Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

109results about How to "Will not be tampered with" patented technology

Efficient condition privacy protection and security authentication method in internet of vehicles

The invention discloses an efficient condition privacy protection and security authentication method in an internet of vehicles. The efficient condition privacy protection and security authentication method comprises the following steps of: system initialization, generation of pseudonym identities and signature private keys of vehicles, signing and authentication of a message and tracing of real identities of the vehicles. The vehicles carry out cooperative communication with surrounding vehicles and roadside units deployed at both sides of a road by on-board units assembled on the vehicles, driving security of the vehicles can be effectively improved, and vehicle users can more conveniently and rapidly acquire related traffic services. The efficient condition privacy protection and security authentication method disclosed by the invention not only can meet security requirements in the internet of vehicles, but also optimizes the computing process of signature generation and verification in the communication. The efficient condition privacy protection and security authentication method is greatly improved on the aspect of efficiency of computing cost, communication cost and the like, and is more applicable to communication and application in the internet of vehicles.
Owner:ANHUI UNIVERSITY

User identity certificate storage and verification method and device based on block chain and verification system

The invention discloses a user identity certificate storage and verification method and device based on a block chain and a verification system. The user identity certificate storage method based on ablock chain comprises the following steps: distributing a user identifier for representing a user identity to a user according to a storage request, wherein the unique private key and the unique public key are associated with the user identifier; obtaining identity information of a user, performing Hash calculation on the identity information of the user to generate a digital fingerprint, sendingthe digital fingerprint to a block chain, encrypting a user identifier, the identity information of the user, a storage identifier of a block chain distribution user and the digital fingerprint according to a unique private key, and generating a user identification code representing the identity information. By implementing the method and the device, the identity information of the user is storedby utilizing the identity information storage platform on the basis of the blockchain technology, so that the stored identity information cannot be tampered once the stored identity information is online, the credibility of the electronic identity storage information is enhanced, and meanwhile, the identity information is acquired more conveniently and quickly.
Owner:中积教育科技有限公司

Commodity tracing method and device based on block chain technology

The embodiment of the invention provides a commodity tracing method and device based on a block chain technology. The invention relates to the technical field of block chains. The commodity tracing method comprises the steps: obtaining commodity packaging and delivery information from a block chain, performing signature processing on the commodity packaging and delivery information through a firstprivate key of a delivery party, and encrypting the commodity packaging and delivery information after signature processing through a second public key of a receiving party; obtaining traceability information generated by a traceability sensor in a packaging box of the commodity from the block chain; decrypting the traceability information and the commodity packaging and delivery information by using the second private key to obtain the commodity packaging and delivery information after signature processing and the traceability information; utilizing the first public key to carry out signature verification on the commodity packaging and delivery information to obtain commodity packaging and delivery information; and verifying the commodity package delivery information and the traceabilityinformation to verify the authenticity of the commodity. According to the technical scheme provided by the embodiment of the invention, the problem that the authenticity of commodity logistics data cannot be guaranteed in the prior art can be solved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Credible database integrity protecting method and system

ActiveCN104615947AReduce the impactImprove integrity protection strengthDigital data protectionControlling environmentData needs
The invention provides a credible database integrity protecting method and system which are particularly but not just suitable for an industrial control system. The method includes the steps that when sensitive data need integrity protection, whether the current system environment conforms to the environment needed for sensitive data integrity protection or not is checked through a credible measurement technology, and whether the system environment is credible or not is checked similarly before an integrity measurement signature is verified. A signature secret key for carrying out integrity verification is protected by a hardware safety chip in an encipherment mode, and therefore safety based on hardware is achieved. Finally, integrity verification is achieved in a middleware mode, and the normal operation efficiency of a system is ensured while integrity verification of the sensitive data is ensured. Based on the credible database integrity protecting method and system, the safe database system for storing the sensitive data based on the safety chip can be set up for the industrial control environment, the integrity protection intensity of the sensitive data in the safe database system is improved, and it is ensured that production plans, technological processes and other sensitive data are not tampered.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Request legality verification device and method and computer readable storage medium

The invention discloses a request legality verification device. The request legality verification device comprises a storage and a processor, and a legality verification program capable of operating on the processor is stored on the storage. The program is executed by the processor to achieve the following steps that when an interface calling request sent by a server in a server group is received,host information of the server, requested interface information and registration certificate information are acquired from the interface calling request; the registration certificate information is subjected to decryption processing to acquire registration host information and registration interface information which are contained in the registration certificate information; and if the host information of the server is consistent with the registration host information and the requested interface information is consistent with the registration interface information, it is judged that the interface calling request is legal. The invention further provides a request legality verification method and a computer readable storage medium. Accordingly, the request legality verification process is simplified, and then the interface calling responding speed is increased.
Owner:PING AN TECH (SHENZHEN) CO LTD

Blockchain-based data asset transaction method

The invention discloses a blockchain-based data asset transaction method, which belongs to the technical field of blockchains, and comprises the following steps: a blockchain platform deploys a transaction smart contract, a user registers a contract transaction account through the blockchain platform, and the platform returns a pair of public key and private key of the user as an account address and a key for starting an account; the user compiles a transaction demand into a character string in the smart contract and publishes the character string in a blockchain transaction network, and matches an account meeting a transaction condition by using a blockchain consensus mechanism; a contract is triggered to automatically execute the transaction for the two parties meeting the transaction condition, wherein the transaction participants respectively sign by using respective private keys; and the transaction participants decrypt the signatures of the two transaction parties by using the public keys, broadcast the confirmed signatures through the block chain network and store the signatures into the block chain. The two transaction parties perform transaction through the smart contractin the blockchain, and the transaction information is encrypted, packaged and broadcasted to the blockchain by the private keys, so that the transaction information is not tampered, and the security is improved.
Owner:安徽高山科技有限公司

Evidence storage method based on alliance chain, case filing method and related equipment

The embodiment of the invention discloses an evidence storage method based on an alliance chain, a case filing method and related equipment. The method comprises the following steps of: determining the integrity and legality of acquired electronic evidences by a time service node; allocating first time to the electronic evidence, and correspondingly storing the first time and the electronic evidence as first data; performing digital signature on the first data to obtain a second signature; and packaging the second signature and the first data into a first block, appending the first block to the alliance chain, and broadcasting the first block in the alliance chain network. Visibly, the electronic evidence is stored based on the alliance chain; the reliability and the stability of the electronic evidence are improved; time service is performed on complete and legal electronic evidences based on a trusted time service center. The electronic evidence and the given time are digitally signed through the digital signature technology, it is guaranteed that the electronic evidence cannot be tampered in the chaining process and after chaining, the safety of the electronic evidence is improved, and convenience is provided for subsequent judicial procedure examination of the electronic evidence.
Owner:BANK OF CHINA

Household registration management method, device and equipment and storage medium

The embodiment of the invention discloses a household registration management method, device and equipment and a storage medium. The method comprises the following steps: receiving a household registration association request; generating associated household registration information based on the first household registration information and the second household registration information, wherein theassociated household registration information comprises personal household registration information of all family parts of the first family and the second family; determining a Merkel tree and a hashvalue of a root node of the Merkel tree based on personal household registration information of all family parts in the associated household registration information; constructing a new block based on the Merkel tree and the hash value of the root node so as to add the new block into the block chain network; and determining a storage path of the personal household registration information of eachfamily part in the associated household registration information in the Merkel tree, and returning the hash value of the root node and the storage path of the personal household registration information of each family part in the Merkel tree. By adopting the embodiment of the invention, multiple parts of household registration information can be stored in an associated manner, and the flexibilityof household registration information management is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Green electricity confirmation method and device and computer readable storage medium

The invention discloses a green power confirmation method and device and a computer readable storage medium, and the method comprises the steps: obtaining target power data of a target power user, the target power data comprising green power condition data about renewable energy and the power consumption of the target power user; obtaining the on-grid green electricity quantity and the planned transaction green electricity quantity of the renewable energy power generation enterprise, and the predicted green electricity usage amount, the transaction settlement electricity quantity and the electricity meter data of the target electricity user; if the planned transaction green electricity quantity, the predicted green electricity usage amount, the online green electricity quantity, the transaction settlement electricity quantity and the electricity meter data meet the first preset condition, it is determined that the electricity used by the target electricity user in the target time period is green electricity, through the above mode, the green electricity usage condition of the target user can be truly and accurately determined, and the user experience is improved. And the above green power confirmation process can be realized by using the block chain, and the target power data is stored in the block chain, so that the target power data can be ensured to be real and errorless and cannot be tampered, and the credibility of green power confirmation is improved.
Owner:YGSOFT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products