Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

50results about How to "Implement integrity checks" patented technology

System for realizing remote monitoring of integrity of train and method

The invention relates to a system for realizing remote monitoring of integrity of a train and a method, and relates to an onboard device and a ground control center. The system comprises a train tail device and a locomotive device, a GPRS wireless communication module, a microprocessor, a GPS satellite positioning module, a safety monitoring module, a microprocessor, a GPS satellite positioning module, an alarm device, a communication controller and a ground database server. The train tail device is used for monitoring the working state and train tail position information of a train tail wind pressure detection device; the microprocessor is connected with a wireless communication device by an interface; the safety monitoring module comprises the wireless communication device; the communication controller is used for acquiring the data transmitted by the onboard device by GPRS and forwarding instructions sent by a console to the onboard device; and the ground database server stores the data received by the communication controller so as to supply data to user software of the console for use. The system can realize remote monitoring of integrity of the train, and also can utilize the GPS information to assist the integrity inspection of the train, thus achieving the purpose of guaranteeing driving safety.
Owner:BEIJING JIAOTONG UNIV

Full context-sensitive program control flow integrity protection method and system

The invention discloses a full context-sensitive program control flow integrity protection method and system. According to the method, during an offline analysis stage, control flow information of a program is collected through simulative execution; an executive path is tracked during operation; the executive path, reaching a same indirect branch, of a process is tracked; path information is matched with the control flow information; if the matching succeeds, it is showed that a simulative executive path during offline analysis is the same as a real executive path during operation, and a subsequent legal target address can be judged according to the control flow information in the offline analysis; and if a target address during operation is different from the legal target address, it is judged that the program suffers from control flow hijack attack, so that a control flow check module notifies a process tracking module to stop the process. The invention furthermore discloses the full context-sensitive program control flow integrity protection system. The integrity protection is realized by tracking and checking executive path information, so that the program is prevented from being threatened by the control flow hijack attack.
Owner:HUAZHONG UNIV OF SCI & TECH

Data processing method, system and equipment based on cloud platform

The invention discloses a data processing method, system and equipment based on a cloud platform. The data processing method comprises the following steps: acquiring an administrator data publishing instruction; detecting whether data published by an administrator are complete or not, if the data are incomplete, executing a preset early warning operation; if the data are complete, detecting whether a primary database is in normal operation or not; and if the primary database is in the normal operation, triggering a data updating or data replacing instruction, uploading the data published by the administrator to the primary database, and matching and caching the data into an accessory database connected with the primary database by virtue of an instruction. The data processing method disclosed by the invention has the advantages that whether the data published by the administrator are complete or not is detected, data processing integrity detection is realized, and precision ratio of the database is improved; further whether the primary database is in the normal operation or not is detected, a technical means of uploading to the primary database realizes a synchronous or asynchronous data uploading mode, data loss risk under abnormal condition is eliminated, and data security is improved; and finally a technology of matching and caching data into the accessory database preventsdata loss, and more importantly, user experience is improved.
Owner:八爪鱼在线旅游发展有限公司

Label based cross-domain data transmission protection method

InactiveCN108234468AStrong scalabilityImplement anti-replay attackTransmissionData transmissionTelecommunications link
The invention discloses a label based cross-domain data transmission protection method. Safety protection devices are deployed at a network border and are connected in series in a communication link;a safety protection device at a transmitting terminal builds a safety label and adds the safety label to the tail of an original IP packet for transmission; and a safety protection device at a receiving terminal verifies the original IP packet by utilizing the safety label and sends out the original IP packet which passes verification. As the safety label is attached at the tail of the data message for transmission, so that identification and processing of a network device on a transmission path for data is not affected, and the label based cross-domain data transmission protection method hasa transparent transmission characteristic. Algorithm identifiers, label length and version number in the label have good expansibility. Safety label values designed in labels can be used for realizingcompleteness verification of data packets; serial number designed in the label can be used for realizing anti-replay attack of messages. The label based cross-domain data transmission protection method can be applied to a network safety product, and has the advantages of being safe, reliable and practical.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Data file encryption and integrity verification method and system for untrusted server environment

The invention provides a data file encryption and integrity verification method and system for an untrusted server environment, and relates to the technical field of data privacy protection, and the method comprises the steps: 1) initializing a system; 2) generating public and private keys of a BGN homomorphic encryption algorithm; 3) constructing public and private keys of the data signature; 4)encrypting the data file by adopting a BGN homomorphic encryption algorithm public key; 5) respectively constructing labels for all file blocks in the data file according to the private key of the data signature; 6) uploading the set of encrypted files and labels to a cloud server; 7) sending a file integrity challenge to the cloud server to return a label and a file block sum; 8) verifying the label sum by using the file block sum and the public key of the data signature so as to judge the integrity of the ciphertext file stored in the cloud server. According to the method, a BGN homomorphicencryption algorithm and a PDP data holding proof protocol are combined, data signatures are constructed to achieve integrity check of the encrypted files, and privacy protection and availability of the data files in an untrusted server environment are improved.
Owner:ANHUI UNIVERSITY OF TECHNOLOGY +2

Integrity checking method and device for bullet screen data, terminal and memory medium

The embodiments of the invention disclose integrity checking method and device for bullet screen data, a terminal and a memory medium. A method comprises the steps of converting target bullet screen data of a preset character string structure into a target character array, and taking a first character element in the target character array into a current character element; detecting whether the current character element is a preset separator or not, taking a current end position as a current start position if the current character element is the preset separator, taking a position of the current character element as the current end position, and checking a first character string between the current start position and the current end position; if the current character element is not the preset separator, or the first character string is checked successfully, when the current character element is not the final character element in the target character array, updating the current characterelement, and returning to execute operation of detecting whether the current character element is the preset separator or not; and determining that the target bullet screen data is checked successfully when the current character element is the final character element, and carrying out integrity checking on the bullet screen data.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Method and device for automatically checking fastening states of railway fasteners and spring fasteners

The invention relates to a method and a device for automatically checking fastening states of railway fasteners and spring fasteners. The method includes steps of acquiring positioning data of the railway fasteners, acquiring fastening state judgment data of the spring fasteners, combining the positioning data of the railway fasteners and the fastening state judgment data of the spring fasteners to complete checking the fastening states of the railway fasteners and the spring fasteners. The device comprises a railway bogie, a linear structure laser sensor, a photoelectric coder, a GPS (global positioning system) receiver, a synchronous control circuit, an embedded computer and a power source device, wherein the linear structure laser sensor, the photoelectric coder, the GPS receiver, the synchronous control circuit, the embedded computer and the power source device are arranged on the railway bogie. The method and the device for automatically checking the fastening states of the railway fasteners and the spring fasteners have the advantages that accurate positioning of the railway fasteners can be realized, completeness in checking of the railway fasteners and the spring fasteners is realized, the fastening states of the railway fasteners and the spring fasteners can be automatically checked, detail information of the railway fasteners can be recorded, and alarm for the fastening states of the railway fasteners and the spring fasteners is realized.
Owner:WUHAN HANNING TECH

Method and system for data file encryption and integrity verification in untrusted server environment

The method and system for data file encryption and integrity verification in an untrusted server environment provided by the present invention relate to the technical field of data privacy protection, and the method includes: 1) system initialization; 2) generating public and private keys of BGN homomorphic encryption algorithm; 3) ) Construct public and private keys for data signature; 4) Use BGN homomorphic encryption algorithm public key to encrypt data files; 5) Construct tags for all file blocks in the data file according to the private key of data signature; 6) Upload encrypted files and tags Gather to the cloud server; 7) Send the file integrity challenge to the cloud server to return the label sum and the file block sum; 8) Use the file block sum and the public key of the data signature to verify the label sum to judge the ciphertext stored in the cloud server File integrity: the present invention combines the BGN homomorphic encryption algorithm and the PDP data possession proof protocol to construct a data signature to realize the integrity check of the encrypted file, and improve the privacy protection and usability of the data file in an untrusted server environment.
Owner:ANHUI UNIVERSITY OF TECHNOLOGY +2

Integrity verification method, device, terminal and storage medium for barrage data

The embodiment of the present invention discloses a method, device, terminal and storage medium for checking the integrity of bullet chat data. The method includes: converting the target bullet chat data with a preset character string structure into a target character array, and The first character element in the array is used as the current character element; check whether the current character element is a preset delimiter, if so, use the current end position as the current start position, and use the position of the current character element as the current end position, for the current start Check the first character string between the position and the current end position; if not, or if the first character string is verified successfully, then if the current character element is not the last character element in the target character array, update the current character element, and Returns the operation of detecting whether the current character element is a preset separator; when the current character element is the last character element, it is determined that the verification of the target bullet chat data is successful, so as to perform an integrity check on the bullet chat data.
Owner:WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products