Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

576 results about "Storage security" patented technology

Storage security is a specialty area of security that is concerned with securing data storage systems and ecosystems and the data that resides on these systems.

Creating and visiting method for GKF three-dimensional space database

The invention discloses a creating and visiting method for a GKF three-dimensional space database, and belongs to the field of three-dimensional digital cities and three-dimensional geographic information systems. For meeting requirements of storage and rapid visiting of data of a three-dimensional model, a three-dimensional topography and an inclined camera shooting model, the creating and visiting method for the GKF three-dimensional space database on the basis of NoSQL thinking and a memory mapping technology is provided, and the storage safety and the rapid visiting efficiency of the data of the three-dimensional model, the three-dimensional topography and the inclined camera shooting model are improved. Characteristics of mass, binary fluidization, capability of not requiring transaction awareness in visiting and the like of the three-dimensional model, the three-dimensional topography and the inclined camera shooting model are considered, compared with a three-dimensional space database stored based on a relational database, the creating and visiting method for the GKF three-dimensional space database conforms to features of the data of the three-dimensional model, the three-dimensional topography and the inclined camera shooting model, and is more compact in utilization of storage space, better in safety and higher in data access efficiency.
Owner:CHONGQING SURVEY INST

Mobile phone unlocking method based on voice recognition

The invention discloses a mobile phone unlocking method based on voice recognition, and the method comprises following steps of recording and storing standard unlocking voice; requiring the unlocking voice when requesting the user to actuate the mobile phone; inputting the voice and converting the voice into voice characteristic parameters; and comparing the voice characteristic parameters of the request user with the standard voice characteristic parameters, and enabling successful unlocking if the voice characteristic parameters are identical to the voice characteristic parameters of one authorized user. Due to the adoption of the method, the problem that the unlocking password is easy to decipher or to peer can be overcome, the collected voice information is finally converted to the voice characteristic parameters after being corrected and adjusted, so that the accuracy of the characteristic parameter calculation result is improved, and the reliability of the voice unlocking is further improved; the information content is compared with the voice characteristic parameters, the unlocking can be completed when the inputted voice characteristic parameters completely conform to the standard unlocking voice, the unlocking voice is not easy to decode, the storage security of the private data of the mobile phone is high, and the stored private data of the mobile phone is not easy to leak; and in the unlocking process, the keystroke operation is not needed, so that convenience in use can be realized.
Owner:CHENGDU CK SCI & TECH

Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology

The present invention discloses a cloud data security protection method adopting a fully homomorphic encryption technology and a multiple digital watermarking technology. The cloud data security protection method is characterized in that in a cloud computing environment, a trusted third-party organization distributes a key to a user, after the user stores the key, a fully homomorphic encryption scheme is adopted to encrypt to-be-uploaded data at a user side, then the encrypted data is uploaded to a cloud side, thereby ensuring transmission security and storage security of data; in addition, when the user searches for data, direct search for ciphertext can be performed after a search keyword is encrypted, thereby improving search efficiency; and moreover, before the data is uploaded to the cloud side, a fragile watermarking and a robust watermarking are respectively embedded into the to-be-uploaded data, the purpose of embedding of the fragile watermarking is to prevent illegal modification of the data, so as to achieve authentication for integrity of the data, and the purpose of embedding of the robust watermarking is to protect copyright of the data, so as to achieve authentication for copyright of the data.
Owner:JIANGSU BOZHI SOFTWARE TECH CO LTD

System and method for realizing security storage and access control of data

The invention discloses a system and method for realizing the security storage and the access control of data. The system comprises an application server, a storage security gateway, a security strategy server and a backend storage system, wherein the storage security gateway is additionally arranged between the application server and the backend storage system so as to realize the partition, the isolation and the access control of data security domains. The storage security gateway and a storage virtualization gateway can synergistically work, and data can be stored in the manner of the security domains on an actual physical medium by utilizing a virtualization technique. When a data access request arrives at the storage virtualization gateway, the storage virtualization gateway can invoke the functions of the storage security gateway so as to realize the isolation and the access control of the data security domains. Because all data requests for access to the backend storage system can be processed by the storage security gateway, security control is guaranteed to be performed on the single path of data without being bypassed. In addition, security control is realized at the bottom layer of data access, so that attack means to data by upper application layers can be effectively avoided.
Owner:董唯元

SM2-based two-party collaborative signature method and decryption method

The invention relates to an SM2-based two-party collaborative signature method and decryption method, and belongs to the technical field of digital signature and decryption. The collaborative signature method comprises the following steps: obtaining a sub-private key of a first communication party and a sub-private key of a second communication party as two-party private keys of a user, and generating a user public key by using the two-party private keys of the user based on SM2; the first communication party uses the user public key to generate a message digest e from a to-be-signed message Mand sends the message digest e to the second communication party, and the second communication party generates a first part signature r according to the message digest e based on SM2 and sends the first part signature r to the first communication party; and the first communication party generates a second part signature s according to the first part signature r and a sub private key of the firstcommunication party, and obtains and outputs a complete signature. Meanwhile, the invention relates to a two-party decryption method based on SM2. According to the embodiment of the invention, the problem that the storage security and the use security of the secret key in the prior art have great hidden dangers is solved.
Owner:DATA COMM SCI & TECH RES INST +1

An Internet of Things terminal secure communication method based on a block chain technology

The invention discloses an Internet of Things terminal secure communication method based on a block chain technology. The Internet of Things terminal secure communication method comprises the steps that an Internet of Things communication server generates a key; Each IoT device generates a key generation parameter and generates a respective private key; And the two communication parties calculaterespective public keys, obtain the secret keys of the Internet of Things communication server, submit the respective public keys to the Internet of Things communication server for storage, obtain thepublic keys of the communication parties through the Internet of Things communication server, calculate the communication secret key of the current communication and carry out secure communication through the communication secret key of the current communication. According to the invention, automatic encryption communication between the IoT device and the service center and between the IoT deviceand the IoT device is realized; The load capacity of the service center is reduced, and the high efficiency of data communication is realized; And finally, reliable storage of the IoT equipment publickey and other data based on the block chain is realized, the storage integrity and tamper resistance are ensured, and the requirement of storage security is met.
Owner:HUNAN NORMAL UNIVERSITY

Biometric fingerprint authentication method based on quantum fuzzy commitment

InactiveCN102750529AStrengthen privacy and security protectionObvious superiorityCharacter and pattern recognitionStorage securityBiometric data
The invention discloses a biometric fingerprint authentication method based on a quantum fuzzy commitment, which comprises a registration phase and an authentication phase. The registration phase comprises the following steps of: firstly, constructing a fuzzy commitment set to produce code words required for the commitment phase by using a quantum error correcting code space without self-dual constraint, and applying a noise addition transformation used for fuzzy proving to the code word; and then, constructing a quantum hash algorithm, and mixing, diffusing and encrypting a random quantum sequence so as to realize the security of using one key at one time in the sense of information theory. The authentication phase comprises the following step of opening the fuzzy commitment set by using a quantum fuzzy commitment to obtain random information for decrypting keys Messa. A new quantum fuzzy commitment system is constructed by combing the quantum hash algorithm on the basis of entangling assistant quantum error correcting codes. Compared with other similar fingerprint authentication methods, the biometric fingerprint authentication method based on a quantum fuzzy commitment has prominent advantages in the aspects of storage security and authentication security of biometric data, and the quantum biometric performance and the security of biological template information storage and transmission can be increased.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products