Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

33results about How to "Prevent data theft" patented technology

All-dimensional safety positioning trade information integration method

The invention relates to an all-dimensional safety positioning trade information integration method. Various kinds of correlation information, including seller information, buyer personal identity information, trade place information and trade content information, of true trades are obtained in real time to be transmitted to a data processing platform, the data processing platform obtains certified correlation information from third-party databases such as an industry and commerce administration database and a finance and taxation administration database, the obtained trade correlation information is compared and verified, and therefore whether a trade is legal, compliant and true or not can be comprehensively judged. According to the all-dimensional safety positioning trade information integration method, correlation data of the practically-generated trading activity can serve as basic data of finance and taxation collection administration, the collection data can be real and accurate, the trading activity is normalized, and cheating conditions of falsely invoicing and falsely declaring the trading data at present can be founded as early as possible and can be rapidly and accurately screened, so that the adaptation of the method will bring a transformation of a finance and taxation collection administration method.
Owner:北京数衍科技有限公司

In-vehicle network safety communication system and method

The invention provides an in-vehicle network safety communication system and method. The in-vehicle network safety communication system comprises a TSP platform, a central gateway, a domain controllerand ECU equipment. The TSP platform is connected with the central gateway through a network, the central gateway is connected with the one or more domain controllers through a network, and the domaincontrollers are connected with the one or more ECU devices through vehicle buses. The method comprises: after first identity authentication and key negotiation are carried out between the TSP platform and the central gateway, constructing a first secure channel, and the TSP platform carrying out encrypted communication with the central gateway through the first secure channel; performing second identity authentication and key distribution between the central gateway and the domain controller, and then constructing a second secure channel, wherein the central gateway performs encrypted communication with the domain controller through the second secure channel; and after third identity authentication and key distribution are carried out between the domain controller and the ECU equipment, constructing a third secure channel, and the domain controller carrying out encrypted communication with the ECU equipment through the third secure channel.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

All-dimensional safety positioning trade information integration system

The invention relates to an all-dimensional safety positioning trade information integration system which comprises a POS system, a service transponder and a data processing platform. The POS system is used for confirming trading payment, the service transponder is used for obtaining trading content information from the corresponding POS system and transmitting the trading content information and trading seller information to the data processing platform, and the data processing platform is used for accessing an industry and commerce administration database and a finance and taxation administration database, verifying the seller information and judging whether a trade is legal and compliant or not. According to the all-dimensional safety positioning trade information integration system, correlation data of the practically-generated trading activity can serve as basic data of finance and taxation collection administration, the collection data can be real and accurate, the trading activity is normalized, and cheating conditions of falsely invoicing and falsely declaring the trading data at present can be founded as early as possible and can be rapidly and accurately screened, so that the adaptation of the system will bring a transformation of a finance and taxation collection administration method.
Owner:北京购阿购技术服务有限公司

Cloud computing-based cloud authentication method and system

InactiveCN105208012AAvoid identity lossAvoid information that is not secure and cannot be kept privateTransmissionClient-sideVirtual machine
The invention relates to a cloud computing-based cloud authentication method. The method includes the following steps that: A, a cloud computing terminal generates a unique equipment serial number; B, the identity of a user is read, and an identity authentication server connected with the cloud computing terminal verifies the identity of the user, if the user does not exist, the cloud computing terminal restores initial settings, the method returns the step A; and the cloud computing terminal is connected with and starts a cloud virtual machine cluster server through a client end connection protocol; D, whether the cloud virtual machine cluster server is started normally is judged, if the cloud virtual machine cluster server is started normally, step F is executed, if the cloud virtual machine cluster server is started abnormally, step E is operated. With the cloud computing-based cloud authentication method of the invention adopted, the problem of user information weak caused by weak protective measures of the cloud computing terminal can be effectively solved, and potential safety hazards in various aspects, such as identity confidentiality loss, data interception and information loss can be effectively avoided; a complete cloud identity and cloud data trusted protection chain can be formed; and the problem of unsafety of information and the problem of incapability of realizing confidentiality of the information under a cloud computing environment can be effectively avoided.
Owner:WUHAN YUNTONG YINGFEI TECH CO LTD

Authentication and key negotiation method and device, and storage medium

The invention discloses an authentication and key negotiation method and device and a storage medium, and the method comprises the steps: a key management device configures a seed key set for a terminal device, and periodically updates the current effective seed keys of the terminal device and an authentication device; the terminal equipment initiates identity authentication to the authentication equipment, the terminal equipment and the authentication equipment generate derived passwords based on the current effective seed key and a preset association factor respectively, and identity authentication is carried out by sending challenge codes to each other and encrypting and verifying the challenge codes of the opposite side according to the respective derived passwords. According to the technical scheme provided by the invention, a one-time derived password can be generated by adopting a non-interaction mode through association factors based on time or events, identity verification is carried out through the derived password, a seed key is transmitted through a post quantum password, and meanwhile, the seed key is periodically updated, so that the security characteristic that the key is irrelevant in the forward and backward directions is realized, and the security of the key is improved. And quantum safety is realized.
Owner:南京易科腾信息技术有限公司

Comprehensive security positioning transaction information integration method

The invention relates to an all-dimensional safety positioning trade information integration method. Various kinds of correlation information, including seller information, buyer personal identity information, trade place information and trade content information, of true trades are obtained in real time to be transmitted to a data processing platform, the data processing platform obtains certified correlation information from third-party databases such as an industry and commerce administration database and a finance and taxation administration database, the obtained trade correlation information is compared and verified, and therefore whether a trade is legal, compliant and true or not can be comprehensively judged. According to the all-dimensional safety positioning trade information integration method, correlation data of the practically-generated trading activity can serve as basic data of finance and taxation collection administration, the collection data can be real and accurate, the trading activity is normalized, and cheating conditions of falsely invoicing and falsely declaring the trading data at present can be founded as early as possible and can be rapidly and accurately screened, so that the adaptation of the method will bring a transformation of a finance and taxation collection administration method.
Owner:北京数衍科技有限公司

SDR (statistical data recorder)-based portable computer device

The invention discloses a portable computer device based on SDR, the structure of which comprises a display screen, a cover plate, a hinge seat, a cooling hole, a USB socket, a body, a protective plate, a buckle, a mouse operation panel, a cover lock, and a fingerprint recognizer , keyboard, computer main board, the cover plate is hinged to the body through the hinge seat, the display screen is a square structure and installed in the middle of the cover plate, there are two hinge seats and are located on the same plane, and there are more than two cooling holes and are uniform Equidistantly arranged at the rear end on the left side of the body as an integral structure, the beneficial effect of the present invention is that a fingerprint reader is provided through its structure, and it is necessary to pass the fingerprint recognition disk inside the outer frame of the fingerprint reader mounting plate when in use. Carry out identification, and then make authentication on the identification board. When the identification is correct, the prompt light will light up green, and if the identification fails, the red light will light up, which can improve the security of the computer and prevent the data in the computer from being stolen.
Owner:广州市妙伊莲科技有限公司

A security communication system and method for in-vehicle network

The present invention provides a safety communication system and method in a vehicle, comprising: a TSP platform, a central gateway, a domain controller and an ECU device; the TSP platform is connected to the central gateway through a network, and the central gateway is connected to one or more domain controllers through a network Connection, the domain controller and one or more ECU devices are connected through the vehicle bus; after the first identity authentication and key negotiation between the TSP platform and the central gateway, the first secure channel is established, and the TSP platform communicates with the central gateway through the first secure channel Encrypted communication; after the second identity authentication and key distribution between the central gateway and the domain controller, the second secure channel is constructed, and the central gateway conducts encrypted communication with the domain controller through the second secure channel; between the domain controller and the ECU device The third security channel is constructed after the third identity authentication and key distribution are performed, and the domain controller performs encrypted communication with the ECU device through the third security channel.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Data storage disk with anti-theft assembly

The invention discloses a data storage disk with an anti-theft assembly. The device comprises a shell, a card reader and an SD card, the card reader comprises a USB interface and an SD card slot. TheUSB interface extends out of one side of the shell; the anti-theft assembly comprises a plurality of lock sleeves and a plurality of conducting rods; the lock sleeve is rotationally connected with theshell; a spiral groove surrounding a circle is formed in each lock sleeve; a guide frame is arranged in the shell; a plurality of first guide holes are formed in the guide frame; a conducting rod isarranged in the first guide hole in a sliding manner; a guide block extending into the spiral groove is arranged on the conducting rod; one end of the conducting rod is always conductively connected with the contact part in the slot, a first contact is arranged on the SD card, a second contact is arranged at the other end of the conducting rod, axial alignment marks are arranged on the outer wallof the shell, a plurality of unlocking codes are arranged on the outer ring of the lock sleeve, and when the correct unlocking codes are aligned with the alignment marks, the first contact makes contact with the second contact for conduction. The data storage disk can effectively prevent data from being stolen.
Owner:杭州电子科技大学上虞科学与工程研究院有限公司 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products