Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

97results about How to "Enable secure storage" patented technology

Medical data sharing system based on Blockchain technology and designing method

The invention belongs to the field of data information safety technology, and discloses a medical data sharing system based on Blockchain technology and a designing method. The medical data sharing system based on the Blockchain technology comprises components of a data uploader, a data manager, a data requester, alliance chain nodes and a system administrator. In the system, the data uploader utilizes AES for encrypting the medical data, thereby effectively protecting medical data privacy, and realizing high-efficiency medical data storage. Furthermore according to a symmetric key in the AESis encrypted according to the CPABE, thereby ensuring a fact that only the data requestor with an attribute that satisfies a preset accessing strategy structure can perform deciphering for obtaining the symmetric key, realizing fine-grained access control of the medical data, and realizing supports for accessing control of the temporary request data in an emergency. Obviously, the system and the method effectively settle existing problems based on a Blockchain medical data sharing system and safely and efficiently provides services such as medical data storage, fine-grained access control andsharing.
Owner:梁胤豪

Frequentness measuring method and system for security and privacy protection facing cloud data issuing

The invention discloses a frequentness measuring method and system for security and privacy protection facing cloud data issuing. A database owner generates a secret key pair, encryption outsourcing processing is carried out on the database, encryption operation is carried out on complement of a frequentness threshold negative -k, the encrypted complement is uploaded to a cloud server, and a private key sk is authorized to a proxy server; a client applies to inquire the frequentness of a record R; the proxy server obtains permission from the database owner and assists the database owner in dealing with a transaction. The cloud server is used for storing a ciphertext database and carrying out a homomorphic operation on the ciphertext. According to the method and system disclosed by the invention, with the full-homomorphic encryption technology, the frequentness ciphertext in a data recording manner is obtained in a cloud environment and whether the frequentness of the record meets a privacy protection requirement is determined; and leaking of a recorded content inquired by a client as well as sensitive recorded content with the frequentness lower than a threshold in the database can be prevented during the whole process. Therefore, secure storage of data can be realized; and frequentness measurement for privacy protection can be carried out by the cloud conveniently.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

Method and system for accessing multiple subsystems and public subsystem with distributed storage personalized data through single APP program

The invention relates to a method and system for accessing multiple subsystems and a public subsystem with distributed storage personalized data through a single APP program. According to the method and system, in the interagency networking service system, the personalized data of clients are distributed and stored in different agency databases, independent management and safety of the data are ensured, a special service is provided, and agency subsystems are formed; public data and service are focused on the public subsystem, and public service extension, development and synergism are achieved; the agency subsystem and client access authentication information structures are planned, a client login access verification mirror image is generated on the public subsystem, the uniform mobile internet APP program (Client) is provided for the clients, the APP program interacts with an APP access centralized response server (Server), the APP access request is analyzed, client login access verification is conducted, personalized service client agency subsystems and a service content organizational framework are determined, personalized data are obtained and processed, the personalized and public service is provided, and the clients can synergistically access agency private systems and a public system.
Owner:冯力新 +1

A method to realize a global network real name system based on ID authentication

A method to realize a global network real name system based on ID authentication is to classify network user identity authentication at each network into two types, establish one-to-one domestic authentication center at each website to provide authentication service for domestic network users when they logon domestic websites, establish 10-30 international authentication centers in the country to provide third-party centralized authentication service for foreign network users (from other countries or regions) when they access and logon domestic websites, adopt ID authentication means to solve the 'bottleneck' of mass authentication of authentication centers, update and maintain the network user authentication parameters of domestic authentication centers through the encrypted transmission established between the network real name system association (or society) of each country and domestic website technicians, and meanwhile update and maintain the network user authentication parameters of international authentication center of each country through encrypted transmission established between the network real name system associations (or societies) of different countries, thus realizing a global network real time system.
Owner:胡祥义

Medical data security sharing system and method based on IPFS and alliance chain

The invention relates to the technical field of alliance chain technology and electronic medical data security sharing, and discloses a medical data security sharing system and method based on IPFS and alliance chains, and the system comprises a data owner terminal which is used for encrypting original medical data through employing a symmetric secret key to obtain a medical data ciphertext, storing the medical data ciphertext in the IPFS, and transmitting the medical data ciphertext to a server; the ciphertext corresponding to the keyword and the ciphertext corresponding to the symmetric keyare uploaded to an alliance chain, and an excitation mechanism and a data access permission are set in the smart contract; and a data visitor terminal is used for obtaining the symmetric key corresponding to the target medical data and decrypting the target medical data based on the symmetric key corresponding to the target medical data and the hash address stored in the target medical data when the data access permission set in the smart contract is satisfied and the incentive cost shown by the incentive mechanism is paid. According to the invention, safe storage and sharing of medical data are realized, privacy security of patients is protected, and fine-grained access control of the patients to the medical data is realized.
Owner:ANHUI NORMAL UNIV

Remote monitoring system

The invention relates to a remote monitoring system which comprises a client-side and a server-side. According to the client-side, a video acquisition module is connected with a video monitoring module; a storage module is connected with the video monitoring module and a first transmission module; a lockset control module is connected with a fingerprint management module and the first transmission module; an alarm module is connected with the first transmission module, a fault and vibration monitoring module and an anti-crash self-checking circuit module; a master control module is connected with a clock circuit module, a linkage extension module and the first transmission module. According to the server-side, a second transmission module is connected with a view display module, a fault warning module, a fingerprint management module and a geographic module; a real-time monitoring module is connected with a video monitoring module and the view display module; an information output module is connected with the view display module, a geographic positioning module, a level-to-level management module, an authority management module, a task management module, a statistic analysis module, an approval module and a topology management module; a remote control module is connected with the information output module and a log management module.
Owner:北京神舟航天软件技术股份有限公司

Knowledge graph storage and verification method based on blockchain and IPFS

The invention discloses a knowledge graph storage and verification method based on a blockchain and an IPFS. The method specifically comprises the steps that firstly, a process file of the knowledge graph is exported from a graph database, a file hash value is calculated, the process file is stored in an IPFS inter-satellite file system, a file index hash value returned by the IPFS is compared with the previously calculated hash value, and if the file index hash value is equal to the previously calculated hash value, the file index hash value is stored in a block chain, and safety of the process file is guaranteed. The file index hash value is stored into the blockchain through processes of data packaging, signing, block packaging, block broadcasting and the like, querying the file index hash value in the blockchain, comparing the file index hash value with a file index hash value obtained from an IPFS before, if the file index hash value is the same as the file index hash value, entering a file processing module, and otherwise, entering a file warning module. Through combination of the blockchain and the IPFS, reliable and rapid storage of the knowledge graph can be realized, andthe security and traceability of knowledge graph process files are ensured.
Owner:XIAN UNIV OF TECH

Public key password calculation method and system based on Intel SGX mechanism

The invention discloses a public key password calculation method and system based on an Intel SGX mechanism. The method comprises the following steps of 1) generating Public enclave and Private enclave independent of each other, which are application running environments providing isolated execution based on the Intel SGX mechanism respectively; deploying the Public enclave in an encrypted messagesender terminal or a signed message verifier terminal, and deploying the Private enclave in an encrypted message receiver terminal or a signed message generator terminal; and 2) when the Private enclave is started for the first time, generating a private key; and when the Public enclave is started for the first time, executing SGX remote authentication for the Private enclave to request for a public key identical to the private key. According to the public key password calculation method and system, the public key password calculation is realized securely and efficiently.
Owner:INST OF INFORMATION ENG CAS

Classified and graded fitness health big data sharing system and method

The invention provides a classification and grading fitness health big data sharing system and method. The system comprises a user management module, a data management module, an access control module, a data sharing module, a block chain and a distributed file system. The user management module is used for managing users; the data management module is used for encrypting by adopting different encryption levels according to the data sensitivity level; the access control module manages an access strategy of personal data generated by a data owner and realizes access control of the personal data at the same time, and the data sharing module is used for performing authority verification on a data visitor; the block link is used for storing an access control strategy and serving as an access control server; and the distributed file system is used for storing the encrypted personal data. According to the system disclosed by the invention, construction and optimization from data storage to data sharing are carried out based on the block chain, and auditing of the access control record is realized while data classification and grading privacy protection is ensured.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY +1

Multi-application intelligent card with encryption and decryption functions

The embodiment of the invention provides a multi-application intelligent card with encryption and decryption functions. The intelligent card comprises a transmission management module, a command parsing module, an encryption / decryption module and a secure conversation management module, wherein the transmission management module is used for inputting a command or returning a response according to a preset transfer protocol; the command parsing module is used for parsing the received command; the encryption / decryption module is used for executing encryption or decryption operation on the application content in an application card; the secure conversation management module is used for managing the contents in the application card based on conversation information, and controlling the state transition of the content. The multi-application intelligent card not only can be used for solving the security problem of the intelligent card well, but also has the advantages of short development period, convenience in system maintenance and update, lower cost and the like.
Owner:陕西埃菲克能源科技有限公司

Information processing method, device and equipment and medium

The invention discloses an information processing method and device, equipment and a medium, which are used for solving the problem of low security of bill information in the prior art. The method specifically comprises the steps of receiving an information storage instruction; generating a first secret key, encrypting the bill information indicated by the information storage instruction by usingthe first secret key to obtain a data ciphertext; obtaining a second secret key, encrypting the first secret key by using the second secret key to obtain a secret key ciphertext; and storing the dataciphertext and the key ciphertext as encrypted bill information of the bill information in an information block chain. Therefore, double encryption is carried out on the bill information through the first secret key and the second secret key. Compared with the prior art, the security of the bill information is improved, the bill information is prevented from being leaked as much as possible, and once the bill information is stored in the information block chain, the bill information cannot be tampered or repudiated, so that the security of the bill information is further improved by storing the bill information through the information block chain.
Owner:AEROSPACE INFORMATION

Automatic storage express cabinet for unmanned aerial vehicle distribution

The invention discloses an automatic storage express cabinet for unmanned aerial vehicle distribution. The structure design is simplified and the goods storage safety is improved during the automatic storage of goods. In particular, the express cabinet has a function of performing the automatic communication with the unmanned aerial vehicle, and can send an instruction according to the storage condition to enable the unmanned aerial vehicle to place the goods at the corresponding top door opening position, thereby solving the problem of disorder of goods placement of the unmanned aerial vehicle; (2) the express cabinet is provided with a self-adaptive goods slow descending device, so that the goods can be slowly conveyed into a specified storage grid by a corresponding mechanism after being released by the unmanned aerial vehicle, thereby solving the problems that the goods distributed by the unmanned aerial vehicle are difficult to sort and place, and the goods possibly fall off and are damaged when being released are solved; (3) the express cabinet is provided with the storage grids for automatically storing and opening the goods, and employs a full-automatic mechanism design, so that the problems of safe storage of the goods without unmanned distribution and possible forgetting to close the outer doors of the storage grids when a user takes the goods are solved.
Owner:FUJIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products