Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

276 results about "Random string" patented technology

Platform authorization method, platform server side, application client side and system

The embodiment of the invention discloses a platform authorization method, a platform server side, an application client side and a system. The method includes receiving a first verification message sent by the application client side through a first path and obtaining terminal identification of the terminal of the application client side; recording the mapping relationship between the received random strings and the terminal identification; receiving a second verification message sent by the application client side through a second path; reading identity authentication information submitted in a registration process from a database according to the received identification, decrypting and verifying encrypted identity strings, extracting the corresponding terminal identification from the recorded mapping relationship if the consistency is determined, and obtaining corresponding user account information according to the terminal identification; generating an authorized access token according to the user account information and the identity authentication information and sending the authorized access token to the application client side. The platform authorization method, the platform server side, the application client side and the system enable a user to have no awareness of the authorization process and can further improve the security of the authorization.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Urban real-time traffic system and method capable of realizing privacy protection based on block chains

The invention relates to two systems which are an urban real-time traffic system capable of realizing privacy protection based on block chains of a public chain and an urban real-time traffic system capable of realizing vehicle monitoring based on block chains of a private chain. The urban real-time traffic system capable of realizing privacy protection based on the block chains of the public chain comprises a system center module, urban vehicles and a recorder module. The urban real-time traffic system capable of realizing vehicle monitoring based on the block chains of the private chain is additionally provided with a center which is responsible for managing identifiers of the vehicles. According to the invention, the block chain is adopted as a core technology, a record book of the block chain is utilized to store and record driving records of each automobile in a distributed manner, each automobile is recorded by adopting a mode of the automobile identifier in the record book, each identifier generates a random character string by adopting an encryption algorithm and varies in a timed manner, and privacy protection for an automobile owner or vehicle monitoring is realized according to the confidentiality of the identifiers. The recorder draws real-time traffic conditions according to data of the record book.
Owner:CHENGDU UNIV OF INFORMATION TECH

Platform authorization method, platform service side, application client side and system

The embodiment of the invention discloses a platform authorization method, a platform service side, an application client side and a system. The platform authorization method comprises the following steps: a first validation message sent by the application client side through a first pathway is received and a terminal identifier is acquired; the mapping relation between received random character strings and the terminal identifier is recorded; a second validation message sent by the application client side through a second pathway is received; identity certification information submitted during a registration process is read from a data base according to an identity identifier; signature is conducted on the extracted identity certification information; if a generated signature value is consistent with a received signature value, a corresponding terminal identifier is extracted from the recorded mapping relation according to the random character strings; corresponding information on a user account is acquired according to the terminal identifier; an authorized access token is generated according to the information on the user account and the identity identification information; the authorized access token is sent to the application client side. According to the technical scheme provided by the embodiment of the invention, the user cannot perceive the authorization process and the authorization safety can be further improved.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Data collection and remote control method and system

InactiveCN108965447AFully automatic sendingAutomatic receivingNatural language data processingTransmissionRemote controlData acquisition
The invention relates to the field of network communication, and provides a data collection and remote control method aiming at the problem that during existing data collection and remote control, release and subscription of a subject need predetermined parameters. The method comprises the steps as follows: an equipment end and a control end are connected with an MQTT server; the equipment end submits an own machine code and a random character string to the control end to perform binding storage; the equipment end releases a message to the MQTT server by using a fixed prefix and the own machine code as a release subject, and the control end subscribes to the message from the MQTT server by using the fixed prefix and a wildcard character as a subscription subject; and the equipment subscribes to the message from the MQTT server by using the own machine code and the random character string as the subscription subject, the control end releases the message to the MQTT server by using the subscription subject of the equipment as a release subject, and the MQTT server automatically pushes the message according to the subscription subject and the release subject. The method and the systemprovided by the invention are applicable to data collection and remote control of the intelligent equipment.
Owner:四川爱创科技有限公司

Intelligent household appliance system secret key control method and intelligent household appliance system

The invention provides an intelligent household appliance system secret key control method and an intelligent household appliance system. The method comprises the steps that a control host generates random character strings at certain time intervals, the random character strings are used as a new secret key to be sent to an intelligent household appliance terminal, the intelligent household appliance terminal updates a local communication secret key of the terminal after receiving the new secret key, and sends a confirmation message to the control host, and the control host synchronously updates the locally-saved communication secret key of the intelligent household appliance terminal after receiving the confirmation message. Therefore, synchronous dynamic secret key updating between the control host and the intelligent household appliance terminal in the intelligent household appliance system can be achieved, communication can be achieved between the control host and the intelligent household appliance terminal without the need that a user manually inputs the secret key, using is convenient, specific secret key information does not need to be managed manually, the system changes automatically and dynamically, each terminal secret key is independent, each secret key is formed by dynamically-generated long character strings, the possibility that the secret keys are guessed does not exist, and communication safety can be ensured.
Owner:刘文军

Networking program user authentication method based on mobile terminal

InactiveCN102624687ARealize verificationVerification is simple and reliableTransmissionUser verificationIp address
The invention discloses a networking program user authentication method based on a mobile terminal. The networking program user authentication method includes the implementation steps: 1) binding the mobile terminal on a server by a networking program on a client in advance; 2) sending a request for distributing a unique random character string to a server by the networking program when the networking program is logged in, and generating a barcode by the aid of the acquired random character string and an IP (internet protocol) address of the client; 3) shooting the barcode by the mobile terminal, analyzing the barcode to generate a character string to be authenticated, transmitting the character string to be authenticated to the server, receiving the character string to be authenticated by the server, and analyzing the character string to be authenticated into a random character string to be authenticated and an IP address, to be authenticated, of the client; and 4) comparing the random character string to be authenticated with the random character string distributed to the corresponding IP address of the client, and returning authentication passing information to the networking program if the random character string to be authenticated matches with the random character strings distributed to the corresponding IP address of the client. The networking program user authentication method has the advantages that users of the networking program can be authenticated, authentication is simple and reliable, and utilization is convenient.
Owner:苏州奇可思信息科技有限公司

Methods and devices for selectively encrypting and decrypting data

The invention belongs to the technical field of data encryption and decryption and in particular relates to methods and devices for selectively encrypting and decrypting data. The method for encrypting data comprises the following steps: generating true random numbers 0 and 1 strings with predetermined length as random seeds according to the preset method; acquiring data from the random seeds multiple times and cascading the acquired data every time into a random string with length not less than plaintext length; generating a plaintext encryption bit identifying random string according to the random string; selecting more than half plaintext data to be encrypted according to the plaintext encryption bit identifying random string; and arranging the encrypted data and the unencrypted data according to the plaintext position to form ciphertext. The device for encrypting data comprises a true random number generating module, an encryption bit identifying random string generating module, a plaintext data selecting and encrypting module and a ciphertext forming module. The invention also provides the method and device for selectively decrypting data. The method and device in the invention reduce the quantity of the encrypted or decrypted data, thus improving the performances of data encryption and decryption.
Owner:BIGKNOW (BEIJING) DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products