Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

121results about How to "Not tampered with" patented technology

Trusted data transmission method and system, electronic equipment and storage medium

The invention provides a trusted data transmission method and a system, electronic equipment and a storage medium. The trusted data transmission method comprises the following steps: acquiring data; calculating an abstract value of the collected data, and encrypting the abstract value according to a private key of the edge computing node to generate an edge computing node signature; generating a message serial number for the acquired data; caching the abstract value and the message serial number of the acquired data; generating a data message according to the public key of the target blockchain node; sending the data message to the target blockchain node for decryption and verification; receiving a feedback message sent by the target blockchain node; and decrypting the feedback message according to the private key of the edge computing node, comparing the decrypted data with the cached abstract value and message serial number of the acquired data, and if the decrypted data is consistent with the cached abstract value and message serial number of the acquired data, finishing the transmission of the acquired data. According to the method and the device provided by the invention, thesecurity of message transmission between the Internet-of-thingsInternet-of-things and the blockchain can be realized.
Owner:上海诚频信息科技合伙企业(有限合伙)

Management and control method for user quota in multi-network storage system

ActiveCN102447736AAvoid wastingEnsure correct consistencyTransmissionControl systemComputer module
The invention discloses a management and control method for user quota in a multi-network storage system. The method comprises the following steps of starting a metadata server, starting an object storage server, starting a management end, carrying a client end, controlling quotas and back writing quotas. The invention further discloses a management and control system for user quotas. The system comprises a management end, a client end, a metadata server and an object storage server; the management end has an administrator client thread; the client end comprises a quota control module; the metadata server comprises a metadata service thread, a quota regularly synchronized client thread and an administrator service thread; and the object storage server has a document service thread and a quota regularly synchronized service thread. With the adoption of the method and system provided by the invention, waste of network bandwidth caused by unnecessary communication and excessive quota data among servers due to change of resource usage can be avoided, the influence of the quota control function to the system performance is reduced, and meanwhile, a quota consistency synchronizing mechanism is further provided to ensure correctness and consistency of the usage amount of user resources in the system.
Owner:HUAZHONG UNIV OF SCI & TECH

Anti-counterfeiting source tracing system based on block chain

The invention discloses an anti-counterfeiting source tracing system based on a block chain. The system comprises the following functional modules: (1) a verification code generation module which is used for generating the unique verification code of the product; (2) a verification information storage module which stores verification information in the block chain; (3) a verification code readingmodule which reads external anti-counterfeiting information and identifies the corresponding verification code; (4) a verification code verification module which decodes and identifies the verification code; and (5) a commodity information output module which reads product information out of a database after successful matching. The unified and secure anti-counterfeiting verification mode is provided through the block chain technology and can be additive to the existing external anti-counterfeiting means so that the multistep anti-counterfeiting verification process can be simplified and the cost for anti-counterfeiting verification can be saved. New technical support is adopted so that more product information can be provided on the basis of the original anti-counterfeiting information, and the buyer of the commodity is enabled to participate in the source tracing process of the commodity and get more recognition from the commodity buying process.
Owner:HANGZHOU QULIAN TECH CO LTD

Method and system for supporting multi-mode identification network addressing to gradually go to IP, and storage medium

The present invention provides a method and system for supporting multi-mode identification network addressing to gradually go to IP, and a storage medium. The present invention proposes a set of newnetwork multi-mode identification generation management and routing addressing system that integrates blockchains. The multi-mode identification dynamic adaptation and intercommunication technology isused to break through all existing network performance and security bottlenecks based on the IP layer, and the distributed blockchain consensus algorithm is used to achieve the original wish of Internet co-management and co-governance. All network resources on the network are locked on the blockchain to ensure that network resources are authentic and not tampered; the high-performance and low-overhead distributed storage technology is used to achieve the security of multi-mode identification addressing and tamper-proof modification, and, at the same time, the introduction of user real-name registration and network login management strategies combined with biometric identity information and signature strategies for privacy protection are introduced to reduce system management costs and improve the privacy and security of access node information.
Owner:PEKING UNIV SHENZHEN GRADUATE SCHOOL +3

A traceability system based on a block chain

The invention discloses a traceability system based on a block chain, and relates to the technical field of blockchain and information traceability. The system comprises an alliance chain management module, a block chain browser module, a traceability code generation module, an information storage module, an information reading module, a caching module, a commodity information reading module and an SDK module, and the alliance chain management module can manage and maintain block chain nodes and newly add consensus nodes for key link manufacturers on a supply chain in the block chain. According to the traceability system based on a block chain, the information security Tamper-resistant properties of the block chain are utilized;, the information can be protected from being stolen and tampered; the product information can be kept transparent and public in front of consumers; the credibility of the traditional traceability system is improved, the anti-counterfeiting traceability system can adapt to the existing external traceability means on the market, the anti-counterfeiting traceability work of the original product is supplemented and updated, and multiple anti-counterfeiting processes adopted by manufacturers are simplified, so that the labor and financial cost of the work is reduced.
Owner:链极智能科技(上海)有限公司

Cloud computing access method based on cross domain identity authentication

The invention discloses a cloud computing access method based on cross domain identity authentication. The method is realized by a local identity authentication module, a local authorization decision module, a local identity and authority management module, a cross domain authority inquiring module, a third-party identity authentication module and a third-party authority service module. The cloud computing access method based on cross domain identity authentication has the following characteristics: (1) subject identity, attribute and authority information are described in a standard manner, and certification authority of a subject, authentication validity, the attribute of the subject and the authority of the subject in a targeted organization can be clear by the standard description; (2) request query related to identity authentication and response messages in cross domain identity authentication are abstracted, a standard format for different types of messages is defined, and identity information which is transmitted among different domains can be understood; and (3) confidentiality, integrity, reliability and identifiability of transmitted messages are guaranteed by a high-reliability encryption transmission mechanism, and information of authentication of users cannot be wiretapped or tampered.
Owner:JINAN INSPUR HIGH TECH TECH DEV CO LTD

Security management system and method of dependable computing platform

The invention discloses a security management system and method of a dependable computing platform. The security management system comprises a dependable code module, a security management center module, a security management agent module and a security strategy management protocol module; the security strategy management protocol module between the security management center module and the dependable code module is realized on basis of the dependable code module so that the security of the transmission of a security management strategy is ensured; the security protection of a security strategy at a security management center is realized on basis of the dependable code module; and a security strategy at the dependable computing platform is stored in the dependable code module, and the security of the security strategy is protected by the dependable code module so that the security of the storage of the security management strategy is ensured. The security management method based on the dependable computing platform comprises a step of generating a security strategy management protocol and steps of producing, extracting and deleting a new security strategy by the security management center and has the advantages of fulfilling the protection of encryption and integrity verification of security strategy data and preventing data leakage and unauthorized tampering of the security strategy data from an attacker.
Owner:中国人民解放军海军计算技术研究所

Trusted two-dimensional code generation method and device, electronic equipment and storage medium

The invention provides a trusted two-dimensional code generation method and device, electronic equipment and a storage medium. The method comprises the following steps: sending two-dimensional code service information to an application server through a two-dimensional code application, wherein the two-dimensional code service information is obtained after signature by using an application privatekey; receiving two-dimensional code information sent by the application server through the trusted two-dimensional code application, wherein the two-dimensional code information comprises a two-dimensional code URL, and the two-dimensional code information is obtained after the application server encrypts the two-dimensional code URL by using an application public key; decrypting the two-dimensional code information through a trusted two-dimensional code application according to an application private key to obtain the two-dimensional code URL; and generating a corresponding two-dimensional code according to the two-dimensional code URL through the trusted two-dimensional code application. According to the embodiment of the invention, the trusted two-dimensional code application running inthe TEE communicates with the application server, so that the generation of the two-dimensional code is realized, and the TEE provides a secure execution environment for authorizing security software, so that the security of the generation of the two-dimensional code is improved.
Owner:SICHUAN PANOVASIC TECH +1

Multi-channel safety authenticating system and authenticating method based on U-Key

The invention relates to a multi-channel safety authenticating system and an authenticating method based on a U-Key, aiming at ensuring safety of a network transaction; the authenticating system comprises the U-Key; a global system for mobile communications (GSM) module is added on the U-Key; one side of the GSM module is connected with a U-Key main control chip and the other is connected with a user mobile telephone and a bank network server through a wireless network; the U-Key comprises a display screen which is used for echoing a transaction account and amount transaction information, as well as a button for finishing an operation of confirming or canceling; data is transmitted to the user mobile telephone and the bank network server by the GSM module as authenticating a signature of the U-Key; with multi-channel transmission and multi-side authentication, risks that a user identity is falsely used and transmission data is interpolated are prevented; user transaction data is output by a USB (Universal Serial Bus) interface after authenticating a signature of the U-Key, and is then transmitted to a bank server by a user computer through a network and cached in the bank server; by checking and verifying the user identity and the transaction information through multiple channels, therefore, validity of the user identity and transmission security of the transaction data are effectively guaranteed.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Data trusted processing method and system fusing trusted computing and block chain

The invention discloses a data trusted processing method and system fusing trusted computing and a block chain, and belongs to the technical field of energy data processing. The invention discloses a data trusted processing method and system fusing trusted computing and a block chain. The data trusted processing method and system are mainly used for solving the energy data trust problem before energy data is chained in the current block chain application process and the environment trusted problem of service computing. Aiming at the problem of credibility of uplink energy data, starting from two aspects of an Internet of Things acquisition end or an Internet of Things energy data acquisition platform, a method of fusing a credible computing technology and a block chain technology is adopted, and Internet of Things acquisition equipment, an oracle machine and an on-chain and off-chain energy data credible verification model are embedded through credible computing; the credibility of energy data collection, transmission and storage processes is realized, and the credibility of energy data collection is ensured in combination with security monitoring of credible computing. In order to solve the problem of a service computing environment, the invention provides a computing architecture combining trusted computing and a state channel, so that service computing is carried out on energy data under the condition of privacy protection.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products