Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

78results about How to "Prevent Data Leakage" patented technology

Access authentication method of internet-of-things fog device at cloud platform based on blockchain

The present invention relates to an access authentication method of an internet-of-things fog device at a cloud platform based on a blockchain. An internet-of-things device initiates an agent request of accessing a cloud platform to an intelligent gateway with a blockchain module through the means of device authentication; the blockchain module of the intelligent gateway accesses a blockchain network and gives out device certificate of the internet-of-things device and the device certificate of the intelligent gateway to the blockchain network for requiring authentication, wherein the blockchain network determines whether the request link of the intelligent gateway is frequently changed in a short period or has safety risk or not, and then verifies the legality of the intelligent gateway certificate; the same mode is employed to verify the legality of the device certificate of the internet-of-things device; and if the internet-of-things device with the blockchain module also can initiate the agent request of accessing the cloud platform, the authentication access mode is the same as the authentication mode of the intelligent gateway. The dependence on the cloud platform and the usage frequency are reduced, and the risks of the cloud platform being sniffered and injected at the aspect of the device access are reduced.
Owner:FUJIAN SHIDA COMP EQUIP

Identity authentication based virtual terminal safety environment protection method and system

The invention discloses an identity authentication based virtual terminal safety environment protection method and system. The system comprises an intelligent storage monitoring layer, a storage serving layer, and a core safety layer, wherein the intelligent storage monitoring layer comprises a storage access redirecting module, is in charge of monitoring and analyzing data access acts of application programs, and performs actions according to configuration rules, the storage access redirecting module transfers input/output access according to access control rules, the storage serving layer is in charge of encrypting and decrypting files or data and recording file mapping relations, and the core safety layer is the basis of the whole framework, provides a key management function, provides encryption and decryption support for the storage serving layer, and dispatches different algorithms as desired. By means of the identity authentication based virtual terminal safety environment protection method and system, safety of core application data can be protected, data leakage is prevented, and data inside and outside the environment are isolated without influence and do not influence user operation habits.
Owner:北京明朝万达科技股份有限公司

Data protection method of USB storage device based on magnetic disc virtual technology

The invention provides a data protection method of a USB (Universal Serial Bus) storage device based on a magnetic disc virtual technology. The data protection method comprises the following steps: 10) generating a U-disc verification key, a user verification key and an encryption and decryption key through a U-disc initialization module, dividing a U disc into an ordinary partition, an encryption partition and a log partition, and hiding the encryption partition and the log partition; 20) enabling the encryption and decryption key to disappear after performing strategy encryption on the U disc and saving the U-disc verification key and the user verification key; 30) calculating a user key through an authentication module by utilizing an access key, further calculating the encryption and decryption key by the user key and the user verification key and verifying a strategy and the U-disc verification key; 40) enabling authentication to succeed, accessing the encryption partition by a user, and operating a recording module to record an operation action of the encryption partition into the log partition; and 50) terminating access and relieving the carrying between a virtual device and a window roll through a device carrying module. According to the data protection method disclosed by the invention, the data protection function of the USB storage device can be realized in a software layer.
Owner:FUJIAN CENTM INFORMATION

Blockchain foundation-based three-dimensional (3D) printer for internet of things

The invention relates to a blockchain foundation-based three-dimensional (3D) printer for internet of things. The 3D printer comprises printers, a communication network and control computers, wherein the plurality of printers are respectively connected with the control computers by the communication network, and all the printers are connected in parallel; the plurality of control computers respectively form at least one control local area network by means of the communication network; the printers are respectively provided with a blockchain control device; the blockchain control devices are respectively connected with the printers and the communication network; each blockchain control device comprises a bearing shell, a backup power, a central data processor, a metal oxide semiconductor (MOS) drive circuit, a data storage secure digital (SD) card, a data caching module, an address coding module and an inter-process communication (IPC) interface. The blockchain foundation-based 3D printer for the internet of things is simple in structure and flexible and convenient to use, can effectively meet the need of carrying out file printing operation from a long distance through the network on one hand, and can effectively improve the safety and reliability of file transfer and response during file printing on the other hand so as to prevent the phenomenon of data leakage.
Owner:CHENGDU YUYA TECH

Data protection method and data protection device of movable storage equipment and movable storage equipment

The embodiment of the invention provides a data protection method and a data protection device of movable storage equipment and the movable storage equipment. The data protection device comprises a triggering unit, a power supply unit and a processing unit, wherein the triggering unit is used for emitting a power supply request signal and an elimination request signal when the movable storage equipment meets a preset data protection triggering condition; the power supply unit is used for receiving the power supply request signal emitted by the triggering unit and supplying power to the processing unit and a storage unit of the movable storage equipment; and the processing unit is used for receiving the elimination request signal emitted by the triggering unit and eliminating data stored in the storage unit. In the embodiment, a certain triggering condition is preset in the movable storage equipment; if the condition is met, the power is supplied to the movable storage equipment and the data stored in the movable storage equipment are eliminated, therefore, the problem of leaking the data after the movable storage equipment is filched is avoided and the safety of information stored in the movable storage equipment is ensured.
Owner:HUAWEI DIGITAL TECH (CHENGDU) CO LTD

Automatic goods selling device control system and method based on blockchain foundation

The invention relates to an automatic goods selling device control system and method based on a blockchain foundation. The automatic goods selling device control system comprises a backup power, a central data processor, an MOS driving circuit, a data storage SD card, a coding module, a crystal oscillator, a clock frequency dividing circuit, a data caching module, an address coding module, a data communication interface, a network communication module and a relay control circuit based on a single chip microcomputer, wherein the central processing unit is electrically connected with the backup power, the MOS driving circuit, the data storage SD card, the data caching module, the address coding module and the network communication module; the MOS driving circuit is connected with the backup power, the data storage SD card, the clock frequency dividing circuit, the data caching module, the data communication interface and the relay control circuit based on the single chip microcomputer. On one hand, the requirements that product sales and sales information monitoring feedback work are remotely carried out through a network can be effectively met, and on the other hand, data security and safety in a data communication process is improved.
Owner:CHENGDU YUYA TECH

Commodity anti-counterfeiting traceability method based on block chain technology

InactiveCN112184252APrevent Data LeakageProtect business privacy data protectionDigital data protectionTransmissionBlockchainAccess frequency
The invention discloses a commodity anti-counterfeiting traceability method based on a block chain technology. The method at least comprises the following steps of information acquisition, informationmarking, authentication ID generation, data storage, access instruction receiving and access frequency comparison. According to the method, commodity anti-counterfeiting traceability is innovativelycompleted through a block chain technology, so that a user using the method can store the content of data in situ, and hash values in one-to-one correspondence with the data, identity identification information of the user and basic attribute data of target file data are associated and stored in a trusted block chain; therefore, the original creation and attribution of the data can be proved whilethe data leakage is avoided, and meanwhile, the corresponding certificate storage certificate is generated, and therefore a way for proving and verifying the certificate is provided for other people.More importantly, decentralization is realized by using a block chain technology, so that the data is real, credible and tamper-resistant, the commercial privacy data protection is protected, and theauthority and credibility of the platform and the enterprise participation enthusiasm are guaranteed.
Owner:雲禾(浙江)科技集团有限公司

Distributed cloud security storage method and system and storage medium

The invention discloses a distributed cloud security storage method and system and a storage medium, and the method comprises the steps: segmenting a target file into a plurality of data blocks, carrying out the block encryption of the data blocks through an SM4 or AES encryption algorithm, and obtaining encrypted data blocks; randomly scrambling the encrypted data block by using a preset scrambling algorithm; uploading the scrambled encrypted data blocks to different cloud hosts for distributed storage, and establishing a storage index in a local host; and according to the storage index, downloading the encrypted data block corresponding to the target file from the cloud host, performing inverse scrambling according to the scrambling key, performing decryption according to the encryption key, and recombining the target file. Block encryption and random scrambling of the target file are supported, distributed storage of a plurality of different cloud hosts at the cloud end is transmitted, an authorized user can open a system and download encrypted data blocks corresponding to the target file from the cloud hosts, the user is supported to browse and use the file without barriers, and the data leakage in the transmission process can be effectively avoided.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products