Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

296results about How to "Prevent malicious tampering" patented technology

Medical data security sharing method based on block chain and federated learning

The invention discloses a medical data security sharing method based on a block chain and federated learning. The data applicant can use the data after being authorized on the chain of the data provider; the data fingerprint carries out hash abstract chaining on authorized data, the problem that the authorized data is maliciously tampered to cause data inconsistency is prevented, the use right ofthe original data is shared in the whole process, a data user cannot directly obtain the data, and the value of the data can be mined only through federated learning. In each round of iterative computation of federated learning, asset chaining is carried out on model parameters and aggregation results, and credible traceability of federated learning computation can be achieved. Each step of operation in the data sharing process is subjected to related auditing by a supervisor, such as identity auditing, data checking, transaction detail auditing and the like. According to the invention, aggregation calculation is carried out without the help of a central server, decentralized federated learning is realized, aggregation calculation is realized through an intelligent contract, and maliciousaggregation calculation results received by each node due to malicious control of the central server are avoided.
Owner:福州数据技术研究院有限公司

Printing security monitoring and auditing system based on virtual printing technique

The invention belongs to the field of information security techniques and provides a printing security monitoring and auditing system based on a virtual printing technique aiming at solving the problems that the printing behavior and the printing content are hard to monitor, unauthorized printing and skip-level printing cannot be prevented and the like in the existing printing management method. The printing security monitoring and auditing system comprises a server, at least one ordinary client, at least one approval client, a printing controller and a printing machine, wherein the clients are divided into the ordinary clients and the approval clients; and all ordinary clients and all approval clients are connected with the server, the printing controller is connected with the server and the printing machine is connected with the printing controller. By adopting the windows virtual printing technique, the optical character recognition (OCR) technique, the equipment intelligent control technique and the like, the printing security monitoring and auditing system realizes the monitoring and management of documents at a full life cycle which comprises printing application, approval, output, recovery, destruction and the like, and can form complete printing logs for review.
Owner:北京京航计算通讯研究所

Safety certification system and method for information interaction between vehicle-mounted T-Box and user cellphone

The invention discloses a safety certification system for information interaction between a vehicle-mounted T-Box and a user cellphone, and the system comprises a vehicle, the vehicle-mounted T-Box, a T-Box cloud server, and a mobile terminal. The invention also discloses a safety certification method for information interaction between the vehicle-mounted T-Box and the user cellphone, and the method comprises the following steps: 1, inputting the fingerprint of a user through the mobile terminal, enabling the mobile terminal to generate encryption data through the instruction data and fingerprint data and a downloaded APP, carrying out the random ordering of the encryption data, packaging the encryption data, and transmitting the packaged encryption data to a T-Box server; 2, enabling the T-Box server to search the corresponding vehicle-mounted T-Box according to a VIN code linked with an instruction source account, and then transmitting the information to the corresponding vehicle-mounted T-Box; 3, enabling the corresponding vehicle-mounted T-Box to carry out the authentication of the fingerprint information in the data in a safety mode: switching to a normal mode and carrying out the execution of the instruction if the authentication is successful, or else carrying out no operation.
Owner:BEIHANG UNIV

A network examination system based on a block chain and a method for managing the network examination by using the network examination system

The invention relates to a network examination system based on a block chain and a method for managing the network examination by using the network examination system, belonging to the technical fieldof teaching management equipment. The system adopts double-block chain design, including a data storage layer, a block chain core layer, a block chain application layer, a block link interface layer,a business system layer and a system user layer. The API interface of the data storage layer is connected with the API interface of the core layer of the block chain, the core layer of the block chain is connected with the application layer of the block chain, and the application layer of the block chain is connected with the interface layer of the block link through the API interface. The blocklink interface layer is connected with the service system layer to realize the inquiry and writing of the block chain service. The business system layer is connected with the system user layer, whichprovides the interface between the user and the network examination service. The invention can prevent information from being lost or tampered with maliciously, construct a safe, reliable and non-tamper examination credit system, simplify the network examination management process, improve the network examination organization efficiency, and provide high-efficiency, convenient and humanized examination service for examinees.
Owner:JIANGSU OPEN UNIV

Method and system for updating position of base station

The invention discloses a method and a system for updating position of a base station. The method comprises the following steps: receiving a base station data reported by a mobile terminal; detecting if the reference position information is in a first threshold scope; if yes, updating the current position information; and if not, storing the reference position information into a to-be-determined cache region. The system comprises a receiving module, a detecting module, a first calculating module and a data updating module, wherein the receiving module is used for receiving the base station data reported by the mobile terminal; the detecting module is used for detecting if the reference position information is in the first threshold scope and supplying the reference position information to the first calculating module or the to-be-determined cache region according to a detection result; the first calculating module is used for calculating by the using of a first predetermining algorithm according to the reference position information and the stored current position information of the base station and supplying a calculation result to the data updating module; and the data updating module is used for updating the current position information according to the acquired calculation result. By the using of the method and system for updating position of base station provided by the invention, the operation of malevolently distorting the position of the base station in the data can be avoided.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Image encoding method for preventing and identifying image tamper

The invention discloses an image coding method for preventing and identifying image tampering. The data of original image coding is encrypted by a key and circulating redundancy check coding (CRC) is carried out on the encrypted data; then scrambling encryption is carried out the encrypted data of the original image coding and the circulating redundancy check coding by keys; and then the encrypted data of the original image coding and the circulating redundancy check coding are added to display image coding (non-encrypted image coding), thereby preserving the information of the safe and true original image into the image so as to prevent and identify image tampering, in this way, the coding of one image consists of two parts: the display image coding and the encrypted original image coding; the display image coding can be any form of image compression coding and allows any form of operation on the display image; the original image can be intuitively observed by carrying out decryption on the encrypted original image coding; comparison is carried out on the original image and the display image, thus being capable of intuitively observing the alternation carried out on the original image. The image coding method has the advantage of identifying the image tampering in direct contrast with the original image, thus being convenient for people to judge whether the correction on the image affects the authenticity of the content of the image or not and being capable of accurately resuming the image after tampering to the original image. The image coding method is simple in arithmetic, is easy to realize hardware coding and software coding, can be used for validating the authenticity of court evidence and e-business pictures as well as resuming the tampered image and image steganalysis.
Owner:陈诚

Method and device for reinforcing application program

The embodiment of the invention provides a method and a device for reinforcing an application program. The method comprises the following steps of receiving a reinforcing request of the application program, wherein the reinforcing request comprises an installation package of the application program and multi-channel information for reinforcing the application program, the installation package comprises code files and resource files, and release channel names and corresponding channel values are configured in the resource files; analyzing to obtain corresponding code files and resource files from the installation package of the application program; executing reinforcing operation on the code files obtained through analysis; executing retouching operation on the resource files obtained through analysis according to each piece of channel information to obtain a new resource file corresponding to each piece of channel information; executing packaging operation on the reinforced code files and the new resource file corresponding to each piece of channel information to obtain a reinforced installation package corresponding to each piece of channel information. According to the method and the device, the safety of the application program can be improved and the efficiency of reinforcing multiple release channels is improved.
Owner:BEIJING QIHOO TECH CO LTD

Internet of ships intelligent shore-based interaction device based on Beidou

The invention discloses an Internet of ships intelligent shore-based interaction device based on Beidou, and the device comprises an embedded-type main control board, an extended control board, a communication/positioning module, an AIS module, a ZigBee module, a sensor module, an RFID module, an internal control module, an encryption module, a power module, an external control module, a fingerprint recognition module, a DVR module, a multimedia module, a storage unit, an intelligent terminal system, a liquid crystal touch screen, and an interface module. The embedded-type main control board is connected with the extended control board. The power module is connected with the main control board and the extended control board. The communication/positioning module achieves interaction with shore-based equipment through a Beidou message or a 3G/GPRS signal. The device employs the technology of multimode positioning, the technology of sensing, the technology of wireless networking communication and the technology of safety encryption, achieves a function of inland river gate report, a function of visualized emergency command scheduling and a function of shipping electronic business, and prompts the building and development of inland river Internet of ships.
Owner:林兴志

Method and device for signing user program and method and device for verifying signature of user program

The invention discloses a method and a device for signing a user program verifying signature of the user program. The method for signing the user program includes steps of acquiring ID (identity) of a CPU (central processing unit), computing the user program by SHA-256 hash operation to obtain a program digest, compiling a public key and a module generated through RSA (Ron Rivest,Adi Shamirh and Len Adleman) encryption algorithm into the user program; combining the ID of the CPU, the program digest and the length of the user program in sequence to form a data string; operating the data string by a private key corresponding to the public key and the module to obtain ciphertext; and loading the ciphertext into a check area of the CPU. By combining with the RSA algorithm and the SHA algorithm to process the user program and integrating with the ID of the CPU to be a part of the signature, the user program must be restarted by being strictly subjected to the signature verifying process matched with the signature, risk in brute force attack to the user program is greatly reduced, and the user program can be effectively protected from being tampered or stolen maliciously.
Owner:恒鸿达科技有限公司

Method for guaranteeing security of source of web application in mobile terminal

The invention discloses a method for guaranteeing the security of the source of a web application in a mobile terminal. The method includes the following steps that: as for a web application stored on an application server, encryption processing is performed on a configuration file, the MD5 abstract value of a source code file is solve and is stored, and the web application and the MD5 abstract value are downloaded through the mobile terminal; the configuration file is decrypted, if the configuration file is successfully decrypted, the web application is installed; after the web application is installed, every time a user starts the web application, MD5 abstract value solving is performed on the source code file, an obtained MD5 abstract value is compared with the downloaded MD5 abstract value, if the obtained MD5 abstract value is consistent with the downloaded MD5 abstract value, the application is started, otherwise, the application is not started. According to the method of the invention, the configuration file of the web application is encrypted, so that malicious behavior of network phishing can be prevented; when the application is started, the obtained MD5 abstract value is compared with the downloaded MD5 abstract value, so that the source code file of the web application can be prevented from being maliciously tampered; and therefore, the security of the source of the web application in the mobile terminal can be guaranteed.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Unidirectional transmission based electronic document output management and control system and method

The invention provides a unidirectional transmission based electronic document output management and control system and method. The system comprises a terminal proxy module, a centralized management center module and an outgoing isolation module, wherein both-way communication is performed between the terminal proxy module and the centralized management center module and between the centralized management center module and the outgoing isolation module. The system has the following advantages: (1) through the unidirectional transmission technology, an in-house network is connected with peripheral output device through the outgoing isolation module, so that unidirectional output of an electronic document can be ensured, and effective isolation between peripheral output risk devices such as a printer and the sensitive in-house network is realized; (2) safe identity authentication ensures credibility of an outgoing source of the electronic document, security check ensures content controllability and manageability of the outgoing electronic document, and execution of a security policy ensures that only authorized electronic document can be sent outward; (3) multiple output modes such as printing output, optical disk burning output, storage medium output and the like are supported, and the system can be widely applied to various security output occasions of the electronic document.
Owner:ZHONGTIE XINAN BEIJING INFORMATION SECURITY TECH

Micro-service registration method and device

The embodiment of the invention discloses a micro-service registration method and device. The method comprises the following steps: receiving a registration request sent by a micro-service terminal; obtaining a public key of the micro-service terminal to decrypt signature data of the registration information, and detecting whether the information obtained by decrypting the signature data of the registration information is the same as the registration information of the micro-service or not; if yes, detecting whether a first name and a first check code exist in a storage space of the blockchainnetwork or not; if not, sending registration information and signature data of the registration information to each consensus node in the blockchain network; and if the consensus response returned byeach consensus node satisfies the consensus condition, calling the smart contract to store the registration information in the storage space of the blockchain network, and returning a registration completion response to the micro-service terminal for the registration request. By adopting the embodiment of the invention, the address of the micro-service can be prevented from being maliciously tampered, and the safety of the micro-service and the stability of the provided service are improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Meter reading system of wireless intelligent meter

The invention relates to a meter reading system of a wireless intelligent meter. The system comprises the intelligent meter, a subnet relay, a collector, a concentrator and a master station server, wherein the intelligent meter collects and sends data of use levels of intelligent meter users, the subnet relay transmits a reading management command and the data of the use levels of the intelligent meter users, the collector establishes a subnet, collects the data of the use levels of the intelligent meter users, and transmits the reading management command, the subnet relay transmits an ultrashort management command and the use levels of the intelligent meter users, the concentrator establishes a main network, collects the data of the use levels of the intelligent meter users and transmits the reading management command, the master station server generates and sends the reading management command, receives the data of the use levels of the intelligent meter users and analyzes and manages the data. The subnet relay provided by the invention can relay and transmits the data of the use levels of the intelligent meter users, sent by the intelligent meter, when the number of the intelligent meters is great, so that the problem that in the subnet, the volume of the data of the use levels of the intelligent meter users, sent by the intelligent meter farther from the collector, is easy to lose is effectively solved. The system has the advantage of strong reliability.
Owner:STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products