechanisms in the user sets; dividing parameters of each server into current parameter secret shares and sending the current parameter secret shares tothe participating mechanisms; reconstructing, by the participating mechanism, the current parameter secret share and performs cooperative deep learning training, dividing the obtained updated parameters into updated parameter secret shares and sending the updated parameter secret shares to the server; verifying, by the server, whether the parameters are legal or not according to the updated parameter secret shares, and if yes, adding the updated parameter secret shares into the parameter secret shares currently owned by the server; and when all participation mechanisms reach the learning target, dividing the latest parameters of each server into latest parameter secret shares, and then sending the latest parameter secret shares to the participating mechanisms, thereby completing data security sharing. According to the invention, the parameter security can be ensured while the privacy is protected, and the data security sharing among different participating mechanisms is realized.
Owner:JINAN UNIVERSITY

Manufacturing industry staff information management method and system, electronic device and storage medium

The present invention discloses a manufacturing industry staff information management method and system, an electronic device and a storage medium. The method comprise the steps of: when a query request of a requester is received, determining public keys and private keys itself; employing a pre-established smart contract to inquire staff information corresponding to the query request on a blockchain, and employing the public keys to perform encryption operation for the staff information; and sending the encrypted staff information and the private information to the requester to allow the requester to employ the private keys to perform decryption operation of the encrypted staff information. The manufacturing industry staff information management method employs the blockchain technology tostore the manufacturing industry staff information, each blockchain node device has the public keys and the private keys corresponding to itself, and the features of the blockchain decentration and the asymmetric encryption are employed to allow the staff information not be easily leaked so as to achieve the safety sharing of the human resource information while guaranteeing the enterprise benefit.
Owner:GUANGDONG UNIV OF TECH

Cross-network security data sharing method and system based on block chain

The invention relates to a cross-network security data sharing method and system based on a block chain in an information transmission technology. The cross-network security data sharing method specifically comprises the following steps: enabling a block chain to receive a cross-domain request transaction to an intranet of an institution sent by a request application end proxy node; verifying whether the cross-domain request transaction conforms to a loaded verification rule or not, and sending a verification result to a request application end proxy node; if the verification result is yes, receiving meta-information of shared data sent by the application end proxy node to the intranet receiving end proxy node in a cross-network manner; storing the cross-domain request transaction and the meta-information to generate a new block; wherein the block link receives cross-domain request transactions and meta-information which are from the Internet application end agent node or the intranet application end agent node and send data to the intranet. Cross-gatekeeper data sharing records are stored through a block chain, rule verification is automatically executed through an intelligent contract, cross-domain safe sharing of automatic data is achieved in cooperation with a cross-network communication agent, the real-time performance is high, and the efficiency is high.
Owner:HANGZHOU QULIAN TECH CO LTD

Data processing method and device based on block chain, equipment and storage medium

The embodiment of the invention discloses a data processing method and device based on a block chain, equipment and a storage medium. The method comprises the steps of receiving an acquisition request of a first medical institution for medical data of a target user; reading an authorization record about the medical data of the target user from the first block chain network according to the acquisition request; verifying whether the first medical institution has the authority of acquiring the medical data of the target user according to the authorization record; if the first medical institution does not have the authority, refusing to send the medical data of the target user to a terminal device corresponding to the first medical institution; and if the first medical institution has the authority, reading the medical data of the target user from the second block chain network, and sending the medical data of the target user to a terminal device corresponding to the first medical institution. By adopting the method and the device, the medical data of the target user can be safely shared among multiple medical institutions, the method and the device are suitable for the field of smart medical treatment, and construction of a smart city can be further promoted.
Owner:深圳平安智慧医健科技有限公司

Regional government affair collaborative office system based on block chain and multi-tenant technology

InactiveCN109784864ARealize collaborative officeEnable secure sharingOffice automationTimestampOriginal data
The invention relates to a regional government affair collaborative office system based on a block chain and a multi-tenant technology, and belongs to the field of electronic government affairs. The method comprises: on a platform of a constructed government affair collaborative office system, government departments use the same multi-tenant software to isolate original data of a natural person oran enterprise legal person, and metadata is uploaded to a block chain network; And the department A submits authorization materials of the natural person or the enterprise legal person through the client of the block chain network, and automatically searches metadata information in the block chain network. If metadata information related to services exists, the authorization materials are sent todepartments corresponding to the metadata, the departments send electronic certificates to the department A in a single-channel encryption mode in multi-tenant software, and the block chain network records electronic certificate codes, timestamps, IDs and authorization material Hash values. By combining the block chain and the multi-tenant technology, data isolation of all departments of the government and collaborative office of government departments are achieved, and government affair service efficiency is improved.
Owner:山西创时代数智创新研究院有限公司

Blockchain medical data management method based on distributed attribute signature and system

ActiveCN109979550AAttribute validationDo not reveal identityDigital data protectionPatient-specific dataHash functionFinancial transaction
The invention discloses a blockchain medical data management method based on distributed attribute signature and a system. The method comprises the following steps of S1, generating a global parameterof the distributed attribute signature and selecting a Hash function; S2, producing a signature secret key and a verification secret key which correspond with each attribute by each attribute authority mechanism; S3, generating a signature secret key set which corresponds with the global identity identification and the attribute set of a user by the user; S4, after generating EHR data by the user, storing the signature in an off-chain database, performing address signature on the HER data, and issuing the address signature in the blockchain; and S5, firstly verifying the signature attribute of the address which is stored in an on-line transaction by the user, and finding the EHR in the off-chain database through the address and verifying the attribute of a data signature person. The blockchain medical data management method and the system have advantages of protecting identity information of the signature person, realizing EHR data safe sharing over different CDO systems, and settlinga problem of blockchain storage capacity limitation through an on-chain and off-chain coordinated storage mode.
Owner:INST OF INFORMATION ENG CAS

Medical data management system based on double block chains and patient authorized medical record sharing method

PendingCN113764060ADefend against attackAvoid the risk of medical disputesDatabase distribution/replicationDigital data protectionMedical emergencyIn patient
The invention discloses a medical data management system based on double block chains and a patient authorized medical record sharing method, and relates to the technical field of authenticated key negotiation algorithms. The medical data management system comprises a medical block chain, a supervision block chain, a medical record storage end, a medical record access control endfor sending medical record access authorization to a medical record request end and calling an intelligent contract to store health records containing medical record keywords, and a medical record request end which is used for acquiring active authorization and requesting data from the medical record storage end when the patient is awake and calling the intelligent contract to search the health record matched with the fingerprint of the patient when the patient is coma so as to request data from the medical record storage end. According to the system and the method, a graded workload proof consensus mechanism is adopted, the speed of generating the new block is changed according to the emergency degree of the transaction, a double-chain structure is used for supervising the data on the chain, and privately mining attacks are effectively resisted.
Owner:ANHUI NORMAL UNIV

A data security sharing exchange method and data security sharing exchange platform system

The invention provides a data safety sharing and exchanging method and system. The system comprises a block chain infrastructure, a block chain storage library, an access agent subsystem and a request agent subsystem. The data safety sharing and exchanging method comprises the steps that the access agent subsystem receives description information of first target data, and publishes the description information to the block chain storage library; the request agent subsystem chooses description information of second target data from the description information, generates a data authority request and publishes the data authority request to the block chain storage library; the access agent subsystem obtains the data authority request, replies to the data authority request, and publishes authority reply information to the block chain storage library; the request agent subsystem obtains the authority reply information and judges whether the authority reply succeeds or not, and if yes, the request agent subsystem publishes a data access request of the second target data to the block chain storage library; the access agent subsystem obtains the data access request of the second target data from the block chain storage library, and provides the second target data for a data demand party corresponding to the request agent subsystem.
Owner:北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products