Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

63results about How to "Reduce tampering" patented technology

Electronic signature method, device, device and medium

An embodiment of the application discloses an electronic signature method. An electronic device signs a seal file by using a private key to obtain a signature file, and generates a signature file digest according to a digest algorithm and the signature file. A signature information digest is generated according to the signature information and the digest algorithm. The signature information includes at least a signature file, a signature file digest and a digital signature certificate. The signature encryption information is generated by encrypting the signature information and the signature information digest with the public key of the third party fair organization, and the signature encryption information is stored in the block chain network. The signature encryption information is generated by encrypting the necessary information generated in the process of electronic signature with the public key of the third party fair organization, which ensures that other organizations or individuals except the third party fair organization can not decrypt the signature encryption information privately, and reduces the risk of information being tampered with or stolen; The signature encryption information is stored in the block chain network with anti-tamper mechanism, which ensures the authenticity and security of the information.
Owner:HUNDSUN TECH

Trusted data transmission method and system, electronic equipment and storage medium

The invention provides a trusted data transmission method and a system, electronic equipment and a storage medium. The trusted data transmission method comprises the following steps: acquiring data; calculating an abstract value of the collected data, and encrypting the abstract value according to a private key of the edge computing node to generate an edge computing node signature; generating a message serial number for the acquired data; caching the abstract value and the message serial number of the acquired data; generating a data message according to the public key of the target blockchain node; sending the data message to the target blockchain node for decryption and verification; receiving a feedback message sent by the target blockchain node; and decrypting the feedback message according to the private key of the edge computing node, comparing the decrypted data with the cached abstract value and message serial number of the acquired data, and if the decrypted data is consistent with the cached abstract value and message serial number of the acquired data, finishing the transmission of the acquired data. According to the method and the device provided by the invention, thesecurity of message transmission between the Internet-of-thingsInternet-of-things and the blockchain can be realized.
Owner:上海诚频信息科技合伙企业(有限合伙)

Method for hierarchichal onion rings routing

The invention discloses a method for hierarchichal onion rings routing. The nodes in a wireless Mesh network are divided into a gateway G, trusted nodes OP (Onion Proxy) and normal nodes Fi, wherein, the trusted nodes OP and the gateway G are induction nodes; the trusted nodes OP serve the function of selecting a route during the initialization of the ring; and the assembly of all the trusted nodes OP and the gateway G constitutes an anonymous assembly. The onion routing of the network is divided into two loop layers, wherein, the first route layer is a loop route consisting of the non-adjacent trusted nodes OP and the gateway G of the anonymous assembly; and the second route layer is a loop route formed by filling normal nodes Fi among the trusted nodes OP, and the second route layer is randomly selected by the trusted nodes OP and the gateway during the initialization. Accordingly, the anonymous and secure communication in the Mesh network can be achieved by the layered loops of the onion rings route. By using the layered onion rings communication protocol and allowing the trusted nodes OP and the gateway of the anonymous assembly to select the route together, the invention can effectively mix up the paths and prevent the intersection attacks, thereby reducing the computation, alleviating the load of the gateway, accelerating the ring construction, preferably utilizing the network resources to reduce delay.
Owner:XIDIAN UNIV

Fingerprint authentication method and system and fingerprint template encrypting device

The invention discloses fingerprint authentication method and system and a fingerprint template encrypting device. The method comprises the following steps: processing fingerprint characteristics data from a background system by a smart card to produce a ciphertext template; acquiring a chip serial number of the smart card by a POS machine according to the acquired identity of the smart card when verifying the validity of the identity authorization code of the smart card by the POS machine; performing double authorization according to the acquired chip serial number of the smart card and the smart card; acquiring the fingerprint characteristics data of a card holder by the POS machine after the passing the double authorization; scrambling the acquired fingerprint characteristics data and then sending to the smart card; recovering the received scrambled fingerprint characteristics data by the smart card; decrypting the ciphertext template; matching the decrypted ciphertext template and the recovered fingerprint characteristics data; returning the matching result to the POS machine. According to the technical scheme, the method has the advantages that the possibility that a fingerprint template is tampered or forged is reduced, and the safety of the fingerprint authorization system is improved.
Owner:北京大唐智能卡技术有限公司

Operation management method for base station equipment and base station equipment

The embodiment of the invention provides an operation management method for base station equipment and the base station equipment and relates to the technical field of communication. According to theembodiment of the invention, distributed storage can be carried out on recorded resource usage amount of the base station equipment, so the data security and accuracy are improved. The method comprises the steps that target base station equipment receives communication requests of terminals in a first preset time period; the target base station equipment records operation information of the targetbase station equipment when the target base station equipment provides communication service for the communication requests; the target base station equipment sends the operation information to the other base station equipment in a preset area, thereby enabling the other target base station equipment in the preset area to update operation bills stored in the base station equipment; and the targetbase station equipment determines the resource usage amount of the target base station equipment in the first preset time period according to the operation bills stored in the base station equipmentwithin the preset area through utilization of a consensus mechanism. The method is applied to the operation management of the base station equipment.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD +2

Data integrity rapid authentication method and system based on quantum secret communication, terminal and storage medium

PendingCN111726224AImprove integrityFast implementation of integrity verificationKey distribution for secure communicationComputer networkData integrity
The invention provides a data integrity rapid authentication method and system based on quantum secret communication, a terminal and a storage medium. The method comprises the steps that a data sending end and a data receiving end obtain a quantum shared key; the plaintext data of the data sending end and the shared key are subjected to hash operation to generate a first hash value, and the plaintext data and the first hash value are sent to the data receiving end; hash operation is performed on the received plaintext data and the shared key to generate a second hash value; the first hash value is compared with the second hash value to verify data integrity. According to the invention, a quantum key is used to replace a traditional key to carry out hash operation so as to carry out data integrity verification; according to the method, the risk that the hash function is cracked when data integrity verification is carried out can be reduced, authentication needs to be carried out on thetwo communication ends during data communication to ensure authenticity and integrity of data, rapid authentication needs to be carried out during large-scale communication, and data integrity and authenticity verification can be rapidly achieved by adopting the quantum key to carry out hash operation.
Owner:BEIJING INFORMATION SCI & TECH UNIV

Method and device for encryption/decryption of executable program data package

The invention provides a method and device for encryption/decryption of an executable program data package. The method comprises the steps that the executable program data package is acquired; based on preset rules, the executable program data package is divided into multiple original documents; a first secret key is used to encrypt the multiple original documents respectively, so that encryption documents which have one-to-one correspondence relations with each original document respectively can be obtained; the multiple encrypted encryption documents are received; a second secret key corresponding to the first secret key is used to decrypt the multiple encryption documents respectively, so that the multiple original documents which have the one-to-one correspondence relations with the encryption documents can be obtained; and index information of the original documents are used respectively to reform the multiple original documents, so that the executable program data package can be obtained. The method and the device provided by the invention have the advantages that vicious decryption of the executable program data package caused by theft of a single secret key in the executable program data package can be prevented; a probability of the vicious decryption of an application program can be reduced; and data safety of the application program can be enhanced.
Owner:SHENZHEN UNIV

Visual three-dimensional code touch screen compiler and programming technique

The invention discloses a visual three-dimensional code touch screen compiler product and its programming technique. According to the invention, visual geometric programming and three-dimensional code programming are realized; a programmer can finish programming work by one-hand or two-hand touch screen operation, therefore the workload of the programmer is greatly reduced; and the programming work is driven to humanized and intelligentized development. The built-in technologies of the new type geometric decoder and three-dimensional compiler of the invention comprise: generating a code plate and selecting a code element, coding a rule, information expression, hexadecimal number expression, conversion of digital and geometric codes, plane code to three-dimensional code, and so on; the functions of the compiler comprise: a touch screen function, program three-dimensional coding, a three-dimensional code paraphrasing function, an intelligent detection function, an automatic code storage function, an automatic connection function of three-dimensional code chains, and so on. According to the invention, the program code is converted into a shape code; a new pattern is provided for the security operation of the program; each code chain is not divided, so there is no leak for an external virus program to implant; the program is effectively prevented from being tampered and attached; and the program security is improved.
Owner:JIANGSU FIGURE CODE INFORMATION TECH LTD

Trusted network communication method and device based on safety chip hardware algorithm module

The invention discloses a trusted network communication method and device based on a safety chip hardware algorithm module. The method comprises the following steps of when a system is started, constructing the trust chain of a current system from the beginning of power on; when the application program of the current system initiates service connection to the opposite end system of the current system, carrying out first integrity measurement on the application program based on a whitelist mechanism, and according to a first integrity measurement result, determining whether the service connection is allowed to establish; and during a service connection maintenance process, carrying out a second integrity measurement on the application program based on the triggering of a predetermined instruction, and according to a second integrity measurement result, determining whether the service connection is continuously maintained. When the application program initiates the service connection tothe opposite end system, the first integrity measurement is performed, and during the service connection maintenance process, the second integrity measurement is performed so as to reduce a possibility that transmission data between a terminal system and a main station system is stolen, and improve the safety and the credibility of the method.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3

Intelligent contract information flow integrity verification method and system based on type detection

PendingCN113051624AReduce the probability of credible information being tampered withReduce tamperingDigital data protectionSecurity informationValidator
The invention discloses an intelligent contract information flow integrity verification method and system based on type detection, and belongs to the field of block chains and information security. The method can be used for solving the problem of potential information tampering of the smart contract in an Ethereum block chain environment. The method comprises the following steps: constructing formalized grammar and semantics for a smart contract programming language; constructing a security type system STC of the smart contract, wherein the STC is used for detecting the integrity of information flow of the smart contract; and constructing a type verifier STV based on an intelligent contract type system STC, and searching optimal security type allocation automatically for state variables of the intelligent contract. According to the method, formalized grammar and semantics of the smart contract are given, meanwhile, the advantages of type detection in security information flow check are combined, the information flow integrity of source codes of the smart contract can be effectively analyzed and verified, and the probability that credible information is tampered in the running process of the smart contract is reduced.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Method for hierarchichal onion rings routing

InactiveCN101635918BPrevent intersection attacksReduce tamperingSecurity arrangementSecure communicationComputer network
The invention discloses a method for hierarchical onion rings routing. The nodes in a wireless Mesh network are divided into a gateway G, trusted nodes OP (Onion Proxy) and normal nodes Fi, wherein, the trusted nodes OP and the gateway G are induction nodes; the trusted nodes OP serve the function of selecting a route during the initialization of the ring; and the assembly of all the trusted nodes OP and the gateway G constitutes an anonymous assembly. The onion routing of the network is divided into two loop layers, wherein, the first route layer is a loop route consisting of the non-adjacent trusted nodes OP and the gateway G of the anonymous assembly; and the second route layer is a loop route formed by filling normal nodes F among the trusted nodes OP, and the second route layer is randomly selected by the trusted nodes OP and the gateway during the initialization. Accordingly, the anonymous and secure communication in the Mesh network can be achieved by the layered loops of the onion rings route. By using the layered onion rings communication protocol and allowing the trusted nodes OP and the gateway of the anonymous assembly to select the route together, the invention can effectively mix up the paths and prevent the intersection attacks, thereby reducing the computation, alleviating the load of the gateway, accelerating the ring construction, preferably utilizing the network resources to reduce delay.
Owner:XIDIAN UNIV

Trusted data transmission method and system, electronic equipment and storage medium

InactiveCN112825522ANot tampered withGuaranteed invisibleTransmissionMessage deliveryEdge computing
The invention provides a credible data transmission method and system, electronic equipment and a storage medium. The credible data transmission method comprises: collecting data; calculating an abstract value of the collected data, and encrypting the abstract value according to a private key of the edge computing node to generate an edge computing node signature; generating a message serial number for the collected data; caching an abstract value and a message serial number of the collected data; generating a data message according to the public key of the target block chain node; sending the data message to the target block chain node for decryption and verification; receiving a feedback message sent by the target block chain node; and decrypting the feedback message according to the private key of the edge computing node, comparing the decrypted data with the cached abstract value and message serial number of the collected data, and if the decrypted data are consistent with the cached abstract value and message serial number of the collected data, completing the transmission of the collected data. According to the method and the device provided by the invention, the security of message transmission between the Internet of Things and the block chain can be realized.
Owner:ROOTCLOUD TECH CO LTD

Key distribution method and device, mobile terminal, communication equipment and storage medium

The embodiment of the invention provides a key distribution method and device, a mobile terminal, communication equipment and a storage medium. The method comprises the following steps: extracting authentication information and a user key according to received authentication scheduling; generating a first verification key according to a key generation rule; and returning an authentication responsemessage to the mobile network side, after receiving the authentication response message, enabling the mobile network side to send the authentication response message; acquiring corresponding authentication information and a user key to generate a second verification key; encrypting the first secret key information; obtaining a third secret key and returning the third secret key to the mobile terminal; and enabling the mobile terminal to decrypt the third key information according to the first verification key. According to the method and the system, the security problem of the mobile terminalwhen the mobile terminal accesses the mobile network is solved by issuing the secret key based on the mutual mode, the real-time updating of the secret key is ensured, the tampering of the secret keyis reduced, the security is further improved, and the security performance of the system is also greatly improved.
Owner:ZTE CORP

Archive data protection method based on block chain

The invention relates to an archive data protection method based on a block chain. The method comprises the steps of obtaining archive data, classifying the archive data to obtain at least two archivedata sets, storing and backing up to the corresponding storage space; storing the first characteristic parameter of each archive data set in a block chain network, obtaining an actual second characteristic parameter according to the target archive data set, obtaining a first characteristic parameter from the block chain network; verifying according to the first characteristic parameter and the second characteristic parameter; and if the archive data set stored in the backup space does not pass the verification, replacing the archive data set in the corresponding main storage space with the archive data set stored in the backup space; when the archive data are extracted, firstly carrying out identity verification, then comparing related verification codes; and after the archive data passesthe verification, obtaining and outputting a to-be-extracted archive data set. The archive data protection method can effectively reduce the possibility that the archive data are illegally stolen, tampered and destroyed, and effectively improve the security of archive data management.
Owner:ZHEJIANG GUANGSHA COLLEGE OF APPLIED CONSTRTECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products