Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

83results about How to "Tamper-proof" patented technology

Electronic evidence preservation system and method based on block chain technology

The invention discloses an electronic evidence preservation system and method based on the block chain technology. The preservation system comprises an evidence storage terminal and a block chain network. The evidence storage terminal comprises a hash operation module and an electronic signature module. The electronic data are uploaded to the evidence storage terminal, the evidence storage terminal performs hash operation on the uploaded electronic data to generate unique feature data of a fixed length of original data; then private key signature is performed on the generated data by using theasymmetric encryption technology, and the generated data are sent to the block chain network; and the block chain network performs primary consensus on the uploaded data and packs the uploaded data into blocks, and synchronously sends the blocks to nodes in the network for distributed storage. By establishing an evidence storage alliance by using the block chain technology, the electronic evidence preservation system has the characteristics of digitalized encryption, centralized grading, anti-tampering, data zero loss and so on. Each node in the block chain can preserve a complete block chaindata copy and witness the chain status of the blocks, so that the centralization risk can be effectively avoided.
Owner:SHENZHEN XIEWANG TECH CO LTD

Method and system for controlling depositing and withdrawing safety based on safety core

The invention discloses a method and a system for controlling depositing and withdrawing security based on a security core. A security chip is arranged in a depositing and withdrawing core and put in the safe case of an automatic teller machine. The core safety chip is called the security core for short; the security core communicates with an automatic teller machine pre-system (ATMP); the safe communication of the security core with the ATMP is realized by virtue of certificate issuing and key exchange; the ATMP authorizes the core to dispense cashes, and meanwhile, checks the amount deposited. According to the method and the system for controlling the depositing and withdrawing security based on the security core, due to the safe communication of the security core and the ATMP, the identity is authenticated, an instruction sent out is verified legally and a message sent out is encrypted, and then the ATMP authorizes the core to dispense cashes and checks the amount deposited; the method and the system have the advantages that authentication and encryption/decryption can be effectively authenticated to achieve integrity protection, prevent tampering and prevent replay attack protection, and therefore, the security of the ATM is improved.
Owner:HUNAN GREATWALL INFORMATION FINANCIAL EQUIP

Decentralized image copyright protection system and method with infringement real-time detection

The invention relates to the technical field of copyright image protection, and provides a decentralized image copyright protection system and method with infringement real-time detection, and the method comprises the following steps of (1), enabling a registered user to upload an image through a client, and enabling an SIFT image feature extraction algorithm in the system to carry out the featuredata collection on the uploaded image; (2) extracting the invariant characteristics, such as visual angle, translation, affine, brightness, rotation, etc., of an existing copyright image by a user through an SIFT algorithm to form a local feature vector set of the image, and taking the local feature vector set as a registered image feature data set; (3) carrying out distributed storage on the feature data sets in the steps (1) and (2) by utilizing an IPFS (Internet Protocol File System), and constructing a network transmission protocol for persistent and distributed storage and file sharing;and (4) performing comparative analysis and calculation, and judging that the image does not accord with the condition of forming a new work. The system and the method provided by the invention have the characteristics of being tamper-proofing, realizing the high safety, permanent preservation and decentralization, being able to trace, being low in cost, etc.
Owner:施建锋

Quantum voting system and method based on quantum teleportation

The invention discloses a quantum voting system and method based on quantum teleportation. The quantum voting system comprises a voter Alice, a voting management organization CA, a supervisor Charlie,a teller Bob and four OADMs, wherein the voter Alice comprises a first a quantum key server, a voting terminal and a first quantum state measurement device; the voting management organization CA comprises a second quantum key server, an authentication terminal, an entanglement source and a first Bell state measurement device; the supervisor Charlie comprises a third quantum key server, a displayterminal and a second Bell state measurement device; and the teller Bob comprises a fourth quantum key server, a computer terminal, a unitary transformation device and a second quantum state measurement device. The quantum voting system disclosed by the invention ensures the security of the whole voting process by the coherence of entangled particles, a QKD protocol, a one-time-one-encryption encryption algorithm and quantum channel eavesdropping detection. In addition, the quantum voting system disclosed by the invention transmits the classical and quantum information through different wavelengths in the same optical fiber, so that the cost of an application can be greatly reduced, and the practicability is improved
Owner:GUANGDONG INCUBATOR TECH DEV CO LTD

Industrial Internet identifier processing method and device based on block chain

The embodiment of the invention provides an industrial Internet identifier processing method and device based on a block chain, and the method comprises the steps: obtaining an operation request froma client for operating a product identifier, the operation request carrying the product identifier of an enterprise, the mapping data corresponding to the product identifier, and the operation type ofthe enterprise for the operation of the data; based on the operation request, obtaining record data of the enterprise from the block chain; comparing the identification in the record data with the product identification, and verifying that the product identification is passed; comparing the operation authority and the operation type in the record data, and determining that the enterprise has theoperation authority; and returning a response of the product identification operation result to the client. In this way, the block chain has the tamper-proof characteristic, the reliability of storedinformation can be guaranteed, and safe operation service is provided; through the verification identifier and the verification operation authority, the data security can also be improved through multiple verification, so that the security of the industrial Internet is ensured.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Electronic certificate security management method and system

The invention discloses an electronic certificate security management method and system. The electronic certificate security management method comprises the following steps: issuing electronic certificate signing and issuing application; authenticating the receiving end, generating the electronic certificate, and issuing the electronic certificate and the signing and issuing information to the security basic module of electronic certificate; obtaining the electronic certificate and the electronic certificate signing and issuing results from the electronic certificate security basic module; issuing the electronic certificate authentication application to the electronic certificate security basic module; authenticating the receiving end by means of the electronic certificate security basic module, issuing the authentication confirmation information to the electronic certificate security basic module, and waiting for the receiver to confirm; confirming the authentication confirmation information by the receiving end; and obtaining the authentication results of the electronic certificate from the electronic certificate security basic module. By means of the scheme disclosed by the invention, the defects of the electronic certificate issuing, authentication and supervision platform in the prior art in the aspects of cost, safety and convenience can be solved.
Owner:北京明朝万达科技股份有限公司

Method and system for ordering business

ActiveCN106302698AEasy to implement two-way authenticationEliminate the possibility of sending informationMessaging/mailboxes/announcementsTransmissionThird partyComputer terminal
The invention provides a method and a system for ordering business, which have the advantages of preventing the third party software from intercepting, and preventing users from being replied by personators. The method comprises the following steps that: a security service platform device generates a business invitation message according to business invitation information sent by a business system of a service supplier, and then sends the business invitation message to a security service application device through an SMS channel; the security service application device parses the received business invitation message, and then sends an active command to a target mobile terminal according to parsing results so that the target mobile terminal presents the business invitation message to the users, and the security service application device receives a business ordering instruction sent by the target mobile terminal; the security service application device encrypts and encapsulates the business ordering instruction into a business ordering message, and then sends the business ordering message to the security service platform device through the SMS channel, and the security service platform device decrypts and parses the business ordering message, and then sends the parsing result of the business ordering message to the business system of the service supplier.
Owner:尹子栋

Edge intelligent calculation method based on block chain and edge intelligent system

The invention discloses an edge intelligent calculation method based on a block chain and an edge intelligent system, belongs to edge intelligence, and aims to solve the technical problem of how to apply a block chain technology to edge intelligent calculation to ensure that data is correct and complete and ensure the legality of transmitted data. The calculation method comprises the following steps: configuring connection between a gateway and a main node and connection between the main node and a working node through the gateway; the main node generating a key pair, adding the block information to a locally stored block chain of the main node and publishing the block information to the outside, and each working node adding the verified block information to the locally stored block chain;and the main node sending the instruction data and the specified private key to a related working node, and the working node calling an artificial intelligence module to analyze the equipment acquisition data to obtain an analysis report and returning the analysis report to the gateway through the working node. The system comprises at least one gateway and at least one edge device, and the edge device comprises a main node and at least one working node.
Owner:QILU UNIV OF TECH

Digital watermark physical-electronic integrated stamp processing system

The invention discloses a digital watermark physical-electronic integrated stamp processing system which comprises a stamp making equipment subsystem, a digital watermark electronic stamp subsystem and a digital watermark stamp recording checking authentication subsystem, wherein the stamp making equipment subsystem consists of an impression generation module, a digital watermark generation embedding module and a stamp engraving module arranged in stamp engraving equipment; the digital watermark electronic stamp subsystem is arranged in a background server and consists of an electronic stamp module, a special module for an electronic environment digital watermark and a digital watermark printing module; and the digital watermark stamp recording checking authentication subsystem consists ofa stamp imprint impression recording module, an impression checking comparison module and a digital watermark authentication module. By operation, the system can implement digital watermark system control on the whole process of engraving and stamping of a physical stamp, electronic signature, printing and network access, storage and checking of physical and electronic stamps and an imprint, andidentifies true or false by determining whether the stamp, the imprint and the impression contain digital watermark information. Problems of identifying true or false of information, identity determination and responsibility confirmation in the online transaction and information exchange can be solved. Double counterfeiting prevention of an electronic document and a paper document (printed) can beimplemented.
Owner:CHENGDU YUFEI INFORMATION ENG

Method for mobile electronic signature

The invention discloses a method for a mobile electronic signature. The method comprises the following steps that: a server sends a short message requesting an approval signature to a terminal; the terminal receives the approval signature short message and displays the content of the approval signature short message on a display screen; the terminal receives the approving content inputted by an approver; the terminal reads the data of the characteristic factor of the terminal, and works out the first encrypted data by taking the data and the approving content as variables of an encryption algorithm; the terminal answers and sends the first encrypted data and the approving content to the server; the server receives the first encrypted data and the approving content; the server reads the stored data of the characteristic factor, and works out the second encrypted data by taking the data and the approving content as variables of the encryption algorithm; and whether the first encrypted data and the second encrypted data are the same is judged, if so, the approval signature is confirmed and stored, otherwise the signature is the unapproved signature and neglected. The method has the advantages that the signature approver can give particular written instructions or assessments and examine the correctness of the approving content according to the content to be approved.
Owner:XIAMEN STELCOM INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products