Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

41results about How to "Prevent camouflage" patented technology

Novel offline payment method

The invention discloses a novel offline payment method. The method comprises the steps that account numbers of an accountee party and a receiving party serve as IDs, and a corresponding public key and private key are mapped according to business sub-domain identifications; a random number is selected from the receiving party, signature is conducted on the random number through the private key, and a two-dimension code is generated; the two-dimension code is scanned through the accountee party, the public key is mapped by means of the receiving party ID and the service sub-domain identification, and attestation is conducted on a signing message; if attestation succeeds, the accountee party successfully pays according to transaction information; signature is conducted on the random number by the accountee party through the private key after payment to generate a two-dimension code; the receiving party scans the two-dimension code, the public key is mapped through the accountee party ID and the business sub-domain identification, and attestation is conducted on a signing message; if attestation succeeds, posting is successfully conducted on the receiving party. According to the novel offline payment method, payment does not rely on the support of a network any more, payment is achieved on various mobile equipment, and the payment process is greatly facilitated. The two-way authentication process based on the identifications is adopted by the two payment parties, the legality of transactions is fully guaranteed, and illegal manipulation of information and information disguising are prevented.
Owner:CHINA SMARTCITY TECH

Equipment identification system based on equipment fingerprint

The invention belongs to the field of network admission control technology, and particularly relates to an equipment identification system based on an equipment fingerprint, wherein the equipment fingerprint information comprises hardware information, operating system information and application service information of the equipment. The system comprises the components of an equipment fingerprint database, an equipment discovery module, an equipment fingerprint acquisition module, an equipment fingerprint processing module, an equipment fingerprint matching module and an artificial identification module. The equipment fingerprint information comprises the MAC OUI hardware information and the operating system information of the equipment and the application service information in a port list. The formats of the fingerprint database comprise MAC OUI, operating system information, port list and equipment type. The equipment fingerprint acquisition module comprises operating system fingerprint information and port fingerprint information. The equipment identification system has advantages of performing network admission control on network equipment through the equipment type, making different security strategies on different kinds of equipment, preventing equipment counterfeiting, and ensuring high safety of enterprise network.
Owner:BEIJING VRV SOFTWARE CO LTD

Secure communication method based on intelligent vehicle

The invention discloses a secure communication method based on an intelligent vehicle. The secure communication method comprises the steps: an intelligent vehicle client randomly generates a number which is used as the secret key for a communication symmetric encryption algorithm and verifies a server, and generates a symmetric secret key by using an asymmetric encryption algorithm and sends the symmetric secret key to the server; the server uses a private key to decrypt messages, and uses the symmetric encryption algorithm to encrypt a handshake text 'hello, zjuroboy !' and replies the encrypted handshake text 'hello, zjuroboy !' to the client; the client uses the symmetric encryption algorithm to decrypt the handshake text; the client uses the symmetric encryption algorithm to encrypt an intelligent vehicle serial number and MASK if verification is successfully; the server decrypts the verification information to obtain the serial number and the MASK so as to verify the identity of the intelligent vehicle; and based on the established connection, the intelligent vehicle and the server use the symmetric encryption algorithm to perform bidirectional communication. The secure communication method based on an intelligent vehicle can remove three hidden dangers that the communication content is eavesdropped; the communication identity is camouflaged; and the communication content is tampered during the communication process between the intelligent vehicle and the server.
Owner:ZHEJIANG UNIV

Mobile terminal location method on the basis of electromagnetic signals and mobile terminal location device on the basis of electromagnetic signals

The present invention relates to the communication field, and discloses a mobile terminal location method on the basis of electromagnetic signals and a mobile terminal location device on the basis of electromagnetic signals. The mobile terminal location method comprises the following steps: generating an initial particle set at the location initial moment, performing random distribution of different moving step lengths to each particle in the initial particle set; repeatedly executing the following step: updating the position information of each particle in the particle set at the previous time to obtain the current particle set; scoring the availability of each particle according to the position information of each particle in the current particle set and the signal fingerprint received at present; acquiring the moving step length of each particle which has a score higher than a first preset threshold value in the current particle set; updating the moving step length of each particle which has a score lower than the first preset threshold value according to the acquired moving step lengths. According to the invention, the moving step length being closest to the actual step length of a located person may be obtained in the location process, and is able to update the moving step length with the changing of the step length of the located person.
Owner:ALIBABA GRP HLDG LTD

Logistics safety payment method for realizing payment in cash on delivery

The present invention relates to a logistics safety payment method for realizing payment in cash on delivery. Left and right hand pressing database aiming at each button is constructed through the mobile terminal of each recipient when lawful owners are in normal state so as to verify the identity of a payment operator; after an express delivery man's hand-held POS terminal is connected with a recipient's mobile intelligent terminal through an optimum NFC relay, the hand-held POS terminal and the mobile intelligent terminal respectively send each current position and noise and air humidity of the current position and obtain the air humidity to an authentication mechanism; when the authentication mechanism determines the payment both sides are located at the same safe position, transaction secret keys are sent to both sides with payment in cash on delivery; the mobile intelligent terminal sends correct payment passwords inputted by the lawful owners through buttons to a bank system, and the bank system transfers cost to a logistics company account; and after the payment transaction is finished, the logistics company transfers corresponding cost to dealers through the bank system, so that the efficiency and the payment safety of the payment process of payment in cash on delivery are guaranteed.
Owner:ZHEJIANG WANLI UNIV

Electronic voting module and electronic voting method

Though simple in construction, an electronic balloting module and an electronic balloting method according to the invention can prevent disguise and negation, can eliminate a time difference resulting from an area difference and can also prevent tampering of an electronic balloting content. The electronic balloting module includes an interface 11 connected to an electronic equipment terminal for conducting electronic balloting through a network, a timepiece for generating time information, a storage unit and an operation unit each having a tamper-resistant structure, time calibration means connected to a predetermined time supervisory center through the electronic equipment terminal at least when the calibration means is operated, subjected to time calibration by the quartz timepiece and receiving a time supervision certificate, and time stamp means for acquiring time information of the time as electronic balloting time information from the quartz timepiece and outputting. an electronic certificate obtained by affixing a signature to the electronic balloting information and the electronic balloting time information by a secrete key of a predetermined public key cipher system with the time supervision certificate to the electronic balloting means provided that the time stamp means receives electronic balloting data from the electronic balloting means of the electronic equipment terminal or electronic balloting information comprising a unidirectional function value of the electronic balloting data.
Owner:SEIKO INSTR INC

Safety protection method and device for train data

The invention discloses a safety protection method for train data. The method comprises a secret key distribution step, an authentication step, an encryption step and a transmission step, wherein thesecret key distribution step is used for distributing a unique recognition number ID and a corresponding secret key PW to each train needing to be monitored and sending the unique recognition number ID and the corresponding secret key PW of each train to a monitoring party; in the authentication step, identity authentication is carried out on all nodes accessed to the train network; in the encryption step, the identity of a train is identified according to a unique recognition number ID carried by the train, and the collected train data of the train is symmetrically encrypted by using a secretkey PW corresponding to the train. In the transmission step, the encrypted train data is transmitted to a monitoring party; and the monitoring party decrypts the data by using the secret key PW corresponding to the train and then monitors and checks the data. According to the invention, the integrity and confidentiality of train data are protected, the occurrence of equipment camouflage, eavesdropping and tampering is prevented, and the real-time protection of the train data is improved.
Owner:CENT SOUTH UNIV

Electronic ticket selling method and system based on block chain, electronic equipment and storage medium

The invention relates to an electronic ticket selling method based on a block chain. The method comprises the following steps: setting a plurality of user nodes on a block chain network; and setting aticket management node on the blockchain network. The method also comprises the following steps: setting a cost management node on the blockchain network, wherein the cost management node is used forperforming cost setting and cost collection; and executing the following steps on the cost management node: a) setting an initial value of the user credit score as M score, wherein M is an upper limit; b) if the user performs the appointment once, accumulating N scores; c) if the user fails to keep an appointment for one time, deducting P score, wherein P = Q * the ticket selling rate of the current day, Q is a multiple and the ticket selling rate of the current day= sold ticket amount / available ticket total amount, and d) sequencing all user credit points, and then determining ticket buyingpriority according to the sequencing, so that the higher the sequencing of the user credit points is, the higher the ticket buying priority is. The invention further relates to an electronic ticketingsystem based on the block chain, electronic equipment and a storage medium.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Data security protection method and device and service equipment

The embodiment of the invention relates to the technical field of data processing. Specifically, the present invention relates to a data security protection method and device and service equipment. According to the data security protection method, a target terminal can be determined from a complex data interaction scene based on a drive link and a response path of an APK program; the target terminal is prevented from being disguised through the virtual identifier; the comprehensiveness and the accuracy of determining the target terminal are improved; hypertext data is used as an analysis basis; the reliability of verifying the target terminal can be improved; the operation efficiency of the data crawler determined according to the hypertext data is ensured; the timeliness and reliability of safety protection can be realized based on the operation result of the data crawler; and when it is judged that the data environment index does not pass the verification, the security protection scanning task is issued to the current terminal, and the current terminal can execute the data cleaning action and the data load balancing action, and the data transmission risk caused by continuous connection with the target terminal is avoided, and the timeliness and reliability of data security protection are improved.
Owner:长沙豆芽文化科技有限公司

A Device Identification System Based on Device Fingerprint

The invention belongs to the field of network admission control technology, and particularly relates to an equipment identification system based on an equipment fingerprint, wherein the equipment fingerprint information comprises hardware information, operating system information and application service information of the equipment. The system comprises the components of an equipment fingerprint database, an equipment discovery module, an equipment fingerprint acquisition module, an equipment fingerprint processing module, an equipment fingerprint matching module and an artificial identification module. The equipment fingerprint information comprises the MAC OUI hardware information and the operating system information of the equipment and the application service information in a port list. The formats of the fingerprint database comprise MAC OUI, operating system information, port list and equipment type. The equipment fingerprint acquisition module comprises operating system fingerprint information and port fingerprint information. The equipment identification system has advantages of performing network admission control on network equipment through the equipment type, making different security strategies on different kinds of equipment, preventing equipment counterfeiting, and ensuring high safety of enterprise network.
Owner:BEIJING VRV SOFTWARE CO LTD

IoT gateway device capable of securely authenticating physical perception devices and access method thereof

The invention discloses an Internet of Things gateway device capable of securely authenticating a physical perception device and an access method thereof. The device comprises: a device fingerprint extraction module, which can extract device fingerprint information of the connected physical perception device; a fingerprint processing module, which can extract the device fingerprint information of the connected physical perception device; The device fingerprint information extracted by the device fingerprint extraction module is processed into a fingerprint field with a fixed number of digits corresponding to the connected physical sensing device; the identification generation module can use the fingerprint field corresponding to the connected physical sensing device as the physical sensing device. Generate a unique device identifier containing a fingerprint field; the authentication module is respectively connected with the identification generation module, the physical perception device and the cloud server, and uses the unique device identifier containing the fingerprint field generated by the identification generation module to interact with the cloud server to access the Physically aware devices perform two-way authentication. It can use the unique device identifier constructed by the device fingerprint of the physical sensing device to realize two-way authentication and improve the security of the communication of the physical sensing device.
Owner:UNIV OF SCI & TECH OF CHINA

Narrow-band frequency hopping radio signal identification method

The invention discloses a narrow-band frequency hopping radio signal identification method, which comprises the following steps: simultaneously or within a short time interval, detecting and demodulating radio signals of a predetermined frequency of a narrow-band frequency hopping radio signal and adjacent frequencies on two sides of the narrow-band frequency hopping radio signal; comparing the preset frequency of the narrow-band frequency hopping radio signal with the power corresponding to the radio signals with the adjacent frequencies on the two sides of the narrow-band frequency hopping radio signal; and when the power corresponding to the radio signals with the adjacent frequencies on the two sides is smaller than a first threshold value of the power corresponding to the preset frequency of the narrow-band frequency hopping radio signal, and the power difference corresponding to the radio signals with the adjacent frequencies on the two sides is smaller than a second threshold value, judging that the narrow-band frequency hopping radio signal is a legal signal, otherwise, judging that the narrow-band frequency hopping radio signal is an illegal signal. The method can effectively distinguish whether a signal to be received is a frequency hopping radio signal sent by a legal transmitter according to a preset frequency or a fixed frequency radio signal covering the whole frequency band and sent by an illegal transmitter. The application of frequency hopping radio communication with increased security can be extended to the field of narrow-band wireless communication.
Owner:MARELLI AUTOMOBILE ELECTRONIS GUANGZHOU CO LTD

A data security protection method, device and service equipment

The embodiment of the invention relates to the technical field of data processing. Specifically, the present invention relates to a data security protection method and device and service equipment. According to the data security protection method, a target terminal can be determined from a complex data interaction scene based on a drive link and a response path of an APK program; the target terminal is prevented from being disguised through the virtual identifier; the comprehensiveness and the accuracy of determining the target terminal are improved; hypertext data is used as an analysis basis; the reliability of verifying the target terminal can be improved; the operation efficiency of the data crawler determined according to the hypertext data is ensured; the timeliness and reliability of safety protection can be realized based on the operation result of the data crawler; and when it is judged that the data environment index does not pass the verification, the security protection scanning task is issued to the current terminal, and the current terminal can execute the data cleaning action and the data load balancing action, and the data transmission risk caused by continuous connection with the target terminal is avoided, and the timeliness and reliability of data security protection are improved.
Owner:长沙豆芽文化科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products