Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

224results about How to "Guaranteed non-repudiation" patented technology

File safe protection system and method thereof

The invention discloses a file safe protection system and a method, which mainly solves the problems of network illegal invasion, information stealing and tamping, impersonation and weak deny resistance in the conventional information system. The file safe protection system consists of a unified authentication and management server, a certificate server CA, a secret key management server and a client terminal; the unified authentication and management server is used as a middle node and is used for processing or transmitting a service request sent by the client terminal; the certificate server CA processes a certificate service request of the client terminal and provides basic support for identification; and the secret key management server processes the secrete key service requests of the client terminal and the certificate server CA, and is used for encrypting and decrypting a file for the client terminal and providing parameter support for a digital certificate signed by the certificate server CA. With the adoption of the file safe protection system and method provided by the invention, identification, confidentiality, integration and non-repudiation services can be provided; and the file can be safely protected in transmission, storage, sharing and access processes.
Owner:XIDIAN UNIV

Industrial data detection block chain network architecture based on edge computing and detection method

The invention discloses industrial data detection block chain network architecture based on edge computing and a detection method, and belongs to the field of industrial data detection. The block chain network architecture comprises Internet of things, a block chain network, an edge server and an external network. A public chain is introduced, so that every citizen can join the public chain as a block chain node to maintain the block chain network, and access the block chain network as an access node at the same time. Meanwhile, edge computing is introduced, and services are provided for the block chain nodes by means of the computing power of the edge server to solve the problem of incapability of detecting acquired data due to inadequate computing power of certain block chain nodes, thereby detecting the authenticity and reliability of the acquired data, and preventing bad manufacturers from tampering with data and harming social interests. At the same time, an intelligent contract access mode is introduced, thereby enabling enterprises to automatically execute intelligent contracts, preventing bad enterprises from defaulting fines, and improving the enforcement of supervision after out-of-standard emission.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Wireless Mesh network identity authentication method based on blockchain

The invention proposes a wireless Mesh network identity authentication method based on blockchain. The method comprises the following steps: registering with a trusted third party certification authority by a user and obtaining a digital certificate; adding a registered user to a wireless Mesh network as a user node, selecting a certain number of distributed verification nodes, broadcasting the digital certificate to the verification nodes and storing the digital certificate on the blockchain of the verification nodes; broadcasting information stored on the own blockchain of each verificationnode to all user nodes; encrypting and transmitting information between the user nodes through a public key system; after the transaction is completed, broadcasting HASH values of transaction data tothe distributed verification nodes by the user nodes; adding timestamps to the HASH values by each distributed verification node, obtaining transaction information, and saving the transaction information on the blockchain of each distributed verification node. According to the wireless Mesh network identity authentication method based on the blockchain provided by the invention, the digital certificate and the transaction information are stored on the blockchain, so that information leakage and Internet fraud are effectively solved, and the data security is guaranteed.
Owner:XIDIAN UNIV

Credible extraction method for digital evidence of Android

The invention provides a credible extraction method for digital evidence of Android. The credible extraction method comprises the following steps: step 1, data are extracted from a mobile device, and timestamp information and a unique device identification number are obtained; a data verification technology is used for acquiring a hash value of a result of the step 1; a DES symmetric encryption algorithm is adopted for packaging and encrypting the hash value, the data, the timestamp information and the unique device identification number through a shared key generated randomly by an evidence obtaining client-side; an RSA asymmetric cryptographic algorithm is adopted for encrypting the shared key through a public key distributed by an evidence obtaining server, and the encrypted shared key is sent to the evidence obtaining server; after the evidence obtaining server receives the data, a private key of an RSA algorithm is used for decryption to obtain the shared key, and the shared key is used for decryption to obtain the hash value and a data package; a HASH algorithm is applied to the data package to obtain a new hash value, and whether the two hash values are the same is judged through comparison. The credible extraction method for the digital evidence of Android can improve the originality and false accusation forbiddingness of the data.
Owner:山东政信大数据科技有限责任公司

Method and system for electronic signature and mobile communication terminal used for electronic signature

The invention relates to a method and system for electronic signature and a mobile communication terminal used for electronic signature. The method includes the following steps: an electronic signature platform generates a two-dimensional code of a document to be signed based on a first electronic signature request sent by a user, and sends the two-dimensional code to a mobile communication terminal of the user; the mobile communication terminal scans the two-dimensional code and displays two-dimensional code information to the user, and requests the electronic signature platform for abstract values of the document to be signed based on a second electronic signature request of the user; the electronic signature platform generates abstract values and returns to the mobile communication terminal; the mobile communication terminal uses a user certificate stored therein to perform digital signature on the abstract values, and sends the digitally signed abstract values to the electronic signature platform to request for a document with a generated signature; and the electronic signature platform embedded the digitally signed abstract values into the document to be signed, and returns the document with the generated signature to the user. The electronic signature method provided by the invention is relatively safe, simple and rapid, and is low in cost.
Owner:卓望数码技术(深圳)有限公司

Operation request processing method and system

The invention provides an operation request processing method and an operation request processing system, wherein the method comprises the following steps that a first terminal generates operation requests and sends the operation requests to a background system server; the background system server sends the operation requests to a second terminal after verifying that the operation requests are legal; a second terminal sends the operation request data packet to an authorization electronic signature token, the authorization electronic signature token carries out prompt on the operation request data packet, confirming instructions are received, the signing is carried out, and the signed data packet is obtained; the authorization electronic signature token sends the signed data packet to the second terminal; the second terminal sends the signed data packet and the operation request data packet to a background system server; and after the background system server verifies that the data packet is passed, the operation requests are executed according to the operation request data packet. When the operation request processing method and the operation request processing system are adopted, the electronic form can be adopted for examination and approval, the use is convenient, and meanwhile, the safety and the non-repudiation of the examination and approval are also ensured.
Owner:TENDYRON CORP

Electronic voting system based on finger vein feature recognition

The invention discloses an electronic voting system based on finger vein feature recognition. The system comprises a finger vein feature acquisition device, a voting client sub-system, a voting center sub-system and a vote counting center sub-system. The finger vein image of a voter is acquired by the finger vein feature acquisition device, the voter is registered in the voting center sub-system by the finger vein feature, the legality of the voter is verified by the voting center sub-system, and the vote is issued to the voter if the voter is qualified. A biological characteristic public / private key pair of the voter can be generated by software of the voting client sub-system, and the voting process is realized by the interaction of security protocols such as certificate signing among the voting client sub-system, the voting center sub-system and the vote counting center sub-system. Compared with other electronic voting systems, the system enables a finger vein feature recognition technology to be introduced, and the finger vein feature recognition technology replaces ways such as passwords and digital certificates and takes part in the network identity authentication and the voting process, so that the safety and use convenience of the system are improved; the electronic voting system based on finger vein feature recognition also has anonymity, transparency and openness.
Owner:SOUTHWEST JIAOTONG UNIV

Intelligent traffic light safety dynamic regulating and controlling method based on alliance block chain technology

The invention provides an intelligent traffic light safety dynamic regulating and controlling method based on the alliance block chain technology. A vehicle-mounted unit, a roadside unit, a transportagency and an ACP system are included. The vehicle-mounted unit sends real-time road condition information to the roadside unit, the information is recorded in blocks through pre-selected bookkeepingroadside unit nodes, the transport agency decodes and acquires the road condition information from block chains, an intelligent contract is triggered to be automatically executed, and the duration oftraffic lights is dynamically regulated and controlled by the ACP system through the acquired road condition information. After the traffic lights are regulated and controlled, the reputation value ofthe vehicle-mounted unit is evaluated through the transport agency, and the real-time road condition information and other services can be enjoyed by paying the reputation value. The problem of centralization of traffic light control is solved, high human intervention in the traffic light management and coordination processes is reduced, and financial resources and material resources are saved. Coordination optimization of traffic light management and control is achieved, and the safe and credible communication environment is provided for a vehicle-mounted Ad-Hoc network. Meanwhile, the confidentiality, privacy and non-repudiation of the information are guaranteed.
Owner:徐州虹智智能科技有限公司

Remote attestation method based on cloud computing infrastructure as a service (IaaS) environment

The invention discloses a remote attestation method based on a cloud computing infrastructure as a service (IaaS) environment. The remote attestation method is realized by an identity authentication module, a remote attestation module and a credible platform standard metric version updating module, wherein the identity authentication module comprises an attestation identity key (AIK) certificate application module, a Privacy CA certificate issuing module and an AIK request process verifying module; and the remote attestation module comprises a communication module for a challenger and an authenticated party, and a communication module for the challenger and a credible configuration server. The remote attestation method disclosed by the invention has the beneficial effects that a connection is permitted to be established only if virtual machines (VM) to be communicated are credible through a remote attestation by adding a remote attestation process before a normal communication channel is established between the virtual machines. On one hand, the remote attestation method disclosed by the invention can implement identity authentication and remote attestation on the authenticated party, and on the other hand, the authenticated party can update version under a situation that platform varies, so as to finally realize actually feasible remote attestation of the cloud computing IaaS environment.
Owner:SOUTH CHINA UNIV OF TECH

Electronically signing method and system

The invention provides an electronically signing method and system, wherein the method includes the steps that a first terminal obtains an encrypted transaction message and first encrypted data, sends the encrypted transaction message and the first encrypted data to a first electronic signature token to conduct signing and obtains first signature information, the first terminal sends a first data package to a second terminal, the second terminal conducts signing verification on the first signature information and sends the first encrypted data to a second electronic signature token after the first signature information passes the verification, the second electronic signature token conducts decryption on the first encrypted data to obtain a first encryption strategy and sends the first encryption strategy to the second terminal, the second terminal conducts decryption on the encrypted transaction message to obtain the transaction message according to the first encryption strategy and sends the transaction message to the second electronic signature token to conduct signing to obtain message signature information, the second terminal sends a second data package to the first terminal, and the first terminal obtains the message signature information. Through the electronically signing method and system, the problem that potential safety hazards are caused and the use is inconvenient due to the uniqueness of the electronic signature token is solved.
Owner:TENDYRON CORP

Virtual power plant security scheduling and trading method based on dual blockchain technology

A virtual power plant security scheduling and transaction method based on a dual blockchain technology comprises a scheduling private chain for scheduling and a transaction alliance chain for transaction, adopts a hybrid proxy re-encryption algorithm based on a ciphertext strategy, and is formed by combining an identity-based encryption algorithm and an attribute proxy re-encryption algorithm based on the ciphertext strategy. The agent converts the ciphertext based on attribute encryption into the ciphertext based on identity encryption, so that the decryption cost of the data accessor is reduced, and the non-repudiation and reliability of production information are ensured. In the transaction process, a continuous bilateral auction mechanism based on reputation is adopted, participants can continuously adjust their own quotation according to the current electric quantity transaction price, benefit maximization is achieved, transaction information and a reputation value are recorded inan alliance chain, and tamper resistance and transparency of the information are guaranteed. A low-cost, open and transparent information and transaction platform is provided for a virtual power plant, and the safety, tamper resistance, non-repudiation, integrity and the like of data are guaranteed.
Owner:JIANGXI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products