Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

132results about How to "Verify legitimacy" patented technology

Multiparty data sharing method and system for protecting privacy data sending source

ActiveCN107453865AGuaranteed not to be exposedIdentity privacy data is not exposedKey distribution for secure communicationMultiple keys/algorithms usageBlockchainData sharing
The invention discloses a multiparty data sharing method for protecting privacy of a data sending source. A plurality of participants are jointly connected with a block chain and share data. The method comprises the steps that S1, the participants generate public and private key pairs; S2, the participants publish public keys corresponding to own identities and record all published public keys; S3, the data sending source generates a ring signature based on all public keys, a private key of the data sending source and to-be-sent data and writes the data and the ring signature into a block chain through a one-time private key; and S4, other participants reads the data and the ring signature, verify the ring signature based on the public keys, the data and the ring signature, employ the data if the verification result indicates legality, and do not employ the data if the verification result indicates illegality. The invention also discloses a corresponding system. According to the method and the system, the identity privacy data of a data sharer is prevented from being exposed, and data receivers believe that the data sharer really has the data sharing authority or even realizes responsibility investigation.
Owner:ZHONGAN INFORMATION TECH SERVICES CO LTD

Position privacy protection method based on dynamic pseudonyms

The invention discloses a position privacy protection method based on dynamic pseudonyms. The position privacy protection method mainly overcomes the defect that the position privacy protection degree in an existing position pseudonym method based on position services is too low. The position privacy protection method comprises the steps that a communication system composed of users, a credible mechanism and a service provider is built; the system is initialized through the credible mechanism; the users sign in the credible mechanism on line to obtain public and private keys; the credible mechanism updates the pseudonyms and pseudonym certificates of the users regularly; the users use the dynamic pseudonyms to request position services from the service provider; the service provider provides service data for legal users and requests the credible mechanism to revoke malicious users; the legal users obtain the position service data. According to the position privacy protection method, identity anonymity is achieved by using the dynamic pseudonyms, the relation between identity information and spatiotemporal information is cut off, and therefore it is difficult for the service provider to speculate position information of the specific users by means of side information, position privacy of the users is protected effectively, and the position privacy protection method can be used for position privacy protection based on the position services in social networking services.
Owner:XIDIAN UNIV

Data processing method and device and computer readable storage medium

The invention discloses a data processing method and device and a computer readable storage medium. The method comprises the steps of a gateway node acquiring an encrypted communication request sent by a first node; wherein the first node is a node associated with the target terminal in the blockchain network; obtaining to-be-verified certificate information associated with a target user corresponding to the target terminal according to the encrypted communication request; when the to-be-verified certificate information has legality, obtaining identity identification information associated with the target user from the to-be-verified certificate information, and performing identity authentication on the target user based on the identity identification information; and when the identity authentication state is a successful state and a handshake task associated with the encrypted communication request is completed, establishing a session with the first node, and returning encrypted datainformation associated with the identity identification information to the first node according to an encryption key corresponding to the session. By adopting the method and the device, the privacy ofdata pulling can be enhanced, and the security of data transmission can be improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Electronic medical record sharing method and system based on block chain

The invention provides an electronic medical record sharing method and system based on a block chain, wherein the method comprises the following steps: a medical health card generates an asymmetric secret key pair; the first medical institution node performs registration verification on the user by utilizing the asymmetric secret key, and when the verification is passed, a first medical institution node uses the asymmetric secret key to perform registration verification on a user; when the verification is passed, the steps are carried out as follows: when an authorized sharing trigger is received, the first medical institution node performs standardized processing on the electronic medical record, and the encrypted standard electronic medical record is sent to a first front-loaded database; when an authorized use trigger of the user is received, the second medical institution node generates an intelligent contract and the signed intelligent contract is issued to a block chain; a verification node, according to the intelligent contract, triggers the execution as follows: the first medical institution node conducts validity verification on the signed intelligent contract; when the verification is passed, an encrypted standard electronic medical record is exchanged to a second front-loaded database; the second medical institution node decrypts the encrypted standard electronic medical record to obtain a standard electronic medical record. According to the scheme, the sharing process of the electronic medical record can be simplified.
Owner:JINAN INSPUR HIGH TECH TECH DEV CO LTD

Website data acquisition method and device

The invention provides a website data acquisition method and device. The method comprises the first step of setting identity information used for logging in on a website to be acquired in a web spider program in advance, wherein the identity information comprises a log-in account and a log-in password, the second step of writing the identity information in a log-in form of the log-in page of the website, the third step of enciphering the log-in form and sending the log-in form to a server corresponding to the website so that the validity of the identity information can be authorized through the server, and the fourth step of receiving identification codes which are used for having access to the website and sent by the server, wherein the identification codes are sent after the server authorizes that the identity information is valid, and data acquisition is performed on the website by adopting the web spider program when the identification codes are used for having access to all the webpages of the network. According to the website data acquisition method and device, the identity information used for logging in on the website to be acquired is stored in the web spider program in advance, the identification codes are obtained from the server through the identity information, and then the web spider program accesses all the webpages of the website based on the identification codes so that data acquisition on the website can be achieved.
Owner:BEIJING PEOPLE ONLINE NETWORK

Identity authentication method during quantum secret key application process

The invention discloses an identity authentication method during a quantum secret key application process. The identity authentication method includes the steps: a quantum network deployment phase, a preparation initial phase, a secret key preparation phase, an identity authentication phase and a secret key application phase. During an abstract extraction process, as the identity authentication method uses a quantum secret key and the quantum secret key is provided with true randomness, the difficulty for performing reverse operation on the abstract can be further reduced and the safety for information transmission can be improved; and at the same time, after accomplishment of one time of session identity authentication, only a device for identity authentication is allowed to apply for a secret key, so that the safety is further improved through verification of the device information, and during the process, a session ID is in continuous changing state and depends on a plurality of factors, so that a large amount of impersonation attack can be timely eliminated through verification of the session ID. For the identity authentication method during a quantum secret key application process, the secret key is applied to the quantum secret key application process to verify the legal identity between two parties for communication, so that verification of the legal identity of the opposite side between the two parties for communication can be realized and the required data for verification has absolute safety during the transmission process in the network.
Owner:ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD

Application cloud safety certification method based on third-party service

The invention provides an application cloud safety certification method based on a third-party service. The application cloud safety certification method based on the third-party service specifically comprises the steps that (1) a cloud user submits service demand information to a signature certification service cloud; (2) the signature certification service cloud receives the service demand information of the cloud user, and verifies validity of a certificate of the cloud user according to a third-party catalogue certification service cloud, carries out sign and issue on a ciphertext user login token and a digital envelope through an application portal catalogue service cloud, carries out certification service sign on the ciphertext user login token signed and issued through the application portal catalogue service cloud and the digital envelope signed and issued through the application portal catalogue service cloud, and sends the ciphertext user login token and the digital envelope back to the cloud user; (3) the cloud user carries out user sign on the obtained ciphertext user login token, the digital envelope and the certification service sign information, and submits the ciphertext user login token, the digital envelope and the certification service sign information to an application service to demand for the corresponding service; (4) the application service provides the corresponding service for the cloud user after being verified. Compared with the prior art, the application cloud safety certification method based on the third-party service ensures authenticity and non-repudiation of information sources, and improves safety of the process of information transmission.
Owner:INSPUR QILU SOFTWARE IND

An identity identification method for digital TV broadcast signal

The invention discloses a method of personal identification of digital TV broadcasting signal, which applies part or all of program content, time information and channel identification information of digital TV to generate personal identification code of a broadcasting TV signal on a transmission front end of the digital TV broadcasting signal, then the personal identification code of the broadcasting TV signal is placed in a self-defined data code flow which meets the standard of digital TV code flow and the self-defined data code flow reuses the transmission together with the former digital TV transmission flow; the illegal signal can be identified effectively through judging the legitimacy, effectiveness and integrity of the received content by selecting and detecting the personal identification code of the digital TV signal on a transmission receiving end of the digital TV broadcasting signal. Each part of information of personal identification code provided by the invention has a uniformed simple block structure, and the receiving end can carry out the analysis conveniently. The invention can reasonably choose the corresponding signature information to generate the personal identification code according to different safety protection requirements, thus realizing the higher performance cost ratio on the premise of guaranteeing the system requirements.
Owner:ACAD OF BROADCASTING SCI SARFT

Auditable and traceable anonymous message receiving system and method

The invention discloses an auditable and traceable anonymous message receiving system and method. The auditable and traceable anonymous message receiving system comprises a user registration module used for generating public and private keys and a public key certificate of a user through the interaction between the user and a register in an entity institution; an encryption module used for transmitting messages of the user in a communication system confidentially; a verification module used for verifying the legality of verification ciphertext messages in the communication system; a decryptionmodule used for decrypting ciphertext messages of an anonymous receiver; a link module used for judging whether any two messages are transmitted to the same receiver; a tracking module used for tracking an associated user of an abnormal ciphertext message; and an authentication module used for authenticating message contents received by an abnormal user. The auditable and traceable anonymous message receiving system provided by the invention can discover the malicious behavior of the user without affecting the privacy of the user, and then track the malicious behavior and even open user information, thereby effectively realizing the privacy protection of information sinks in the communication system and supporting the functions of a tracking mechanism for auditing, tracking and authenticating anonymous information sinks.
Owner:HANGZHOU INNOVATION RES INST OF BEIJING UNIV OF AERONAUTICS & ASTRONAUTICS

Medicine unified distribution method based on network hospital and network hospital platform

The invention discloses a medicine unified distribution method based on a network hospital. According to the method, electronic prescriptions sent by doctor terminals are received via a network hospital platform, after the electronic prescriptions are verified to be legal, cost information is generated according to the prescription information, and when payment accomplishing information sent by patient terminals is received, the electronic prescriptions are sent to pharmacy terminals corresponding to the pharmacy information according to patient basic information and pharmacy information corresponding to matched prescription information. The invention also discloses a network hospital platform. According to the medicine unified distribution method, based on the electronic prescriptions and the network hospital platform, the legitimacy of the electronic prescriptions is verified via the reception of the electronic prescriptions sent by the doctor terminals, the cost information is generated according to the prescription information after verification so that the patient terminals can accomplish the payment, unified pricing is realized at the network hospital platform via the electronic prescriptions, the corresponding pharmacy information is matched after the patients accomplish the payment, and unified distribution of medicine on the network hospital platform according to the condition information of the patients is realized.
Owner:ANYCHECK INFORMATION TECH +3

Method for acquring authentication cryptographic key context from object base station

The invention involves the mobile communication field, a method that the aiming base station gets the context information of the identified-right secret key, to solve the inconsistent problem in the relating sequence number of the aiming base station identified-right secret key context and the mobile terminal in the existing technology. The method including: the identified righter / the provider of the secret key create the context information of the identified-right secret key when the mobile terminal request cut, the context information includes the current sequence number of the identified-right secret key, the sequence number of the upward managing information authentication code and / or the current sequence number of the downward managing information authentication code; the identified righter / the provider of the secret key send the identified-right secret key and the relating sequence number to the aiming base station when the aiming base station that the mobile terminal ready to cut request the identified-right secret key. Thus maintained the continuity of the sequence number information, ensure the secure communication with the mobile terminal, and prevent effectively the possibly appearing replay attack, ensure the conversation security after restore.
Owner:HUAWEI TECH CO LTD

Method and system for validating chip validity by utilizing graphical chip

ActiveCN102375941AFacilitate automatic identification and managementVerify legitimacyInternal/peripheral component protectionComputer securityApplication software
The invention relates to a system and method for validating the chip validity by utilizing a graphical chip. The system comprises an identifier generation module, a graphical identifier identification module and an identifier validation module. The method for validating the chip validity comprises three basic work flows, namely a graphical identifier generation flow, a graphical identifier identification flow and a graphical identifier validation flow. When validating the chip validity, a user uses the graphical identifier on an identification chip of the graphical identifier identification module, and the graphical identifier is reduced into a verification identifier, the verification identifier is transmitted to the identifier validation module, the identifier validation module compares the verification identifier with an internal identifier which is saved in a chip, the graphical identifier of the chip is falsified if the validation identifier is not in accordance with the internal identifier, and the user can determine whether the chip is counterfeited or illegal or not and further forbids the user to download an application program; and the chip is legal if the validation identifier is in accordance with the internal identifier.
Owner:NATIONZ TECH INC

Method for updating network security table and network device and dynamic host configuration protocol (DHCP) server

The invention discloses a method for updating network security table, a network device and a dynamic host configuration protocol (DHCP) server. When a virtual machine moves in a management domain of a network device, the network device analyses a first received request message from the virtual machine, an internet protocol (IP) address and a medium access control (MAC) address of the virtual machine are obtained, when a security table item including the IP address and the MAC address doesn't exist in a network security table of the network device, the network device sends a second request message generated according to the IP address and the MAC address to the DHCP server, so that the DHCP server is enabled to launch mandatory communication between the DHCP server and the virtual machine, the network device monitors an interactive message between the DHCP server and the virtual machine to obtain the security table item of the virtual machine, the network security table is updated according to the security table item. Through the above mode, the method for updating network security table, the network device and the DHCP server ensure that the virtual machine can access the network normally when the virtual machine moves in the management domain of the network device, reliability of the network security table is also ensured, and therefore network security is ensured.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products