Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

104results about How to "Fix technical issues with less security" patented technology

Data encryption method, apparatus and system

The invention discloses a data encryption method, apparatus and system. The data encryption method includes the steps: sending one or more first data to a first reception end, wherein the first data at least includes a first randomized number which is encrypted through an asymmetric algorithm; receiving one or more second data returned from the first reception end, wherein the second data at least includes a second randomized number which is encrypted through an asymmetric algorithm; and according to the first randomized number and the second randomized number, forming a secret key. The data encryption method, apparatus and system can solve the technical problem that in the prior art, industrial switches and energy control equipment transmit data through a plaintext transmission mode, so that safety is lower.
Owner:北京德威特电气科技股份有限公司

Business encryption/decryption method and device

The invention discloses a business encryption / decryption method and a device. The method comprises steps that an encryption request sent by a business module is received by a secret key agent module, and the encryption request contains the to-be-encrypted data; a target secret key is acquired from a secret key list by the secret key agent module, and the secret key list is acquired from a secret key server in advance; the to-be-encrypted data is encrypted by the secret key agent module through utilizing the target secret key to acquire the encrypted data; the encrypted data is sent by the secret key agent module to the business module. Through the method, a technical problem of relatively low security of secret keys during business encryption in the prior art is solved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Data processing method used for electronic election

The invention discloses a data processing method used for electronic election. The method includes the following steps: a voting terminal encrypts electronic votes of voters into encrypted votes through an election encryption public key, and packs the encrypted votes into a vote data packet; the vote data packet attached with identification information is encrypted into an encrypted data packet through the election encryption public key, and the encrypted data packet signed by a terminal with a private key signature is sent to an election server; the election server judges the validity of the encrypted data packet through the identification information, verifies signature information of the encrypted data packet, and then stores in a vote database; and after at least two rounds of mixing operation is executed on the encrypted votes in the vote database, vote statistics are conducted, and the mixing operation includes performing re-encryption on each encrypted vote according to a preset encryption algorithm, and after re-encryption, executing disorder operation on each encrypted vote according to a preset disorder algorithm. The data processing method used for electronic election solves the technical problem in related technologies that the security is relatively low when on-site voting is performed.
Owner:JINHUA HONGZHENG TECH CO LTD

Block chain access authentication method and device, storage medium and electronic device

The invention discloses a block chain access authentication method and device, a storage medium and an electronic device. The method comprises the following steps: the control center acquires an access request sent by the first account for requesting to access the block chain data, verifies a user certificate carried in the access request, obtains the position of the authority information of the first account in the block chain from an index system, and sends the position of the permission information in the block chain to the permission management smart contract, the permission management smart contract reads permission information of the first account at the position of the permission information in the block chain, and authenticates a first function to be accessed by the first account by using the permission information, sends an obtained authentication result to the control center, and allows the first account to access the first function by the control center according to the authentication result or refuses the first account to access the first function by the control center according to the authentication result. According to the method and the apparatus, the technical problem of relatively low security of permission data in related technologies is solved.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Method and device for logging using password key, storage medium and processor

The invention discloses a method and a device for logging using a password key, a storage medium and a processor. The method comprises the following steps: obtaining identification information and current position information of a current terminal when logging in with a password key, wherein the current terminal is a terminal using the password key, and the current position information is positioninformation of the current terminal; , and allowing the login operation to be performed using the password key when the identification information of the current terminal coincides with the identification information of the authorized terminal recorded in the password key and the current position information coincides with the initial position information at the time of first login using the password key, wherein the authorized terminal is a terminal permitting the use of the password key. The invention solves the technical problem that the use range of the password key is not limited by therelated technology, and the information security is low.
Owner:BEIJING HAITAI FANGYUAN HIGH TECH

Secret key generation method and system, storage medium and electronic device

The invention provides a secret key generation method and system, a storage medium and an electronic device, and the method comprises the steps: transmitting an updating request to a server, the updating request being used for requesting the server to update an original root sequence corresponding to target slave equipment; sending a target updating instruction is sent to the target slave equipment, wherein the target updating instruction comprises an encrypted first root sequence, the first root sequence is obtained after the server responds to the updating request to update the original rootsequence, the target updating instruction is used for indicating the target slave equipment to update the original root sequence stored in the target slave equipment into the first root sequence, andthe first root sequence is used for generating a dynamic key; and receiving first data sent by the target slave equipment, the first data being obtained by encrypting a new dynamic key, and the new dynamic key being generated by the target slave equipment according to a key generation algorithm stored in the target slave equipment and the first root sequence. According to the invention, the technical problem of low security of the secret key in the prior art is solved.
Owner:SUNWAVE COMM

Vehicle automatic driving method and device and vehicle

The application provides a vehicle automatic driving method and device and a vehicle. The method comprises the following steps: acquiring vehicle running information transmitted by a surrounding vehicle through atmospheric optical communication by controlling an atmospheric optical communication module on a target vehicle; determining a position relationship between the target vehicle and the surrounding vehicle according to the set position of the atmospheric optical communication module on the target vehicle; and perform automatic driving control on the target vehicle according to the position relationship and the corresponding vehicle running information. According to the method, the running information of the surrounding vehicle is acquired through the atmospheric optical communicationmodule arranged on the target vehicle in order to perform automatic driving control on the target vehicle, so that the technical problem of incapability of correctly planning a running route in the automatic driving process of the vehicle since the running information of a vehicle in a certain area is acquired while the running information of the surrounding vehicle cannot be accurately acquiredwhen the wireless communication module is used for acquiring the running information of the surrounding vehicle in the prior art is solved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products