Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

163results about How to "Verify security" patented technology

Construction verification method and device capable of verifying security two-dimensional code offline

Embodiments of the invention provide a construction verification method and device capable of verifying a security two-dimensional code offline. The method comprises the following steps of inputting information that needs coding and type information, carrying out digital signature operation and encryption operation on the input information according to an information release type, constructing combination information, and encoding to generate a security two-dimensional code which can be verified off-line according to a two-dimensional code coding rule; inputting the information of the security two-dimensional code and identifying included combination information and type information, analyzing and decoding the combination information to obtain independent sub-information according to the type information of the two-dimensional code, and verifying digital certificate effectiveness information, a digital signature of the input information and an effective time limit of the input information; and if all verifications pass, showing that the offline verification of the security two-dimensional code is correct and the coding information source of the security two-dimensional code is credible, otherwise showing that the information release source of the security two-dimensional code is incredible. The method and the device have the beneficial effects that the security two-dimensional code cannot be tampered, counterfeited and denied, the public or private information can be released, and the integrity of the information of the security two-dimensional code and the authenticity of the source can be verified offline without a network connection.
Owner:王栋

Vehicle remote firmware updating method and device based on information security technology

The invention relates to a vehicle remote firmware updating method and device based on an information security technology. The method comprises the following steps: generating a firmware updating request message by using a remote server, generating a first hash value according to a message digest of the firmware updating request message, and carrying out symmetric encryption packaging on the firmware updating request message and the first hash value to obtain a first message; carrying out symmetric decryption verification on the first message by using a target ECU; generating a secret key K by using the target ECU, carrying out symmetric encryption on the secret key K and then transmitting the secret key K to a remote server; encrypting a new firmware and a third hash value corresponding to the new firmware through the secret key K by using the remote server to generate a second message; decrypting the second message by the target ECU, calculating a fourth hash value, and judging whether the fourth hash value is the same as the third hash value or not; and programming the new firmware by the target ECU. Compared with the prior art, the vehicle remote firmware updating method has the advantages of high safety, convenience, reliability and the like.
Owner:TONGJI UNIV

High-pressure gas tightness detection system

The invention discloses a high-pressure gas tightness detection system. The high-pressure gas tightness detection system is used for performing quantitative detection on the high-pressure gas tightness of a high-pressure sealing system, wherein a certain quantity of gas for detection is introduced into a high-pressure tank and then water is continuously injected into the high-pressure tank so that the gas pressure in the detection system is capable of meeting the test requirement, and quantitative detection is performed on the gas for detection leaking from the high-pressure sealing system under this circumference, and therefore, the sealing leakage quantity of the high-pressure sealing system under corresponding testing working conditions can be obtained. According to the result of the quantitative detection, the designed leakage quantity of a sealing element can be verified so that the reasonability and safety of the design of the sealing element can be verified, and the result of the quantitative detection also can be used for detecting the leakage quantity under variable working conditions, and therefore, the correspondence between the working conditions of the sealing element and the leakage quantity can be obtained, and furthermore, the leakage quantity under the working conditions of the sealing element can be determined; consequently, accurate data support can be provided for the design of the sealing element, the connecting part of the sealing element and the like.
Owner:SUZHOU BMC SEALING TECH CO LTD

Image encryption method based on L-F cascade chaos and 3D bit scrambling

The invention discloses an image encryption method based on L-F cascade chaos and 3D bit scrambling. Image encryption is mainly divided into two steps: (1) 3D bit scrambling encryption and (2) diffusion operation. A novel L-F cascade chaos is constructed, the problem that a blank window exists due to uneven distribution of Logistic is solved while the rapidity of the Logistic is guaranteed, the chaos interval and number of parameters are increased, the secret key space is increased, and the exhaustion attack resistance of the system is improved. According to the method, the randomness of scrambled ciphertext is improved by adopting a 3D cyclic shift bit scrambling mode, and the problem that a bit scrambling sequence is insensitive is solved. According to the method, high-order informationcontaining a large amount of plaintext information and low-order information containing a small amount of plaintext information are separately scrambled, so that the noise attack resistance of the system is improved. According to the encryption system, the plaintext SHA-256 is used for carrying out strong association on the chaotic key, so that the plaintext sensitivity and the capability of resisting the attack of the selected plaintext are effectively improved.
Owner:QIQIHAR UNIVERSITY

Small-size resonator and magnetic coupling resonance wireless energy transmission system

Magnetic coupling resonance wireless energy transmission is a new technology which utilizing magnetic coupling resonance to achieve middle-distance electric energy wireless transmission, and has good application prospects. The invention provides a small-size plane-spiral resonance coil made by a printed board directly, the front face and the back face of the coil are all coated with copper, inductance generated on a front conductor layer and capacitance generated on an overlapped section of the front conductor layer and a back conductor layer form a needed resonator through a complex series-parallel connection circuit for energy transmission, and the size of the resonator is only 1.35 cm<3>. Through establishment of human head three-dimensional numerical model and implantation of a coil model into a body, a time-domain finite difference method is applied to the calculate head specific absorption rate and the electric-field magnetic field strength. Results show that when the magnetic coupling resonance wireless energy transmission technology is applied for the energy transmission of components implanted in the head, the I0g specific absorption rate (SAR) average value of the human head is 9.2627*10-6W/kg, the maximum value of root-mean-square of the electric-field magnetic field strength is respectively 4.64 V/m and 0.057 A/m, and the values are lower than the international safety limit standard.
Owner:HEBEI UNIV OF TECH

Integrated construction method of support system

The invention provides an integrated construction method of a support system. The method includes the steps that a section geometric figure of a building structure with the support system design requirement is drawn and input to a figure processing system; the types of components in the section geometric figure are identified through the figure processing system; the loads of the components, with the types identified, serving as individual objects are calculated, so that standard safety degree indexes of the single components are acquired; according to the section geometric figure and the identified component types, the building structure serves as a whole object for establishing the support system; support parameters of the support system are coupled and calculated and adjusted, so that the support parameters meet the standard safety degree indexes of all the single components; according to the support parameters, the support system of the building structure is acquired. By the adoption of the method, the building structure serves as a whole for support design, all the components in different positions and different directions in a whole structure section are comprehensively considered, and therefore the support system can bear the load effect of the different components in different directions.
Owner:SHANGHAI TUNNEL ENG CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products