Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

43results about How to "Prevent malicious cracking" patented technology

Mobile terminal digital certificate electronic signature method

The invention relates to a mobile terminal digital certificate electronic signature method. According to the method, based on the characteristics of public keys and private keys and on the premise of not violating the rules prescribed by the electronic signature law, for example, a private key should be generated in a user terminal and should not leave the user terminal, a private key should not be transmitted via the network, and the like, a private key is discarded and locally and discretely stored after encryption, and the cloud uses strategies such as storing the public key and certificate to ensure that the private key is not locally cracked. In the transport layer, strategies such as double key and one-time pad are adopted to ensure that important information is not intercepted and decoded in network transmission. The identity of a certificate applicant is verified through the interface of an issuing bank, the user identity verification result of the bank counter is inherited, and therefore, remote online certificate issuing is realized in the system. The method not only can ensure that all the links of certificate applying, certificate issuing, certificate storing and certificate using are safe, but also can prevent hackers and Trojans from stealing certificate files, prevent network package-capture parsing, prevent password intercepting through screen capture and prevent an algorithm from being known through software decompiling.
Owner:BANKEYS TECH

Picture identifying code generation method and system, and verify method and client side, and server

A picture identifying code generation method comprises the following steps: obtaining a background picture; obtaining foreground characters; embedding the foreground characters in the background picture so as to obtain a picture identifying code; generating interference element used for cutting the foreground characters and integrating with background picture color. The method uses the interference element integrating with the background picture color in the picture identifying code to cut the foreground characters, so an automatic machine can only extract foreground character fragments in the picture identifying code without extracting the whole foreground characters, thus increasing automatic machine difficulty of declassifying picture identifying code; the foreground characters are cut, yet a whole layout formed by the foreground character fragments allow the image identifying code to be easily recognized by a user, so the difficulty of the user identifying the picture identifying code is not increased; in addition, the invention also provides a picture identifying code generation system, a verify method based on the picture identifying code, a client side, and a server.
Owner:TENCENT TECH (SHENZHEN) CO LTD

OBDII code reading card device and system and method for upgrading same

The invention provides an OBDII code reading card device and a system and method for upgrading the OBDII code reading card device. The device comprises a master control MCU, a data storage module, a display key module, a diagnosis interface module and a power management module, wherein the data storage module, the display key module, the diagnosis interface module and the power management module are connected with the master control MCU respectively. The master control MCU comprises an application function module and an upgrade module, wherein the upgrade module comprises an upgrade interface module and is used for providing interfaces for upgrading codes and data for the outside and providing interfaces for upgrading the data and the codes for the inside, and the application function module is used for achieving the diagnosis application function of an OBDII code reading card. By carrying out safety verification on a file to be upgraded, unlimited times of upgrade of the OBDII code reading card is achieved, timely upgrade of the product is guaranteed, the problem of abnormal upgrade caused by equipment exception, misoperation of a user and the like is also prevented, malicious cracking and interference of a third party on the upgrade process can be effectively prevented, and therefore the safety and security of the product are guaranteed.
Owner:LAUNCH TECH CO LTD

Method and device for encryption/decryption of executable program data package

The invention provides a method and device for encryption/decryption of an executable program data package. The method comprises the steps that the executable program data package is acquired; based on preset rules, the executable program data package is divided into multiple original documents; a first secret key is used to encrypt the multiple original documents respectively, so that encryption documents which have one-to-one correspondence relations with each original document respectively can be obtained; the multiple encrypted encryption documents are received; a second secret key corresponding to the first secret key is used to decrypt the multiple encryption documents respectively, so that the multiple original documents which have the one-to-one correspondence relations with the encryption documents can be obtained; and index information of the original documents are used respectively to reform the multiple original documents, so that the executable program data package can be obtained. The method and the device provided by the invention have the advantages that vicious decryption of the executable program data package caused by theft of a single secret key in the executable program data package can be prevented; a probability of the vicious decryption of an application program can be reduced; and data safety of the application program can be enhanced.
Owner:SHENZHEN UNIV

Cell phone password protection method based on Android system

Provided is a cell phone password protection method based on an Android system. A cell phone disk comprises a guiding partition of a guiding loading program for loading an operation system, a system kernel partition containing an operation system kernel, a system partition and a user data partition. The method includes the steps that a password partition is built in the cell phone disk, and the password partition is an exposed partition independent from and different from the system partition and the user data partition; preset passwords are encrypted and written into a password partition through a method of writing a disk sector directly; when the cell phone operation system is started, the guiding loading program reads the cell phone passwords through a method of reading the disc sector directly, and the cell phone passwords are transmitted to the operation system kernel; and the operation system kernel matches passwords input by users with the preset cell phone passwords. The cell phone password protection method effectively achieves a purpose of preventing cracking of power-on passwords maliciously, cuts off a path for eliminating the power-on passwords maliciously, and improves information protection safety of a cell phone.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Software and hardware combination embedded terminal encryption system and encryption method

The invention discloses a software and hardware combination embedded terminal encryption system and an encryption method. The software and hardware combination embedded terminal encryption system comprises an embedded terminal communicating with a server or a mobile terminal, wherein the embedded terminal comprises an MCU; the MCU is connected with a FLASH storage unit and an encryption chip respectively and is used for transmitting data and command information; the FLASH storage unit is controlled by the MCU; the encryption chip is used for encryption operation and can select an encryption mode according to a control instruction of the MCU; when working, the embedded terminal firstly passes through hardware startup encryption verification, then passes through wireless communication encryption verification and finally operates normally; by the combination of hardware startup encryption and wireless communication encryption, encryption of the embedded terminal is realized; due to dual encryption and dual insurance, security and reliability of operation of the embedded terminal are guaranteed; meanwhile, competitors maliciously crack hardware equipment and embedded programs thereof are also effectively prevented; and non-disclosure of a technology is effectively guaranteed.
Owner:康威通信技术股份有限公司

Software anti-crack method and system

The invention discloses a software anti-crack method and system. The method comprises the steps that terminal equipment acquires an application private key from an application management server when the terminal equipment needs to install a main application file of an application, and if acquiring fails, installation is stopped; when the terminal equipment receives a function execution command to the application for the first time, the terminal equipment applies to the application management server for the application function load authorization, after the authorization is acquired, a class SEC file of the application is loaded, the SEC file is encrypted by means of the application private key, the acquired encrypted file F[SEC] is saved, and the application private key and a plaintext of the SEC file are deleted; when the terminal equipment receives the function execution command to the application not for the first time, the terminal equipment applies to the application management server for a decryption key corresponding to the application private key, the applied decryption key is utilized for decrypting the encrypted file F[SEC], the plaintext of the SEC file is acquired and loaded, and after loading is finished, the decryption key and the plaintext of the SEC file are deleted. By means of the software anti-crack method and system, the software can be effectively prevented from being cracked maliciously.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Method and system for realizing password retrieval based on multiple safety verification ways

The invention discloses a method and system for realizing password retrieval based on multiple safety verification ways, and belongs to the field of the user password verification and password retrieval. A to-be-solved technical problem is how to guarantee the account and data safety better, and an adopted technical scheme is as follows: (1) a method for realizing password retrieval based on multiple safety verification ways mainly comprises the following steps: S1, generating a verification code, and verifying login by a user according to the verification code; S2, encrypting the password through a md5 encryption algorithm, and adding the verification code at the end, encrypting by reusing the md5 encryption algorithm, and transmitting to a background database in a ciphertext way in the network transmission process; and S3, retrieving the password according to a mailbox; (2) a system for realizing password retrieval based on multiple safety verification ways comprises a verification code generation module, a md5 encyrption algorithm module and a password retrieval module, wherein the verification code production module is used for producing the verification code so that the user can verify the login according to the verification code.
Owner:SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD

An electric vehicle fingerprint identification intelligent anti-theft system

The invention discloses an electric vehicle fingerprint identification intelligent anti-theft system. The system uses the feature point information, the vector field information and the fingerprint texture information of the fingerprint image to carry out multi-feature point fusion matching, which greatly reduces the false recognition caused by the false features in the fingerprint identificationmatching process, and enhances the safety of the electric vehicle fingerprint identification. Anti-cracking security mechanism is added to that identification matching process, when the number of times of continuous identification of the matching failure exceed a set value, the fingerprint identification is refused again, and the malicious cracking is effectively prevented; Fingerprint identification module with identification feedback function can give users more intuitive fingerprint identification feedback; The fingerprint management is carried out by using the virtual menu composed of thelogic operation of the traditional remote controller keys or the physical switch on the whole vehicle and the phonetic system, without adding additional visual equipment and input keys, which is simple, easy to use and low in cost. Virtual menu access must be authorized by the first administrator to access, effectively prevent the illegal management of fingerprints.
Owner:YADEA TECH GRP CO LTD

Electromechanical equipment original factory accessory verification method based on cloud computing

PendingCN110490338ASolve the problem of easily being replaced maliciouslyTroubleshooting the presence of good and bad accessoriesKey distribution for secure communicationUser identity/authority verificationThird partySafe operation
The invention discloses an electromechanical equipment original factory accessory verification method based on cloud computing, and the method comprises the following steps: adding an accessory verification algorithm and an accessory-related flag bit to a controller used in electromechanical equipment when the controller leaves a factory, and the controller being connected with an HMI in a wired manner; establishing a plurality of sign accessories effective days in the controller, and storing the sign accessories effective days in the controller; when the accessories are replaced, using a mobile phone APP for scanning bar codes on the accessories and then uploading the bar codes to a server through a network, and the controller monitoring the state of each accessory at set intervals; the server performing database verification according to the SN code uploaded by the APP; and the controller analyzing the input serial number in a normal working state. According to the method, maliciousreplacement of inferior third-party accessories, accessory applicability, accessory quality and safe operation of electromechanical equipment can be guaranteed, and the problems that accessories are unqualified, the quality cannot be guaranteed and potential safety hazards exist when third-party accessories of existing electromechanical equipment are maliciously replaced are solved.
Owner:广东蘑菇物联科技有限公司

Method, equipment and system for preventing refreshing popularity, and storage medium

ActiveCN108282665APopularity is fairPopularity is reliableSelective content distributionInformation processingPersonal computer
The invention discloses a method, equipment and system for preventing refreshing popularity, and a storage medium, and relates to the technical field of information processing. The method comprises the following steps: using an NEON instruction to set a basic operation and constructing a client popularity verification algorithm in a client; using a CPU instruction code to set the basic operation and constructing a server popularity verification algorithm corresponding to each client in a live broadcast platform server; when the client watches the live broadcast, using the client popularity verification algorithm to calculate popularity verification data and reporting the popularity verification data; and using the server popularity verification algorithm corresponding to the client to calculate the popularity verification data by the live broadcast platform server, comparing the popularity verification data with data reported by the client, and if the comparison is passed, then counting the popularity of the client in the popularity of a watched live broadcast room. The method for preventing refreshing the popularity provided by the invention can effectively prevent a hacker from cracking the popularity verification algorithm through a PC (Personal Computer) client or a PC server, thereby effectively preventing the hacker from maliciously refreshing up the popularity of the live broadcast room.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Authorization encryption method of upper computer program of BMS (Battery Management System)

The invention discloses an authorization encryption method of an upper computer program of a BMS (Battery Management System). The authorization encryption method comprises the following steps that: a user PC (Personal Computer) is installed with the upper computer program and obtains authorization through an authorization code; the upper computer program reads hardware information of the PC, generates a hardware identification code, puts the hardware identification code in the authorization code and stores a new authorization code in the upper computer program; the PC is connected to the BMS for the first time, the BMS interactively contrasts the authorization code information through the upper computer program and confirms if the PC is legally authorized; and when the BMS is needed to be connected to be written and read, the PC is connected to the BMS to start up the upper computer program, and the BMS checks if the upper computer program is legally authorized. The authorization encryption method of the upper computer program of the BMS can protect the upper computer program technology and use right thereof efficiently, prevent an authorization code file from being decrypted maliciously and reduce a risk of software imitation.
Owner:HUIZHOU EPOWER ELECTRONICS

GPS navigation method and system

The invention relates to a GPS navigation method and a system and comprises that a navigator sends a navigation requirement to a calling center, wherein, the navigation requirement comprises the information about the present position of the navigator, the information about the position of the destination and the ID information of the navigator; the calling center formulates a routes plan based onthe navigation requirement and a dynamic traffic information; the calling center delivers the routes plan and an authorization information for activating a map file in the navigator to the navigator;the navigator receives the routes plan and the authorization information and activates the map file to display the planed routes; in the running process of the vehicle, the calling center formulates a novel routes plan according to the latest position information and the dynamic traffic information sent out by the navigator and delivers the novel routes plan to the navigator. In addition, the navigator sends out the edition information of the map file corresponding to the road sections around the present position stored in the navigator while sending out the present position information; the calling center compares the received edition information with the edition of the map used by the calling center and then determines the data increment of the map and delivers the data increment to thenavigator.
Owner:SHENZHEN SEG SCI NAVIGATIONS CO LTD

Internet of Things intelligent meter safety system and implementation method

The invention discloses an Internet of Things intelligent meter safety system and an implementation method. The problems that existing meter hardware and software have security holes, communication encryption and decryption security is not high, and the efficiency ratio is low are solved. The system comprises a meter end and a cloud end which are in communication connection, the meter end comprises an MCU controller, the MCU controller comprises a safe world part and a non-safe world part, a trusted execution environment is deployed in the safe world part, and a non-safe environment is deployed in the non-safe world part. A security kernel module, a startup loading module, an OTA upgrading module, a security service module, a security driving module and a security API interface module arearranged in the trusted execution environment, and a user application CA module and a non-security kernel module are arranged in the non-security environment. Information between the meter end and thecloud end is communicated in an asymmetric and symmetric encryption and decryption combined mode. Safety protection is carried out on meter hardware, software and communication, so that the hardwareis prevented from being controlled, the software is prevented from being cracked, and information is prevented from being stolen.
Owner:杭州绿鲸科技有限公司

Chip mutual identification method and device, storage medium and mobile terminal

Embodiments of the invention disclose a chip mutual identification method and device, a storage medium and a mobile terminal. The method is applied to the mobile terminal comprising a processor and amemory, and comprises the steps: obtaining the serial number of the memory when detecting that the mobile terminal is started for the first time; generating a first mutual identification code and a second mutual identification code according to the serial number; writing the first mutual identification code into a processor, and writing the second mutual identification code into a memory; if it isdetected that the mobile terminal is not started for the first time, obtaining a first mutual identification code and a second mutual identification code; inversely solving a first serial number according to the first mutual identification code, and inversely solving a second serial number according to the second mutual identification code; if the first serial number is the same as the second serial number, allowing the mobile terminal to be started; and if the first serial number is different from the second serial number, forbidding starting the mobile terminal. Therefore, other people canbe prevented from maliciously cracking the program, and the program security of the mobile terminal is improved.
Owner:HUIZHOU TCL MOBILE COMM CO LTD

Anti-cracking method and system for software

The invention discloses a software anti-crack method and system. The method comprises the steps that terminal equipment acquires an application private key from an application management server when the terminal equipment needs to install a main application file of an application, and if acquiring fails, installation is stopped; when the terminal equipment receives a function execution command to the application for the first time, the terminal equipment applies to the application management server for the application function load authorization, after the authorization is acquired, a class SEC file of the application is loaded, the SEC file is encrypted by means of the application private key, the acquired encrypted file F[SEC] is saved, and the application private key and a plaintext of the SEC file are deleted; when the terminal equipment receives the function execution command to the application not for the first time, the terminal equipment applies to the application management server for a decryption key corresponding to the application private key, the applied decryption key is utilized for decrypting the encrypted file F[SEC], the plaintext of the SEC file is acquired and loaded, and after loading is finished, the decryption key and the plaintext of the SEC file are deleted. By means of the software anti-crack method and system, the software can be effectively prevented from being cracked maliciously.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Executable program data packet encryption/decryption method and device

The invention provides a method and device for encryption / decryption of an executable program data package. The method comprises the steps that the executable program data package is acquired; based on preset rules, the executable program data package is divided into multiple original documents; a first secret key is used to encrypt the multiple original documents respectively, so that encryption documents which have one-to-one correspondence relations with each original document respectively can be obtained; the multiple encrypted encryption documents are received; a second secret key corresponding to the first secret key is used to decrypt the multiple encryption documents respectively, so that the multiple original documents which have the one-to-one correspondence relations with the encryption documents can be obtained; and index information of the original documents are used respectively to reform the multiple original documents, so that the executable program data package can be obtained. The method and the device provided by the invention have the advantages that vicious decryption of the executable program data package caused by theft of a single secret key in the executable program data package can be prevented; a probability of the vicious decryption of an application program can be reduced; and data safety of the application program can be enhanced.
Owner:SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products