Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

41results about How to "Unforgeable" patented technology

Certificateless multi-receiver signcryption method with multivariate-based cryptosystem

The invention discloses a certificateless multi-receiver signcryption method with a multivariate-based cryptosystem. The certificateless multi-receiver signcryption method is used for solving the technical problem of poor security of an existing certificateless signcryption method. The technical scheme includes that the method includes: firstly, using a key generation center to generate system parameters, and selecting a secure multivariable encryption algorithm to generate keys; and enabling a user U to obtain system private keys of the key generation center and generate the private keys to user keys prior to that a user Alice with the identity IDA sends signcryption messages to a user group L={ID1, ID2,...,IDt}, and accepting or refusing ciphertext sigma by means of un-signcryption. By the aid of the multivariate-based cryptosystem, high security of anti-quantum computation is achieved, and the certificateless multi-receiver signcryption method is still high in security facing attack of a quantum computer. Compared with the background art, the certificateless multi-receiver signcryption method is small in computation and high in security, has the advantages of completeness, confidentiality, unforgeability, forward security, backward security, receiver privacy protection and the like and is capable of resisting existing known attack.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Novel procuration signature and verification method based on integer factorization problems

The invention discloses a novel procuration signature and verification method based on integer factorization problems. The novel procuration signature and verification method based on the integer factorization problems includes the steps: before a network operates, firstly generating personal public keys and private keys by original signature people and procuration signature people, and issuing the public keys; when signature requests are provided, generating authorization letters by the original signature people, and calculating signature authorization based on a chameleon hash function and an ordinary digital signature algorithm, sending the signature authorization to the procuration signature people, carrying out validity verification on the received signature authorization by the procuration signature people, if the signature authorization is effective, generating the procuration signature based on collision property of the chameleon hash function, and digital signature does not need to be carried out on information, when a verifier receives the authorization letters and the procuration signature, firstly, verifying whether the authorization letters are effective or not, after the authorization letters are verified to be effective, and then verifying validity of the procuration signature. According to the application of the novel procuration signature and verification method based on the integer factorization problems, processing efficiency of the procuration signature is high, and the length of the procuration signature is short. The novel procuration signature and verification method based on the integer factorization problems is suitable for environments such as mobile networks and the wireless networks where computing power and network bandwidth are limited.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Product traceability system

InactiveCN108319998APromote transparency and claritySupport rights protectionCo-operative working arrangementsCommerceProduct processingClient-side
The invention discloses a product traceability system. The system comprises a traceability information acquisition client, a wireless communication module and a cloud platform; the cloud platform comprises a background information management module, a two-dimensional code generation module, a database and a traceability module; the background information management module enters product processingrelated information in advance; the traceability information acquisition client acquires traceability information and sends the traceability information to the cloud platform; the database is used for storing the traceability information of each process flow of a processing process and the traceability QR code labels of corresponding batch products; the traceability module is used for obtaining corresponding traceability information from the database according to the traceability QR code labels when receiving a traceability request sent by the scanning of the traceability QR codes by a user,and transmitting the traceability information to a user terminal; and therefore, traceability operation is completed. According to the product traceability system of the invention, a modern data storage transmission technology is additionally adopted on the basis of a product actual management process; and therefore, the requirements of safety management can be satisfied, the transparency and clearness of a production process can be promoted, and it is can be ensured that the traceability data of the whole process are authentic and unforgeable.
Owner:JIANGSU TIANZHAO PHARMA

Identity based aggregate signcryption method

The invention discloses an identify based aggregate signcryption method. The identify based aggregate signcryption method includes the following steps that (1) a key management center sets system public parameters and produces user keys; (2) each sending party signcrypts respective data to produce a signcryption text; (3) an aggregate party aggregates all signcryption texts to produce aggregated signcryption texts; (4) a receiving party verifies the aggregated signcryption texts. According to the identify based aggregate signcryption method, three parameters in the signcryption texts of each sending party are aggregated, and the data size of the entire signcryption texts is totally the same as that of a single signcryption text; meanwhile, the receiving party can achieve verification of all the signcryption texts only through once verification operation, and the calculated amount of the verification of all the signcryption texts is basically equivalent to that of the verification of the single signcryption text; confidentiality, integrality, and authentication can be simultaneously achieved in the aspect of safety; the defect of low efficiency caused by the fact that each sending party sends the signcryption texts and the receiving party verifies the signcryption texts one by one in traditional methods is overcome, and higher transmission efficiency and computational efficiency are achieved.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Registration system and registration method for full hardware terminal in cloud desktop system

The invention provides a registration system and a registration method for a full hardware terminal in a cloud desktop system. The registration system comprises a terminal identity information module, a terminal identity management module, a registration server and a registration information database; the terminal identity information module and the registration information database are both connected with the registration server; the terminal identity information module and the terminal identity management module are both connected with the registration information database; the terminal identity information module is positioned above terminal equipment, is composed of hardware of the terminal equipment as well as configuration and certification information stored inside the terminal equipment, and is used for authentication of the terminal equipment; the terminal identity management module is used for managing identity information, and is used for creating, registering, authenticating and managing terminal identity information. According to the system and the method provided by the invention, the registration of the terminal equipment and the storage of the configuration information of the terminal equipment are realized, so that the terminal equipment has unforgeability, and the safety and the reliability of the terminal equipment in the cloud desktop system are improved.
Owner:CETC CHINACLOUD INFORMATION TECH CO LTD

Blockchain medical data management method based on distributed attribute signature and system

ActiveCN109979550AAttribute validationDo not reveal identityDigital data protectionPatient-specific dataHash functionFinancial transaction
The invention discloses a blockchain medical data management method based on distributed attribute signature and a system. The method comprises the following steps of S1, generating a global parameterof the distributed attribute signature and selecting a Hash function; S2, producing a signature secret key and a verification secret key which correspond with each attribute by each attribute authority mechanism; S3, generating a signature secret key set which corresponds with the global identity identification and the attribute set of a user by the user; S4, after generating EHR data by the user, storing the signature in an off-chain database, performing address signature on the HER data, and issuing the address signature in the blockchain; and S5, firstly verifying the signature attribute of the address which is stored in an on-line transaction by the user, and finding the EHR in the off-chain database through the address and verifying the attribute of a data signature person. The blockchain medical data management method and the system have advantages of protecting identity information of the signature person, realizing EHR data safe sharing over different CDO systems, and settlinga problem of blockchain storage capacity limitation through an on-chain and off-chain coordinated storage mode.
Owner:INST OF INFORMATION ENG CAS

Public auditing method supporting composite data

The invention discloses a public auditing method supporting composite data, and relates to the field of data security in cloud computing. The method comprises the following steps: generating a publicand private key pair according to system parameters; generating a label for a single-user data block based on a private key of the single-user public and private key pair, and storing the label to a cloud server; based on the private key of a multi-user public and private key pair, generating a label for a data block generated by multi-user cooperation, and storing the label to the cloud server; an auditor generating challenge information and sending the challenge information to the cloud server; the cloud server finding corresponding data blocks and labels thereof according to the challenge information, generating response evidences and sending the response evidences to the auditor; and the auditor judging whether the data blocks are well stored according to the response evidences to finish auditing. According to the method, the number of participating members is not limited when the multi-user data is generated, the single-user data and the multi-user data can be audited at the sametime, data privacy protection and identity privacy protection are achieved in the auditing process, and identity tracing of a data block generator is achieved.
Owner:SOUTHWEST JIAOTONG UNIV

Intelligent Internet of Things equipment authentication method and system based on blockchain

The invention discloses an intelligent Internet of Things device authentication method and system based on a blockchain, and the method comprises the steps that equipment generates an identity label of the equipment based on a physical unclonable function, takes the identity label of the equipment as a public key of a searchable encryption algorithm, and generates a ciphertext; a registration center generates a private key of a searchable encryption algorithm corresponding to the equipment based on the smart contract and the distributed account book database, and distributes a public and private key pair of a group name and a ring signature algorithm to the equipment to complete registration of the equipment; an authentication center performs searchable encryption based on the identity label of the equipment by using an intelligent contract to realize personal login authentication of the equipment; and group login authentication of the equipment is realized based on a ring signature algorithm. According to the method, effective combined authentication can be implemented on the intelligent Internet of Things equipment, the intelligent contract is automatically executed, the problem of excessive resource consumption is reduced, the novel cryptographic algorithm is higher in calculation efficiency, and the safety of the system can be better ensured.
Owner:UNIV OF SCI & TECH BEIJING

Commodity anti-counterfeiting code batch generation method based on character string-to-picture encryption

The invention discloses a commodity anti-counterfeiting code batch generation method based on character string-to-picture encryption, and the method comprises the following steps: carrying out numeric data and 8-bit binary conversion of batch commodity identification codes representing the unique identity information of a certain batch of commodities, obtaining a binary sequence PB, and according to the number of the batch of commodities, obtaining the number of the batch of commodities, setting a commodity production serial number with a certain length; scrambling the sequence PB by using a chaotic signal, and filling layer by layer according to a self-defined three-dimensional binary matrix data hierarchical filling rule to generate a unified ciphertext picture; and generating different chaotic signals according to different production serial numbers of each commodity in the batch of commodities, and performing bitwise XOR operation on the chaotic signals and the unified ciphertext picture pixels in sequence, thereby generating anti-counterfeiting pictures of single commodities in batch, and further combining to generate the commodity anti-counterfeiting two-dimensional code. The commodity anti-counterfeiting code batch generation method provided by the invention is simple and feasible, has very high security and is not easy to crack, and the commodity anti-counterfeiting two-dimensional codes generated in batches have uniqueness and unforgeability.
Owner:NANTONG UNIVERSITY

A blockchain-based smart IoT device authentication method and system

The invention discloses a blockchain-based intelligent IoT device authentication method and system. The method includes: the device generates its own identity mark based on a physical unclonable function, and uses the own identity mark as a public key of a searchable encryption algorithm , generate the ciphertext; the registration center generates the private key of the searchable encryption algorithm corresponding to the device based on the smart contract and the distributed ledger database, and assigns the group name and the public-private key pair of the ring signature algorithm to the device to complete the registration of the device; the certification center Using smart contracts, searchable encryption is performed based on the identity of the device to realize the personal login authentication of the device; and the group login authentication of the device is realized based on the ring signature algorithm. The invention can realize effective combined authentication for intelligent Internet of things equipment, automatic execution of intelligent contracts, reduce the problem of excessive resource consumption, and the new cryptographic algorithm has higher calculation efficiency and can ensure the security of the system.
Owner:UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products