Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

4117results about How to "Guarantee authenticity" patented technology

Identity authentication method, identity authentication server and identity authentication device

The invention discloses an identity authentication method, an identity authentication server and an identity authentication device. The method comprises the steps that the authentication server receives a biological characteristic authentication request sent by a client, returns challenges generated randomly to the client and receives a dynamic verification password sent by the client, wherein the dynamic verification password is generated by the client time when the challenges are received, the challenges, a biological characteristic of a user and a first seed key prestored in the client; the authentication server generates a dynamic password according to the time of the authentication server when the dynamic verification password is received, the challenges, the biological characteristic of the user and a second seed key; and the authentication server verifies whether the dynamic password is consistent with the dynamic verification password and returns an identity authentication result to the client according to a verification result. With the adoption of the identity authentication method, the identity authentication server and the identity authentication device, the safety of the dynamic password is ensured through the biological characteristic, and the authenticity and reliability of the identity authentication of the user are guaranteed.
Owner:BEIJING EYECOOL TECH CO LTD +1

Logistics tracking method based on block chain

InactiveCN106022681ASolve the problem of real name systemGuarantee authenticityLogisticsPhysical spaceDigital fingerprint
The invention discloses a logistics tracking method based on a block chain. The method comprises steps that a user sending node uploads parcel information to a main node; the main node generates a digital fingerprint for the parcel information uploaded by the user sending node, writes the digital fingerprint and a corresponding time stamp into a block chain, broadcasts the block chain in all nodes; each logistics node generates parcel state information successively according to the digital fingerprint, the node information of the logistics node and the node information of a next logistics node in accordance with a parcel physical space transfer path; a corresponding user receiving node signs for the parcel, generates parcel receiving information and uploads the parcel receiving information to the main node in order for the main node to write the parcel receiving information into the block chain. The logistics tracking method applies the block chain technology to the logistics field, guarantees the traceability of the authenticity and the state of logistics information by using the unchangeable characteristic of the block chain, saves the logistics information and update state information fast and efficiently according to the characteristic of a private chain in order to satisfy a requirement for logistics instantaneity.
Owner:HANGZHOU YUNXIANG NETWORK TECH

Safety communication secret key negotiation interaction scheme

The invention provides a method for safety communication between an application on a mobile terminal and a network server. Shared secrets of a user and a server are overlapped and bound with an identification code of mobile intelligent terminal equipment and a mobile phone number of the user by utilizing a cryptology; then the obtained product is applied to an identity authentication system to implement authentication on a client side; a digital certificate and a digital signature mechanism are utilized to implement authentication on the server; a session key is established with a network server by utilizing a Differ-Hellman secret key negotiation protocol so as to carry out safety data communication. The method is characterized in that the shared secrets are overlapped and bound with identification code of the machine and the mobile phone number of the user and the shared secrets are updated regularly; even though information is stolen by an attacker, a system still cannot be influenced. The user not only needs to provide a login password, but also needs to use the system on designated equipment. The method can ensure that the user carries out safety communication with the server on internet by the mobile equipment.
Owner:QINGDAO WEIZHIHUI INFORMATION

Data management system and method based on composite blockchain network

The invention relates to a data management system and method based on a composite blockchain network, wherein the system comprises a first-level blockchain network and at least one second-level blockchain network; the second-level blockchain network comprises multiple mutually connected slave node servers; the second-level blockchain network sets a master node server in all the slave node servers; and the master node servers in all the second-level blockchain networks are mutually connected, so that the first-level blockchain network is formed. By means of the data management system and method disclosed by the invention, the integrity, the authenticity and the standardization of data can be ensured through audit signature verification of the composite multi-level blockchain network; the security of the data is ensured in a hierarchical encryption and multiple authorization mode; structural design of hierarchical storage of detailed data and classified index data is carried out through a blockchain technology and the composite multi-level network; therefore, the data is relatively smooth to interconnect, intercommunicate and exchange; furthermore, audit tracing can be realized; and the data retrieving, applying and sharing efficiency can be increased.
Owner:黑龙江卓亚科技有限公司

Decentralized public key management method and system based on trusted network

The invention mainly belongs to the technical field of information security, and specifically relates to a novel decentralized public key management method and a trusted model. The method is constructed on distributed data network platforms such as a block chain and P2P (Peer to Peer) in order to ensure that all nodes in the platforms can participate in maintenance of whole-life-cycle management of public keys of users, and the changes of the public keys of the users in various states in a life cycle are recorded in a bill form. Through the method, public keys passing verification can be recorded and added into a consistent public key storage structure of a platform to be saved; a public key log chain is generated for all public key records of the same user according to a time sequence, and an authentication chain and a trusted network are formed on the basis of a referrer signature; and efficient search of the public keys can be realized on the basis of user identifiers. Through adoption of the method, the public keys of the users can be issued and acquired conveniently and accurately, and the effectiveness, correctness, consistency and non-fraudulence of acquired public keys are ensured. The method can be taken as an infrastructure supporting authentication, encryption, integrity and accountability services.
Owner:UNIV OF SCI & TECH BEIJING

Quality safety tracing method for food processing enterprises

InactiveCN103761546ANo repeated codes appearMeet randomnessCo-operative working arrangementsDebit schemesProduction lineRelational database
The invention discloses a quality safety tracing method for food processing enterprises. The quality safety tracing method includes the steps that a laser coder generates random tracing codes according to a coding rule when a laser marking machine in a production line device is dynamically read in an on-line tagging mode; the laser marking machine carries out tracing mode marking on products on a production line, and two-dimension codes and plain codes are all marked on packages; a fixed reader is used for scanning and reading designated tagged code portions of the products; the two-dimension codes are successfully scanned and read, the tracing codes are recorded, and relevance between the tracing codes and commodity attribute information is completed; if the two-dimension codes fail to be scanned, the two-dimension codes will be removed through a removing device; the commodity tracing code information and the commodity attribute information are recorded into a relational database; after the products are packaged, package code data and product tracing code data are related; the products are stacked, stacking codes and tagged stacking codes are generated, and the stacking codes and the product package code data are related; the stacking codes are scanned, storage of the products is completed, delivery orders and the stacking codes are scanned to complete delivery, and the database records delivery information.
Owner:武汉华工赛百数据系统有限公司

Multifunctional remote medical care system based on multi-network fusion

The invention discloses a multifunctional remote medical care system based on multi-network fusion. The system involves the processes of registration from an entity to an authentication center, establishment of electronic medical record, data acquisition, remote diagnosis and information feedback; and a user terminal comprises a smart phone and a medical sensor. The smart phone comprises a data receiving processing module, a location-information acquisition module, an information querying processing module, a terminal safety module, a terminal communication module, a terminal storage module and a terminal UI (User Interface) module, wherein the medical sensor is provided with a wireless network interface and can be placed on a third medical sensor placed on the body of a user, a system server side comprises a server communication module, an information management module, a server-side safety module, a disease diagnostician system module, an information feedback module and an authentication center. The multifunctional remote medical care system based on multi-network fusion has the characteristics of rapid response, capability of detecting pathological changes in time, convenience and rapidness and the like, is easy for functional expansion, and has a greater upgrading function.
Owner:HUAZHONG UNIV OF SCI & TECH

Multi-sensing-data space-time synchronization method and road multi-sensing-data vehicle-mounted acquisition system

The invention provides a multi-sensing-data space-time synchronization method and a road multi-sensing-data vehicle-mounted acquisition system. The invention proposes the multi-sensing-data space-time synchronization realization method, and the multi-sensing-data space-time synchronization refers to one-to-one alignment of a plurality of paths of video data and GPS position data of a driving vehicle in a time dimension of a single frame of data and a space dimension of different acquisition devices. At the same time, the invention also discloses the vehicle-mounted system of road traffic environment multiple sensing data. The system is capable of real-time recording of multiple sensing data of a road traffic environment of the driving vehicle, such as the plurality of paths of video data and the GPS position data of the driving vehicle. The disorderly multiple sensing data acquired by the acquisition system can only be used alone because incapable of interaction with different kinds of data. However, the multiple sensing data which undergo the space-time synchronization is capable of reproducing driving scenes in a seamless transition manner so that the system is capable of providing comprehensive and objective real data and offline simulation verification data for hot researching problems such as visual scene understanding and environment cognition of unmanned vehicles and the like.
Owner:XI AN JIAOTONG UNIV

Remote proving method in trusted computation environment

The invention provides a method for remote attestation in a trusted computing environment. The method is characterized in that secure session key is adopted for encrypting the metric value and the metric log of trusted platform to be verified, and signs for encryption result data. The method is based on a security chip TPM / TCM; the adopted remote attestation framework comprises three parts: an integrity measuring mechanism, a reporting mechanism and a validation mechanism, which are achieved by an integrity measuring agency, a report agency and a verification requestor, wherein, the measuring agency, the report agency and the verification requestor are installed in the trusted platform to be verified. The method ensures that the authenticity of the integrity measuring value and the measuring log and the privacy of the platform are kept; the replay attack, impersonation attack and man-in-the-middle attack are effectively prevented; the method is used for proving to the verification requestor that the running environment of the platform is credible, or used for self-test of the platform running environment; the method can be used for not only proving to the requestor that the platform running environment is credible, but also the self-test of the platform running environment; and the method is more suitable for a fair and open network environment.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Emergency medical rescue wireless mobile information management method and platform

The invention discloses an emergency medical rescue wireless mobile information management method and a platform, and the central content of the method is built on the basis of a regional monitoring information wireless network management system in a wide area. The invention comprises a handheld PDA device, a mobile monitoring information management system and an emergency rescue dispatching information management system, wherein, the handheld PDA device is used for rapidly inputting and transmitting the basic conditions and illness information of patients on the incidence scene; the mobile monitoring information management system belonging to the mobile ambulance onboard part is in charge of the acquisition and transmission of the monitoring information, the basic information of patients and treatment and rescue information, voice and video instant messaging, GPS location and real-time traffic enquiries; and the emergency rescue dispatching information management system arranged in the emergency rescue dispatching management center in fixed places is in charge of dispatching management and real-time monitoring of the comprehensive information. In the invention, the information of the emergency rescue process is digitalized; the rescue medical information of patients from different regions such as the incidence site, transport process, reception hospital, rescue in hospital, dispatch and control and the like can be shared in real time and synchronously, thus building a new rescue mode in which the information runs first with the non-arrival of patients.
Owner:PEOPLES HOSPITAL PEKING UNIV +1

Multi-disease chronic disease information management system

The present invention provides a multi-disease chronic disease information management system relating to the computer field and used for solving the problem that the conventional chronic disease management system can not realize the multi-department multi-disease same system management. The system provided by the present invention comprises a database, an application server, a plurality of hospital clients and a plurality of patient clients. The database stores the health examination data of patients, the doctor suggestion, the health data reference ranges of the examination items and the health state assessment indexes of various chronic diseases, and the application server obtains the health examination data of the appointed patient, the corresponding health data reference ranges, the health state assessment indexes of various chronic diseases and the doctor suggestion from the database according to a first query instruction sent by the hospital / patient client to obtain a chronic disease assessment result and return the chronic disease assessment result of the current appointed patient and the data to the hospital / patient client. By the above scheme, the communication interaction of the multiple medical departments and the patients about the multi-disease chronic disease is realized.
Owner:BEIJING SHIJITAN HOSPITAL CAPITAL MEDICAL UNIVERSTY

Method and system for identity verification of digital certificate based on TEE (Trusted Execution Environment)

ActiveCN105429760AEnsure true willEnsure that the identity verification process can reflect the true willUser identity/authority verificationPasswordPersonal identity verification
The invention discloses a method for identity verification of a digital certificate based on a TEE (Trusted Execution Environment). The method comprises pre-configuration of a digital certificate system through a terminal, a digital certificate signature process and a digital certificate signature verification process. The method is characterized in that the terminal is provided with the TEE; the digital certificate signature process is carried out on the terminal and is used for utilizing a private key of the digital certificate to sign for a user request; the digital certificate signature verification process is used for authenticating identity of a requested user, and the authentication method comprises verification of validity and effectiveness of the digital certificate and integrity and correctness of the signature, wherein the digital certificate signature process is carried out under the TEE; the sensitive information, such as a user key, identity information, biological characteristic information and password information, is stored through a secure storage module, so that the problems that the signature process is carried out in REE and the sensitive information of the user is stored under the REE environment to cause privacy disclosure and stolen hidden danger of property in the prior art are avoided.
Owner:神州融安数字科技(北京)有限公司

Method for monitoring and measuring full section of tunnel through three-dimensional laser

The invention relates to a method for monitoring and measuring a full section of a tunnel through three-dimensional laser, and belongs to the field of tunnel engineering construction monitoring. The method comprises the following steps of: arranging target points in a tunnel to be measured according to a requirement; determining whether to adopt one-station scan or multi-station scan according to the monitoring length of the tunnel; erecting an instrument at a proper position and scanning the full section of the tunnel; after the scan is finished, importing data into a computer; registering point cloud data acquired through the scan to generate a three-dimensional model by applying three-dimensional data processing software; and generating a comparison model by combining a previous three-dimensional model for the same tunnel at different time, and selecting a specific section and characteristic points to generate a variation analysis chart and a variation analysis sheet for a corresponding position. By the method, the full section of the tunnel is monitored in real time, the speed and accuracy of monitoring and measuring work are improved, manpower and material resources are saved, the speed and quality for monitoring and measuring the tunnel are improved, and reliable guarantee is provided for tunnel engineering construction.
Owner:BEIJING UNIV OF TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products