Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

38results about How to "Solve untrustworthy" patented technology

Floating vehicle information processing method under parallel road network structure

The invention relates to a method for processing the information of float cars under the structure of a parallel road network, which is mainly applied to the service field of the intelligent dynamic traffic information. The method comprises the steps: step 1, an SVM (Support Vector Machine) sorter is adopted to judge the matching relationship between sampling points and roads, and map match is carried out; step 2, according to map match information, a heuristic route deduction algorithm is adopted to deduce possible running routes of a car, and according to the properties of road chains contained in the routes, whether the car runs in the structure of a parallel road network or not is judged; the shortest running route or a main running route and a subsidiary running route are selectively output in different circumstances, and the reliability of average running speed information provided by the car is estimated; step 3, the D-S (Dempster-Shafer) evidence reasoning theory based on classification is adopted to merge road condition information provided by all the float cars passing by a certain road chain in a current period and consider the reliability of the road condition information in a merging process so as to obtain the mathematical expectations of the average speed and the travel time of the float cars passing by the road chain in the current period. On the basis that the data quality of the prior float cars is kept unchanged, the invention realizes the acquisition of the real-time dynamic traffic information under the structure of a parallel road network.
Owner:BEIHANG UNIV

Network electron evidence processing system and processing method

The invention discloses a network electron evidence processing system and a processing method; the processing system comprises a main control end, an access server, a controlled end remotely connected with the main control end, a cleanness check module, a screen recording module, a file recording module, a digital signature module, an evidence storage module, a system reduction module, and a testify module; the access server, the controlled end, the cleanness check module, the screen recording module, the file recording module, the digital signature module, the system reduction module and the testify module are respectively under a third party monitoring environment. The processing method comprises the following steps: a user uses the main control end to remotely control the controlled end to visit the internet; simultaneously the screen recording module carries out screen recording; the third party uses the digital signature module to do digital signature on evidence obtaining files, and stores the files; when needing testify, the testify module can do integrity verification for the evidence with digital signature, and provides a corresponding report. The evidence obtaining, evidence storage and a testifying process are witnessed by the third party, so a user networking real process can be restored.
Owner:上海人科数据科技有限公司

Method and system for achieving SSH protocol based on post-quantum key exchange

The invention belongs to the technical field of information, and particularly relates to a method and system for achieving SSH protocol based on post-quantum key exchange. The method comprises the steps of a client and a server respectively calculating a public and private key pair; calculating a temporary session public key of the client, and sending the client public key and the client temporarysession public key to the server; the server performing identity verification on the client; calculating a temporary session public key of the server; calculating a temporary session variable of theserver and a temporary session error eliminating variable, the server sharing secret key initial seeds; the server generating a final server sharing secret key of the conversation through the post-quantum algorithm; the client side verifying the identity of the server according to the public key of the server; the client passes the identity identification of the server, calculating the temporary session variables of the client and the initial seed of the shared secret key of the client; and the client side using a post-quantum algorithm to generate a final client shared secret key of the conversation. According to the method and the system, the attack of the quantum computer can be effectively resisted, and the safety of the network is ensured.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Method and device for preventing information tampering

The invention provides a method and device for preventing information tampering. The method and the device are used for solving the problem that information acquired by a server is untrusted due to the fact that terminal position information can be tampered in the prior art. The method comprises the steps: receiving identification information sent by an application server, and applying a public key and a first signature, wherein the identification information is identification information of an equipment terminal, the application public key is generated by the equipment terminal and sent to the application server, the first signature is obtained by the equipment terminal by using an equipment private key to sign the application public key in a trusted execution environment, and the information stored in the trusted execution environment cannot be modified by an untrusted application program; searching a public key corresponding to the equipment private key according to the identification information to obtain the equipment public key which corresponds to the equipment private key stored in the equipment terminal; and sending a verification result to the application server if the first signature is verified successfully by using the device public key.
Owner:SICHUAN PANOVASIC TECH

Federal learning method and system based on block chain and trusted execution environment

ActiveCN113837761AHigh Confidence VerificationPrevent model trainingMachine learningProtocol authorisationChain networkMachine learning
The invention relates to a federated learning method and system based on a block chain and a trusted execution environment, and belongs to the technical field of artificial intelligence machine learning. A block chain and a trusted execution environment technology are combined, and in a task collection stage, a task owner broadcasts and initiates a crowdsourcing model training task in a block chain network. After the task is received, the node meeting the requirement applies to join a participant contract, and a task publisher randomly selects participants meeting the training requirement number from all applicants and issues the task. The selected participant locally trains the model, and meanwhile, in the TEE environment of the selected participant, the correctness proof of model training is generated by comparing whether the Hash values updated by the model are consistent or not. After all the models are trained and updated, the participants send updated models and certificates to an aggregation contract for model aggregation and verification, and corresponding rewards are issued to the participating nodes after verification is passed. High-confidence verification is realized, and the problem that training participants are not credible is solved.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Big-data ownership determination method, electronic device, storage medium and system

A big-data ownership determination method includes: dividing the big data for ownership determination into data blocks by a data source provider, calculating an authenticator of the data blocks, and signing the identifier of the big data for ownership determination; sending the data blocks, the data block authenticator and the big data identifier signature to an audit center by a data source provider; verifying the correctness of the signature of the big data identifier through a public key, recovering the identifier of the big data for ownership determination, and sending the evidence challenge request to the data source supplier by the audit center; verifying the evidence of the data source provider through bilinear pairing by the audit center, and generating a watermark by a watermark center and embedding the watermark into the data blocks; generating transactions and sending them to data source provider by the audit center and the watermark center; signing the transaction by the data source provider and sending the signed transaction to the block chain ownership registration commercial network to register the ownership information. The invention also relates to a device, a medium and a big-data ownership determination system. The invention guarantees the fairness, integrity and non-deception of the right determination.
Owner:ZHEJIANG JIESHANG ARTIFICIAL INTELLIGENCE RES & DEV CO LTD

Authentication method of three-dimensional model file based on secret sharing in cloud environment

The invention provides an authentication method for a three-dimensional model file based on secret sharing in a cloud environment, which comprises the following steps of constructing a secret polynomial by adopting a Lagrange interpolation polynomial, generating the secret fragments from a source file, and transmitting and storing the secret fragments in a plurality of secret participants in a distributed manner; taking the source file and the secret fragments as the original structure carriers, respectively generating the digital abstracts from the secret fragments of the source file by utilizing an SM3 hash algorithm, and uploading the digital abstracts generated by the secret fragments to a cloud in a distributed manner; and recovering the digital digest of the three-dimensional model file based on a (k, n) threshold secret sharing method of Shamir, and performing consistency verification on the digital digest of the three-dimensional model file before encryption and after recovery.The invisibility, robustness and analysis resistance of the method are improved, and the fraudulent behaviors during the secret sharing process are effectively prevented. The method has the good performance at the aspect of protecting the integrity of the file, and particularly has the obvious advantages at the aspect of efficiency.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Multi-backup secure deletion method and system based on blockchain

The invention discloses a multi-backup secure deletion method and system based on a blockchain, and the method comprises the following steps: setting a backup number and a corresponding backup addressthrough a cloud server after the initialization of the system and the generation of a secret key, transmitting the backup number and the corresponding backup address to a data owner, and generating apre-deletion sequence; encrypting a file by using different keys to generate a plurality of ciphertext backups, and generating an index according to keywords in the file; generating, by the data owner, preparatory integrity and delete evidences; in a ciphertext query stage, calculating, by a user, a trap door and uploading the trap door to a smart contract, and calculating, by the smart contract,a corresponding decryption key and querying a file number; sending, by the cloud server, a ciphertext backup to the user according to the file number, and decrypting, by the user, the ciphertext by using a decryption key; in a deleting stage, sending a deleting request to a cloud server, and deleting, by the cloud server, all backups of the corresponding file according to the request, generatingdeleting evidences, sending the evidences to the data owner and storing the evidences into the blockchain; and verifying, by the data owner, whether the cloud server deletes the evidences according tothe received evidences, and tracking the corresponding responsibility of the cloud server and the user according to the evidences of the evidence chain. According to the method, the requirements of cloud data sharing and safe deletion can be well met, and searchable encryption is provided for valid users.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Electronic educational background certificate verification method based on alliance blockchain platform

The invention discloses an electronic educational certificate verification method based on an alliance blockchain platform. The method comprises a step of issuing an electronic educational certificate based on an alliance blockchain; a step of verifying the electronic education background certificate based on the alliance blockchain; a step of generating and storing a distributed SSL certificate based on an alliance blockchain; and a step of distributed SSL certificate verification based on the alliance blockchain. According to the invention, the distributed storage of the electronic educational certificate is realized by combining the asymmetric encryption and the blockchain technology, so the problems that the credibility of the electronic certificate is insufficient, the certificate is easy to counterfeit and the like can be solved, and the security of the certificate platform is improved; on the other hand, a traditional tree structure CA is replaced with a distributed CA, distributed generation and verification of the SSL certificate are achieved, and the problems that a centralized database is high in risk, a trusted mechanism may be untrusted, and the certificate is illegally revoked can be solved; therefore, the method is high in reliability, good in safety and easy to implement.
Owner:CENT SOUTH UNIV

Privacy protection machine learning reasoning method and system based on secure multi-party computing

The invention belongs to the field of data security and the technical field of cryptography application, and discloses a privacy protection machine learning reasoning method and system based on secure multi-party computation.The privacy protection machine learning reasoning method based on secure multi-party computation.The privacy protection machine learning reasoning method based on secure multi-party computationcomprises the steps that a service provider commits a machine learning model provided by the service provider; generating a label to ensure one-to-one binding of the label and the model; the model is limited by using the label to ensure that the model is not changed after the user selects the label; before a user starts machine learning reasoning, verifying whether the selected label is changed or not by using zero-knowledge proof; and finally, the security of the calculation process is ensured by using a security calculation framework. According to the method, the characteristics that the commitment cannot be changed and zero knowledge proves zero knowledge are fully utilized, no trusted third party participates in the whole service process, that is, no third party masters the data of both parties at the same time, and the problem that the third party is not trusted is fundamentally solved.
Owner:XIDIAN UNIV

A credible traceability method and system for tangible commodities

This application discloses a credible tangible commodity traceability method and system, including: sending a registration account request of the source manufacturer platform to a supervision platform; authenticating the registration account request and manufacturer qualification; if the authentication is passed, encrypting the qualification certificate and identifying the source The manufacturer platform issues the qualification certificate; generates the trusted traceability source code corresponding to each tangible product; sends the distribution qualification request to the source manufacturer platform and the supervision platform in turn; verifies the distribution qualification request; ; Store each tangible commodity on the chain during the circulation and transaction process of the source manufacturer platform and the distribution platform. The supervision platform in this scheme is composed of multiple blockchain nodes that are pre-endowed with various supervision functions. During the commodity transaction process, all the processes of commodity and traceability source circulation are stored in the supervision platform. Due to its decentralization and non-tampering , forming a source of trustworthy traceability, which solves the problem of untrustworthiness in the process of product traceability.
Owner:AOWEI INFORMATION TECH (JIANGSU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products