Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

47results about How to "Reduce the risk of being cracked" patented technology

Digital signature method, digital signature system and quantum key card

The invention discloses a digital signature method, a digital signature system and a quantum key card. The digital signature system comprises quantum network service stations, signature client sides, authentication client sides and quantum key cards, wherein the quantum network service stations are configured on the network side, and the signature client sides and the authentication client sides are configured on the user side. The digital signature method includes that a true random number is generated on the network side and then stored in the corresponding quantum key card and on the network side respectively to form a corresponding user-side key; the quantum key card matching with the signature client side uses the stored user-side key to generate a signature file, the signature file is sent to the authentication client side via the signature client side, and the authentication client side sends the received signature file to the current quantum network service station, acquires the corresponding user-side key from the network side to perform signature authentication on the signature file and sends signature authentication results to the corresponding authentication client side. The digital signature method, the digital signature system and the quantum key card have the advantage that key seeds are stored in the quantum key cards and the quantum network service stations, so that the problems of access use and safety of quantum network terminals are solved.
Owner:ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD

Method and device for signing user program and method and device for verifying signature of user program

The invention discloses a method and a device for signing a user program verifying signature of the user program. The method for signing the user program includes steps of acquiring ID (identity) of a CPU (central processing unit), computing the user program by SHA-256 hash operation to obtain a program digest, compiling a public key and a module generated through RSA (Ron Rivest,Adi Shamirh and Len Adleman) encryption algorithm into the user program; combining the ID of the CPU, the program digest and the length of the user program in sequence to form a data string; operating the data string by a private key corresponding to the public key and the module to obtain ciphertext; and loading the ciphertext into a check area of the CPU. By combining with the RSA algorithm and the SHA algorithm to process the user program and integrating with the ID of the CPU to be a part of the signature, the user program must be restarted by being strictly subjected to the signature verifying process matched with the signature, risk in brute force attack to the user program is greatly reduced, and the user program can be effectively protected from being tampered or stolen maliciously.
Owner:恒鸿达科技有限公司

Key exchange method for communication of automobile electronic control unit

The invention relates to a key exchange method for automobile electronic control unit communication, which comprises the following steps that 1, an encryption object is selected, and a plurality of electronic control units are classified into a Master and a Slave; 2, a system is initialized, the Slave is accessed to the Master, and the Master checks whether a key parameter needs to be generated ornot; if so, a key parameter is generated, and simultaneously the key parameter is stored into safe storage areas of the Master and the Slave; if not, the originally generated key parameters are used;3, a secret key is generated in real time, after the vehicle is ignited each time, the Master and the Slave respectively generate a random number, and the secret key is generated according to secretkey parameters and the random numbers; and step 4, data encryption: the Master encrypts the communication data needing to be sent to the Slave through the secret key, and the Slave encrypts the communication data needing to be sent to the Master through the secret key. The secret key exchange method for automobile electronic control unit communication is low in encryption cost, does not need to establish a special server to store the secret key, is low in secret key leakage risk, and has very high safety.
Owner:HUIZHOU DESAY SV INTELLIGENT TRANSPORTATION TECH INST CO LTD

Anti-shearing reinforcement device and method for concrete box girder web

ActiveCN109537478ASolve the problem of excessive main tensile stressAvoid corrosionBridge erection/assemblyBridge strengtheningPre stressRebar
The invention relates to an anti-shearing reinforcement device and method for a concrete box girder web. In order to solve the problem that in existing engineering technologies, the concrete box girder web has cracking inclined cracks and insufficient anti-shearing bearing capacity, an external vertical prestressing tendon reinforcement device and method are provided. The device comprises groove-shaped steel, L-shaped steel, vertical prestressing tendons, wedge-shaped steel cushion blocks and an anti-corrosion coating at the outer side of the web. The groove-shaped steel is horizontally fixedto the junction of the upper end of the web and a top plate in the girder length direction. The L-shaped steel (6) is horizontally fixed to the lower end of the web in the girder length direction andis parallel to the groove-shaped steel (5). The vertical prestressing tendons are vertically mounted on the groove-shaped steel and the L-shaped steel, and it is ensured that the vertical prestressingtendons are parallel to the plane of the web. According to the anti-shearing reinforcement device and method, the web is connected with the top plate and a bottom plate through finish rolling twistedsteel, the force transmission path is definite, the risk that web concrete is pulled broken is reduced, and meanwhile, midspan deformation is reduced; the problem of insufficient main tensile stressof the web concrete is effectively solved, and the situations of continuous extension of the inclined cracks of the web or new inclined cracks are prevented.
Owner:BEIJING UNIV OF TECH

Authorization management method and system

ActiveCN108848064BReduce the risk of being crackedAvoid the disadvantages of increased management costsKey distribution for secure communicationCiphertextSoftware engineering
The embodiment of the invention provides an authorization management method and system. A hardware client side is additionally arranged; after being received at the hardware client side, an encryptedplatform hardware ID sent by an authorization client side is decrypted; furthermore, an authorization code is obtained by calculation according to the decrypted platform hardware ID; the authorizationcode is encrypted, so that a ciphertext is obtained; furthermore, the ciphertext is sent to the authorization client side; after decrypting the ciphertext, the authorization client side obtains the authorization code, and sends the authorization code to an embedded platform; the embedded platform stores the authorization code in a storage device; after the embedded platform is re-started, a verification authorization code is generated, so that the stored authorization code is verified; and, after verification is passed, a static library file in the embedded platform can work normally. According to the authorization management scheme, the interaction information is encrypted through additional arrangement of the hardware client side; therefore, the risk that the authorization information is cracked can be reduced; and furthermore, the disadvantage that the management cost is increased due to external connection of the IC in the prior art can be avoided.
Owner:WUHAN JIULE TECH

Information security verification method, device and equipment and storage medium

The invention relates to the technical field of communication security, and provides an information security verification method and device, equipment and a storage medium. The method comprises the following steps: sending a verification information receiving request to a server, wherein the verification information receiving request comprises a communication identification code of a terminal; receiving first verification information sent by the server based on the verification information receiving request; obtaining second verification information input by the user based on the first verification information; obtaining a first identification code stored locally; encrypting the second verification information based on the first identification code to obtain a first verification code; acquiring a second identification code pre-stored by the server based on the communication identification code; encrypting the second verification information based on the second identification code to obtain a second verification code; and determining a matching result of the first verification code and the second verification code, wherein the matching result indicates whether the information security of the terminal connected with the server passes the verification. By adopting the method, loss caused by verification information leakage and communication identification code leakage can be avoided, and the risk that the identification code is cracked in the verification process is reduced.
Owner:SHANGHAI WINGTECH ELECTRONICS TECH

Information security protection method, device, electronic equipment and storage medium

The invention provides an information security protection method, a device, electronic equipment and a storage medium. The information security protection method comprises the steps of receiving the request operation information of a user; according to a verification condition in the resource pool, performing credit granting verification of at least one level on the request operation information;if the credit granting verification of each level is passed, determining that the credit granting of the request operation of the user is successful, and granting a unique security identifier to the request operation of the user; if the credit granting verification of any level is not passed, determining that the request operation of the user fails in credit granting; wherein the at least one hierarchy comprises a behavior layer, performing credit granting verification of the at least one hierarchy on the request operation information according to a verification condition in the resource pool,and the method comprises the steps of determining whether an operation behavior in the request operation information is matched with a pre-registered operation type in a database or not; if so, determining that the credit granting verification of the behavior layer is passed; and if not, determining that the credit granting verification of the behavior layer does not pass. The method is helpful for improving the security level of the system.
Owner:BEIJING JINFENG HUINENG TECH CO LTD +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products