Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

71results about How to "Guaranteed tamper resistance" patented technology

Routing position data secrecy storing and sharing method based on block chain

Provided is a routing position data secrecy storing and sharing method based on block chains. The routing position data secrecy storing and sharing method includes a data storing method and a data sharing method. The data storing method includes the steps of node configuration, data encryption sending, storage subnetwork verification storing, etc. The data sharing method includes the steps of demand generation, demand response, sharing achievement and the like. The effects of the invention are as follows: through a block chain technology, data sharing is realized through data encryption storage and a decentralized network to solve the problems that data storage parties have no right to use data and users do not have channels to selectively enable personal data to be accessed; local encryption sending is adopted during data storage, service parties store encrypted data, the users themselves save decryption secret keys, and the service parties have no access to original data, so a better data protection effect is achieved; and the block chain technology is adopted during storage, commonly recognized storage is realized through a practical Byzantine fault-tolerant algorithm, workload bottleneck problems of centralized storage are solved, and data is prevented from being tampered.
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY

Data right confirmation method and system based on block chain technology

The invention discloses a data right confirmation method and system based on a block chain technology. The method comprises the following steps: initializing and verifying a digital certificate; generating a user DID and a data DID and uploading the user DID and the data DID; calculating a hash value of the data to be subjected to right confirmation and signing to obtain the hash value and a signature; applying an authoritative timestamp according to the hash value of the to-be-confirmed data; generating a data certificate of the to-be-confirmed data according to the uplink user DID, the data DID, the timestamp, the hash value and the signature, verifying the data certificate, calculating the hash value of the data certificate, and signing the hash value of the data certificate to obtain a signature certificate; and uploading the verified data voucher and signature voucher to obtain right confirmation record uplink hash and returning the right confirmation record uplink hash to the client. According to the invention, the decentralized digital identity DID is adopted, and the data right confirmation information of the to-be-confirmed right data is stored in the block chain in the form of the verifiable certificate, so that the right confirmation function of the to-be-confirmed right data is realized, and the characteristics of verifiability, traceability, tamper resistance and the like of the data right confirmation information are ensured.
Owner:JIANGSU PAYEGIS TECH CO LTD +1

Application system based on quantum keys, and use method of application system

The invention discloses an application system based on quantum keys. The system comprises institution key management centers arranged at all institutions and used for providing unified quantum key services for application security and communication security, and a national key management center communicating with the institution key management centers of the institutions and responsible for distributing and sending the quantum keys or quantum key IDs for the institutions; and the two institution key management centers need to simultaneously initiate requests of obtaining the same quantum key to the national key management center. A barrier between an entity quantum network and a virtual application network is broken through, so that the high-security characteristics of the quantum keys arefurther extended to the service field, and further development of information security work is promoted; and by utilizing high security of the quantum network, the difficult problem of key distribution synchronization in the service field is solved, and the problems of the authority, credibility and security of key sources are solved, so that the confidentiality and the tamper-proofing performance of service information transmitted in an untrusted network are further guaranteed.
Owner:北京安御道合科技有限公司

Real-time early warning system and method of highway passenger transportation violation based on block chain

The invention provides a real-time early warning system and method of the highway passenger transportation violation based on a block chain. The real-time early warning system comprises a plurality ofpassenger mobile terminals, a mobile terminal wireless communication module, a cloud data storage server, a block chain data processing server and a block chain data storage server. According to thereal-time early warning system and method, the basic information of a driver is uploaded to the cloud data storage server through the mobile terminal wireless communication module; passenger GPS dataare collected through the passenger mobile terminals and transmitted to the cloud data storage server through the mobile terminal wireless communication module, and the block chain data processing server calls the passenger GPS data in the cloud data storage server for processing; and the block chain data processing server judges the violation behavior of the driver according to the overspeed early warning, overload early warning, fatigue driving early warning and malicious change of operation route early warning, and sends corresponding warning information to the driver through an intelligentcontract. The real-time early warning system and method have the advantages of timeliness of early warning data and non-tampering of violation information.
Owner:WUHAN UNIV OF TECH

A warehouse receipt pledge financing evaluation method and device based on a block chain architecture

The invention provides a warehouse receipt pledge financing evaluation method and device based on a block chain architecture, and the method comprises the steps that a fund demand side node receives awarehouse receipt pledge financing request, and constructs an application evaluation information block according to the warehouse receipt pledge financing request; the financing cooperation platformnode carries out financing risk assessment on the warehouse receipt pledge financing request according to the application assessment information block, and constructs a financing risk assessment result information block according to a financing risk assessment result; the fund demander node constructs a financing submission confirmation information block according to the financing risk assessmentresult information block; and the fund provider node constructs a financing result information block according to the financing submission confirmation information block and the financing risk assessment result information block, and adds the financing result information block into the blockchain. According to the technical scheme, the safety and efficiency of warehouse receipt pledge financing evaluation are improved, and the development of warehouse receipt pledge financing business is greatly promoted.
Owner:CITIC PHOENIX HARBOR SUPPLY CHAIN MANAGEMENT CO LTD

Electronic seal system and electronic seal method based on time stamp and GPS location

The invention discloses an electronic seal system based on a time stamp and GPS location. The electronic seal system comprises a client, a server and a GPS base station, wherein the client and the server are respectively in communication connection with the GPS base station; the server consists of a core layer, a management layer and a service layer. An electronic seal method based on the electronic seal system comprises the following steps: firstly, preparing a ready credible time source, a credible position and key information, after calculating a digital digest by the client, sending to the server, reading the credible time and a credible position of the client from the GPS base station by using the server, signing the digital digest, the credible time and the credible position by the server, returning a file to the client after the time stamp and a locating position file are generated, verifying the returned file by the client, then binding the file and an original text together, and storing. According to the electronic seal system and the electronic seal method disclosed by the invention, the GPS system is utilized to locate the time and the position of a seal file of the client, the time and the position of carrying out operation in the electronic seal process can be locked, and the tampering and disavowing resistances of the file can be effectively ensured.
Owner:同智伟业软件股份有限公司

Management system and management method of sales contract

The invention discloses a management system and a management method of sales contract. The management system comprises a server unit, an information maintenance unit, a sales unit, a contract generating and saving unit, a contract signing unit, a B / S inquiry unit and a contract checking and printing unit. Techniques of network, computer, communication, mobile equipment, two-dimensional code encryption, digital signature and the like are integrated with the management system and the management method fully. Electronic contract is generated by calling an enterprise information system, is subjected to two-dimensional code encryption and digital signature to avoid being counterfeited, tampered and repudiated, and can be checked and printed and the like. Since iron and steel product contract is generated automatically, signed and printed by customers themselves, accuracy, real-time performance, effectiveness, unlimited location of iron and steel product contract generation are improved, steel product circulation efficiency is improved, and integral informatization level and list sales service level of the iron and steel industry are increased. In addition, security and reliability of the electronic contract are guaranteed by the two-dimensional code encryption and digital signature techniques.
Owner:WUKUN STEEL

Object-oriented security chip and encryption method thereof

The invention relates to an object-oriented security chip and an encryption method thereof. The security chip comprises a central processing unit (CPU), a symmetric cryptographic algorithm unit, an asymmetric cryptographic algorithm unit, a communication unit, a security protection unit, a data storage unit, an interruption source and a timer/counter, wherein the CPU is used for coordinating other functional modules in the security chip to ensure the normal operation; the symmetric cryptographic algorithm unit is used for implementing encryption and decryption operations on the data by adopting a national secret symmetric cryptographic algorithm; the asymmetric cryptographic algorithm unit is used for achieving signing and signature verification of digital certificates and calculating message abstracts and key negotiations between two communication parties by adopting a national secret asymmetric cryptographic algorithm; the communication unit is used for performing data communication; the security protection unit is used for guaranteeing the normal operation of the security chip; the data storage unit is used for storing keys; the interruption source is used for initiating an event interruption request to the CPU; and the timer/counter is used for counting and timing during the operation of the security chip. The encryption method of the security chip comprises the following steps: separately establishing a transmission layer security link and an application layer security link, and achieving the secure transmission of the information by adopting a transmission layer and application layer dual-layer protection mechanism.
Owner:CHINA ELECTRIC POWER RES INST +1

Factoring and financing method and device based on block chain architecture

InactiveCN110738575ACertificate of authenticityEnsure transparencyFinanceLogistics managementComputer science
The invention provides a factoring and financing method and device based on a block chain architecture, and the method comprises the steps that a purchaser node or a supplier node adds a constructed supply agreement block into a block chain; the supplier node adds the constructed dispatch list block into a block chain; the logistics institution node adds the constructed carrier list block into a block chain, and adds the constructed position information track block into the block chain; the purchaser node adds the constructed receipt block into a block chain; the supplier node adds the constructed application evaluation information block into a block chain; the financing collaboration platform node performs financing risk assessment on the factoring financing request, and adds a constructed financing risk assessment result information block into a block chain; and the fund provider node performs financing assessment according to the financing risk assessment result information block, and adds the constructed financing result information block into the block chain. According to the technical scheme, the security and efficiency of factoring and financing are improved, and the development of factoring and financing services is greatly promoted.
Owner:CITIC PHOENIX HARBOR SUPPLY CHAIN MANAGEMENT CO LTD

SCR emission-reduction detection control system and method for diesel engine

The invention discloses an SCR emission-reduction detection control system and method for a diesel engine. According to the control system, whether the liquid level in a urea tank is lowered or not and whether or not a urea sprayer works normally or not can be detected through a detection control device, and then whether or not a whole SCR emission-reduction system works normally or not is judged;and when it is found that the SCR emission-reduction system is abnormal, a signal is sent back to an ECU system of a whole vehicle in time, and the power of the engine is limited through an ECU of the whole vehicle. By adoption of the SCR emission-reduction detection control system for the diesel engine, the working condition of the SCR system can be detected and recoded on board after the dieselengine is started; the system can be matched with an original on-board diagnosis system to form a dual-detection system, so that the detection reliability is ensured; after the diesel engine is started, the system detects and records the working condition of the SCR system on board to control the power of the whole vehicle, and the power of the engine is limited, so that pollution is prevented from further aggravated; and the system can be additionally arranged easily and rapidly based on an existing on-board detection system, an anti-tamper can be achieved to prevent a driver to refitting the system without permission, and thus, reliable operation of the SCR system is ensured.
Owner:CHANGAN UNIV

One-click forensics supervision system and method for commodity traceability information

The invention discloses a one-click forensics supervision system and method for commodity traceability information, and relates to the technical field of internet platforms. The system comprises an electronic forensics system for solidifying evidence of received electronic files and generating a fixation report, and also comprises a forensics supervision platform integrated with the electronic forensics system. The forensics supervision platform is used for obtaining a forensics request, performing one-click forensics operations on the obtained product complaint report information, collectingthe traceability electronic account information in real time, generating electronic files and submitting the files to the electronic forensics system, and is also used for recording evidence fixationinformation and displaying fixation reports. Through the application of the system and method, the timeliness of electronic forensics, the authenticity of electronic data, the tamper resistance and the effectiveness of electronic evidence can be improved in the inspection work; non-destructive forensics of electronic forensics is realized, in order to ensure the authenticity of the data; the "original copy" is fixed, to ensure the integrity of the data, to solve the problem that third parties do not cooperate with forensics.
Owner:广州中科易德科技有限公司

Cross-network dynamic service flow verification method and system, storage medium and computing device

The invention discloses a cross-network dynamic service flow verification method and system, a storage medium and computing equipment. The method comprises the steps of uploading node address information and a public key to a blockchain through a PBFT consensus mechanism, and achieving the network access application of a node and the distributed secret key storage for a self-signature certificate.Aiming at the service request behavior of the node, based on a consensus mechanism of a block chain, the distributed verification node carries out verification, service serial number generation, service abstract uplink storage and service flow permission return on the node identity to realize cross-network service request uplink recording. Aiming at a service completion requirement required by across-network service flow in sequence, real-time service and processing node information are uploaded to a block chain by introducing a service completion identification mechanism, so as to realize effective verification of service continuity. Aiming at the situation that the cross-network service is tampered in the transmission process, a historical routing path tracking technology is utilized to mine malicious network segments possibly existing in cross-network service flow transmission, and the possibility of tampering the service flow again by the malicious network segments is reduced byidentifying bad routing nodes in the retransmission process.
Owner:XI AN JIAOTONG UNIV

Satellite network security routing method based on blockchain

ActiveCN111314391AAuthenticity and Integrity GuaranteedResists maximum age attack and maximum sequence number attackKey distribution for secure communicationEncryption apparatus with shift registers/memoriesTelecommunicationsBlockchain
The invention discloses a satellite network security routing method based on blockchain, and belongs to the technical field of communication and is based on the blockchain technology, and the method comprises the following steps: an initialization stage: registering all legal satellite nodes, packaging registration information into a registration information block, and writing the registration information block into a registration blockchain; in the system operation stage, a source node generates an LSA describing the node, signs the LSA, encapsulates the LSA into an LSA block and writes the LSA block into an LSA blockchain; when the destination node writes in a new LSA block, triggering LSDB update (including adding, replacing or deleting LSA) of the destination node, and then calculatinga route by using an SPF algorithm; and when the system detects that unpredictable interruption occurs in a certain link, the KGC sends a request for updating the credentials to the nodes involved inthe link. In this way, the authenticity and integrity of the LSDB can be guaranteed through the LSA blockchain, and then safe and reliable routing is calculated through the LSDB.
Owner:四川九强通信科技有限公司

Electronic commercial acceptance bill financing method and device based on block chain architecture

The invention provides an electronic commercial acceptance bill financing method and device based on a block chain architecture. The method comprises the steps that: a developer node adds a constructed service agreement block of a financing service platform to a block chain, and a presale fund supervision bank node adds a constructed developer supervision account fund balance block to the block chain; the developer node adds a constructed contract block with an upstream enterprise into the block chain; the developer node adds a constructed electronic commercial acceptance bill block issued according to the supervision account balance into the block chain; an upstream enterprise node constructs an application electronic commercial acceptance bill financing block according to financing requirements, and adds the application electronic commercial acceptance bill financing block into the block chain; a financing service platform node performs risk assessment on an electronic commercial acceptance bill financing request, and adds a constructed financing risk assessment result information block into the block chain; and a fund party node performs financing assessment according to the financing risk assessment result information block, and adds the constructed financing result information block into the block chain. The above technical scheme improves the security and efficiency of electronic commercial acceptance bill financing, is beneficial to commercial credit billing, and greatly promotes the development of bill market business.
Owner:大宇(深圳)新动能产业投资有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products