Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

47results about How to "Guaranteed verifiability" patented technology

Commodity anti-counterfeiting method and device

The embodiment of the invention discloses a commodity anti-counterfeiting method and a device. The method comprises the following steps of generating the public key and the private key of a commodity; storing the hash values of the serial number, the public key and the private key of the commodity and the circulation data of the commodity in a common database by using a block chain; upon receiving the verification information of the public key of the commodity and determining the stored state of the public key in the common database, determining the first legal sales state of the commodity according to the serial number and the circulation data of the commodity, and marking the state of the commodity to be sold out; upon receiving the verification information of the secret key of the commodity and determining the stored state of the public key corresponding to the secret key in the common database, determining the first legal verification state of the commodity according to the serial number and the circulation data of the commodity, and marking the state of the commodity to be verified. Through preparing the public key and the private key of the commodity into special two-dimension codes and pasting the special two-dimension codes onto the outer package and the surface of the commodity, the readability, the verifiability and the binding performance of anti-counterfeiting marks are ensured. Meanwhile, by means of the block chain, the commodity circulation traceability and the commodity source uniqueness are ensured. At the same time, the cost is reduced.
Owner:纸飞机(北京)科技有限公司

Identity information safety authorization system and method based on block chain

The invention belongs to the technical field of information safety technologies, and discloses an identity information safety authorization system and method based on a blockchain. The system comprises an identity information authorization terminal hardware module which is used for recognizing an identity IC card of a user, and is connected with an identity information chain through a service contract main module to carry out the verification of the identity information of the user; the encryption module is also used for encrypting identity information, generating a secret key for each user passing identity information verification and completing encryption and decryption operations on authorized contracts created by both parties of the contracts; the service contract main module is used for a contract B to carry out identity information authorization contract, identity information registration contract creation and contract sending, receiving and verification; Meanwhile, the contractparty A decides whether to accept the received authorization information. The identity information authorization record evidence is formed through the block chain technology, and it is guaranteed thatidentity information authorization cannot be falsely used, tampered and repudiated, and traceable verification is achieved.
Owner:浙江万里共链科技发展有限公司

A vehicle authentication and message verification method in a vehicle-mounted network environment

The invention provides a vehicle authentication and message verification method in a vehicle-mounted network environment. The vehicle authentication and message verification method comprises the stepsthat a trust mechanism initializes a system; the vehicle-mounted unit is registered, and the roadside unit is registered; a temporary key of the roadside unit is released; a vehicle authentication stage; the trust mechanism verifies the legality of the roadside unit through the digital signature, extracts the message and verifies the legality of the automobile, the trust mechanism sends the identity identifier of the automobile to the roadside unit, the roadside unit sends the private key and the temporary main key to the automobile, and the automobile extracts the temporary main key; the automobile calculates a temporary identifier and a temporary private key, generates a traffic message and signs and broadcasts the traffic message; and when other automobiles receive the automobile broadcast message, verifying the effectiveness of the broadcast message through bilinear mapping. According to the method, the vehicle access safety in the Internet of Vehicles environment can be ensured,the safety of traffic information sent by legal vehicles is also ensured, and the method has a relatively high application value in an application environment in the mobile vehicular network environment.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Non-center dot product computing method achieving privacy protection

The invention provides a non-center dot product computing method achieving privacy protection. The non-center dot product computing method achieving privacy protection includes the following steps that 1, a first participant and a second participant are connected with a trusted third party, so that corresponding privacy vector certificates of the first participant and the second participant are obtained, wherein the certificates comprise privacy vector ciphertext; 2, the first participant sends the certificate of the first participant to the second participant; 3, the second participant carries out ciphertext homomorphic dot product computation on the basis of the privacy vector ciphertext in the certificate of the first participant, and sends the dot product ciphertext and the certificate of the second participant to the first participant; 4, the first participant decodes the dot product ciphertext to obtain the privacy vector dot product of the first participant and the privacy vector dot product of the second participant. Safety multi-party dot product computation is achieved without participation of a center server, input and output verifiability is ensured for users, and the requirements of the users for personal data privacy protection and the reliability of dot product computing results in a not credible environment are met.
Owner:TSINGHUA UNIV

An information validity detection method and device based on a block chain

The invention provides an information validity detection method and device based on a block chain, and the method comprises the steps of obtaining the data uploaded by a publisher at a current block node, carrying out the division of a preset unified rule of the block chain, and carrying out the collection and obtaining the Hash value of the current data; using the current block node to sign the current data hash value to obtain a current signature; using the current block node to encrypt the current data hash value to obtain current encrypted information; using the current block node to storethe current encrypted information and the current signature into the block according to the Merkle Tree data storage structure, and obtain the current information; broadcasting the current information, and synchronizing the current information to other block nodes; and using any adjacent trusted block node of the current block node to receive the current information broadcast by the current blocknode, and detecting the validity of the information according to the storage structure of the current information. According to the detection method and device provided by the invention, the problemsthat the existing data is easily tampered and the effectiveness cannot be ensured, can be effectively solved.
Owner:北京庚金科技有限公司

Identity authentication and data security transmission method in medical sensor network environment

The invention provides an identity authentication and data security transmission method in a medical sensor network environment. The method comprises the following steps: initialization: enabling a background server to initialize a medical sensor network; a registration stage: registering the medical sensor nodes and medical workers in a background server; a login stage of a user: identity verification and key negotiation: after an authentication request sent by the user is received, enabling the background server to verify the legality of the user and negotiate with the user to generate a communication key after successful verification; and secure transmission of the data: enabling the user to obtain the medical data of the patient from the background server, or directly communicate withthe medical sensor node to obtain the stored medical data of the patient. According to the invention, it is ensured that medical data of a patient can be safely transmitted to the background server, and it is also ensured that the data is only read by legal medical workers, so private data of the patient is not leaked; identity verification based on the temporary value can ensure the integrity andverifiability of the identity of the authenticated user.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Trusted digital signature method and device based on blockchain

The invention discloses a trusted digital signature method and device based on a blockchain. The method comprises the steps of generating a digital certificate request; acquiring a digital certificate, and respectively storing the digital certificate and the digital certificate application record into a blockchain and a database; calculating a hash value of local to-be-signed data; generating a timestamp request according to the hash value of the to-be-signed data; obtaining an authoritative timestamp; storing the timestamp application record in the blockchain; generating a signature file according to the digital certificate, the hash value of the to-be-signed data and an authoritative timestamp; generating a signature data packet and uploading the signature data packet to the blockchain;and obtaining a verification result of a verification party on the signature data packet. According to the application, the blockchain technology is adopted, the application and issuing records of thecredible timestamp and the authoritative digital certificate are backed up in the blockchain respectively, the traceability and verifiability of user behaviors are ensured, and thus the credibility of authoritative CA service and authoritative TSA service is ensured.
Owner:南京通付盾区块链科技有限公司

Reconnaissance data management system based on block chain and working method thereof

PendingCN112016132ASecure private custodyShared supportDigital data protectionData OriginEngineering
The invention discloses a reconnaissance data management system based on a block chain and a working method thereof. The reconnaissance data management system comprises an authorization module, an acquisition module, a storage module, a verification module, a sharing module and an evaluation module, the storage module comprises a local storage unit and a block chain storage unit; and the sharing module comprises a data query and display unit and a data exchange unit. The system has the advantages that the whole system comprises authorization, collection, storage, verification, sharing and evaluation, private storage of survey data is guaranteed, data sharing among different survey units is supported, and the efficiency and reliability of the data are improved; with the help of a block chain technology, information of an investigation unit, investigation personnel, investigation equipment, investigation data and a data exchange process is encrypted and uploaded to a chain, so that the non-modifiability and the verifiability of the uploaded data are ensured; each investigation unit, the investigation personnel and the equipment are endowed with unique identities, and the identities cannot be modified, so that the uniqueness of a data source is ensured.
Owner:SHANGHAI GEOTECHN INVESTIGATIONS & DESIGN INST

Internet of Things heterogeneous identifier analysis system and method based on block chain

The embodiment of the invention provides an Internet of Things heterogeneous identifier analysis system and method based on a block chain. The system comprises a plurality of subsystems forming a treestructure; the top layer is a verification subsystem; the bottom layer comprises a plurality of data subsystems; the middle layer comprises a plurality of verification subsystems; the subsystems which are located on the middle layer or the bottom layer are in communication connection with one subsystem on the upper layer; each data subsystem corresponds to one coding standard; the data subsystemsare used for storing the Internet of Things identifiers conforming to the corresponding coding standards and the information corresponding to the Internet of Things identifiers on the corresponding block chains; and the verification subsystems are used for storing the verification information of each block on the block chain corresponding to the next layer of subsystem in communication connectionon the corresponding block chain. According to the Internet of Things heterogeneous identifier analysis system and method based on the block chain provided by the embodiment of the invention, the Internet of Things heterogeneous identifiers are classified, stored and managed through different data chains, and more efficient analysis of the Internet of Things heterogeneous identifiers can be realized.
Owner:STATE GRID HENAN INFORMATION & TELECOMM CO +2

Blockchain-based edge computing task unloading system and method

The invention discloses a blockchain-based edge computing task unloading system and method, and the system comprises a wireless network device unit which comprises a plurality of Internet-of-things devices which are connected through a network, and the Internet-of-things devices collect data information of Internet-of-things application programs from a physical environment, and forwards the information to the MEC server unit to execute task calculation; and an MEC server unit which comprises a plurality of MEC servers and is used for realizing a consensus mechanism of the blockchain and realizing signing registration and task unloading of the wireless network equipment according to the intelligent contract deployed in the blockchain network on the MEC servers. According to the method, by using the blockchain technology, the traceability and visibility of the edge computing task unloading process are ensured; through the task unloading method based on the priority, the requirements of users with different time delay requirements on the current unloading task can be more reasonably met; through an unloading result verification method based on the game theory, the correctness and verifiability of a calculation result are ensured, so that the task unloading quality is improved.
Owner:康旭科技有限公司

Ultra-high purity medium transporting integration process

The invention relates to the fluid transportation field, in particular to an ultra-pure medium transporting integrated device. The device consists of a heat interchanger, a cooling water circulating unit and an injection water circulating unit. A pure steam accessing pipe, a first temperature sensor, a second temperature sensor and a control panel are also arranged in the device. A cooling water inlet pipe is connected with the refrigerant inlet of the heat interchanger through a first valve. A cooling water outlet pipe is connected with the refrigerant outlet of the heat interchanger through a second valve. An injection water inlet pipe is connected with the injection water inlet of the heat interchanger through a third valve. The pure steam accessing pipe is connected with the outside of the injection water inlet pipe through a fourth valve. An injection water outlet pipe is connected with a fifth valve. A point of use is connected with the injection water outlet of the heat interchanger by the fifth valve. The cooling water inlet pipe and the injection water point of use are connected with the control panel respectively through first and second temperature sensors. The ultra-pure medium transporting integrated device of the invention has the advantages of high purity, convenient use and easy operation.
Owner:上海创洁科技有限公司

New energy vehicle electronic controller shell

The invention discloses a new energy vehicle electronic controller shell. The new energy vehicle electronic controller shell comprises a shell and an upper cover; the middle part of the upper cover is provided with a convex position; the middle part of the shell is provided with a concave position; the upper cover and the shell are connected as a whole through an edge connecting part, wherein four edges of the edge connecting part are arranged annularly; an edge connecting part of the upper cover and the shell is provided with a seal groove used for placing a seal ring; the outer sides of the four corners of the shell are provided with shell dismantling supporting edges in a protruding way; the bottom part of the shell is provided with a reinforcing rib; and one side of the reinforcing rib is provided with an elastic moveable pressing part used for fixing an electronic controller. The shell with a reasonable design is convenient for the manufacturing and maintenance, the installation is easy, the structure is solid and durable, the installation and use are convenient, and the heat dissipation effect is good; and besides, by arranging the shell dismantling supporting edges at the outer sides of the four corners of the shell in a protruding way, a shell dismantling jig can very conveniently dismantle the upper cover, thereby realizing non-destructive dismantling and improving the maintainability of products.
Owner:欧朗电子科技有限公司

Method for safely and efficiently fusing data

The invention relates to a method for safely and efficiently summing and fusing data transmitted in a network, belonging to the technical field of network information safety. The method comprises the following steps of: making an inquiry base station generate a random number, and calculating and distributing every node key which participates in data fusion respectively according to a network topological structure; dynamically encrypting acquired data, transmitting to a father node from child nodes, fusing data of the father node with data of all child nodes by using the father node, and uploading continually till the data are transmitted to the inquiry base station; and decrypting by using the inquiry base station to obtain a fusion result, locally verifying the fusion result according toa verification value, accepting the fusion result if the verification is valid, otherwise, discarding the fusion result. In the method, data traffic is only required to be generated at broadcast inquiry and data fusion stages, so that the data traffic is greatly reduced. The completeness of data is ensured by performing result detection; and data are dynamically encrypted in the entire fusion process, so that the confidentiality and verifiability of data are ensured while the fusibility of data is ensured.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Information carrier concept attribute transmission and electronic signature printable method

The invention discloses a method for transmitting concept attributes of an information carrier and printable an electronic signature, and provides a method for efficiently connecting electronic office ecology and paper office ecology by transmitting the concept attributes such as the effectiveness of a printable electronic file and the like which are attached to the information carrier by human beings to a printing piece of the printable electronic file through an image processing technology. The method comprises the following steps: regularizing an original file image in a predetermined mode, and filtering part of information to obtain a minimum protection scale; converting the regularized image into a code uniquely corresponding to the original file by using algorithms such as digital digest and signature, and storing the code in a covering area added on the file in the form of a graphic code; and identifying information on the printed piece, re-regularizing the obtained image, and comparing to complete verification of the specific concept attribute. The process mainly comprises six steps. The method can be applied to electronic office systems such as OA, LIMS and the like, and can be widely applied to various industries due to the fact that a universal method for transmitting specific concept attributes between information carriers is elaborated.
Owner:张雨

Password verification method and device based on zero knowledge proof and electronic equipment

The invention provides a password verification method and device based on zero knowledge proof and electronic equipment, and is applied to the field of password verification, the method comprises thesteps that the advantages of the zero knowledge proof are exerted, information related to an account password is not transmitted in the account password verification process, and a network eavesdropper cannot obtain any information about the account password, User passwords are effectively prevented from being leaked due to network transmission. Furthermore, the replay attack is prevented, and theexistence of the two random numbers not only ensures the verifiability of the password of the mobile user, but also ensures that the password is not disturbed by the replay attack; moreover, the secret factor (mobile user password) encrypted by the client is not transmitted to the background, so that the management difficulty of the server protection key is effectively reduced, password crackingor collision cannot be carried out even if the server storage information is leaked, the server information protection requirement is small, and the password leakage risk does not exist even if the server storage information is separated from the database.
Owner:CHINA CONSTRUCTION BANK

Traceability information uplink and query method and traceability device

The invention discloses a traceability information uplink and query method and a traceability device. The method comprises the steps of collecting multiple traceability information elements of an agricultural product, and uploading the traceability information elements to a block chain in real time; acquiring a plurality of traceability information elements from the block chain, the acquired traceability information elements being integrated into a plurality of traceability information entities according to preset associated information, and the traceability information entities carrying block chain IDs corresponding to the traceability information elements; and uploading all the traceability information entities to the block chain. According to the method, a plurality of traceability information elements are sorted into the traceability information entity, and then secondary uplink is carried out, so that repeated and redundant traceability data can be removed from the traceability query result, the authenticity of the traceability data is ensured, and due to the fact that the granularity of the uplink data is increased, the traceability information entity instead of the traceability information element is queried from the block chain, so that the traceability complexity of the user is reduced, the number of times of querying from the block chain is reduced, and the query efficiency and performance are improved.
Owner:HUAZHI RICE BIO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products