Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43results about How to "No tampering" patented technology

A joint learning method and system based on a public block chain and an encrypted neural network

The invention discloses a joint learning method and system based on a public block chain and an encrypted neural network. The method comprises the following steps of: enabling the terminal to downloada universal neural network model pre-constructed on the server; performing Training using local data, obtaining gradient updating data and encrypting the gradient updating data; acquiring encrypted data and a first identification code, sending the encrypted data to a server; calculating a hash value of the first identification code and uploading the hash value to the block chain; enabling a server to decrypte encrypted data, obtaining the sum of the second identification code and the gradient updating data, calculating the hash value of the second identification code, then verifying whether the hash value of the first identification code is consistent with the hash value of the second identification code or not, if yes, updating the universal neural network model by using the sum of the gradient updating data, otherwise, not updating, and repeating the above steps until the model meets a preset convergence condition. In the process of completing deep network training, user informationcan be prevented from being leaked, and it is guaranteed that transmission data are not leaked or tampered.
Owner:ZHONGAN INFORMATION TECH SERVICES CO LTD

Electronic equipment data credible acquisition and evidence storage method based on blockchain technology

The invention discloses an electronic equipment data credible acquisition and evidence storage method based on the blockchain technology, and the method comprises the steps: generating a unique public and private key pair for electronic equipment according to an equipment manufacturer name, an equipment model and an equipment SN number; through a private key signature and public key signature verification mode, guaranteeing that the server can confirm the identity of the device when the data collected by the device is sent to the server in real time, and guaranteeing that the data is not tampered. A strict progressive increase operation sequence number is maintained for each device, and a timestamp synchronization mode is adopted, so that the data uploading sequence of the devices is consistent with the collection sequence. And the data uploaded by the equipment is not lost or deleted in an offline period in a mode of maintaining a strict progressive increase operation sequence number for each piece of equipment. And the server stores the public key of the electronic equipment and is bound with the information of the electronic equipment. The whole process of data from collection to storage is transparent, credible and non-tampering through the block chain and encryption technology.
Owner:HANGZHOU VASTCHAIN TECH CO LTD

Networked vehicle remote upgrading system and method with anti-attack bidirectional authentication

The invention belongs to the technical field of systematic safety of Internet of Vehicles, and discloses a networked vehicle remote upgrading system and method with anti-attack bidirectional authentication, a CA certificate system is used for performing identity authentication on a vehicle through a digital certificate in an Internet of Vehicles network, and supporting bidirectional authenticationbetween a TSP and a networked vehicle. A TSP system is used for supporting remote upgrading of vehicles. A T-BOX system is used for detecting the IP of the TSP during upgrading; wherein the IP is notthe IP of the TSP, and the data packet of the IP is discarded; and in a non-upgrading state, external communication is compared according to rules in the security rule base of the firewall, and rulesof the rule base are updated through TSP real-time operation. According to the invention, the reliability authentication of the bidirectional identity between the networked vehicle T-BOX and the vehicle remote service provider TSP is realized, and the identity counterfeiting is prevented; reliability of data transmission between the T-BOX and the TSP is achieved, and illegal stealing and tampering of automobile upgrading software in the transmission process are prevented.
Owner:CHENGDU UNIV OF INFORMATION TECH

Multi-node authentication method for trusted execution environment

The invention discloses a trusted execution environment (TEE) multi-node authentication method, which comprises the following steps of: assuming that a plurality of TEE computing nodes form a computing resource pool, and uniformly distributing computing resources by a computing resource management system; and setting a unified access and authentication node (AuthNode) for the the resource pool, wherein the node assists a user in completing the remote authentication process of all distributed TEE computing nodes. The method has the following advantages: 1, a user can authenticate the code security in the cloud computing environment, and realizes security protection on the computing process through the TEE; 2, the privacy protection of user data can be achieved, the user data are uploaded to the cloud environment in an encrypted state, and the data are only decrypted and used in the TEE; 3, the user can authenticate the correctness of the calculation result to ensure that the calculation result is not tampered; and 4, complete remote authentication is only carried out in a program deployment stage, the TEE authentication process is completed in the cloud environment, the user only needs to carry out simple local verification in the calculation process, and the execution efficiency is high.
Owner:TIANYI ELECTRONICS COMMERCE

Electronic warrant issuing method, cloud server and electronic warrant system

PendingCN113077233AOptimize the business environmentOptimize the market environmentFinanceDatabase distribution/replicationBusiness enterpriseOperations research
The invention discloses an electronic warrant issuing method, a cloud server and an electronic warrant system. The method comprises the following steps of pushing a project list according to order data and a project selection request; receiving the selected items and primarily screening a financial institution based on the attributes of the items to obtain a primarily reviewed financial institution list; based on the bid amount of the selected item, interacting with the transaction center system to obtain a guarantee residual responsibility and a guarantee upper limit of the financial institution; carrying out secondary screening on the first-review financial institution list; when the guarantee residual responsibility of the financial institution exceeds the guarantee upper limit and joint guarantee exists, or when the guarantee residual responsibility of financial institutions does not exceed the guarantee upper limit, the financial institutions being reserved; generating a final financial institution list based on the reserved financial institutions and feeding back the final financial institution list; and receiving the selected financial institution, generating a warranty order and sending the warranty order to the selected financial institution system. More financial institutions with the qualification of dealing are provided for enterprises for selection, market business is expanded for guarantee companies, financial industry chains are expanded, and insurance companies obtain associated business.
Owner:李冬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products