Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

121 results about "Key signature" patented technology

In musical notation, a key signature is a set of sharp (♯), flat (♭), and rarely, natural (♮) symbols placed together on the staff. Key signatures are generally written immediately after the clef at the beginning of a line of musical notation, although they can appear in other parts of a score, notably after a double barline.

Electronic evidence preservation system and method based on block chain technology

The invention discloses an electronic evidence preservation system and method based on the block chain technology. The preservation system comprises an evidence storage terminal and a block chain network. The evidence storage terminal comprises a hash operation module and an electronic signature module. The electronic data are uploaded to the evidence storage terminal, the evidence storage terminal performs hash operation on the uploaded electronic data to generate unique feature data of a fixed length of original data; then private key signature is performed on the generated data by using theasymmetric encryption technology, and the generated data are sent to the block chain network; and the block chain network performs primary consensus on the uploaded data and packs the uploaded data into blocks, and synchronously sends the blocks to nodes in the network for distributed storage. By establishing an evidence storage alliance by using the block chain technology, the electronic evidence preservation system has the characteristics of digitalized encryption, centralized grading, anti-tampering, data zero loss and so on. Each node in the block chain can preserve a complete block chaindata copy and witness the chain status of the blocks, so that the centralization risk can be effectively avoided.
Owner:SHENZHEN XIEWANG TECH CO LTD

Method for realizing safe access of terminal of internet of thing

The invention discloses a method for realizing safe access of a terminal of internet of thing, which comprises the steps of: storing an authorization message in an electronic key, and using the authorization message as an identity identification, wherein the authorization message is used as a private key signature by an authorized management node and stored in the authorized management node; writing the authorization message into the electronic key in an electronic key authorization list of the management node; when no terminal node connected with the electronic key applies to accessing the internet, searching a terminal authorization list by the management node to judge whether the access of the terminal node is allowed; and when the terminal node connected with the electronic key applies to accessing the internet, firstly executing the operation without the electronic key by the management node, and if the terminal is failed to access, searching the electronic key authorization listto judge whether the access of the terminal node is allowed. According to the method realizing the safe access of the terminal of the internet of thing, disclosed in the invention, the problem of safe access of the terminal can be effectively solved, a great amount of terminals of the internet of thing can be effectively managed, and the rapid automatic access of the terminals of the internet of thing can be realized.
Owner:无锡鼎驰信息科技有限公司

Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)

InactiveCN104901935AConvenient offline authenticationImplement offline authenticationUser identity/authority verificationPasswordPublic key cryptosystem
The invention provides a bilateral authentication and data interaction security protection method based on a CPK (Combined Public Key Cryptosystem). The method is applied to bilateral authentication between a user server (S1) and user equipment (D1) and interaction protection of all data. The method comprises the following steps that: the S1 receives a user login request transmitted by the D1, generates a random number a, a CPK identification public-private key pair of the random number and identification private key signature information of the S1, encrypts the random number a, the CPK identification public-private key pair and the identification private key signature information, and downloads the encrypted random number a, CPK identification public-private key pair and identification private key signature information to the D1; the D1 verifies whether or not the signature information of the S1 is legal with an identification public key of the S1 to finish authentication of the S1; the S1 performs comparative verification with the hash value of the received user login password and a saved value to finish authentication of the D1; if bilateral authentication is passed, the S1 generates a random number b, encrypts the random number b, and transmits the encrypted random number b to the D1; otherwise the S1 returns bilateral authentication failure information; and after the success of bilateral authentication of a user, the random number b is taken as a session key for all data between the D1 and the S1 in order to perform bilateral all-homomorphism data interaction.
Owner:成都腾甲数据服务有限公司

Systems and methods for composing music

A system and method for generating a new composition based on a database of pre-recorded performances of existing compositions. A system and method for generating an automated method for converting existing performances and associated MIDI transcriptions to a database and generating a new composition from the database. Musical improvisations are performed by musicians, in digital audio format. The digital audio data is transcribed to MIDI data and stored in a song file. The tempo, chord symbols used and key signature are input, and added to the song file. The digital audio file is analyzed and markers for the start and the end of phrases are added in a phrase marker text file. The system analyzes the MIDI transcriptions, chords, and phrase marker text. Information about sections and phrases of the solo from the phrase market text are stored in a “Riffs” file. The MIDI data transcriptions, the chord symbols and the Riffs files are combined into a Soloist Database File, consisting of one or more MIDI transcriptions of the audio improvisations. The musician's performances are stored as digital audio files such as WAV format files. An Options file is created by the user to control parameters about the solo to be generated. The system then generates a new improvisation based on any input chord progression and key, and the Options file, by choosing portions of the Soloist Database and corresponding portions of the digital audio files to construct the new improvisation. MIDI transcriptions corresponding to the digital audio performance are displayable as notation, piano roll, and on-screen instrument keyboard or fretboard.
Owner:GANNON PETER

A digital encrypted currency transfer method for a block chain

The invention discloses a digital encrypted currency transfer method for a block chain, and the method comprises the steps that a user terminal sends a digital encrypted currency transfer request to ablock chain network, and the request comprises a first timestamp, one or more first private key signatures, a source transaction address, and a destination transaction address, wherein the first private key signature is a private key signature of other user terminals; the block chain network reads the digital encrypted currency transfer strategy according to the source transaction address and verifies the digital encrypted currency transfer request, wherein the digital encrypted currency transfer strategy comprises one or more first public keys and a transfer condition, wherein the first public key is a public key of other user terminals; if the digital encrypted currency is verified to be legal, the digital encrypted currency is transferred from the source transaction address to the destination transaction address, transaction behaviors are recorded, and transaction is finished; otherwise, the transaction is ended. According to the method and the system, the user can still use the digital encryption currency under the condition that the private key is lost, and the user is prevented from hosting the digital asset on the third-party platform, so that the security is improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Two-factor authentication method based on portable TPM (PTPM) and certificateless public key signature for cloud

The invention discloses a scheme for implementing two-way identity authentication between a user and cloud by applying a portable TPM (PTPM) and certificateless public key cryptography to a cloud environment, aiming at solving the security problems and deficiencies existing in identity authentication between the user and the cloud in a current cloud environment in a cloud computing mode. Comparedwith existing schemes, a new scheme has the following advantages: on the basis of realizing the uniqueness of user and cloud identities through the establishment of an identity management mechanism, firstly, the PTPM is adopted to ensure the security and credibility of a terminal platform and ensure the authenticity and correctness of authentication results between the cloud and the user, and moreover, the user is supported to use any terminal equipment to complete an identity authentication process with the cloud; secondly, the new scheme implements a 'password + key' two-factor authentication process based on a certificateless public key signature algorithm; and finally, the proposed scheme can significantly improve the computing efficiency of identity authentication between the user andthe cloud while ensuring the security of EUF-CMA.
Owner:SHENYANG NORMAL UNIV

Wireless network lightweight class authentication key negotiation protocol based on digital certificate

The invention relates to a wireless network lightweight class authentication key negotiation protocol based on a digital certificate. A user identity is subjected to dual authentication through a 'certificate private key and protection key' dual authentication system and a 'protection key' dynamic negotiation mechanism by sharing a dynamic protection key according to a public key password; a user proves the session holdness and the private key owning property by exchanging the certificate according to a private key signature, so that primary authentication is executed; and due to protection key sharing, secondary authentication is executed. Important parameters are protected by two parties through the protection key after the last session is finished; the correctness of the key is confirmed through a new protection key calculated at the session; during each communication, when the parameters are exchanged, the correctness can be checked. Negotiation for key groups and parameter exchange adopt simple bit computation; and the key updating is confirmed by Finished messages. According to the protocol, a dynamic ID is set to dynamically select whether the shared old parameters are used for calculating the key of the session; and safety and high efficiency are guaranteed, and the flexibility of the protocol is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Secret key remote acquisition method and device

The invention relates to a secret key remote acquisition method and device. The method includes the steps: detecting injected secret key acquisition instructions; generating temporary secret key pairs when the injected secret key acquisition instructions are detected; acquiring private keys saved in the locality in the random secret key pairs, and enabling public key signatures in the temporary secret key pairs to generate temporary secret key signatures according to private key pairs in the random secret key pairs; acquiring first identity authentication credentials; transmitting the temporary secret key signatures and the first identity authentication credentials to a random injection server; receiving injected secret key cipher text signatures and second identity authentication credentials returned by the random injection server according to the temporary secret key signatures and the first identity authentication credentials; acquiring and saving injection secret keys according to the injected secret key cipher text signatures and the second identity authentication credentials. According to the secret key remote acquisition method and device, the steps acquiring the secret keys to a fixed place are avoided, acquiring processes of the secret keys are simplified, consumed time for acquiring the secret keys is shortened, and the acquisition efficiency of the secret keys is improved.
Owner:PAX COMP TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products