Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "Solve the problem of tampering" patented technology

Device, method and system for preventing web page from being distorted

The invention discloses a device for preventing a web page from being distorted, wherein in the device for preventing the web page from being distorted, a network data pack processing device intercepts a network data pack returned from a network server, a page restoring device receives the network data pack intercepted by the network data pack processing device and restores the network data pack into the web page content, a page content comparing unit compares the web page content restored by the page restoring device with a pre-backup web page content corresponding to the restored web page content to determine whether the restored web page content is distorted and notifies a network server takeover device about the information on the distortion of the web page when the restored web page content is determined to be distorted, and when receiving the information on the distortion of the web page, the network server takeover device returns the pre-backup web page content corresponding to the restored web page content to external network users. The invention also provides a method used in the device for preventing the web page from being distorted, and a system using the device for preventing the web page from being distorted.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD

Method for establishing machine learning model to check webpage hidden links through domain identification and theme identification

ActiveCN107566391AImprove the problem of poor recognition effectSolve the problem of tamperingComputing modelsTransmissionFeature extractionDomain analysis
The invention provides a method for establishing a machine learning model to check webpage hidden links through domain identification and theme identification. The method comprises the steps of collecting a great number of webpage source codes which are marked as the webpage source codes comprising hidden links and the webpage source codes marked as the normal webpage source codes, and forming a training set based on the webpage source codes; extracting a risk text, risk degree, theme difference degree, a theme, a risk text vector, a risk text abnormal probability and the risk text length in each web page source code through suspicious domain identification, sensitive domain identification, secure domain identification, all-domain analysis and theme identification; carrying out model training on characteristic data of all web page source codes in the training set through utilization of a machine learning algorithm, thereby obtaining a classification distinguishing model; and importingthe characteristic data of to-be-predicted web page source codes into the classification distinguishing model, thereby obtaining a result of whether the to-be-predicted web page source codes comprisethe hidden links or not. According to the method, the highly mixed hidden link code identification effect is good, the feature extraction is relatively complete and the problem that a traditional method cannot accurately distinguish the hidden links and page tampering can be solved well.
Owner:上海斗象信息科技有限公司

Covert communication method, device and system based on blockchain and encryption technology

The invention discloses a covert communication method, device and system based on a blockchain and an encryption technology, and the method comprises the steps that a data sender carries out the preprocessing of original communication data M through employing the symmetric encryption technology, obtains encrypted data M', and converts the encrypted data M' into a binary bit stream B_M'as transmission data; the data sender transmits the transmission data by adopting a P2P network of a block chain; the transmission step comprises: constructing a block chain address library, encoding a block chain address in the block chain address library, and sending the transmission data according to the encoded block chain address; and the data receiver receives and extracts the transmission data, converts the transmission data into encrypted data M', and decrypts the encrypted data M' to obtain original communication data M. According to the technical scheme, the problems that communication behaviorsand communication contents are easy to identify, information leakage is caused due to the fact that communication data is transmitted in a plaintext form, the communication data is easy to hijack andtamper, and a communication tool is centralized are solved.
Owner:南京通付盾区块链科技有限公司 +1

Concrete quality tracing method based on block chain

The invention relates to the field of concrete quality traceability, and particularly discloses a concrete quality traceability method based on a block chain, and the method comprises the steps: a block chain system is constructed, a project is brought into the block chain system through a supervision mechanism, and a certificate is issued to an authenticated node; the concrete production user and the supervision project department input related information into a distributed account book through corresponding nodes; test piece manufacturing information is input into the RFID passive tag; and the detection unit checks the information in the RFID passive tag through the block chain system, and inputs the detection result into the distributed account book. According to the invention, the block chain technology is adopted to solve the ciphertext robbery problem caused by a single network channel and the data tampering problem caused by server centralization and data management centralization, and the block chain technology is combined with the RFID anti-counterfeiting technology, so that the data sharing is realized, the user can be effectively prevented from tampering the data, and the security of the supervision system is greatly improved.
Owner:CHONGQING UNIV

Information acquisition and early warning system of ultrasonic medical equipment

The invention relates to the technical field of information acquisition and early warning, and discloses an information acquisition and early warning system for ultrasonic medical equipment. The information acquisition and early warning system comprises a sensing device for acquiring various parameters of the ultrasonic medical equipment during working, intelligent monitoring equipment SME for monitoring various operating parameters of the ultrasonic medical equipment during working, a local server LSICEW on which a working parameter real-time monitoring system operates and an intelligent mobile phone SPi. A working parameter real-time monitoring system comprises a parameter monitoring module used for sending an instruction to the intelligent monitoring equipment SME, a parameter display module used for displaying operation parameter data, a parameter analysis module used for analyzing and judging whether all operation parameters are abnormal or not when the ultrasonic medical equipment works, an abnormal early warning module used for sending early warning information to the abnormal working condition of the ultrasonic medical equipment, and a central control module. According to the invention, the problems of how to monitor the ultrasonic medical equipment in real time and how to send out real-time early warning information for abnormal conditions of the ultrasonic medical equipment during working are solved.
Owner:马炎

Blockchain trusted storage execution hardware environment based on fused memory

The invention discloses a blockchain trusted storage execution hardware environment based on a fused memory, which comprises data acquisition, data transmission and data storage comprises a hardware environment carrying blockchain nodes, and is characterized in that the blockchain nodes comprise storage mechanism nodes and data pointing nodes; WP# write forbidding signals of a flash memory are controlled through hardware, and it is guaranteed that data in a protection area is written only once after a system is initialized and cannot be modified any more; and a cast segment page storage protection mechanism performs cast-type write protection on a flash memory space set by the upper and lower limit addresses, namely once the flash memory space is shaped, the flash memory space is written once. According to the blockchain trusted storage execution hardware environment based on the fused memory, hardware has an efficient read-write speed, and can store large-volume data; a built-in CPU processor is provided, an encryption algorithm can be written into the CPU processor, is independently packaged and can be used as a blockchain security node; from a hardware level, the data is writtenin once and read for multiple times, so that the integrity of the uploaded data is guaranteed and cannot be deleted.
Owner:深圳市微密科技有限公司

An anti-counterfeit verification method based on digital signature technology

The invention discloses an anti-counterfeit verification method based on digital signature technology, comprising: A. registering smart packaging on an anti-counterfeiting platform through an anti-counterfeiting APP and applying for a digital certificate of the smart packaging; Anti-counterfeiting anti-counterfeiting label; C. Obtain the anti-counterfeiting information of the smart packaging through the anti-counterfeiting APP and send it to the anti-counterfeiting platform for verification. If the smart packaging passes the verification, go to the next step; D. Activate the smart packaging and establish the relationship between the smart packaging and the product E. The smart packaging verifies the put-in commodity, and determines whether it is an associated commodity, and if so, controls the lock module to be locked; F. sets the unlocking data of the smart packaging, and the method of the present invention establishes the item and The corresponding relationship of packaging enables smart packaging to correctly perceive the packaged items, achieve the multi-party verification anti-counterfeiting packaging effect between the system, items, and packaging, and also realize unopened package verification and offline verification.
Owner:四川省数字证书认证管理中心有限公司

Domain recognition plus topic recognition to build a machine learning model to detect dark links in web pages

ActiveCN107566391BImprove the problem of poor recognition effectSolve the problem of tamperingComputing modelsTransmissionFeature extractionDomain analysis
The invention provides a method for establishing a machine learning model to check webpage hidden links through domain identification and theme identification. The method comprises the steps of collecting a great number of webpage source codes which are marked as the webpage source codes comprising hidden links and the webpage source codes marked as the normal webpage source codes, and forming a training set based on the webpage source codes; extracting a risk text, risk degree, theme difference degree, a theme, a risk text vector, a risk text abnormal probability and the risk text length in each web page source code through suspicious domain identification, sensitive domain identification, secure domain identification, all-domain analysis and theme identification; carrying out model training on characteristic data of all web page source codes in the training set through utilization of a machine learning algorithm, thereby obtaining a classification distinguishing model; and importingthe characteristic data of to-be-predicted web page source codes into the classification distinguishing model, thereby obtaining a result of whether the to-be-predicted web page source codes comprisethe hidden links or not. According to the method, the highly mixed hidden link code identification effect is good, the feature extraction is relatively complete and the problem that a traditional method cannot accurately distinguish the hidden links and page tampering can be solved well.
Owner:上海斗象信息科技有限公司

Container security execution method and device and storage medium

PendingCN114662092ASolve the isolation problem between containersSolve the mutual access problemPlatform integrity maintainanceWhitelistCode segment
The invention provides a container security execution method and device and a storage medium, and the method comprises the steps: building a main monitor and a plurality of sub-monitors based on an SGX, and carrying out the management of a container through the main monitor and the plurality of sub-monitors; the method comprises the following steps: in response to the first starting of a container system, carrying out integrity measurement on a structural file of the container system, calculating an integrity measurement value of the structural file of the container system, and storing the integrity measurement value as an integrity measurement base value of the container system to a main monitor. The problem that containers in the same Network Namespace can access each other is solved, the problem of isolation between the containers is solved, and malicious attack behaviors of untrusted containers are prevented by setting a container network white list and limiting the access capability of other containers to the running containers. The problems that the integrity and legality of a code segment and a stack function return address are verified when a container runs, the code segment is tampered when the container runs, and the stack function return address overflows are solved.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Bank USBKey certificate application tamper-proof protection method and system

The invention discloses a bank USBKey certificate application tamper-proof protection method and system. The method comprises the steps that S100, an online banking application calls a certificate application module and transmits certificate request parameters; S200, the certificate application module acquires online banking certificate purpose information in the certificate request parameters andsends a key pair generation instruction to the USBKey; s300, the USBKey generates a corresponding key pair according to the key pair generation instruction, and binds the key pair with online bankingcertificate purpose information; s400, the certificate application module sends a signature generation instruction to the USBKey; s500, the USBKey analyzes and acquires a public key and E-bank certificate purpose information in the certificate request information original text, and acquires the E-bank certificate purpose information bound with the key pair according to the public key; s600, the USBKey compares the E-bank certificate purpose information in the certificate request information original text with the E-bank certificate purpose information bound with the key pair; and S700, the certificate application module organizes certificate request data and returns the certificate request data to the online banking application. According to the invention, the problem that the online banking certificate is tampered in the certificate issuing process can be solved.
Owner:WATCHDATA SYST

Block chain-based judicial electronic delivery management method and system

ActiveCN113438090ASolve the problem of difficult deliveryShare high securityData processing applicationsUser identity/authority verificationInformation sharingEngineering
The invention provides a block chain-based judicial electronic delivery management method and system. The method comprises the following steps: 1, uploading a judicial document in an electronic format to a court system; 2, encrypting and storing the judicial document at a server side by using the identity label of the addressee; 3, the court system searching the matched address data according to the identity label of the addressee, and achieving the address information sharing; 4, sending the encrypted electronic judicial document to the party through the shared address information; 5, the party receiving the electronic judicial document and then returns a delivery receipt; 6, collecting electronic data in the electronic delivery process, constructing electronic evidence of the whole process behavior, and completing authenticity examination and evidence fixation; and 7, subjecting the fixed electronic evidence to uplink evidence storage for sharing and tracing of each court node. According to the invention, by adopting the information association fusion technology of the multi-source address base, the addressee is positioned to the greatest extent, and the problem of difficulty in delivery is solved.
Owner:SHANGHAI WANXIANG BLOCK CHAIN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products