Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

424results about How to "Ensure information security" patented technology

Multi-signature transaction information processing method for data transaction platform based on block chain

The invention discloses a multi-signature transaction information processing method for a data transaction platform based on a block chain. Each of a buyer and a seller generates a transaction key pair at self client, and the data transaction platform generates and distributes a single transaction key pair for each transaction process; the seller releases data to be transacted on the block chain via the data transaction platform; after the buyer submits a transaction application, an intermediate address is generated according to a three-party public key, money is transferred to the intermediate address after payment, and the seller receives the money, writes the money into the block chain, then encrypts data and sends the encrypted data to the buyer; after the buyer receives the data, if transaction is acknowledged, the double parties sign, and the money is transferred to the address of the seller; and if objection exists, the data transaction platform makes a judgment, and determines to transfer the money to the buyer or the seller according to the judgment result. Data and transaction information during transaction of the double parties are processed in a special regional chain manner, and meanwhile, the data transaction platform cannot embezzle the transaction money, so that the security of digital assets during transaction is further guaranteed.
Owner:浙江数秦科技有限公司

Internal threat detection system based on mining of business process model and detection method thereof

The invention relates to an internal threat detection system based on mining of a business process model and a detection method thereof. The detection system comprises a model mining module, an abnormality detection module and an abnormality analysis model, wherein the model mining module implements model mining according to an event log of each business event in a business system, and thus acquires a business control flow model, a business performance model and an executor behavior model; the abnormality detection module detects logic abnormality, performance abnormality and behavior abnormality of the event log generated during a real-time operation process of a business activity according to the model mining module; and the abnormality analysis model parses a detection result of the abnormality detection module, recognizes execution information about implementation of an internal threat and outputs the information. According to the internal threat detection system based on mining of the business process model established in the invention, the internal threat behavior existing in the business execution process is effectively detected, a powerful support is provided for enterprises and various organizations to prevent the internal threat, and information security of enterprises and organizations is effectively ensured.
Owner:THE PLA INFORMATION ENG UNIV

Vehicle-road communication test system and test method on 5G technology

The invention discloses a vehicle-road communication test system based on the 5G technology. A network element function is realized by adopting a virtualization and software mode; the network transmission rate can be obviously improved; concurrent network messages of dense network terminals in the Internet of Vehicles environment are ensured. the requirement of complex and huge Internet of Vehicles application on ultra-low time delay is met; the system cloud server adopts a virtualization technology. the number of servers is reduced; in a security aspect, multiple network slices are divided, asecurity isolation and height self-control special logic network is provided; network security is greatly improved, the information security of the Internet of Vehicles application and the data privacy of the user are ensured; the edge cloud server sinks a part of services to a network edge; the Internet of Vehicles application service processing speed based on roadside equipment can be remarkably increased, lower transmission delay is provided, the test platform can be used for verifying the actual effectiveness of the 5G technology applied to the Internet of Vehicles application, and support is provided for 5G-based Internet of Vehicles equipment layout and network design in a real scene.
Owner:CHANGAN UNIV

Tamper-proof license camera system and method

The invention discloses a tamper-proof license camera system and method. The tamper-proof license camera system comprises a license camera, a license camera access server and a license cloud storage, wherein the license camera comprises a license original picture shooting module, an access modification prohibition module, a watermark encryption module and a transmission communication module. The tamper-proof license picture shooting method comprises the following steps: shooting license original pictures by the license camera; in the process of shooting and generating the license original pictures, prohibiting users or other software to access the original picture data, and prohibiting users or other software to modify the license original picture data; writing the shot license original pictures into a fragile watermark and encrypting the shot license original pictures; performing compression and secondary encryption on the pictures after being performed watermark encryption, and transmitting the pictures to an independent storage space of a license cloud storage end for conservation. The tamper-proof license camera system and method provided by the invention can guarantee the authenticity and timeliness of pictures in the processes from imaging to generating standard license pictures, submitting and transmitting, prevent pictures from being tampered, and can very conveniently and easily acquire the license pictures.
Owner:GUANGZHOU XINGFU NETWORK TECH

Password-protecting system and method

The invention provides a password-protecting system comprising a setting module, an encrypting module, a storing module, a receiving module, a time-obtaining module, a matching module, a prompting module and a right-granting module. The setting module is used for setting an account and a plurality of passwords thereof, wherein the passwords correspond to a plurality of periods of time; the encrypting module is used for encrypting and calculating the account, the periods of time and the corresponding passwords to generate keys; the storing module is used for storing the keys to a time-sharing password data dictionary; the receiving module is used for receiving the input account and the passwords; the time-obtaining module is used for obtaining system time and calculating a period of time corresponding to the system time; the matching module is used for encrypting and calculating the input account, the passwords and the calculated periods of time to generate a verification key and matching the verification key with the keys in the data dictionary; the prompting module is used for prompting the verification failure of a user identity in case of unsuccessful match; and the right-granting module is used for confirming the user identity in case of successful match. The invention also provides a password-protecting method, can more effectively protect the account and the passwords of a user and ensures the information security of the user.
Owner:HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1

Multi-user multi-parameter wireless detection, diagnosis, service and monitoring system

The invention relates to a multi-user multi-parameter wireless detection, diagnosis, service and monitoring system which comprises a detection terminal and a medical establishment central processing terminal connected to the detection terminal through a network, wherein the detection terminal comprises a patient information reading module, a measuring module and a first transmission module. The first transmission module transmits patient physiological data measured by the measurement module to the medical establishment central processing terminal through the network. The medical establishment central processing terminal comprises a central analysis and diagnosis database and a second transmission module, and the second transmission module transmits data between the first transmission module and the central analysis and diagnosis database. The detection terminal further comprises an output module which is at least used for outputting inspection reports. According to the multi-user multi-parameter wireless detection, diagnosis, service and monitoring system, data transmission between the detection terminal and the medical establishment central processing terminal is utilized to achieve remote medical service, so people can more conveniently enjoy the medical service, and time and places for the medical service are more flexible.
Owner:MAYHAP IND SUZHOU

Intelligent automobile information flow redundancy safety control system based on chassis domain controller

The invention provides an intelligent automobile information flow safety redundancy control system based on a chassis domain controller. The chassis domain controller realizes interaction with external information flow through a redundancy signal channel, and the redundancy signal channel comprises a transverse cooperative control unit, a longitudinal cooperative control unit, a safety redundancy unit and diagnosis/fault redundancy, wherein the transverse cooperative control unit, the longitudinal cooperative control unit and the safety redundancy unit are directly linked to a main control chip of a core operation unit. According to the system, information flow on a chassis is re-integrated based on the concept of chassis dynamics domain control, meanwhile, a redundant interaction interface of chassis information and intelligent driving related information is re-defined for a future intelligent automobile framework, and through a high-reliability domain controller and a redundant safety information flow channel, and by combining encryption and verification technologies, redundant control of each execution mechanism of the chassis is realized, hierarchical management and signal verification of an automatic driving function module, redundant control of a whole vehicle signal and whole vehicle information flow verification work are realized, and the information safety of the whole vehicle is ensured.
Owner:TSINGHUA UNIV

A self-interference communication method and system

A self-interference communication method and system belong to the technical field of communication. The sender converts the useful sequence to be sent into a specific format and modulates it to generate a self-interference signal, linearly superimposes the useful signal and the self-interference signal into a mixed signal, and sends it on the same channel. According to the known self-interference signal generation format, the cooperative receiver estimates the channel parameters of the self-interference signal for the received mixed signal, reconstructs the self-interference signal, and then subtracts the reconstructed self-interference signal from the received mixed signal Demodulate to get the useful sequence. In the whole communication process from the transmitting party to the cooperating receiving party in the present invention, part of the transmission is a mixed signal, which has great anti-interception performance. Since the non-cooperating party does not know the format of the self-jamming signal and cannot reconstruct the self-jamming signal, there is no way to extract useful information from the mixed signal and ensure the information security of communication. Compared with the PCMA technology, the invention can enhance the security of the whole communication process and widen the application scope.
Owner:西南电子电信技术研究所

State switching method and electronic equipment

The invention discloses a state switching method and electronic equipment. The switching method is applied to first electronic equipment which is engaged in data connection with second electronic equipment. The first electronic equipment has a first state and a second state; when the first electronic equipment is in the first state, the electronic equipment can execute a first amount of instructions; and when the first electronic equipment is in the second state, the first electronic equipment can execute a second amount of instructions, wherein the second amount is less than the first amount. The state switching method includes the steps that: the data connection state of the first electronic equipment with the second electronic equipment is detected to obtain a first detection result when the first electronic equipment is in the first state; a first switching command is generated when the first detection result shows that the data connection between the first and second electronic equipment is cut out; and according to the first switching command, the first electronic equipment switches from the first state to the second state. With the state switching method, when the data connection of the electronic equipment with other electronic equipment is cut out, the electronic equipment can rapidly switch to the second state so as reduce power consumption of the system and/or to guarantee the security of the user information.
Owner:LENOVO (BEIJING) LTD

Authentication method, device and system

The invention discloses an authentication method, device and system. The method comprises the following steps of receiving an authentication request which is sent by network side equipment and comprises encrypted authentication data; decrypting the encrypted authentication data by adopting a pre-derived encryption key, and generating an authentication response according to the decrypted authentication data; and encrypting the authentication response by adopting the pre-derived encryption key, and sending an authentication response comprising the encrypted authentication response to the networkside equipment. In the embodiments of the invention, UE decrypts the encrypted authentication data sent by the network side equipment according to the pre-derived encryption key and encrypts the generated authentication response according to the pre-derived encryption key, and the UE and the network side equipment transmit the encrypted authentication data and the authentication response during an authentication process, so that a third-party malicious attacker is prevented from acquiring the authentication data and the authentication response to carry out correlation attack on the UE and thenetwork side equipment, the information safety of the user is guaranteed, and the user experience is improved.
Owner:CHINA MOBILE COMM LTD RES INST +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products