Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

90results about How to "Prevent illegal theft" patented technology

Privacy protection method based on block chain technology

The invention discloses a privacy protection method based on a block chain technology. The privacy protection method based on a block chain technology is characterized in that a block chain is formed by means of head-tail-connection of a large amount of blocks with similar organization structure; and each independent block can encapsulate privacy data with a time stamp, and can complete distributed networking propagation and a consensus algorithm task of distributed nodes at the same time, thus realizing efficient normal form organization management of the privacy data. Besides, the privacy protection method based on a block chain technology coordinatively uses an asymmetric encryption algorithm-Elgamal in the block chain, wherein a public key password and a private key password are respectively corresponding to encryption and decryption process of data; and the theoretical quantity of the private keys is very great, so that the possibility that the privacy data is stolen by traversing the whole private key space does not exist and then the safety of the privacy data can be guaranteed in cryptography. The complete organization and operating mechanism of the block chain enables the privacy protection method based on a block chain technology to have wide application prospect in the privacy protection field.
Owner:HANGZHOU YUNXIANG NETWORK TECH

Power-line communication interference devices

The invention relates to power-line communication interference devices and particularly relates to a plurality of devices which perform communication interference on facilities which use power lines for communication and belongs to the technical field of power-line communication, communication interference and interference resistance and information security. A device specifically includes a power-line interface, a DC power supply, a power-line coupling filter, a power amplifier and an interference signal generator. The invention also provides a power-line communication interference device with a power-line communication signal detection and analysis function, a processing and forwarding power-line communication interference device and a power-line communication signal short circuit / bypassing power-line communication interference device. The power-line communication interference devices are connected with power lines conveniently through forms of power-line insert ports, insert grooves and sockets and the like so that interference signals which interfere power-line communication are generated; an excellent interference effect is achieved through an extra-low interference power and electricity consumption quantity is low so that the power-line communication interference devices are especially suitable for being used in low-power-consumption inference application; and the interference mechanisms are simple in structure, low in realization cost and high in self-adaptive capability.
Owner:李祥明 +2

Lightweight mirror image file encryption system and method

The invention discloses a lightweight mirror image file encryption system and a lightweight mirror image file encryption method and belongs to the technical field of cloud computing of computers. A mirror image file in a cloud computing system is encrypted, stored and managed. The encryption system comprises a key management module, a mirror image file block management module, an encryption / decryption module, a pseudo partitioning management module, a database and a background storage system. The encryption method comprises a key acquisition stage, a mirror image file partitioning stage, a mirror image file storage stage, a mirror image file reading stage and a pseudo partitioning maintenance stage. The mirror image file block management module is used for equally segmenting all mirror image files and then protecting the mirror image files through an encryption block mapping table. The safety of the mirror image files is ensured, and the encryption / decryption time cost is lower. Meanwhile, by creating and managing pseudo blocks in an idle storage space, the possibility of brute force is further reduced, and the safety is improved. The lightweight mirror image file encryption system and the lightweight mirror image file encryption method are applicable to any cloud computing system relating to mirror image file management.
Owner:THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP

Networked vehicle remote upgrading system and method with anti-attack bidirectional authentication

The invention belongs to the technical field of systematic safety of Internet of Vehicles, and discloses a networked vehicle remote upgrading system and method with anti-attack bidirectional authentication, a CA certificate system is used for performing identity authentication on a vehicle through a digital certificate in an Internet of Vehicles network, and supporting bidirectional authenticationbetween a TSP and a networked vehicle. A TSP system is used for supporting remote upgrading of vehicles. A T-BOX system is used for detecting the IP of the TSP during upgrading; wherein the IP is notthe IP of the TSP, and the data packet of the IP is discarded; and in a non-upgrading state, external communication is compared according to rules in the security rule base of the firewall, and rulesof the rule base are updated through TSP real-time operation. According to the invention, the reliability authentication of the bidirectional identity between the networked vehicle T-BOX and the vehicle remote service provider TSP is realized, and the identity counterfeiting is prevented; reliability of data transmission between the T-BOX and the TSP is achieved, and illegal stealing and tampering of automobile upgrading software in the transmission process are prevented.
Owner:CHENGDU UNIV OF INFORMATION TECH

Secure communication method and system based on secure communication module

The invention provides a secure communication method and system based on a secure communication module, and the method comprises the steps that a secure mobile terminal obtains a session key after carrying out the key negotiation with a security gateway of a cloud platform through the secure communication module, and carries out the encryption transmission of a strategy file; the security communication module performs firewall policy configuration according to the policy file; when the internet application is accessed, the terminal application sends data for accessing the internet to the safety communication module for strategy matching; if the first strategy is successfully matched, the security communication module sends the data of accessing the Internet to the Internet application fornetworking processing; when the cloud platform service is accessed, the security communication module performs gateway IP and monitoring port configuration according to the strategy file, and sends the service data accessing the cloud platform to the security communication module to perform policy matching and the like with a second policy file. And thus, the secure mobile terminal is ensured to securely access the Internet application or the cloud platform through the secure communication module.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Power Line Communication Jamming Device

The invention relates to power-line communication interference devices and particularly relates to a plurality of devices which perform communication interference on facilities which use power lines for communication and belongs to the technical field of power-line communication, communication interference and interference resistance and information security. A device specifically includes a power-line interface, a DC power supply, a power-line coupling filter, a power amplifier and an interference signal generator. The invention also provides a power-line communication interference device with a power-line communication signal detection and analysis function, a processing and forwarding power-line communication interference device and a power-line communication signal short circuit / bypassing power-line communication interference device. The power-line communication interference devices are connected with power lines conveniently through forms of power-line insert ports, insert grooves and sockets and the like so that interference signals which interfere power-line communication are generated; an excellent interference effect is achieved through an extra-low interference power and electricity consumption quantity is low so that the power-line communication interference devices are especially suitable for being used in low-power-consumption inference application; and the interference mechanisms are simple in structure, low in realization cost and high in self-adaptive capability.
Owner:李祥明 +2

Tunnel direct link setup (TDLS) safety protection method based on Wireless LAN Authentication and Privacy Infrastructure (WAPI)

The invention provides a method for ensuring safe communication of tunnel direct link setup (TDLS) by using wireless LAN Authentication and Privacy Infrastructure (WAPI). Safe links supplied by WAPI are respectively built between stations (STA) and access points (AP); the safe authentication of each STA is ensured; when a TDLS link needs to be built between two STAs, the STA that establishes the TDLS firstly transmits a TDLS request; the TDLS request comprises the information of the STA and WAPI information elements; after receiving the TDLS request, the STA at the other side generates and saves a key according to a key kit in a negotiation, wherein the key generates two sub-keys, one is used for ensuring the safe communication of a TDLS setting frame, and the other one is used for ensuring the safe communication of the TDLS link; the STA transmits a TDLS response which contains the information of the STA; after receiving the TDLS response, the TDLS initial STA generates a key and transmits a TDLS confirmation, wherein the key also generates two sub-keys, and is same as the key generated by the response of TDLS to STA. Finally the two STA generate the same key to ensure the safety of the data on the TDLS link.
Owner:CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products