Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

62results about How to "The certification process is reliable" patented technology

Short message service authenticated encryption system and method based on digital certificate

The invention relates to a short message service (SMS) authenticated encryption system and method based on a digital certificate. The SMS authenticated encryption system comprises an SMS authentication center, an authenticated mechanism SMS center and a mobile phone. A digital certificate management service unit of the SMS authentication center provides procedures generated by the unique digital certificate of the authenticated mechanism according to the user identification, thus ensuring the safety of the digital certificate. The digital certificate is used for safety of two-way SMS communication. In the invention, the way that a plurality of different receivers respectively carry out encrypted transmission according to own keys based on the SMS numbers can be realized by only installing an SMS authentication and encryption procedure in the common mobile phone as the SMS authentication and encryption client. The invention can authenticate the received SMS contents, ensure the sent contents not to be falsified and ensure the authenticity of the senders, has good confidentiality, changes less existing SMS systems, occupies less resources, is easy to realize and can be applied to such fields as financial transactions, etc.
Owner:SHENZHEN ALL IN ONE NEW TECH LTD

GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method

The invention provides a GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method. Ring the sharing period, the sub-band of a secret image LL is scrambled, and the coefficients of bits are backed up by different numbers according to the degrees of importance thereof. Finally, a backup image of the same size with the secret image is formed. After that, secret pixels, backup pixels and the corresponding dual-authentication information are shared in the form of (K, N) in the GF (27) finite field. Based on the optimized LSB method, the shared information and primary authentication bits are embedded into the lower-order bits of a bunker block to maximally ensure the visual quality of distributed bunker images. During the reconstruction process, the shared information for recovery is screened through the primary authentication step. After that, the reliability of recovered secret pixels and the reliability of recovered backup pixels are verified through the secondary authentication step, so that an authentication image, a backup image and a preliminary secret image are formed. In combination with the secret image, a recovered reference image and the authentication image, the non-pass pixels of the secret image during the authentication process are subjected to polynomial fitting repair and alternative repair, so that the repair quality after the attack is better.
Owner:SHAANXI NORMAL UNIV

Product traceability method and system based on double block chains

The embodiment of the invention provides a product traceability method and system based on double block chains, being characterized by processing existing cloud computing data and server resources ofan enterprise, constructing a double-blockchain fusion model based on a private chain and a public chain by combining a high-efficiency private chain mode and a cross-chain technology, effectively fusing the cloud computing data and the block chain, and extracting cloud computing data and recording hash values of the cloud computing data into a private chain, and the private chain traceability necessary data is uploaded to the public chain, so as to ensure data tampering prevention and subsequent verification, thus realizing high-efficiency interaction between cloud computing data and on-chaindata, reducing the difficulty of deploying a blockchain system by an enterprise, finally realizing intelligent generation of product traceability information, and meanwhile, eliminating human factorsof information circulation among main bodies of a supply chain, so that traceability information authentication which is more accurate, and more complete and more reliable than traditional product traceability is generated.
Owner:WUHAN UNIV OF TECH

Two-factor authentication method and two-factor authentication device for wireless sensor network and network comprising two-factor authentication device

The invention discloses a two-factor authentication method and a two-factor authentication device for a wireless sensor network and a network comprising the two-factor authentication device. The two-factor authentication device comprises a gateway node, an intelligent terminal, a sensor node and a two-factor authentication module, and the gateway node, the intelligent terminal and the sensor node are communicated with each other. The Merkle hash tree based two-factor authentication method for the wireless sensor network is applied to the two-factor authentication module. The two-factor authentication method includes the steps of gateway pre-authentication: performing DoS (disk operating system)-attack resisting gateway pre-authentication on the basis of the Merkle hashtree; bidirectional authentication among gateway and sensor nodes: authenticating the sensor node by the gateway node after the sensor node finishes in authenticating an access request from the gateway node, wherein during bidirectional authentication, one-way hash is performed after connection with sensor node ID (identification) is established, so that personalized safety parameters for the sensor node are formed to resist attacks from gateway counterfeit and data counterfeit caused by leakage of the safety parameters. The invention further provides an interconnection computer network comprising the two-factor authentication device for the wireless sensor network.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI +1

Method for realizing security key authentication of pure electric vehicle

The invention discloses a method for realizing the security key authentication of a pure electric vehicle. The method comprises the steps: waking up a smart key, feeding back a high-frequency key coordinate signal and a unique key ID of the smart key to a vehicle body controller; generating a first random number by the vehicle body controller and encrypting the Key ID, the first random number anda low-frequency wake-up signal by the vehicle body controller and the smart key based on an HITAG2 algorithm; completing authentication of the vehicle body controller and the smart key under the condition of consistence of the vehicle body controller and a ciphertext obtained by smart key encryption; generating a second random number Key and a third random number Key1 by the vehicle body controller and sending the second random number Key and the third random number Key1 to an overall vehicle controller; generating a fourth random number Key2 and a fifth random number Key3 by the overall vehicle controller and replying the fourth random number Key2 and the fifth random number Key3 to the vehicle body controller; and carrying out two-way authentication by the vehicle body controller and theoverall vehicle controller by using the second random number Key, the third random number Key1, the fourth random number Key2, the fifth random number Key3, and a conventional number A to realize starting of a pure electric vehicle.
Owner:浙江新吉奥汽车有限公司

Satellite management method based on blockchain and physical unclonable function

The invention discloses a satellite management method based on a blockchain and a physical unclonable function. The method comprises the steps of dividing a plurality of satellite virtual trust regions, building an intra-domain blockchain network in each satellite virtual trust region, and building an inter-domain blockchain network between the satellite virtual trust regions; setting a domain main satellite in intra-domain satellites contained in each satellite virtual trust area; enabling the domain main satellite to create and deploy a first intelligent contract of the intra-domain block chain network so as to record identity authentication data of an out-domain satellite to be added into the satellite virtual trust area, service transaction data of the out-domain satellite and the intra-domain satellite and power withdrawal data of the out-domain satellite; and enabling a ground workstation to create and deploy a second smart contract of the inter-domain blockchain network so as torecord identity authentication data and service transaction data between the satellite virtual trust areas. According to the method, the performance defects of a traditional satellite network can beovercome, and better safety performance can be obtained.
Owner:GUANGXI UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products