Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

226results about How to "Guaranteed not to be tampered with" patented technology

Device networking authentication method based on blockchain

The invention discloses a device networking authentication method based on a blockchain for solving the single point failure problem existing in the current networking authentication method. The technical scheme is to deploy a blockchain network comprising a client, a submission node and a consensus node. By means of the non-tampering property of the blockchain, a device firstly registers on the blockchain before accessing the network, when the device A needs to access the network, the device sends a networking request of a device B that has accessed to the network, the device B compares the information of the device A in the networking request with the information of the device A stored in the blockchain to judge whether the identity of the device A is legal, a smart contract issues a token to the device A, a timestamp in the token ensures that the device A is valid within a certain period of time, and after the token expires, the device A needs to pass the identity authentication toaccess the network again. By adoption of the device networking authentication method disclosed by the invention, the single point failure problem existing in the traditional networking authenticationmethod can be avoided, the legality of the identity of the device is ensured, and the security of the network is improved.
Owner:NAT UNIV OF DEFENSE TECH

Internet of Things data processing method and device, and Internet of Things system

The invention provides an Internet of Things data processing method and device, and an Internet of Things system the method. The method comprises the following steps of acquiring a data identifier corresponding to collected Internet of Things data, wherein the Internet of Things data is collected by a first Internet of Things device; sending an identity verification request message containing identity verification information of the first Internet of Things device and the data identifier to each second Internet of Things device in the Internet of Things in order to enable each second internetof things device to verify the identity verification information according to the respective corresponding block chain, wherein the block chain comprises identity verification information of the legalInternet of Things devices in the Internet of Things; when identity verification passing response messages exceeding a preset proportion are received, generating a new block comprising the data identifier in the block chain corresponding to the first Internet of Things device; and writing the Internet of Things data, the data identifier and the block number of the new block into a database. According to the Internet of Things data processing method and device, and the Internet of Things system, the authenticity and the reliability of the Internet of Things data can be improved.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Distributed account book technology-based sensor network safety management method and safety system

ActiveCN110445827ASolve centralized management problemsAddress shared access controlDigital data protectionTransmissionData setUniform resource locator
The invention provides a distributed account book technology-based sensor network safety management method. The method comprises the following steps of selecting a top layer and a regional server as alliance chain nodes to establish an alliance chain, and storing a distributed account book; generating an asymmetric key for a sensing and aggregation node at the lower layer of the regional server, solidifying a private key in a memory, and writing a public key into an alliance chain; uploading the data collected by the sensing nodes to a regional server through the aggregation node, storing thedata set in an off-chain database of the regional server and encrypting the data set after the verification is passed, calculating a hash value of the data set and writing the hash value into an alliance chain to serve as an evidence; and S3, decrypting the data set, calculating a hash value of the data set, comparing the hash value with the evidence in the step S3 to verify the correctness of thedata set, and returning a uniform resource locator. The invention further provides a safety system. According to the safety management method, a centralized and effective equipment management mechanism and data safety verification are provided for a large-scale sensor network. The problem of data sharing access control is solved.
Owner:SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI

Crowdsourcing resource distributed anonymous allocation method based on block chain and allocation system thereof

The invention discloses a crowdsourcing resource distributed anonymous allocation method based on a block chain and an allocation system thereof, hereinafter referred to as a crowdsourcing resource anonymous allocation system, comprising the following steps: user registration; linking the user registration information; creating a task release intelligent contract on the block and recording task release information; making a plan on the premise of the service node; enabling the request node to select the most excellent service node from the achievement of the plan; and creating a Hash time locking contract on the block and establishing an onion route to realize anonymous communication of the two parties of the transaction. According to the invention, the Hash time locked smart contract is introduced into the block chain network, zero confirmation transaction chaining is realized, and the transaction amount in unit time is greatly improved. In addition, an onion route from the request node to the service node can be constructed through a payment channel established by the Hash time locking contract, so that anonymous transactions of the request node and the service node are realized.
Owner:JIANGSU UNIV

Information prediction method and apparatus based on blockchain, medium, and electronic equipment

ActiveCN109036579AAutomatically predict outbreaksTimely reminder of preparationsEpidemiological alert systemsSpecial data processing applicationsOutbreakMachine learning
The embodiment of the invention provides an information prediction method based on a blockchain. The information prediction method is characterized in that the method includes steps: receiving historical information of a disease and storing the historical information of the disease in a blockchain network; predicting the future trend of the disease according to the historical information of the disease through a disease prediction model and obtaining prediction results by blockchain nodes, wherein the type of the disease prediction model corresponds to the type of the disease; determining thedoctor-seeing people number according to the prediction results of multiple blockchain nodes; and determining medical resources after a future period according to the doctor-seeing people number. According to the technical scheme of the method, the outbreak condition of the disease in the future period can be effectively and automatically predicted, the preparation condition of required drug materials and medical personnel for dealing with the outbreak condition can be reminded in time, and the problem of high manpower cost caused by manual prediction of the outbreak condition of the disease is solved.
Owner:TAIKANG LIFE INSURANCE CO LTD

Anti-tampering private fund electronic contract signing system and method based on block chain

The invention discloses an anti-tampering private fund electronic contract signing system and method based on a block chain. A private fund electronic contract signing unit is used for issuing electronic contracts, receiving trustee signatures, receiving fund manager signatures, and receiving investor signatures. The original electronic contract, the custody-signed electronic contract, the fund manager-signed electronic contract and the investor-signed contract are sent to the distributed block chain support platform for storage through the distributed block chain access interface. At the same time, the signature hash codes of contracts fed back by the distributed block chain support platform in different signature stages are received. An electronic contract signing database stores electronic contract summaries, signature information and signature hash codes of electronic contracts in different signature stages. The distributed block chain access interface accesses the distributed block chain support platform. The private fund tripartite contract whole-course electronic supervision and management is achieved, and the security, repudiation resistance, zero loss and traceability of private fund tripartite contract management can be achieved.
Owner:山东明和软件有限公司

Medical alliance chain lightweight dynamic autonomous cross-chain interaction method

The invention belongs to the technical field of medical alliance chains, and discloses a medical alliance chain lightweight dynamic autonomous cross-chain interaction method. The method comprises thesteps: constructing a cross-chain consensus mechanism based on a threshold digital signature; constructing a cross-chain path certification signature, including group key generation and sharing, threshold subgroup signature generation and path certification updating; and realizing the value transfer among different alliance chain nodes. According to the method, the inter-node communication topology of a medical alliance chain is simplified, a node cross-chain communication model based on an intelligent contract state period and a node cross-chain communication identity credibility path provingconstruction rule are given, and dynamic construction and verification of inter-chain transaction interactive credible path proving are carried out; the consensus process of cross-chain transactionsby a plurality of alliance chain verification node lists is modeled into a threshold digital signature process with a plurality of privilege subgroups, so the alliance chain internal consensus based on the verification node lists is expanded into the inter-alliance chain cross-chain consensus on the premise of not increasing the computational complexity.
Owner:ZHOUKOU NORMAL UNIV

Cloud storage fine grit access control method and data uploading and data accessing method

ActiveCN108900483ATo achieve the purpose of fine-grained access controlGuaranteed safe storageTransmissionAttribute-based encryptionData access control
The invention provides a cloud storage fine grit access control method. The method is compatible to access control of a Hadoop assembly in a Plugin way and access control is performed through a central authorization server. Requests intercepted and sent to the central authorization server from the Plugins are accessed to a strategy engine by accessing a binding layer. Authority strategies are encrypted/decrypted through a strategy encryption/decryption layer, finally, through an engine background, storage and reading of the authority strategies are finished, and the storage form is authority encryption ciphers. The decrypted authority strategies are analyzed by the strategy engine, and authorities which can be identified by each Plugin are obtained through the analysis and returned to thecorresponding Plugins. Verification of the authorities is finished by the Plugins and whether user requests of this time are permitted is judged through the Plugins. According to the invention, by introducing autonomous access control, access control authorization of data by a data uploader is achieved; and by introducing a method based on attribute-based encryption, self-description of an accesscontrol structure is performed through attribute labels of data.
Owner:JIANGSU R & D CENTER FOR INTERNET OF THINGS

Networked transaction certification system and method

The invention discloses a networked transaction certification system which comprises an encryption authentication device, a networked computing device and a transaction system device, wherein the encryption authentication device is connected with the transaction system device through the networked computing device, the networked computing device is used for receiving request transaction information submitted by a user, and transmitting the request transaction information to a transaction system device; the transaction system device is used for generating a random code according to the request transaction information, and searching an elliptic curve password public key corresponding to the user in a user database, and the transaction system device is also used for encrypting request transaction information and a random code by using the elliptic curve password public key, transmitting the encrypted ciphertext to the networked computing device, and storing the request transaction information and the random code into a transaction information database. The invention can realize confidentiality and integrity of a message, authenticity of a transaction entity and non-repudiation of transaction, and has the characteristics of high safety, capability of avoiding transaction hijacking, transaction falsification and remote control.
Owner:北京信安世纪科技股份有限公司 +1

Blockchain-based network security auditing system and network security auditing method

The invention relates to a blockchain-based network security auditing system and a blockchain-based network security auditing method. The network security auditing method comprises the steps that: anauditing server applies for a signature public/private key pair and a secret key to a secret key management server, a block generation server of the blockchain applies for a signature public key to the secret key management server, the auditing server acquires data to be audited and encrypts the data to be audited to generate C1, re-encrypts an encryption secret key to generate a C2, and performing digital signature on the C1 and the C2 by means of the private key to generate sigma; and the auditing server transmits the C1, the C2 and the sigma to the block generation server, the data to be audited is placed in a data buffer region after the C1, the C2 and the sigma are verified to be valid by using the public key, generates a new block and broadcasts the new block when a block generationcondition is met, and a display terminal can request the block generation server to view the audit data. The blockchain-based network security auditing system and the blockchain-based network securityauditing method utilize the blockchain technology, and adds the blockchain into the auditing system, thus the audit data cannot be tampered, the data security is improved, the audit data in the blockchain is encrypted to ensure that the audit data can only be accessed by authorized users, and the confidentiality of the audit data is protected.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Second-hand car transaction method and server

The application provides a second-hand car transaction method and server, and the method comprises the following steps: receiving second-hand car sales information and a sales intelligent contract submitted by a seller client, registering the second-hand car sales information and sales intelligent contract in a block chain and broadcasting in the whole network; receiving a second-hand car transaction request submitted by a buyer client; searching matched second-hand car sales information according to the second-hand car transaction request and sending the matched second-hand car sales information to the buyer client; executing a target sales intelligence contract according to target second-hand car information selected by the buyer client; generating a second-hand car sales contract according to an execution result of the target sales intelligent contract, and registering in the block chain after obtaining confirmation by the buyer client and the seller client. In the process, the server registers the sales information of a second-hand car seller and the information of second-hand car purchase of a second-hand buyer in the block chain, so as to ensure that the second-hand car transaction data are secure and cannot be tampered, and ensure the security of the transaction data and the transparency of the transaction.
Owner:LAUNCH TECH CO LTD

Product traceability method and system based on double block chains

The embodiment of the invention provides a product traceability method and system based on double block chains, being characterized by processing existing cloud computing data and server resources ofan enterprise, constructing a double-blockchain fusion model based on a private chain and a public chain by combining a high-efficiency private chain mode and a cross-chain technology, effectively fusing the cloud computing data and the block chain, and extracting cloud computing data and recording hash values of the cloud computing data into a private chain, and the private chain traceability necessary data is uploaded to the public chain, so as to ensure data tampering prevention and subsequent verification, thus realizing high-efficiency interaction between cloud computing data and on-chaindata, reducing the difficulty of deploying a blockchain system by an enterprise, finally realizing intelligent generation of product traceability information, and meanwhile, eliminating human factorsof information circulation among main bodies of a supply chain, so that traceability information authentication which is more accurate, and more complete and more reliable than traditional product traceability is generated.
Owner:WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products