Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

65results about How to "Prevent replay" patented technology

Cloud-storage-oriented trusted storage verification method and system

The invention discloses a trusted storage verification method and a trusted storage verification system for cloud storage and belongs to the technical field of computer software. In the method and the system, before a file is transmitted to an untrusted cloud storage server, a series of random positions are generated according to the key held by a user and other generated related verification parameters, the contents at the random positions in the file are read, a plurality of verification labels are generated for the file, and all necessary parameters are stored and maintained; and when the storage state of the file is required to be checked, a user can initiate an interaction process with a cloud storage system according to related parameters, and the cloud storage system can generate new verification labels again according to parameters corresponding to the verification. In the method disclosed by the invention, a higher verification reliability can be acquired at a lower computingcost, the contents at different positions in the file are selected at each time of generation of the file verification labels, and different keys are adopted to prevent a server from generating a correct signature by using a stored correct signature or by storing the file contents at a specific position.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Password protocol safety detection method based on novelty verification condition

InactiveCN101459509APrevent replay and obfuscation attacksEffectively distinguish whether it is fresh or notKey distribution for secure communicationPublic key for secure communicationCODE protocolPassword
The invention relates to a code protocol security detecting method based on freshness verification conditions in the field of information security, which comprises the steps that: inputting the initial value of a code protocol security detecting result, generating a new fact after a communication agent sends or receives each message, obtaining a new security detecting result through operating the freshness verification condition of a confidence multi-collection method based on the new fact and the built security detecting result until to process the protocol information, obtaining the security conclusion of the code protocol through the code protocol security detecting result, or displaying that the code protocol is safe, or leading out an attack structure for the code protocol with security hidden dangers. The detecting method not only can effectively differentiate whether the message is fresh, but also substantially prevents the attacks of replaying and confusing, and is not related to the specific descriptions of a multi-protocol operation environment and the ability of an attacker. In addition, the invention not only is a method of proving the code protocol correctness, but also is a method of searching protocol errors.
Owner:SHANGHAI JIAO TONG UNIV

Unauthorized deice detection device, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method

There are provided an unauthorized device detection device, a content reproduction device, an unauthorized device detection system, an information collection device, an unauthorized device detection method, a program, a recording medium, a device information update method, and an integrated circuit capable of detecting a clone device associated with a content reproduction device. In a management server (2), a reception processing unit (241) acquires a user terminal identifier and a first user terminal random number from a user terminal as an unauthorized device detection object and judges whether a second management server random number corresponding to the user terminal held in a recording unit (23) coincides with the first user terminal random number. If they do not coincide, a display unit (22) displays a message indicating that a clone terminal exists. If they coincide, a terminal information generation unit (243) generates a new random number and overwrites the generated random number on the second management server random number in the recording unit (23). Moreover, a transmission processing unit (246) transmits the generated random number via a transmission/reception unit (21) to the user terminal so that the user terminal updates the first user terminal random number to the generated random number.
Owner:PANASONIC CORP +1

Safety payment system and method based on smart TV multi-screen interaction

The invention discloses a safety payment system and method based on smart TV multi-screen interaction. A business delegate method is introduced to relegate an identity authentication requirement at a smart TV terminal to a user smart terminal, which is higher in security and supports a plurality of physiological information authentications, to process through a multi-screen interaction concept, and a processing result is finally returned to the smart TV terminal. Through the adoption of the user smart terminal, a built-in or external physiological information authentication device and an identity authentication server are combined through an asymmetrical secret key mode to perform the negotiation authentication, thereby realizing the safety payment system at the smart TV terminal. Through the adoption of the method disclosed by the invention, a user can finish the identity authentication and the affair confirmation of the smart TV terminal by means of the convenient and safe physiological information authentication device at the smart terminal, and the traditional user name password identity authentication mode is substituted. The information security in the authentication process is greatly improved while the user experience is guaranteed.
Owner:INST OF INFORMATION ENG CAS

Authorization system based on oauth2 protocol enhancement and method thereof

The invention relates to an authorization system and method based on oauth2 protocol enhancement, the system comprises a client and an authorization platform, the client is unidirectionally connected to a plurality of different service systems so as to send access request information to the corresponding service systems from the client, and the client and the plurality of service systems are respectively bidirectionally connected with the authorization platform. The authorization platform is used for pushing an authorization confirmation page to the client and returning an authorization code to the corresponding service system, the client is used for executing user login operation and sending authorization confirmation information to the authorization platform, and the service system is used for sending authorization request information to the authorization platform, and acquiring the token from the authorization platform according to the authorization code, and acquiring the user information from the authorization platform according to the token. Compared with the prior art, the user operation in the cross-service interaction process can be simplified, and the user does not need to repeatedly carry out login operation; and meanwhile, data security is ensured, user information does not need to be transmitted between service systems, and interception by rogue program information is avoided.
Owner:SHANGHAI PUDONG DEVELOPMENT BANK

Broadcast signal processing method, system, and receiver

The invention discloses a method for processing a broadcasting signal in a conditional access system in a broadcasting field as well as a system and a receiving terminal thereof, which is used for sending signals to a plurality of terminal broadcasts through a narrow band by a sender, which comprises the steps: the signal is sent after scrambled by the sender; a scrambling control word is encrypted; encrypted information which contains the encrypted scrambling control word is sent and the encrypted information is the same information; after the scrambling control word is decrypted by the terminal according to a key for decrypting selected according to the encrypted information, the scrambling control word is used for descrambling the received signal. By using the method for processing the broadcasting signal in the conditional access system in the broadcasting field as well as the system and the receiving terminal thereof, the conditional access in the narrow-band broadcasting system can be realized, which solves the problem that large bandwidth is required to be occupied for authorizing the control information to be related with the user in the prior conditional access way; existing weakness that data flow is easy to be monitored can be eliminated; the operation of user management is flexible and convenient and at the same time a good protection effect is brought into play for the user and the broadcasting system operator.
Owner:BEIJING WATCH DATA SYST

Method and apparatus for providing public key security control for a cryptographic processor

Public key security control (PKSC) is provided for a cryptographic module by means of digitally signed communications between the module and one or more authorities with whom it interacts. Authorities interact with the crypto module by means of unsigned queries seeking nonsecret information or signed commands for performing specified operations. Each command signed by an authority also contains a transaction sequence number (TSN), which must match a corresponding number stored by the crypto module for the authority. The TSN for each authority is initially generated randomly and is incremented for each command accepted from that authority. A signature requirement array (SRA) controls the number of signatures required to validate each command type. Upon receiving a signed command from one or more authorities, the SRA is examined to determine whether a required number of authorities permitted to sign the command have signed the command for each signature requirement specification defined for that command type. A command requiring multiple signatures is held in a pending command register (PCR) while awaiting the required cosignatures. The crypto module also stores a single crypto module signature sequence number (CMSSN) which it increments for each reply to any authority to enable one authority to determine whether any other authority has communicated with the module.
Owner:IBM CORP

NFC (Near Field Communication) mobile intelligent terminal security access control system and control method thereof

The invention discloses a NFC (Near Field Communication) mobile intelligent terminal security access control system and a control method thereof. The NFC mobile intelligent terminal security access control system comprises a NFC mobile intelligent terminal, an access controller, a server and an electronic lock, wherein the NFC mobile intelligent terminal is internally provided with an application program module and a NFC reading module; the access controller is internally provided with a NFC labeling module, a door lock driving module and an audio module; the server is internally provided with a server side module; the server side module is used for identifying the NFC reading module and the NFC labeling module, and meanwhile, the NFC labeling module is also used for identifying the server side module and the NFC reading module; the door lock driving module drives the electronic lock to open after the NFC labeling module passes the identification. During an identification process, identity labels of the NFC reading module and the NFC labeling module are hidden, and hash processing is carried out on the identity labels, so that eavesdrop and forgery attacks can be prevented; meanwhile, random numbers are added in interaction information, and shift operation is carried out, so that attacks of data replay, data tampering and the like can be prevented.
Owner:GUIZHOU AEROSPACE INST OF MEASURING & TESTING TECH

Login verification method and system based on SM3 algorithm and random challenge code

The invention discloses a login verification method and system based on an SM3 algorithm and a random challenge code. The method comprises the following steps: performing summary calculation based onthe SM3 algorithm to store registration information of a user; and based on the stored registration information, performing login verification on the login information of the user based on double login random numbers. The system comprises a storage module and a verification module. According to the login verification method and system, the registration information of the user is stored based on the SM3 algorithm, compared with the existing international algorithms such as MD5, the irreversible SM3 algorithm can avoid the playback of the user login data and improve the security of the login data. In addition, based on the stored registration information, the login verification is performed on the login information of the user based on double login random numbers, thus improving the randomness and one-time of the login data, further preventing the replay attack, the data randomness and the security are high, and the login verification method and system can be widely applied to the information security field.
Owner:广州江南科友科技股份有限公司

System and method for resisting physical attacks of printer

The invention provides a system and method for resisting physical attacks of a printer. By encrypting and verifying plaintext data of a printer storage and an interface and monitoring behaviors of theprinter in real time to achieve early warning on the potential attack behaviors, the purpose of improving the security of the printer is achieved; a main control module achieves a security protectionfunction on the printer storage through a storage security module, achieves a security protection function on the interface through an interface security module and conducts monitoring and early warning on the physical attacks through a behavior security module; and a security trusted module is used for managing encryption keys, decryption keys and verification values which are used in the storage security module and the interface security module and conducting encryption, decryption and integrity verification on used data. According to the system and method, the physical attacks such as tapping, counterfeiting and resetting for the interface and the storage of the printer system are effectively resisted, the security of the printer is improved, the encryption efficiency of the printer storage is high, and the system and method can be applied to the printer system requiring high confidentiality.
Owner:XIDIAN UNIV

Dynamic restructuring method in cluster encryption communication

The invention relates to a dynamic restructuring method in cluster encryption communication. The method specifically includes the following steps that firstly, group information updating is started; secondly, a key set of a group corresponding to terminals is acquired; thirdly, a key management center KMC judges whether the terminals are registered or not and whether the updated group exists or not and according to a judgment result, group keys of the terminals are issued to a home location register PHR; fourthly, the home location register PHR issues group information needing to be updated and the key set of the group to a dispatch server PDS, and the dispatch server PDS pages the terminals and sends updating messages of the group information to the terminals through base stations; fifthly, the terminals update the group information and then send responses back; sixthly, key updating messages are sent to the terminals, if code modules of the terminals verify that the received key updating messages successfully, group key updating is finished, and response messages are sent back to the terminals; seventhly, the terminals send the key updating response messages to the dispatch server PDS through the base stations. By the adoption of the method, encrypted group calling is achieved.
Owner:成都三零瑞通移动通信有限公司

Cooperative spectrum sensing location privacy protection method based on blockchain

The invention discloses a cooperative spectrum sensing location privacy protection method based on a blockchain, which utilizes the anonymity of the blockchain to enable a secondary user to anonymously upload a sensing report to the blockchain, avoids the relevance between the sensing report and the secondary user, prevents a fusion center from associating the sensing report with the secondary user during decryption, and protects the security of the sensing report in the fusion process. The secondary user encrypts and signs the sensing report by using the elliptic curve cryptography technology, so that the sensing report is prevented from being stolen and tampered in the transmission process, and the confidentiality and integrity of the sensing report in the transmission process are ensured. According to the method, the sensing report is prevented from being replayed in the transmission process by using the timestamp, and the timeliness of the sensing report in the transmission process is ensured. According to the method, the automatic verification characteristic of a smart contract is utilized, and the smart contract, instead of the fusion center, automatically verifies the digital signature of the sensing report, so that the calculation overhead of the fusion center is reduced.
Owner:FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products