Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

933results about How to "Guaranteed credibility" patented technology

Decentralized public key management method and system based on trusted network

The invention mainly belongs to the technical field of information security, and specifically relates to a novel decentralized public key management method and a trusted model. The method is constructed on distributed data network platforms such as a block chain and P2P (Peer to Peer) in order to ensure that all nodes in the platforms can participate in maintenance of whole-life-cycle management of public keys of users, and the changes of the public keys of the users in various states in a life cycle are recorded in a bill form. Through the method, public keys passing verification can be recorded and added into a consistent public key storage structure of a platform to be saved; a public key log chain is generated for all public key records of the same user according to a time sequence, and an authentication chain and a trusted network are formed on the basis of a referrer signature; and efficient search of the public keys can be realized on the basis of user identifiers. Through adoption of the method, the public keys of the users can be issued and acquired conveniently and accurately, and the effectiveness, correctness, consistency and non-fraudulence of acquired public keys are ensured. The method can be taken as an infrastructure supporting authentication, encryption, integrity and accountability services.
Owner:UNIV OF SCI & TECH BEIJING

Block chain-based artwork trading method, server, server end and system

InactiveCN107730384AGuaranteed credibilityEnsure effective smooth progress and safetyFinancePayment protocolsComplex networkWeb technology
The invention provides a block chain-based artwork trading method. The method is suitable for use in the field of network technology, and includes: receiving a buying application request, determiningseller information according to a target artwork, and sending a trading request to the seller; sending a smart contract to the seller and a buyer if selling willing information is received; judging whether the smart contract becomes valid, and if yes, generating trading records, and sending the same to a block chain for saving; and judging whether an ownership change condition of the target artwork is met, and if yes, generating ownership change records, and sending the same to the block chain for saving. According to the embodiment of the invention, all servers of a node network in the blockchain are used to participate in management and maintenance thereof through a decentralized structure of the block chain, thus credibility of databases in the block chain are guaranteed, and the servers are built on the peer-to-peer network at the same time, an effect that property rights and trading records stored in the block chain can be all accessed under any complex network environment is guaranteed, and effective and smooth performing and security of trading are guaranteed.
Owner:SHENZHEN UNIV

Distributed data storage system and method based on blockchain

The invention discloses a distributed data storage system and method based on a blockchain. The method comprises: inputting a data content into a data storage module by a data inputting module, and using a hash algorithm to calculate an extract of the data content to store on the blockchain; receiving the data content by the data storage module, retrieving the extract corresponding to the data content, and storing the data content that is consistent with the extract; and when data querying is carried out, finding a stored queried data content by the data storage module, retrieving an extract corresponding to the data content, and returning the queried data content that is consistent with the corresponding extract to a querying node. According to the system and method, the blockchain is used in the information storage system, a Root-privilege administrator does not exist, no one can arbitrarily modify an information content without being detected, and reliable management and secure sharing of information are realized; and the blockchain is not directly used to store the data content, only the extract obtained by calculating by using the hash algorithm is stored, the amount of storage on the blockchain is reduced, low efficiency of the blockchain is avoided, and the practicality is improved.
Owner:北京中科锐链科技有限公司

Rockburst grade predicting method based on information vector machine

The invention discloses a rockburst grade predicting method based on an information vector machine to mainly solve the problem that in the current underground engineering construction process, the rockburst geological disaster prediction effect is not good. A rockburst evaluation index and a grading standard are selected, and domestic and overseas great deep rock engineering rockburst instances are widely collected to establish an abundant training sample library. A cross validation strategy is utilized for training an IVM model with the superior statistics mode recognition performance, accordingly, a nonlinear mapping relation between the rockburst evaluation index and the rockburst grade is established, model initial parameter setting and the training sample library are adjusted according to the training result, and the IVM model predicting the rockburst grade is finally established. By means of the method to predict the rockburst grade, the complex mechanical analysis or calculation is not needed, only the input feature vector of a sample to be predicted needs to be input in the prediction model, and then the prediction value of the rockburst grade can be obtained. The method is economical, efficient and high in prediction precision and has good engineering application prospects.
Owner:GUANGXI UNIV

Safety payment method and device based on credible two-dimension code

The invention discloses a safety payment method and system based on a credible two-dimension code. The safety payment method comprises the steps that a two-dimension code publisher performs digital signature computation on original information to generate first signature information and sends the first signature information and the original information, as first information, to a two-dimension code management platform; the two-dimension code management platform verifies the first information, performs digital signature computation on payment information to generate second signature information when the first information passes the verification, encodes the second signature information and the original information to generate the credible two-dimension code, and sends the credible two-dimension code to the two-dimension code publisher; the two-dimension code publisher sends the credible two-dimension code to a two-dimension code displayer; the two-dimension code displayer verifies the credible two-dimension code, and displays the original information in the credible two-dimension code when the credible two-dimension code passes the verification. According to the method and the device, the risk of a user in the two-dimension code using process is reduced, the safety of the two-dimension code is ensured, and the reliability of the two-dimension code payment system is further improved.
Owner:SUNYARD SYST ENG CO LTD

Method and system for monitoring single event upset effect of FPGA (field programmable gate array) and correcting reloading

InactiveCN103971732AReduce areaImproved ability to resist single event effectsDigital storageFpga field programmable gate arrayProgrammable read-only memory
The invention discloses a method for monitoring a single event upset effect of an FPGA (field programmable gate array) and correcting reloading. The method comprises the steps: an antifuse FPGA reads back a configuration word through a configuration word readback function of an SRAM (static random access memory) type FPGA, compares the configuration word with a correct configuration word pre-stored in an FLASH storage chip, checks whether the SRAM type FPGA generates single event upset or not, and performs reloading through a loading program pre-stored in the FLASH storage chip if the SRAM type FPGA generates the single event upset. The invention also discloses a system for monitoring the single event upset effect of the FPGA and correcting the reloading. The system comprises the FLASH storage chip, the antifuse FPGA and the SRAM type FPGA which are connected in sequence. The method and the system which are disclosed by the invention simulate a time sequence of a PROM (programmable read-only memory) to load the SRAM type FPGA through a loading file pre-stored in the FLASH storage chip; compared with the system adopting a preliminary writing PROM, the system disclosed by the invention has the advantages that the distribution area of a PCB (printed circuit board) is reduced, and equipment minimization is facilitated.
Owner:ZHEJIANG UNIV

Credible device with active control function and authentication method thereof

The invention discloses a credible device with an active control function and an authentication method thereof, relating to the field of information security. A credible platform control module with the active control function and a hardware device are connected to a credible platform of the credible device with the active control function, wherein the hardware device are separated into a credible hardware device and an incredible hardware device by the credible platform control module through the active control function, and the credible platform control module is internally provided with hardware units such as an active measurement engine, a control judgment engine, a work mode customizing engine, a credible control policy configuration engine and the like to realize active check on theworking condition configuration information of the hardware device, control policy configuration information, a firmware code and the working condition of a circuit. Mutual binding between the credible platform and the credible hardware is realized through combing the credible platform control module and a credible pipeline technology, the binding process of the credible platform control module and the credible hardware is completely transparent to an operating system and an application program, and the operating system cannot bypass or intervene the process of binding the credible hardware by the credible platform.
Owner:BEIJING UNIV OF TECH

Data chain information circulation control system based on block chain as well as method

The invention belongs to the technical field of transmission control procedures such as a data chain stage control procedure and discloses a data chain information circulation control system based ona block chain as well as a method. The system disclosed by the invention is based on a weighted PBFT algorithm, can distribute weights specific to different entity characters of a data chain, fully considers significance of different characters of the data chain as well as influence of the different characters on consistency and has high flexibility; based on an access control scheme of the blockchain, consistency and tampering resistance of the block chain guarantee credibility of a contract self, a smart contract can be automatically executed, characteristics of the block chain are combined, and credibility of an access strategy output by the contract is guaranteed, so that data security is effectively guaranteed; and attribute encryption is combined with symmetrical encryption, data isencrypted by using a symmetrical encryption scheme, and a symmetric key is encrypted by using an attribute encryption algorithm, so that efficient encryption is guaranteed, and flexible access control is supported.
Owner:XIDIAN UNIV

Client side equipment security authentication system and method and client side trusted identification device

The invention provides a client side equipment security authentication system and method and a client side trusted identification device, and relates to the technical field of client side security authentication. The method comprises the steps that the client side trusted identification device acquires fingerprint element information of client side equipment so as to generate authentication information; authentication server equipment analyzes the authentication information and transmits a matching request to fingerprint feature library equipment; the fingerprint feature library equipment inquires fingerprint information of each set of client historical equipment corresponding to a client identifier and determines the matching degree of the authentication information and each set of client historical equipment; the authentication server equipment determines the authentication state of the client side equipment according to the maximum value of the matching degree; when the authentication state indicates successful authentication, the client identifier and a trusted identifier are transmitted to the client side trusted identification device; when the authentication state is the under authentication state, new equipment trusted authentication is performed according to client authentication information library equipment; and transaction application server equipment is enabled to process a transaction session request according to the client side equipment authentication result.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Implementation method and device of application-type honeypot

InactiveCN104978519ADetect behavioral intentionDiscovery Analysis ForensicsPlatform integrity maintainanceSoftware engineeringBusiness data
The invention provides an implementation method and device of an application-type honeypot. The implementation method comprises the following steps: obtaining application service to be simulated and the attribute information and the application environment of the application service to be simulated, and deploying the same application service and application environment into the honeypot; setting the corresponding attributes of the honeypot, for example, a login account of the application service of the honeypot is set to be the same with the application service to be simulated, and the known controllable security holes of at least one application service is opened; according to a user flag, carrying out decryption processing on all pieces of business data in the application service, applying a confounding algorithm to carry out deformation processing on all pieces of business data, and then, importing the business data into the application service of the honeypot; and importing newly-added business data into the application service of the honeypot in fixed time or real time. The invention also provides corresponding equipment. The application-type honeypot can be combined with the real business data of the user to confuse an attacker to a maximum degree, and the attacker is enabled to think that the honeypot is the real application service data of the user.
Owner:HARBIN ANTIY TECH

Imaging simulation method and system for decimeter-scale satellite-borne TDI CCD stereoscopic mapping camera

The invention discloses an imaging simulation method and system for a decimeter-scale satellite-borne TDI CCD stereoscopic mapping camera. Stereoscopic images of a commercial satellite Worldview-3 which has the highest resolution at present as a data source, and a data form of image+ground point is formed through stereoscopic matching processing. To acquire the instant imaging face irradiance of a TDI CCD is regarded as a core step, an orbit, attitude parameters, camera installation parameters, TDI CCD geometric parameters, camera MTF and the like are organically linked up. The multistage dynamic integral simulation of the TDI CCD is achieved through time domain integral and TDI CCD multistage charge accumulation, and then, the strict simulation of radiation response and linear array image imaging of the camera are achieved. According to the method and the system, the disadvantage in the traditional imaging simulation that the difference of geometric and radiation information corresponding to different vision angles in high-resolution satellite stereoscopic imaging is hard to simulate due to the adopting of a single data source can be avoided, and the accuracy of simulating stereoscopic mapping satellite images is improved.
Owner:自然资源部国土卫星遥感应用中心

Method for assessing residual intensities of composite material structures with low-speed impact damage

The invention discloses a method for assessing residual intensities of composite material structures with low-speed impact damage. The method comprises six steps of: 1, obtaining a curve relationship between impact energy and damage characteristic parameters through low-speed impact test results; 2, obtaining a maximum contact force and a maximum pit depth under corresponding impact energy by adoption of an impact damage theory; 3, establishing a low-speed impact progressive damage finite element model; 4, correcting the low-speed impact progressive damage finite element model; 5, establishing a residual intensity finite element model with impact damage; and 6, solving the residual intensity finite element model with the impact damage to obtain a residual intensity value. According to the method disclosed by the invention, finite element simulation is applied to impact damage models, and the impact test results and the impact damage theory are combined, so that the accurate simulation for damage states, the accurate building of finite element models with initial impact damage and the continuity of assessment processes are realized, and a relatively high practical value is provided.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Novel transmission loss reducing method by alternating current or direct current (AC / DC) synergy used in interconnected network and novel transmission loss reducing system by AC / DC synergy used in interconnected network

The invention discloses a novel transmission loss reducing method by alternating current or direct current (AC / DC) synergy used in an interconnected network and a novel transmission loss reducing system by the AC / DC synergy used in the interconnected network. The method comprises the steps of acquiring load flow interface data and carrying out load flow calculation to acquire a load flow result, acquiring DC power data and calculating a DC transmission loss sensitivity factor according to the acquired DC power value; calculating an AC transmission loss sensitivity factor according to the load flow result, calculating a general transmission loss sensitivity factor of an AC / DC network according to the DC transmission loss sensitivity factor and the AC transmission loss sensitivity factor, judging whether the AC / DC network meets requirements of an optimal solution, carrying out iteration optimizing calculation to the AC / DC network if the AC / DC network does not meet the requirements of the optimal solution; finishing the iteration optimizing calculation and saving the current DC power value of the AC / DC network if the AC / DC network meets the requirements of the optimal solution, and carrying out the iteration optimizing calculation to the AC / DC network to adjustment the DC power of the AC / DC network in real time. The method supports on-line calculation, and calculation is accurate, fast and strong in robustness. The novel transmission loss reducing method by the AC / DC synergy used in the interconnected network and the novel transmission loss reducing system by the AC / DC synergy used in the interconnected network can be widely used in transmission loss optimizing of big AC / DC interconnected networks.
Owner:CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products