Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

747results about How to "Prevent forgery" patented technology

Asset management method based on intelligent block chain contracts and nodes

InactiveCN105976231ATransaction logic is open and transparentPrevent forgeryBuying/selling/leasing transactionsDistributed computingSmart contract
The invention discloses an asset management method based on intelligent block chain contracts. The method is applied to a block chain, and all the nodes of the block chain are stored with the same intelligent contracts. The method comprises steps that an asset transaction request is generated by a first node, the asset transaction request is broadcasted in the block chain, and the asset transaction request at least comprises a transaction request for actuating a first intelligent contract; after the asset transaction request is received by an accounting node, transaction is confirmed through a common recognition mechanism, the first block data is generated, the first block data is broadcasted in the block chain to enable all the nodes of the block chain to receive the first block data, and the first block data at least comprises a transaction request for actuating the first intelligent contract; for each node, a transmission process is accomplished according to the transmission request contained by the received first block data for actuating the first intelligent contract, and problems of opaque transaction logics, data difference, low efficiency and high cost caused by asset transaction on the basis of the centralized nodes can be effectively solved.
Owner:WEBANK (CHINA)

Quality safety tracing method for food processing enterprises

InactiveCN103761546ANo repeated codes appearMeet randomnessCo-operative working arrangementsDebit schemesProduction lineRelational database
The invention discloses a quality safety tracing method for food processing enterprises. The quality safety tracing method includes the steps that a laser coder generates random tracing codes according to a coding rule when a laser marking machine in a production line device is dynamically read in an on-line tagging mode; the laser marking machine carries out tracing mode marking on products on a production line, and two-dimension codes and plain codes are all marked on packages; a fixed reader is used for scanning and reading designated tagged code portions of the products; the two-dimension codes are successfully scanned and read, the tracing codes are recorded, and relevance between the tracing codes and commodity attribute information is completed; if the two-dimension codes fail to be scanned, the two-dimension codes will be removed through a removing device; the commodity tracing code information and the commodity attribute information are recorded into a relational database; after the products are packaged, package code data and product tracing code data are related; the products are stacked, stacking codes and tagged stacking codes are generated, and the stacking codes and the product package code data are related; the stacking codes are scanned, storage of the products is completed, delivery orders and the stacking codes are scanned to complete delivery, and the database records delivery information.
Owner:武汉华工赛百数据系统有限公司

Authentication in a telecommunications network

The invention relates to an authentication method intended for a telecommunications network, especially for an IP network. From a terminal (TE1) in the network a first message (RR) containing an authenticator and a data unit is transmitted to the network, the data unit containing information relating to the manner in which the authenticator is formed. For carrying out authentication in the network, the data unit contained in the first message is used for determining a check value, which is compared with the said authenticator. To make it unnecessary for the terminal to perform any complicated and heavy exchange of messages when attaching to the network and for still obtaining the desired security characteristics for use, such an identification unit is used in the terminal which receives as input a challenge from which a response and a key can be determined essentially in the same manner as in the subscriber identity module of a known mobile communications system, a set of authentication blocks is generated into the network, of which each contains a challenge, a response, and a key, whereby the generation is performed in the same manner as in the said mobile communication system, at least some of the challenges contained by the authentication blocks are transmitted to the terminal, one of the challenges is chosen for use at the terminal, and, based on it, a response and key for use are determined with the aid of the terminal's identification unit, in the said first message (RR) the network is notified with the aid of the said data unit of which key corresponding to which challenge was chosen, and the authenticator of the first message and the said check value are determined with the aid of the chosen key.
Owner:CORE WIRELESS LICENSING R L

Product circulation tracking method and system based on block chain

The invention provides a product circulation tracking method based on a block chain. The method comprises the steps that data information generated in product circulation operation links is collected,graded, encrypted and packaged to generate blocks; whether the information of the blocks is true is verified through authenticated manager node workload proof; the blocks passing verification are stored into the block chain, and meanwhile keys are stored in product packages; and the data information of the products on the block chain in different circulation links is found and decrypted through corresponding key information in the product packages, so that the purpose of tracking and tracing all the circulation links is achieved. The invention furthermore provides a corresponding system. According to the product circulation tracking method and system based on the block chain in the embodiment, the whole production and circulation process of the products can be monitored, and source tracing can be performed no matter which link has a problem; moreover, the network system divides product information into three different levels, supervision is realized hierarchically, and information security is guaranteed; and meanwhile, a strict verification process is available for information input, multiple management nodes cooperate mutually, a single management node cannot impose a great influence on the whole system, and therefore the distributed network tracking system has high practicability in terms of product monitoring and is suitable for large-range popularization.
Owner:SHANGHAI DINGMING CONTAINER STORAGE & TRANSPORTATION CO LTD

Biometric Authentication Apparatus

A biometric authentication apparatus having a simple configuration, able to easily focus on a fingerprint or a vein or other blood vessel pattern and able to clearly capture an image of the same, able to prevent forgery, and in addition able to realize high precision authentication, which biometric authentication apparatus 100 having a transparent plate 110 formed by for example glass or plastic for placement of the finger of the authenticated person, that is, the inspected specimen OBJ, downward in the figure (surface where fingerprint is located facing downward), a fingerprint capturing use illumination apparatus 120, a vein capturing use illumination apparatus 130, and an image capturing apparatus 140, which image capturing apparatus 140 has an imaging lens apparatus capturing a dispersed image of an object passing through the optical system and phase plate, an image processing apparatus generating a dispersion-free image signal from a dispersed image signal from the imaging element, and an object approximate distance information detection apparatus generating information corresponding to the distance to the object, and which the image processing apparatus generating a dispersion-free image signal from the dispersed image signal based on the information generated by the object approximate distance information detection apparatus.
Owner:KYOCERA CORP +1

Webpage data automatic evidence obtaining and storing method based on block chain

The invention discloses a webpage data automatic evidence obtaining and storing method based on a block chain. A user sends a uniform resource locator of a webpage which needs evidence obtaining to all evidence obtaining nodes in a block chain network, and the evidence obtaining nodes carry out automatic evidence taking on the webpage; the evidence obtaining nodes generate a preservation certificate and a data compression package for the evidence obtaining data, and the data compression package is signed and then stored in a server, the hash value of the data compression packet is calculated,a timestamp is added, and the data compression packet is broadcast to a block chain network after being signed; the evidence obtaining nodes verify the timestamp of the hash value, and if the condition is met and the signature is not signed, the signature is signed and broadcast to the block chain network; a rule node receives the data signed by all the evidence obtaining nodes, and the signatureis verified, after verification is passed, the data are formed into blocks and broadcast to the block chain network; and the evidence obtaining nodes anchor the blocks to a public block chain. The method can be used for carrying out automatic evidence obtaining and evidence storage on webpage data, and the authenticity of the evidence taking data and the safety of the evidence storage data are ensured.
Owner:浙江数秦科技有限公司

Method and apparatus for authentication of client server communication

The present invention provides a method and apparatus for message packet authentication to prevent the forging of message packets. After a message packet is created, a secret session key is preappended to the message, and a message digesting algorithm is executed on the altered message to create a message digest. A portion of the message digest, referred to as the signature, is then appended to the actual message when it is sent over the wire. The receiving station strips the signature from the message, preappends the same secret session key and creates its own message digest. The signature of the digest created by the receiving station is compared to the signature of the digest appended by the sending station. If there is a match, an authentic message is assumed. If there is no match, the message is considered as invalid and discarded. An advantage of the present invention is that the session key is never transmitted over the wire. The receiving station (server) already has the key and uses the key along with the message data to recalculate the message digest upon receiving the packet. The shared secret key (session key) is generated during initiation of the NCP session. In addition, cumulative state information is maintained by both the sending station and the receiving station. This state information is also used to authenticate messages.
Owner:EMC CORP

Authentication and authorization method and system applied to client platform

The invention discloses an authentication and authorization method and an authentication and authorization system applied to a client platform. The method and the system are modified on the basis of a protocol in a way that the client platform provides a Javascript (JS) interface for an access application party for user login, authorization and authentication. The method comprises the following steps of: starting at least one application program of the client platform; calling the JS interface of the client platform to acquire the basic information at least comprising the username of a current login user by using the application program; if information indicating that the user does not log in is returned and the user is required by the application program to log in, calling a login JS interface by using the application program; calling back and returning the basic information of the signature of the user to the application program through the JS interface; and if the application program determines that only the information of the username and the signature are required, allowing the user to access the application program. Therefore, a plurality of users can share a plurality of pieces of application, the authorization page counterfeiting of the application is avoided, user experiences are improved, the advanced background entry of a calling-back address is avoided, and the basic information can be acquired without the official authorization of the user after the addition of the application.
Owner:BEIJING QIHOO TECH CO LTD +1

Tax-control safety two-dimensional code encoding and decoding processing method

The invention discloses a tax-control safety two-dimensional code encoding and decoding processing method. By means of the method, a tax-control safety two-dimensional code generated through the method has a plurality of levels of tax-control safety protection, anti-counterfeiting and safety performance of the tax-control safety two-dimensional code is improved, electronic signature information carried by the code can serve as a tool carrying out off-line authenticity identification on the condition of separation from the internet, the problem that when electronic bill information is transmitted through the two-dimensional code in the prior art, the authenticity identification is limited by network conditions and time is solved, and tax-control safety of the tax-control safety two-dimensional code is effectively enhanced. The tax-control safety two-dimensional code decoding processing method not only can prevent illegal leakage of useful information in the tax-control safety two-dimensional code, but also can immediately identify authenticity of the electronic bill information contained in the tax-control safety two-dimensional code off-line on the condition that the internet is not relied on, and therefore the tax-control safety of the tax-control safety two-dimensional code during the decoding process is further improved.
Owner:CHONGQING FARSIGHT PRINTING +1

Cloud storage data common auditing method possessing secret key leakage resistance characteristic

The invention belongs to the communication technology field and especially relates to a cloud storage data common auditing method possessing a secret key leakage resistance characteristic. The method mainly comprises the following steps of system initialization: blocking processing is performed on a data file so as to generate public and private key pairs of a cloud user and a cloud server; auditing identification generation: the cloud user sends the data file and a label, and a signature set of a data block to the cloud server; auditing challenge response: a third party auditor generates auditing challenge information and sends to the cloud server; the cloud server calculates combination information according to the auditing challenge information, gets signatures together and sends an auditing identification response information to the third party auditor; and the third party auditor verifies validity of the auditing identification response information. The method has advantages that a condition that digital signature forgery and auditing identification response information forgery caused by leakage of a user signature private key can be prevented; and a malicious cloud server is ensured not to generate the forged auditing identification response information to cheat a TPA and to pass through an auditing verification process.
Owner:SOUTHWEST PETROLEUM UNIV

System and method for multi-system authentication and synchronization in mobile equipment

The invention discloses a system and method for multi-system authentication and synchronization in mobile equipment. The system is composed of a unified authentication assembly SDK and a unified authentication platform, wherein the unified authentication assembly SDK comprises an equipment fingerprint module, a sandbox module, a certificate module, a secret key management module, an algorithm module and an authentication logic module; and the unified authentication platform comprises a user management module, an authority management module, an SSO module, an equipment management module, a mail service module, a log module, an interface management module, a push module, a text message/voice module, a face module, a voiceprint module and a fingerprint module. The system and method can be applied to service scenes where existing enterprise services migrate to mobile ends, provide authentication and state synchronization on the mobile ends for enterprise users, through an innovative equipment fingerprint generation algorithm, a matching algorithm and a system activation process, the users can bind their mobile phones with enterprise accounts, and thus the enterprise accounts can realize login and state synchronization on the mobile equipment.
Owner:BEIJING TRUSFORT TECH CO LTD

Identity authentication method and apparatus

The invention provides an identity authentication method and apparatus. The method comprises the steps of obtaining an audio/video stream which is collected and is generated by a to-be-authenticated target object, judging whether a lip language and a voice in the audio/video stream meet consistency, and if the lip language and the voice meet the consistency, taking a voice content which is obtained by performing voice recognition on an audio stream in the audio/video stream as an object identifier of the target object; if the object identifier is included in pre-stored object registration information, obtaining a template physiological characteristic corresponding to the object identifier in the object registration information; performing physiological recognition on the audio/video stream to obtain a physiological characteristic of the target object; and comparing the physiological characteristic of the target object with the template physiological characteristic to obtain a comparison result, and if the comparison result meets an authentication condition, confirming that the target object passes through authentication. According to the identity authentication method and apparatus provided by the invention, the efficiency and the reliability of the identity authentication are improved.
Owner:ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products