Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

106results about How to "Guaranteed not to be leaked" patented technology

Method and device for medical information sharing privacy protection based on blockchain technology

The invention discloses a method and device for medical information sharing privacy protection based on a blockchain technology. According to the method, in aspects of privacy protection based on a blockchain technology, medical data on-chain and off-chain storage and forced privacy protection safety multiparty calculation, illegal medical data obtaining, use and tampering are avoided, and medical information sharing, big data analysis and utilization and patient privacy protection are implemented. The device comprises a data storage module, a service module provided based on the blockchain technology and a call service module provided externally, wherein a three-layer data storage frame is adopted for the data storage module; and the service module provided based on the blockchain technology mainly comprises forced privacy protection safety multiparty calculation. The method and device for medical information sharing privacy protection based on the blockchain technology are mainly applied to the fields of method and device for medical information sharing privacy protection based on a blockchain technology and medical big data analysis and the like, and technical guarantee is also provided for patient privacy protection while medical information sharing is achieved based on the blockchain technology.
Owner:HANGZHOU DIANZI UNIV

A contract signing system based on multi-party consensus of alliance chains

ActiveCN109377198ASolve the cumbersome processPrevent modification of dataOffice automationChain systemBlockchain
The invention discloses a signing system based on multi-party consensus of alliance chains, aiming at providing infrastructure of private fund industry, providing a private fund online signing management system based on alliance chain system, supporting multi-party participation and consensus, encrypting and verifying data for private fund entrusting party, management party and custodian party. The technical scheme is as follows: the contract signing scheme realized by the contract signing system of the invention, in which encryption sharing and multiple independent signatures are carried outsimultaneously, cannot only ensure that the electronic contract is not leaked on the block chain, but also can effectively verify whether the contract is tampered with or not. Moreover, the block chain multi-party consensus algorithm in the system of the invention can efficiently complete the minimum consensus of four nodes and prevent malicious nodes from modifying data. In addition, the heterogeneous contract storage design in the system of the invention can combine the traditional database system and the block chain system to realize the classified storage of the data on the chain and underthe chain, which is convenient for the local search and inquiry and ensures that the commercial secrets are not disclosed.
Owner:上海金融期货信息技术有限公司

Digital certificate management method and system based on block chain, equipment and storage medium

The invention discloses a digital certificate management method and system based on a block chain, equipment and a storage medium, in the method, a certificate template can be issued only after passing through a registration program, strict management and control are carried out from the root of certificate issuing, the certificate template and a sending record of each certificate can be traced, and the problem of certificate counterfeiting is thoroughly solved, the certificate inspection cost can be reduced, and the certificate inspection efficiency is improved. Before a certificate is issued and verified, a secure connection needs to be established between an applicant and an issuer and between a holder and a verifier, and the adopted DID technology provides a basis for secure communication and increases the security of certificate transmission. Besides, the certificate verifier can complete validity verification of the certificate based on the verifiable declaration provided by the holder, and the generation process of the verifiable declaration is combined with cryptographic technologies such as zero-knowledge proof and Merkel tree to selectively disclose certificate attributes, so that the privacy of the certificate holder can be ensured not to be leaked, and the security is improved.
Owner:HUNAN UNIV

Online banking transaction method, device and system, and mobile terminal

The embodiment of the invention discloses an online banking transaction method, device and system, and a mobile terminal. The method comprises the following steps that: an online banking APP (Application) sends an online banking transaction message to a corresponding TA (Trusted Application); the TA extracts online banking transaction display information from the online banking transaction message, and the online banking transaction display information is displayed through a TUI (Trusted User Interface); and the TA sends verification information input through the TUI and the online banking transaction message to Applet in an SE (Safety Element) module to be processed, and the TA sends a processing result to the online banking APP. By use of the method, the device, the system and the mobileterminal, the user can confirm transaction information in the trusted UI environment, and the correctness of transaction information can be guaranteed; a password is input in the trusted UI environment, and the password can prevent from being leaked; the user can identify the authenticity of the trusted UI environment through reserved information; and the storage and the use of a private key arerestricted in the SE, the private key can prevent from being leaked, and online banking transaction safety is guaranteed.
Owner:WATCHDATA SYST +1

Method for switching three-partner key with privacy protection based on password authentication

The present invention relates to an authenticated key exchange technique, and discloses a three-party password-based authenticated key exchange method which is provided with a privacy protection. The method comprises the following steps: an initialization step, exchanging the reserved information by two client subscribers which prepare to do key exchange; a client initialization stage, ciphering the information respectively by two client subscribers which prepare to do key exchange with the respective passwords and sharing passwords in the server and transmitting to the server together with the non-ciphered information; a server procession stage, when the server receives the request information from the client, using an oblivious transfer mechanism for processing these information and generating different returning information aiming at each one in two client subscribers, and then respectively transmitting these information to corresponding client subscriber; a client authorization step, when the client receives the returning information of the server, adopting a mechanism of normal key exchange for processing the returned information based on the password itself in order to generate the seed of the conversation key, and generating the authorization information with the seed of the conversation key for transmitting to the subscriber of the other side; and a conversation key generating step, if the authorization information from the subscriber of the other side is authorized, generating the conversation key with the seed of the conversation key. Compared with prior art, the plan not only realizes the three-party password-based authenticated key exchange, but also simultaneously and effectively protects the privacy information comprising identity and participation action of the client subscriber which participates the key exchange.
Owner:INST OF INFORMATION ENG CAS

Switching median filtering based encrypted image denoising method

The invention discloses a switching median filtering based encrypted image denoising method, which belongs to the field of multimedia information security and image processing. The method involves an image owning party, an image denoising party and an image receiving party, the image owning party has a noisy image, and hopes to denoise the image by the image denoising party and then transmit the image to the image receiving party, but because the image owning party distrusts the image denoising party, after the image is encrypted, the image owning party transmits the image with covered contents to the image denoising party to process. The method comprises the following steps: firstly, carrying out encryption on the image by using a particular image encryption method, and due to the particularity of the encrypted image, carrying out denoising processing on the image by using a non-traversing switching median filtering; firstly, dividing the image into blocks, and finding the mean value, standard deviation and mid-value of each block; then, obtaining a threshold according to the standard deviation, and determining a noise point; and finally, replacing the pixel value of the noise point with the mid-value. The method disclosed by the invention not only effectively realizes the image denoising, but also protects the information security of images.
Owner:CHONGQING UNIV

Fog collaborative cloud data sharing method based on attribute-based encryption

The invention discloses a fog collaborative cloud data sharing method based on attribute-based encryption. The method comprises the following steps: 1, initializing a system; the authorization mechanism generates a system public key, a system master key, a private key of the cloud service provider, a public key of the fog node and a private key of the fog node; 2, performing data encryption; the user encrypts the shared data based on the shared content key and then sends the encrypted shared data to the fog node; 3, performing data preprocessing; the fog node receives ciphertext data transmitted from a user, and outputs a preprocessed classification result and indexes of related data information entries; 4, re-encrypting the data; the fog node operates an algorithm, re-encrypts the shareddata based on a professional access strategy, and encrypts related professional entries corresponding to each piece of data; 5, performing data decryption; as long as the attributes of the cloud service provider can meet personalized and professional access policies, the cloud service provider can decrypt the shared ciphertext. According to the method, professional information classification and effective data analysis of the shared data can be conveniently realized.
Owner:已未来(北京)通信科技有限公司

Solution for potential safety hazards in VPN (virtual private network)

The invention discloses a solution for potential safety hazards in a VPN (virtual private network), which comprises the following steps that: A, a firewall server detects that whether a ciphertext of packet header information of an encryption part of a data packet in a VPN tunnel is in a black and white list corresponding to a destination IP address in plaintext packet header information thereof; B, if the obtained result in the step A is that the ciphertext is not in the black and white list, the firewall server inquires firewalls according to the destination IP (internet protocol) address so as to obtain eligible FDD (firewall decision diagram) branches; C, the firewall server converts the inquiring results obtained in the step B into an OBDD (ordered binary decision diagram), and saves the OBDD and corresponding inquiring conditions; D, the firewall server encrypts and confuses each node of the OBDD obtained in the step C, and sending the OBDD to a VPN server; E, the VPN server decrypts the received OBDD so as to obtain destination node information, and the ciphertext of an exclusive-or data packet of the information is sent to the firewall server; and F, the firewall server executes a firewall strategy, and adds the ciphertext in the step A into the black and white list corresponding to the destination IP address. The firewall securely executes the firewall strategy for a data stream in the VPN tunnel, and the encrypted data is not leaked.
Owner:GUILIN UNIV OF ELECTRONIC TECH

An identity recognition method and system based on a national cryptographic algorithm

The invention discloses an identity recognition method and system based on a national cryptographic algorithm, and the method comprises the steps: transmitting a program and storage data through a debugging interface, the storage data comprising a public key, a private key, a program, a signature, and the like, and the program comprising a main program; Public key Hash is encrypted through a national cryptographic algorithm and then stored in an OTP module, and a private key, a signature and the like are encrypted through the national cryptographic algorithm and then stored in an eFLASH moduletogether with a main program. Comparing a public key hash of the OTP module with a result obtained by performing hash operation on a public key in the eFLASH module to verify the public key, and considering that the public key is legal when the comparison result is consistent; When the public key is legal, the private key is compared with the signature according to the sequence obtained by executing the main program to verify the private key, and when the comparison result is consistent, it is considered that the private key is legal and passes through the signature. According to the scheme,the problems of low security level and the like in the prior art are solved, and the security level is improved through multi-level encryption.
Owner:上海芯钛信息科技有限公司

Multifunctional near field communication integrated system and method

The invention relates to a multifunctional near field communication integrated system and a multifunctional near field communication integrated method, which are applicable to near field communication equipment. The multifunctional near field communication integrated system comprises a USB (universal serial bus) encryption chip, an NFC (near field communication) master control chip and an RFID (radio frequency identification) chip; the USB encryption chip is connected with the NFC master control chip through an SPI (serial peripheral interface) control bus, and the NFC master control chip is communicated with the RFID chip through the RF (radio frequency) communication mode; the USB encryption chip is used for realizing the function of a card-issuing card reader; the NFC master control chip is used for realizing the communication type conversion, and the contact communication is converted into non-contact communication; the RFID chip is used for realizing the function of a non-contact card; the USB encryption chip is connected with a PC (personal computer) host through the USB interface, and the PC host carries out read-write authentication and data modification on the RFID chip through the USB encryption chip and the NFC master control chip. With the adoption of the multifunctional near field communication integrated system and the multifunctional near field communication integrated method, the number of cards and USB flash disks carried by users is reduced, the integrated system is convenient and feasible, can be used for issuing cards and also can be used as a card.
Owner:刘宏伟

Information leakage preventing method and system based on internet of things

The invention discloses an information leakage preventing method and system based on the internet of things. An RFID (Radio Frequency Identification Device) chip responder and a reader of an application layer of the internet of things, which are mutually communicated and arranged in the internet of things; and the RFID chip responder stores an electronic carrier of identifying information of things in the internet of things. The method comprises the following steps that the RFID chip responder encrypts a private key and a public key and then transmits encrypted information to the reader of the application layer of the internet of things by a network layer of internet of things; the reader of the application layer of the internet of things decrypts the public key and the private key and generates a new private key every time; and the reader of the application layer of the internet of things encrypts and forwards the new generated private key to the RFID chip responder and readers of other application layers of the internet of things by using the public key. The invention protects the safety of data in the internet of things and prevents the leakage of information by a public key and private key encrypting mechanism. In the whole process of realization, the dynamic replacement of the private key not only further protects information safety but also improves the difficulty of password cracking.
Owner:WUXI CINSEC INFORMATION TECH

Double encryption-based service data processing method for power distribution terminal

The application discloses a double encryption-based service data processing method for a power distribution terminal. According to the method, received massages are processed by means of IPSec protocol authentication and decryption, and an identity authentication operation and a data decryption operation are performed at an application layer, so that data is prevented from being leaked, a power distribution system network is not maliciously invaded, the messages received by the power distribution terminal are sent by safe equipment, and the situations such as malicious attacks caused by data communication between masquerading equipment and the power distribution terminal can be avoided. The dual protection of a network layer and the application layer is realized in a process of service data processing of the power distribution terminal, so that the security protection performance of the power distribution terminal is improved, and the situations of the malicious attacks are avoided. The application also discloses a data encryption method of the power distribution terminal, a service data processing system, a data encryption system, the power distribution terminal and a computer readable storage medium, which have the beneficial effects.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1

Verifiable outsourcing computing method for realizing safety and high efficiency of large-scale matrix multiplication, client and cloud computing system

The invention relates to the technical field of cloud computing, and discloses a verifiable outsourcing computing method for realizing the safety and high efficiency of large-scale matrix multiplication, a client and a cloud computing system. According to the present invention, a new outsourcing calculation protocol suitable for calculating a large-scale matrix multiplication result is provided, the client with less computing resources/weak computing power can outsource the multiplication operation of the matrix to the cloud server with a large number of computing resources with less computingexpenditure under the premise of ensuring that the sensitive matrix data is not leaked when facing the large-scale matrix multiplication operation, and the safe and reliable verification about a matrix multiplication result is provided for the client, so that the requirements of the outsourcing computation for safety (verifiability), privacy and high efficiency are met, and the method is convenient to apply and popularize practically. Compared with an existing related protocol, the probability that the verification scheme passes through a guessing result is lower, and the verification schemedoes not depend on an original plaintext matrix and the random verification times, and the verification efficiency is also higher.
Owner:SICHUAN UNIV

Management method for transaction processing in management system

The invention discloses a management method for transaction processing in a management system. The method comprises: a transaction submitter assigns a user / employee to carry out processing; and otherwise, a transaction processing request is assigned to a preset assignee and the assignee assigns an assigned user / employee to carry out processing according to a content a transaction processing request submitted by the transaction submitter. According to the invention, the function of assigning a user / employee to carry out processing is provided for the transaction submitter and the transaction can not be transferred, so that the transaction privacy is protected from being leaked and thus the fair transaction processing is guaranteed. Because the independent individual role is used as an assignee, when the assignee resigns or is transferred to another position, only a newly-appointed assignee needs to be associated to an assigned role to obtain current all transactions automtaically, so that the transaction transferring workload is reduced; moreover, the seamless docking is realized, transaction assignment lagging or missing is avoided, and thus the emergency event can be dealt with timely and a negative effect that is caused on the employee's enthusiasm because the transaction submitted by the employee can not be responded timely is eliminated.
Owner:CHENGDU QIANNIUCAO INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products