Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31results about How to "Protect against malicious attacks" patented technology

Perceptual hashing-based practical and safe image forensic system and forensic method

The invention discloses a perceptual hashing-based practical and safe image forensic system and a perceptual hashing-based practical and safe image forensic method. The system comprises a certificate authority (CA), forensics computing platform (FCP) and a forensic center (FC). The method comprises the following steps that: the CA provides a certificate for a user, the FCP and the FC and distributes and manages a control key of a hash function for the FCP and the FC; the FCP calculates a characteristic value and generates a hash value of an image at a registration or forensics stage; the FC manages an image hash value from the FCP and provides retrieval and forensics services; the user submits the image to the FCP, extracts an image retrieval characteristic by using the FCP, calculates the hash value of an image segment by using a key distributed by the CA and submits the hash value to an FC database; and when the user needs an authentication image, the image is also submitted to the FCP, the retrieval characteristic is extracted to retrieve the most coincident original image from the FC, the image is segmented and the hash value is calculated by using the same key and the difference between the image and the hash value is compared so as to determine a position on which content tampering occurs. The system achieves high balanced performance in the aspects of safety, robustness, sensibility, rapid retrieval and the like.
Owner:ANHUI TELECOMM ENG

Method and system for authenticating USB (universal serial bus) challenge-response token

The invention discloses a system for authenticating a USB (universal serial bus) challenge-response token, wherein the client USB challenge-response token is provided with a USB interface but not provided with full keyboard input keys. When transaction of the USB challenge-response token is authenticated, an authentication webpage calls an authentication control to transmit transaction information including a transfer account number and transfer amount to the token through the USB interface, a cryptographic chip of the token calculates dynamic passwords related to transaction data in a challenge-response mode and returns the dynamic passwords through the USB interface, the authentication webpage transmits the transaction data and the returned dynamic passwords containing the transaction information of a user to an authentication server of the system, the authentication server acquires a token seed key according to a user identifier, the transaction data are calculated in the challenge-response mode to obtain the dynamic passwords related to the transaction data, and the dynamic passwords are compared with the dynamic passwords, which is submitted by the token, containing the transaction information of the user to determine whether the transaction data are tampered or not.
Owner:林顺来 +1

Cloud storage data verification method and system based on elliptic curve cryptography

The invention discloses a cloud storage data verification method and system based on elliptic curve cryptography. The method comprises the following steps: generating a private key of a user and a public key of the user through an elliptic curve based key generation algorithm; generating a tag set according to input data files and the private key of the user, and sending the tag set, the input data files and the public key of the user to a cloud server; enabling a verifier to receive a challenge request launched by the user, generating a challenge set in combination with the tag set and the input data files, and sending the challenge set to the cloud server; after the cloud server receives the challenge set, generating an evidence set in combination with the tag set, the input data files and the public key of the user, and returning the evidence set to the verifier; and enabling the verifier to perform evidence verification according to the evidence set, the challenge set and the public key of the user to obtain a verification result of evidences, and returning the verification result to the user. The cloud storage data verification method and system disclosed by the invention havethe advantages of security and high efficiency, and can be widely applied to the field of cloud storage.
Owner:GUANGDONG UNIV OF TECH +1

Node selection and aggregation optimization system and method for federated learning under micro-service architecture

PendingCN114418109AGive full play to the advantages of non-tamperable and traceableProtect against malicious attacksCharacter and pattern recognitionDigital data protectionData privacy protectionData node
The invention discloses a node selection and aggregation optimization system and method for federated learning under a micro-service architecture, and the system comprises a node division module which is used for dividing nodes into data nodes and model nodes according to the specific privacy protection demands; the participation model aggregation node selection module is used for selecting model nodes participating in model aggregation and data nodes for verifying model parameters by the center party according to the node credibility; the node creditworthiness is generated based on the quality of transmission data or a model of the sensing node and the historical creditworthiness of the sensing node; and the credit chain and transaction chain construction module is used for establishing two block chains, namely a credit chain and a transaction chain, and respectively recording the credibility of the nodes and the types of exchange data or models between the federal learning center party and the nodes in each round. According to the method, a specific quality evaluation and model aggregation method is constructed for different privacy requirements of nodes, and the advantages of federated learning on node data privacy protection and non-tampering and traceability of a block chain are brought into full play.
Owner:HENAN UNIVERSITY

Lightweight wireless sensor network safety small data distribution method

The invention discloses a lightweight wireless sensor network safety small data distribution method. The method comprises the following stages that: at a first stage, namely, a system initializing stage, a base station generates a one-way key chain, and adds a key chain commitment value into each sensor node before deploying each sensor node; at a second stage, namely, a data packet preprocessing stage, the base station constructs a legal data packet of specific data items by using a Hash function; at a third stage, namely, a data packet verification stage, each sensor node verifies the received data packet, the data packet is received and the sensor node is updated if the received data packet is a legal data packet, otherwise, the data packet is abandoned directly. Under the consideration of limitation on common sensor node resources, the lightweight wireless sensor network safety small data distribution method has the advantages of resistance to sensor node compromise, high robustness on the aspects of packet loss and data packet transmission out-of-sequence, no need of time synchronism between the base station and each sensor node, and the like. Meanwhile, the lightweight wireless sensor network safety small data distribution method has the excellent characteristics of high efficiency, saving in energy, low storage overhead, resistance to malicious attacks, and the like.
Owner:SOUTH CHINA UNIV OF TECH

Power Internet of Things equipment identity authentication method and system based on block chain

The invention belongs to the field of power automation, and discloses a power Internet of Things equipment identity authentication method and system based on a block chain, and the method comprises the following steps: power Internet of Things equipment generates authentication request information, and sends the authentication request information to a block chain network; wherein the authentication request information comprises equipment parameter information and a digital certificate of the power Internet of Things equipment; the block chain network queries whether an internal block chain contains a target block or not; wherein the target block is a block containing equipment parameter information and a digital certificate of the power Internet of Things equipment; and when the block chain contains the target block, the block chain network sends a reliability certification message to the power Internet of Things equipment to complete identity authentication of the power Internet of Things equipment. The problems of low compatibility, weak anti-attack capability, heavy centralized network burden and the like in a public key infrastructure-based identity authentication process commonly used in the power internet of things at present are effectively solved, and high-security distributed power internet of things equipment identity authentication is realized.
Owner:CHINA ELECTRIC POWER RES INST

Intelligent card

PendingCN109615054AEnsure safetyEffective defense against malicious attacksPayment circuitsRecord carriers used with machinesDigital currencyEngineering
The invention discloses an intelligent card, which is provided with two security chips and has three working states under the control of a working state switching circuit, in the thermal storage state, the first security chip is powered off, the second security chip is powered on, and the second security chip has the function of a cold electronic wallet; in the cold and hot exchange state, the first security chip and the second security chip are electrified and are both in an offline state, and data interaction can be carried out between the first security chip and the second security chip; inthe thermal storage state, the power failure of second security chip is carried out, the first security chip has the functions of a conventional financial card and a thermoelectronic wallet. Therefore, the smart card has a cold function; the invention discloses a thermoelectronic wallet and a conventional financial card. According to the embodiment of the invention, the method greatly facilitatesthe expansion and extension of the traditional financial smart card application to the field of digital currency, enables the smart card to be in an offline state when the second security chip is electrified, guarantees the security of an account in the second security chip, and is high in security because the cold and hot storage states of the smart card are electrically and physically isolatedbased on a power supply circuit.
Owner:SHENZHEN TECH UNIV

Chaotic encryption and digital watermark image verification method and system

The invention discloses an image verification method and system based on chaotic encryption and digital watermarking, and the method comprises a chaotic encryption step: selecting a to-be-encrypted image, and carrying out the chaotic encryption to obtain a first encrypted image; a watermark encryption step: embedding the first watermark code text into the first encrypted image to form a second encrypted image containing the first watermark code text; a verification step: judging whether the watermark information of the second encrypted image can be extracted according to the pre-extracted watermark processing result: if the watermark codes can be decrypted and the watermark codes are consistent when the similarity of the watermark codes is detected, continuing to execute the decryption step; otherwise, finishing the subsequent processing of the second encrypted image; and a decryption step: performing watermark removal processing to restore the first encrypted image, and decrypting the first encrypted image to obtain a decrypted image. According to the method, the defects of a chaotic encryption algorithm in resisting selected plaintext attacks are overcome by adopting the digital watermarking, so that the method has good shearing resistance and robustness, and image information transmission is safer.
Owner:SOUTH CHINA AGRI UNIV

Writing balancing method of phase change memory

The invention provides a writing balancing method of a phase change memory. The method comprises the following steps of: dividing a high-capacity phase change memory system into a plurality of memory regions, wherein each region comprises a plurality of memory arrays, each array comprises a plurality of memory rows, and each memory row is composed of a plurality of bytes and located in the same region; storing file data by a striping method to increase a mapping discretization degree of data address mapping; performing writing balancing via a neighbored copying algorithm in the array, namely maintaining a blank row pointer, and copying the data of an upper line neighboring to the pointer into the position directed by the pointer, thereby realizing the writing balance of the two memory rows; mapping the blank rows of all the arrays to a special array via an interlaced mapping mode so as to improve the discretization degree of the special array. The method can increase the discretization degree of the data address mapping, and can resist the malicious attack of repeatedly writing the same memory unit more effectively so as to realize the writing balance of the whole memory system, thereby prolonging the service life and increasing the utilization rate of the memory system.
Owner:HUAZHONG UNIV OF SCI & TECH

Perceptual hashing-based practical and safe image forensic system and forensic method

The invention discloses a perceptual hashing-based practical and safe image forensic system and a perceptual hashing-based practical and safe image forensic method. The system comprises a certificate authority (CA), forensics computing platform (FCP) and a forensic center (FC). The method comprises the following steps that: the CA provides a certificate for a user, the FCP and the FC and distributes and manages a control key of a hash function for the FCP and the FC; the FCP calculates a characteristic value and generates a hash value of an image at a registration or forensics stage; the FC manages an image hash value from the FCP and provides retrieval and forensics services; the user submits the image to the FCP, extracts an image retrieval characteristic by using the FCP, calculates the hash value of an image segment by using a key distributed by the CA and submits the hash value to an FC database; and when the user needs an authentication image, the image is also submitted to the FCP, the retrieval characteristic is extracted to retrieve the most coincident original image from the FC, the image is segmented and the hash value is calculated by using the same key and the difference between the image and the hash value is compared so as to determine a position on which content tampering occurs. The system achieves high balanced performance in the aspects of safety, robustness, sensibility, rapid retrieval and the like.
Owner:ANHUI TELECOMM ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products