Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

47results about How to "Guaranteed unforgeability" patented technology

Dynamic verification method of cloud storage data using lattice-based linearly homomorphic signatures

The invention discloses a dynamic verification method of cloud storage data using lattice-based linearly homomorphic signatures. The method comprises data integrity verification including: a public key and a private key of a linearly homomorphic signature algorithm on a lattice are generated, a file is divided into a plurality of data blocks, each data block is signed, the value of a root node is calculated on the basis of a Merkle hash tree, the value of the root node is signed, and the data blocks, signatures of the data blocks and a signature of the root node are sent to a cloud server; IDs of the public key and the file are provided for a third-party audit, which initiates a challenge to the cloud server to verify whether the data blocks changed or not; the cloud server provides corresponding proof for the challenge initiated by the third-party audit; and the third-party audit judges whether the data blocks are complete according to the proof provided by the cloud server and feeds a verification result to a user. The method can resist quantum attacks initiated by quantum computers in the future and support cloud dynamic operation verification while protecting user private information.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Commodity anti-counterfeiting code batch generation method

InactiveCN104680220ABatch generation method is simple and feasibleUniqueness guaranteedRecord carriers used with machinesCiphertextNumeric data
The invention discloses a commodity anti-counterfeiting code batch generation method which comprises the following steps: encoding identity information of a certain batch of commodities to generate a batch of commodity identification codes and setting a commodity production-sequence-number numerical sequence with a certain length; according to a corresponding relation of custom batch commodity identification code characters and numeric data, converting the batch of commodity identification codes into a numerical sequence; respectively carrying out scrambling on ciphertext characters in a corresponding relation among the production-sequence-number numerical sequence, the custom numeric data and the ciphertext characters of a certain batch of commodities by utilizing a position variation scrambling rule before and after chaos sequences are sorted; enabling each commodity in the batch of commodities to sequentially carry out displacement and scrambling on the transcoded numerical sequence according to the corresponding chaos sequences and the position variation scrambling rule before and after the chaos sequences are sorted and generating an anti-counterfeiting number of each commodity so as to combine and produce commodity anti-counterfeiting codes in batch. The method disclosed by the invention is simple and easy to operate, has high safety and is unlikely to crack; the commodity anti-counterfeiting codes generated in batch have uniqueness and unforgeability.
Owner:NANTONG UNIVERSITY

A method for batch generation of commodity anti-counterfeit two-dimensional code

The invention discloses a batch generation method of commodity anti-counterfeit two-dimensional code, which comprises the following steps: encoding the identity information of a certain batch of commodity to generate batch commodity identity code; The batch commodity identification code is converted into numerical data, and the switching data is calculated; The chaotic sequence is generated by iterating the Chebyshev chaotic tent map with batch commodity identity information and external key, and some operations are selected respectively according to the switching data. A Chebyshev chaotic tent map is iteratively generate into a chaotic sequence by using a single commodity generate serial number and an external key, According to the scrambling rule of the position change, the cipher character sequence and the cipher character sequence converted according to the scrambled correspondence and the character-based commodity production serial number are scrambled respectively, and then the commodity anti-counterfeit two-dimensional code is combined and generated in batch. The method provided by the invention is simple and feasible, has strong safety, is not easy to crack, and the commodity anti-counterfeit code generated in batch has 'uniqueness and non-forgery'.
Owner:NANTONG UNIVERSITY

Generation method of commodity anti-counterfeiting code

The invention discloses a generation method of a commodity anti-counterfeiting code. The generation method comprises the following steps: coding commodity identity information according to a certain preset rule to generate a unique commodity identification code; converting the commodity identification code into numeric data according to corresponding relation between a user-defined commodity identification code character and numeric data; respectively calculating by virtue of the commodity identity information and an external secret key to obtain an initial value, a parameter, a primary iteration step number and an iteration interval step number of a chaotic system, and carrying out iteration on an inclined chaos tent map to generate two groups of chaos sequences; respectively scrambling ciphertext characters in the corresponding relation among numeric data, user-defined numeric data and the ciphertext characters by virtue of a location changing scrambling rule before or after the sequencing of two groups of the chaos sequences to generate commodity anti-counterfeiting numbers, and combining to generate the commodity anti-counterfeiting code. The generation method of the commodity anti-counterfeiting code is simple and feasible, has very high security and does not easily hacked, and the generated commodity anti-counterfeiting code has uniqueness and unforgeability.
Owner:NANTONG UNIVERSITY

A method for generating commodity anti-counterfeit two-dimensional code

The invention discloses a method for generating a commodity anti-counterfeit two-dimensional code, which comprises the following steps: coding commodity identity information to generate a unique commodity identification code; converting the commodity identification code into numerical data and switching data; the initial value, parameters, initial iterative steps and iterative interval steps of the chaotic system are calculated by using commodity identity information and external key respectively, and the chaotic sequence is generated by iterating the Chebyshev chaotic tent map. According to the switching data, a certain operation is selected respectively, and the cipher characters in the corresponding relation table between the user-defined numerical data and the cipher characters are scrambled by using the scrambling rule of the position change before and after the chaotic signal sorting, thereby the commodity anti-counterfeit number is generated, and then the commodity anti-counterfeit two-dimensional code is combined to generate the commodity anti-counterfeit code. The method for generating that commodity anti-counterfeit two-dimensional code provided by the invention is simpleand feasible, has strong safety, is difficult to crack, and the generate commodity anti-counterfeit two-dimensional code has uniqueness and non-forgery.
Owner:NANTONG UNIVERSITY

Attribute-based anonymous authentication method and system thereof

InactiveCN104125199AFlexible Threshold Attribute Selective Presentation SchemeImprove communication efficiencyTransmissionInternet privacyService provision
The invention discloses an attribute-based anonymous authentication method which contains the following steps: 1) a trusted party TP generates a master key x and system public parameters according to set safety parameters; 2) a user U registers with the TP to submit attributes and initiates an attribute certificate issue request; 3) the TP verifies the attributes of the user U and issues an attribute certificate for the user U according to the attributes of the U, the master key x and the system public parameters; 4) the user U initiates an access request to a service provider SP; 5) the SP looks up an access strategy corresponding to the access request and returns the access strategy to the user U; 6) the user U selects an attributes that the U wants to use according to the access strategy, and an anonymous certificate is calculated by the use of the attribute certificate and a private key r and is sent to the SP; and 7) the SP verifies the anonymous certificate, and accepts the access request and provides corresponding service to the user if verification is passed and the access strategy is satisfied. According to the invention, privacy of a user is guaranteed, and a more flexible threshold attribute selective showing scheme is supported.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI +1

Cryptography attribute-based access control method and system based on dynamic rule

The invention relates to a cryptography attribute-based access control method and system based on a dynamic rule, mainly belonging to the technical field of information. In the cryptography attribute-based access control system based on the dynamic rule, protected objects are stored in a encrypted form, and only the requests satisfying the requirements of access policies in the attribute-based access control can be authorized to decrypt the objects, therefore, it can be ensured that data in an unsafe environment can be accessed with authorization according to a security policy, and meanwhile,the extensibility of the policies and the dynamic acquisition of the attributes are also supported. The cryptography attribute-based access control method and system based on the dynamic rule are divorced from the traditional encryption system framework, and are a new attribute-based access control model, method and system supporting the cryptography decision. The cryptography attribute-based access control method and system based on the dynamic rule can achieve more secure, diversified, dynamic and flexible access authorization, which are suitable for large-scale organizations or informationsystems, and can be applied to the environments such as cloud computing, grid computing, distributed computing, and so on.
Owner:UNIV OF SCI & TECH BEIJING

Lightweight digital signature method based on translog problem

The invention provides a lightweight digital signature method based on a translog problem, belonging to the fields of cryptographic technology and computer technology. The method comprises three parts, i.e. secret key generation, digital signature and authentication. A sending user in the method has two secret keys, i.e. a private key and a public key, wherein the private key cannot be deduced from the public key; the private key of the sending part is used to generate a name guide of a message; and the public key of the sending part is used for a receiving part to verify the name guide of the corresponding message. With the method provided by the invention, the attack of the existing analysis method can be effectively resisted. The method has the advantages of high calculation speed and the like, the modular length is less than 96 bits, and the technology can be published; and the method can be applied to the signature and the verification of any message in mobiles, computers and communication networks, also can be used for identity authentication and content confirmation in electronic banking, e-commerce and e-government affairs, and can be used for the anti-counterfeiting of bills, certificates and high order goods.
Owner:数字兵符(福州)科技有限公司

Method, system and equipment for generating anti-counterfeiting code from product number and storage medium

The invention relates to a method, system and device for generating an anti-counterfeiting code through a product number and a storage medium, and belongs to the technical field of anti-counterfeiting code generation methods. The method comprises the following steps: S1, generating a unique number P for a product number according to a preset rule, and obtaining a value N for a product sequence number in a preset length range; s2, AES encryption operation is carried out on the product number P and the product sequence number N, and an authentication code is obtained after a modulo algorithm is carried out; s3, combining the product number, the product sequence number and the authentication code into a plain code; s4, performing full-code conversion on the plain code to obtain an anti-counterfeiting code array; step S5, converting the anti-counterfeiting code array into an anti-counterfeiting code; the system comprises a character string generation module, an authentication code generation module, a plain code generation module, an anti-counterfeiting code array generation module and an anti-counterfeiting code generation module. The device comprises a memory and a processor; a computer program is stored on the readable storage medium, and the steps of the method are implemented when the computer program is executed; the encryption strength is high, and cracking is not easy.
Owner:SHANDONG TAIBAO PREVENTING COUNTERFEIT

An attribute-based anonymous authentication method and system

InactiveCN104125199BFlexible Threshold Attribute Selective Presentation SchemeImprove communication efficiencyTransmissionAnonymous authenticationMaster key
The invention discloses an attribute-based anonymous authentication method which contains the following steps: 1) a trusted party TP generates a master key x and system public parameters according to set safety parameters; 2) a user U registers with the TP to submit attributes and initiates an attribute certificate issue request; 3) the TP verifies the attributes of the user U and issues an attribute certificate for the user U according to the attributes of the U, the master key x and the system public parameters; 4) the user U initiates an access request to a service provider SP; 5) the SP looks up an access strategy corresponding to the access request and returns the access strategy to the user U; 6) the user U selects an attributes that the U wants to use according to the access strategy, and an anonymous certificate is calculated by the use of the attribute certificate and a private key r and is sent to the SP; and 7) the SP verifies the anonymous certificate, and accepts the access request and provides corresponding service to the user if verification is passed and the access strategy is satisfied. According to the invention, privacy of a user is guaranteed, and a more flexible threshold attribute selective showing scheme is supported.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI +1

A lightweight digital signature method based on the hyperlogarithm problem

The invention provides a lightweight digital signature method based on a translog problem, belonging to the fields of cryptographic technology and computer technology. The method comprises three parts, i.e. secret key generation, digital signature and authentication. A sending user in the method has two secret keys, i.e. a private key and a public key, wherein the private key cannot be deduced from the public key; the private key of the sending part is used to generate a name guide of a message; and the public key of the sending part is used for a receiving part to verify the name guide of the corresponding message. With the method provided by the invention, the attack of the existing analysis method can be effectively resisted. The method has the advantages of high calculation speed and the like, the modular length is less than 96 bits, and the technology can be published; and the method can be applied to the signature and the verification of any message in mobiles, computers and communication networks, also can be used for identity authentication and content confirmation in electronic banking, e-commerce and e-government affairs, and can be used for the anti-counterfeiting of bills, certificates and high order goods.
Owner:数字兵符(福州)科技有限公司

Intelligent learning chain system based on block chain and working method

The invention discloses an intelligent learning chain system based on a block chain and a working method. The system is composed of a block chain system, a cloud service center and a deep learning system. The working method comprises the following specific steps: firstly, constructing a block chain system, allocating a private key to each user in a block chain, calculating a public key, and sending a public key Ki to a cloud service center by a user Ri for other users to access; enabling the user Ri to sign the resource information and the comment by using a private key, and store the signed resource information and comment in a cloud server for other users to access and verify; verifying the identity and resource information of the user Ri by other users in the blockchain system by usingthe public key and signature of the Ri, updating the blockchain system by each user if the verification is successful, and feeding back to the cloud service center if the verification is unsuccessful;and enabling the deep learning system to analyze comments stored in the cloud service center and feed back non-compliant comments and resources with low comments to the cloud service center for processing. Compared with the prior art, the high-quality education resource service is realized by utilizing the block chain system and the deep learning system, and the reliability, the safety and the non-repudiation of education resources are ensured.
Owner:JIANGSU UNIV OF SCI & TECH

Blockchain-based distributed trusted network connection method

The invention discloses a blockchain-based distributed trusted network connection method. To solve the problem that the distributed network access control framework cannot be provided in the existing trusted network connection, the implementation plan is: in the initialization stage, the terminal device registers and sends the information; the trusted third party verifies the registration information; the terminal device generates the initial transaction and broadcasts; the initial The transaction is stored in the blockchain; in the trusted network connection stage, any two terminals pass the two-way user and platform authentication of the blockchain; after the authentication is passed, in the update transaction stage, the terminal device generates an update transaction and broadcasts it; the update transaction is stored in the blockchain . The present invention combines blockchain and TNC to form an overall framework, without the participation of a trusted third party, to ensure two-way security authentication between users and platforms between terminal devices. Effectively defend against man-in-the-middle attacks and prevent malicious nodes from accessing the network. The invention is safe and credible, and is used for safe and credible connections in distributed networks.
Owner:XIDIAN UNIV

A smart grid equipment safety diagnosis service system based on blockchain technology

A security diagnosis service system for smart grid equipment based on blockchain technology, including three participants: faulty equipment, original and non-original suppliers of equipment, and smartphones owned by users. When the faulty device is within the warranty period, the original supplier node will provide free diagnostic services for it. Otherwise, the maintenance and diagnosis rights of the equipment will be decided by the original supplier node and non-original supplier nodes through the decentralized equipment security diagnosis smart contract. According to the bidding price and reputation value of the responding node, the contract uses a multi-dimensional reverse auction method to determine the successful bidding node and diagnosis price. After the device diagnosis is completed, the relevant diagnostic information will be packaged and sent to the smart phone. The user will formulate the device operation policy and control the smart contract through the smart phone and according to the received message, so as to realize the efficient operation of the device. In the process of information interaction, a homomorphic encryption algorithm is used to ensure the security of the interactive information, and to ensure that the diagnostic information and the privacy of both parties will not be leaked during the interaction.
Owner:JIANGXI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products