Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

354results about How to "Implement backup" patented technology

Method and system for realizing block chain private key protection based on key segmentation

The invention discloses a method and a system for realizing block chain private key protection based on key segmentation, and aims to solve a technical problem that a private key of a block chain is lack of security and cannot be retrieved. The method for realizing block chain private key protection based on key segmentation comprises that hard encryption for a block chain private key supporting mobile phone equipment certificate authentication and password authentication is realized by taking a mobile phone as a terminal carrier and using a cipher machine and an authentication server of the cloud; and the block chain private key is segmented by using a threshold algorithm, and multi-party participating key backup and key recovery/retrieval is realized. The method comprises (1) a registration procedure, (2) a private key utilization procedure, (3) a private key backup procedure, and (4) a private key recovery/retrieval procedure. The system structurally comprises a cipher machine and an authentication server of the cloud and a mobile phone acting as the terminal carrier. The method and the system disclosed by the invention can realize safe storage, safe utilization, multi-party participating backup and multi-party participating retrieval of the block chain private key.
Owner:北京信任度科技有限公司

Method for using quantum keys to improve safety of electric power information transmission in power system WiMAX wireless communication network

The invention discloses a method for using quantum keys to improve safety of electric power information transmission in a power system WiMAX wireless communication network. According to the method for using the quantum keys to improve safety of electric power information transmission in the power system WiMAX wireless communication network, due to the fact that the quantum key distribution technology is applied to the power system WiMAX wireless communication network, safety of information transmission of a power system is improved; the scheme that a quantum key distribution network and the power system WiMAX wireless communication network are combined is adopted, the unconditionally safe quantum keys are applied to the power system WiMAX wireless communication network, pre-encryption is carried out on data needing to be transmitted by using the quantum keys on the premise that the IEEE802.16 protocol in the WiMAX technology is not modified, another encryption is carried out on a ciphertext generated through pre-encryption by using the encryption technology in the WiMAX wireless network, the effect of double protection on information transmission in the electric power system is achieved, convenience and rapidness are achieved, and safety of wireless communication of the electric power system is improved to the maximum extent.
Owner:UNIV OF SCI & TECH OF CHINA +2

Information transmission method of spacecraft

The invention discloses an information transmission method of a spacecraft. The information transmission method comprises the following steps that: when a numerical control computer works normally, the numerical control computer receives telemeasuring data acquired by a remote unit and telemeasuring data provided by the control computer per se, the numerical control computer also receives telemeasuring data of a loading task processing unit, carries out telemeasuring formatting on all the received telemeasuring data to generate whole spacecraft telemeasuring data and outputs the whole spacecraft telemeasuring data to the remote unit A, and the remote unit A finishes information source encryption of the whole spacecraft telemeasuring data and outputs the encrypted information sources to a measurement and control responder; and when the numerical control computer works abnormally, the remote unit A directly outputs the acquired telemeasuring data and the telemeasuring data generated by the remote unit A per se to the measurement and control responder for downloading all the telemeasuring data. The information transmission method disclosed by the invention realizes backup of a key telemeasuring information transmission path of the spacecraft, thereby ensuring continuous monitoring of the ground on working states of key equipment of the spacecraft and improving the information transmission reliability.
Owner:BEIJING INST OF SPACECRAFT SYST ENG

Method, system and apparatus for implementing failure restoration and data backup

The present invention, pertaining to the field of communication, discloses a method for realizing fault recovery and data backup, a system and an apparatus thereof. Wherein, the method comprises the steps of starting a recovery tool, the recovery tool loading a customized root file system, establishing a pre-boot execution environment (PXE) support service, a file transmission service and a disk image management service, wherein, the PXE support service and the file transmission service are used for supporting the device to be recovered to realize the starting of an operating system through a network, and the disk image management service is used for performing disk image backup and/ or a recovery operation to the device to be recovered; after receiving an information that the starting of the operating system through a network by the device to be recovered is successful, remotely logging in the device to be recovered, and performing disk image backup and/ or a recovery operation to the device to be recovered by the disk image management service. When the device to be recovered is not configured with a CD-ROM, a display and a keyboard, the fault recovery of the device can be realized rapidly by using the method, and also the data backup is realized, therefore, time cost by the fault recovery of the device to be recovered is greatly shortened.
Owner:HUAWEI TECH CO LTD

Non-key signature infrastructure building method based on block chain

InactiveCN107171812AStrong throughput and scalabilitySmall storage and network load requirementsUser identity/authority verificationDigital data protectionChain networkBlockchain
The invention provides a non-key signature infrastructure building method based on a block chain. The method comprises the steps that a core layer node is used to embed a root hash value of an aggregation layer into an OP_RETURN transaction script through identity authentication; broadcasting is carried out in the block chain network; packaging into the block is carried out to form a KSI Calendar hash account book; KSI release layer architecture based on the block chain is provided; a miner plays the role of release node in KSI; transaction information in the block chain network is collected; a Merkle tree is built; the release node simply needs to extract contents in OP_RETURN in transaction for Merkle tree building, so as to finally form CRH; and finally CRH is written into the block head. According to the invention, without changing the current non-key signature infrastructure architecture, the block chain is used to complete identity authentication of the KSI core layer node; the public transparency of the Calendar hash account book is protected; and the problems of long CRH release cycle, poor release media credibility and difficult recognition and processing in the prior art are solved.
Owner:光载无限(北京)科技有限公司

Subscriber identification module and transmission method and system based on subscriber identification module

ActiveCN102026187AMeet the interface characteristicsHigh speed data exchangeNear-field systems using receiversSensing record carriersCommunication controlRadio frequency
The invention relates to a subscriber identification module and a transmission method and system based on the subscriber identification module. The subscriber identification module comprises a bus, a processing module and a storage module, wherein the processing module and the storage module are connected with the bus. The subscriber identification module further comprises a short distance wireless communication controller, a short distance wireless communication module and a radio frequency antenna, wherein the short distance wireless communication controller is connected with the bus; the short distance wireless communication module is connected with the short distance wireless communication controller; the radio frequency antenna is connected with the short distance wireless communication module; and the short distance wireless communication controller is used for controlling the short distance wireless communication module to carry out data interaction with an external entity through driving the radio frequency antenna, writing the data which is received by the short distance wireless communication module from the external entity into the storage module through the processing module, and reading the data through the processing module from the storage module, wherein the data is sent to the external entity by the short distance wireless communication module. In the invention, the high-speed data exchange between an external entity and the subscriber identification module can be supported without needing to chang a terminal.
Owner:DATANG MICROELECTRONICS TECH CO LTD

Private key safety management method based on identity public key cryptography system

The invention discloses a private key safety management method based on an identity public key cryptography system. The private key safety management method comprises the steps of: system parameter establishment; private key generation algorithm; private key recovery algorithm; signature algorithm; and authentication algorithm. Through the combination of password blinding and private key slicing, in the process of distribution, storage, backup and recovery, the private key is sliced, and part of the private key is subjected to password blinding in the backup process, even in the use process, the authentic private key of a user is not needed to be calculated, and the private key is used in a slicing manner, so that the safety of the private key is ensured. Compared with the prior art, the private key is subjected to password blinding only in the backup process, the safety of the private key can be ensured without any safety measure in the distribution, storage and use processes, on one hand, the escrow problem of the private key is solved, on the other hand, the backup and the recovery of the private key can be realized easily, and for users, the private key safety management method is convenient in use and low in cost.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products