Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

247 results about "Hash chain" patented technology

A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method to produce many one-time keys from a single key or password. For non-repudiation a hash function can be applied successively to additional pieces of data in order to record the chronology of data's existence.

Internet of Vehicles distributed authentication method based on controllable privacy

The invention discloses an Internet of Vehicles distributed authentication method based on controllable privacy, relates to the field of vehicle network communication safety, and specifically relates to an Internet of Vehicles distributed authentication method based on controllable privacy. The method specifically includes five following steps: system initialization; private key update of fake names and a part of signatures; message signature; message authentication of signatures; and real identity tracking and revocation. According to the method, the double hash chain is employed to establish the fake names, the communication cost for invalidating a vehicle identity is irrelevant to the numbers of the fake names and a part of the signature private keys of the vehicle, a vehicle user can update multiple parts of signature private keys by the adoption of one authorization, and the burden of trusted authority (TA) and road-side units (RSU) is reduced; when a message with a controversial signature occurs, the TA can distinguish whether the signature is forged by the RSU according to re-signature of the message uploaded by the vehicle, and the problem of non-repudiation in the distributed environment is solved. According to the method, the security is high, the cost is low, and the method is applicable to node high-speed movement, topology structure volatility, and large-scale VANET network.
Owner:JIANGSU UNIV

Partitioned type dynamic safety routing method for wireless sensor network on basis of hash chains

The invention discloses a partitioned type dynamic safety routing method of a wireless sensor network on the basis of hash chains, which belongs to the field of the computer communication network. According to the partitioned type dynamic safety routing method, a region concept is introduced according to characteristics of clustered routing algorithms and cycle circulation in the wireless sensor network, and a control message is broadcast to the entire network from converging nodes. The region of each node is determined according to the received signal strength, and direct communication among the nodes with larger distance can be avoided by the limitation of the region. After each cycle of cluster head is selected, q link keys are selected from a key pond composed of the hash chains by the node of each cluster head at random, and mutual communicating secret keys are derived according to oneway hash functions and fake random functions used for the chain keys by the other nodes so as to reduce the network communication load. According to the invention, the survival time of the network can be prolonged, the energy consumption of the nodes of the network is better balanced, the safety of the protocol is enhanced, the distribution of the nodes is made to be uniform, and the scope of networks where the protocol is applicable is enlarged.
Owner:NANJING UNIV OF TECH

Fast switch method and system in wireless local area network

A rapid-switching method in wireless local-area network includes the following steps: step 1, a wireless workstation sends a second element of a pre-constructed one-way hash chain table to a target wireless access point; step 2, whether the second element is effective or not is judged; if the second element is effective, step 3 is executed, otherwise the process is finished; step 3, connection between the target wireless access point and the wireless workstation is established. The rapid-switching method in wireless local-area network comprises a wireless access point, an authentication service unit, and a wireless workstation; the wireless workstation comprises a first communication module, which is connected with the wireless access point and the authentication service unit; the wireless access point comprises a second communication module, which is connected with the authentication service unit; a memory module, which is connected with the second communication module; an authentication module, which is connected with the memory module and the second communication module; the authentication service unit comprises a third communication module, which is connected with the wireless workstation and the wireless access point. The invention can realize one-way and/or two-way authentication between the wireless workstation and the wireless access point.
Owner:XIDIAN UNIV +1

Method for mining frequency episode from event sequence by using same node chains and Hash chains

The invention relates to a method for mining the lowest occurrence frequency episode from an event sequence, which is characterized by extending the low-order frequency episode step by step so as to directly generate a high-order frequency episode. In the method for finding and counting the lowest occurrence frequency of an episode, the lowest occurrence frequency of a 2-episode is found and counted by establishing an episode matrix and setting corresponding modification states on episode matrix elements, and the lowest occurrence frequency of a k-episode is found and counted by carrying out the timestamp-queue based extension on a frequency 2-episode. In the method for mining the episode by establishing an episode tree and using same node chains and Hash chains, the episode extension time and the occupied memory space are saved, and data need to be scanned once in the process of mining without generating a candidate episode set so that the mining efficiency is high and the less memory space is occupied. The method for mining the episode by establishing the episode tree and using same node chains and Hash chains has good characteristic that the mining time and the mining cost do not change obviously along with the frequency number threshold and can be further used for mining the episode from an event flow.
Owner:NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products