Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

47results about How to "Enhanced non-repudiation" patented technology

Authentication system based on biological characteristics and identification authentication method thereof

The invention relates to an authentication system and an authentication method based on biological features. The method comprises the steps of conducting centralized storage and biological feature comparison operation for a large quantity of user biological feature templates according to user ID identifiers stored on a memory on a limited use machine and corresponding biding ID identifiers thereof on a biological authentication device of a digital processing terminal; separating the biological feature templates from the authentication function of the limited use machine; allocating to digital processing terminals (including PCs, notebooks or mobile phones, PDAs of users)of users as biological authentication device-storing the biological feature templates with decentralization and operating and processing biological features to be authenticated with decentralization so as to conduct comparison with the biological feature templates pre-stored on the respective digital processing terminals; feeding back comparison and verification results to the limited use machines; authorizing to conduct equal authentication of the biological authentication device ID identifier on the digital processing terminal for the corresponding binding user ID identifiers by the centralized authentication of the limited use machine according to the comparison verification result data.
Owner:刘洪利

Warehouse receipt transaction security enhancing method in warehouse receipt system based on blockchain

The present invention discloses a warehouse receipt transaction security enhancing method in a warehouse receipt system based on the blockchain. The method comprises that: public keys and private keys capable of verifying the identity of each node are generated by using a CA certification mechanism, wherein the warehouse receipt issuance node of the warehouse receipt system is taken as the node of a sender, a warehouse receipt is generated after the completion of warehousing, and warehouse information is encrypted by using the public key of the receiver to form a ciphertext; the ciphertext is signed by using the private key of the receiver, and a transfer order is made to be sent to the node of the receiver in the form of the broadcasting; and in each process of warehouse receipt transaction, the intermediate node and the node of the receiver use the public key of the sender to verify and sign the transfer order, and if the receiver needs to use the warehouse receipt, the private key of the receiver must be used to decrypt the warehouse receipt information on the transfer order. According to the warehouse receipt transaction security enhancing method in the warehouse receipt system based on the blockchain provided by the present invention, through the double verification mechanism of CA certification, and encryption and signature, the security of the warehouse receipt transaction and the privacy of the warehouse receipt system are improved.
Owner:深圳市华深安信科技有限公司

Double-line architecture express delivery information protection method based on mobile terminal

The invention provides a double-line architecture express delivery information protection method based on a mobile terminal for research on informatization management correlation technologies in the express delivery industry. According to the invention, when a dispatcher collects an express, privacy information of a user is input in a client-side local database of the dispatcher, palm print authentication is used for replacing traditional sign authentication, and an only two-dimension code generated according to express information is attached to the express; then the express information is blocked by improving a SQLCipher encryption database, and the safety of the express information is ensured; and during express delivery, the privacy information of the user is transmitted between dispatchers in a Bluetooth manner by means of the two-dimension code, the privacy information of the user is isolated from the dispatchers, express companies and the like, and the express is transported through a traditional logistics network. In order to improve the efficiency of express delivery business, an oriented push-out sorting model based on a net structure is provided, a path optimization scheme based on a Floyd algorithm is designed, and the sorting model and the path optimization scheme are enabled to cooperate with and compensate each other.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Duplicating monitoring system

The invention discloses a duplicating monitoring system and relates to the technical field of computer technology and information safety. The system comprises a monitoring terminal and a server, wherein the monitoring terminal is used for locking and unlocking a duplicator to obtain identity information and image information of a duplicator user and duplicating logs and duplicating contents of a legal user, and the identity information, the image information and the duplicating logs and the duplicating contents of the legal user can be uploaded to the server by the monitoring terminal in real time, and the server is used for checking legality of the user, receiving the user's identity information, image information, duplicating logs and duplicating contents sent by the monitoring terminal, generating an audit report which includes the identity information and the image information of the legal user and the corresponding duplicating logs and contents of the legal user, and supplying inquiry of the audit report. The system has the advantages that the duplicator is controlled to be merely used by authorized users, the duplicating logs can be comprehensively, accurately and automatically recorded, simultaneously the audit report of the duplicating logs is supplied, and the system is convenient for administrative stuffs to inquire and audit the duplicating operation.
Owner:BEIJING LANXUM COMP TECH

Multi-channel active type network identity verification system and network identity verification device

The invention provides one of multi-channel active type network identity verification systems. The multi-channel active type network identity verification system comprises a user end device and a service providing end system. The service providing end system comprises a service processing module and a safety certificating module. When the service processing module receives a service request sent from the user end device through a first transmission channel, the safety certificating module can generate a challenge value through a challenge response algorithm, and the service processing module is used for transmitting the challenge value to the user end device. The user end device generates a response value corresponding to the challenge value through a verification data generating module, the response value is encrypted to generate safety verification data, then the safety verification data is sent back to the safety verification module in a short message mode through a second transmission channel, and a network identity verification program can be completed. According to the system, non-repudiation and safety of the safety verification data sent by the user end device can be improved, and accuracy and reliability of network identity verification can be effectively strengthened.
Owner:JRSYS INT

Data security management system and method

ActiveCN107911393AEnhance non-repudiationGuaranteed confidentialityTransmissionData securityCommon key
The invention provides a data security management system and method. The system comprises a security service subsystem and a security support subsystem, wherein the security service subsystem is usedfor encrypting a to-be-stored data plaintext according to encryption configuration information so as to obtain a data ciphertext and an encryption identification code, and sending the data ciphertextand the encryption identification code to a storage pool for associated storage; and encrypting encryption process information by using a pre-configured user root key, and submitting the encrypted encryption process information and the encryption identification code to the security support subsystem; and the security support subsystem is used for decrypting the encrypted encryption process information by using a user public key; and mapping the decrypted encryption process information according to the encryption identification code carried in a decryption request, processing the encryption process information, generating decryption configuration information and feeding back the decryption configuration information to the security service subsystem, so as to enable the security service subsystem to generate the data plaintext corresponding to the data ciphertext according to the decryption configuration information to deliver the data plaintext to a target application to meet service demands.
Owner:北京明朝万达科技股份有限公司

Digital signature authentication system based on third party and authentication method

The invention discloses a digital signature authentication system based on a third party and an authentication method, belonging to the technical field of communication and comprising a user management center, a user terminal, a user password and a digital signature authentication center. The user terminal performs digital signature to relevant information by utilizing USBKey after receiving a user service request and sends digital signature information to the user password and the digital signature authentication center; the user password and the digital signature authentication center validate the digital signature and then send an instruction generated by information such as the banking account of a user and the like to relevant banks through a special network, and the banks return a processed result to the user password and the digital signature authentication center after checking and processing the account information of the user; the user password and the digital signature authentication center send a service request to the service department and return the service processed result to the user terminal, and the user terminal finishes the service. The invention has the advantages of safety, reliability, high efficiency and easy expansion, thereby being suitable for communities.
Owner:XIDIAN UNIV

Data processing method and device

ActiveCN111953479AReduce the risk of single point of failureImprove securityKey distribution for secure communicationKey generationSecret share
The invention provides a data processing method and device. The data processing method comprises the steps that an ith secret key generation center obtains a first parameter xi and a first secret sharing share, the ith secret key generation center is any one of m preset secret key generation centers, the first parameter xi is a random positive integer, and m is an integer larger than 1; the ith key generation center generates a second secret sharing share according to the first parameter xi and the first secret sharing share; and the ith key generation center sends the first parameter xi and the second secret sharing share to the user. According to the technical scheme provided by the invention, the plurality of key generation centers participate in the generation process of an identification private key, so that security and non-repudiation of the identification private key are improved, and the load of a single key generation center and the cost of single-point failure are reduced.
Owner:HUAWEI TECH CO LTD

Quantum secret communication system based on secret sharing and communication method thereof

The invention discloses a quantum secret communication system based on secret sharing and a communication method thereof. The system comprises a plurality of user sides and a quantum communication service station, wherein the service station serves as an issuing service station or an access service station of the user side, the service station private key and the public keys of all service stations are stored in the service station secret key card, the user side private key and the issuing service station public key are stored in the user side secret key card, the ID of the user side carries the information of the issuing service station, the user side sends a login application to the issuing service station, and a dialogue secret key is generated in the login application process. According to the method provided by the invention, the user side is set to access the plurality of access service stations, the problem that identity authentication cannot be carried out due to limited maximum connection number is prevented, and the capability of providing key service of the network is improved; identity authentication is carried out by adopting encryption modes such as random numbers, offset and the like; the effectiveness and the non-repudiation of identity authentication are high.
Owner:南京如般量子科技有限公司 +1

Digital certificate application method and system, fog node and certificate authority center

The present invention provides a digital certificate application method and system, a fog node and a certificate authority center. The method for applying to the fog node includes: sending a traditional certificate request to an external certificate authority center; using a traditional private key to sign a unique identification number when a traditional digital certificate and the traditional private key sent by the external certificate authority center according to the traditional certificate request is received; sending an update certificate request carrying the traditional digital certificate and the signed unique identification number to the external certificate authority center; generating a fog node secret key according to a preset secret key generation rule while a central secretkey sent by the external certificate authority center is received; generating a new public key and a new private key according to the central secret key and the fog node key; sending the new public key, the traditional digital certificate, and the unique identification number to the external certificate authority center so that the external certificate authority center to publish a new digital certificate for the new public key according to the traditional digital certificate and the unique identification number. The scheme can improve the security of fog node communication.
Owner:INSPUR GROUP CO LTD

Cloud terminal identity authentication method based on blockchain encryption and biological information identification

The invention relates to a cloud terminal identity authentication method based on blockchain encryption and biological information identification. The method comprises the steps of identity information authentication file issuing and identity information authentication login; identity information authentication file issuing comprises the steps of acquiring related information of an identity authentication applicant; encrypting the related information based on a blockchain elliptical encryption algorithm to generate an identity information authentication file, storing the identity information authentication file in a distributed storage system in a slicing manner, and storing the identity information authentication file in an identity authentication information storage medium at the same time; and issuing the identity information authentication file to an identity authentication applicant; the identity information authentication login comprises the following steps of enabling a cloud server to determine a user identity according to an identity information authentication file in an identity authentication information storage medium; and recording identity information authentication login operation and updating the identity information authentication file through the distributed storage system. According to the invention, all-round protection of user data security can be realized,and the possibility of cracking is greatly reduced.
Owner:中国大唐集团科学技术研究总院有限公司

Large agricultural product traceability management system based on block chain technology

The invention discloses an agricultural product traceability management system based on a block chain technology. The agricultural product traceability management system comprises a management node, an agricultural product benefit related party node and a block chain management and block chain traceability subsystem. The management node is a platform root node, and the agricultural product benefitrelated party node is a collaborator and is responsible for uploading related process tracing data; the management node is in point-to-point connection with each agricultural product benefit relatedparty node through a P2P network. The block chain management subsystem is deployed on a management node server and is used for key management, node addition, data uploading and data retrieval; the block chain traceability subsystem is used for uploading data, generating a two-dimensional code and retrieving the data; the secret key management adopts an asymmetric secret key management system and is used for generating a pair of secret key public key and private key for the newly added node, and the public key is used for encrypting data and verifying signatures; and the private key is used fordecrypting the data and the personal signature. According to the agricultural product traceability management system, data cannot be tampered, the system is complete and real, and the trust problem of agricultural product traceability can be solved.
Owner:云南天质弘耕科技有限公司

Electricity stealing evidence data processing method and system based on space-time body measurement four-dimensional data

The invention provides an electricity stealing evidence data processing method and system based on space-time body measurement four-dimensional data, and belongs to the technical field of data processing. Data to be processed is decomposed into time data, space position data, quantitative data and a data carrier by using a preset four-dimensional data model; according to the first dynamic event window, the second dynamic event window, the fourth dynamic event window and the fifth dynamic event window, the time data, the spatial position data, the quantitative data and the data carrier are reconstructed based on the D-S evidence theory; a credible timestamp signature is added to the reconstructed data to obtain final electricity stealing evidence key data; according to the method, a space-time body measurement four-dimensional evidence chain processing mechanism is established, original data, field detection evidence and field image evidence are refined into four dimensions of time, position space, quantitative data and data carriers, and relevance (obtained by time, places and the same equipment) among the evidences is enhanced; and the authenticity, integrity and effectiveness of the evidence data are improved.
Owner:国网山东省电力公司营销服务中心(计量中心) +1

Method for protecting digital certificate by iris recognition technology

The invention relates to a method for protecting a digital certificate by an iris recognition technology. The method for protecting the digital certificate through the iris recognition technology comprises an iris acquisition instrument, a server, a client side and an iris recognition terminal, and comprises the following steps that a certificate issuing mechanism issues the digital certificate toa user, and iris image information is converted into binary iris information P1 through the iris acquisition instrument according to the iris image information of the user; binary exclusive-OR operation is carried out on the iris template P1 and certificate private key data to generate a ciphertext K1, and the ciphertext K1 is stored; the iris template data of the user is encrypted into a ciphertext P2 by using algorithms such as AES/SM2 and the like, and the ciphertext P2 is stored; a user uses the iris acquisition instrument to adopt the iris image information P1, the iris information is sent to a server, and the server converts the received user iris image information into binary iris information P2; and the server decrypts the locally stored user iris data to obtain an iris template P3, and the P2 is compared with the P3.
Owner:吉林无罔生物识别科技有限公司

An identity authentication device combining digital signature, handwriting and fingerprint

The invention relates to an identity authentication device and method with a digital signature, handwriting and a fingerprint combined. The identity authentication device with the digital signature, the handwriting and the fingerprint combined comprises a main control module, a fingerprint module and a handwriting module, wherein the main control module is connected with a PC, or an external connecting disk, or a mobile terminal via a USB / a serial port / a wired network / a WIFI external data interface, the handwriting module is used for adding a handwriting signature to a relevant position of an electronic document under the condition that a user needs to carry out a traditional signature on the electronic document, the fingerprint module is used for obtaining a fingerprint image and delivering the fingerprint image to the main control module, the main control module will carry out identity authentication based on the fingerprint image and add the fingerprint to a relevant position of the document, and the main control module is used for providing an encryption and decryption algorithm and a fingerprint algorithm, main logical processing, external control and communication data processing. The identity authentication device with the digital signature, the handwriting and the fingerprint combined has the advantages that a traditional signature mode can be achieved in the paperless office environment, usage habits of a user are changed as few as possible, the application reliability is higher than that achieved by only usage of a PKI system, and the problems that the traditional paper signature is prone to damage, difficult to inquire, and high in saving cost are solved.
Owner:HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD

A digital certificate application method, system, fog node and certificate authority center

The present invention provides a digital certificate application method and system, a fog node and a certificate authority center. The method for applying to the fog node includes: sending a traditional certificate request to an external certificate authority center; using a traditional private key to sign a unique identification number when a traditional digital certificate and the traditional private key sent by the external certificate authority center according to the traditional certificate request is received; sending an update certificate request carrying the traditional digital certificate and the signed unique identification number to the external certificate authority center; generating a fog node secret key according to a preset secret key generation rule while a central secretkey sent by the external certificate authority center is received; generating a new public key and a new private key according to the central secret key and the fog node key; sending the new public key, the traditional digital certificate, and the unique identification number to the external certificate authority center so that the external certificate authority center to publish a new digital certificate for the new public key according to the traditional digital certificate and the unique identification number. The scheme can improve the security of fog node communication.
Owner:INSPUR GROUP CO LTD

Duplicating monitoring system

The invention discloses a duplicating monitoring system and relates to the technical field of computer technology and information safety. The system comprises a monitoring terminal and a server, wherein the monitoring terminal is used for locking and unlocking a duplicator to obtain identity information and image information of a duplicator user and duplicating logs and duplicating contents of a legal user, and the identity information, the image information and the duplicating logs and the duplicating contents of the legal user can be uploaded to the server by the monitoring terminal in real time, and the server is used for checking legality of the user, receiving the user's identity information, image information, duplicating logs and duplicating contents sent by the monitoring terminal, generating an audit report which includes the identity information and the image information of the legal user and the corresponding duplicating logs and contents of the legal user, and supplying inquiry of the audit report. The system has the advantages that the duplicator is controlled to be merely used by authorized users, the duplicating logs can be comprehensively, accurately and automatically recorded, simultaneously the audit report of the duplicating logs is supplied, and the system is convenient for administrative stuffs to inquire and audit the duplicating operation.
Owner:BEIJING LANXUM COMP TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products