Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

858results about How to "Ensure data security" patented technology

Data access method, system and device

The invention discloses a data access method, system and device. The data access method includes: determining a data storage command during data storage; determining a block chain corresponding to an identity identifier and a secret key pair according to the identity identifier arranged in the data storage command; storing data to be stored in the block chain according to the secrete key pair; determining a data query command during data query; determining a block chain corresponding to an identity identifier and a private key according to the identity identifier corresponding to the data query command; and decrypting data in the block chain according to the private key, and querying the data. It is thus clear that the data access method can access data corresponding to the identity identifier without accessing a plurality of databases, can only access the block chain corresponding to the identity identifier, can perform data storage through the secrete key, can ensure the security of the data, can simplify the complexity of operations, and can improve the efficiency of data access.
Owner:ADVANCED NEW TECH CO LTD

System and method for cloud computing environment data encryption storage and capable of searching

The invention relates to a system and a method for cloud computing environment data encryption storage and capable of searching. The system for cloud computing environment data encryption storage comprises a key management server, an encryption and decryption server, a user side, a ciphertext indexing server and a cloud platform which are all respectively connected with a key mapping server and exchange data with the key mapping server. Due to the fact that only mapping relation of user identification, key identification and data storage addresses is stored in the key mapping server, only the key identification and key values are stored in the key management server, only ciphertext index containing relative relation of indexing key words and data storage address is stored in the ciphertext indexing server, and only ciphertext data is stored in the cloud platform, so that direct relation between the key values and the ciphertext data which are used in the encryption and decryption server is broken. The key values and the ciphertext data do not exist simultaneously in the position storing the key mapping relation, the key values and the key mapping relation do not exist simultaneously in the position storing the ciphertext data and the key mapping relation and the ciphertext data do not exist simultaneously in the position storing the key values.
Owner:CEC CYBERSPACE GREAT WALL

Intelligent electromechanical equipment management system and method based on BIM (building information modeling)

The invention discloses an intelligent electromechanical equipment management system and method based on BIM. The intelligent electromechanical equipment management system comprises an integrated delivery platform, an equipment information management module, a maintenance management module, an operation and maintenance knowledge base module and an emergence plan management module. By virtue of the system and the method, a property management practitioner can efficiently realize management of equipment information, maintenance, an operation and maintenance knowledge base and an emergence plan of a large number of complex electromechanical equipment of a building.
Owner:NO 1 CONSTR ENG CO LTD OF CHINA CONSTR THIRD ENG BUREAU CO LTD

Method for fast handover

Disclosed is a method for fast handover in a wireless security data communication environment. The fast handover method for a mobile node connected to a network via an access point to perform a data communication in a wireless communication environment according to the present invention includes: performing an authentication while communicating with an authentication server having registration information about the mobile node via an uncontrolled port of the access point so as to make the mobile node connected to the network; performing a mobile Internet Protocol (IP) registration for binding a Care-of-Address (CoA) to a home agent and a correspondent node (CN) via the access point in parallel with performing the authentication; and opening a control port of the access point and relaying data transceived at the mobile node using the CoA when the authentication and the registration being successfully completed. Accordingly, a fast handover of the mobile node can be supported.
Owner:SAMSUNG ELECTRONICS CO LTD

Method for secure data transmission in wireless sensor network

A method for secure data transmission in wireless sensor network includes that: the network user determines a master key and inputs it into a central node and a device node; after the central node and the device node have authorized each other, the central node generates a new session key and sends it to the device node; while the central node and the device node communicate with each other, the data sending party uses the new session key to encrypt the data for transmission and verify the integrity of the data, and the data receiving party uses the session key to decrypt the data and verify the integrity of the data. The advantages of the present invention are that: the consumption of computation resource and the communication overhead are greatly reduced without affecting the security performance of the network, the problem of the authorization between the central node and the device node is solved, and the method for generating, transmitting and updating the key realizes the encryption of the data for transmission and the verification of the data integrity, and thus it ensures the security of the data transmission in wireless sensor network.
Owner:BEIJING YUDONG TECH DEV

Image encryption method and image decryption method with visual security and data security based on compressed sensing

ActiveCN106600518AIncrease spaceEnhanced resistance to brute force attacksImage data processing detailsChosen-plaintext attackHash function
The invention relates to an image encryption method and an image decryption method with visual security and data security based on compressed sensing. The image encryption method comprises the steps of: firstly, utilizing an SHA 256 hash function to obtain a 256-bit hash value of a plaintext image as an image secret key, and calculating initial numerical values of one-dimensional skew tent chaotic mapping and zigzag scrambling; carrying out sparse processing on the plaintext image, and carrying out zigzag scrambling on a coefficient matrix; and then utilizing the one-dimensional skew tent chaotic mapping to generate a measurement matrix, measuring and quantifying a scrambling matrix to obtain a compressed and encrypted image, and embedding the image into a carrier image with visual significance to obtain a final ciphertext image with visual significance. The image encryption method realizes the visual security and data security of the plaintext image, has large secret key space, is highly sensitive to plaintext, has higher capacity of resisting brute-force attack, chosen-plaintext attack and known-plaintext attack, does not need an additional storage space, and can transmit and store the ciphertext image quickly and effectively.
Owner:HENAN UNIVERSITY

Petrochemical engineering equipment supervision information management system

The invention relates to a petrochemical engineering equipment supervision information management system. The system comprises an external network subsystem and an internal network subsystem which are connected through a hardware firewall; the external network subsystem comprises an external network terminal which accesses the system through Internet; a WEB server and a DATA server are erected in the internal network subsystem; the DATA server stores data-layer data, the WEB server is in communication connection with the hardware firewall and a switch, and the switch is in communication connection with an internal network terminal for performing internal communication; the system employs a six-layer architecture which successively comprises a basic support layer, a data layer, a service logic layer, an application layer, a presentation layer and a user layer from the bottom layer to the top layer; and the application layer provides application service for the presentation layer and is internally integrated with various function modules including a user module, a supervision module, a basic setting module, an archive information management module and an internal exchange module. The system provided by the invention integrates an enterprise OA system and supervision service into one platform, supports multi-terminal registration, optimizes the work flow, decreases the management cost and improves the work efficiency.
Owner:南京三方化工设备监理有限公司

Data interaction method and system

The embodiment of the invention provides a data interaction method and system. The system includes a first unidirectional gatekeeper, a second unidirectional gatekeeper, a first proxy server, a second proxy server, a resource server, and a client. The first proxy server and the client are both located in a first network. The second proxy server and the resource server are both located in a second network. The first network is physically isolated from the second network. The first proxy server is configured to receive a request sent by the client, to send the request to the second proxy server via the first unidirectional gatekeeper, and to send a response message to the client. The second proxy server is configured to send the request to the resource server and to receive a response message returned from the resource server, and to send the response message to the first proxy server via the second unidirectional gatekeeper. Because the unidirectional gatekeepers transmit data unidirectionally, the first network and the second network are safely isolated, thereby ensuring the data security of the first network during data interaction.
Owner:北京明朝万达科技股份有限公司

Method for data security transmission and key exchange

The invention provides a method for data security transmission and key exchange and relates to the technical field of information security. The method solves the problems that in the prior art, due to the fact that a mobile storage device is used for transmitting data, a file is divulged; when the data are transmitted through the internet, online supporting by a third-party CA center is needed; when the data are transmitted through a special security hardware device, cost is high and compatibility is poor. The method comprises a cleartext file encryption process, a decryption authorization process and a ciphertext file decryption process. According to the method for data security transmission and key exchange, the technical scheme that a high-intensity symmetric encryption algorithm and an asymmetric cryptographic algorithm are combined is adopted, mark extraction can be conducted, a public key and private key pair is generated and extracted, a key file is synthesized into ciphertext data, and therefore a file can be formed. Meanwhile, a reversible process can also be achieved, wherein one file is divided into the key file and the ciphertext data, and therefore the method for data security transmission and key exchange is easy and convenient to operate and high in security level.
Owner:北京信长城科技发展有限公司

Method and system for remote bid opening and bid evaluation

The invention relates to data safety technology, and particularly discloses a method and a system for remote bid opening and bid evaluation. The method includes the steps: uploading bidding documents, primarily encrypting the bidding documents and secondarily encrypting a primary encryption key; receiving and decrypting the bidding documents in an online manner, decrypting the primary encryption key by acquiring a secondary primary encryption key, and then decrypting the bidding documents by the aid of the primary encryption key; verifying validity of the bidding documents and generating a bid opening list when bid opening time comes; distributing bid inviting documents, the bidding documents and bid opening process documents; and performing evaluation according to preset evaluation standards to obtain bid evaluation results. The system comprises a bidding service subsystem, a bid opening service subsystem and a bid evaluation service subsystem, wherein the bid opening service subsystem is capable of decrypting the secondarily encrypted bidding documents in the online manner and providing the corresponding bid inviting documents, the bidding documents and the bid opening process documents to the bid evaluation service subsystem for evaluation. By the aid of the method and the system, safety of the bidding documents is facilitated, and decrypting efficiency is improved.
Owner:SICHUAN CONSTR NETWORK

Distributed storage system based on blockchain technology and identity authentication method thereof

The present invention provides a distributed storage system based on a blockchain technology and an identity authentication method thereof, belonging to the field of distributed storage. There are twoclasses of identity authentication users, and the identity authentication users comprise a user account and a device account, each distributed node can achieve a node identity identification functionand a node fault-tolerant mechanism, the internal portion of each node is provided with a small area to store the content of the blockchain to record all the account data and achieve behavior auditing, attribute log recording, account information addition and signature service, nobody can tamper the user data or illegally adds accounts to the system if there is no accepting of users or an information center, and the data in the distributed storage system cannot be replaced so as to ensure the data safety of the distributed storage system.
Owner:HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products