Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

804results about How to "Guaranteed legality" patented technology

Firmware upgrading and encapsulating method and device based on digital signing

The invention discloses a firmware upgrading method based on digital signatures, and a device thereof, wherein the upgrading method comprises the following steps: encapsulation is performed according to a predefined encapsulation structure so as to generate an upgrading file based on a digital signature; a product needing firmware upgrading obtains the upgrading file; a digital signature file is extracted from the upgrading file and decrypted, so as to obtain an XML file; the XML file is analyzed so as to screen out upgrading module files needing to be upgraded; the legitimacy and integrity of every upgrading module file needing to be upgraded are verified respectively, so as to generate an upgrading script for upgrading all the upgrading module files which pass verification; and the upgrading script is executed so as to upgrade the firmware. The invention discloses a firmware encapsulating method based on digital signatures, and a device thereof. The invention verifies the integrity and legitimacy of every upgrading module file in the upgrading file through the digital signature file, and generates the upgrading script to finish upgrading firmware, thereby improving the security and convenience of firmware upgrading.
Owner:SHENZHEN SKYWORTH DIGITAL TECH CO LTD

Device networking authentication method based on blockchain

The invention discloses a device networking authentication method based on a blockchain for solving the single point failure problem existing in the current networking authentication method. The technical scheme is to deploy a blockchain network comprising a client, a submission node and a consensus node. By means of the non-tampering property of the blockchain, a device firstly registers on the blockchain before accessing the network, when the device A needs to access the network, the device sends a networking request of a device B that has accessed to the network, the device B compares the information of the device A in the networking request with the information of the device A stored in the blockchain to judge whether the identity of the device A is legal, a smart contract issues a token to the device A, a timestamp in the token ensures that the device A is valid within a certain period of time, and after the token expires, the device A needs to pass the identity authentication toaccess the network again. By adoption of the device networking authentication method disclosed by the invention, the single point failure problem existing in the traditional networking authenticationmethod can be avoided, the legality of the identity of the device is ensured, and the security of the network is improved.
Owner:NAT UNIV OF DEFENSE TECH

Remote video monitoring system for vehicle and vehicle remote video monitoring method

The invention discloses a remote video monitoring system for a vehicle. The remote video monitoring system for the vehicle comprises a vehicle-mounted video monitoring system, a remote video monitoring client side and a remote video monitoring center for the vehicle-mounted video monitoring system and the remote video monitoring client side to conduct data interaction. The vehicle-mounted video monitoring system receives environmental images inside and outside the vehicle, sends access addresses of the images to the remote video monitoring client side through the remote video monitoring center, and achieves real-time monitoring. In addition, under the situation of sensing the unusual conditions, the environmental images are stored, and the storage addresses of the environmental images are sent to the remote video monitoring center so as to achieve the alarm function. In addition, the remote video monitoring client side can send an angle adjustment command of a camera, and the angle of the camera is adjusted as needed. The invention further discloses a vehicle remote video monitoring method by utilizing the remote video monitoring system for the vehicle, under the situation that the sight of a user is far from the vehicle, the functions of real-time monitoring and alarm are achieved, and safety of the vehicle is improved.
Owner:ZHEJIANG UNIV

Novel offline payment method

The invention discloses a novel offline payment method. The method comprises the steps that account numbers of an accountee party and a receiving party serve as IDs, and a corresponding public key and private key are mapped according to business sub-domain identifications; a random number is selected from the receiving party, signature is conducted on the random number through the private key, and a two-dimension code is generated; the two-dimension code is scanned through the accountee party, the public key is mapped by means of the receiving party ID and the service sub-domain identification, and attestation is conducted on a signing message; if attestation succeeds, the accountee party successfully pays according to transaction information; signature is conducted on the random number by the accountee party through the private key after payment to generate a two-dimension code; the receiving party scans the two-dimension code, the public key is mapped through the accountee party ID and the business sub-domain identification, and attestation is conducted on a signing message; if attestation succeeds, posting is successfully conducted on the receiving party. According to the novel offline payment method, payment does not rely on the support of a network any more, payment is achieved on various mobile equipment, and the payment process is greatly facilitated. The two-way authentication process based on the identifications is adopted by the two payment parties, the legality of transactions is fully guaranteed, and illegal manipulation of information and information disguising are prevented.
Owner:CHINA SMARTCITY TECH

Identity verification method and system

The invention discloses an identity verification method and system. The method comprises: a cash collecting device receiving cash collecting information, according to the cash collecting information and payee identity information, obtaining payee electronic identification for outputting, and associating the payee identity information with a payee account, the payee electronic identification comprising an electronic identification expiration date; a payment device obtaining payee electronic identification, and verifying payee identity validity according to the payee electronic identification; the payment device, according to the payer identity information and current time information, obtaining a payer electronic identification for outputting, and associating the payer identity information with a payment account, the payer electronic identification comprising an electronic identification expiration date; and the cash collecting device obtaining the payer electronic identification, and verifying payer identity validity and according to the payer electronic identification. According to the invention, payee and/or payer identity validity are verified by use of a dynamic electronic identification, such that cheating of a phishing website is prevented; and each identity is bound with an account, and payment can be carried out without inputting a password and exposing an account medium, such that the security of the password and the account medium is ensured.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Security control method of intelligent television application program

The invention relates to software security control technology and discloses a security control method of intelligent television application programs, wherein the security of application software is monitored from a plurality of levels, thereby ensuring the security of application software downloaded and installed in an intelligent television terminal. The key points of the technical scheme are summarized as that an application program developer signs for the first time when packing and uploading the application program to an application program store platform; signature of the second time is performed after the application program store platform verifies the application program; the intelligent television terminal hands over a public key of the intelligent television terminal to the platform through a network connection platform, the software is encrypted using the public key at the platform and transmitted to the intelligent television terminal, the intelligent television terminal performs security verification to the application program, and the application program is installed after the verification is accepted. Legitimacy and security of application of the application program is ensured with such method, and such method is applicable for security control of the application software.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Verification method and system for adoptability of electronic data evidence

The invention relates to a verification method and system for adoptability of electronic data evidence. The method includes: authenticating a forensics subject and a system user, embedding authentication results and data such as digital digest, timestamp and geographic location into a QR code through a QR code generating program, displaying the results and data in a generated authentication report, comparing the information recognized through the QR code to corresponding information collected by data verification during authentication to determine whether the information is consistent to the corresponding information or not; if yes, determining that identity of the forensics subject is correct and that the electronic data evidence remains not tampered; if not, determining that identity of the forensics subject is not correct or that the electronic data evidence remains tampered. The completeness of the electronic data evidence is proved by extracting the digital digest from the electronic data evidence; legality of the forensics subject is guaranteed through authentication and verification over the forensics subject; adoptability of the electronic data evidence is guaranteed in terms of both time and space by adding the timestamp and geographic location data information.
Owner:BEIJING REALDATA SCI & TECH

Multi-party authorized APK signature method and system

The invention provides a multi-party authorized APK signature method and system. The multi-party authorized APK signature method includes the steps that different terminal device manufacturer signature servers conduct signature on signed data containing an original ARK file through respective work key pairs to generate different terminal device manufacturer signature data, and manufacturer work public key certificates are put into the terminal device manufacturer signature data or are preinstalled in terminal devices; an acquirer signature server combines the different terminal device manufacturer signature data in the form of DER according to the sequence of signature time to form a signed APK file; the signed APK file comprises the original APK file and a signature file header, the signature file header comprises a file for marking the files subjected to signature operation and a file for marking the numbers of the corresponding manufacturer signature data of the different terminals and marking the specific positions of the corresponding manufacturer signature data of the different terminals in the signed APK file; the terminal devices acquire the signed APK file and conduct verification after judging that the manufacturer signature data generated by the corresponding terminal device manufacturers of the terminal devices exist in the signed APK file, and after the verification is successful, installation and operation are allowed.
Owner:FUJIAN LANDI COMML EQUIP CO LTD

Secure fingerprint transaction paying method and system

InactiveCN104484804AGuaranteed safety and legalityImprove security levelProtocol authorisationFingerprintWireless
The invention provides a secure fingerprint transaction paying method and system. The system comprises a paying terminal, a server and a mobile terminal which are in wireless communication connection. The method comprises the following steps: the paying terminal collects and obtains fingerprint image information; characteristic data of the fingerprint image information are extracted and sent to the server; the server judges whether the characteristic data are stored in a database, and if yes, identification is passed; the paying terminal submits a dynamic password identification request to the server, and the server sends a first random verification code to the mobile terminal legally registered by a paying party; the mobile terminal receives a second random verification code and inputs the code, if the server determines that the second random verification code has timeliness, and whether the second random code and the first random verification code are consistent is compared; and if the second random code and the first random verification code are consistent, verification is passed. At least double identification and verification are adopted to ensure that the paying party is a legal user, the characteristic of concise and convenient transaction flow is considered, and the security level of a financial transaction process is increased.
Owner:FUJIAN LANDI COMML EQUIP CO LTD

Electronic invoice generating system for electronic commerce website

The invention provides an electronic invoice generating system for an electronic commerce website. The electronic invoice generating system comprises an online transaction platform, a safety electronic invoice system and an electronic invoice information management platform, wherein the safety electronic invoice system is pre-stored with a goods and service code table, an electronic invoice template and digital certificates of electronic commerce enterprises and is used for receiving the payer information and transaction information from the online transaction platform, adding the payer information and transaction information into the electronic invoice template to generate a corresponding electronic invoice according to the goods and service code table and performing digital signature on the electronic invoice through the digital certificates of electronic commerce enterprises; and the electronic invoice information management platform comprises an access interface and is used for acquiring the electronic invoice from the safety electronic invoice system so as to put on records of the electronic invoice and providing the record information to a preset user through the access interface. According to the embodiment, the problems of fake invoice, no invoice and virtual invoice are effectively solved, the tax erosion is reduced, the whole process is paper-free, and the system has the advantages of high speed and energy conservation.
Owner:TSINGHUA UNIV

Smart grid information transmission safety protection device and safety protection method

The invention discloses a smart grid information transmission safety protection device and a safety protection method, which relate to the technical field of smart grid information transmission safety. The device comprises a certificate server, an encryption and decryption module, a compliance check module and an exception handling module, wherein the encryption and decryption module is wholly serially connected between a station level and a bay level for carrying out encryption signature and signature verification decryption functions on original transparently-transmitted data; the compliance check module grabs a plaintext data packet in an offline or online mode and submits the plaintext data packet to the detection module for compliance check, and as for a compliance message, an analysis result is stored to a log database in a log format; and exception information is independently stored in an exception database through the exception handling module, and an administrator is notified. In the case of permissible delay in the smart grid, the encryption and decryption module together protects the internal information of the smart grid, behaviors that the internal data are tampered and destructed in the case of transmission are resisted, and the safety of the grid is further improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM +2

Intelligent entrance guard control system with wireless ad hoc network function and control method thereof

The invention discloses an intelligent entrance guard control system with a wireless ad hoc network function and a control method thereof, which achieve the wireless ad hoc network function and remove difficulty in project wire arrangement. A safety identification module is added in a card reader to improve system safety. An entrance guard system management terminal applies an embedded gateway to manage every entrance guard controller on one hand and exchange information with an entrance guard management server on the other hand. The system adopts the mode of combination of the B / S structure and the C / S structure and is formed by a center server, branch center servers and an intelligent entrance guard controller. A center server database is interlinked with each branch center server database, and the branch center servers start ZigBee protocol stack and conduct data communication with the intelligent entrance guard controller through a ZigBee and / or transmission control protocol (TCP) / Internet protocol (IP) interface. The entrance guard controller is connected with a card reader connected with an encryption module. The swiping card record is uploaded by the intelligent entrance guard controller to corresponding branch center servers and then to the center server.
Owner:SHANDONG UNIV

Authorization method and system

The invention discloses an authorization method and system. The method comprises the following steps: setting an external authentication secret key in a signature Key and an authorization Key, wherein the external authentication secret key is in one-to-one relationship with a serial number of the signature Key; the authorization Key sends an encrypted public key to the signature Key through a first computer to save; after receiving an identity authentication request, a second computer obtains a second random number and the serial number from the signature Key and sends the same to the authorization Key; the authorization Key searches the external authentication secret key by using the serial number, and uses the external authentication secret key and an encrypted private key to sign the second random number to generate to-be-verified data to send to the signature Key through the second computer; and the signature Key verifies the received to-be-verified data by using the encrypted public key and the external authentication secret key. The method provided by the invention realize the one-to-one or one-to-many relevance of the authorization Key and the signature Key, after the identity is authenticated, the signature Key and the authorization Key can sign the data of each transaction so as to guarantee the authenticity and validity of the transaction between bank and enterprise.
Owner:FEITIAN TECHNOLOGIES

Method for traffic monitoring and business service quality guarantee strategy based on SDN

The invention discloses a method for a traffic monitoring and business service quality guarantee strategy based on SDN. The method comprises the following steps: a. creating a network topology under the SDN architecture, configuring an Openflow switch, and establishing a connection between the switch and an SDN controller; b. providing an open northbound API interface on the SDN controller; c, obtaining, by an application system program, complete device information and link information; d, inputting the business to be guaranteed according to the business requirements; e, according to a sourcedestination address of the service flow, transmitting an algorithm class to calculate a scheduling path, and generating the optimal scheduling path of the current network; f. transmitting the scheduling path in e into a strategy generation class, generating a scheduling flow table in combination with the business guarantee strategy in d, and issuing the scheduling flow table into the switch; and g. adding a data transmission queue to a switch port according to the scheduling flow table in f. By adoption of the method disclosed by the invention, the stable operation of the network business, theefficient use of the link bandwidth and the maximum optimization of the whole network performance are maximally guaranteed.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Charging method and charging device based on blockchain

InactiveCN108632480AAvoid the problem that the billing process is not transparent enoughAlleviate the technical problem that the billing process is not transparent enoughAccounting/billing servicesUser identity/authority verificationTraffic capacityUser identifier
The invention provides a charging method and a charging device based on blockchain. The method is applied in a blockchain system, the blockchain system comprises a plurality of communication nodes, the blockchain system respectively communicates with a plurality of telecommunication operator nodes, one supervision organization node and one blockchain operator node, and the method comprises the following steps: acquiring a user identifier uploaded by a communication node and traffic information corresponding to the user identifier; according to the traffic information and a preset first smart contract, obtaining charge information corresponding to the user identifier through calculation; signing the charge information with a digital certificate in the first smart contract, and obtaining signed charge information; acquiring a user public key corresponding to the user identifier, encrypting the signed charge information with the user public key, and obtaining encrypted charge information.With the method and the device provided by the invention, a technical problem of poor transparency of a charging process of network usage charges in the existing technology is eased, and a technicaleffect of making the charging process of the network usage charges become transparent is realized.
Owner:北京阿尔山区块链联盟科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products