Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

40results about How to "Guaranteed safe and reliable" patented technology

Two-factor authentication method based on portable TPM (PTPM) and certificateless public key signature for cloud

The invention discloses a scheme for implementing two-way identity authentication between a user and cloud by applying a portable TPM (PTPM) and certificateless public key cryptography to a cloud environment, aiming at solving the security problems and deficiencies existing in identity authentication between the user and the cloud in a current cloud environment in a cloud computing mode. Comparedwith existing schemes, a new scheme has the following advantages: on the basis of realizing the uniqueness of user and cloud identities through the establishment of an identity management mechanism, firstly, the PTPM is adopted to ensure the security and credibility of a terminal platform and ensure the authenticity and correctness of authentication results between the cloud and the user, and moreover, the user is supported to use any terminal equipment to complete an identity authentication process with the cloud; secondly, the new scheme implements a 'password + key' two-factor authentication process based on a certificateless public key signature algorithm; and finally, the proposed scheme can significantly improve the computing efficiency of identity authentication between the user andthe cloud while ensuring the security of EUF-CMA.
Owner:SHENYANG NORMAL UNIV

Trusted redundant fault-tolerant computer system

The invention provides a trusted redundant fault-tolerant computer system which aims at satisfying the requirement for high safety and high reliability of systems in safety control fields. The trusted redundant fault-tolerant computer system is capable of blocking the operation of illegal programs of malicious codes, viruses and the like, protecting the system and core applications from being destroyed, protecting important information from being revealed, stolen, tampered and ruined, and shielding faults by means of a failure switching function to enable the system to work normally when faults of the system occur. The trusted redundant fault-tolerant computer system is based on a trusted cryptography module (TCM) safety chip, and a dual-computer redundant hot standby method and a compact peripheral component interconnect (CPCI) bus framework are used. Two trusted computer subsystems are configured in a computer case, each of the trusted computer subsystems is composed of a trusted computer main module (including a TCM and a flash disk), a power source module, a flash disk expansion module and an interface expansion module, and the failure switching between the two subsystems is achieved through a heartbeat server and a failure switching module.
Owner:中国人民解放军火箭军研究院突防与防御研究所

Identity authentication method and device based on block chain

The invention discloses an identity authentication method and device based on a block chain. The method is applied to any edge server in an edge server block chain, and comprises the following steps:receiving an identity authentication request of a terminal node, wherein the identity authentication request comprises the identity information of the terminal node; querying identity authentication data of the terminal node in an edge server block chain according to the identity authentication request of the terminal node; and responding to the identity authentication request according to the identity authentication data. Through the implementation of the method and the device, the flexibility of terminal node identity authentication in a loose coupling environment and the availability undera distributed request are realized, so that the high-efficiency availability of an identity authentication function is ensured; and according to the embodiment of the invention, the transparency and traceability characteristics of the block chain are combined with the two-layer architecture of the edge computing, so that the terminal node is transparent to one-way information of the edge server and traceable to one-way data, and the security and credibility of an identity authentication function are ensured.
Owner:HAINAN UNIVERSITY

Virtual machine static measurement method and device based on built-in security architecture

The invention relates to a virtual machine static measurement method and device based on a built-in safe architecture. The method comprises the steps of in the starting process of a physical host, enabling safe independent equipment to carry out safety measurement on a host machine system and virtualization software to ensure credibility of the host machine system and the virtualization software;enabling the host machine system and the virtualization software to determine a to-be-measured virtual machine core file; analyzing the virtual machine mirror image file, extracting the content of theto-be-measured virtual machine core file, performing security measurement on the content, and generating a measurement value; if judging that the virtual machine is started for the first time, indicating that the metric value serves as a reference value to be stored in the safe independent equipment, and the virtual machine is started; and if judging that the virtual machine is not started for the first time, verifying the metric value and a reference value in the safe independent equipment, cancelling starting of the virtual machine if verification fails, and starting the virtual machine ifverification succeeds. According to the invention, the extension of the static measurement mechanism of the virtual machine to the virtual machine can be realized, and the security of the virtual machine is enhanced.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Credible IOT (Internet of Things) implementation method based on TPM chip

The invention discloses a credible IOT (Internet of Things) implementation method based on a TPM chip, and the implementation process of the method comprises the steps: setting an information collection terminal and a management terminal, wherein the information collection terminal is information collection equipment provided with the TPM chip, and the management terminal is used for receiving the information collected by the information collection terminal and completing the information processing and analysis; collecting the integrity information of the information collection terminal through the TPM chip, enabling the integrity information to be uploaded to the management terminal, and verifying the integrity of the information collection terminal so as to judge whether the information collection terminal is credible or not. Compared with the prior art, the method employs the physical features of the TPM chip to collect the integrity information of the hardware, an operating system and an operation program of the information collection terminal, adds credible attributes to the information collection terminal, guarantees the safety and credibility of the IOT information collection terminal, is high in practicality, and is easy for popularization.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Attacking control method for protecting kernel system

The invention discloses an attacking control method for protecting a kernel system. The attacking control method includes the step 101 that an active trapping system is set up in pre-defense in a network defense system, an attacking control engine of the trapping system is arranged in the kernel system, and an attacking detection engine, an analysis engine and a control engine are set up in the kernel system of an operating system of a computer to detect and control act information, the step 102 that information from the step 101 is obtained through the attacking control engine arranged in the kernel system, and the attacking control engine can prevent files in a kernel from being maliciously attacked and replaced, prevent running of malicious acts and utilization of the functions of the malicious acts and finally uninstall the malicious acts from the kernel system, and the step 103 that the process is ended. According to the attacking control method, whether acts are control acts or not can be judged, and the malicious control acts can be timely blocked by conducting fine-grained searching and killing such as pilot system file protection check, loading system file protection check, drive module protection check and hardware supporting module protection check, and security and credibility of the kernel system are ensured.
Owner:江苏中科慧创信息安全技术有限公司

Water level detection device and Turkish coffee machine with same

The invention discloses a water level detection device and a Turkish coffee machine with the same. The water level detection device comprises a base, a water tank, a first water level induction pin and a second water level induction pin, wherein the water tank is installed on the base separably; the first water level induction pin and the second water level induction pin are installed at the bottom of the water tank, the upper ends of the first water level induction pin and the second water level induction pin extend into an inner cavity of the water tank, and the lower ends of the first water level induction pin and the second water level induction pin extend out of the water tank. The water level detection device further comprises an installation box, a first conductive part, a second conductive part, a first elastic pin, a second elastic pin and a first elastic component, wherein the installation box is installed in the base; the first conductive pin and the second conductive pin are installed in the installation box; the first elastic pin and the second elastic pin are installed in the positions, corresponding to the first water level induction pin and the second water level induction pin, of the top of the base respectively and can move vertically between an off position and an on position; and the first elastic component is installed on the first elastic pin and the second elastic pin. The water level detection device is high in detection precision and can guarantee electric safety.
Owner:GUANG DONG ELEC-TECH RETOP LED DISPLAY CO LTD

Fuel gas supervision system and supervision method

The invention is suitable for the technical field of fuel gas supervision, and provides a fuel gas supervision system, which comprises terminal equipment, an intelligent Internet of Things security gateway and a fuel gas supervision platform which are connected in sequence, the terminal equipment is used for being connected with the intelligent Internet of Things security gateway and uploading information data of the terminal equipment to the intelligent Internet of Things security gateway; the intelligent Internet of Things security gateway is used for encrypting and packaging the information data of the terminal equipment into an encrypted data packet and uploading the encrypted data packet to the gas supervision platform by using a 5G network; the fuel gas supervision platform comprises an intelligent fuel gas management and control integrated subsystem, a block chain subsystem, an identity authentication subsystem and a timestamp subsystem. According to the invention, identity authentication, a cryptographic algorithm, a block chain and edge calculation are combined with a 5G technology, so that the equipment safety problem, the data safety problem, the real-time supervision problem and the accident traceability problem in the gas supervision process are ensured, and the automation, digitization, visualization and intelligence levels of gas supervision are effectively improved.
Owner:河南中盾云安信息科技有限公司

Decentralized safety guarantee method and device for packet full life cycle

The invention discloses a decentralized security assurance method and device for a packet full life cycle, and the method comprises the steps: carrying out the authenticity verification of a source address and an identity of a data packet group through a distributed network node after the data packet group is generated at a communication source end; in the network forwarding process of the data packet groups, performing collaborative sampling and detection on the data packet groups through the distributed network nodes, and performing credibility verification on related routing behaviors; after the data packet group arrives at the destination end, verifying and filtering the legality of the data packet group through the destination end. According to the method, a decentralized informationmonitoring and intelligent detection technology is utilized; according to the method, the safety of the data packet groups in the whole life cycle of 'source end generation-midway forwarding-destination end receiving' is ensured, the technology has the advantages of high flexibility, strong adaptability, decentralization, robustness and the like, and the safety and credibility of the whole networksystem are ensured while the calculation overhead and the storage overhead are both considered.
Owner:TSINGHUA UNIV

On-chain and off-chain collaborative digital asset management method and protocol for element universe application

PendingCN114707973ARealize on-chain and off-chain collaborationConsistent ownershipPayment circuitsSecuring communicationManagement toolDigital content
The invention relates to an on-chain and off-chain collaborative digital asset management method and protocol for element universe application. According to the technical scheme, the on-chain and off-chain collaborative digital asset management method for the meta universe application comprises the steps that a management tool calls a downloading interface function of a corresponding digital asset from a corresponding block chain according to a to-be-downloaded digital asset ID; after a downloading interface function of the digital assets on the block chain is called, transaction and transfer interface functions corresponding to the digital assets are set to be non-callable, and meanwhile, the block chain feeds back all digital contents corresponding to the digital assets to a management tool; the management tool packages all digital contents into an under-chain carrier file and completes private key encryption operation; and after the under-chain carrier file is packaged, the management tool obtains partial permissions of the corresponding digital assets, and the partial permissions are used for changing and calling the state of the digital assets on the block chain originally bearing the digital assets when the management tool uploads the digital assets.
Owner:中科计算技术创新研究院 +1

Trusted redundant fault-tolerant computer system

The invention provides a trusted redundant fault-tolerant computer system which aims at satisfying the requirement for high safety and high reliability of systems in safety control fields. The trusted redundant fault-tolerant computer system is capable of blocking the operation of illegal programs of malicious codes, viruses and the like, protecting the system and core applications from being destroyed, protecting important information from being revealed, stolen, tampered and ruined, and shielding faults by means of a failure switching function to enable the system to work normally when faults of the system occur. The trusted redundant fault-tolerant computer system is based on a trusted cryptography module (TCM) safety chip, and a dual-computer redundant hot standby method and a compact peripheral component interconnect (CPCI) bus framework are used. Two trusted computer subsystems are configured in a computer case, each of the trusted computer subsystems is composed of a trusted computer main module (including a TCM and a flash disk), a power source module, a flash disk expansion module and an interface expansion module, and the failure switching between the two subsystems is achieved through a heartbeat server and a failure switching module.
Owner:中国人民解放军火箭军研究院突防与防御研究所

Electronic evidence processing method, system and dynamic code service system for electronic signature

The invention discloses an electronic evidence processing method and system for an electronic signature and two dynamic code service systems. The processing method includes the following steps that a dynamic code service system receives a dynamic code request initiated by a third-party system, the dynamic code service system generates the corresponding dynamic code based on the content of the dynamic code request and sends the dynamic code to the dynamic code reception end account corresponding to the identity information of a user; the third-party system acquires the dynamic code input by the user and returns the dynamic code to the dynamic code service system; the dynamic code service system receives the dynamic code returned by the third-party system, verifies whether the transmitted dynamic code and the received dynamic code is consistent, and sends the verification result to the third-party system; a digital signature module performs digital signature and / or time stamp signature on the content transmitted and received by a transmit-receive module to form an evidence; an evidence storage module stores the evidence; and a certified module completely verifies the evidence in the evidence storage module and gives a corresponding report based on the recorded content of the verified evidence. According to the invention, the problem that the signed document of the electronic signature in the prior art cannot be verified is solved.
Owner:HANGZHOU APEMAN DATA TECH CO LTD

Water level detection device and Turkish coffee machine having same

The invention discloses a water level detection device and a Turkish coffee machine with the same. The water level detection device comprises a base, a water tank, a first water level induction pin and a second water level induction pin, wherein the water tank is installed on the base separably; the first water level induction pin and the second water level induction pin are installed at the bottom of the water tank, the upper ends of the first water level induction pin and the second water level induction pin extend into an inner cavity of the water tank, and the lower ends of the first water level induction pin and the second water level induction pin extend out of the water tank. The water level detection device further comprises an installation box, a first conductive part, a second conductive part, a first elastic pin, a second elastic pin and a first elastic component, wherein the installation box is installed in the base; the first conductive pin and the second conductive pin are installed in the installation box; the first elastic pin and the second elastic pin are installed in the positions, corresponding to the first water level induction pin and the second water level induction pin, of the top of the base respectively and can move vertically between an off position and an on position; and the first elastic component is installed on the first elastic pin and the second elastic pin. The water level detection device is high in detection precision and can guarantee electric safety.
Owner:GUANG DONG ELEC-TECH RETOP LED DISPLAY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products