Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

2513 results about "Information leakage" patented technology

Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless. For example, when designing an encrypted instant messaging network, a network engineer without the capacity to crack encryption codes could see when messages are transmitted, even if he could not read them. During the Second World War, the Japanese for a while were using secret codes such as PURPLE; even before such codes were cracked, some basic information could be extracted about the content of the messages by looking at which relay stations sent a message onward. As another example of information leakage, GPU drivers do not erase their memories and thus, in shared/local/global memories, data values persist after deallocation. These data can be retrieved by a malicious agent.

Method for electronic commerce using security token and apparatus thereof

A method for electronic commerce using a security token and an apparatus thereof are provided. The electronic commerce method using a security token comprises a transaction approval institution generating a security token based on a security assertion markup language (SAML), using credit information of a purchaser who requests to issue a security token, and transmitting the security token to the purchaser; the purchaser writing an electronic signature on an order and transmitting the order together with the security token to a seller; the seller verifying the received order and security token, and then delivering goods according to the order to the purchaser; and the transaction approval institution performing payment for the seller and the purchaser. The method can solve the problems of personal information leakage and privacy infringement that may happen when a purchaser sends his personal information to a seller for electronic commerce. Since the token is one-time-use data, even if a security token sent is counterfeited or stolen, the loss can be minimized. In addition, by writing an extensible markup language (XML) electronic signature in the security token, authentication, integrity, and non-repudiation for a transmitted message can be guaranteed and through simple object access protocol (SOAP) security technology, confidentiality is maintained.
Owner:ELECTRONICS & TELECOMM RES INST

Block chain technology-based network digital identity authentication method

InactiveCN107181765AShorten confirmation timeAvoid the possibility of trending towards exclusive verificationUser identity/authority verificationDigital data protectionDigital identityInternet fraud
The present invention provides a block chain technology-based network digital identity authentication method. The method comprises the steps of 1) user registration: conducting the identity authentication service based on the vLink protocol, uploading a block chain if the identity of a user is legal, broadcasting the information of the user to the whole network by the block chain, and adding the information of the user into a corresponding block at each node, wherein blocks are mutually verified; 2) obtaining the information of the user, searching the information of the user through the vKey attribute authorization service, returning the user name, the gender and the age information of the user and returning a particular opened at the same time for distinguishing different users; 3) subjecting data to signature treatment during the digital identity authentication process based on the above block chain technology. According to the technical scheme of the invention, the personal data of a user are stored in a block chain, so that the occurrence of information leakage and internet fraud behaviors is radically avoided. The data security is ensured. During the data transmission process, the digital signature treatment is adopted. Therefore, the sensitive information is not tampered during the digital signature transmission process.
Owner:兰考同心互联数据管理有限公司

Sharing query method of electronic medical records based on block chain technology

The invention discloses a sharing query method of electronic medical records based on block chain technology. The method comprises the following steps: a user node applies to join a block chain and sends identity authentication information, registers the identity information and allocates a pair of keys for encrypting electronic medical record information after legal authentication; meanwhile performing bidirectional verification on the encrypted electronic medical record information, and uploading the electronic medical record information passing the bidirectional verification to the block chain for the sharing query of the whole electronic medical record information; performing SHA256 hash algorithm secondary encryption on the real electronic medical record information by a trusted server to generate a segment of uploaded digital fingerprint of electronic evidence, and adding a corresponding timestamp for preventing electronic medical record tampering or information leakage; and storing the electronic medical records after twice encryption in the sharing query block chain, and uploading the same to the cloud; and providing a key by a remote node for identity proving, obtaining the electronic medical records in the sharing query block chain, and decrypting the electronic medical records by the trusted server.
Owner:CHENGDU UNIVERSITY OF TECHNOLOGY

Universal method and universal system for performing safety testing on Android application programs

The invention discloses a universal method and a universal system for performing safety testing on Android application programs. The universal method comprises the following steps of unpacking and decompiling a to-be-tested program to obtain an XML (extensive markup language) source code; then, through static analysis on configuration files and the code of the to-be-tested program, performing vulnerability detection and safety testing on the aspects of component exposed vulnerability, cryptology misuse, webview code execution vulnerability and code protection; then, performing actual running on the to-be-tested program, and configuring a network detection environment; finally, performing dynamic analysis, and performing dynamic vulnerability detection and the safety testing on three aspects of information leakage, data transmission safety and data storage safety, thus obtaining a vulnerability detection and safety testing report. According to the universal method and the universal system disclosed by the invention, by performing a static analysis and dynamic analysis combination mode on an optional Android application program and through a series of steps of detection and estimation, safety flaws and potential safety hazards existing in the aspects of design and implementation of the application program can be finally given out.
Owner:SHANGHAI JIAO TONG UNIV +1

File information output anti-leakage and tracing method and system

The invention relates to a file information output anti-leakage and tracing method and system. The method comprises the steps of deploying a file information output operation monitoring service system in a file information output terminal; when the file information output terminal performs file information output operation, automatically performing information anti-leakage processing in file information output contents by the file information output operation monitoring system, wherein the anti-leakage processing includes the addition of invisible watermark information; performing one or more of screen switching, screen shooting, screen video recording, file copying and printout operations on file information of the file information output terminal; and converting carrier contents after file information output into image data in an electronic format, running a watermark information extraction identification program to detect the watermark information, and performing file information leakage tracing operation. According to the method and the system, the technical difficult problem of tracing after leakage of screen shooting and printout modes of the file information output terminal can be solved on the premise of not influencing the visual effect of right reading of users.
Owner:李晓妮

Nano foamed concrete, reinforced insulation wallboard and preparation method of reinforced insulation wallboard

The invention belongs to the field of building materials and construction technologies and relates to nano foamed concrete, a reinforced insulation wallboard and a preparation method of the reinforced insulation wallboard. The nano foamed concrete disclosed by the invention is prepared from the following ingredients in parts by weight: 100 parts of cement, 0.1-5 parts of desulfurized oil coke ash residue, 0.012 part of waterproofing agent, 10-30 parts of fly ash, 0.1-6 parts of superplasticizer, 50-200 parts of water, 1-20 parts of foamer and 0.01-5 parts of nano wave absorbing agent. Thus, when a wallboard product, prepared by embedding steel wire meshes in the nano foamed concrete disclosed by the invention, is applied nearby airports, docks, navigation marks, television stations and receiving stations or applied to concrete-based retaining walls of electromagnetic wave interference preventing scientific research departments, precise instrument plants and information leakage prevention high-grade buildings of national confidential units and the like, the most basic physical, mechanical, heat preservation and heat insulation properties are guaranteed on one hand, and the wallboard product has the capabilities of lowering noise and insulating sound on the other hand.
Owner:QINGDAO TECHNOLOGICAL UNIVERSITY

Identity authentication system and method based on electronic identification card

The invention provides an identity authentication system and method based on an electronic identification card. The identity authentication system comprises an intelligent terminal, an operator server, a network identity authentication center and an application platform. The intelligent terminal is used for storing a first temporary secret key only associated with the electronic identification card of a user, and generating to-be-authenticated encryption information and first encryption information. The operator server is used for acquiring the first encryption information, authenticating the first encryption information preliminarily, and then generating second encryption information. The network identity authentication center is used for acquiring the second encryption information, generating a second temporary secret key and authenticated encryption information, and comparing the to-be-authenticated encryption information with the authenticated encryption information so as to realize authentication of the user identity. The application platform is connected with a secret key server. The application platform sends an authentication request and is used for acquiring a result of user identity authentication from the operator server. The first temporary secret key is stored in a safe area of the intelligent terminal, so that the user does not need to carry a hardware carrier and are not worry about risks, such as information leakage and so on when in online payment or online identity authentication.
Owner:尤磊

Display method of graphical user interface, and mobile terminal

The embodiment of the invention provides a display method of a graphical user interface, and a mobile terminal, and relates to the field of data processing. The method specifically comprises the following steps: judging whether the display screen of the mobile terminal is blocked or not; when a judgment result shows that the display screen is blocked, determining the blocking area and the display area of the display screen, wherein the display area is used for displaying the graphical user interface; determining the parameter information of the display area, wherein the parameter information comprises the area size of the display area and the position of the display screen where the display area is positioned; and according to the parameter information, obtaining the graphical user interface matched with the display area, and displaying the graphical user interface in the display area. The embodiment of the invention judges whether the touch screen of the mobile terminal is blocked or not, when the touch screen is blocked, the graphical user interface is displayed in the display area, the graphical user interface can be only displayed in the display area of the display screen without full-screen display, information leakage possibility is reduced, and privacy is good.
Owner:HUAWEI DEVICE CO LTD

BDS/GPS high-accuracy positioning method

The invention discloses a BDS/GPS high-accuracy positioning method, relating to the field of satellite navigation. The method includes establishing a virtual reference station, acquiring the common-view satellite ephemeris and the satellite observation data received by a reference station Bi and a roving station M, and acquiring the geometry distance between the satellite and the reference station Bi; acquiring the pseudo range correction number of the reference station Bi; interpolating the pseudo range correction number of the virtual reference station by means of an algorithm of inverse distance to a power; interpolating the pseudo range correction number of the roving station by the roving station by means of an algorithm of inverse distance to a power; correcting the satellite pseudo range observation data received by the roving station by means of the pseudo range correction number of the roving station; and establishing a roving station satellite pseudo range observation equation to obtain the accurate coordinate of the roving station to complete the positioning. According to the invention, the safety hidden troubles of information leakage of the reference station because a multi-reference difference positioning method in the prior art must use the accurate coordinate of the reference station can prevented, and high-accuracy positioning is obtained.
Owner:CHINESE ACAD OF SURVEYING & MAPPING

Two-dimensional barcode-based logistics industry personal information privacy protection system and method

InactiveCN103401676ATroubleshoot access rights assignmentsPrevent leakageLogisticsSecuring communicationProtection systemInformation privacy
The invention discloses a two-dimensional barcode-based logistics industry personal information privacy protection system. The system comprises a key distribution and management system, a database, a first PC (Personal Computer) side logistic management system, a first two-dimensional barcode generation and reading module, a first two-dimensional barcode reading module, a first mobile phone delivery terminal, a first mobile phone number hiding module, a third PC side logistic management system, a third two-dimensional barcode generation and reading module, a third two-dimensional barcode reading module, a third mobile phone delivery terminal and a third mobile phone number hiding module, wherein the first PC side logistic management system is positioned at a letter sending site; and the third PC side logistic management system is positioned at a receiving site. According to the two-dimensional barcode-based logistic personal information privacy protection scheme design, the two-dimensional barcode technology and an encryption technology are applied to the logistics industry to try to solve the problem of personal information leakage. The functions such as two-dimensional barcode generation and reading, sensitive information encryption protection, and key distribution and management are realized, and the problem of privacy information leakage is solved better.
Owner:NAVAL UNIV OF ENG PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products