Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

114results about How to "Ensure credible" patented technology

P2P financing platform fund bank storage management method based on block chain

The invention provides a P2P financial platform fund bank storage management method based on a block chain, a P2P fund storage management system of a first participant, a P2P financial platform application of a second participant, a government platform and an insurance platform of a third participant and the like need to be provided, and all the participants are mutually connected through the block chain network. The block chain network comprises an intelligent contract block chain network and a certificate storage block chain network; after the P2P financing platform application executes thepoint-to-point network borrowing and loan service, the P2P fund storage and management system performs storage and management; and the insurance platform provides insurance service, performs service scheduling and storage through the P2P fund storage and management platform, inquires and analyzes storage data through the government platform, and audits and supervises P2P services. According to theinvention, the whole-process legal management of P2P fund bank storage and management is realized, the data storage difficulty of P2P transaction is reduced, the system performance based on the blockchain technology is improved, the approval process and business transaction complexity of multiple participants in fund hosting are simplified, and the information transparency and the supervision strength are improved.
Owner:FUJIAN RURAL CREDIT UNION

Trusted computing cryptogram platform suitable for general computation platform of electric system

The invention provides a trusted computing cryptogram platform suitable for a general computation platform of an electric system. The cryptogram platform comprises a trusted computing cryptogram module and a trusted software system, wherein the trusted computing cryptogram module comprises a trusted measurement root, a trusted storage root and a trusted report root and is a transferring starting point of a platform trust chain; and the trusted software system comprises a trusted computing cryptogram driving module, a measurement module and an auditing module and provides an interface which uses the trusted computing cryptogram platform for an operating system and application software. The trusted computing cryptogram module is the trusted root which provides trusted environment for the operation of the trusted computing cryptogram platform, and the trusted software system is a core for realizing the functions and the service of the trusted computing cryptogram platform and provides guarantee for the management of the trusted computing cryptogram platform. The trusted computing cryptogram platform can provide functions including static measurement, dynamic measurement, white lists, access control and the like for a business system, and manages the sources and the operation of the system software to guarantee that the software is trusted, recognizable and controllable.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +5

Credible virtual machine platform

The invention discloses a credible virtual machine platform, which comprises a hard disk (11), a USB Key (10) and a nonprivileged virtual machine (6), and also comprises credible hardware (1), a security enhancement virtual machine monitor (2), a management virtual machine (3), a communication virtual machine (4) and a driving virtual machine (5). The security enhancement virtual machine monitor (2) is bidirectionally connected with the credible hardware (1) and the management virtual machine (3) respectively; the management virtual machine (3), the driving virtual machine (5) and the communication virtual machine (4) are privileged virtual machines; the management virtual machine (3) creates, manages, destroys and transfers other virtual machines; the driving virtual machine (5) provides driving needed by the operation of the virtual machine and management of a virtual credible password module; and the communication virtual machine (4) takes charge of communication between inner virtual machines and a virtual machine platform. The credible virtual machine platform has the advantages of effectively guaranteeing the safety and credibility of an operating environment of the virtual machine platform and realizing effective management and control of communication between virtual domains.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Distributed account book technology-based sensor network safety management method and safety system

ActiveCN110445827ASolve centralized management problemsAddress shared access controlDigital data protectionTransmissionData setUniform resource locator
The invention provides a distributed account book technology-based sensor network safety management method. The method comprises the following steps of selecting a top layer and a regional server as alliance chain nodes to establish an alliance chain, and storing a distributed account book; generating an asymmetric key for a sensing and aggregation node at the lower layer of the regional server, solidifying a private key in a memory, and writing a public key into an alliance chain; uploading the data collected by the sensing nodes to a regional server through the aggregation node, storing thedata set in an off-chain database of the regional server and encrypting the data set after the verification is passed, calculating a hash value of the data set and writing the hash value into an alliance chain to serve as an evidence; and S3, decrypting the data set, calculating a hash value of the data set, comparing the hash value with the evidence in the step S3 to verify the correctness of thedata set, and returning a uniform resource locator. The invention further provides a safety system. According to the safety management method, a centralized and effective equipment management mechanism and data safety verification are provided for a large-scale sensor network. The problem of data sharing access control is solved.
Owner:SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI

Industrial Internet identifier analysis access control method based on block chain

The invention discloses an industrial Internet identifier analysis access control method based on a block chain. Relevant information of each identifier in the industrial Internet is stored in a target block chain in advance, and the method comprises the steps of verifying whether a user has an access permission or not according to an intelligent contract under the condition of receiving an analysis request of the user for a to-be-accessed identifier; if yes, obtaining mapping information of the to-be-accessed identifier, and calculating a to-be-accessed hash value of the mapping information;comparing the hash value to be accessed with the hash value stored on the target block chain; and if the comparison is successful, sending the mapping information of the identifier to be accessed to the user. According to the method, each identifier is stored in the target block chain, so that credibility of identifier resources is ensured, and whether a user has access permission or not is verified according to the smart contract; if yes, comparing the hash value to be accessed with a hash value stored on the target block chain; and if the comparison is successful, sending the mapping information of the identifier to be accessed to the user, so that distortion of an analysis result is avoided.
Owner:STATE GRID E COMMERCE CO LTD +2

OTP and user behavior-based certification and authorization method in mobile cloud computing environment

InactiveCN105099690ASolve the problem of not being able to resist decimal attacksEnsure credibleUser identity/authority verificationMobile cloudClient-side
The present invention discloses an OTP and user behavior-based certification and authorization method in a mobile cloud computing environment. The method is characterized in that various intelligent mobile terminals available for users are enabled to be accessed to the cloud service via a wireless network in the mobile cloud computing environment and the bidirectional identity authentication between a client and a server is realized through improving the one-time password (OTP) technology. In this way, the safety and the reliability of the identity authentication process are improved. Meanwhile, according to the specific behavior habits of a user accessed to the cloud service, the features of historical behavior data of the user are analyzed and extracted based on the data mining technology. In this way, a knowledge database of the normal behavior patterns of the user is formed. When the user behaves abnormally or suspiciously, the identity of the user is authenticated again. Only when the user passes the identity authentication process, the corresponding service is authorized for the user. Therefore, the illegal operation of others is avoided, and the information security of the user is fully ensured.
Owner:JIANGSU BOZHI SOFTWARE TECH CO LTD

Project completion management system based on block chain and implementation method thereof

The invention relates to a project completion management system based on a block chain and an implementation method thereof. The system comprises an open interface module, a plan management module, awork package management module, a document management module, a block chain network module, and a database. The open interface module is a channel for interaction between the system and an external application, and the external application accesses the system through the open interface module. A project owner, a contractor and a construction party digitally sign project plan information through the plan management module, and the digital signatures are stored in the block chain network module. The work package management module is used for dividing and assigning work packages to different construction parties, and updates of work package states are stored in the block chain network module. The document management module is used for saving and tracking design documents of system components,and after the design documents are performed by hash calculation, eigenvalues are sent to the block chain network module. The block chain network module adopts a trusted authorization access federation chain system, and is used for storing of a project plan, work package states and design document change information. The information is stored in the database. The system effectively shares projectcompletion information, records changes, and records a completion status.
Owner:鹰投(上海)海洋科技发展有限公司

Block chain consensus device and method and computer readable storage medium

The block chain consensus method comprises the steps of judging whether an undetermined master node exists in a system or not; if so, controlling each slave node to send a data synchronization requestto the undetermined master node; controlling each slave node to verify the received synchronous data block, and if the verification is passed, broadcasting a verification passing message; when the slave node receives more than a first preset number of verification passing messages and the abstract of the last block contained in each piece of verification passing information accords with consistency, switching the slave node from a search state to a slave state, storing the synchronization data block, and sending a synchronization completion message to the undetermined master node; and when the undetermined master node receives more than a first preset number of synchronization completion messages, switching the state to a leader state, and changing to a formal master node. The invention further provides a block chain consensus device and a computer readable storage medium. According to the invention, after the main node is selected, data synchronization and synchronous data verification can be carried out, so that each node keeps data synchronization.
Owner:卓尔智联(武汉)研究院有限公司

Zero-knowledge proof verifiable certificate digital identity management system and method based on block chain smart contract

ActiveCN114186248AImproved Identity Privacy FeaturesIdentity attribute requirements are metDigital data protectionDigital data authenticationDigital identityEngineering
The invention discloses a zero-knowledge proof verifiable certificate digital identity management system and method based on a block chain smart contract. The system comprises a zero-knowledge smart contract and a certificate client. The zero-knowledge smart contract comprises a voucher state smart contract, a zero-knowledge evidence use state smart contract, a zero-knowledge evidence validity verification smart contract and a verifiable voucher validity verification smart contract; the voucher client is provided with three roles: an identity provider, a user and a service provider. The description program for proving the zero-knowledge problem is constructed by the service provider according to the identity attribute requirement of the service, and the user only needs to generate the zero-knowledge evidence according to the zero-knowledge problem program constructed by the service provider and the attribute voucher of the user and submits the evidence to the service provider to obtain the service. And the attribute in the evidence is proved to meet the identity attribute requirement of the service, and meanwhile, the user is proved to be the holder of the generated evidence, so that the dual guarantee of privacy and security is realized.
Owner:YUNNAN UNIVERSITY OF FINANCE AND ECONOMICS +1

Unified authentication and authorization scheme

The invention discloses a unified authentication and authorization scheme, which is composed of an authorization module, a resource module and a client sdk, wherein the authorization module is mainlyresponsible for client verification, user information authentication and issuing of a JWT token after successful authentication; the resource module is mainly responsible for managing open resources by the server; the client sdk cooperates with the server authorization module to complete an authentication and authorization process, obtains the JWT token issued by the server, obtains the user information, and can obtain the specified open resources of the server through the JWT token. A barrier between systems developed based on Java in an enterprise can be broken through, unified management and control of basic information such as user authority are achieved, and the operation management cost of the enterprise is reduced. The access of each subsystem and the access of an external system are finely controlled through a unified authentication and authorization center, so that the credibility of the access system is ensured; basic information sources such as user authority are consistent,communication of all systems in an enterprise can be achieved, and the use cost of staff is reduced.
Owner:徐工汉云技术股份有限公司

Identity authorization method and device, storage medium and equipment

The invention discloses an identity authorization method and device, a storage medium and equipment, and the method comprises the steps of: enabling an authorized party to obtain the declaration information of an authorization party from a registration system, and requesting the authorization party to carry out the identity verification of the authorized party according to the stored identity identification of the authorized party, generating an identity authorization request according to the declaration information of the authorizing party and sending the identity authorization request to theauthorizing party when the identity verification result of the authorizing party to the authorized party is passed; enabling the authorization party to generate verifiable voucher data according to the identity authorization request and send an identifier of the verifiable voucher data to the registration system, so that the registration system updates according to the identifier of the verifiable voucher data; and enabling the authorizing party to send the verifiable credential data to the authorized party so that the authorized party can store the verifiable credential data. Therefore, based on the advantages of decentralization of the blockchain and incapability of being tampered by the outside of the registration system, the security and reliability of identity authorization between the authorizing party and the authorized party can be effectively improved.
Owner:BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN

Distributed energy data management co-processing method and system based on block chain

PendingCN114861167AEnsure the coordination of distributed data resourcesEnsure credibleDigital data protectionPlatform integrity maintainanceData verificationData processing
The invention discloses a distributed energy data management co-processing method and system based on a block chain, and belongs to the technical field of distributed energy data processing. According to the distributed energy data management co-processing method based on the block chain, the data of the distributed energy system terminal is acquired by constructing the distributed acquisition model, so that the credibility of data acquisition is ensured; a trusted computing distributed sandbox is constructed, an isolation environment is provided for data, and the trustworthiness of an operation environment is ensured; constructing a distributed data verification model, and performing credible verification on the isolated data to ensure that the off-chain data is not tampered or damaged; constructing a distributed data twinning model, and carrying out twinning convergence on the data so as to meet a refined optimization decision task; according to the optimization decision making task, a distributed optimization decision making contract model is constructed, the optimization decision making task is divided into micro-task services, cooperative processing of distributed energy data resources is completed, and the scheme is detailed and feasible.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY

Hash calculation method and signcryption method based on homomorphic chameleon Hash function

The invention discloses a Hash calculation method and a signcryption method based on a homomorphic chameleon Hash function. According to the provided homomorphic chameleon hash function, a chameleon hash value result adopts a logarithm form, a signcryption result based on the hash in the signcryption method is also a logarithm form, so that the homomorphic property is achieved, the homomorphic aggregation can be conducted in hash calculation, hash is more efficiently calculated, and the homomorphic chameleon hash function has both the homomorphic state and the key leakage prevention characteristics. The signcryption method is realized on the basis of the homomorphic chameleon hash function, the homomorphic aggregation signcryption ensures the homomorphism, the system public parameters generated by the system initialization are used together by the chameleon hash function and the signcryption, and two password schemes share one set of system parameters, so that multiple function effectscan be realized under one set of shared system parameters, and multiple functions are supported under the same framework. Secondly, the proxy key generation and proxy re-signature steps realize the proxy re-signature, and the non-repudiation is realized through a repudiation step.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Trusted computing-based electric power block chain system

The invention relates to the technical field of trusted authentication, and provides a trusted computing-based electric power block chain system, which comprises an authorization service chain, a logservice chain and a remote certification chain, trusted chips are arranged in blockchain nodes of the authorization service chain, the log service chain and the remote certification chain; the log service chain measures the reputation value of the collection layer terminal in real time through a malicious node detection mechanism based on an intelligent contract, discovers that the terminal can befound in time and removes the terminal out of the network, and prevents the malicious terminal from publishing malicious data. The log service chain and the remote verification chain perform remote integrity verification on the terminal requesting to access the system through the trusted chip; the authorization service chain carries out strategy verification on the terminal requesting to access the system. The system detects the access authority of a visitor through two aspects of integrity proof and access strategy verification, guarantees the credibility of an access terminal, comprehensively maintains the safe and credible operation of the power block chain system, and protects the private data in the power block chain.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +1

Data trusted processing method and system fusing trusted computing and block chain

The invention discloses a data trusted processing method and system fusing trusted computing and a block chain, and belongs to the technical field of energy data processing. The invention discloses a data trusted processing method and system fusing trusted computing and a block chain. The data trusted processing method and system are mainly used for solving the energy data trust problem before energy data is chained in the current block chain application process and the environment trusted problem of service computing. Aiming at the problem of credibility of uplink energy data, starting from two aspects of an Internet of Things acquisition end or an Internet of Things energy data acquisition platform, a method of fusing a credible computing technology and a block chain technology is adopted, and Internet of Things acquisition equipment, an oracle machine and an on-chain and off-chain energy data credible verification model are embedded through credible computing; the credibility of energy data collection, transmission and storage processes is realized, and the credibility of energy data collection is ensured in combination with security monitoring of credible computing. In order to solve the problem of a service computing environment, the invention provides a computing architecture combining trusted computing and a state channel, so that service computing is carried out on energy data under the condition of privacy protection.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products