Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

76results about How to "Reduce the risk of being leaked" patented technology

Message data processing method and device, server and terminal equipment

The invention provides a message data processing method and device, a server and terminal equipment. Based on the method, a server sends Cookie data at least containing a generation rule of a first secret key and a generation rule of a second secret key to the terminal equipment in advance; in this way, the server and the terminal equipment can generate the first secret key and the second secret key locally, interactive transmission of the secret keys is not needed, and the risk that the secret keys are leaked is reduced; moreover, before sending the request message, the terminal equipment encrypts the request message carrying the timestamp by using the first secret key and the second secret key; after receiving the encrypted request message, the server decrypts the encrypted request message by using the first secret key and the second secret key to obtain a timestamp; whether the request message has the security risk or not is detected according to the time information indicated by the timestamp and the receiving time of the encrypted request message, so that the request message with the security risk can be accurately detected with relatively low processing cost, and the data security is protected.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Electronic bidding system and method

The invention relates to the technical field of digital information security transmission, and particularly relates to an electronic bidding and tendering system and method. The system comprises a server, and the server is used for obtaining bid inviting information; the server is further used for generating public and private key pairs according to the bid inviting information, encrypting privatekey certificates in the public and private key pairs based on a Shamir threshold to obtain a plurality of private key ciphertext, and generating a bidding tool according to the public key certificates in the public and private key pairs; the server is also used for updating the bidding tools according to any private key ciphertext during bidding, and the updated bidding tools are in one-to-one correspondence with the private key ciphertexts; the bidding tool is used for obtaining bidding information, encrypting the bidding information to obtain a bidding ciphertext, and uploading the biddingciphertext and the private key ciphertext to the server; and the server is also used for generating a private key certificate according to the plurality of private key ciphertext based on the Shamir threshold during bid opening, and decrypting the bidding ciphertext according to the private key certificate. By adopting the scheme, the security of the private key certificate can be effectively ensured.
Owner:光奕科数据技术有限公司

Decentralized electronic academic certificate checking method and system

ActiveCN110955699AAddressing the risks of centralizationImprove securityDatabase distribution/replicationCommercePlaintextInternet privacy
The invention relates to a decentralized electronic academic certificate checking method and system, belongs to the technical field of electronic academic certificate acquisition, and solves the problem of electronic academic certificate checking. The method comprises the following steps: acquiring authorization for checking an electronic academic certificate of a student from a student terminal;requesting electronic academic certificate plaintext data from a school electronic academic certificate service platform; receiving electronic academic certificate plaintext data sent in a point-to-point manner after being authorized and verified by the school electronic academic certificate service platform; sending a request for checking the digital fingerprint of the electronic academic certificate on the block chain to an electronic academic certificate alliance block chain, and obtaining the digital fingerprint of the electronic academic certificate on the block chain after authorizationverification; and checking the authenticity of the plaintext data of the electronic academic certificate according to the digital fingerprint on the blockchain. According to the invention, decentralization is realized, an application mode of a traditional centralized educational background authentication platform based on data collection is changed, the risk of electronic academic certificate plaintext data uploading is solved, and the security is improved.
Owner:YGSOFT INC

Decentralized identity authentication system based on block chain

ActiveCN113259311AReduce the risk of fraudulent useComplete and secure authentication processKey distribution for secure communicationPublic key for secure communicationEngineeringAuthentication system
The invention provides a decentralized identity authentication system based on a block chain. The decentralized identity authentication system mainly solves the problems that in the prior art, user identity information is likely to be illegally used and leaked, and the system stability is poor. The system comprises a plurality of server nodes with the same function and power, namely authentication nodes, and each authentication node comprises an identity information acquisition module, a real name authentication module, a data storage module, an identity information signature module and an access verification module. The identity information acquisition module is responsible for acquiring identity registration information of a user, the real-name authentication module is responsible for performing real-name authentication and encryption on the identity registration information of the user, the data storage module is used for storing the encrypted identity information of the user by adopting a block + chain structure, and the identity information signature module is responsible for acquiring identity signature information of the user; and the access verification module is responsible for performing access verification on the identity signature module of the user. According to the invention, the security and stability of the decentralized identity authentication system are improved, and the method can be used for computers and computer networks.
Owner:XIDIAN UNIV

Biological recognition payment method and device, gateway equipment and storage medium

The invention provides a biological recognition payment method and device, gateway equipment and a storage medium, and relates to the field of data processing. The biometric identification payment method comprises: receiving a biometric identification routing payment request message, wherein the biometric identification routing payment request message comprises a first biometric identification payment group token and first biometric characteristic data, and the first biometric identification payment group token is used for representing that an initiating user of the biometric identification routing payment request message has biometric identification payment permission in the first group; determining a first group according to the first biometric identification payment group token, and performing biometric identification by using the first biometric characteristic data and a biometric characteristic database corresponding to the first group to obtain a biometric identification result;and sending the biological recognition result to payment equipment, so that the payment equipment initiates a payment process according to the biological recognition result. By means of the technicalscheme, the safety of biological recognition payment of the user can be improved.
Owner:CHINA UNIONPAY

Intelligent door lock control method, intelligent door lock and storage medium

The invention discloses an intelligent door lock control method, which comprises the steps of: receiving a first password input based on an intelligent door lock, wherein the first password is equipment identification information, uploaded by a wireless communication module in a power supply state, of the intelligent door lock received by a server, searching a first encryption factor matched withthe equipment identification information in a database, and then generating a first password based on the first encryption factor and a current timestamp; acquiring a second encryption factor stored in a wireless communication module, and generating a second password according to the current timestamp and the second encryption factor; and when the first password is consistent with the second password, controlling the intelligent door lock to execute an unlocking operation. The invention further discloses an intelligent door lock and a computer readable storage medium. Only the equipment identification information is interacted through the wireless network, the encryption factors can be prevented from being hijacked by the network, password leakage can be avoided by generating an unlockingpassword through the current timestamp and the encryption factor, and the safety of the intelligent door lock is improved.
Owner:SHENZHEN TCL NEW-TECH CO LTD

Decentralized electronic education background management system and method

The invention relates to a decentralized electronic education background management system and method, and belongs to the technical field of electronic education background certificate acquisition, solving the problems of electronic education background certificate application and inspection. The decentralized electronic education background management system comprises an electronic education background alliance block chain and a client, wherein the electronic education background alliance block chain processes the electronic education background certificate application and check request and performs uplink storage on the electronic education background application data; and the client establishes connection with the electronic education background alliance block chain, initiates an electronic educational background application request to the electronic educational background alliance block chain, and acquires electronic educational background plaintext data from school block chain nodes in the electronic education background alliance block chain in a point-to-point manner, or initiates an electronic education background check request to the electronic education background allianceblock chain, and judges the authenticity of the electronic education background. According to the decentralized electronic education background management system, decentralization is realized, and anapplication mode of a traditional centralized education background authentication platform based on data collection is changed, so that the risk of data centralization is solved, and the security isimproved.
Owner:YGSOFT INC

Secure transmission method and device, computer equipment and storage medium

The invention relates to the technical field of computer network security, and provides a secure transmission method and device, computer equipment and a storage medium. The method comprises: a client receives an AES key and an RSA public key sent by a server, the AES key being generated by the server according to a temporary token and having a period of validity; encrypting the transmission task data according to the AES key to obtain encrypted data; encrypting the AES secret key according to the RSA public key to obtain an encrypted secret key; and packaging the encrypted data and the encryption key to obtain a transmission data packet, and sending the transmission data packet to a server side. According to the method, the server side encrypts the transmission task data according to the AES secret key generated by the temporary token, the token is temporarily generated by the server side, the timeliness of the AES secret key generated according to the temporary token is limited, the risk that the secret key is leaked is reduced, the AES secret key is encrypted according to the RSA public key, and the encryption efficiency is improved. And the security of the transmission task data and the security of the key are ensured.
Owner:PING AN PENSION INSURANCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products