Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

36results about How to "Guaranteed to be legal" patented technology

In-vehicle network safety communication system and method

The invention provides an in-vehicle network safety communication system and method. The in-vehicle network safety communication system comprises a TSP platform, a central gateway, a domain controllerand ECU equipment. The TSP platform is connected with the central gateway through a network, the central gateway is connected with the one or more domain controllers through a network, and the domaincontrollers are connected with the one or more ECU devices through vehicle buses. The method comprises: after first identity authentication and key negotiation are carried out between the TSP platform and the central gateway, constructing a first secure channel, and the TSP platform carrying out encrypted communication with the central gateway through the first secure channel; performing second identity authentication and key distribution between the central gateway and the domain controller, and then constructing a second secure channel, wherein the central gateway performs encrypted communication with the domain controller through the second secure channel; and after third identity authentication and key distribution are carried out between the domain controller and the ECU equipment, constructing a third secure channel, and the domain controller carrying out encrypted communication with the ECU equipment through the third secure channel.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Unmanned aerial vehicle authentication method and system, unmanned aerial vehicle supervision platform and first equipment

The embodiment of the invention relates to the technical field of unmanned aerial vehicle authentication, in particular to an unmanned aerial vehicle authentication method and system, an unmanned aerial vehicle supervision platform and first equipment, and is used for confirming whether identities of two communication parties are legal. When receiving the identity authentication request sent by the first device, the unmanned aerial vehicle supervision platform sends an identity certificate verification request to the unified authentication platform and receives an identity certificate verification response message; if the identity certificate verification result is that the verification is successful, a certificate application request is sent to a unified authentication platform; a data certificate of the first device is received, and the data certificate is forwarded to the first device; wherein the digital certificate of the first device is used by the second device to complete identity authentication of the first device according to the digital certificate of the first device before the first device establishes a communication link with the second device. Therefore, before thefirst equipment and the second equipment establish the communication link, the binding between the user information and the first equipment and between the first equipment and the digital certificateis realized, so that the legitimacy of the identities of the two communication parties can be ensured.
Owner:CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +2

PLC remote firmware upgrading system and method

The invention provides a PLC (Programmable Logic Controller) remote firmware upgrading method, which comprises the following steps that: after an upper computer performs user authorization login authentication through a first security module, an upgrading server and PLC equipment perform bidirectional identity authentication and key negotiation through a second security module to obtain a sessionkey; the upper computer performs summary information calculation on the upgrading data packet and signs summary information through the first security module, and sends the summary information to theupgrading server after the summary information is encrypted by using a session key; the upgrade server sends the encrypted upgrade data packet and the signed abstract information to the PLC device; the PLC device decrypts the encrypted abstract information of the upgrade data packet and the signature by using the session key through the second security module to obtain the abstract information ofthe upgrade data packet and the signature; the PLC device verifies the signed abstract information through the second security module and then executes the upgrade data packet; according to the invention, the remote firmware upgrading of the PLC equipment and the confidentiality and integrity of the upgrading data packet are realized.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Method and system for controlling trusted root in BIOS

The embodiments of the invention disclose a method and a system for controlling a trusted root in a BIOS, the method comprises certificate initialization and certificate verification, the certificateinitialization comprises the steps of generating a hardware platform certificate of the trusted root and importing the hardware platform certificate into the trusted root, and the hardware platform certificate comprises an information main body and a signature value. The method comprises the following steps: initializing a trusted root by a BIOS; and verifying that the information main body in thehardware platform certificate is valid, indicating that the hardware platform certificate is matched with the trusted root, ensuring that the hardware platform certificate is valid, verifying that the signature in the hardware platform certificate is valid, indicating that the hardware platform certificate is matched with the manufacturer public key solidified in the BIOS, and ensuring that the hardware platform certificate is legal. According to the invention, the BIOS verifies the identity of the trusted root after initializing the trusted root, and judges whether to provide a trusted rootfunction for a subsequent running program or not according to the verification result so as to protect the security of upper-layer application data of a computer.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Edge intelligent calculation method based on block chain and edge intelligent system

The invention discloses an edge intelligent calculation method based on a block chain and an edge intelligent system, belongs to edge intelligence, and aims to solve the technical problem of how to apply a block chain technology to edge intelligent calculation to ensure that data is correct and complete and ensure the legality of transmitted data. The calculation method comprises the following steps: configuring connection between a gateway and a main node and connection between the main node and a working node through the gateway; the main node generating a key pair, adding the block information to a locally stored block chain of the main node and publishing the block information to the outside, and each working node adding the verified block information to the locally stored block chain;and the main node sending the instruction data and the specified private key to a related working node, and the working node calling an artificial intelligence module to analyze the equipment acquisition data to obtain an analysis report and returning the analysis report to the gateway through the working node. The system comprises at least one gateway and at least one edge device, and the edge device comprises a main node and at least one working node.
Owner:QILU UNIV OF TECH

Security management and control method and system for logistics information, and computer storage medium

The invention provides a security management and control method and system for logistics information, and a computer storage medium. The method comprises the following steps that: an express deliverycollection terminal sends a waybill to a server; the server generates the logistics information according to the waybill and site information, and a two-dimensional code waybill generation device generates a logistics two-dimensional code according to the logistics information, and combines the waybill and the logistics two-dimensional code into a two-dimensional code waybill; the two-dimensionalcode waybill is signed and stamped with a timestamp to form a two-dimensional code signature waybill; a transfer terminal scans the logistics two-dimensional code on the two-dimensional code signaturewaybill to transfer articles; a distribution terminal scans the logistics two-dimensional code on the two-dimensional code signature waybill to distribute articles; after distribution is finished, anexpress delivery receiving terminal feeds back express delivery picking-up success information to the server; and the server causes the logistics two-dimensional code to fail. By use of the method, while the personal information of an addressee and an addresser is not leaked, logistics transfer efficiency is improved.
Owner:胡金钱

Automobile maintenance method and system based on internet of things

PendingCN109285013ARealize authenticity verificationVerification GuaranteeCo-operative working arrangementsPayment architectureClient-sideUser authentication
The embodiment of the invention discloses an automobile maintenance method and a system thereof based on the internet of things. The method comprises the following steps: a multi-functional automobilemaintenance equipment reads a label to obtain product information of a product to be used, and sends the product information to a remote server for verification; if the product information verification is successful, the client scans the encoding to generate a processing request; the client sends the processing request to the remote server; the remote server authenticates the user according to the processing request, and if the authentication is successful, the remote server obtains payment information and returns the payment information to the client; the client pops up a dialog box to display payment information so that the user can make payment based on the payment information and start using the multi-function vehicle maintenance equipment after the payment is successful. The embodiment of the invention effectively combines the authentication of the product to be used, the authentication of the user and the online payment, and provides convenience for the user on the premise of ensuring the authenticity of the product to be used and the legitimacy of the user identity.
Owner:重庆伯儒科技有限公司

Scheduling device and method for cooperative operation of video monitor equipment cluster

InactiveCN109640055AReal-time monitoring of instruction queue statusAvoiding Instruction Buffer Overflow ProblemsElectric signal transmission systemsSignal allocationVideo monitoringClosed loop
The invention discloses a device and method for cooperative operation of a video monitor equipment cluster. The method raises an instruction elimination mechanism, and an instruction queue state is monitored in real time, so that instruction cache overflow is prevented; the method raises a determining rule for instruction integrity and instruction group integrity, solving a problem of lack of integrity of the instruction and instruction group due to communication abnormality, guaranteeing instruction legal and correct, and making the system more stable and reliable; the method raises instruction classification and instruction prioritizing manner, solving a conflict problem of executing of multiple problems, ensuring that the instruction is executed correctly, and preventing abnormal equipment actions; the method adopts a Petri network, limited state machine and other technological models, so as to constrain and guide coordinate scheduling of multiple signal instructions; and the methodraises an instruction closed loop mechanism, schedules the monitor equipment accurately, further, reduces abnormal jitter amid frequency instructions, and prolongs service life of equipment effectively.
Owner:SHANDONG SYNTHESIS ELECTRONICS TECH

Campus second-hand article transaction management system based on WeChat applet

The invention provides a campus second-hand article transaction management system based on a WeChat applet. The campus second-hand article transaction management system comprises an applet end and a background management end; the applet end is provided with a transaction module for the user to browse and inquire the second-hand articles and the purchase information, a publishing module for the user to publish the second-hand articles and the purchase information, and a personal center module for the user to check the second-hand articles and the purchase information published by the user; thebackground management module is configured to be an auditing module for an administrator to auditing second-hand articles and purchase information, an announcement management module for the administrator to issue and delete announcements, and a member management module for the administrator to check user information and edit user permission. According to the campus second-hand article transactionmanagement system based on the WeChat applet, it can be ensured that the identities of buyers and sellers are legal, the problem that the logistics transportation cost is high is solved, through the campus second-hand article transaction management system, a user can conveniently browse and publish second-hand articles and purchase information at a mobile phone terminal, and convenience is improved.
Owner:WEIHAI OCEAN VOCATIONAL COLLEGE

Method for realizing data tampering detection of nonvolatile memory by adopting hybrid encryption algorithm

The invention provides a method for identifying data exception of a nonvolatile memory by adopting a hybrid encryption algorithm, which comprises the following steps that: S1, an MCU (MicroprogrammedControl Unit) performs dual backup on electric energy metering data regularly, adopts a unique identification ID (Identity) as an encryption factor K to perform encryption operation on a plaintext P to generate a secret key C, and stores the secret key C; s2, the MCU scans and detects an I/O port of a nonvolatile memory in the electronic electric energy meter at regular time, and judges whether hardware of the nonvolatile memory is abnormal or not; s3, the MCU reads the secret key C of the fixed storage address of the nonvolatile memory at regular time, carries out secret key comparison and judges whether the data is tampered abnormally or not; and S4, the MCU triggers and monitors a clock signal of the nonvolatile memory, and judges an abnormal condition. By adopting the identification information generated by the encryption algorithm based on the hardware ID and the embedded software fault identification algorithm, the method ensures that the data in the electronic electric energy meter is legal and is not lost, and ensures the reliability and safety of data storage.
Owner:JIANGSU LINYANG ENERGY CO LTD

On-line injection method for initial password data of vehicle equipment

The invention discloses an on-line injection method for initial password data of vehicle equipment, and the method comprises the following steps: S1, enabling an external system to randomly generate asecret ASEC for an internal system, and importing the secret ASEC into the internal system when the internal system is used for the first time; s2, generating a serial number SEQ by the internal system according to a vehicle equipment number DID, and calculating by adopting an abstract algorithm to obtain a check code MAC; s3, enabling the internal system to splice the vehicle equipment number DID, the serial number SEQ and the check code MAC to serve as an equipment registration authentication code DRAC, and import the authentication code DRAC into the vehicle equipment; s4, enabling the vehicle equipment to generate a signature key pair and an encryption key pair; s5, enabling the vehicle equipment to perform signature calculation through the signature private key SPRK, the encryption public key CPUK and the authentication code DRAC to obtain a signature value SIG; and S6, enabling the vehicle equipment to send a registration application to an external system, wherein the registration application comprises an authentication code DRAC, a signature public key SPUK, an encryption public key CPUK and a signature value SIG. According to the invention, the data security and reliability of the vehicle-mounted equipment are ensured.
Owner:HUIZHOU DESAY SV AUTOMOTIVE

A method and system for controlling root of trust in bios

The embodiment of the present invention discloses a method and system for controlling a trusted root in BIOS, including certificate initialization and certificate verification, certificate initialization includes generating a trusted root hardware platform certificate, importing the hardware platform certificate into the trusted root, and hardware platform The certificate includes the information subject and signature value; after the BIOS initializes the trusted root, it verifies that the information subject in the hardware platform certificate is valid, indicating that the hardware platform certificate matches the trusted root, ensures that the hardware platform certificate is valid, and verifies that the signature in the hardware platform certificate is valid , indicating that the hardware platform certificate matches the manufacturer's public key fixed in the BIOS, ensuring that the hardware platform certificate is legal. In the present invention, after the trusted root is initialized, the BIOS verifies the identity of the trusted root, and judges whether to provide the trusted root function for subsequent running programs according to the verification result, so as to protect the safety of computer upper layer application data.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD

A security communication system and method for in-vehicle network

The present invention provides a safety communication system and method in a vehicle, comprising: a TSP platform, a central gateway, a domain controller and an ECU device; the TSP platform is connected to the central gateway through a network, and the central gateway is connected to one or more domain controllers through a network Connection, the domain controller and one or more ECU devices are connected through the vehicle bus; after the first identity authentication and key negotiation between the TSP platform and the central gateway, the first secure channel is established, and the TSP platform communicates with the central gateway through the first secure channel Encrypted communication; after the second identity authentication and key distribution between the central gateway and the domain controller, the second secure channel is constructed, and the central gateway conducts encrypted communication with the domain controller through the second secure channel; between the domain controller and the ECU device The third security channel is constructed after the third identity authentication and key distribution are performed, and the domain controller performs encrypted communication with the ECU device through the third security channel.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Network interaction reading system and method for user and content management

The invention claims a network interaction reading system and a method for user and content management. The system comprises a reading device, a processing device, a display device, a network server and a concealed code carrier; the reading device comprises an identity identification module for storing the identity identification code of the reading device; the processing device comprises an authentication module for sending the identification code of the reading device and the acquired information code to the network server; the network server comprises a user management module and an information code management module, and the user with administration authority manages the contents stored by a stream media management module and a digital information management module; and the network content and the operation mark are collected in the image-text form of concealed code carrier. The method comprises the following steps of: sending the information code and the identification code to the processing device by the reading device; judging the identity authority of the reading device, recording request information and operation information and returning the results to the processing device by the network server; and acquiring and displaying the network information returned by the server by the processing device.
Owner:中电天讯信息技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products